• Title/Summary/Keyword: user practices

Search Result 400, Processing Time 0.024 seconds

Targeting Data Service for Web-Based Media Contents (웹 기반 미디어 콘텐츠를 위한 맞춤형 데이터 서비스)

  • Park, Sung-Joo;Chung, Kwang-Sue
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.12
    • /
    • pp.1154-1164
    • /
    • 2010
  • As an useful application in broadcasting services, the targeting service has been mainly studied to improve the service satisfaction and user usage in various media service environments based on user profile, preferences, and usage history. Targeting service is expanding its domain from broadcasting contents to interstitial contents and from fixed TV devices to mobile devices. Service data also include advertisement data, coupon, and information about media contents as well as simple broadcasting data. In this paper, the targeting data service is designed and implemented on articles, advertisement and broadcasting information on the basis of the user information. To adapt this to web-based media contents, information on user profile, preferences, and usage history is newly defined on the basis of the user metadata developed in TV-Anytime Forum and the user information defined in OpenSocial. The targeting data service is implemented to generate user preferences information and usage history pattern based on the similarity among user preference, contents information, and usage history. Based on performance evaluation, we prove that the proposed targeting data service is effectively applicable to web-based media contents as well as broadcasting service.

Modeling User Preference based on Bayesian Networks for Office Event Retrieval (사무실 이벤트 검색을 위한 베이지안 네트워크 기반 사용자 선호도 모델링)

  • Lim, Soo-Jung;Park, Han-Saem;Cho, Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.614-618
    • /
    • 2008
  • As the multimedia data increase a lot with the rapid development of the Internet, an efficient retrieval technique focusing on individual users is required based on the analyses of such data. However, user modeling services provided by recent web sites have the limitation of text-based page configurations and recommendation retrieval. In this paper, we construct the user preference model with a Bayesian network to apply the user modeling to video retrieval, and suggest a method which utilizes probability reasoning. To do this, context information is defined in a real office environment and the video scripts acquired from established cameras and annotated the context information manually are used. Personal information of the user, obtained from user input, is adopted for the evidence value of the constructed Bayesian Network, and user preference is inferred. The probability value, which is produced from the result of Bayesian Network reasoning, is used for retrieval, making the system return the retrieval result suitable for each user's preference. The usability test indicates that the satisfaction level of the selected results based on the proposed model is higher than general retrieval method.

Context-Aware Modeling with User Demand in an Internet of Things Environment (사물 인터넷 환경에서 사용자 요구를 포함한 상황 인지 모델)

  • Ryu, Shinhye;Kim, Sangwook
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.11
    • /
    • pp.641-649
    • /
    • 2017
  • As Internet of Things devices become pervasive, services improve to better assess the context and to alert other users to deal with emergencies. Such services use Internet of Things devices to detect the context around the user and promptly notify public institutions, hospitals or other parental users in emergencies. Most of these systems analyze an event when the value of the device is unchanged for a period of time or if it detects an abnormal value. However, just monitoring sensor values makes it difficult to accurately understand the context surrounding a user. Also if the device is inactive, it can not identify the context or provide services again. However, understanding the user requirements, services provided through other devices, information sent to other users lets, appropriate actions be taken. This paper, proposes a device search method and system based on a context-aware model that includes user demands. The proposed system analyzes the user's context and demands by using data collected from the internet of things devices. If user devices are inactive, they can recognize other devices by searching for other devices and providing services to users again. Through the proposed method, the user-centric services are provided. This method also analyzes and responds to requirements in various emergencies.

Information Verification Practices and Perception of Social Media Users on Fact-Checking Services

  • Rabby Q., Lavilles;January F., Naga;Mia Amor C., Tinam-isan;Julieto E., Perez;Eddie Bouy B., Palad
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.1-13
    • /
    • 2023
  • This study determines how social media users (SMUs) verify the information they come across on the Internet. It determines SMUs' perception of online fact-checking services in terms of their ease of use, usefulness, and trust. By conducting a focus group discussion and key informant interviews, themes were derived in determining fact-checking practices while a survey was further conducted to determine such perceived ease of use, usefulness, and trust in fact-checking services. The thematic analysis revealed major information verification practices, such as cross-checking and verifying with other sources, inspecting comments and reactions, and confirming from personal and social networks. The results showed that SMUs considered fact-checking services easy to use. However, a concern was raised about their usefulness stemming from the delayed action in addressing the information issues that need to be verified. As to perceived trust, it was found that SMUs have reservations about fact-checking services. Finally, it is believed that fact-checking services are expected to be credible and need to be promoted to mitigate any form of fake news, particularly on social media platforms.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.

Ethical Behaviors for Conducting Research based on the Perspective of Marketing Researchers

  • Junhyuck SUH
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.1
    • /
    • pp.23-29
    • /
    • 2023
  • Purpose: While prior research has identified ethical issues in marketing research, more research needs to identify specific ethical behaviors that marketing researchers should adopt. This research addresses this gap by identifying a few ethical behaviors that marketing researchers should consider. Research design, data and methodology: The present study has a justification to collect adequate textual data in the current literature using screening process based on the marketing ethics topics and themes, and ethical behaviors of marketing researchers. Results: Based on the literature analysis, a marketing ethics model, which included the principles of fairness, honesty, responsibility, and respect for stakeholders. Since the rise of e-commerce and technology, a growing demand for a method to analyze website user behavior has been growing. Researchers in the field of marketing are responding to this demand by creating innovative interactive platforms. Conclusions: The term "ethical practices in market research" refers to a collection of best practices that, when followed, increase the likelihood that the research carries out is ethical, fair, and accurate. Because there needs to be more theoretical work done on the topic, there should be more empirical studies on ethical behaviors in marketing research.

Determining Diffusion Power Users in a Blog Network (블로그 연결망에서 파급력을 가진 파워 유저의 파악 기법)

  • Lim, Seung-Hwan;Kim, Sang-Wook;Park, Sun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.377-382
    • /
    • 2010
  • For business purposes, it is important to identify diffusion power users, a group of users who have big influence on other users in diffusing content. In this paper, we use the independent cascade model for determining diffusion power users, and to do so, we need a method for calculating the assimilation probability between users. This paper proposes the concepts of user delivery power and a way to quantifying the value of this. User delivery power is used to compute the assimilation probability with user content power. We analyze the proposed method by comparing its performance with those of existing methods through experiments using a real blog network data.

User Friendly Visual Secret Sharing Scheme (사용자 친화적인 시각 비밀 분산 방법)

  • Yoon, Eun-Jun;Lee, Gil-Je;Yoo, Kee-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.5
    • /
    • pp.472-476
    • /
    • 2008
  • In this paper, we propose a simple and user friendly visual secret sharing scheme based on binary image. The proposed scheme is a new information hiding method which uses only bit-wise exclusive-or (XOR) operation and NOT operation to share a secret binary image information in the user friendly binary images. The proposed scheme has the following merits: (1) It provides efficient embedding and reconstruction algorithms. (2) It provides lossless and perfect reconstruction of the secret binary image. (3) It provides the detection method of its own group by sharing the user friendly image. (4) It can share same sized secret image such as original cover image unlike previous methods.

RIA based Personalized Search with Widget Implementation (RIA 기반 개인화 검색을 위한 Widget 응용의 구현)

  • Park, Cha-Ra;Lim, Tae-Soo;Lee, Woo-Key
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.6
    • /
    • pp.402-406
    • /
    • 2007
  • Rich Internet Application(RIA) is one of the Web 2.0 technologies and is expected to be a next generation user interface technique which allows flexible and dynamic manipulation for Web searches. This paper addresses a personalization mechanism for advanced Web search using RIA for abundant user interactions. We devised a dynamic and graphical user interface instead of previous text-based searches and a client side application for storing personal preference information. In this research, we implemented the graphical personalized search manager using Yahoo web search API and widget, and demonstrated its effectiveness by performing some experiments with various query terms and representative predicates.

A User Class-based Service Filtering Policy for QoS Assurance (QoS 보장을 위한 사용자 등급 기반 서비스 수락 정책)

  • Park, Hea-Sook;Ha, Yan;Lee, Soon-Mi
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.4
    • /
    • pp.293-298
    • /
    • 2004
  • To satisfy the requirements for QoS and acceptance ratio of the users using multimedia content service, it is required to control mechanism for QoS assurance and allocation of the stream server' resources based on CoS(Class of Service). To compare performance of the algorithm, we have classified the user by two classes (super class, base class) and control the acceptance ratio of user's requests by user's class information. We have experimented the test of network resources and test of processing time under server/client environment and agent environment. MA-URFA based on agent increases the acceptance ratio of super class and utilization ratio of network resources.