• Title/Summary/Keyword: Social network group

Search Result 389, Processing Time 0.028 seconds

Design of Mobbing Value Computation Algorithm and Classification Model based on Social Network (Social Network 기반 Mobbing 지수 산정 알고리즘 및 분류 모델 설계)

  • Kim, Guk-Jin;Park, Gun-Woo;Lee, Sang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.352-355
    • /
    • 2009
  • 본 논문에서는 Mobbing(집단 따돌림) 현상에 관련된 7개의 요소(Factor)와 그 하위에 포함된 60개의 속성(Attribute)들을 선정한다. 다음으로 선정한 속성들에 대해 나와 사용자들 사이에 관계가 있으면 '1', 관계가 없으면 '0'으로 표현하고, 나와 사용자들간의 유사도 산정을 위해 각 요소안에 포함된 속성들의 합에 유사도 함수를 적용한다. 다음으로 클레멘타인의 인공신경망 알고리즘을 통해 속성들을 포함한 요소들이 취할 최적의 가중치를 산출하고, 이 값들의 총합으로 Mobbing 지수를 산정한다. 마지막으로 Social Network 사용자들의 Mobbing 지수를 본 논문에서 설계한 G2 Mobbing 성향 분류 모델(4개의 그룹; Ideal Group of the Social Network, Bullies, Aggressive victimes, Victimes)에 매핑하여 사용자들의 Mobbing 성향을 알아본다.

Social media big data analysis of Z-generation fashion (Z세대 패션에 대한 소셜미디어의 빅데이터 분석)

  • Sung, Kwang-Sook
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.22 no.3
    • /
    • pp.49-61
    • /
    • 2020
  • This study analyzed the social media accounts and performed a Big Data analysis of Z-generation fashion using Textom Text Mining Techniques program and Ucinet Big Data analysis program. The research results are as follows: First, as a result of keyword analysis on 67.646 Z-generation fashion social media posts over the last 5 years, 220,211 keywords were extracted. Among them, 67 major keywords were selected based on the frequency of co-occurrence being greater than more than 250 times. As the top keywords appearing over 1000 times, were the most influential as the number of nodes connected to 'Z generation' (29595 times) are overwhelmingly, and was followed by 'millennials'(18536 times), 'fashion'(17836 times), and 'generation'(13055 times), 'brand'(8325 times) and 'trend'(7310 times) Second, as a result of the analysis of Network Degree Centrality between the key keywords for the Z-generation, the number of nodes connected to the "Z-generation" (29595 times) is overwhelmingly large. Next, many 'millennial'(18536 times), 'fashion'(17836 times), 'generation'(13055 times), 'brand'(8325 times), 'trend'(7310 times), etc. appear. These texts are considered to be important factors in exploring the reaction of social media to the Z-generation. Third, through the analysis of CONCOR, text with the structural equivalence between major keywords for Gen Z fashion was rearranged and clustered. In addition, four clusters were derived by grouping through network semantic network visualization. Group 1 is 54 texts, 'Diverse Characteristics of Z-Generation Fashion Consumers', Group 2 is 7 Texts, 'Z-Generation's teenagers Fashion Powers', Group 3 is 8 Texts, 'Z-Generation's Celebrity Fashions' Interest and Fashion', Group 4 named 'Gucci', the most popular luxury fashion of the Z-generation as one text.

An Authentication Scheme Using OAuth and Cyber Physical Social System (Cyber-Physical-Social 시스템과 OAuth를 이용한 IoT 인증 기법)

  • Cho, Jeong-woo;Lee, Kuk-young;Lee, Ki Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.348-351
    • /
    • 2016
  • Recently on IoT environment, there is necessary of protected network, which is only specific user can access it. Applying OAuth protocol on IoT, it can be easier to construct network authentication system, but it is hard to construct protected network authentication system. And there is weakness of OAuth protocol, which is easily attacked by sniffing Token by attacker. So, it is necessary to secondary authentication for OAuth. In ultimate IoT, the fog computing is essential. Fog computing is extension of cloud that enables networking not only in core system but also in edge system and communication node to node. Strength of fog computing is location awareness, support for mobility, and so on. If authentication in fog computing uses this strength, it can be more specialized in Fog Computing. So, in secondary Authentication, using Cyber-Physical-Social System will increase convenience of user than using existing authentication system, such as authentication certificate, id/password and group key, which is inconvenient for user. This study is about authentication based Cyber-Physical-Social System.

  • PDF

Effects of Utilization of Social Network Service on Collaborative Skills, Collaborative Satisfaction and Interaction in the Collaborative Learning (협력 학습에서 소셜 네트워크 서비스 활용이 협력 능력, 협력 만족도, 집단내 상호작용에 미치는 효과)

  • Chon, Eunhwa
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.693-704
    • /
    • 2013
  • The purpose of this study was to analyze the effects of social network service on the collaborative skills, collaborative satisfaction, and interaction within groups in collaborative learning. The group that used KakaoTalk, one of social network service for working on the collaborative task in the course exhibited higher collaborative skills and collaborative satisfaction (p<.05) than the group that did not use KakaoTalk. When analyzing the amount and the content of the messages produced by the group that used KakaoTalk, the amount of messages did not have an impact on the collaborative skills and collaborative satisfaction.

Study of Association between the Types of Health on the Basis of Network Analysis (건강의 유형별 연관성 평가: 네트워크 분석을 중심으로)

  • Cho, Ho Soo;Ryu, Min Ho
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.41-61
    • /
    • 2023
  • Purpose This study aims to categorize the types of health, analyze the effects among health types based on network analysis find the most important type of health, and explain whether the results between health types vary depending on demographic characteristics. Design/methodology/approach This study investigated individual physical, clinical, mental, and social health(social capital and social support) levels through a survey of 100 people. Network analysis was applied to the survey data to confirm the degree centrality of nodes. Furthemore, we investigated the differences in core nodes according to gender and age groups. Findings According to the analysis result, social support was the most important health type in the entire group. Furthermore, the importance of health type was different depending on the characteristics of the groups. In the case of men, clinical health was the most important health type, and social support was analyzed to be the most important for women. In the case of young people, clinical health was the most important health type, and mental health was the most important health type in the middle-aged.

Development of Scale for College Students' Social Network (대학생 연줄망 측정을 위한 척도 개발)

  • Choi, Jong-Hyug;Kim, Hyung-Jun;Ahn, Tae-Sook;Huh, Jung-Eun;Kwon, Hyuk-Soo;Kim, Hyo-Jung
    • Korean Journal of Social Welfare
    • /
    • v.61 no.3
    • /
    • pp.283-305
    • /
    • 2009
  • The purpose of this study is to develop a scale for the social network of college students in Korea. The social network scale for college students in this paper was developed through 1) literature review and item development 2) focus-group meeting 3) depth-interview with college students 4) pilot-studies and 5) study. The scale of 23 items has been constructed with three features : The first is 'relational feature' with 2 items; the second 'structural feature' with 7 items; and the third 'functional feature' with 14 items. The functional feature in this social network scale has consisted of emotional, economic, spiritual, and socio-relational aspects and has been revealed to the validity and the reliability of Cronbach's ${\alpha}$ 0.716. This study would contribute for college students to solve the many problems in their own lives through the social networks.

  • PDF

Design and Implementation of a Effective Group Manager Application (소프트웨어공학적 방법론을 고려한 소설 네트워크 서비스의 그룹 관리용 어플리케이션의 설계 및 구현)

  • Lee, Sangkon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.6 no.2
    • /
    • pp.119-133
    • /
    • 2013
  • This paper is to present a new social network system that is convenient to group message system. For this system, we implement a group messaging system, chatting, position monitoring, file transfer, picture drawing and/or editing, photo management system, and we combine them as one group manager application based on smart system.

P2P Based Distributed Social Network Service for Privacy Preservation (프라이버시 보호를 위한 P2P 기반 분산형 소셜 네트워크 서비스)

  • Nam, Yoonho;Mun, Jongho;Jung, Jaewook;Won, Dongho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.209-212
    • /
    • 2012
  • 최근 소셜 네트워크 서비스의 인기가 높아짐과 더불어 유저의 프라이버시에 대한 관심도 증가하고 있다. 기존의 소셜 네트워크 서비스는 중앙 집중형 구조를 가지고 있으므로 모든 유저의 프라이버시 정보와 행동들은 서비스 제공자에게 수집되어 진다. 본 논문에서는 중앙 집중식 구조의 무분별한 정보 수집을 제거하고자 오픈 소스를 이용한 P2P 기반 분산형 소셜 네트워크 서비스를 제안한다.

  • PDF

A Study of the Relationship Between Centrality and Research Performance in Collaborative Research Network (공동연구 네트워크에서 중심성과 연구성과 간의 관련성에 관한 연구)

  • Moon, Seonggu;Kim, Injai
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.5
    • /
    • pp.169-176
    • /
    • 2018
  • The purpose of this study is to analyze the relationship between the centrality and the research performance by conducting the social network analysis for the social science journal in the last 10 years. As a result of the relationship analysis, the correlation between centrality and research productivity was highly correlated in most groups, but the impact factor and frequency of citations were not significant. In relation with the comprehensive research such as a H-index, middle productive group correlation was more significant than the upper productive group.

A Study on the Construction and Application of Social Capital Scale in Social Welfare Organizations (사회복지조직의 사회적 자본 척도 구성과 그 적용에 관한 연구)

  • Moon, Young-Joo
    • Korean Journal of Social Welfare Studies
    • /
    • v.42 no.3
    • /
    • pp.381-407
    • /
    • 2011
  • This study set out to construct an social capital scale that could be commonly used by social welfare organizations and to apply it to examine any differences in social capital among social welfare organizations. For those purposes, the study distributed a questionnaire by mail to social welfare organizations in 15 cities and provinces across the nation and conducted latent means analysis. The major research findings were as follows. First, as a result of exploratory factor analysis and confirmatory factor analysis, the validity and reliability in measurement indicators of social capital were proved to be satisfactory level. Secondly, social capital were found to be interpreted at the organizational level through the review of levels of analysis. Meanwhile, the configural, metric, and scalar invariance of social capital scale were confirmed, which indicates that the social capital scale can be commonly applied to social welfare organizations. Finally, latent means analysis was carried out to examine differences among social welfare organizations in the subindexes of social capital including network connectivity, setting and sharing of vision, reciprocal norm, trust and cooperation, and group participation. As a result, there were significant differences among social welfare organizations in network connectivity, reciprocal norm, trust and cooperation and group participation but no statistically significant differences among them in sharing of vision, goal and core value. Those findings led to implications needed to manage of social welfare organizations.