• Title, Summary, Keyword: personal networks

Search Result 368, Processing Time 0.046 seconds

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

Predicting Personal Credit Rating with Incomplete Data Sets Using Frequency Matrix technique (Frequency Matrix 기법을 이용한 결측치 자료로부터의 개인신용예측)

  • Bae, Jae-Kwon;Kim, Jin-Hwa;Hwang, Kook-Jae
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.4
    • /
    • pp.273-290
    • /
    • 2006
  • This study suggests a frequency matrix technique to predict personal credit rate more efficiently using incomplete data sets. At first this study test on multiple discriminant analysis and logistic regression analysis for predicting personal credit rate with incomplete data sets. Missing values are predicted with mean imputation method and regression imputation method here. An artificial neural network and frequency matrix technique are also tested on their performance in predicting personal credit rating. A data set of 8,234 customers in 2004 on personal credit information of Bank A are collected for the test. The performance of frequency matrix technique is compared with that of other methods. The results from the experiments show that the performance of frequency matrix technique is superior to that of all other models such as MDA-mean, Logit-mean, MDA-regression, Logit-regression, and artificial neural networks.

  • PDF

Practice and Networks of Chinese Firms (중국의 기업 관행과 네트워크)

  • Choi, Ja-Young;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.657-670
    • /
    • 2011
  • China has gone through rapid economic growth due to transitional economies since 1978. In particular, Chinese transitional economies has led to fundamental changes in firms' activities under the socialist system. Nevertheless, Chinese firms have formed new industrial production organizations and spatial orders by sustaining personal networks based on existing traditional firm practice, which is called 'guanxi'. Therefore, the main purpose of this research is to identify the influence of personal networks, guanxi, on the business activities of Chinese firms by investigating the formation of guanxi mechanism. The main characteristics of guanxi represented in inter-firm relations are as follows. First, guanxi has played a role in facilitating inter-firm relations and business activities, because it has an inter-debt relations based on inter-reciprocal relations between firms. Second, Chinese firms has depended on posteriori guanxi rather than inherent guanxi by the internalization of personal networks through 'guanxi communicators'.Third, guanxi between firms and local government in extra-firm relations has been established to minimize risks from unstable legal regulations.

  • PDF

Personal Mutual Authentication System for Ubiquitous Wireless Environments (유비쿼터스 무선환경을 위한 개인 상호인증 시스템)

  • Kim Byung-Gi;Hong Sang-Sun;Jouhn Young-Keel
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.99-111
    • /
    • 2004
  • Two general security measures in computing networks are secure data transmission and user authentication, These problems are still critical in the wireless LAN environments. Thus security becomes most significant issue in personal network environments and ubiquitous networks based on wireless LANs. We purpose a new authentication system for these kind of environments, and coined it UPMA(Ubiquitous Personal Mutual Authen-tication) model. UPMA supports authenticating configurations which provides personal verification for each system. It guarantees secure communications through the session key setup, and provides mutual authentication by verifying each user and his/her station. UPMA solves security problems in ubiquitous networks without accessing authentication server, Instead it performs mutual authentication between terminals or between systems. It is a global authentication system which enables global roaming service through the Internet or other public networks, It can be used to guarantee safe and convenient access to a company Intranet or to a home network.

  • PDF

Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions

  • Lin, Po-Ching;Lin, Pei-Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3301-3318
    • /
    • 2016
  • Online social networks (OSNs) have changed the way people communicate with each other. An OSN usually encourages the participants to provide personal information such as real names, birthdays and educational background to look for and establish friendships among them. Some users are unwilling to reveal personal information on their personal pages due to potential privacy concerns, but their friends may inadvertently reveal that. In this work, we investigate the possibility of leaking personal information on Facebook in an unintentional and involuntary manner. The revealed information may be useful to malicious users for social engineering and spear phishing. We design the inference methods to find birthdays and educational background of Facebook users based on the interactions among friends on Facebook pages and groups, and also leverage J-measure to find the inference rules. The inference improves the finding rate of birthdays from 71.2% to 87.0% with the accuracy of 92.0%, and that of educational background from 75.2% to 91.7% with the accuracy of 86.3%. We also suggest the sanitization strategies to avoid the private information leakage.

A Spatial Study on the Network Formation Process of Personal Actors: The Case of Institutional Building Networks in Industries for the Elderly (개인 행위주체의 네트워크 형성 과정에 대한 공간적 고찰: 고령친화산업의 제도구축 네트워크를 사례로)

  • Koo, Yang-Mi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.3
    • /
    • pp.334-349
    • /
    • 2008
  • In this study, the network formation process of personal actors in industries for the elderly was analyzed. This process is applied to the knowledge creation model of the SECI (Nonaka-Takeuchi learning cycle), that is socialization, externalization, combination, internalization. There are some kinds of opportunities to interact in these industries in the forms of field survey teams to overseas, some seminars and symposiums, many kinds of meetings, education and training programs, trade fairs and on-line forums. These palces(ba) - originating ba, interacting ba, cyber ba, exercising ba - played great roles in the formation of personal actor networks. Personal actors had opportunities to interconnect with distant actors through those places(ba). In the spatial perspective, personal actors could make face-to-face contact and build trust through temporary geographical proximity or temporary clusters with the help of personal mobility. Relations in the virtual spaces such as the Internet community did much toward building personal networks.

  • PDF

Adaptive Cross-Layer Packet Scheduling Method for Multimedia Services in Wireless Personal Area Networks

  • Kim Sung-Won;Kim Byung-Seo
    • Journal of Communications and Networks
    • /
    • v.8 no.3
    • /
    • pp.297-305
    • /
    • 2006
  • High-rate wireless personal area network (HR-WPAN) has been standardized by the IEEE 802.15.3 task group (TG). To support multimedia services, the IEEE 802.15.3 TG adopts a time-slotted medium access control (MAC) protocol controlled by a central device. In the time division multiple access (TDMA)-based wireless packet networks, the packet scheduling algorithm plays a key role in quality of service (QoS) provisioning for multimedia services. In this paper, we propose an adaptive cross-layer packet scheduling method for the TDMA-based HR-WPAN. Physical channel conditions, MAC protocol, link layer status, random traffic arrival, and QoS requirement are taken into consideration by the proposed packet scheduling method. Performance evaluations are carried out through extensive simulations and significant performance enhancements are observed. Furthermore, the performance of the proposed scheme remains stable regardless of the variable system parameters such as the number of devices (DEVs) and delay bound.

Innovative Networks of Foreign Capital and Spatial Identity in the Post-socialist System Transformations: The Case of Korean FDI Firms in Shanghai, China (후기 사회주의 체제전환 하의 해외 투자 기업 혁신 네트워크와 공간 특성 분석: 중국 상하이 한국 투자 기업 사례 연구)

  • Kim, Boo-Heon;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.421-437
    • /
    • 2009
  • China has transformed her strategies for economic development from exogenous development founded on foreign capitals to endogenous development based on enhancing technology innovation capabilities since 2000. More specifically, Chinese business activities have coupled with new institutional settings which enable them to facilitate advanced technology and management methods. As a result, the characteristics of the spatial economy in China are likely to transfer from export-led developmental space to technology-oriented developmental space. In this context, this paper aims to identify the characteristics of technology-oriented space by investigating intra-, inter- and extra-firms relations of Korean FDI firms in Shanghai, China. In terms of intra-firm relations, Korean FDI firms adopted strategies for maximizing business efficiency and effectiveness by transforming their personal networks into formal networks. In terms of inter-firm relations, the distinction of Korean FDI firms' networks has been found in accordance with firm size, industrial sectors, ways of investment etc. Finally, Korean FDI firms has formal networks resulted from institutional involvement, as well as informal (personal) networks based on guanxi (inter-personal relations) in extra-firm relations. Therefore, two types of processes affecting the networks and institutional legacies of the Soviet system can be identified. First is the interaction of institutions and restructuring of pre-existing networks. Second is the insulated institutions and endurance of preexisting networks. And these two governance types have created regional economies which are embedded and over-embedded.

  • PDF

A GTS Scheduling Algorithm for Voice Communication over IEEE 802.15.4 Multihop Sensor Networks

  • Kovi, Aduayom-Ahego;Bleza, Takouda;Joe, Inwhee
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.34-38
    • /
    • 2012
  • The recent increase in use of the IEEE 802.15.4 standard for wireless connectivity in personal area networks makes of it an important technology for low-cost low-power wireless personal area networks. Studies showed that voice communications over IEEE 802.15.4 networks is feasible by Guaranteed Time Slot (GTS) allocation; but there are some constraints to accommodate voice transmission beyond two hops due to the excessive transmission delay. In this paper, we propose a GTS allocation scheme for bidirectional voice traffic in IEEE 802.15.4 multihop networks with the goal of achieving fairness and optimization of resource allocation. The proposed scheme uses a greedy algorithm to allocate GTSs to devices for successful completion of voice transmission with efficient use of bandwidth while considering closest devices with another factor for starvation avoidance. We analyze and validate the proposed scheme in terms of fairness and resource optimization through numeral analysis.

A Study on the Required Frequency Bandwidth for Personal Environment Service (개인환경서비스를 위한 주파수 소요대역폭에 대한 연구)

  • Oh, Jong-Taek
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11A
    • /
    • pp.898-903
    • /
    • 2009
  • In this paper, the required frequency bandwidth for short range communications and mobile communication networks is analyzed for the matured Personal Environment Service, which establishes intelligent personal living environment with connecting the mobile phone and living appliances to WPAN, mobile communication networks, and Internet. In spite of rough estimation of the service needs, this paper shows the calculation method of required frequency bandwidth for the service and the considerations for the Ubiquitous era in advance.