• Title/Summary/Keyword: network-based business

Search Result 1,388, Processing Time 0.027 seconds

Forecasting Competition of Telecommunication Company in Full Browsing Service Market Based on First-Mover Advantage Analysis (풀브라우징 서비스 시장에서의 이동통신 3사의 경쟁 동향 분석: 선발자 이익 분석 관점)

  • Park, Jin-Soo;Choi, Young-Seok
    • Information Systems Review
    • /
    • v.12 no.1
    • /
    • pp.145-164
    • /
    • 2010
  • Since the third generation (3G) mobile communication service has been launched by most mobile communication operators in Korea, the portion of data service in mobile communication service becomes one of the most important factors in mobile communication service market. In past mobile communication market, most mobile communication operators made their profit mostly from voice communication service. However, the portion of profit from data service has gradually increased based on both video phone call and mobile Internet service. In this situation, LG telecom launched the full browsing mobile Internet service. This service provides a new type of mobile Internet service platform which enables to access the World Wide Web using mobile browsers, so we generally access the Web using web browsers in the desktop computer. Under the open network structure of mobile Internet like situation, it is very important to analyze the factors which can affect the competition between mobile communication service companies. So, in this paper, we first present the current state of full browsing service, followed by the expectation of its growth potentials and barriers. Then, we analyze the advantages and disadvantage of LG telecom as a first-mover and SK telecom/KTF as followers. Finally, based on this analysis, we predict the future competition among these companies and the market.

A Study on the Critical Factors Affecting Investment Decision on TIPS (민간주도형 기술창업지원 팁스(TIPS) 투자의사 결정요인에 관한 연구)

  • Goh, Byeong Ki;Park, Sol Ip;Kim, Da Hye;Sung, Chang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.5
    • /
    • pp.31-47
    • /
    • 2022
  • The TIPS, a representative public-private cooperative project to revitalize the start-up ecosystem, is a government supported policy that promotes successful commercialization through various start-up support for technology-based startups. The purpose of this study is to analyze the investment decision factors of the TIPS program and to derive priorities. In order to achieve the research purpose, first, the investment decision factors were derived through literature analysis, a Delphi surveys were conducted on investors and experts participating in the evaluation of the TIPS program, and an AHP analysis was conducted on 20 VCs to empirically analyze the priority of factors on investment decisions. As a result of the analysis, the importance of critical factors was confirmed in the order of entrepreneurs(team) > market > product/service > finance > network. The importance of detailed factors was found in the order of entrepreneur's reliability and authenticity > market growth and scalability > team members' expertise and capabilities > adequacy of current market size > new market creation. This study presented the capabilities of technology-based startups preparing to participate in the TIPS program by deriving factors that influence investment decisions from an investor's perspective and comparing and analyzing the importance. It is also meaningful that basic data on determinants of private-led investment decision-making were presented to stake-holders such as venture capital, accelerator, and start-up support institutions.

Evaluation of Park Service in Neighborhood Parks based on the Analysis of Walking Accessibility - Focused on Bundang-gu, Seongnam-si - (보행접근성 분석에 기반한 근린공원의 공원서비스 평가 - 성남시 분당구를 대상으로 -)

  • Hwang, Hae-Kwon;Son, Yong-Hoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.52 no.1
    • /
    • pp.59-70
    • /
    • 2024
  • As urbanization progresses, the demand for parks and green space is increasing. Park green spaces in the city are important spaces in the city because they are recognized as spaces where people can freely engage in outdoor activities. The park service area is a measure that shows the extent to which services are provided based on distance. In this process, the concept of accessibility plays an important role, and walking, in particular, as the most basic means of transportation for people and has a great influence on the use of parks. However, the current park service area analysis focuses on discovering underprivileged areas, so detailed evaluation of beneficiary areas is insufficient. This study seeks to evaluate park service areas based on the pedestrian accessibility and the pedestrian network. Park services are services that occur when users directly visit the park, and accessibility is expected to be reflected in terms of usability. To quantify the pedestrian network, this study used space syntax to analyze pedestrian accessibility based on integration values. The integration values are an indicators that quantify the level of accessibility of the pedestrian network, and in this study, the higher the integration value, the higher the possibility of park use. The results of the study are as follows. First, Bundang-gu's park service area accounts for 43%, and includes most sections with high pedestrian accessibility, but some sections with good pedestrian accessibility are excluded. This can be seen as a phenomenon that occurs when residential areas and commercial and business areas are given priority during the urban planning process, and then park and green areas are selected. Second, based on Bundang-gu, the park service area and pedestrian accessibility within the park service area were classified by neighborhood unit. Differences appear for each individual neighborhood unit, and it is expected that the availability of the park will vary accordingly. In addition, even in areas created during the same urban planning process, there were differences in the evaluation of park service areas according to pedestrian accessibility. Using this, it is possible to evaluate individual neighborhood units that can be reflected in living area plans, and it can be used as a useful indicator in park and green space policies that reflect this in the future.

An Analysis for Deriving New Convergent Service of Mobile Learning: The Case of Social Network Analysis and Association Rule (모바일 러닝에서의 신규 융합서비스 도출을 위한 분석: 사회연결망 분석과 연관성 분석 사례)

  • Baek, Heon;Kim, Jin Hwa;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.1-37
    • /
    • 2013
  • This study is conducted to explore the possibility of service convergence to promote mobile learning. This study has attempted to identify how mobile learning service is provided, which services among them are considered most popular, and which services are highly demanded by users. This study has also investigated the potential opportunities for service convergence of mobile service and e-learning. This research is then extended to examine the possibility of active convergence of common services in mobile services and e-learning. Important variables have been identified from related web pages of portal sites using social network analysis (SNA) and association rules. Due to the differences in number and type of variables on different web pages, SNA was used to deal with the difficulties of identifying the degree of complex connection. Association analysis has been used to identify association rules among variables. The study has revealed that most frequent services among common services of mobile services and e-learning were Games and SNS followed by Payment, Advertising, Mail, Event, Animation, Cloud, e-Book, Augmented Reality and Jobs. This study has also found that Search, News, GPS in mobile services were turned out to be very highly demanded while Simulation, Culture, Public Education were highly demanded in e-learning. In addition, It has been found that variables involving with high service convergence based on common variables of mobile and e-learning services were Games and SNS, Games and Sports, SNS and Advertising, Games and Event, SNS and e-Book, Games and Community in mobile services while Games, Animation, Counseling, e-Book, being preceding services Simulation, Speaking, Public Education, Attendance Management were turned out be highly convergent in e-learning services. Finally, this study has attempted to predict possibility of active service convergence focusing on Games, SNS, e-Book which were highly demanded common services in mobile and e-learning services. It is expected that this study can be used to suggest a strategic direction to promote mobile learning by converging mobile services and e-learning.

  • PDF

A Study on Deep Learning Model for Discrimination of Illegal Financial Advertisements on the Internet

  • Kil-Sang Yoo; Jin-Hee Jang;Seong-Ju Kim;Kwang-Yong Gim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.21-30
    • /
    • 2023
  • The study proposes a model that utilizes Python-based deep learning text classification techniques to detect the legality of illegal financial advertising posts on the internet. These posts aim to promote unlawful financial activities, including the trading of bank accounts, credit card fraud, cashing out through mobile payments, and the sale of personal credit information. Despite the efforts of financial regulatory authorities, the prevalence of illegal financial activities persists. By applying this proposed model, the intention is to aid in identifying and detecting illicit content in internet-based illegal financial advertisining, thus contributing to the ongoing efforts to combat such activities. The study utilizes convolutional neural networks(CNN) and recurrent neural networks(RNN, LSTM, GRU), which are commonly used text classification techniques. The raw data for the model is based on manually confirmed regulatory judgments. By adjusting the hyperparameters of the Korean natural language processing and deep learning models, the study has achieved an optimized model with the best performance. This research holds significant meaning as it presents a deep learning model for discerning internet illegal financial advertising, which has not been previously explored. Additionally, with an accuracy range of 91.3% to 93.4% in a deep learning model, there is a hopeful anticipation for the practical application of this model in the task of detecting illicit financial advertisements, ultimately contributing to the eradication of such unlawful financial advertisements.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

Business Application of Convolutional Neural Networks for Apparel Classification Using Runway Image (합성곱 신경망의 비지니스 응용: 런웨이 이미지를 사용한 의류 분류를 중심으로)

  • Seo, Yian;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.3
    • /
    • pp.1-19
    • /
    • 2018
  • Large amount of data is now available for research and business sectors to extract knowledge from it. This data can be in the form of unstructured data such as audio, text, and image data and can be analyzed by deep learning methodology. Deep learning is now widely used for various estimation, classification, and prediction problems. Especially, fashion business adopts deep learning techniques for apparel recognition, apparel search and retrieval engine, and automatic product recommendation. The core model of these applications is the image classification using Convolutional Neural Networks (CNN). CNN is made up of neurons which learn parameters such as weights while inputs come through and reach outputs. CNN has layer structure which is best suited for image classification as it is comprised of convolutional layer for generating feature maps, pooling layer for reducing the dimensionality of feature maps, and fully-connected layer for classifying the extracted features. However, most of the classification models have been trained using online product image, which is taken under controlled situation such as apparel image itself or professional model wearing apparel. This image may not be an effective way to train the classification model considering the situation when one might want to classify street fashion image or walking image, which is taken in uncontrolled situation and involves people's movement and unexpected pose. Therefore, we propose to train the model with runway apparel image dataset which captures mobility. This will allow the classification model to be trained with far more variable data and enhance the adaptation with diverse query image. To achieve both convergence and generalization of the model, we apply Transfer Learning on our training network. As Transfer Learning in CNN is composed of pre-training and fine-tuning stages, we divide the training step into two. First, we pre-train our architecture with large-scale dataset, ImageNet dataset, which consists of 1.2 million images with 1000 categories including animals, plants, activities, materials, instrumentations, scenes, and foods. We use GoogLeNet for our main architecture as it has achieved great accuracy with efficiency in ImageNet Large Scale Visual Recognition Challenge (ILSVRC). Second, we fine-tune the network with our own runway image dataset. For the runway image dataset, we could not find any previously and publicly made dataset, so we collect the dataset from Google Image Search attaining 2426 images of 32 major fashion brands including Anna Molinari, Balenciaga, Balmain, Brioni, Burberry, Celine, Chanel, Chloe, Christian Dior, Cividini, Dolce and Gabbana, Emilio Pucci, Ermenegildo, Fendi, Giuliana Teso, Gucci, Issey Miyake, Kenzo, Leonard, Louis Vuitton, Marc Jacobs, Marni, Max Mara, Missoni, Moschino, Ralph Lauren, Roberto Cavalli, Sonia Rykiel, Stella McCartney, Valentino, Versace, and Yve Saint Laurent. We perform 10-folded experiments to consider the random generation of training data, and our proposed model has achieved accuracy of 67.2% on final test. Our research suggests several advantages over previous related studies as to our best knowledge, there haven't been any previous studies which trained the network for apparel image classification based on runway image dataset. We suggest the idea of training model with image capturing all the possible postures, which is denoted as mobility, by using our own runway apparel image dataset. Moreover, by applying Transfer Learning and using checkpoint and parameters provided by Tensorflow Slim, we could save time spent on training the classification model as taking 6 minutes per experiment to train the classifier. This model can be used in many business applications where the query image can be runway image, product image, or street fashion image. To be specific, runway query image can be used for mobile application service during fashion week to facilitate brand search, street style query image can be classified during fashion editorial task to classify and label the brand or style, and website query image can be processed by e-commerce multi-complex service providing item information or recommending similar item.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

A Study on Mission Critical Factors for Software Test Enhancement in Information Technologies Development of Public Sector (Mission Critical 공공 정보화 구축 시험평가 개선 지표 연구)

  • Lee, Byung-hwa;Lim, Sung-ryel
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.97-107
    • /
    • 2015
  • Up until recently, Korea has ranked the first place in UN e-Government Survey for three consecutive years. In keeping with such accomplishment, the size of budget execution has been consistently growing in accordance with Korea's Government 3.0 policy and vision, leading to increase in big-sized informatization projects in the business. Especially in mission critical public sector's infrastructure where it affects many people, growing demand for establishing high-quality information system with new technologies being brought to attention in order to meet the complex needs of citizens. National defense information system, being one of representative domains examples in the concerned area, established high military competency by applying breakthrough technology. Network-oriented national defense knowledge informatization was set as the vision in order to implement core roles in making efficient national defense management; and effort has been made to materialize the vision by making advancement in national defense's information system and its informatization implementation system. This research studies new quality index relevant to test and evaluation (T&E)of informatization business in national defense which is the representative example of mission critical public sector's infrastructure. We studied international standards and guidelines, analyzed actual T&E cases, and applied them to the inspection items that are currently in use, complying with the e-government law (Act No. 12346, Official Announcement Date 2014. 1.28., Enforcement Date 2014. 7.29.) As a result of productivity analysis, based on hypothesis in which suggested model was applied to T&E of the national defense informatization business, we confirmed the possibility of enhancement in the T&E productivity by assessing reliability, expertise, and safety as evaluation factors.

The effect of Women' social networking on affective commitment and individual adaptation performance (인적 네트워킹이 정서적 조직몰입과 개인적응성과에 미치는 영향: 여성 공무원을 대상으로)

  • Na, Ki Hwan;Choe, Min Seok;Han, Su Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.499-509
    • /
    • 2016
  • The number of female government employees is increasing steadily; therefore, the importance of their effective management is also increasing. Recently, female government employees have organized and exploited their social networks to achieve career success. To obtain a better understanding of the consequences of social networking and its impact on female government employees, 262 female employees were asked to provide details about their experiences and attitudes regarding networking behavior (internal and external networking) and how they influenced affective commitment and individual adaptation performance. The results confirmed that social networking significantly increases emotional sharing, and leads to high levels of affective commitment and individual adaptation performance. The moderating roles that positive psychological capital play in the relationships between social networking (internal and external) and emotional sharing were also investigated. The results confirmed that positive psychological capital enhances the impact internal social networking has on affective commitment and individual adaptation performance. Managerial implications for developing effective female employee management strategies were provided for government managers. Based on these results, the theoretical and practical implications of the research findings are discussed, and recommendations for future research are provided.