• Title/Summary/Keyword: 사용자 분류

Search Result 2,292, Processing Time 0.034 seconds

Product Evaluation Criteria Extraction through Online Review Analysis: Using LDA and k-Nearest Neighbor Approach (온라인 리뷰 분석을 통한 상품 평가 기준 추출: LDA 및 k-최근접 이웃 접근법을 활용하여)

  • Lee, Ji Hyeon;Jung, Sang Hyung;Kim, Jun Ho;Min, Eun Joo;Yeo, Un Yeong;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.1
    • /
    • pp.97-117
    • /
    • 2020
  • Product evaluation criteria is an indicator describing attributes or values of products, which enable users or manufacturers measure and understand the products. When companies analyze their products or compare them with competitors, appropriate criteria must be selected for objective evaluation. The criteria should show the features of products that consumers considered when they purchased, used and evaluated the products. However, current evaluation criteria do not reflect different consumers' opinion from product to product. Previous studies tried to used online reviews from e-commerce sites that reflect consumer opinions to extract the features and topics of products and use them as evaluation criteria. However, there is still a limit that they produce irrelevant criteria to products due to extracted or improper words are not refined. To overcome this limitation, this research suggests LDA-k-NN model which extracts possible criteria words from online reviews by using LDA and refines them with k-nearest neighbor. Proposed approach starts with preparation phase, which is constructed with 6 steps. At first, it collects review data from e-commerce websites. Most e-commerce websites classify their selling items by high-level, middle-level, and low-level categories. Review data for preparation phase are gathered from each middle-level category and collapsed later, which is to present single high-level category. Next, nouns, adjectives, adverbs, and verbs are extracted from reviews by getting part of speech information using morpheme analysis module. After preprocessing, words per each topic from review are shown with LDA and only nouns in topic words are chosen as potential words for criteria. Then, words are tagged based on possibility of criteria for each middle-level category. Next, every tagged word is vectorized by pre-trained word embedding model. Finally, k-nearest neighbor case-based approach is used to classify each word with tags. After setting up preparation phase, criteria extraction phase is conducted with low-level categories. This phase starts with crawling reviews in the corresponding low-level category. Same preprocessing as preparation phase is conducted using morpheme analysis module and LDA. Possible criteria words are extracted by getting nouns from the data and vectorized by pre-trained word embedding model. Finally, evaluation criteria are extracted by refining possible criteria words using k-nearest neighbor approach and reference proportion of each word in the words set. To evaluate the performance of the proposed model, an experiment was conducted with review on '11st', one of the biggest e-commerce companies in Korea. Review data were from 'Electronics/Digital' section, one of high-level categories in 11st. For performance evaluation of suggested model, three other models were used for comparing with the suggested model; actual criteria of 11st, a model that extracts nouns by morpheme analysis module and refines them according to word frequency, and a model that extracts nouns from LDA topics and refines them by word frequency. The performance evaluation was set to predict evaluation criteria of 10 low-level categories with the suggested model and 3 models above. Criteria words extracted from each model were combined into a single words set and it was used for survey questionnaires. In the survey, respondents chose every item they consider as appropriate criteria for each category. Each model got its score when chosen words were extracted from that model. The suggested model had higher scores than other models in 8 out of 10 low-level categories. By conducting paired t-tests on scores of each model, we confirmed that the suggested model shows better performance in 26 tests out of 30. In addition, the suggested model was the best model in terms of accuracy. This research proposes evaluation criteria extracting method that combines topic extraction using LDA and refinement with k-nearest neighbor approach. This method overcomes the limits of previous dictionary-based models and frequency-based refinement models. This study can contribute to improve review analysis for deriving business insights in e-commerce market.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

A study on the readability of web interface for the elderly user -Focused on readability of Typeface- (고령사용자를 위한 웹 인터페이스에서의 가독성에 관한 연구 -Typeface의 가독성을 중심으로-)

  • Lee, Hyun-Ju;Woo, Seo-Hye;Park, Eun-Young;Suh, Hye-Young;Back, Seung-Chul
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.315-324
    • /
    • 2007
  • The fast development of the information technology makes Korea one of the most advanced countries in information communication in the world in a short period of time. However, the gap between the aged and the young has been seriously increased. Those who are less than 10% of the older adults are using the internet at present. It means the elderly has many difficulties in using the internet because of their physical and cognitive differences. The purpose of this study is that the aged can easily achieve and use information by developing a guidelines for the Korean typography in the web interface. A literature search was conducted on the web interface design guidelines for older adults. These guidelines were classified by interface component and the study subjects needed for the Korean internet environment were selected. The subjects are a more comfortably readable typeface according to the sizes, a proper text size of Gulim and Batang, a more comfortably readable leading size, the appropriate letter spacing, the proper line length of body, the suitable size proportion between a title and a body, and a more comfortably readable text alignment. Survey questions were made and these Questions were improved after the pretest. Both online and offline survey programs were written and the aged and the young were tested with these programs. The result of this survey shows that there are satisfaction differences between the aged and the young in the readability and legibility of the web contents. Therefore these universal guidelines to be used in the Korean typographical environment for the future aged population were specified. It is expected that this study will be used as basic data for the universal web interface where the older adults can easily use and acquire information.

  • PDF

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Development and Evaluation of Traffic Conflict Criteria at an intersection (교차로 교통상충기준 개발 및 평가에 관한 연구)

  • 하태준;박형규;박제진;박찬모
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.2
    • /
    • pp.105-115
    • /
    • 2002
  • For many rears, traffic accident statistics are the most direct measure of safety for a signalized intersection. However it takes more than 2 or 3 yearn to collect certain accident data for adequate sample sizes. And the accident data itself is unreliable because of the difference between accident data recorded and accident that is actually occurred. Therefore, it is rather difficult to evaluate safety for a intersection by using accident data. For these reasons, traffic conflict technique(TCT) was developed as a buick and accurate counter-measure of safety for a intersection. However, the collected conflict data is not always reliable because there is absence of clear criteria for conflict. This study developed objective and accurate conflict criteria, which is shown below based on traffic engineering theory. Frist, the rear-end conflict is regarded, when the following vehicle takes evasive maneuver against the first vehicle within a certain distance, according to car-following theory. Second, lane-change conflict is regarded when the following vehicle takes evasive maneuver against first vehicle which is changing its lane within the minimum stopping distance of the following vehicle. Third, cross and opposing-left turn conflicts are regarded when the vehicle which receives green sign takes evasive maneuver against the vehicle which lost its right-of-way crossing a intersection. As a result of correlation analysis between conflict and accident, it is verified that the suggested conflict criteria in this study ave applicable. And it is proven that estimating safety evaluation for a intersection with conflict data is possible, according to the regression analysis preformed between accident and conflict, EPDO accident and conflict. Adopting the conflict criteria suggested in this study would be both quick and accurate method for diagnosing safety and operational deficiencies and for evaluation improvements at intersections. Further research is required to refine the suggested conflict criteria to extend its application. In addition, it is necessary to develope other types of conflict criteria, not included in this study, in later study.

Analysis of health habit and hair mineral nutrition status of media addicted adolescent (미디어중독 청소년의 스마트폰 사용의존도에 따른 건강습관 및 모발 무기질 영양상태 분석)

  • Lim, Hee-Sook;Kim, Soon-Kyung
    • Journal of Nutrition and Health
    • /
    • v.51 no.4
    • /
    • pp.295-306
    • /
    • 2018
  • Purpose: Koreans' internet and smartphone usage hours are steadily increasing and the dependence of young people on smartphones is causing social problems. Therefore, this study was conducted to examine health and dietary habits, as well as hair mineral contents according to the level of dependence of smartphone use among adolescents to clarify the interrelation of smartphone dependence, lifestyle, dietary behavior, and mineral nutrition status. Methods: A total of 80 smartphone-addicted adolescents participated in this study and were divided into three groups (general, potential and danger group) according to smartphone dependence. The subjects' lifestyles and dietary behaviors were then surveyed, and hair mineral contents were analyzed. Results: Higher smartphone dependence was associated with lower average weekly sleeping time and later first smoking age. In the danger group, the rate of eating fast and the rate of snacking twice a day was also relatively high. Parents (45.0%) and mobile (30.0%) were the factors having the greatest influence on an individual's dietary behavior. In the hair mineral analysis, all subjects had lower selenium concentrations and higher lead concentrations than normal. In addition, the levels of aluminum in the danger group were higher than in the normal range and the highest among the three groups. Conclusions: It is necessary to guide adolescents to use smartphones correctly and manage dietary habits. In addition, careful attention is needed the mineral nutritional status of smartphone-addicted adolescents.

A Study on the Influence of Social Media (SNS) Content Type of Corporate Marketing to User Purchase Intention: Focusing on the Mediating Effect of Satisfaction and the Moderating Effect of Individual Characteristics (기업 마케팅의 소셜미디어(SNS) 콘텐츠 유형이 사용자 구매의도에 미치는 영향에 관한 연구: 만족도의 매개효과와 개인특성의 조절효과를 중심으로)

  • Kim, Ga Young;Lee, Woo Jin
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.3
    • /
    • pp.75-86
    • /
    • 2017
  • The development of web technologies and the generalization of smartphones have dramatically increased the number of social media users using the Internet. As a result, companies are perceived social media as a major marketing tool and operate a variety of SNS channels. In particular, start-ups conducting businesses with limited resources, social media is being used as an effective marketing tool to meet many potential customers at a low cost. Among them, facebook is the most used channel in the world and plays an important promotional tool not only in overseas but also in marketing activities of domestic start-ups. The purpose of this study is to analyze the relationship between satisfaction and purchase intention according to four personal characteristics of users who use social media contents and to measure the mediating effect of satisfaction on the relationship between content type and purchase intention. To this end, we classified into three types based on the previous research, and social media content is provided to 200 fans of Minbak Danawa(Minda), one of representative start-ups related to accommodation, The questionnaires were conducted for 3 weeks, and a total of 145 copies were collected. All the collected questionnaires were used for statistical analysis through SPSS 18.0. The empirical results show that all three types of content, such as task-oriented, self-oriented, and interaction-oriented, have a significant effect on the satisfaction level. Among them, it is confirmed that the satisfaction level plays a mediating role on the relationship between task-oriented contents and purchase intention. And the user 's personal characteristics showed a partially moderate effect on the satisfaction according to the content type. Therefore, social media content provided by corporations has an important effect on consumer satisfaction and purchasing, in order for start-up to prevail in the market, it is necessary to have an operational strategy to communicate with customers continuously through systematic contents analysis and planning. The result of this study suggests effective ways to build a social media marketing strategy for start-ups and suggests ways to utilize contents considering the characteristics of internet users.

  • PDF

Variables Affecting Long-Term Compliance of Oral Appliance for Snoring (코골이 치료용 구강장치의 지속적 사용에 영향을 주는 요인의 분석)

  • Lee, Jun-Youp;Hur, Yun-Kyung;Choi, Jae-Kap
    • Journal of Oral Medicine and Pain
    • /
    • v.33 no.4
    • /
    • pp.305-316
    • /
    • 2008
  • The mandibular advancement device(MAD) has been used to help manage snoring and obstructive sleep apnea. The aims of this study were to specify the demographic and clinical characteristics of the patients receiving long-term treatment with MAD and to quantify the compliance with and side effects of the use of the device. Of 103 patients who were treated with MAD for at least one full year after delivery date, 49 were able to be contacted with telephone and complete follow-up questionnaires were obtainable. They were telephoned to determine whether they were still using the device. If not, they were asked when and why they stopped using it. Patients were also asked how much effectiveness of the MAD in decreasing snoring and how much they and their bed-partners were satisfied with the MAD therapy. The initial respiratory disturbance indices and pre-treatment snoring frequency and intensity were obtained from the medical records of initial visit. All the data were compared between users and nonusers. The results were as follows: 1. Of 49 patients 25 are still using the device, but 24 stopped using it. Among nonusers nobody stopped wearing the device within first 1 month, but 37.5% of nonusers stopped wearing it in the following 6 months, and another 4.2% before the end of the first year. 2. The one-year compliance of the MAD therapy was 79.59%. 3. There were no significant differences in mean age, mean body mass index, and gender distribution between users group and nonusers group. 4. There was no significant difference in mean respiratory disturbance index at initial visit between users group and nonusers group. 5. There was no significant difference in pre-treatment snoring frequency and intensity between users group and nonusers group. 6. The degree of decrease in snoring with use of MAD was significantly higher in the users when compared to nonusers. 7. Patient's overall satisfaction with treatment outcome was significantly higher in the users when compared to nonusers. 8. Bed partner's satisfaction with treatment outcome tended to be higher in the users when compared to nonusers. 9. The most frequent reasons why patients discontinued wearing the MAD were: jaw pain(25%), dental pain(20.83%), broken appliance(20.83%), hassle using(16.67%), lost weight(8.3%), dental work(8.3%), no or little effect(4.17%), sleep disturbance(4.27).

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Tracing the Development and Spread Patterns of OSS using the Method of Netnography - The Case of JavaScript Frameworks - (네트노그라피를 이용한 공개 소프트웨어의 개발 및 확산 패턴 분석에 관한 연구 - 자바스크립트 프레임워크 사례를 중심으로 -)

  • Kang, Heesuk;Yoon, Inhwan;Lee, Heesan
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.131-150
    • /
    • 2017
  • The purpose of this study is to observe the spread pattern of open source software (OSS) while establishing relations with surrounding actors during its operation period. In order to investigate the change pattern of participants in the OSS, we use a netnography on the basis of online data, which can trace the change patterns of the OSS depending on the passage of time. For this, the cases of three OSSs (e.g. jQuery, MooTools, and YUI), which are JavaScript frameworks, were compared, and the corresponding data were collected from the open application programming interface (API) of GitHub as well as blog and web searches. This research utilizes the translation process of the actor-network theory to categorize the stages of the change patterns on the OSS translation process. In the project commencement stage, we identified the type of three different OSS-related actors and defined associated relationships among them. The period, when a master commences a project at first, is refined through the course for the maintenance of source codes with persons concerned (i.e. project growth stage). Thereafter, the period when the users have gone through the observation and learning period by being exposed to promotion activities and codes usage respectively, and becoming to active participants, is regarded as the 'leap of participants' stage. Our results emphasize the importance of promotion processes in participants' selection of the OSS for participation and confirm the crowding-out effect that the rapid speed of OSS development retarded the emergence of participants.

  • PDF