• Title/Summary/Keyword: 고객식별

Search Result 99, Processing Time 0.029 seconds

User Perspective Website Clustering for Site Portfolio Construction (사이트 포트폴리오 구성을 위한 사용자 관점의 웹사이트 클러스터링)

  • Kim, Mingyu;Kim, Namgyu
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.59-69
    • /
    • 2015
  • Many users visit websites every day to perform information retrieval, shopping, and community activities. On the other hand, there is intense competition among sites which attempt to profit from the Internet users. Thus, the owners or marketing officers of each site try to design a variety of marketing strategies including cooperation with other sites. Through such cooperation, a site can share customers' information, mileage points, and hyperlinks with other sites. To create effective cooperation, it is crucial to choose an appropriate partner site that may have many potential customers. Unfortunately, it is exceedingly difficult to identify such an appropriate partner among the vast number of sites. In this paper, therefore, we devise a new methodology for recommending appropriate partner sites to each site. For this purpose, we perform site clustering from the perspective of visitors' similarities, and then identify a group of sites that has a number of common customers. We then analyze the potential for the practical use of the proposed methodology through its application to approximately 140 million actual site browsing histories.

A Study on IPA of Spectator Motivation in the Korean Creative Musical (한국 창작뮤지컬 관람동기의 중요도 연구)

  • Koo, Eun-Ja;Lee, Kwang-Ho;Kim, Hye-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.4
    • /
    • pp.1595-1603
    • /
    • 2013
  • This study uses the Importance Performance Analysis (IPA) on viewing motivation for the revitalization of Korean creative musicals. The IPA is the evaluation techniques to simultaneously compare and analyze relative importance and achievement of each attribute for multi-attribute models. This analysis uses the discerning method by displaying the matrix that includes the factors about which customers care and customer satisfaction on each factor. The customer satisfaction is determined by customer expectation for each attribute and its implementation level. This study, through this method, exams the importance and satisfaction level on attributes of viewing motivations for Korean creative musicals.

Propose on Sharing Accommodation Service Model through Comparison Research (비교연구를 통한 새로운 공유숙박 서비스 모델 제안)

  • Xie Xuanna;Lee Sungpil
    • Journal of Service Research and Studies
    • /
    • v.11 no.3
    • /
    • pp.17-30
    • /
    • 2021
  • In the context of Sharing Accommodation has become a new type of accommodation choice for customers. The purpose of this study is to improve the existing defects of Sharing Accommodation Services through insight into the pain points of customer experience, so as to improve customer satisfaction. In this study, Airbnb and Tujia were selected as the subjects for comparative study. By collecting and sorting out references, the research background of Sharing Accommodation is analyzed in depth. Research methods of Service Design, such as Customer Journey Map and Service Blueprint, are adopted to gain insight into customer needs, identify pain points and propose hypothesis of service optimization. Tools such as Kano Model and Potential Customer Satisfaction are used to test and determine three schemes for optimizing the service. Finally, the results are displayed through Service Scenario. The research results can help operators of Sharing Accommodation to identify and improve the elements of service and provide a higher quality customer experience, thus promoting the healthy development of Sharing Accommodation market.

Methodology for Identifying Key Factors in Sentiment Analysis by Customer Characteristics Using Attention Mechanism

  • Lee, Kwangho;Kim, Namgyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.207-218
    • /
    • 2020
  • Recently, due to the increase of online reviews and the development of analysis technology, the interest and demand for online review analysis continues to increase. However, previous studies have not considered the emotions contained in each vocabulary may differ from one reviewer to another. Therefore, this study first classifies the customer group according to the customer's grade, and presents the result of analyzing the difference by performing review analysis for each customer group. We found that the price factor had a significant influence on the evaluation of products for customers with high ratings. On the contrary, in the case of low-grade customers, the degree of correspondence between the contents introduced in the mall and the actual product significantly influenced the evaluation of the product. We expect that the proposed methodology can be effectively used to establish differentiated marketing strategies by identifying factors that affect product evaluation by customer group.

Differences Between Client's and Supplier's receptions of IT Outsourcing Risks (IT아웃소싱 위험에 대한 고객과 공급업체와의 인식 차이)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.237-242
    • /
    • 2018
  • Researchers have suggested successful risk management as a key factor in successful IT outsourcing projects implementation. The documented investigations, however, have mainly addressed risk management only from a single perspective of either clients or IT vendors. This study explored the potential perception inconsistency regarding the risks between the client and the vendor for IT outsourcing projects by using a quasi-Delphi approach. The analysis results indicated some inconsistencies in the risks perceived by the two parties: (1) the clients regarded (a) lack of vendor commitment to the project and (b) poor vendor selection criteria and process as top critical risks but the vendors didn't; and (2) on the other hand, the vendors perceived (a) unclear requirements and (b) lack of experience and expertise with project activities as significant risks but the clients didn't. Insights into how the client and the vendor perceive risks may help both parties determine how to partner and manage project risks collaboratively to succeed in outsourcing.

A Study on the User Requirement Evalution using Decision Making Methodology (의사결정기법을 이용한 사용자 요구사항 평가에 관한 연구)

  • Park, Pyung-Soo;Seo, Seong-Chae;Hwang, Bu-Hyun;Kim, Byung-Gi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.1925-1928
    • /
    • 2002
  • 소프트웨어에 대한 고객의 요구수준이 점점 높아지고 복잡, 대형화됨에 따라 개발인력, 예산, 기간 등 많은 개발 자원이 소요되는 추세이지만, 개발자 직관에 의한 정성적인 판단으로 소요자원의 과부족을 초래하는 원인이 되고 있다. 본 논문에서는 요구분석 단계에서 기존의 정성적 판단에 따른 문제점을 보완하기 위해 요구분석 프로세스를 수정/제안하고, 의사결정기법을 이용하여 요구사항을 정량적으로 분석하고 식별할 수 있는 방법을 제안하였다. 이를 위해 사용자 요구분석 프로세스 검증단계에서 요구사항 평가활동을 추가하고, 의사결정 모델을 이용한 요구사항 가중치 계산, 시스템 기능과의 관련성 평가, 중요도 가중치를 계산하여 요구사항에 대한 식별의 기준으로 삼는다.

  • PDF

Software Effort Estimation Based on UCP from Customer Requirements (고객 요구사항으로부터 UCP 기반 소프트웨어 공수 산정)

  • Park, Bo Kyung;Park, Young Sik;Kim, R. Young Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.701-703
    • /
    • 2019
  • 현재의 소프트웨어는 매우 크고 복잡하다. 고품질 소프트웨어는 요구사항 단계부터 정확하게 분석해야 한다. 그러나 자연어 요구사항은 부정확하기 때문에 유스케이스 식별이 어렵다. 게다가, 기존 요구 사항 분석 방법은 객체와 용어 식별에 대한 정확한 기준이 없다. 따라서 분석 결과는 분석가마다 다르다. 본 논문에서는 자연어 요구사항으로부터 유스케이스 추출 및 소프트웨어 공수 산정 방법을 제안한다. 제안한 방법에서는 Goal Modeling과 Fillmore의 Case 메커니즘을 개선했다. 이 방법은 자연어 요구 사항을 단계별로 분석하여 유스케이스를 모델링한다. 또한 유스케이스 점수(Use Case Point)를 이용하여 소프트웨어의 공수를 산정(Effort Estimation)한다. 제안한 방법은 고품질 소프트웨어 개발을 위해 자연어 요구사항의 변경 없이 유스케이스 추출이 가능하다. 또한 추출된 유스케이스를 통해 UCP 기반의 공수 산정을 평가할 수 있다. 본 논문에서는 우체국 시스템의 사례에 적용하였다.

A Personalized Extracting Method using Session and Object Information (세션과 객체 정보를 이용한 개인화된 로그 추출기법)

  • Kim, Min-Sook;Park, Myong-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.89-92
    • /
    • 2004
  • 웹 로그에는 개별 사용자를 식별할 수 있는 사용자 정보와 세션 정보가 포함되어 사용자 식별과 해당 URL은 알 수 있지만, 그 URL에 해당하는 페이지내에 어느 객체에 관심이 있어 클릭하는지 알 수 없고, 페이지내에서 외부 사이트로의 링크 부분을 클릭했을 시 로그 파일에 기록이 되지 않는다. 본 연구에서는 세션과 사용자 중심의 로그 기록 방식에 객체를 추가함으로써 복잡하고 다양해지는 객체 요소(동영상, 오디오, 플래시 등)가 포함된 웹사이트에서는 객체 중심의 로그 기록 방식이 고객의 행동 패턴을 분석하여 세분화된 개인화 서비스에 보다 효율적임을 관찰하였다.

  • PDF

Agile Component Development Process (기민한 컴포넌트 개발 프로세스)

  • Han, Jeong-Heon;In, Hoh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.253-256
    • /
    • 2008
  • 아직도 많은 프로젝트에서 지속적으로 변화하는 요구사항과 불가능한 납기일정 그리고 품질을 무조건 만족해야 하는 상황에 많은 개발자들이 괴로워하고 있다. 또한 최근 들어 프로젝트들이 그 개발의 방법으로 컴포넌트 기반 개발(CBD)를 많이 사용하고 있다. 이러한 상황에서 재사용성을 강조하는 품질 좋은 컴포넌트를 식별하고, 개발하기란 매우 어렵다. 또한 기존의 CBD 개발 방법의 프로세스가 요구사항을 초기에 고정하고, 그 기반 위에 여러 단계를 거치기 때문에, 납기기간이 짧거나, 요구사항이 고정되지 않았을 경우 많은 어려움에 직면하고 있다. 본 논문에서는 요구사항이 불명확하고, 납기일정이 짧은 프로젝트에서 유용하도록, 작은 단위의 반복과 그 피드백을 통해, 고객의 요구사항 변경에 빠르게 반응할 수 있고, 기존의 컴포넌트 개발 방법을 단순화한 기민한 컴포넌트 개발 프로세스를 제시한다. 이러한 제안된 기법의 실용성을 검증하기 위해 기존 식별 방법과의 비교, 평가를 제시한다.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.