• Title/Summary/Keyword: Social Network Resource

Search Result 163, Processing Time 0.022 seconds

Social Influence and Semantic Similarity Concerned Recommendation Technique of Qualitative Information (사회적 영향력과 어의 유사도 분석에 기반한 가치정보의 추천 기법)

  • Kim, MyeongHun;Kim, SangWook
    • Annual Conference of KIPS
    • /
    • 2016.10a
    • /
    • pp.363-366
    • /
    • 2016
  • 추천 기법은 개인의 관심사와 상황을 고려한 개인화된 아이템을 제공함으로써 아이템의 소비과정에서 발생하는 부하를 줄여주고 정보 소비의 효율성을 증대시키는데 중요한 역할을 한다. 본 연구에서는 전통적인 추천 기법인 Content-Based(CB)기법과 최근 온라인 소셜 네트워크의 경향을 반영한 Social Network-based(SN)기법을 접목하여 새로운 복합방식의 정보 추천 기법을 제시한다. CB 기법의 대표적인 한계점인 cold start problem과 SN 기법의 추천 아이템의 전문성 문제를 상호 보완하며, 특히 최근 소셜 네트워크의 특징인 비신뢰 (non-trust) 기반의 영향력 있는 정보 확산자가 존재하는 환경에서 기법을 적용할 수 있도록 하였다. 또한 대부분 사람 추천 중심인 기존의 SN 기법들과는 달리 사람에게 제공할 정보의 추천에 초점을 두며, 정보 선정과정에서 개인의 온라인과 현실(real world)에서의 사회 활동 정보를 모두 활용하여 더육 더 개인화된 가치 정보를 제공하고자 한다.

TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks

  • Li, Jingru;Yu, Li;Zhao, Jia;Luo, Chao;Zheng, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3273-3308
    • /
    • 2017
  • Building appropriate trust evaluation models is an important research issue for security guarantee in social networks. Most of the existing works usually consider the trust values at the current time slot, and model trust as the stochastic variable. However, in fact, trust evolves over time, and trust is a stochastic process. In this paper, we propose a novel time-variant stochastic trust evaluation (TSTE) model, which models trust over time and captures trust evolution by a stochastic process. Based on the proposed model, we derive the time-variant bound of untrustworthy probability, which provides stochastic trust guarantee. On one hand, the time-variant trust level of each node can be measured by our model. Meanwhile, by tolerating nodes with relatively poor performance, our model can effectively improve the node resource utilization rate. Numerical simulations are conducted to verify the accuracy and consistency of the analytical bounds on distinguishing misbehaved nodes from normal ones. Moreover, simulation results on social network dataset show the tradeoff between trust level and resource utilization rate, and verify that the successful transmission rate can be improved by our model.

The Effects of Team Network Characteristics and Boundary Spanning Activities on Knowledge Management Performances: The Mediating Role of Trust (팀 네트워크 특성과 경계관리 활동이 지식경영 성과에 미치는 영향: 팀 신뢰의 매개역할)

  • Goh, Yumi;Kim, Jee-Young;Chung, Myung-Ho
    • Knowledge Management Research
    • /
    • v.14 no.5
    • /
    • pp.101-120
    • /
    • 2013
  • The effective management of knowledge has become one of the critical success factors in current organizations. In spite of the extensive use of Knowledge Management System (KMS), useful information and knowledge resources are still transmitted through personal networks among people in organizations. Thus, social network theory which focuses on social relationships in organization can be a fruitful theoretical resource for enhancing Knowledge Management (KM) performances. In this study, we investigate the effects of intra-team network characteristics (i.e., group density and degree of centralization) and external boundary spanning activities on knowledge management performances of a team. We also acknowledge that all group members do not necessarily agree on the team goal and actively disseminate useful information and knowledge. Drawing on the political perspective on KM which emphasizes the role of trust among group members, we examine the mediating effects of team trust between internal/external network characteristics and KM performances. From the data of 220 teams in financial companies in Korea, we found that: (1) group density had positive effects on KM performances (i.e., knowledge creation, sharing, and use). (2) However, centralization was not significantly associated with KM performances. (3) Team trust was found to be an important factor mediating the relationship between intra-team network characteristics, boundary spanning activities, and KM performances. Based on these results, we discuss and suggest possible implications of the findings when designing and implementing KM practices.

  • PDF

Using The Anthology Of Learning Foreign Languages In Ukraine In Symbiosis With Modern Information Technologies Of Teaching

  • Fabian, Myroslava;Bartosh, Olena;Shandor, Fedir;Volynets, Viktoriia;Kochmar, Diana;Negrivoda, Olena;Stoika, Olesia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.241-248
    • /
    • 2021
  • The article reviews the social media as an Internet phenomenon, determines their place and level of popularity in the society, as a result of which the social networks are a resource with perspective pedagogical potential. The analysis of social media from the point of view of studying a foreign language and the possibility of their usage as a learning medium has been carried out. The most widespread and popular platforms have been considered and, based on their capabilities in teaching all types of speech activities, the "Instagram", "Twitter", and "Facebook" Internet resources have been selected as the subject of the research. The system of tasks of teaching all types of speech activities and showing the advantages of the "Instagram", "Twitter", and "Facebook" platforms has been proposed and briefly reviewed.

Cyberbullying Detection in Twitter Using Sentiment Analysis

  • Theng, Chong Poh;Othman, Nur Fadzilah;Abdullah, Raihana Syahirah;Anawar, Syarulnaziah;Ayop, Zakiah;Ramli, Sofia Najwa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.1-10
    • /
    • 2021
  • Cyberbullying has become a severe issue and brought a powerful impact on the cyber world. Due to the low cost and fast spreading of news, social media has become a tool that helps spread insult, offensive, and hate messages or opinions in a community. Detecting cyberbullying from social media is an intriguing research topic because it is vital for law enforcement agencies to witness how social media broadcast hate messages. Twitter is one of the famous social media and a platform for users to tell stories, give views, express feelings, and even spread news, whether true or false. Hence, it becomes an excellent resource for sentiment analysis. This paper aims to detect cyberbully threats based on Naïve Bayes, support vector machine (SVM), and k-nearest neighbour (k-NN) classifier model. Sentiment analysis will be applied based on people's opinions on social media and distribute polarity to them as positive, neutral, or negative. The accuracy for each classifier will be evaluated.

Barriers of community networking practices in the context of family-centered case-management (가족사례관리 중심 지역사회협의체 운영의 장애요인 및 발전 방안)

  • Auh, Seongyeon;Koh, Sun-Kang
    • Journal of Family Resource Management and Policy Review
    • /
    • v.21 no.1
    • /
    • pp.65-88
    • /
    • 2017
  • The main purposes of this study are to appraise the family-centered case-management (FCCM) practices in terms of building the community networking efforts, and to propose the practical improvement suggestions to overcome the barriers in practicing the current Healthy Families Policy, FCCM. The blended methodology was employed by collecting the quantitative and qualitative data sets including an staff's on-line survey, in-depth interviews(site case studies), and FGIs. As results, the authors found, despite the building and maintaining functional community networks was the essential and critical condition for the FCCM policy deliveries, many staffs have faced hardships in FCCM practices such as building a new network or finding an available and apt network within their communities. The lack of previous experiences in case-management exaggerated the functional difficulties thus, the new staffs were more prone than the staffs with 2 or more years experiences to the misunderstanding about the missions and tasks related to FCCM. Authors suggested that various on-the-job-training should be provided to eliminate those obstacles to build and/or maintain the community network for FCCM. Also, it is necessary for the each institution's director or managers to understand the FCCM and its relation to community networking, and to support FCCM staff members.

How local governments influence the growth of social economy? (기초자치단체가 사회적경제 활성화에 미치는 영향에 관한 연구)

  • 최정은;최영준
    • Journal of Korean social welfare administration
    • /
    • v.21 no.1
    • /
    • pp.225-251
    • /
    • 2019
  • This study aims to analyze the effect of local government capacities on the rise of social start-ups including social enterprises, cooperatives, and community business. Social economy is considered as an alternative model for welfare, employment and local economy. Until now, existing literature on social economy has been limited to individual organizations or specific regions, and no empirical analysis has been conducted at the nationwide level. In this study, we examine how to explain the variation of the number of social economic entities across the country. As a result, the following factors prove to be important in the rise of social economy in a local area. First, the number of professional civil servants dedicated to the task is the important factor, rather than to establish a team-based system. Second, local governments' own welfare spending is the crucial resource for the social economy. Finally, the integrated network activity of the social economic organization positively influences the growth of the social economic entities. With the finding, we confirm the crucial role of local governments in the growth of social economy and finally draw some policy implications.

Study of the Activation Plan for Rural Tourism of the Jeollabuk-do Using Big Data Analysis (빅데이터 분석을 통한 농촌관광 실태와 활성화 방안 연구: 전라북도를 중심으로)

  • Park, Ro Un;Lee, Ki Hoon
    • The Korean Journal of Community Living Science
    • /
    • v.27 no.spc
    • /
    • pp.665-679
    • /
    • 2016
  • This study examined the main factors for activating rural tourism of Jeollabuk-do using big data analysis. The tourism big data was gathered from public open data sources and social network services (SNS), and the analysis tools, 'Opinion Mining', 'Text Mining', and 'Social Network Analysis(SNA)' were used. The opinion mining and text mining analysis identified the key local contents of the 14 areas of Jeollabuk-do and the evaluations of customers on rural tourism. Social network analysis detected the relationships between their contents and determined the importance of the contents. The results of this research showed that each location in Jeollabuk-do had their specific contents attracting visitors and the number of contents affected the scale of tourists. In addition, the number of visitors might be large when their tourism contents were strongly correlated with the other contents. Hence, strong connections among their contents are a point to activate rural tourism. Social network analysis divided the contents into several clusters and derived the eigenvector centralities of the content nodes implying the importance of them in the network. Tourism was active when the nodes at high value of the eigenvector centrality were distributed evenly in every cluster; however the results were contrary when the nodes were located in a few clusters. This study suggests an action plan to extend rural tourism that develop valuable contents and connect the content clusters properly.

Regional Level of Inclusive Development

  • Shashyna, Maryna V.;Butko, Mykola P.;Tulchynska, Svitlana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.133-138
    • /
    • 2021
  • The concept of inclusive development provides equal opportunities for all participants in access to the labor market and resource allocation. This concept emphasizes the equality of human capital, the ecological state of the environment, social protection and food security. This concept is fundamentally different from the standard perception of economic growth, because it has broader goals than simply increasing incomes and GDP. It rejects the position that positive results are an automatic consequence of growth; here the basic condition is human development and increase of its well-being, reduction of poverty. Therefore, it is not the result of distribution that becomes primary, but the involvement in the process of social reproduction. An alternative system of characterization of the country's position according to the resulting indicator of the Inclusive Development Index was presented at the World Economic Forum in Davos. In this research the methodical development of the system of estimation of the index of inclusive development for regions of the NUTS 4 level of the European classification is resulted.

Technology forecasting from the perspective of integration of technologies: Drone technology

  • Jinho, Kim;Jaiill, Lee;Eunyoung, Yang;Seokjoong, Kang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.31-50
    • /
    • 2023
  • In the midst of dynamic industrial changes, companies need data analysis considering the effects of integration of various technologies in order to establish innovative R & D strategies. However, the existing technology forecasting model evaluates individual technologies without considering relationship among them. To improve this problem, this study suggests a new methodology reflecting the integration of technologies. In the study, a technology forecasting indicator was developed using the technology integration index based on social network analysis. In order to verify the validity of the proposed methodology, 'drone task performance technology' based on patent data was applied to the research model. This study aimed to establish a theoretical basis to design a research model that reflects the degree of integration of technologies when conducting technology forecasting research. In addition, this study is meaningful in that it quantitatively verified the proposed methodology using actual patent data.