• Title/Summary/Keyword: usage model

Search Result 1,970, Processing Time 0.028 seconds

A Study on the Intention to use Personal Mobility Services: Focused on the SOR(Stimulus-Organism-Response) Model (퍼스널 모빌리티 사용의도에 관한 연구: SOR(Stimulus-Organism-Response) 모델을 중심으로)

  • Wonguk Lee;Heetae Yang
    • Information Systems Review
    • /
    • v.24 no.2
    • /
    • pp.67-88
    • /
    • 2022
  • This study proposed a research model that can explain the usage intentions of users and non-users by considering the performance aspects of personal mobility and external environmental factors based on the SOR (Stimulus-Organism-Response) model, A survey was conducted targeting domestic users and non-users, and research models and hypotheses were verified through Partial Least Square (PLS) and Artificial Neural Network (ANN). As a result of the analysis, it was confirmed that the users' perceived satisfaction and perceived trust had a positive effect on their intention to use, and that perceived risk and environmental value had a significant relationship with perceived satisfaction and perceived trust. For non-users, it was found that there was a positive correlation between perceived satisfaction and intention to use, and it was verified that perceived risk and environmental value, like users, were significant antecedents of perceived satisfaction and perceived trust. Among the remaining variables, the perceived mobility of users and the perceived ease of use of non-users were respectively presented as important influencing factors on perceived satisfaction.

Development of Evaluation Model for ITS Project using the Probabilistic Risk Analysis (확률적 위험도분석을 이용한 ITS사업의 경제성평가모형)

  • Lee, Yong-Taeck;Nam, Doo-Hee;Lim, Kang-Won
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.3 s.81
    • /
    • pp.95-108
    • /
    • 2005
  • The purpose of this study is to develop the ITS evaluation model using the Probabilistic Risk Analysis (PRA) methodology and to demonstrate the goodness-of-fit of the large ITS projects through the comparative analysis between DEA and PRA model. The results of this study are summarized below. First, the evaluation mode] using PRA with Monte-Carlo Simulation(MCS) and Latin-Hypercube Sampling(LHS) is developed and applied to one of ITS projects initiated by local government. The risk factors are categorized with cost, benefit and social-economic factors. Then, PDF(Probability Density Function) parameters of these factors are estimated. The log-normal distribution, beta distribution and triangular distribution are well fitted with the market and delivered price. The triangular and uniform distributions are valid in benefit data from the simulation analysis based on the several deployment scenarios. Second, the decision making rules for the risk analysis of projects for cost and economic feasibility study are suggested. The developed PRA model is applied for the Daejeon metropolitan ITS model deployment project to validate the model. The results of cost analysis shows that Deterministic Project Cost(DPC), Deterministic Total Project Cost(DTPC) is the biased percentile values of CDF produced by PRA model and this project need Contingency Budget(CB) because these values are turned out to be less than Target Value(TV;85% value), Also, this project has high risk of DTPC and DPC because the coefficient of variation(C.V) of DTPC and DPC are 4 and 15 which are less than that of DTPC(19-28) and DPC(22-107) in construction and transportation projects. The results of economic analysis shows that total system and subsystem of this project is in type II, which means the project is economically feasible with high risk. Third, the goodness-of-fit of PRA model is verified by comparing the differences of the results between PRA and DEA model. The difference of evaluation indices is up to 68% in maximum. Because of this, the deployment priority of ITS subsystems are changed in each mode1. In results. ITS evaluation model using PRA considering the project risk with the probability distribution is superior to DEA. It makes proper decision making and the risk factors estimated by PRA model can be controlled by risk management program suggested in this paper. Further research not only to build the database of deployment data but also to develop the methodologies estimating the ITS effects with PRA model is needed to broaden the usage of PRA model for the evaluation of ITS projects.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

The Factors Affecting Attitudes Toward HSDPA Service and Intention to Use: A Cross-Cultural Comparison between Asia and Europe (대영향(对影响)HSDPA복무적태도화사용의도적인소적연구(服务的态度和使用意图的因素的研究): 재아주화구주지간적(在亚洲和欧洲之间的)-개과문화비교(个跨文化比较))

  • Jung, Hae-Sung;Shin, Jong-Kuk;Park, Min-Sook;Jung, Hong-Seob;Hooley, Graham;Lee, Nick;Kwak, Hyok-Jin;Kim, Sung-Hyun
    • Journal of Global Scholars of Marketing Science
    • /
    • v.19 no.4
    • /
    • pp.11-23
    • /
    • 2009
  • HSDPA (High-Speed Downlink Packet Access) is a 3.5-generation asynchronous mobile communications service based on the third generation of W-CDMA. In Korea, it is mainly provided in through videophone service. Because of the diffusion of more powerful and diversified services, along with steep advances in mobile communications technology, consumers demand a wide range of choices. However, because of the variety of technologies, which tend to overflow the market regardless of consumer preferences, consumers feel increasingly confused. Therefore, we should not adopt strategies that focus only on developing new technology on the assumption that new technologies are next-generation projects. Instead, we should understand the process by which consumers accept new forms of technology and devise schemes to lower market entry barriers through strategies that enable developers to understand and provide what consumers really want. In the Technology Acceptance Model (TAM), perceived usefulness and perceived ease of use are suggested as the most important factors affecting the attitudes of people adopting new technologies (Davis, 1989; Taylor and Todd, 1995; Venkatesh, 2000; Lee et al., 2004). Perceived usefulness is the degree to which a person believes that a particular technology will enhance his or her job performance. Perceived ease of use is the degree of subjective belief that using a particular technology will require little physical and mental effort (Davis, 1989; Morris and Dillon, 1997; Venkatesh, 2000). Perceived pleasure and perceived usefulness have been shown to clearly affect attitudes toward accepting technology (Davis et al., 1992). For example, pleasure in online shopping has been shown to positively impact consumers' attitudes toward online sellers (Eighmey and McCord, 1998; Mathwick, 2002; Jarvenpaa and Todd, 1997). The perceived risk of customers is a subjective risk, which is distinguished from an objective probabilistic risk. Perceived risk includes a psychological risk that consumers perceive when they choose brands, stores, and methods of purchase to obtain a particular item. The ability of an enterprise to revolutionize products depends on the effective acquisition of knowledge about new products (Bierly and Chakrabarti, 1996; Rothwell and Dodgson, 1991). Knowledge acquisition is the ability of a company to perceive the value of novelty and technology of the outside (Cohen and Levinthal, 1990), to evaluate the outside technology that has newly appeared (Arora and Gambaradella, 1994), and to predict the future evolution of technology accurately (Cohen and Levinthal, 1990). Consumer innovativeness is the degree to which an individual adopts innovation earlier than others in the social system (Lee, Ahn, and Ha, 2001; Gatignon and Robertson, 1985). That is, it shows how fast and how easily consumers adopt new ideas. Innovativeness is regarded as important because it has a significant effect on whether consumers adopt new products and on how fast they accept new products (Midgley and Dowling, 1978; Foxall, 1988; Hirschman, 1980). We conducted cross-national comparative research using the TAM model, which empirically verified the relationship between the factors that affect attitudes - perceived usefulness, ease of use, perceived pleasure, perceived risk, innovativeness, and perceived level of knowledge management - and attitudes toward HSDPA service. We also verified the relationship between attitudes and usage intention for the purpose of developing more effective methods of management for HSDPA service providers. For this research, 346 questionnaires were distributed among 350 students in the Republic of Korea. Because 26 of the returned questionnaires were inconsistent or had missing data, 320 questionnaires were used in the hypothesis tests. In UK, 192 of the total 200 questionnaires were retrieved, and two incomplete ones were discarded, bringing the total to 190 questionnaires used for statistical analysis. The results of the overall model analysis are as follows: Republic of Korea x2=333.27(p=0.0), NFI=0.88, NNFI=0.88, CFI=0.91, IFI=0.91, RMR=0.054, GFI=0.90, AGFI=0.84, UK x2=176.57(p=0.0), NFI=0.88, NNFI=0.90, CFI=0.93, IFI=0.93, RMR=0.062, GFI=0.90, AGFI=0.84. From the results of the hypothesis tests of Korean consumers about the relationship between factors that affect intention to use HSDPA services and attitudes, we can conclude that perceived usefulness, ease of use, pleasure, a high level of knowledge management, and innovativeness promote positive attitudes toward HSDPA mobile phones. However, ease of use and perceived pleasure did not have a direct effect on intention to use HSDPA service. This may have resulted from the fact that the use of video phones is not necessary for everyday life yet. Moreover, it has been shown that attitudes toward HSDPA video phones are directly correlated with usage intention, which means that perceived usefulness, ease of use, pleasure, a high level of knowledge management, and innovativeness. These relationships form the basis of the intention to buy, contributing to a situation in which consumers decide to choose carefully. A summary of the results of the hypothesis tests of European consumers revealed that perceived usefulness, pleasure, risk, and the level of knowledge management are factors that affect the formation of attitudes, while ease of use and innovativeness do not have an effect on attitudes. In particular, with regard to the effect value, perceived usefulness has the largest effect on attitudes, followed by pleasure and knowledge management. On the contrary, perceived risk has a smaller effect on attitudes. In the Asian model, ease of use and perceived pleasure were found not to have a direct effect on intention to use. However, because attitudes generally affect the intention to use, perceived usefulness, pleasure, risk, and knowledge management may be considered key factors in attitude development from which usage intention arises. In conclusion, perceived usefulness, pleasure, and the level of knowledge management have an effect on attitude formation in both Asian and European consumers, and such attitudes shape these consumers' intention to use. Furthermore, the hypotheses that ease of use and perceived pleasure affect usage intention are rejected. However, ease of use, perceived risk, and innovativeness showed different results. Perceived risk had no effect on attitude formation among Asians, while ease of use and innovativeness had no effect on attitudes among Europeans.

  • PDF

An Evaluation Model for Software Usability using Mental Model and Emotional factors (정신모형과 감성 요소를 이용한 소프트웨어 사용성 평가 모델 개발)

  • 김한샘;김효영;한혁수
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.1_2
    • /
    • pp.117-128
    • /
    • 2003
  • Software usability is a characteristic of the software that is decided based on learnability, effectiveness, and satisfaction when it is evaluated. The usability is a main factor of the software quality. A software has to be continuously improved by taking guidelines that comes from the usability evaluation. Usability factors may vary among the different software products and even for the same factor, the users may have different opinions according to their experience and knowledge. Therefore, a usability evaluation process must be developed with the consideration of many factors like various applications and users. Existing systems such as satisfaction evaluation and performance evaluation only evaluate the result and do not perform cause analysis. And also unified evaluation items and contents do not reflect the characteristics of the products. To address these problems, this paper presents a evaluation model that is based on the mental model of user and the problems, this paper presents a evaluation model that is based on the mental model of user and the emotion of users. This model uses evaluation factors of the user task which are extracted by analyzing usage of the target product. In the mental model approach, the conceptual model of designer and the mental model of the user are compared and the differences are taken as a gap also reported as a part to be improved in the future. In the emotional factor approach, the emotional factors are extracted for the target products and evaluated in terms of the emotional factors. With this proposed method, we can evaluate the software products with customized attributes of the products and deduce the guidelines for the future improvements. We also takes the GUI framework as a sample case and extracts the directions for improvement. As this model analyzes tasks of users and uses evaluation factors for each task, it is capable of not only reflecting the characteristics of the product, but exactly identifying the items that should be modified and improved.

The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory (오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여)

  • Choi, Junghong;Choi, Joohee;Lee, Hye Sun;Hwangbo, Hwan;Lee, Inseong;Kim, Jinwoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.

Effects on the continuous use intention of AI-based voice assistant services: Focusing on the interaction between trust in AI and privacy concerns (인공지능 기반 음성비서 서비스의 지속이용 의도에 미치는 영향: 인공지능에 대한 신뢰와 프라이버시 염려의 상호작용을 중심으로)

  • Jang, Changki;Heo, Deokwon;Sung, WookJoon
    • Informatization Policy
    • /
    • v.30 no.2
    • /
    • pp.22-45
    • /
    • 2023
  • In research on the use of AI-based voice assistant services, problems related to the user's trust and privacy protection arising from the experience of service use are constantly being raised. The purpose of this study was to investigate empirically the effects of individual trust in AI and online privacy concerns on the continued use of AI-based voice assistants, specifically the impact of their interaction. In this study, question items were constructed based on previous studies, with an online survey conducted among 405 respondents. The effect of the user's trust in AI and privacy concerns on the adoption and continuous use intention of AI-based voice assistant services was analyzed using the Heckman selection model. As the main findings of the study, first, AI-based voice assistant service usage behavior was positively influenced by factors that promote technology acceptance, such as perceived usefulness, perceived ease of use, and social influence. Second, trust in AI had no statistically significant effect on AI-based voice assistant service usage behavior but had a positive effect on continuous use intention. Third, the privacy concern level was confirmed to have the effect of suppressing continuous use intention through interaction with trust in AI. These research results suggest the need to strengthen user experience through user opinion collection and action to improve trust in technology and alleviate users' concerns about privacy as governance for realizing digital government. When introducing artificial intelligence-based policy services, it is necessary to disclose transparently the scope of application of artificial intelligence technology through a public deliberation process, and the development of a system that can track and evaluate privacy issues ex-post and an algorithm that considers privacy protection is required.

An Empirical Study of Social Network Service (SNS) Continuance: Incorporating the Customer Value-Satisfaction-Loyalty Model into the IS Continuance Model (소셜 네트워크 서비스(SNS)의 지속이용의도에 관한 연구: IS 지속이용모델과 고객 가치-만족-충성도 모델의 통합적 접근)

  • Choi, Sujeong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.1-28
    • /
    • 2013
  • Given that smartphone-based social network services (SNS), such as KakaoStory is now being widely used as a way for people to connect and communicate with each other, this study examines key factors leading to the continued use of SNS. People have been using PC-based SNS, such as Cyworld, for years are now using smartphone-based SNS, such as KakaoStory. KakaoStory developed by KakaoTalk has rapidly grown up as the largest smartphone-based SNS in Korea as smartphone penetration increases. It is more difficult for firms to maintain their current users over time in that alternative SNSs satisfying people's new needs are constantly emerging and evolving. In this sense, one of the most challenging issues for SNS firms is how to retain their current users in the long run. However, there are few empirical studies on this issue. Applying the IS continuance model proposed by Bhattacherjee [2001], this study explores key determinants of users' smartphone-based SNS continuance intention. The model suggests that perceived usefulness and user satisfaction are the key determinants of IS continuance intention. However, the model includes only the utilitarian value that users can obtain through the use of smartphone-based SNS, by considering perceived usefulness. Therefore, the study attempts to extend the IS continuance model by considering hedonic and social values simultaneously. More specifically, we consider subjective norms as social value that are proposed by the theory of reasoned action and the theory of planned behavior. We also consider perceived enjoyment as hedonic value that is emphasized as a key factor influencing users' behavior intention and actual behavior, particularly in the context of hedonic IS use. By considering the three values in our model simultaneously, we could offer a deeper understanding of smartphone-based SNS continuance. That is, this study could offer an explanation of how each value is associated with user satisfaction and SNS continuance intention. The customer value-satisfaction-loyalty model can strengthen the assertion that smartphone-based SNS continuance intention is determined by various different types of customer values, such as utilitarian, hedonic, and social ones. Moreover, the model provides a theoretical basis for the assertion that customer values lead to increased loyalty via customer satisfaction. In this regard, we theorize that SNS continuance intention is influenced by users' various values, namely perceived usefulness, perceived enjoyment, and subjective norms, via user satisfaction. To test the proposed research model and hypotheses, we conducted a partial least squares analysis using a total of 253 data collected on the users of smartphone-based SNS (i.e., KakaoStory). The key findings are as follows: First, it has been found that SNS continuance intention considerably depends on user satisfaction. Second, user satisfaction is determined by confirmation, perceived usefulness, and perceived enjoyment. Third, concerning the effects of the three values on SNS continuance intention, only perceived enjoyment regarded as hedonic value was statistically significant. That is, perceived usefulness considered as utilitarian value and subjective norms considered as social value had no effect on SNS continuance intention. Finally, our results indicate that confirmation increases perceived usefulness, perceived enjoyment, and user satisfaction. The results reconfirm the effectiveness of IS continuance model in predicting smartphone-based SNS continuance intention. Moreover, the results demonstrate that perceived enjoyment reflecting hedonic value is the most important predictor of SNS continuance intention. Therefore, it is imperative for firms to meet SNS users' hedonic value to retain them in the long run. Meanwhile, we could not find any empirical evidence to support the assertion that subjective norms are associated with user satisfaction and SNS continuance intention. The results lead us to conclude that when users have enough direct experience in SNS use, subjective norms have no effect on SNS continuance intention. Discussions and implications of the results are provided.

Analysis and Evaluation of Frequent Pattern Mining Technique based on Landmark Window (랜드마크 윈도우 기반의 빈발 패턴 마이닝 기법의 분석 및 성능평가)

  • Pyun, Gwangbum;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.101-107
    • /
    • 2014
  • With the development of online service, recent forms of databases have been changed from static database structures to dynamic stream database structures. Previous data mining techniques have been used as tools of decision making such as establishment of marketing strategies and DNA analyses. However, the capability to analyze real-time data more quickly is necessary in the recent interesting areas such as sensor network, robotics, and artificial intelligence. Landmark window-based frequent pattern mining, one of the stream mining approaches, performs mining operations with respect to parts of databases or each transaction of them, instead of all the data. In this paper, we analyze and evaluate the techniques of the well-known landmark window-based frequent pattern mining algorithms, called Lossy counting and hMiner. When Lossy counting mines frequent patterns from a set of new transactions, it performs union operations between the previous and current mining results. hMiner, which is a state-of-the-art algorithm based on the landmark window model, conducts mining operations whenever a new transaction occurs. Since hMiner extracts frequent patterns as soon as a new transaction is entered, we can obtain the latest mining results reflecting real-time information. For this reason, such algorithms are also called online mining approaches. We evaluate and compare the performance of the primitive algorithm, Lossy counting and the latest one, hMiner. As the criteria of our performance analysis, we first consider algorithms' total runtime and average processing time per transaction. In addition, to compare the efficiency of storage structures between them, their maximum memory usage is also evaluated. Lastly, we show how stably the two algorithms conduct their mining works with respect to the databases that feature gradually increasing items. With respect to the evaluation results of mining time and transaction processing, hMiner has higher speed than that of Lossy counting. Since hMiner stores candidate frequent patterns in a hash method, it can directly access candidate frequent patterns. Meanwhile, Lossy counting stores them in a lattice manner; thus, it has to search for multiple nodes in order to access the candidate frequent patterns. On the other hand, hMiner shows worse performance than that of Lossy counting in terms of maximum memory usage. hMiner should have all of the information for candidate frequent patterns to store them to hash's buckets, while Lossy counting stores them, reducing their information by using the lattice method. Since the storage of Lossy counting can share items concurrently included in multiple patterns, its memory usage is more efficient than that of hMiner. However, hMiner presents better efficiency than that of Lossy counting with respect to scalability evaluation due to the following reasons. If the number of items is increased, shared items are decreased in contrast; thereby, Lossy counting's memory efficiency is weakened. Furthermore, if the number of transactions becomes higher, its pruning effect becomes worse. From the experimental results, we can determine that the landmark window-based frequent pattern mining algorithms are suitable for real-time systems although they require a significant amount of memory. Hence, we need to improve their data structures more efficiently in order to utilize them additionally in resource-constrained environments such as WSN(Wireless sensor network).

A Study on Nonverbal Communication m the Service Provider (서비스 제공자의 비언어적 커뮤니케이션에 관한 연구)

  • Kim, Yu-Kyung
    • Journal of Global Scholars of Marketing Science
    • /
    • v.15 no.3
    • /
    • pp.117-148
    • /
    • 2005
  • As this study aimed to examine which influence the nonverbal communication of service provider has upon service performance in terms of service industry, the specific objectives are as follows. First, it tried to examine into the relationship between the nonverbal communication in the service provider, and the emotional attachment. Nonverbal communication is divided into 4 kinds such as physical language, proxemics, paralanguage, and physical appearance. Second, it aimed to examine the relationship between the customer's attachment to the service provider, and the social competence and trust in the service provider. Third, it tried to examine into the relationship of service provider's social competence and trust with the customer satisfaction and with the switching costs. Additionally, it examined the moderating effect in the service type and the service usage period in terms of the model that was presented in this study. Given examining the verified results in these research hypotheses, those are as follows. First, given seeing the relationship between the nonverbal communication and the emotional attachment, it was represented that the physical language, proxemics, and physical appearance, except paralanguage, have significantly positive(+) influence upon emotional attachment. Second, it was indicated that emotional attachment has significantly positive(+) influence upon the social competence and trust in the service provider. Third, the social competence in the service provider had no positive effect(+) on customer satisfaction, and was having significantly positive(+) influence upon the customer's perceived switching barrier. Fourth, it was represented that the customer satisfaction toward the service provider have significantly positive(+) influence upon the switching barrier. Finally, as a result of having verified whether or not the moderating effect in the service type and the service usage period, it was indicated to be produced the difference depending on the service type in the relationships between the physical language and the emotional attachment, between the paralanguage and the emotional attachment, between the emotional attachment and the trust, and between the trust and the switching barrier. Depending on the service usage period, the difference was represented, respectively, in the relationships between the physical language and the emotional attachment and between the physical appearance and the emotional attachment.

  • PDF