• Title/Summary/Keyword: Information Barriers

Search Result 617, Processing Time 0.027 seconds

A study on the impact of online contents characteristics on customer loyalty - Mediated effect of flow perspective - (고객충성도에 영향을 미치는 온라인 콘텐츠 특성에 관한연구 -몰입(Flow)의 매개효과를 중심으로 -)

  • Shin, Young-Chul;Jeong, Seung-Ryul
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.101-117
    • /
    • 2013
  • As the number of online game user has been rapidly increased thanks to the recent vitalization of online contents market, not only new business opportunity but also the opportunity to create high profits have been provided as well. However, the increase of the number of online game user and the rapid expansion of the market evoke a cutthroat completion among online game service providers, and also high barriers to entry to online game market have been erected. Thus, what kinds of efforts need for the business success and sales increase in online game market? In lots of researches regarding online contents business, the deepening of loyalty was considered as a critical factor for the business success. According to the study on user's behavior in online environment, users would experience the Flow while using online service, and then, if they were in state of the Flow, they would use the service constantly. High customer loyalty to online game means high will to use the online game too. The purpose of this research was i) to examine what factors enable users to be naturally immersed in online game while playing it, ii) to examine what properties of online game can make game more interesting and exciting, iii) to verify that such factors are critical in deepening customer loyalty, and iv) to suggest some essential factors to be fun and exciting games, on where the focus should be put, and the directionality for the development for sales expansion of online game developer or online game service provider. The research results are as below: First, the involvement and the perceived quality which were characteristics of brand appeared to be factors most affecting Flow. This shows that once game user get interested in online game that user has played frequently, even though new games are released, user will continuously flow the game not moving to new games, and also shows that users not only get more interested but also put more trust in games in the site to where users are frequently going than games in other sites, and consequently user can increasingly flow the game. Second, the compensation and graphics which are the characteristics of contents appeared to be factors affecting Flow. Proper compensation which is given to game users triggers fun and interests in game and makes them flow more and more. And graphics make users to feel game space as if real space and let them flow in game with more reality. Third, challenges, support, and the stability which are technical characteristics appeared to be factors affecting Flow. Challenges enable users to not only experience new virtual world but also solve various difficulties and obstacles. Once users feel fun and interests through this challenge, they can naturally flow games. In addition, the stability of network provides reliability in security and hacking. By doing so, it can induce users to flow more and more. Lastly, when aforementioned characteristics including contents characteristics, technical characteristics, and brand characteristics are organically combined each other, game users feel fun and total minutes are naturally increased, so that game users experience Flow, and consequently the customer loyalty will be deepened as well.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Relationship between Access to Lewd Internet Contents by Middle School Students and Their Awareness of Sex (중학생의 인터넷음란물 접속과 성 의식의 관계)

  • Lim, Jong-In;Choi, In-Sook
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.4
    • /
    • pp.117-139
    • /
    • 2003
  • The purpose of this research lies in presenting logical viability for the measures that curtail access to lewd Internet contents by middle school students amidst the reality in which lewd contents are circulated freely through the Internet, a medium that the middle school students find most easy to access. In order to establish right form of awareness towards sex, this research identified the ways they access the lewd Internet contents, their reaction after the exposure to those contents, their knowledge of sex, their concerns regarding sex and their accessibility to sexual activities in order to conduct a comparative analysis on the relationship between lewd Internet contents and their awareness of sex. First, realities of accessing lewd Internet contents and reactions according to the demographics of middle school students There isa significant difference in the experience of accessing lewd Internet contents in terms of gender. Mostly, male students tend to access the contents more. As for the way they access the lewd Internet contents, both male and female students replied that they access through spam mail of lewd nature. Thus, measures to address this problem are needed urgently. As to when they first accessed the lewd contents, most of the research subjects replied that they accessed either in elementary school period or in the early middle school period. This shows that most of the students got exposed to lewd contents even before they could establish positive, correct awareness of sex. Thus, there is a risk that they may formulate wrong kind of sexual awareness. Accordingly, it is necessary to develop measures through focused sex education. Students are divided into two groups according to the time they spend on the contents averagely: those who spend over one hour and those who spend less than an hour on the lewd contents. If the students spending longer hours are not to be checked and properly guided, it may lead to increasing cases of sexual delinquencies due to their wrongly formed awareness of sex. When the question of existence(non-existence) of guardian was addressed, students with both parents tend to access the lewd Internet contents in a more diverse manner and tend to access more compared to those students from single parent or no-parent families. Accordingly, guardians need to pay attention to how their children are using the Internet. Second, awareness of sex depending on the middle school students' demographics In case of sexual knowledge, middle school students shows relatively high level of knowledge. In particular, female students are found more knowledgeable than male students, and the students in upper years are more knowledgeable as well. As a result, this research recommends that the students in lower years should be guided with more basc and detailed information, while those in upper years need to be taught to form and express their own thoughts and attitudes and to build up independence on this matter. In case of worries about sex, both male and female students don't worry too much about it. However, male students are more concerned about sex than female students in a more diverse ways. As for the differences by academic year, concerns for sex increase, as students get older. Accordingly, sex education that helps establish sound perception of the opposite sex and that focuses on the etiquettes that one must adhere to at the presence of the opposite sex need to be conducted against middle school students. In case of accessibility to sex, male students manifest higher tendency than female students. As for the differences by academic year, those in the first and second years show higher accessibility than those in their third year. In general, younger students tend to be more open-minded toward sex. Accordingly, students in lower academic years need to undergo basic knowledge oriented sex education, whereas those in upper academic years need to undergo discussion centered sex education where they subject to questions regarding their attitude and opinion. Third, relationship between the reactions after the exposure to the lewd Internet contents and their awareness of sex As the frequency of contact with lewd Internet contents increases, awareness of sex increases as well. Thus, the lewd Internet contents contribute to the increase in students' concern for sex as well as increase in accessibility to sex, which eventually become barriers to students' establishment of a healthy perception of sex. Reactions to sex after the exposure to lewd Internet contents and awareness of sex indicate a significant correlation. However, negative correlation is manifested with knowledge of sex. Thus, it is possible to know that the greater access to lewd Internet contents does not necessarily translate into increase in knowledge of sex. However, the study showed there is a correlation between concerns for sex and the level of accessibility to sex. In more detail, the more reactions to the contents they show, the more concerns for sex they have and the more positively they take acceptability to sex. Moreover, it is necessary to develop necessary measures since textbooks today do not include measures needed to address the lewd Internet contents. Given the above findings, it is necessary to continue to complement structural measures in order to prevent easy access of lewd Internet contents by middle school students. Moreover, it is necessary to be considerate of the students so that they themselves can form a healthy Internet culture and grow up within positive framework for the sex education.

  • PDF

A Study on the Reproducibility of 3D Shape Model of Garden Cultural Heritage using Photogrammetry with SNS Photographs - Focused on Soswaewon Garden, Damyang(Scenic Site No.40) - (SNS 사진과 사진측량을 이용한 정원유산의 3차원 형상 재현 가능성 연구 - 명승 제40호 담양 소쇄원(潭陽 瀟灑園)을 대상으로 -)

  • Kim, Choong-Sik;Lee, Sang-Ha
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.4
    • /
    • pp.94-104
    • /
    • 2018
  • This study examined photogrammetric reconstruction techniques that can measure the original form of a cultural property utilizing photographs taken in the past. During the research process, photographs taken in the past as well as photograph on the internet of Soswaewon Garden in Damyang(scenic site 40) were collected and utilized. The landscaping structures of Maedae, Aiyangdan, Ogokmun Wall, and Yakjak and natural scenery Gwangseok, of which photographs can be taken from any 360 degree direction from a close distance or a far distance without any barriers in the way, were selected and tested for the possibility of reproducing three-dimensional shapes. The photography method of 151 landscape photographs (58.6%) from internet portal sites for the aforementioned five landscape subjects containing information on the date the photograph was taken, focal length, and exposure were analyzed. As a result of the analysis, it was revealed that the majority of the photographs tend to focus on important parts of each subject. In addition, we discovered that there are two or three photography methods that internet users preferred in regards to each landscape subject. For the purposes of the experiment, photographs in which a single scene consistently appears for each landscape subject and it was determined that there was a high level of preference related to the photography method were analyzed, and three-dimensional mesh shape model was produced with a photoscan program to analyze the reproducibility of three-dimensional shapes. Based on the results of the reproduction, it was relatively possible to reproduce three-dimensional shapes for artifacts such as Ogukmun wall, Maedae, and Aeyangdan, but it was impossible to reproduce three-dimensional images for natural scenery or an object that has similar texture such as Yakjak and Gwangseok. As a result of experimentation related to the reconstruction of three-dimensional shapes with the photographs taken on site using a photography method similar to that of the photographs selected as previously mentioned, there was success related to reproducing the three-dimensional shapes of Yakjak and Gwangseok, of which it was not possible to do so through the photographs that had been collected previously. In addition, through comparison of past and present images, it was possible to measure the exact sizes as well as discover any changes that have taken place. If past photographs taken by tourists or landscape architects of cultural properties can be obtained, the three-dimensional shapes from a particular period of time can be reproduced. If this technology becomes widespread, it will increase the level of accuracy and reliability in regards to measuring the past shapes of cultural landscape properties and examining any changes to the properties.

Review for Mechanisms of Gas Generation and Properties of Gas Migration in SNF (Spent Nuclear Fuel) Repository Site (사용 후 핵연료 처분장 내 가스의 발생 기작 및 거동 특성 고찰)

  • Danu Kim;Soyoung Jeon;Seon-ok Kim;Sookyun Wang;Minhee Lee
    • Economic and Environmental Geology
    • /
    • v.56 no.2
    • /
    • pp.167-183
    • /
    • 2023
  • Gases originated from the final SNF (spent nuclear fuel) disposal site are very mobile in the barrier and they may also affect the migration of radioactive nuclides generated from the SNF. Mechanisms of gas-nuclide migration in the multi-barrier and their influences on the safety of the disposal site should be understood before the construction of the final SNF disposal site. However, researches related to gas-nuclide coupled movement in the multi-barrier medium have been very little both at home and abroad. In this study, properties of gas generation and migration in the SNF disposal environment were reviewed through previous researches and their main mechanisms were summarized on the hydrogeological evolution stage of the SNF disposal site. Gas generation in the SNF disposal site was categorized into five origins such as the continuous nuclear fission of the SNS, the Cu-canister corrosion, the oxidation-reduction reaction, the microbial activity, and the inflow from the natural barriers. Migration scenarios of gas in porous medium of the multi-barrier in the SNF repository site were investigated through reviews for previous studies and several gas migration types including ① the free gas phase flow including visco-capillary two-phase flow, ② the advection and diffusion of dissolved gas in pore water, ③ dilatant two-phase flow, and ④ tensile fracture flow, were presented. Reviewed results in this study can support information to design the further research for the gas-nuclide migration in the repository site and to evaluate the safety of the Korean SNF disposal site in view points of gas migration in the multi-barrier.

Efficient Topic Modeling by Mapping Global and Local Topics (전역 토픽의 지역 매핑을 통한 효율적 토픽 모델링 방안)

  • Choi, Hochang;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.69-94
    • /
    • 2017
  • Recently, increase of demand for big data analysis has been driving the vigorous development of related technologies and tools. In addition, development of IT and increased penetration rate of smart devices are producing a large amount of data. According to this phenomenon, data analysis technology is rapidly becoming popular. Also, attempts to acquire insights through data analysis have been continuously increasing. It means that the big data analysis will be more important in various industries for the foreseeable future. Big data analysis is generally performed by a small number of experts and delivered to each demander of analysis. However, increase of interest about big data analysis arouses activation of computer programming education and development of many programs for data analysis. Accordingly, the entry barriers of big data analysis are gradually lowering and data analysis technology being spread out. As the result, big data analysis is expected to be performed by demanders of analysis themselves. Along with this, interest about various unstructured data is continually increasing. Especially, a lot of attention is focused on using text data. Emergence of new platforms and techniques using the web bring about mass production of text data and active attempt to analyze text data. Furthermore, result of text analysis has been utilized in various fields. Text mining is a concept that embraces various theories and techniques for text analysis. Many text mining techniques are utilized in this field for various research purposes, topic modeling is one of the most widely used and studied. Topic modeling is a technique that extracts the major issues from a lot of documents, identifies the documents that correspond to each issue and provides identified documents as a cluster. It is evaluated as a very useful technique in that reflect the semantic elements of the document. Traditional topic modeling is based on the distribution of key terms across the entire document. Thus, it is essential to analyze the entire document at once to identify topic of each document. This condition causes a long time in analysis process when topic modeling is applied to a lot of documents. In addition, it has a scalability problem that is an exponential increase in the processing time with the increase of analysis objects. This problem is particularly noticeable when the documents are distributed across multiple systems or regions. To overcome these problems, divide and conquer approach can be applied to topic modeling. It means dividing a large number of documents into sub-units and deriving topics through repetition of topic modeling to each unit. This method can be used for topic modeling on a large number of documents with limited system resources, and can improve processing speed of topic modeling. It also can significantly reduce analysis time and cost through ability to analyze documents in each location or place without combining analysis object documents. However, despite many advantages, this method has two major problems. First, the relationship between local topics derived from each unit and global topics derived from entire document is unclear. It means that in each document, local topics can be identified, but global topics cannot be identified. Second, a method for measuring the accuracy of the proposed methodology should be established. That is to say, assuming that global topic is ideal answer, the difference in a local topic on a global topic needs to be measured. By those difficulties, the study in this method is not performed sufficiently, compare with other studies dealing with topic modeling. In this paper, we propose a topic modeling approach to solve the above two problems. First of all, we divide the entire document cluster(Global set) into sub-clusters(Local set), and generate the reduced entire document cluster(RGS, Reduced global set) that consist of delegated documents extracted from each local set. We try to solve the first problem by mapping RGS topics and local topics. Along with this, we verify the accuracy of the proposed methodology by detecting documents, whether to be discerned as the same topic at result of global and local set. Using 24,000 news articles, we conduct experiments to evaluate practical applicability of the proposed methodology. In addition, through additional experiment, we confirmed that the proposed methodology can provide similar results to the entire topic modeling. We also proposed a reasonable method for comparing the result of both methods.

Effects of Joining Coalition Loyalty Program : How the Brand affects Brand Loyalty Based on Brand Preference (브랜드 선호에 따라 제휴 로열티 프로그램 가입이 가맹점 브랜드 충성도에 미치는 영향)

  • Rhee, Jin-Hwa
    • Journal of Distribution Research
    • /
    • v.17 no.1
    • /
    • pp.87-115
    • /
    • 2012
  • Introduction: In these days, a loyalty program is one of the most common marketing mechanisms (Lacey & Sneath, 2006; Nues & Dreze, 2006; Uncles et al., 20003). In recent years, Coalition Loyalty Program is more noticeable as one of progressed forms. In the past, loyalty program was operating independently by single product brand or single retail channel brand. Now, companies using Coalition Loyalty Program share their programs as one single service and companies to participate to this program continue to have benefits from their existing program as well as positive spillover effect from the other participating network companies. Instead of consumers to earn or spend points from single retail channel or brand, consumers will have more opportunities to utilize their points and be able to purchase other participating companies products. Issues that are related to form of loyalty programs are essentially connected with consumers' perceived view on convenience of using its program. This can be a problem for distribution companies' strategic marketing plan. Although Coalition Loyalty Program is popular corporate marketing strategy to most companies, only few researches have been published. However, compared to independent loyalty program, coalition loyalty program operated by third parties of partnership has following conditions: Companies cannot autonomously modify structures of program for individual companies' benefits, and there is no guarantee to operate and to participate its program continuously by signing a contract. Thus, it is important to conduct the study on how coalition loyalty program affects companies' success and its process as much as conducting the study on effects of independent program. This study will complement the lack of coalition loyalty program study. The purpose of this study is to find out how consumer loyalty affects affiliated brands, its cause and mechanism. The past study about loyalty program only provided the variation of performance analysis, but this study will specifically focus on causes of results. In order to do these, this study is designed and to verify three primary objects as following; First, based on opinions of Switching Barriers (Fornell, 1992; Ping, 1993; Jones, et at., 2000) about causes of loyalty of coalition brand, 'brand attractiveness' and 'brand switching cost' are antecedents and causes of change in 'brand loyalty' will be investigated. Second, influence of consumers' perception and attitude prior to joining coalition loyalty program, influence of program in retail brands, brand attractiveness and spillover effect of switching cost after joining coalition program will be verified. Finally, the study will apply 'prior brand preference' as a variable and will provide a relationship between effects of coalition loyalty program and prior preference level. Hypothesis Hypothesis 1. After joining coalition loyalty program, more preferred brand (compared to less preferred brand) will increase influence on brand attractiveness to brand loyalty. Hypothesis 2. After joining coalition loyalty program, less preferred brand (compared to more preferred brand) will increase influence on brand switching cost to brand loyalty. Hypothesis 3. (1)Brand attractiveness and (2)brand switching cost of more preferred brand (before joining the coalition loyalty program) will influence more positive effects from (1)program attractiveness and (2)program switching cost of coalition loyalty program (after joining) than less preferred brand. Hypothesis 4. After joining coalition loyalty program, (1)brand attractiveness and (2)brand switching cost of more preferred brand will receive more positive impacts from (1)program attractiveness and (2)program switching cost of coalition loyalty program than less preferred brand. Hypothesis 5. After joining coalition loyalty program, (1)brand attractiveness and (2)brand switching cost of more preferred brand will receive less impacts from (1)brand attractiveness and (2)brand switching cost of different brands (having different preference level), which joined simultaneously, than less preferred brand. Method : In order to validate hypotheses, this study will apply experimental method throughout virtual scenario of coalition loyalty program if consumers have used or available for the actual brands. The experiment is conducted twice to participants. In a first experiment, the study will provide six coalition brands which are already selected based on prior research. The survey asked each brand attractiveness, switching cost, and loyalty after they choose high preference brand and low preference brand. One hour break was provided prior to the second experiment. In a second experiment, virtual coalition loyalty program "SaveBag" was introduced to participants. Participants were informed that "SaveBag" will be new alliance with six coalition brands from the first experiment. Brand attractiveness and switching cost about coalition program were measured and brand attractiveness and switching cost of high preference brand and low preference brand were measured as same method of first experiment. Limitation and future research This study shows limitations of effects of coalition loyalty program by using virtual scenario instead of actual research. Thus, future study should compare and analyze CLP panel data to provide more in-depth information. In addition, this study only proved the effectiveness of coalition loyalty program. However, there are two types of loyalty program, which are Single and Coalition, and success of coalition loyalty program will be dependent on market brand power and prior customer attitude. Therefore, it will be interesting to compare effects of two programs in the future.

  • PDF