• Title/Summary/Keyword: traditional university

Search Result 19,024, Processing Time 0.058 seconds

A Study on the Improvement of Recommendation Accuracy by Using Category Association Rule Mining (카테고리 연관 규칙 마이닝을 활용한 추천 정확도 향상 기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.27-42
    • /
    • 2020
  • Traditional companies with offline stores were unable to secure large display space due to the problems of cost. This limitation inevitably allowed limited kinds of products to be displayed on the shelves, which resulted in consumers being deprived of the opportunity to experience various items. Taking advantage of the virtual space called the Internet, online shopping goes beyond the limits of limitations in physical space of offline shopping and is now able to display numerous products on web pages that can satisfy consumers with a variety of needs. Paradoxically, however, this can also cause consumers to experience the difficulty of comparing and evaluating too many alternatives in their purchase decision-making process. As an effort to address this side effect, various kinds of consumer's purchase decision support systems have been studied, such as keyword-based item search service and recommender systems. These systems can reduce search time for items, prevent consumer from leaving while browsing, and contribute to the seller's increased sales. Among those systems, recommender systems based on association rule mining techniques can effectively detect interrelated products from transaction data such as orders. The association between products obtained by statistical analysis provides clues to predicting how interested consumers will be in another product. However, since its algorithm is based on the number of transactions, products not sold enough so far in the early days of launch may not be included in the list of recommendations even though they are highly likely to be sold. Such missing items may not have sufficient opportunities to be exposed to consumers to record sufficient sales, and then fall into a vicious cycle of a vicious cycle of declining sales and omission in the recommendation list. This situation is an inevitable outcome in situations in which recommendations are made based on past transaction histories, rather than on determining potential future sales possibilities. This study started with the idea that reflecting the means by which this potential possibility can be identified indirectly would help to select highly recommended products. In the light of the fact that the attributes of a product affect the consumer's purchasing decisions, this study was conducted to reflect them in the recommender systems. In other words, consumers who visit a product page have shown interest in the attributes of the product and would be also interested in other products with the same attributes. On such assumption, based on these attributes, the recommender system can select recommended products that can show a higher acceptance rate. Given that a category is one of the main attributes of a product, it can be a good indicator of not only direct associations between two items but also potential associations that have yet to be revealed. Based on this idea, the study devised a recommender system that reflects not only associations between products but also categories. Through regression analysis, two kinds of associations were combined to form a model that could predict the hit rate of recommendation. To evaluate the performance of the proposed model, another regression model was also developed based only on associations between products. Comparative experiments were designed to be similar to the environment in which products are actually recommended in online shopping malls. First, the association rules for all possible combinations of antecedent and consequent items were generated from the order data. Then, hit rates for each of the associated rules were predicted from the support and confidence that are calculated by each of the models. The comparative experiments using order data collected from an online shopping mall show that the recommendation accuracy can be improved by further reflecting not only the association between products but also categories in the recommendation of related products. The proposed model showed a 2 to 3 percent improvement in hit rates compared to the existing model. From a practical point of view, it is expected to have a positive effect on improving consumers' purchasing satisfaction and increasing sellers' sales.

An Essay on the Change of Jinju Sword Dance after being designated as an Important Intangible Cultural Asset (<진주검무> 중요무형문화재 지정 이후의 변화에 관한 소고)

  • Lee, Jong Sook
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.1
    • /
    • pp.4-21
    • /
    • 2016
  • The purpose of this study is to investigate changes of Jinju Sword Dance, characteristics of the changes, and the current condition of its preservation and succession after the designation as the important intangible cultural property no. 12 in January 16th, 1967. In other words, this study understands the situation which has established the present state of after changes over generations. As of now. the year of 2015, the 3 generation holders have been approved since 1967. In 1967, 8 members of $1^{st}$ generation holders were selected from gisaengs of Gwonbeon. However, the succession training was incomplete due to conflicts among the holders, the deaths of some holders, and economic activities of the individuals. As the need of a pivot for succession training and activities was rising, Seong, Gye-Ok was additionally approved as the $2^{nd}$ generation holder on June $21^{st}$, 1978. Seong, Gye-Ok who had never been a gisaeng had dramatically changed with a lot of new attempts. After the death of Seong, Gye-Ok in 2009, Kim, Tae-Yeon and Yu, Yeong-Hee were approved as the $3^{rd}$ generation holders in February, 2010. Based on the resources including the "Cultural Research Reports of Important Intangible Cultural Properties" in 1966 and videos up to 2014, the changes of the dance and surroundings are as follow. 1. The formation of musical accompaniment has been changed during the 3 generations. In the video of the $1^{st}$ generation(in 1970), the performance lasted about 15 minutes, whereas the performance lasted 25 minutes in the video of the $2^{nd}$ generation. Yumbuldoduri rhythm was considered as Ginyumbul(Sangryeongsan) and played more slowly. The original dance requiring only 15 rhythms was extended to 39 rhythms to provide longer performance time. In the $3^{rd}$ generation, the dance recovered 15 rhythms using the term Ginyumbul. The facts that Yumbul was played for 3 minutes in the $1^{st}$ generation but for 5 minutes in the 3rd generation shows that there was tendency pursuing the slowness from the $2^{nd}$ generation. 2. For the composition of the Dance, the performance included additional 20 rhythms of Ginyumbul and Ah(亞)-shaped formation from the $2^{nd}$ generation. From the $3^{rd}$ generation, the performance excluded the formation which had no traditional base. For the movement of the Dance, the bridge poses of Ggakjittegi and Bangsukdoli have been visibly inflexible. Also, the extention of time value in 1 beat led the Dance less vibrant. 3. At the designation as an important intangible cultural property (in 1967), the swords with rotatable necks were used, whereas the dancers had been using the swords with non-rotatable necks since late 1970s when the $2^{nd}$ generation holder began to used them. The swords in the "Research Reports" (in 1966) was pointy and semilunar, whereas the straight swords are being used currently. The use of the straight swords can be confirmed from the videos after 1970. 4. There is no change in wearing Jeonlib, Jeonbok, and Hansam, whereas the arrangement of Saekdong of Hansam was different from the arrangement shown in the "Research Reports". Also, dancers were considered to begin wearing the navy skirts when the swords with non-rotatable necks began to be used. Those results showed that has been actively changed for 50 years after the designation. The $2^{nd}$ generation holder, Seong, Gye-Ok, was the pivot of the changes. However, , which was already designated as an important intangible cultural property, is considered to be only a victim of the change experiment from the project to restore Gyobang culture in Jinju, and it is a priority to conduct studies with historical legitimacy. First of all, the slowing beat should be emphasized as the main fact to reduce both the liveliness and dynamic beauty of the Dance.

Jangdo(Small Ornamental Knives) manufacturing process and restoration research using Odong Inlay application (오동상감(烏銅象嵌)기법을 활용한 장도(粧刀)의 제작기술 및 복원연구)

  • Yun, Yong Hyun;Cho, Nam Chul;Jeong, Yeong Sang;Jang, Chu Nam
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.2
    • /
    • pp.172-189
    • /
    • 2016
  • In this research, literature research on the Odong material, mixture ratio, casting method and casting facility was conducted on contemporary documents, such as Cheongong Geamul. Also, a long sword was produced using the Odong inlay technique. The sword reproduction steps were as follows; Odong alloying, silver soldering alloying, Odong plate and Silver plate production, hilt and sheath production, metal frame and decorative elements, such as a Dugup (metal frame), production, Odong inlay assembly and final assembly. For the Odong alloy production, the mixture ratio of the true Odong, which has copper and gold ratio of 20:1, was used. This is traditional ratio for high quality product according to $17^{th}$ century metallurgy instruction manual. The silver soldering alloy was produced with silver and brass(Cu 7 : Zn 3) ratio of 5:1 for inlay purpose and 5:2 ratio for simple welding purpose. The true Odong alloy laminated with silver plate was used to produce hilt and sheath. The alloy went through annealing and forging steps to make it into 0.6 mm thick plate and its backing layer, which is a silver plate, had the matching thickness. After the two plates were adhered, the laminated plate went through annealing, forging, engraving, silver inlaying, shaping, silver welding, finishing and polishing steps. During the Odong colouring process, its red surface turns black by induced corrosion and different hues can be achieved depending on its quality. To accomplish the silver inlay Odong techniques, a Hanji saturated with thirty day old urine is wrapped around a hilt and sheath material, then it is left at warm room temperature for two to three hours. The Odong's surface will turn black when silver inlay remains unchanged. Various scientific analysis were conducted to study composition of recreated Odong panel, silver soldering, silver plate and the colouring agent on Odong's surface. The recreated Odong had average out at Cu 95.57 wt% Au 4.16wt% and Cu 98.04 wt% Au 1.95wt%, when documented ratio in the old record is Cu 95wt% and Au 5wt%. The recreated Odong was prone to surface breakage during manufacturing process unlike material made with composition ratio written in the old record. On the silver plate of the silver and Odong laminate, 100wt% Ag was detected and between the two layers Cu, Ag and Au were detected. This proves that the adhesion between the two layers was successfully achieved. The silver soldering had varied composition of Ag depending on the location. This shows uneven composition of the silver welding. A large quantities of S, that was not initially present, was detected on the surface of the black Odong. This indicates that presence of S has influence on Odong colour. Additional study on the chromaticity, additional chemical compounds and its restoration are needed for the further understanding of the origin of Odong colour. The result of Odong alloy testing and recreation, Odong silver inlay long sword production, scientific analysis of the Odong black colouring agent will form an important foundation of knowledge for conservation of Odong artifact.

Hwaunsi(和韻詩) on the Poems of Tu Fu(杜甫) and Su Shi(蘇軾) Written by Simjae(深齋) Cho Geung-seop(曺兢燮) in the Turning Point of Modern Era (근대 전환기 심재 조긍섭의 두(杜)·소시(蘇詩) 화운시)

  • Kim, Bo-kyeong
    • (The)Study of the Eastern Classic
    • /
    • no.56
    • /
    • pp.35-73
    • /
    • 2014
  • This paper examined the poem world of Simjae(深齋) Cho Geung-seop(曺兢燮: 1873-1933) in the turning point of the modern era, focused on his Hwaunsi (和韻詩: Poems written by using the rhymes of other poets' poems). In his poems, there are lots of Hwaunsi on the poems of Tu Fu(杜甫) and Su Shi(蘇軾), especially. This makes him regarded as a medieval poet, engaged in Chinese poem creation in the most traditional method in the turbulent period. Looking at the Hawunsi(和韻詩) alone, Simjae's creative life became the starting point of turnaround at around 40 years old. Before the age of 40, the poets in the Tang Dynasty and Song Dynasty and Ming Dynasty and Qing Dynasty and Korean figures like Lee Hwang(李滉), as well as Tu Fu and Su Shi were the subjects of his Hwanunsi. After the age of 40, some examples of writing poems using the rhymes of other poets' poems, especially Korean figures related to regions, are often found, reducing Hwaunsi on Tu Fu and Su Shi. Simjae called Tu Fu the integration of poets, talking about the integrity of poetic talent and his being highly proficient in mood and view. As reflecting such an awareness, the themes and moods and views are demonstrated diversely in Simjae's Hwaunsi. Although, he did not reveal his thinking about the poems of Su Shi, he seemed to love Su Shi's poems to some degree. The closeness to the original poems, the poems of Tu Fu are relatively higher than those of Su Shi. Roughly speaking, Simjae tried to find his own individuality, intending to follow Tu Fu, but, he seemed to attempt to reveal his intention using Su Shi's poems, rather than trying to imitate. To carefully examine, Simjae wrote Hwaunsi, but he did not just imitate, but revealed the aesthetics of comparison and difference. In many cases, he made new meanings by implanting his intentions in the poems, while sharing the opportunity of creation, rather than bringing the theme and mood and view as they are. The Hwaunsi on Su Shi's poems reveal the closeness to the original poems relatively less. This can be the trace of an effort to make his own theme and individuality, not being dominated by the Hwaun(和韻: using the rhymes of other poets' poems) entirely, as he used the creative method having many restrictions. However, it is noted that the Hwaunsi on Tu Fu's poems was not written much, after the age of 40. Is this the reason why he realized literary reality that he could not cope with anymore with only his effort within the Hwaunsi? For example, he wrote four poems by borrowing Su Shi's Okjungsi(獄中詩: poem written in jail) rhymes and also wrote Gujung Japje(拘中雜題), in 1919, while he was detained. In these poems, his complex contemplation and emotion, not restricted by any poet's rhymes, are revealed diversely. Simjae's Hwaunsi testifies the reality, in which Chinese poetry's habitus existed and the impressive existence mode at the turning point of the modern era. Although, the creation of Hwaunsi reflects his disposition of liking the old things, it is judged that his psychology, resisting modern characters' change, affected to some degree in the hidden side. In this regard, Simaje's Hwaunsi encounters limitation on its own, however, it has significance in that some hidden facts were revealed in the modern Chinese poetry history, which was captured with attention under the name of novelty, eccentricity and modernity.

A Study on the Effect of Network Centralities on Recommendation Performance (네트워크 중심성 척도가 추천 성능에 미치는 영향에 대한 연구)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.23-46
    • /
    • 2021
  • Collaborative filtering, which is often used in personalization recommendations, is recognized as a very useful technique to find similar customers and recommend products to them based on their purchase history. However, the traditional collaborative filtering technique has raised the question of having difficulty calculating the similarity for new customers or products due to the method of calculating similaritiesbased on direct connections and common features among customers. For this reason, a hybrid technique was designed to use content-based filtering techniques together. On the one hand, efforts have been made to solve these problems by applying the structural characteristics of social networks. This applies a method of indirectly calculating similarities through their similar customers placed between them. This means creating a customer's network based on purchasing data and calculating the similarity between the two based on the features of the network that indirectly connects the two customers within this network. Such similarity can be used as a measure to predict whether the target customer accepts recommendations. The centrality metrics of networks can be utilized for the calculation of these similarities. Different centrality metrics have important implications in that they may have different effects on recommended performance. In this study, furthermore, the effect of these centrality metrics on the performance of recommendation may vary depending on recommender algorithms. In addition, recommendation techniques using network analysis can be expected to contribute to increasing recommendation performance even if they apply not only to new customers or products but also to entire customers or products. By considering a customer's purchase of an item as a link generated between the customer and the item on the network, the prediction of user acceptance of recommendation is solved as a prediction of whether a new link will be created between them. As the classification models fit the purpose of solving the binary problem of whether the link is engaged or not, decision tree, k-nearest neighbors (KNN), logistic regression, artificial neural network, and support vector machine (SVM) are selected in the research. The data for performance evaluation used order data collected from an online shopping mall over four years and two months. Among them, the previous three years and eight months constitute social networks composed of and the experiment was conducted by organizing the data collected into the social network. The next four months' records were used to train and evaluate recommender models. Experiments with the centrality metrics applied to each model show that the recommendation acceptance rates of the centrality metrics are different for each algorithm at a meaningful level. In this work, we analyzed only four commonly used centrality metrics: degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality. Eigenvector centrality records the lowest performance in all models except support vector machines. Closeness centrality and betweenness centrality show similar performance across all models. Degree centrality ranking moderate across overall models while betweenness centrality always ranking higher than degree centrality. Finally, closeness centrality is characterized by distinct differences in performance according to the model. It ranks first in logistic regression, artificial neural network, and decision tree withnumerically high performance. However, it only records very low rankings in support vector machine and K-neighborhood with low-performance levels. As the experiment results reveal, in a classification model, network centrality metrics over a subnetwork that connects the two nodes can effectively predict the connectivity between two nodes in a social network. Furthermore, each metric has a different performance depending on the classification model type. This result implies that choosing appropriate metrics for each algorithm can lead to achieving higher recommendation performance. In general, betweenness centrality can guarantee a high level of performance in any model. It would be possible to consider the introduction of proximity centrality to obtain higher performance for certain models.

The Creating Situations and Social Characteristics of Gutchum-pan to Pray - Focused on Donghaeanbyulsingut - ('축원-굿춤' 판의 생성 국면과 사회적 성격 - 동해안별신굿의 경우 -)

  • Jeon, Seong-Hee
    • (The) Research of the performance art and culture
    • /
    • no.38
    • /
    • pp.349-383
    • /
    • 2019
  • This discussion is focused on Donghaeanbyulsingut's 'gutchum-pan to pray'. 'Gutchum-pan to pray' is repeated in almost all of the geori in Byulsingut, so it is a crucial chum-pan that can never be disregarded in understanding Byulsingutchum. Meanwhile, it supposes that Donghaeanbyulsingut is grounded on the activity of producing 'praying (words) and dance (motions)' within its relationship with the structure of capitalistic society along with the context of traditional rituals. The motion that is newly generated as a response to the concrete expression of 'praying' conducted by a mudang (a shaman), that is, the expression coming from the inside associated with the praying is seen as gutchum. This dance is bound to be in competition and interest among shaman groups, and they tend to influence one another. If praying leads to dance, a mudang can gain profits from capital as well as the value of labor. When the mudang succeeds in forming a bigger bond of sympathy with her praying, the object of praying gets more eager to select byulbi and dances a heoteunchum (impromptu dance) more vigorously. This means that a mudang's ability to perform a ritual is associated with the object of praying's consumption. With his impromptu motions, the object of praying comes to go into 'the field of consumption' within the structure of capitalistic competition before he is aware of it. Behind the communication that praying leads to dance, a lot of things are associated with one another organically. 'Gutchum-pan to pray' is generated by the continuous movement of diversity and unity that the time has within the ritual of the mudang and the object of praying. It continues to create the future 'self' that is different from the present 'self', and it means that he expects variability from the present 'self' through 'gutchum-pan to pray'. The mudang also prays for him arranging the variability of the other (the object of praying) inside her labor. In a big picture, of course, the mudang expects the variability of herself, too, which is connected to the value of her labor. The variability that they expect forms a crucial axis that determines where the flow of time and space that the 'gutchum-pan to pray' has is directed to. The contents of praying are directly related with the villagers' lives, and what leads to dance is mostly related with their jobs. This implies that what the mudang experiences in her everyday consuming activity is directly associated with the villagers' activity for earning money. In other words, the contents of that praying change constantly according to the flow of capitalistic economy. Also, those striving to respond to it before anyone else also expect better life for them by substituting their self to the 'gutchum-pan to pray' eagerly. If so, who are the ones that generate 'gutchum-pan to pray'? This can be understood through relationship among mudangs, relationship between the mudang and villagers, and also relationship among villagers. Their relationships can never be free from the concepts like labor in capitalistic society, consumption and expenditure, or time; therefore, they come to compete with the other, the present self, or the better self within the diverse relationships. This gets to be expressed in any ways, words or motions. And the range that covers the creation of either group or individual 'gutchum-pan to pray' in the village is the village community. Outside the range, it is upsized to the competition of the village unit, so individual praying may become diminished more easily. Although mudangs pray in each geori, it does not mean all praying leads to dance. Within various relationships between mudangs and villagers, 'gutchum-pan to pray' comes to be generated, repeated, and extinct. As it is mitigated to more positive competition, it does not lead to gutchum any longer. In other words, repeating 'gutchum-pan to pray' previously created has turned the object of praying into the state different from the former. Also, the two groups both have experienced the last step of Byulsingut, and at that point, praying does no longer lead to dance. In other words, from the position of the shaman group, it is the finish of their labor time and ritual performance, and from the perspective of the villagers, it means the finish of consuming activity and participation in a ritual. The characteristics of 'gutchum-pan to pray' can be summarized as follows. First, it goes through the following process: competition in the village group → competition in the group → competition among individuals. Second, repeated praying does not lead to 'gutchum'. Third, in the cases of praying for each of the occupation groups, the mudang can induce a bond of sympathy from the objects of praying directly, and this lead to dance. Fourth, the group that fails in being included in the category of praying gets to be alienated from 'gutchum-pan to pray' repeatedly.

Creativity of the Unconscious and Religion : Focusing on Christianity (무의식의 창조성과 종교 : 그리스도교를 중심으로)

  • Jung-Taek Kim
    • Sim-seong Yeon-gu
    • /
    • v.26 no.1
    • /
    • pp.36-66
    • /
    • 2011
  • The goal of this article is to examine the connection between creativity of unconscious and religion. Jung criticized how Freud's approach in studying the unconscious as a scientific inquiry focuses on the unconscious as reflecting only those which is repressed by the ego. Jung conceived of the unconscious as encompassing not only the repressed but also the variety of other psychic materials that have not reached the threshold of the consciousness in its range. Moreover, since human psyche is as individualistic as is a collective phenomenon, the collective psyche is thought to be pervasive at the bottom of the psychic functioning and the conscious and the personal unconscious comprising the upper level of the psychic functioning. Through clinical and personal experience, Jung had come to a realization that the unconscious has the self-regulatory function. The unconscious can make "demands" and also can retract its demands. Jung saw this as the autonomous function of the unconscious. And this autonomous unconscious creates, through dreams and fantasies, images that include an abundance of ideas and feelings. These creative images the unconscious produces assist and lead the "individuation process" which leads to the discovery of the Self. Because this unconscious process compensates the conscious ego, it has the necessary ingredients for self-regulation and can function in a creative and autonomous fashion. Jung saw religion as a special attitude of human psyche, which can be explained by careful and diligent observation about a dynamic being or action, which Rudolph Otto called the Numinosum. This kind of being or action does not get elicited by artificial or willful action. On the contrary, it takes a hold and dominates the human subject. Jung distinguished between religion and religious sector or denomination. He explained religious sector as reflecting the contents of sanctified and indoctrinated religious experiences. It is fixated in the complex organization of ritualized thoughts. And this ritualization gives rise to a system that is fixated. There is a clear goal in the religious sector to replace intellectual experiences with firmly established dogma and rituals. Religion as Jung experienced is the attitude of contemplation about Numinosum, which is formed by the images of the collective unconscious that is propelled by the creativity and autonomy of the unconscious. Religious sector is a religious community that is formed by these images that are ritualized. Jung saw religion as the relationship with the best or the uttermost value. And this relationship has a duality of being involuntary and reflecting free will. Therefore people can be influenced by one value, overcome with the unconscious being charged with psychic energy, or could accept it on a conscious level. Jung saw God as the dominating psychic element among humans or that psychic reality itself. Although Jung grew up in the atmosphere of the traditional Swiss reformed church, it does not seem that he considered himself to be a devoted Christian. To Jung, Christianity is a habitual, ritualized institution, which lacked vitality because it did not have the intellectual honesty or spiritual energy. However, Jung's encounter with the dramatic religious experience at age 12 through hallucination led him to perceive the existence of living god in his unconscious. This is why the theological questions and religious problems in everyday life became Jung's life-long interest. To this author, the reason why Jung delved into problems with religion has to do with his personal interest and love for the revival of the Christian church which had lost its spiritual vitality and depth and had become heavily ritualized.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Comparison of CT based-CTV plan and CT based-ICRU38 plan in Brachytherapy Planning of Uterine Cervix Cancer (자궁경부암 강내조사 시 CT를 이용한 CTV에 근거한 치료계획과 ICRU 38에 근거한 치료계획의 비교)

  • Cho, Jung-Ken;Han, Tae-Jong
    • Journal of Radiation Protection and Research
    • /
    • v.32 no.3
    • /
    • pp.105-110
    • /
    • 2007
  • Purpose : In spite of recent remarkable improvement of diagnostic imaging modalities such as CT, MRI, and PET and radiation therapy planing systems, ICR plan of uterine cervix cancer, based on recommendation of ICRU38(2D film-based) such as Point A, is still used widely. A 3-dimensional ICR plan based on CT image provides dose-volume histogram(DVH) information of the tumor and normal tissue. In this study, we compared tumor-dose, rectal-dose and bladder-dose through an analysis of DVH between CTV plan and ICRU38 plan based on CT image. Method and Material : We analyzed 11 patients with a cervix cancer who received the ICR of Ir-192 HDR. After 40Gy of external beam radiation therapy, ICR plan was established using PLATO(Nucletron) v.14.2 planing system. CT scan was done to all the patients using CT-simulator(Ultra Z, Philips). We contoured CTV, rectum and bladder on the CT image and established CTV plan which delivers the 100% dose to CTV and ICRU plan which delivers the 100% dose to the point A. Result : The volume$(average{\pm}SD)$ of CTV, rectum and bladder in all of 11 patients is $21.8{\pm}6.6cm^3,\;60.9{\pm}25.0cm^3,\;111.6{\pm}40.1cm^3$ respectively. The volume covered by 100% isodose curve is $126.7{\pm}18.9cm^3$ in ICRU plan and $98.2{\pm}74.5cm^3$ in CTV plan(p=0.0001), respectively. In (On) ICRU planning, $22.0cm^3$ of CTV volume was not covered by 100% isodose curve in one patient whose residual tumor size is greater than 4cm, while more than 100% dose was irradiated unnecessarily to the normal organ of $62.2{\pm}4.8cm^3$ other than the tumor in the remaining 10 patients with a residual tumor less than 4cm in size. Bladder dose recommended by ICRU 38 was $90.1{\pm}21.3%$ and $68.7{\pm}26.6%$ in ICRU plan and in CTV plan respectively(p=0.001) while rectal dose recommended by ICRU 38 was $86.4{\pm}18.3%$ and $76.9{\pm}15.6%$ in ICRU plan and in CTV plan, respectively(p=0.08). Bladder and rectum maximum dose was $137.2{\pm}50.1%,\;101.1{\pm}41.8%$ in ICRU plan and $107.6{\pm}47.9%,\;86.9{\pm}30.8%$ in CTV plan, respectively. Therefore, the radiation dose to normal organ was lower in CTV plan than in ICRU plan. But the normal tissue dose was remarkably higher than a recommended dose in CTV plan in one patient whose residual tumor size was greater than 4cm. The volume of rectum receiving more than 80% isodose (V80rec) was $1.8{\pm}2.4cm^3$ in ICRU plan and $0.7{\pm}1.0cm^3$ in CTV plan(p=0.02). The volume of bladder receiving more than 80% isodose(V80bla) was $12.2{\pm}8.9cm^3$ in ICRU plan and $3.5{\pm}4.1cm^3$ in CTV plan(p=0.005). According to these parameters, CTV plan could also save more normal tissue compared to ICRU38 plan. Conclusion : An unnecessary excessive radiation dose is irradiated to normal tissues within 100% isodose area in the traditional ICRU plan in case of a small size of cervix cancer, but if we use CTV plan based on CT image, the normal tissue dose could be reduced remarkably without a compromise of tumor dose. However, in a large tumor case, we need more research on an effective 3D-planing to reduce the normal tissue dose.

Consumer's Negative Brand Rumor Acceptance and Rumor Diffusion (소비자의 부정적 브랜드 루머의 수용과 확산)

  • Lee, Won-jun;Lee, Han-Suk
    • Asia Marketing Journal
    • /
    • v.14 no.2
    • /
    • pp.65-96
    • /
    • 2012
  • Brand has received much attention from considerable marketing research. When consumers consume product or services, they are exposed to a lot of brand related stimuli. These contain brand personality, brand experience, brand identity, brand communications and so on. A special kind of new crisis occasionally confronting companies' brand management today is the brand related rumor. An important influence on consumers' purchase decision making is the word-of-mouth spread by other consumers and most decisions are influenced by other's recommendations. In light of this influence, firms have reasonable reason to study and understand consumer-to-consumer communication such as brand rumor. The importance of brand rumor to marketers is increasing as the number of internet user and SNS(social network service) site grows. Due to the development of internet technology, people can spread rumors without the limitation of time, space and place. However relatively few studies have been published in marketing journals and little is known about brand rumors in the marketplace. The study of rumor has a long history in all major social science. But very few studies have dealt with the antecedents and consequences of any kind of brand rumor. Rumor has been generally described as a story or statement in general circulation without proper confirmation or certainty as to fact. And it also can be defined as an unconfirmed proposition, passed along from people to people. Rosnow(1991) claimed that rumors were transmitted because people needed to explain ambiguous and uncertain events and talking about them reduced associated anxiety. Especially negative rumors are believed to have the potential to devastate a company's reputation and relations with customers. From the perspective of marketer, negative rumors are considered harmful and extremely difficult to control in general. It is becoming a threat to a company's sustainability and sometimes leads to negative brand image and loss of customers. Thus there is a growing concern that these negative rumors can damage brands' reputations and lead them to financial disaster too. In this study we aimed to distinguish antecedents of brand rumor transmission and investigate the effects of brand rumor characteristics on rumor spread intention. We also found key components in personal acceptance of brand rumor. In contextualist perspective, we tried to unify the traditional psychological and sociological views. In this unified research approach we defined brand rumor's characteristics based on five major variables that had been found to influence the process of rumor spread intention. The five factors of usefulness, source credibility, message credibility, worry, and vividness, encompass multi level elements of brand rumor. We also selected product involvement as a control variable. To perform the empirical research, imaginary Korean 'Kimch' brand and related contamination rumor was created and proposed. Questionnaires were collected from 178 Korean samples. Data were collected from college students who have been experienced the focal product. College students were regarded as good subjects because they have a tendency to express their opinions in detail. PLS(partial least square) method was adopted to analyze the relations between variables in the equation model. The most widely adopted causal modeling method is LISREL. However it is poorly suited to deal with relatively small data samples and can yield not proper solutions in some cases. PLS has been developed to avoid some of these limitations and provide more reliable results. To test the reliability using SPSS 16 s/w, Cronbach alpha was examined and all the values were appropriate showing alpha values between .802 and .953. Subsequently, confirmatory factor analysis was conducted successfully. And structural equation modeling has been used to analyze the research model using smartPLS(ver. 2.0) s/w. Overall, R2 of adoption of rumor is .476 and R2 of intention of rumor transmission is .218. The overall model showed a satisfactory fit. The empirical results can be summarized as follows. According to the results, the variables of brand rumor characteristic such as source credibility, message credibility, worry, and vividness affect argument strength of rumor. And argument strength of rumor also affects rumor intention. On the other hand, the relationship between perceived usefulness and argument strength of rumor is not significant. The moderating effect of product involvement on the relations between argument strength of rumor and rumor W.O.M intention is not supported neither. Consequently this study suggests some managerial and academic implications. We consider some implications for corporate crisis management planning, PR and brand management. This results show marketers that rumor is a critical factor for managing strong brand assets. Also for researchers, brand rumor should become an important thesis of their interests to understand the relationship between consumer and brand. Recently many brand managers and marketers have focused on the short-term view. They just focused on strengthen the positive brand image. According to this study we suggested that effective brand management requires managing negative brand rumors with a long-term view of marketing decisions.

  • PDF