• Title/Summary/Keyword: Graduate School Model

Search Result 6,923, Processing Time 0.038 seconds

Comparative Study on the Carbon Stock Changes Measurement Methodologies of Perennial Woody Crops-focusing on Overseas Cases (다년생 목본작물의 탄소축적 변화량 산정방법론 비교 연구-해외사례를 중심으로)

  • Hae-In Lee;Yong-Ju Lee;Kyeong-Hak Lee;Chang-Bae Lee
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.25 no.4
    • /
    • pp.258-266
    • /
    • 2023
  • This study analyzed methodologies for estimating carbon stocks of perennial woody crops and the research cases in overseas countries. As a result, we found that Australia, Bulgaria, Canada, and Japan are using the stock-difference method, while Austria, Denmark, and Germany are estimating the change in the carbon stock based on the gain-loss method. In some overseas countries, the researches were conducted on estimating the carbon stock change using image data as tier 3 phase beyond the research developing country-specific factors as tier 2 phase. In South Korea, convergence studies as the third stage were conducted in forestry field, but advanced research in the agricultural field is at the beginning stage. Based on these results, we suggest directions for the following four future researches: 1) securing national-specific factors related to emissions and removals in the agricultural field through the development of allometric equation and carbon conversion factors for perennial woody crops to improve the completeness of emission and removals statistics, 2) implementing policy studies on the cultivation area calculation refinement with fruit tree-biomass-based maturity, 3) developing a more advanced estimation technique for perennial woody crops in the agricultural sector using allometric equation and remote sensing techniques based on the agricultural and forestry satellite scheduled to be launched in 2025, and to establish a matrix and monitoring system for perennial woody crop cultivation areas in the agricultural sector, Lastly, 4) estimating soil carbon stocks change, which is currently estimated by treating all agricultural areas as one, by sub-land classification to implement a dynamic carbon cycle model. This study suggests a detailed guideline and advanced methods of carbon stock change calculation for perennial woody crops, which supports 2050 Carbon Neutral Strategy of Ministry of Agriculture, Food, and Rural Affairs and activate related research in agricultural sector.

A Study on the Types and Characteristics of Tech Start-up Preparation of Middle-Aged Entrepreneurs (중장년 기술창업가의 창업 준비 유형 및 특성에 대한 연구)

  • Sungpyo, Hong;Minhee, Kim
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.1
    • /
    • pp.125-140
    • /
    • 2023
  • Careful preparation for a start-up can lower the risk of failure and create a successful business model. However, there are still challenges for middle-aged entrepreneurs, as start-up services and policies are often not readily accessible or fully utilized. Despite active research on middle-aged start-ups, previous studies have not delved deeply into the demographics of start-up preparation and various preparation behaviors. In response to this, a study was conducted to identify which start-up support services middle-aged entrepreneurs use, and how start-up preparation can be classified based on this. Data from 324 middle-aged tech start-up owners, based in Seoul and who started their businesses within the past 7 years, was collected and analyzed. The results showed that middle-aged entrepreneurs had moderate start-up preparation, with the greatest focus on the preparation period and the least focus on start-up education. Latent Profile Analysis revealed three groups of start-up preparation types among middle-aged entrepreneurs: "Overall Tribal Type," "Lack of Start-up Education Type," and "Comprehensive Preparation Type." BCH was performed on start-up satisfaction, start-up competence, fear of failure, access to start-up services, and support needs for middle-aged entrepreneurs based on the preparation type. The results showed that "Overall Tribal Type" had statistically lower start-up satisfaction, competence, and service accessibility compared to the other groups. Meanwhile, "Comprehensive Preparation Type" had a statistically lower fear of failure than the other types. "Overall Tribal Type" also had lower accessibility to middle-aged start-up services. All types had a high recognition of the need for support for specialized middle-aged start-ups. The findings highlight the need for more comprehensive support for middle-aged entrepreneurs. This could include expanding support projects to enhance their level of preparation, providing customized support based on their level of preparation, and improving the visibility and accessibility of start-up support services for middle-aged individuals. Additionally, specialized education that addresses the characteristics of middle-aged individuals should be provided.

  • PDF

Investment Priorities and Weight Differences of Impact Investors (임팩트 투자자의 투자 우선순위와 비중 차이에 관한 연구)

  • Yoo, Sung Ho;Hwangbo, Yun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.3
    • /
    • pp.17-32
    • /
    • 2023
  • In recent years, the need for social ventures that aim to grow while solving social problems through the efficiency and effectiveness of commercial organizations in the market has increased, while there is a limit to how much the government and the public can do to solve social problems. Against this background, the number of social venture startups is increasing in the domestic startup ecosystem, and interest in impact investors, which are investors in social ventures, is also increasing. Therefore, this research utilized judgment analysis technology to objectively analyze the validity and weight of judgment information based on the cognitive process and decision-making environment in the investment decision-making of impact investors. We proceeded with the research by constructing three classifications; first, investment priorities at the initial investment stage for financial benefit and return on investment as an investor, second, the political skills of the entrepreneurs (teams) for the social impact and ripple power, and social venture coexistence and solidarity, third, the social mission of a social venture that meets the purpose of an impact investment fund. As a result of this research, first of all, the investment decision-making priorities of impact investors are the expertise of the entrepreneur (team), the potential rate of return when the entrepreneur (team) succeeds, and the social mission of the entrepreneur (team). Second, impact investors do not have a uniform understanding of the investment decision-making factors, and the factors that determine investment decisions are different, and there are differences in the degree of the weighting. Third, among the various investment decision-making factors of impact investment, "entrepreneur's (team's) networking ability", "entrepreneur's (team's) social insight", "entrepreneur's (team's) interpersonal influence" was relatively lower than the other four factors. The practical contribution through this research is to help social ventures understand the investment determinant factors of impact investors in the process of financing, and impact investors can be expected to improve the quality of investment decision-making by referring to the judgment cases and analysis of impact investors. The academic contribution is that it empirically investigated the investment priorities and weighting differences of impact investors.

  • PDF

Privacy Intrusion Intention on SNS: From Perspective of Intruders (SNS상에서 프라이버시 침해의도: 가해자 관점으로)

  • Eden Lee;Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.17-39
    • /
    • 2018
  • SNS enables people to easily connect and communicate with each other. People share information, including personal information, through SNS. Users are concerned about their privacies, but they unconsciously or consciously disclose their personal information on SNS to interact with others. The privacy of a self-disclosed person can be intruded by others. A person can write, fabricate, or distribute a story using the disclosed information of another even without obtaining consent from the information owner. Many studies focused on privacy intrusion, especially from the perspective of a victim. However, only a few studies examined privacy intrusion from the perspective of an intruder on SNS. This study focuses on the intention of privacy intrusion from the perspective of an intruder on SNS and the factors that affect intention. Privacy intrusion intentions are categorized into two types. The first type is intrusion of privacy by writing one's personal information without obtaining consent from the information owner;, whereas the other type pertains to intrusion of privacy by distributing one's personal information without obtaining consent from the information owner. A research model is developed based on motivation theory to identify how these factors affect these two types of privacy intrusion intentions on SNS. From the perspective of motivation theory, we draw one extrinsic motivational factor (response cost) and four intrinsic motivational factors, namely, perceived enjoyment, experience of being intruded on privacy, experience of invading someone's privacy, and punishment behavior. After analyzing 202survey data, we conclude that different factors affect these two types of privacy intrusion intention. However, no relationship was found between the two types of privacy intrusion intentions. One of the most interesting findings is that the experience of privacy intrusion is the most significant factor related to the two types of privacy intrusion intentions. The findings contribute to the literature on privacy by suggesting two types of privacy intrusion intentions on SNS and identifying their antecedents from the perspective of an intruder. Practitioners can also use the findings to develop SNS applications that can improve protection of user privacies and legitimize proper regulations relevant to online privacy.

A Hybrid Recommender System based on Collaborative Filtering with Selective Use of Overall and Multicriteria Ratings (종합 평점과 다기준 평점을 선택적으로 활용하는 협업필터링 기반 하이브리드 추천 시스템)

  • Ku, Min Jung;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.85-109
    • /
    • 2018
  • Recommender system recommends the items expected to be purchased by a customer in the future according to his or her previous purchase behaviors. It has been served as a tool for realizing one-to-one personalization for an e-commerce service company. Traditional recommender systems, especially the recommender systems based on collaborative filtering (CF), which is the most popular recommendation algorithm in both academy and industry, are designed to generate the items list for recommendation by using 'overall rating' - a single criterion. However, it has critical limitations in understanding the customers' preferences in detail. Recently, to mitigate these limitations, some leading e-commerce companies have begun to get feedback from their customers in a form of 'multicritera ratings'. Multicriteria ratings enable the companies to understand their customers' preferences from the multidimensional viewpoints. Moreover, it is easy to handle and analyze the multidimensional ratings because they are quantitative. But, the recommendation using multicritera ratings also has limitation that it may omit detail information on a user's preference because it only considers three-to-five predetermined criteria in most cases. Under this background, this study proposes a novel hybrid recommendation system, which selectively uses the results from 'traditional CF' and 'CF using multicriteria ratings'. Our proposed system is based on the premise that some people have holistic preference scheme, whereas others have composite preference scheme. Thus, our system is designed to use traditional CF using overall rating for the users with holistic preference, and to use CF using multicriteria ratings for the users with composite preference. To validate the usefulness of the proposed system, we applied it to a real-world dataset regarding the recommendation for POI (point-of-interests). Providing personalized POI recommendation is getting more attentions as the popularity of the location-based services such as Yelp and Foursquare increases. The dataset was collected from university students via a Web-based online survey system. Using the survey system, we collected the overall ratings as well as the ratings for each criterion for 48 POIs that are located near K university in Seoul, South Korea. The criteria include 'food or taste', 'price' and 'service or mood'. As a result, we obtain 2,878 valid ratings from 112 users. Among 48 items, 38 items (80%) are used as training dataset, and the remaining 10 items (20%) are used as validation dataset. To examine the effectiveness of the proposed system (i.e. hybrid selective model), we compared its performance to the performances of two comparison models - the traditional CF and the CF with multicriteria ratings. The performances of recommender systems were evaluated by using two metrics - average MAE(mean absolute error) and precision-in-top-N. Precision-in-top-N represents the percentage of truly high overall ratings among those that the model predicted would be the N most relevant items for each user. The experimental system was developed using Microsoft Visual Basic for Applications (VBA). The experimental results showed that our proposed system (avg. MAE = 0.584) outperformed traditional CF (avg. MAE = 0.591) as well as multicriteria CF (avg. AVE = 0.608). We also found that multicriteria CF showed worse performance compared to traditional CF in our data set, which is contradictory to the results in the most previous studies. This result supports the premise of our study that people have two different types of preference schemes - holistic and composite. Besides MAE, the proposed system outperformed all the comparison models in precision-in-top-3, precision-in-top-5, and precision-in-top-7. The results from the paired samples t-test presented that our proposed system outperformed traditional CF with 10% statistical significance level, and multicriteria CF with 1% statistical significance level from the perspective of average MAE. The proposed system sheds light on how to understand and utilize user's preference schemes in recommender systems domain.

Effect of 6-Hydroxydopamine (6-OHDA) on the Expression of Hypothalamus-Pituitary Axis Hormone Genes in Male Rats (수컷 흰쥐의 시상하부-뇌하수체 축 호르몬 유전자 발현에 미치는 6-Hydroxydopamine(6-OHDA)의 영향)

  • Heo, Hyun-Jin;Ahn, Ryun-Sup;Lee, Sung-Ho
    • Development and Reproduction
    • /
    • v.13 no.4
    • /
    • pp.257-264
    • /
    • 2009
  • A neurotoxin, 6-hydroxydopamine (6-OHDA) has been widely used to create animal model for Parkinson's disease (PD) due to its specific toxicity against dopaminergic (DA) neurons. Since DA signals modulate a broad spectrum of CNS physiology, one can expect profound alterations in neuroendocrine activities of both PD patients and 6-OHDA treated animals. Limited applications of 6-OHDA injection model, however, have been made on the studies of hypothalamuspituitary neuroendocrine circuits. The present study was performed to examine whether blockade of brain catecholamine (CA) biosynthesis with 6-OHDA can make any alteration in the transcriptional activities of hypothalamus-pituitary hormone genes in adult male rats. Three-month-old male rats (SD strain) were received 6-OHDA ($200{\mu}g$ in $10{\mu}\ell$ of saline/animal) by intracerebroventricular (icv) injection, and sacrificed after two weeks. To determine the mRNA levels of hypothalamuspituitary hormone genes, total RNAs were extracted and applied to the semi-quantitative RT-PCRs. The mRNA levels of tyrosine hydroxylase (TH), the rate-limiting enzyme for the catecholamine biosynthesis, were significantly lower than those from the control group (control:6-OHDA=1:0.72${\pm}$0.02AU, p<0.001), confirming the efficacy of 6-OHDA injection. The mRNA levels of gonadotropin-releasing hormone (GnRH) and corticotropin releasing hormone (CRH) in the hypothalami from 6-OHDA group were significantly lower than those from the control group (GnRH, control:6-OHDA=1:0.39${\pm}$0.03AU, p<0.001; CRH, control:6-OHDA=1:0.76${\pm}$0.07AU, p<0.01). There were significant decreases in the mRNA levels of common alpha subunit of glycoprotein homones (Cg$\alpha$), LH beta subunit (LH-$\beta$), and FSH beta subunit (FSH-$\beta$) in pituitaries from 6-OHDA group compared to control values (Cg$\alpha$, control:6-OHDA=1:0.81${\pm}$0.02AU, p<0.001; LH-$\beta$, control:6-OHDA=1:0.68${\pm}$0.04AU, p<0.001; FSH-$\beta$, control:6-OHDA=1:0.84${\pm}$0.05AU, p<0.001). Similarly, the level of adrenocorticotrophic hormone (ACTH) transcripts from 6-OHDA group was significantly lower than that from the control group (control: 6-OHDA=1:0.86${\pm}$0.04AU, p<0.01). The present study demonstrated that centrally injected DA neurotoxin could downregulate the transcriptional activities of the two hypothalamus-pituitary neuroendocrine circuits, i.e., GnRH-gonadotropins and CRH-ACTH systems. These results suggested that hypothalamic CA input might affect on the activities of gonad and adrenal through modulation of hypothalamus-pituitary function, providing plausible explanation for frequent occurrence of sexual dysfunction and poor stress-response in PD patients.

  • PDF

An Intelligent Decision Support System for Selecting Promising Technologies for R&D based on Time-series Patent Analysis (R&D 기술 선정을 위한 시계열 특허 분석 기반 지능형 의사결정지원시스템)

  • Lee, Choongseok;Lee, Suk Joo;Choi, Byounggu
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.79-96
    • /
    • 2012
  • As the pace of competition dramatically accelerates and the complexity of change grows, a variety of research have been conducted to improve firms' short-term performance and to enhance firms' long-term survival. In particular, researchers and practitioners have paid their attention to identify promising technologies that lead competitive advantage to a firm. Discovery of promising technology depends on how a firm evaluates the value of technologies, thus many evaluating methods have been proposed. Experts' opinion based approaches have been widely accepted to predict the value of technologies. Whereas this approach provides in-depth analysis and ensures validity of analysis results, it is usually cost-and time-ineffective and is limited to qualitative evaluation. Considerable studies attempt to forecast the value of technology by using patent information to overcome the limitation of experts' opinion based approach. Patent based technology evaluation has served as a valuable assessment approach of the technological forecasting because it contains a full and practical description of technology with uniform structure. Furthermore, it provides information that is not divulged in any other sources. Although patent information based approach has contributed to our understanding of prediction of promising technologies, it has some limitations because prediction has been made based on the past patent information, and the interpretations of patent analyses are not consistent. In order to fill this gap, this study proposes a technology forecasting methodology by integrating patent information approach and artificial intelligence method. The methodology consists of three modules : evaluation of technologies promising, implementation of technologies value prediction model, and recommendation of promising technologies. In the first module, technologies promising is evaluated from three different and complementary dimensions; impact, fusion, and diffusion perspectives. The impact of technologies refers to their influence on future technologies development and improvement, and is also clearly associated with their monetary value. The fusion of technologies denotes the extent to which a technology fuses different technologies, and represents the breadth of search underlying the technology. The fusion of technologies can be calculated based on technology or patent, thus this study measures two types of fusion index; fusion index per technology and fusion index per patent. Finally, the diffusion of technologies denotes their degree of applicability across scientific and technological fields. In the same vein, diffusion index per technology and diffusion index per patent are considered respectively. In the second module, technologies value prediction model is implemented using artificial intelligence method. This studies use the values of five indexes (i.e., impact index, fusion index per technology, fusion index per patent, diffusion index per technology and diffusion index per patent) at different time (e.g., t-n, t-n-1, t-n-2, ${\cdots}$) as input variables. The out variables are values of five indexes at time t, which is used for learning. The learning method adopted in this study is backpropagation algorithm. In the third module, this study recommends final promising technologies based on analytic hierarchy process. AHP provides relative importance of each index, leading to final promising index for technology. Applicability of the proposed methodology is tested by using U.S. patents in international patent class G06F (i.e., electronic digital data processing) from 2000 to 2008. The results show that mean absolute error value for prediction produced by the proposed methodology is lower than the value produced by multiple regression analysis in cases of fusion indexes. However, mean absolute error value of the proposed methodology is slightly higher than the value of multiple regression analysis. These unexpected results may be explained, in part, by small number of patents. Since this study only uses patent data in class G06F, number of sample patent data is relatively small, leading to incomplete learning to satisfy complex artificial intelligence structure. In addition, fusion index per technology and impact index are found to be important criteria to predict promising technology. This study attempts to extend the existing knowledge by proposing a new methodology for prediction technology value by integrating patent information analysis and artificial intelligence network. It helps managers who want to technology develop planning and policy maker who want to implement technology policy by providing quantitative prediction methodology. In addition, this study could help other researchers by proving a deeper understanding of the complex technological forecasting field.

A Study on the Influence of the Selective Attributes of Home Meal Replacement on Perceived Utilitarian Value and Repurchase Intention: Focus on Consumers of Large Discount and Department Stores (HMR(Home Meal Replacement) 선택속성이 지각된 효용적 가치, 재구매 의도에 미치는 영향에 관한 연구: 대형 할인마트와 백화점 구매고객을 대상으로)

  • Seo, Kyung-Hwa;Choi, Won-Sik;Lee, Soo-Bum
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.21 no.6
    • /
    • pp.934-947
    • /
    • 2011
  • The purpose of this study is to analyze products for good taste and convenience, which become an engine to constantly create customers. In addition, this study is aimed at investigating the relationship between the selective attributes of Home Meal Replacement, the perceived utilitarian value, and the repurchase intention, and drawing new suggestions on the Home Meal Replacement market from a new marketing perspective. Based on a total of 215 samples, this study reviewed the reliability and fitness of the research model and verified a total of 5 hypothesized using the Amos program. The result of study modeling was GFI=0.905, AGFI=0.849, NFI=0.889, CFI=0.945, and RMR=0.0.092 at the level of $x^2$=230.22 (df=126, p<0.001). First, the food quality (${\beta}$=0.221), convenience (${\beta}$=0.334), packing (${\beta}$=0.278), and employee service (${\beta}$=0.204) of home meal replacement consideration attributes had a positive (+) influence on perceived utilitarian value. Second, perceived utilitarian value (${\beta}$=0.584) had a positive (+) influence on repurchase intention. The factors to differentiate one company from other competitors in terms of the utilitarian value are the quality of food, convenience, wrapping, and services by employees. This study has illustrated the need to focus on the development of a premium menu to compete with other companies and to continue to research and develop nutritious foods that are easy to cook. Moreover, the key factors to have a distinct and constant competitive edge over other companies are the alleviation of consumer anxiety over wrapping container materials, the development of more designs, and the accumulation of service know-how. Therefore, it is necessary for a company to strongly develop the key factors based on its resources as a core capability.

Estimation of GARCH Models and Performance Analysis of Volatility Trading System using Support Vector Regression (Support Vector Regression을 이용한 GARCH 모형의 추정과 투자전략의 성과분석)

  • Kim, Sun Woong;Choi, Heung Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.107-122
    • /
    • 2017
  • Volatility in the stock market returns is a measure of investment risk. It plays a central role in portfolio optimization, asset pricing and risk management as well as most theoretical financial models. Engle(1982) presented a pioneering paper on the stock market volatility that explains the time-variant characteristics embedded in the stock market return volatility. His model, Autoregressive Conditional Heteroscedasticity (ARCH), was generalized by Bollerslev(1986) as GARCH models. Empirical studies have shown that GARCH models describes well the fat-tailed return distributions and volatility clustering phenomenon appearing in stock prices. The parameters of the GARCH models are generally estimated by the maximum likelihood estimation (MLE) based on the standard normal density. But, since 1987 Black Monday, the stock market prices have become very complex and shown a lot of noisy terms. Recent studies start to apply artificial intelligent approach in estimating the GARCH parameters as a substitute for the MLE. The paper presents SVR-based GARCH process and compares with MLE-based GARCH process to estimate the parameters of GARCH models which are known to well forecast stock market volatility. Kernel functions used in SVR estimation process are linear, polynomial and radial. We analyzed the suggested models with KOSPI 200 Index. This index is constituted by 200 blue chip stocks listed in the Korea Exchange. We sampled KOSPI 200 daily closing values from 2010 to 2015. Sample observations are 1487 days. We used 1187 days to train the suggested GARCH models and the remaining 300 days were used as testing data. First, symmetric and asymmetric GARCH models are estimated by MLE. We forecasted KOSPI 200 Index return volatility and the statistical metric MSE shows better results for the asymmetric GARCH models such as E-GARCH or GJR-GARCH. This is consistent with the documented non-normal return distribution characteristics with fat-tail and leptokurtosis. Compared with MLE estimation process, SVR-based GARCH models outperform the MLE methodology in KOSPI 200 Index return volatility forecasting. Polynomial kernel function shows exceptionally lower forecasting accuracy. We suggested Intelligent Volatility Trading System (IVTS) that utilizes the forecasted volatility results. IVTS entry rules are as follows. If forecasted tomorrow volatility will increase then buy volatility today. If forecasted tomorrow volatility will decrease then sell volatility today. If forecasted volatility direction does not change we hold the existing buy or sell positions. IVTS is assumed to buy and sell historical volatility values. This is somewhat unreal because we cannot trade historical volatility values themselves. But our simulation results are meaningful since the Korea Exchange introduced volatility futures contract that traders can trade since November 2014. The trading systems with SVR-based GARCH models show higher returns than MLE-based GARCH in the testing period. And trading profitable percentages of MLE-based GARCH IVTS models range from 47.5% to 50.0%, trading profitable percentages of SVR-based GARCH IVTS models range from 51.8% to 59.7%. MLE-based symmetric S-GARCH shows +150.2% return and SVR-based symmetric S-GARCH shows +526.4% return. MLE-based asymmetric E-GARCH shows -72% return and SVR-based asymmetric E-GARCH shows +245.6% return. MLE-based asymmetric GJR-GARCH shows -98.7% return and SVR-based asymmetric GJR-GARCH shows +126.3% return. Linear kernel function shows higher trading returns than radial kernel function. Best performance of SVR-based IVTS is +526.4% and that of MLE-based IVTS is +150.2%. SVR-based GARCH IVTS shows higher trading frequency. This study has some limitations. Our models are solely based on SVR. Other artificial intelligence models are needed to search for better performance. We do not consider costs incurred in the trading process including brokerage commissions and slippage costs. IVTS trading performance is unreal since we use historical volatility values as trading objects. The exact forecasting of stock market volatility is essential in the real trading as well as asset pricing models. Further studies on other machine learning-based GARCH models can give better information for the stock market investors.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.