• Title/Summary/Keyword: 소셜 분석

Search Result 1,597, Processing Time 0.029 seconds

Dynamic Block Reassignment for Load Balancing of Block Centric Graph Processing Systems (블록 중심 그래프 처리 시스템의 부하 분산을 위한 동적 블록 재배치 기법)

  • Kim, Yewon;Bae, Minho;Oh, Sangyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.5
    • /
    • pp.177-188
    • /
    • 2018
  • The scale of graph data has been increased rapidly because of the growth of mobile Internet applications and the proliferation of social network services. This brings upon the imminent necessity of efficient distributed and parallel graph processing approach since the size of these large-scale graphs are easily over a capacity of a single machine. Currently, there are two popular parallel graph processing approaches, vertex-centric graph processing and block centric processing. While a vertex-centric graph processing approach can easily be applied to the parallel processing system, a block-centric graph processing approach is proposed to compensate the drawbacks of the vertex-centric approach. In these systems, the initial quality of graph partition affects to the overall performance significantly. However, it is a very difficult problem to divide the graph into optimal states at the initial phase. Thus, several dynamic load balancing techniques have been studied that suggest the progressive partitioning during the graph processing time. In this paper, we present a load balancing algorithms for the block-centric graph processing approach where most of dynamic load balancing techniques are focused on vertex-centric systems. Our proposed algorithm focus on an improvement of the graph partition quality by dynamically reassigning blocks in runtime, and suggests block split strategy for escaping local optimum solution.

SNS Mall: A Study on the Analysis of SNS(Social Networking Service) Functions Applicable to Electronic Commerce for Building Regular Relationship with Customers (SNS 몰: 전자상거래에서 적용할 수 있는 SNS의 기능 분석 및 활용에 관한 연구)

  • Gim, Mi-Su;Ra, Young-Gook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.1-7
    • /
    • 2020
  • We can build regular customer relationships combining SNS (social networking service) with shopping mall like offline trade. A customer who once purchased is registered as reaular and the relationship continues afterward. The registered regular customer get sthe information about objective product shipment and besides it, he contacts with a story of frams, growth of vegetables, sows to harvests. Consumer can purchase with one click necessary foods as he looks at timeline. Sellers give information about news. discounts to customers. Besides it, food storages, recipes can be given to consumers. The good point here is that selling and promoting can be performed within one account. This is better than link is provided for selling an promoting separately. Like this, besides personal connections using SNS, categorization function gives consumers on line shopping mall service. Once the consumer purchase, he is registered as regular. Besides, the consumers who do not know each other, can share information, suggest products, spread the news.

The Sociological Antecedents of Brand Attachment: A comparison of Broadcasting and Passive Consumption on Social Networking Sites (상표 애착의 사회적 선행변수에 대한 연구)

  • Shin, Jong-Kuk;Park, Min-Sook;Ross, Corey Allen
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.159-170
    • /
    • 2016
  • In this study, the authors examine the ways in which social media ultimately affects the attachment of individuals to their favorite brands. Through an analysis of data using multiple linear regression, this study finds that SNS (social networking site) users that post status updates for a wide audience have no bearing on the individual's use of socialization agents. Those who consume social news passively are, however, likely to depend on socialization agents for determining their final purchase decisions. Socialization agents, both personal and non-personal, also play a role in the formation of brand attachment among individuals who depend on these social sources. Based on these results, marketers are encouraged to establish an online footprint of a social nature to formulate brand awareness and to provide a means for users of social media to improve their brand attachments to their favored brands. As this research was conducted exclusively in the predominantly collective culture of South Korea, further studies could attempt to analyze social networking use and socialization agent use via a cross-culture study, particularly one including an individualistic culture.

Research on the Strategy to build the Tourism Brand Image for the Inducement of Foreign Tourist in Chungnam (외국인 관광객 유치를 위한 충남관광 브랜드이미지 구축에 관한 연구)

  • You, Ho-Jong
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.121-145
    • /
    • 2012
  • This research was performed to review the marketing PR(MPR) strategy to build the brand image of Chungnam tourism for the inducement of foreign tourist. Because each local governments are looking for the industries of new growth power from the tourism industry recently, we applied the BI strategy of Chungnam tourism with expended BLC model and GRID model after we analyzed the variety of PR situation and tasks to build the Chungnam tourism's brand image in the competitive domestic and foreign tourism industry. In the result of the study, we set up the limited brand image of Chungnam tourism newly; also we derived a specific action plan. First of all, they need every possible means for Brand Awareness PR, Issue PR, Brand Loyalty PR, etc. depend on brand life cycle with the Chungnam's tourism service products. Secondly, for the each tourism service products, it is requiring to repositioning from present position (B, C, D area) to A area by MPR strategy. Finally, many additional MPR strategies should put in to support for building the brand image for the 'Tourism Chungnam'. The strategic SNS public relations are required with considerations of items that are necessarily need to have the reasons and circumstances for the new foreign tourists, so they can have experiences for the Chungnam Tourism. For the existing foreign tourists, we should keep to build relationship in order to give them trusts and to feel sympathy.

  • PDF

Investigation of Factors Affecting the Effects of Online Consumer Reviews (온라인 소비자 리뷰의 효과에 영향을 미치는 요인에 대한 고찰)

  • Lee, Ho Geun;Kwak, Hyun
    • Informatization Policy
    • /
    • v.20 no.3
    • /
    • pp.3-17
    • /
    • 2013
  • As electronic marketplaces grow and a large number of consumers exchange their opinions on products and services on the Internet, many studies have been conducted in the area of online consumer reviews. This paper analyzes the research trend of the online consumer reviews by investigating those studies in an attempt to provide future research directions. Many researchers have focused on the effects of online reviews on consumer behaviors as well as the usefulness of the online reviews. In particular, review contents, characteristics of reviewers/consumers and features of products/services have been identified as influencing factors on the effects of the online consumer reviews. For the review contents, the number and the volume of the contents have increasing effects on the online reviews, while the direction (positive vs. negative) of the contents has resulted in conflicting effects of the review. The reputation and trustfulness of reviewers, consumers' prior knowledge on the products, consumers' product involvement, and types of the products were investigated as these factors influence the effectiveness of the online consumer reviews. Social media (such as Facebook and Twitter) nowadays play an important role to disseminate online reviews among consumers. Thus, it is necessary to study how social media influence the effects of online reviews on consumers. Since some firms abuse the online reviews for their own sakes, we recognize the necessity for empirical studies on the side effects of the online reviews.

  • PDF

Facebook Ambivalence by User Characteristics (사용자 특성에 따른 페이스북 이용의 양가성: 페이스북 이용의 순기능과 역기능을 통한 고찰)

  • Lee, Eunji;Cho, Minha;Ahn, Hongmin;Sung, Yongjun
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.43-53
    • /
    • 2018
  • Facebook, which has the largest number of users worldwide, has both positive and negative effects on our lives and society. The positive effects include social support from others, relationship building, entertainment, etc. In contrast, Facebook users also experience negative emotions such as tiredness and irritation, resulting in dissatisfaction as well as withdrawal from Facebook. The current study investigates both positive and negative effects of the use of by different demographic characteristics (i.e., age and gender), Facebook usage pattern (i.e., posters vs. lurkers), and Facebook usage time and frequency. The results show that (1) female users (vs. male users) feel higher level of fatigue and display stronger intention to discontinue Facebook. Moreover, (2) posters (vs. lurkers) feel higher level of positive emotions and social support, and stronger intention to continue Facebook. Lastly, (3) heavy users (vs. light users) exhibit higher level of positive emotions and stronger intentions to continue Facebook. This research sheds light on the fact that the characteristics of users affect individuals' intention to discontinue SNS and offers practical implications on the ever-expanding SNS market.

  • PDF

Relationship Analysis between Malware and Sybil for Android Apps Recommender System (안드로이드 앱 추천 시스템을 위한 Sybil공격과 Malware의 관계 분석)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1235-1241
    • /
    • 2016
  • Personalized App recommendation system is recently famous since the number of various apps that can be used in smart phones that increases exponentially. However, the site users using google play site with malwares have experienced severe damages of privacy exposure and extortion as well as a simple damage of satisfaction descent at the same time. In addition, Sybil attack (Sybil) manipulating the score (rating) of each app with falmay also present because of the social networks development. Up until now, the sybil detection studies and malicious apps studies have been conducted independently. But it is important to determine finally the existence of intelligent attack with Sybil and malware simultaneously when we consider the intelligent attack types in real-time. Therefore, in this paper we experimentally evaluate the relationship between malware and sybils based on real cralwed dataset of goodlplay. Through the extensive evaluations, the correlation between malware and sybils is low for malware providers to hide themselves from Anti-Virus (AV).

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

Component Grid: A Developer-centric Environment for Defense Software Reuse (컴포넌트 그리드: 개발자 친화적인 국방 소프트웨어 재사용 지원 환경)

  • Ko, In-Young;Koo, Hyung-Min
    • Journal of Software Engineering Society
    • /
    • v.23 no.4
    • /
    • pp.151-163
    • /
    • 2010
  • In the defense software domain where large-scale software products in various application areas need to be built, reusing software is regarded as one of the important practices to build software products efficiently and economically. There have been many efforts to apply various methods to support software reuse in the defense software domain. However, developers in the defense software domain still experience many difficulties and face obstacles in reusing software assets. In this paper, we analyze practical problems of software reuse in the defense software domain, and define core requirements to solve those problems. To meet these requirements, we are currently developing the Component Grid system, a reuse-support system that provides a developer-centric software reuse environment. We have designed an architecture of Component Grid, and defined essential elements of the architecture. We have also developed the core approaches for developing the Component Grid system: a semantic-tagging-based requirement tracing method, a reuse-knowledge representation model, a social-network-based asset search method, a web-based asset management environment, and a wiki-based collaborative and participative knowledge construction and refinement method. We expect that the Component Grid system will contribute to increase the reusability of software assets in the defense software domain by providing the environment that supports transparent and efficient sharing and reuse of software assets.

  • PDF