• Title/Summary/Keyword: network-based business

Search Result 1,388, Processing Time 0.032 seconds

What Affects the Value of Information Privacy on SNS?

  • Jung, Woo-Jin;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.25 no.2
    • /
    • pp.289-305
    • /
    • 2015
  • The dramatic growth of social networking sites (SNS) has created a myriad of privacy concerns. Our study focuses on how much monetary incentive SNS users are willing to accept in exchange for disclosing their SNS information by accepting friend requests. First, we focused on information privacy in SNS, and estimated the value of information privacy by using the contingent valuation method. Second, we attempted to estimate how SNS users' willingness to accept would change when demographic information and additional information vary. Privacy-sensitive SNS users have the following characteristics: higher education, less SNS experience, and higher security consciousness. On the contrary, those who make good use of SNS and use open-based SNS are less sensitive to privacy. In summary, privacy-sensitive SNS users are fearful or uneasy when they have insufficient control of SNS information. Considering 14 conditions on the value of information privacy on SNS, the mean value of SNS information per person is 173,957 won. If we apply this value to Facebook users, the total Facebook information value would be 1.91 trillion won, considering that there are 11 million users in Korea.

IP Studio Infrastructure intended for Modern Production and TV broadcasting Facilities

  • Mfitumukiza, Joseph;Mariappan, Vinayagam;Lee, Minwoo;Lee, Seungyoun;Lee, Junghoon;Lee, Juyoung;Lim, Yunsik;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.61-65
    • /
    • 2016
  • In the TV broadcasting, movie production and business the transportation of video between creators (programmers, studios) and distributors (broadcast and cable networks, cable and satellites companies) is still a mix of File Transfer Protocol (FTP), physical delivery, and expensive multicast satellite. Cloud-based file sync-and-share providers like Dropbox and box are playing an increasing role, but the industry's unique demands for speed and multicasting have fueled the growth of IP Video transport. This paper gives a solid grasp of the major elements of IP video technology, including content preparation, system architecture alternatives and network performance management.

Characteristics of North Dakota State University Extension Service in USA (미국 노스다코타주 농업연구와 농촌지도의 특징과 한국의 농촌지도사업에 주는 시사점)

  • Park, Duk Byeong;Goreham, Gary A.
    • Journal of Agricultural Extension & Community Development
    • /
    • v.8 no.1
    • /
    • pp.73-83
    • /
    • 2001
  • North Dakota State University (NDSU) Extension Service's purpose was to create a learning partnership that helped adults and youth enhance their lives and communities. NDSU Extension Service has maintained a strong blend of county, regional and state staff to support their program delivery. Experiment Station and Extension Service were integrated both in their job duties and at the administrative level. While researchers at the campus and center carried out both research and outreach activities with producers, Extension staff both at county and center carried out some research activities as well as outreach activities. The strong county-based Extension network was the main avenue for program delivery. Extension agents also provide programs on a multi-country basis. Program planning includes county advisory councils, multi-county advisory councils, support groups, and commodity groups, such as farmers and business people. Planning was used to shape their long-range plan of work along with adjustments to their annual activities. Funding of the NDSU Extension Service has been a blend of federal, state, and county dollars. In the past few years, grant dollars and agency partnerships have increased. Local input into extension programs, combined with support and funding from state and federal partners, enabled the extension service to truly meet the needs of people.

  • PDF

SNS-based Site connected with shopping Using Avatar (아바타를 활용한 SNS 기반 쇼핑 연계 사이트)

  • Ha, Yan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.205-210
    • /
    • 2011
  • This paper is implemented new styled site to combine community of blog style for SNS and shopping mall. Especially, this site is included simulation of coordination in fashion with avatar model. It makes indirect experience of clothing and user-friendly user interface that is different to other Web sites or shopping malls. So this avatar is designed and implemented by using flash animation technique that makes confirm possible coordination styles with eyes of client instantly and review goods very easily. Additionally, it makes pay attention to connect shopping malls and service convenience by SNS.

An Empirical Study on Individual and Social Commerce Factors Impacting Shopping Value and Intention to Repurchase in Social Commerce and Moderating Effects of Perceived Security (소셜커머스의 쇼핑 가치와 재구매의도에 영향을 미치는 개인 및 소셜커머스 특성과 지각된 보안의 조절효과에 대한 연구)

  • Kim, Sanghyun;Park, HyunSun
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.31-53
    • /
    • 2013
  • Web 2.0 has affected existing e-commerce and created a new business model of e-commerce, known as social commerce. Social commerce is a subset of e-commerce using social network services and is emerging as an important platform due to increased popularity of social networking services. This study focuses on analyzing the factors that influence the shopping value and intention to repurchase of social commerce users. Based on prior researches, we develop a research model, including individual characteristics of social commerce users (Collectivism, Price Sensitivity, Impulse Buying) and social commerce characteristics (Cost saving, Product Variety, Shopping Convenience). Furthermore, this study proposed the moderating effect of Perceived Security and the relationship between shopping value and intention to repurchase. To empirically validate, the data were collected from 220 social commerce users. The results indicated that individual characteristics (collectivism, price sensitivity, impulse buying) were positively related to hedonic shopping value. In addition, social commerce characteristics (cost saving, shopping convenience) were positively related to utilitarian value. The shopping value(hedonic and utilitarian) had a significant influence on intention to repurchase. The moderating effects of perceived security also was significant. Lastly, the implications for theory and practice are discussed.

An Exploratory Study for Investigating Loyalty in On-line Games : Focus on Interactivity and the Sense of Presence (온라인 게임의 애호도에 관한 실증적 연구 : 상호작용성과 현존감을 중심으로)

  • Kim Taeung;Um Myoungyoung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.200-218
    • /
    • 2004
  • Online game business has emerged as the most lucrative entertainment industry, with over 10 million players in South Korea. The popularity of online games can be attributed to the availability of broadband network and the presence of numerous PC Bangs and around the country, which have pushed online games into the mainstream entertainment culture. The age distribution of online game players is expanding and a variety of new games are under development to target certain age groups. While the interactive entertainment market continues to expand, with many new online game publishers entering the market, relatively little is known about which factors influence online game players' behavioral intentions to play continuously in this area. It appears that in this extremely attractive and growing services segment, academics, as well as practitioners, would benefit from investigating the relationships among the players' loyalty, interactivity, the sense of presence and the impacts of several other key game-related constructs. Several types of interaction in on-line games and their relationship with the flow construct are investigated, and the resulting conceptual model is proposed. Based on data collected from online questionnaire survey, the validity of the simultaneous equation model has been tested and interesting conclusions have been developed concerning the relationships between the players' loyalty to the sense of presence flow, satisfaction and interactions. Other interesting results concerning game development strategy are also provided.

  • PDF

A Comparison between Korean and Chinese Consumers in Service Quality Evaluation: Focused on the Multiplex Cinema

  • LEE, Seung-In;PARK, Yoonseo;JIN, Yanchun;ZHANG, Yan
    • Journal of Distribution Science
    • /
    • v.18 no.8
    • /
    • pp.89-102
    • /
    • 2020
  • Purpose: Our purpose in this study is to compare the SERVQUAL, SERVPERF, and non-difference score measures and to find out which one is better for measuring the service quality of the multiplex cinema service. We also aim to analyze the structural relationships between service quality, customer satisfaction and customer loyalty. Methodology: For the study, we collected data from respondents who have used the multiplex cinema services and conducted an empirical test. SPSS 18.0 was used for descriptive frequency analysis, reliability analysis, and multiple regression analysis, AMOS 18.0 was used for structural equation modeling analysis of causal relationships among variables introduced in research hypotheses. Results: The main results of this study are as follows. First, we found that the non-difference score measure provided a much better model than did other service-measuring models (SERVQUAL, SERVPERF) in Korean and Chinese multiplex cinema. Second, two service-quality factors (Korea-tangibles and assurance vs. China-tangibles and empathy) between the multiplex cinema service quality factors significantly influenced customer satisfaction, which had a significant effect on customer loyalty in Korean and Chinese multiplex cinema. Conclusions: Based on the results, the authors discuss the implications and limitations of this study and future research directions at the end of the paper.

SNMP Information Based Routing Applying Active Routing in Mobile IT (Mobile IP에서의 Active Routing을 응용한 SNMP 정보기반 라우팅)

  • Park, Soo-Hyun;Jang, Han-I;Baik, Doo-Kwon;Lee, Lee-Seop
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.05a
    • /
    • pp.550-559
    • /
    • 2003
  • mobile IP는 단순히 이동성을 지원하는 것만을 목표로 제안되었기 때문에, 새로운 네트워크로의 연결만을 보장할 뿐, 핸드오프 후의 QoS는 보장하지 못한다. mobile IT에서 QoS는 이동 환경에서 멀티미디어 서비스나 실시간 서비스 제공 시 매우 중요시 되는 문제로, 핸드오프에 의한 지연과 밀접히 연관되어있다. 이에 따라 이동 환경에서 QoS를 보장하기 위해, 핸드오프 지연 문제는 주요 이슈로서 활발히 연구되고 있다. 본 논문에서는 이러한 문제를 해결하기 위해, 선행 연구로 액티브 네트워크에서의 정보기반 라우팅에 키워드 관리 방법을 추가한 SNMP 정보 기반 라우팅을 제시하고, 이를 이용하여 핸드오프 지연을 최소화하는 QoS 향상 기법을 제시한다. 또한 라우팅 컨버전스 시간을 설정하여 기존 핸드오프 방법과 함께 제시한 기법에서 필요한 요소를 모델링한 후 NS-2를 사용하여 시뮬레이션 하였다. 시뮬레이션 결과는 제시한 기법이 핸드오프 지연을 최소화함으로써, 결과적으로 QoS가 향상되었음을 입증한다.

  • PDF

IoT Home System for Dementia Care based on Beacon Indoor Positioning (비콘 실내측위 기반 치매 환자 보호 시스템)

  • Kim, JunYeong;Jeon, SoYeon;Cho, YoonSoo;Han, HyeJung;Moon, Ho;Lee, HyungJune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1141-1144
    • /
    • 2017
  • 최근 고령화에 따른 치매 환자 증가 추세로 인해 실내 치매 환자 케어 시스템이 주목받고 있다. 본 논문에서는 비콘과 센서를 이용한 치매 환자의 배회 방지 및 위험 장소 접근 알림 시스템을 개발하였다. 치매 환자의 실내 위치를 추적하기 위해 비콘을 실내 곳곳에 부착하고, 치매 환자의 위험 행동을 감지하기 위해 센서를 위험지역에 설치한다. 스마트폰을 사용하여 비콘 신호를 측정하고 측정된 비콘 신호를 사용하여 치매 환자의 위치를 계산하여 치매 환자가 위험에 처했다고 판단되면 이를 간병인에게 알린다. 위 시스템을 통해 간병인의 부담을 덜고, 간병 비용을 절약할 수 있다.

A Study on The Prediction of Security Threat using Open Vulnerability List (오픈 취약성 목록을 이용한 보안 위협 예측에 관한 연구)

  • Huh, Seung-Pyo;Lee, Dae-Sung;Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.3-10
    • /
    • 2011
  • Recently, due to a series of DDoS attacks, government agencies have enhanced security measures and business-related legislation. However, service attack and large network violations or accidents are most likely to occur repeatedly in the near future. In order to prevent this problem, researches must be conducted to predict the vulnerability in advance. The existing research methods do not state the specific data used for the base of the prediction, making the method more complex and imprecise. Therefore this study was conducted using the vulnerability data used for the basis of machine learning technology prediction, which were retrieved from a reputable organization. Also, the study suggested ways to predict the future vulnerabilities based on the weaknesses found in prior methods, and certified the efficiency using experiments.