• Title/Summary/Keyword: System acceptance

Search Result 1,096, Processing Time 0.049 seconds

An Empirical Study on the Influencing Factors of Perceived Job Performance in the Context of Enterprise Mobile Applications (업무성과에 영향을 주는 업무용 모바일 어플리케이션의 주요 요인에 관한 연구)

  • Chung, Sunghun;Kim, Kimin
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.31-50
    • /
    • 2014
  • The ubiquitous accessibility of information through mobile devices has led to an increased mobility of workers from their fixed workplaces. Market researchers estimate that by 2016, 350 million workers will be using their smartphones for business purposes, and the use of smartphones will offer new business benefits. Enterprises are now adopting mobile technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness, and cultivate their innovativeness. For these reasons, various organizational aspects concerning "mobile work" have received a great deal of recent attention. Moreover, many CIOs plan to allocate a considerable amount of their budgets mobile work environments. In particular, with the consumerization of information technology, enterprise mobile applications (EMA) have played a significant role in the explosive growth of mobile computing in the workplace, and even in improving sales for firms in this field. EMA can be defined as mobile technologies and role-based applications, as companies design them for specific roles and functions in organizations. Technically, EMA can be defined as business enterprise systems, including critical business functions that enable users to access enterprise systems via wireless mobile devices, such as smartphones or tablets. Specifically, EMA enables employees to have greater access to real-time information, and provides them with simple features and functionalities that are easy for them to complete specific tasks. While the impact of EMA on organizational workers' productivity has been given considerable attention in various literatures, relatively little research effort has been made to examine how EMA actually lead to users' job performance. In particular, we have a limited understanding of what the key antecedents are of such an EMA usage outcome. In this paper, we focus on employees' perceived job performance as the outcome of EMA use, which indicates the successful role of EMA with regard to employees' tasks. Thus, to develop a deeper understanding of the relationship among EMA, its environment, and employees' perceived job performance, we develop a comprehensive model that considers the perceived-fit between EMA and employees' tasks, satisfaction on EMA, and the organizational environment. With this model, we try to examine EMA to explain how job performance through EMA is revealed from both the task-technology fit for EMA and satisfaction on EMA, while also considering the antecedent factors for these constructs. The objectives of this study are to address the following research questions: (1) How can employees successfully manage EMA in order to enhance their perceived job performance? (2) What internal and/or external factors are important antecedents in increasing EMA users' satisfaction on MES and task-technology fit for EMA? (3) What are the impacts of organizational (e.g. organizational agility), and task-related antecedents (e.g., task mobility) on task-technology fit for EMA? (4) What are the impacts of internal (e.g., self-efficacy) and external antecedents (e.g., system reputation) for the habitual use of EMA? Based on a survey from 254 actual employees who use EMA in their workplace across industries, our results indicate that task-technology fit for EMA and satisfaction on EMA are positively associated with job performance. We also identify task mobility, organizational agility, and system accessibility that are found to be positively associated with task-technology fit for EMA. Further, we find that external factor, such as the reputation of EMA, and internal factor, such as self-efficacy for EMA that are found to be positively associated with the satisfaction of EMA. The present findings enable researchers and practitioners to understand the role of EMA, which facilitates organizational workers' efficient work processes, as well as the importance of task-technology fit for EMA. Our model provides a new set of antecedents and consequence variables for a TAM involving mobile applications. The research model also provides empirical evidence that EMA are important mobile services that positively influence individuals' performance. Our findings suggest that perceived organizational agility and task mobility do have a significant influence on task-technology fit for EMA usage through positive beliefs about EMA, that self-efficacy and system reputation can also influence individuals' satisfaction on EMA, and that these factors are important contingent factors for the impact of system satisfaction and perceived job performance. Our findings can help managers gauge the impact of EMA in terms of its contribution to job performance. Our results provide an explanation as to why many firms have recently adopted EMA for efficient business processes and productivity support. Our findings additionally suggest that the cognitive fit between task and technology can be an important requirement for the productivity support of EMA. Further, our study findings can help managers in formulating their strategies and building organizational culture that can affect employees perceived job performance. Managers, thus, can tailor their dependence on EMA as high or low, depending on their task's characteristics, to maximize the job performance in the workplace. Overall, this study strengthens our knowledge regarding the impact of mobile applications in organizational contexts, technology acceptance and the role of task characteristics. To conclude, we hope that our research inspires future studies exploring digital productivity in the workplace and/or taking the role of EMA into account for employee job performance.

A Study on the Concept and Protection System for the Geographical Indication (지리적 표시제도의 의의 및 보호체제 연구)

  • Go, Yong-Bu
    • Journal of Korea Port Economic Association
    • /
    • v.23 no.3
    • /
    • pp.165-184
    • /
    • 2007
  • This study reviews the concept and protection system for the geographical Indication(GI) to support the Korea-EU FTA. A geographical indication(GI) is a name or sign used on certain products or which corresponds to a specific geographical indication or origin (eg. a town, region, or country). The use of a GI may act as a certification that the product possesses certain qualities, or enjoys a certain reputation, due to its geographical origin. In the WTO Agreement on Trade-Related Aspects of Intellectual property Rights("TRIPS"). There are, in effect, two basic obligations from Article 22 to article 23 on WTO member governments relating to GIs in the TRIPS agreement. Geographical Indications have long been associated with Europe as an entity, where there is a tradition of associating certain food products with particular regions, Under European Union Law, the protected designation of origin system which came into effect in 1992 and 2003 regulates the following geographical indications: Protected designation of origin(PDO) and protected geographical indication(PGI) and Traditional Specialty Guaranteed(TSG). They have 5,000 articles for GI. We have the GI system and 40 articles rotating to registration by the law for quality management of production in agriculture. Cinclusinally, geographical indications could potentially serve as tools to helf holders of trade benefit more equitable through the mutual Acceptance for Korea-EU FTA.

  • PDF

Legal Relations of the Contract of International Carriage of Goods by Air (국제항공화물운송계약(國際航空貨物運送契約)의 법률관계(法律關係) -화주(貨主)의 권리의무(權利義務)를 중심(中心)으로-)

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.193-222
    • /
    • 1989
  • The purpose of this study is to review the rights and duties of cargo owners, the party to the contract of international carriage of goods by air under the Warsaw Convention System and the IATA conditions. It is generally known that air freight is the most-cost mode of transportation. However, should there be considerations of total distribution cost, the use of air freight leads exporters to be advantageous in physical distribution. The Warsaw Convention System defined and limited the rights and duties of cargo owners and air carriers paticipating in the international carriage of goods, but it does not regulate every aspect of air transportation. Therefore, the unregulated parts are governed by national laws and by individual contracts of carriage. The International Air Transport Association(lATA), a worldwide organization of airlines, has formulated model conditions of contract for the carriage of cargo. These models are not uniformly followed but they serve as a basis for many of the individual standard form of contracts prepared by air carriers. The contract of air carriage of goods is a contract of adhesion, 'the consignor recognizing and accepting the conditions laid down by the carrier'. There are consignors and carriers as the parties to the contract of international carriage of goods. In addition to his basic right, implied in Warsaw Convention Article 18 and 19, to require devery of the goods in good condition and at the date agreed upon, the consignor has the right to dispose the goods in the course of the journey up to the moment when the consignee is entitled to require delivery. If it is impossible to carry out the orders of the consignor, the carrier must so inform him forthwith. The right conferred on the consignor ceases at the moment when that of the consignee begins in accordance with Warsaw Convention Article 13. Nevertheless, if the consignee declines to accept the air waybill or the goods, or if he cannot be communicated with, the consignor resumes his right of disposition. Unless it is otherwise agreed, it is the duty of the carrier to give notice to the consignee as soon as the goods arrive. The consignee is entitled, on arrival of the goods at the place of destination, to require the carrier to hand over to him the air waybill and to deliver the goods to him, on payment of the charges due and on complying with the conditions of carriage set out in the air waybill. The air waybill is supposed to be made out by the consignor. If the carrier makes it out, he is deemed, subject to proof to the contrary, to have done so on behalf of the consignor, whether there is one air waybill or several, each must be made out in three original parts. The first is for the carrier, the second is for the consignee, and the the third is handed to the consignor when the shipment has been accepted. The consignor is responsible for the correctness of the particulars and statement concerning the cargo appearing in the air waybill. Each of the original parts of the air waybill has evidential value and possession of his part is a condition for the exercise by the consignor or consignee of his rights under the contract of carriage. Hague Protocol set forth in Article 9 that nothing in this. Convention prevents the issue of a negotiable air waybill, but Montreal Additional Protocol No. 4 deleted this article. All charges applicable to a shipment are payable in cash at the time of acceptance thereof by the carrier in case of a prepaid shipment or at the time of delivery thereof by the carrier in case of a collect shipment. The carrier shall have lien the cargo for unpaid charges and, in the event of non-payment thereof, shall have the right to dispose of the cargo at public or private sale and pay itself out of the proceeds of such sale any and all such amounts. In conclusion, the Warsaw Convention System has the character of ambiguity in various respects, not only in the part of the forms of documents but also in conditions of contract. Accordingly, the following propositions might be considered: (1) If the carrier does not obey the orders of the consignor for the disposition of the goods without proper reasons, he will be liable strictly for any damage which may be caused thereby to the cargo owner. The special agreement and carrier's conditions of carriage which limit unreasonably the consignor's right of disposition of the goods will be nullified. (2) The instrument of the Warsaw Convention System which is not yet in force(Montreal Additional Protocol No. 4) would considerably simplfy the processing and keeping of computerized records of the carriage. Until this instrument enters into force, the airlines will be faced with practical problems preventing them to substitute computerized data processing techniques for the formal issuance of the documents. Accordingly, Montreal Additional Protocol No. 4 should become effective as soon as posisble. From a practical point of view in the international trade, the issuance of negotiable air waybill should be permitted for the security of the bank.

  • PDF

Recent Developments in Law of International Electronic Information Transactions (국제전자정보거래(國際電子情報去來)에 관한 입법동향(立法動向))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.155-219
    • /
    • 2004
  • This paper focuses on two recent legislative developments in electronic commerce: the "Uniform Computer Information Transactions Act" ("UCITA") of USA and the "preliminary draft convention on the use of data message in [international trade] [the context of international contracts]" ("preliminary draft Convention") of UNCITRAL. UCITA provides rules contracts for computer information transactions. UCITA supplies modified contract formation rules adapted to permit and to facilitate electronic contracting. UCITA also adjusts commonly recognized warranties as appropriate for computer information transactions; for example, to recognize the international context in connection with protection against infringement and misappropriation, and First Amendment considerations involved with informational content. Furthermore, UCITA adapts traditional rules as to what is acceptable performance to the context of computer information transactions, including providing rules for the protection of the parties concerning the electronic regulation of performance to clarify that the appropriate general rule is one of material breach with respect to cancellation (rather than so-called perfect tender). UCITA also supplies guidance in the case of certain specialized types of contracts, e.g., access contracts and for termination of contracts. While for the most part carrying over the familiar rules of Article 2 concerning breach when appropriate in the context of the tangible medium on which the information is fixed, but also adapting common law rules and rules from Article 2 on waiver, cure, assurance and anticipatory breach to the context of computer information transactions, UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, UCITA contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context. The UNCITRAL's preliminary draft Convention applies to the use of data messages in connection with an existing or contemplated contract between parties whose places of business are in different States. Nothing in the Convention affects the application of any rule of law that may require the parties to disclose their identities, places of business or other information, or relieves a party from the legal consequences of making inaccurate or false statements in that regard. Likewise, nothing in the Convention requires a contract or any other communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract to be made or evidenced in any particular form. Under the Convention, a communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract, including an offer and the acceptance of an offer, is conveyed by means of data messages. Also, the Convention provides for use of automated information systems for contract formation: a contract formed by the interaction of an automated information system and a person, or by the interaction of automated information systems, shall not be denied on the sole ground that no person reviewed each of the individual actions carried out by such systems or the resulting agreement. Further, the Convention provides that, unless otherwise agreed by the parties, a contract concluded by a person that accesses an automated information system of another party has no legal effect and is not enforceable if the person made an error in a data message and (a) the automated information system did not provide the person with an opportunity to prevent or correct the error; (b) the person notifies the other party of the error as soon as practicable when the person making the error learns of it and indicates that he or she made an error in the data message; (c) The person takes reasonable steps, including steps that conform to the other party's instructions, to return the goods or services received, if any, as a result of the error or, if instructed to do so, to destroy such goods or services.

  • PDF

Context Prediction Using Right and Wrong Patterns to Improve Sequential Matching Performance for More Accurate Dynamic Context-Aware Recommendation (보다 정확한 동적 상황인식 추천을 위해 정확 및 오류 패턴을 활용하여 순차적 매칭 성능이 개선된 상황 예측 방법)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.19 no.3
    • /
    • pp.51-67
    • /
    • 2009
  • Developing an agile recommender system for nomadic users has been regarded as a promising application in mobile and ubiquitous settings. To increase the quality of personalized recommendation in terms of accuracy and elapsed time, estimating future context of the user in a correct way is highly crucial. Traditionally, time series analysis and Makovian process have been adopted for such forecasting. However, these methods are not adequate in predicting context data, only because most of context data are represented as nominal scale. To resolve these limitations, the alignment-prediction algorithm has been suggested for context prediction, especially for future context from the low-level context. Recently, an ontological approach has been proposed for guided context prediction without context history. However, due to variety of context information, acquiring sufficient context prediction knowledge a priori is not easy in most of service domains. Hence, the purpose of this paper is to propose a novel context prediction methodology, which does not require a priori knowledge, and to increase accuracy and decrease elapsed time for service response. To do so, we have newly developed pattern-based context prediction approach. First of ail, a set of individual rules is derived from each context attribute using context history. Then a pattern consisted of results from reasoning individual rules, is developed for pattern learning. If at least one context property matches, say R, then regard the pattern as right. If the pattern is new, add right pattern, set the value of mismatched properties = 0, freq = 1 and w(R, 1). Otherwise, increase the frequency of the matched right pattern by 1 and then set w(R,freq). After finishing training, if the frequency is greater than a threshold value, then save the right pattern in knowledge base. On the other hand, if at least one context property matches, say W, then regard the pattern as wrong. If the pattern is new, modify the result into wrong answer, add right pattern, and set frequency to 1 and w(W, 1). Or, increase the matched wrong pattern's frequency by 1 and then set w(W, freq). After finishing training, if the frequency value is greater than a threshold level, then save the wrong pattern on the knowledge basis. Then, context prediction is performed with combinatorial rules as follows: first, identify current context. Second, find matched patterns from right patterns. If there is no pattern matched, then find a matching pattern from wrong patterns. If a matching pattern is not found, then choose one context property whose predictability is higher than that of any other properties. To show the feasibility of the methodology proposed in this paper, we collected actual context history from the travelers who had visited the largest amusement park in Korea. As a result, 400 context records were collected in 2009. Then we randomly selected 70% of the records as training data. The rest were selected as testing data. To examine the performance of the methodology, prediction accuracy and elapsed time were chosen as measures. We compared the performance with case-based reasoning and voting methods. Through a simulation test, we conclude that our methodology is clearly better than CBR and voting methods in terms of accuracy and elapsed time. This shows that the methodology is relatively valid and scalable. As a second round of the experiment, we compared a full model to a partial model. A full model indicates that right and wrong patterns are used for reasoning the future context. On the other hand, a partial model means that the reasoning is performed only with right patterns, which is generally adopted in the legacy alignment-prediction method. It turned out that a full model is better than a partial model in terms of the accuracy while partial model is better when considering elapsed time. As a last experiment, we took into our consideration potential privacy problems that might arise among the users. To mediate such concern, we excluded such context properties as date of tour and user profiles such as gender and age. The outcome shows that preserving privacy is endurable. Contributions of this paper are as follows: First, academically, we have improved sequential matching methods to predict accuracy and service time by considering individual rules of each context property and learning from wrong patterns. Second, the proposed method is found to be quite effective for privacy preserving applications, which are frequently required by B2C context-aware services; the privacy preserving system applying the proposed method successfully can also decrease elapsed time. Hence, the method is very practical in establishing privacy preserving context-aware services. Our future research issues taking into account some limitations in this paper can be summarized as follows. First, user acceptance or usability will be tested with actual users in order to prove the value of the prototype system. Second, we will apply the proposed method to more general application domains as this paper focused on tourism in amusement park.

Quality Assurance Program of Electron Beams Using Thermoluminescence Dosimetry (열형광선량계를 이용한 전자선 품질보증 프로그램에 관한 연구)

  • Rah Jeong-Eun;Kim Gwe-Ya;Jeong Hee-Kyo;Shin Dong-Oh;Suh Tae-Suk
    • Progress in Medical Physics
    • /
    • v.16 no.2
    • /
    • pp.62-69
    • /
    • 2005
  • The purpose of this study has been performed to investigate the possibility of external audit program using thermoluminescence dosimetry for electron beam in korea. The TLD system consists of LiF powder, type TLD-700 read with a PCL 3 reader. In order to determine a calibration coefficient of the TLD system, the reference dosimeters are irradiated to 2 Gy in a $^{60}CO$ beam at the KFDA The irradiation is performed under reference conditions is water phantom using the IAEA standard holder for TLD of electron beam. The energy correction factor is determined for LiF powder irradiated of dose to water 2 Gy in electron beams of 6, 9, 12, 16 and 20 MeV (Varian CL 2100C). The dose is determined according to the IAEA TRS-398 and by measurement with a PTW Roos type plane-parallel chamber. The TLD for each electron energy are positioned in water at reference depth. In this study, to verify of the accuracy of dose determination by the TLD system are performed through a 'blind' TLD irradiation. The results of blind test are $2.98\%,\;3.39\%\;and\;0.01\%(1\sigma)$ at 9, 16, 20 MeV, respectively. The value generally agrees within the acceptance level of $5\%$ for electron beam. The results of this study prove the possibility of the TLD quality assurance program for electron beams. It has contributed to the improvement of clinical electron dosimetry in radiotherapy centers.

  • PDF

Angiographic Results of Radial Artery Grafts that are Used for Myocardial Revascularization (관상동맥 우회술 후 혈관조영술을 이용한 요골동맥의 개통률 분석)

  • Yie, Kil-Soo;Oh, Sam-Sae;Kim, Jae-Hyun;Shinn, Sung-Ho;Kim, Soo-Cheol;Seo, Hong-Joo;Na, Chan-Young
    • Journal of Chest Surgery
    • /
    • v.40 no.8
    • /
    • pp.546-551
    • /
    • 2007
  • Background: The radial artery is gaining widespread acceptance as complementary arterial conduits for surgical myocardial revascularization, but there have been limited reports about its angiographic patency compared with that of internal thoracic artery or saphenous vein. We tried to evaluate angiographic patency of radial artery graft and to compare that of radial artery and other gratis with retrospective manner. Material and Method: From January 2001 to Jure 2006, totally 132 patients (male 92, female 40) who underwent coronary artery bypass graft using radial artery were re-admitted to our hospital for follow up angiographic examination. Mean age was 58.2+8.87 and mean follow up duration was 32 month ($2{\sim}110$ month). Off pump and on pump bypass surgery were performed 74 and 58 patients respectively. Along with radial artery, left internal thoracic arteries were used in 57 cases, concomitant left internal thoracic artery and saphenous veins were used in 47 cases and bilateral internal thoracic arteries were used in 20 cases. Result: Totally 412 distal anastomosis were performed and 376 anastomosis remained patent (91.2%). Left internal thoracic artery showed the most excellent patency in all of the conduits (98.5%). Radial artery graft patency was 90.8% (169/186). There was no statistical difference of the patency by conduit between on-pump and off-pump group. But radial artery showed more higher patency rate (98/110, 89%) in the severe stenotic lesion that preoperatively revealed more than 90% stenosis than in the lesser severe (<90%) stenotic lesion (60/76, 78%)(p < 0.005). Radial artery conduit represented the worst result when it was grafted in the right coronary system. But when it was positioned in the left heart especially diagonal or obtuse marginal area, patency was comparable with left internal thoracic artery. Conclusion: Radial artery graft showed good midterm patency when it was used in the severe stenotic lesion more than 90% and left coronary system. But great notice should be taken when it is grafted in the right coronary system or less severe stenotic lesion.

A review on the design requirement of temperature in high-level nuclear waste disposal system: based on bentonite buffer (고준위폐기물처분시스템 설계 제한온도 설정에 관한 기술현황 분석: 벤토나이트 완충재를 중심으로)

  • Kim, Jin-Seop;Cho, Won-Jin;Park, Seunghun;Kim, Geon-Young;Baik, Min-Hoon
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.21 no.5
    • /
    • pp.587-609
    • /
    • 2019
  • Short-and long-term stabilities of bentonite, favored material as buffer in geological repositories for high-level waste were reviewed in this paper in addition to alternative design concepts of buffer to mitigate the thermal load from decay heat of SF (Spent Fuel) and further increase the disposal efficiency. It is generally reported that the irreversible changes in structure, hydraulic behavior, and swelling capacity are produced due to temperature increase and vapor flow between $150{\sim}250^{\circ}C$. Provided that the maximum temperature of bentonite is less than $150^{\circ}C$, however, the effects of temperature on the material, structural, and mineralogical stability seems to be minor. The maximum temperature in disposal system will constrain and determine the amount of waste to be disposed per unit area and be regarded as an important design parameter influencing the availability of disposal site. Thus, it is necessary to identify the effects of high temperature on the performance of buffer and allow for the thermal constraint greater than $100^{\circ}C$. In addition, the development of high-performance EBS (Engineered Barrier System) such as composite bentonite buffer mixed with graphite or silica and multi-layered buffer (i.e., highly thermal-conductive layer or insulating layer) should be taken into account to enhance the disposal efficiency in parallel with the development of multilayer repository. This will contribute to increase of reliability and securing the acceptance of the people with regard to a high-level waste disposal.

The Present State of Domestic Acceptance of Various International Conventions for the Prevention of Marine Pollution (해양오염방지를 위한 각종 국제협약의 국내 수용 현황)

  • Kim, Kwang-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.12 no.4 s.27
    • /
    • pp.293-300
    • /
    • 2006
  • Domestic laws such as Korea Marine Pollution Prevention Law (KMPPL) which has been mae and amended according to the conclusions and amendments of various international conventions for the prevention a marine pollution such as MARPOL 73/78 were reviewed and compared with the major contents of the relevant international conventions. Alternative measures for legislating new laws or amending existing laws such as KMPPL for the acceptance of major contents of existing international conventions were proposed. Annex VI of MARPOL 73/78 into which the regulations for the prevention of air pollution from ship have been adopted has been recently accepted in KMPPL which should be applied to ships which are the moving sources of air pollution at sea rather tlnn in Korea Air Environment Conservation Law which should be applied to automobiles and industrial installations in land. The major contents of LC 72/95 have been accepted in KMPPL However, a few of substances requiring special care in Annex II of 72LC, a few of items in characteristics and composition for the matter in relation to criteria governing the issue of permits for the dumping of matter at sea in Annex III of 72LC, and a few of items in wastes or other matter that may be considered for dumping in Annex I of 96 Protocol have not been accepted in KMPPL yet. The major contents of OPRC 90 have been accepted in KMPPL. However, oil pollution emergency plans for sea ports and oil handling facilities, and national contingency plan for preparedness and response have not been accepted in KMPPL yet. The waste oil related articles if Basel Convention, which shall regulate and prohibit transboundary movement of hazardous waste, should be accepted in KMPPL in order to prevent the transfer if scrap-purpose tanker ships containing oil/water mixtures and chemicals remained on beard from advanced countries to developing and/or underdeveloped countries. International Convention for the Control if Harmful Anti-Fouling Systems on the Ships should be accepted in KMPPL rather tlnn in Korea Noxious Chemicals Management Law. International Convention for Ship's Ballast Water/Sediment Management should be accepted in KMPPL or by a new law in order to prevent domestic marine ecosystem and costal environment from the invasion of harmful exotic species through the discharge of ship's ballast water.

  • PDF

A Study on the Effect of Network Centralities on Recommendation Performance (네트워크 중심성 척도가 추천 성능에 미치는 영향에 대한 연구)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.23-46
    • /
    • 2021
  • Collaborative filtering, which is often used in personalization recommendations, is recognized as a very useful technique to find similar customers and recommend products to them based on their purchase history. However, the traditional collaborative filtering technique has raised the question of having difficulty calculating the similarity for new customers or products due to the method of calculating similaritiesbased on direct connections and common features among customers. For this reason, a hybrid technique was designed to use content-based filtering techniques together. On the one hand, efforts have been made to solve these problems by applying the structural characteristics of social networks. This applies a method of indirectly calculating similarities through their similar customers placed between them. This means creating a customer's network based on purchasing data and calculating the similarity between the two based on the features of the network that indirectly connects the two customers within this network. Such similarity can be used as a measure to predict whether the target customer accepts recommendations. The centrality metrics of networks can be utilized for the calculation of these similarities. Different centrality metrics have important implications in that they may have different effects on recommended performance. In this study, furthermore, the effect of these centrality metrics on the performance of recommendation may vary depending on recommender algorithms. In addition, recommendation techniques using network analysis can be expected to contribute to increasing recommendation performance even if they apply not only to new customers or products but also to entire customers or products. By considering a customer's purchase of an item as a link generated between the customer and the item on the network, the prediction of user acceptance of recommendation is solved as a prediction of whether a new link will be created between them. As the classification models fit the purpose of solving the binary problem of whether the link is engaged or not, decision tree, k-nearest neighbors (KNN), logistic regression, artificial neural network, and support vector machine (SVM) are selected in the research. The data for performance evaluation used order data collected from an online shopping mall over four years and two months. Among them, the previous three years and eight months constitute social networks composed of and the experiment was conducted by organizing the data collected into the social network. The next four months' records were used to train and evaluate recommender models. Experiments with the centrality metrics applied to each model show that the recommendation acceptance rates of the centrality metrics are different for each algorithm at a meaningful level. In this work, we analyzed only four commonly used centrality metrics: degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality. Eigenvector centrality records the lowest performance in all models except support vector machines. Closeness centrality and betweenness centrality show similar performance across all models. Degree centrality ranking moderate across overall models while betweenness centrality always ranking higher than degree centrality. Finally, closeness centrality is characterized by distinct differences in performance according to the model. It ranks first in logistic regression, artificial neural network, and decision tree withnumerically high performance. However, it only records very low rankings in support vector machine and K-neighborhood with low-performance levels. As the experiment results reveal, in a classification model, network centrality metrics over a subnetwork that connects the two nodes can effectively predict the connectivity between two nodes in a social network. Furthermore, each metric has a different performance depending on the classification model type. This result implies that choosing appropriate metrics for each algorithm can lead to achieving higher recommendation performance. In general, betweenness centrality can guarantee a high level of performance in any model. It would be possible to consider the introduction of proximity centrality to obtain higher performance for certain models.