• Title/Summary/Keyword: 역할 공유

Search Result 1,005, Processing Time 0.025 seconds

Methodology for Identifying Issues of User Reviews from the Perspective of Evaluation Criteria: Focus on a Hotel Information Site (사용자 리뷰의 평가기준 별 이슈 식별 방법론: 호텔 리뷰 사이트를 중심으로)

  • Byun, Sungho;Lee, Donghoon;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.23-43
    • /
    • 2016
  • As a result of the growth of Internet data and the rapid development of Internet technology, "big data" analysis has gained prominence as a major approach for evaluating and mining enormous data for various purposes. Especially, in recent years, people tend to share their experiences related to their leisure activities while also reviewing others' inputs concerning their activities. Therefore, by referring to others' leisure activity-related experiences, they are able to gather information that might guarantee them better leisure activities in the future. This phenomenon has appeared throughout many aspects of leisure activities such as movies, traveling, accommodation, and dining. Apart from blogs and social networking sites, many other websites provide a wealth of information related to leisure activities. Most of these websites provide information of each product in various formats depending on different purposes and perspectives. Generally, most of the websites provide the average ratings and detailed reviews of users who actually used products/services, and these ratings and reviews can actually support the decision of potential customers in purchasing the same products/services. However, the existing websites offering information on leisure activities only provide the rating and review based on one stage of a set of evaluation criteria. Therefore, to identify the main issue for each evaluation criterion as well as the characteristics of specific elements comprising each criterion, users have to read a large number of reviews. In particular, as most of the users search for the characteristics of the detailed elements for one or more specific evaluation criteria based on their priorities, they must spend a great deal of time and effort to obtain the desired information by reading more reviews and understanding the contents of such reviews. Although some websites break down the evaluation criteria and direct the user to input their reviews according to different levels of criteria, there exist excessive amounts of input sections that make the whole process inconvenient for the users. Further, problems may arise if a user does not follow the instructions for the input sections or fill in the wrong input sections. Finally, treating the evaluation criteria breakdown as a realistic alternative is difficult, because identifying all the detailed criteria for each evaluation criterion is a challenging task. For example, if a review about a certain hotel has been written, people tend to only write one-stage reviews for various components such as accessibility, rooms, services, or food. These might be the reviews for most frequently asked questions, such as distance between the nearest subway station or condition of the bathroom, but they still lack detailed information for these questions. In addition, in case a breakdown of the evaluation criteria was provided along with various input sections, the user might only fill in the evaluation criterion for accessibility or fill in the wrong information such as information regarding rooms in the evaluation criteria for accessibility. Thus, the reliability of the segmented review will be greatly reduced. In this study, we propose an approach to overcome the limitations of the existing leisure activity information websites, namely, (1) the reliability of reviews for each evaluation criteria and (2) the difficulty of identifying the detailed contents that make up the evaluation criteria. In our proposed methodology, we first identify the review content and construct the lexicon for each evaluation criterion by using the terms that are frequently used for each criterion. Next, the sentences in the review documents containing the terms in the constructed lexicon are decomposed into review units, which are then reconstructed by using the evaluation criteria. Finally, the issues of the constructed review units by evaluation criteria are derived and the summary results are provided. Apart from the derived issues, the review units are also provided. Therefore, this approach aims to help users save on time and effort, because they will only be reading the relevant information they need for each evaluation criterion rather than go through the entire text of review. Our proposed methodology is based on the topic modeling, which is being actively used in text analysis. The review is decomposed into sentence units rather than considering the whole review as a document unit. After being decomposed into individual review units, the review units are reorganized according to each evaluation criterion and then used in the subsequent analysis. This work largely differs from the existing topic modeling-based studies. In this paper, we collected 423 reviews from hotel information websites and decomposed these reviews into 4,860 review units. We then reorganized the review units according to six different evaluation criteria. By applying these review units in our methodology, the analysis results can be introduced, and the utility of proposed methodology can be demonstrated.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

The Relationship between Daesoon Thought and Prophecies of Jeong Gam: Emphasizing the Chinese Poetic Sources Transfigured by Jeungsan (대순사상과 『정감록』의 관계 - 증산이 변용한 한시 전거(典據)를 중심으로 -)

  • Park, Sang-kyu
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.36
    • /
    • pp.1-34
    • /
    • 2020
  • It has been suggested that Jeungsan's prophetic poem that starts with the verse "For about seven or eight years, there will be a castle in the ancient country [七八年間古國城] ⋯" originally comes from Prophecies of Jeong Gam (鄭鑑錄). Despite Jeungsan, himself, obviously having been critical of that text, this claim has become the basic grounds for discourse suggesting that Jeungsan was not only interested in Prophecies of Jeong Gam but also considerably influenced by the text. However, the claim itself was formulated due to misunderstandings of the Chinese poems that had been included in A Compilation of Secret Prophecies Hidden in the Family-clan of Seogye (西溪家臧訣). These poems pursue a different ideological orientation than the poem from Prophecies of Jeong Gam. Ultimately, the Chinese poem in the verse 84 the chapter titled, Prophetic Elucidations in The Canonical Scripture of Daesoon Jinrihoe cannot provide a basis for the claim that Jeungsan was strongly influenced by Prophecies of Jeong Gam. This claim that Prophecies of Jeong Gam made a deep impact on Jeungsan and Daesoon Thought was based on three other texts outside of those that appear within verse 84 of Prophetic Elucidations. The first supposedly-related line is: "Heaven opens at the period of the Rat (Ja 子), Earth opens at the period of the Ox (Chuk 丑), humankind starts at the period of the Tiger (Ihn 寅)." This line comes from from Shao Kangjie's Book of Supreme World Ordering Principles (皇極經世), and the line could be quoted idiomatically as an expression in the Joseon Dynasty. Accordingly, attempts to relate Daesoon Thought to Prophecies of Jeong Gam are a distortion that arise from the assumption that Jeungsan had a significant interest in Prophecies of Jeong Gam. The second related line is "At the foot of Mount Mother (母岳山), a golden icon of Buddha has the ability to speak [母岳山下 金佛能言]." That line is nearly identical to the verse "On the summit of Mount Mother, a golden icon of Buddha has the ability to speak [母岳山頭 金佛能言]." Yet, Jeungsan changed '頭 (du, the summit)' to '下 (ha, the foot or under)' and express his own unique religious prophecy. This allusion to the prophecies of Jeong Gam is actually a criticism designed to disprove the earlier prophecy. Third, is the verse, "The form of Buddhism, creation of daoism, and propriety of Confucianism [佛之形體仙之造化儒之凡節]," which is characteristically related to Daesoon Thought. This verse can only be found in the prophetic text, Prophecies of Chochang (蕉蒼訣), and it is provided a main source when alleging that Prophecies of Jeong Gam was an influence on Daesoon Thought. However, considering the context of Prophecies of Chochang and the year of its publication (it is assumed to be compiled after 1950s), this does not hold water as Jeungsan had already passed into Heaven several decades before that time. This disqualifies the verse from being a basis for asserting Prophecies of Jeong Gam as an influence on Daesoon Thought. Contrary to the original assertion, there is a considerable amount of evidence that Prophecies of Chochang absorbed aspects of Daesoon Thought, which were simply revised in a novel way. There is no truly compelling evidence underpinning the argument that Prophecies of Jeong Gam had a unilateral impact on Daesoon Thought. There seems to be a great deal of confusion and numerous misinterpretations on this matter. Therefore, the claim that Daesoon Thought, as developed by Jeungsan, was influenced by the discourse on dynastic revolution and feng shui contained in Prophecies of Jeong Gam should be re-examined at the level of its very premise.

Analysis of the Stage and Performance Elements for Bongsudang-jinchan Banquet in Joseon Dynasty (봉수당진찬(奉壽堂進饌)의 무대와 공연 요소 분석)

  • Song, Hye-jin
    • (The) Research of the performance art and culture
    • /
    • no.18
    • /
    • pp.413-444
    • /
    • 2009
  • This paper is an analysis of stage and performance elements for the ceremonial procedures and dance featured in bongsudang-jinchan, a feast celebrating the 60th birthday of Hyegyeong-gung Hongssi (Crown Princess Hong of Hyegyeonggung), the mother of King Jeongjo, which took place in Hwaseong haegung palace in 1795. The primary sources used are data on bongsudangjinchan recorded in Wonhaeng-eulmyojeongriuigwe, Jeongjo-sillok, Hongjae-jeonseo, pictorial sources such as Folding Screens of Hwaseong-neunghaeng and Hwaseong Ilgi, which is a journal in Korean by Yi Hui-pyeong. A court ceremony to offer music, dance, flowers, and food, as well as wine and poetry which express the sentiments of chung (fidelity) and hyo (filial piety) was considered a national ceremony and has constituted a unique musical culture during the 500 years of Joseon dynasty. However, after the fall of Joseon dynasty, ceremonial music and dance, which have been organically linked within the overall symbolic system of ye (courtesy), became scattered to become independent 'pieces.' As a result, all of their philosophy, principles, and the time-space interpretation of court music and dance became greatly reduced, leaving only the artistic expression and formal structure of the music and dance to become emphasized. Since the 1990s, there has been many research and events aiming to re-create the court ceremonial tradition, resulting in the increase of the related performance activities. This is especially true with bongsudang-jinchan, which is now being performed on modern stage in various forms. However there are still many problems to be solved, such as the issue of re-creating and restoring the original, and the question of artistic value found in the traditional pieces. Until now, much focus has been paid to the outer re-construction of uiju document as recorded in Wonhaeng-eulmyo-jeongriuigwe. On the other hand, there lacked an in-depth study which analyzes the stage situation and performance elements. Therefore in this paper, after focusing on the stage structure and performance elements, it is concluded that bongsudang-jinchan, the only court feast to be held in Haeng gung, not only consists of the fundamental aspects of court performance principle as 'governing through ye and ak (music),' but also served as an important occasion to bring together the sovereign and the subject. Bongsudang-jinchan had features of both naeyeon (feast for ladies) and oeyeon (feast for gentlemen). It minimized the use of screens and allowed every guest to enjoy food, music, and dance together, but provided a separate tent for foreign guests, maintaining the ideal balance between equality and distinction among different gender and social status. A screen symbolizing the venue for the feast is placed for all of the government officials. The king then pronounces the beginning of the banquet in which the ideal of gunsin-dongyeon (king and officials dining together) is realized. This indicates that bongsudang-jinchan, compared to other court ceremonies that emphasize the principle of yeak (courtesy and music), focuses more on the spirit of harmony and rapprochement. The king played a more active role in bongsudang-jinchan than in any other royal feasts. Examples as recorded in uiju documents are; Jeongjo's conversation with his retainers after the 7th wine, king's bestowing of food and flowers to the officials, writing his own majesty's poems with regard to the festival, and asking the retainers to write replying poems. All these played an important part in making the occasion more rich, extensive, and meaningful. Moreover, as analysis of the structure of orchestral music and court dance featured in bongsudang-jinchan shows, it was like any other court banquet in that it employed minimal use of extravagance in movements and conversation. However, the colors and tonal texture used in the music and dance were more brilliant in this case. Compared to other banquets that took place before king Jeongjo, the dance style was more diverse, which included some of the latest additions. There were past performances arranged anew. Noteworthy are; the incorporation of "Seonyurak (Boat Dance)" and "Geommu (Sword Dance)," traditionally used for local officials and civilians feast, to suit the court taste; and the use of saenghwang (mouth organ), which was a rising instrument in pungnyubang (literati's private salon), for "Hakmu (Cranes Dance)." This especially indicates the nature of the 'open structure' pursued by the court banquets at the time, which strove to break away from the traditional rules and customs and accept something new.