• Title/Summary/Keyword: Information Reception Behavior

Search Result 10, Processing Time 0.028 seconds

Information Behavior on Social Live Streaming Services

  • Scheibe, Katrin;Fietkiewicz, Kaja J.;Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.2
    • /
    • pp.6-20
    • /
    • 2016
  • In the last few years, a new type of synchronous social networking services (SNSs) has emerged—social live streaming services (SLSSs). Studying SLSSs is a new and exciting research field in information science. What information behaviors do users of live streaming platforms exhibit? In our empirical study we analyzed information production behavior (i.e., broadcasting) as well as information reception behavior (watching streams and commenting on them). We conducted two quantitative investigations, namely an online survey with YouNow users (N = 123) and observations of live streams on YouNow (N = 434). YouNow is a service with video streams mostly made by adolescents for adolescents. YouNow users like to watch streams, to chat while watching, and to reward performers by using emoticons. While broadcasting, there is no anonymity (as in nearly all other WWW services). Synchronous SNSs remind us of the film The Truman Show, as anyone has the chance to consciously broadcast his or her own life real-time.

Social Viewing Motivations, Satisfaction, and Continuous Use Intention: Moderating Effects of Communication Behavior (동영상의 사회적 시청 동기와 만족도 및 지속의도에서 커뮤니케이션 행위의 조절효과 분석)

  • Cho, Eunyong;Lim, Sohye
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.10
    • /
    • pp.1331-1338
    • /
    • 2020
  • Social viewing has become an increasingly common viewing pattern by combining SNS use with video-watching. Accordingly, social viewing has attracted much scholarly attention, but a more comprehensive understanding of the process and effects of social viewing is warranted. For this, this study incorporated social viewing motivations, viewer satisfaction, and the continuous use intention, taking the viewer's communicative behavior into account as a possible moderator. This study conducted an online survey (N=334). Among four motivations, enjoyment, sharing and expression were significant predictors of program and communication satisfaction. Information, however, was only associated with program satisfaction but not with communication satisfaction. The moderating effects of three communication behaviors, production, sharing, and reception, were discussed in the relationship between user motivations and viewing satisfaction and continuous use intention. Production behaviors played a significant moderating role in between enjoyment, information, sharing, and communication satisfaction. Sharing moderatied information, sharing, and program satisfaction, whereas reception was not a significant moderator.

Subjectivity Reception of Univ. Students about Medical-information Advertising (의료정보 광고에 관한 대학생의 주관성 인식)

  • Lee, Jei-Young;Jeong, Mi-Ae
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.36-47
    • /
    • 2017
  • This study was carried out by practical method in a subjectivity study accessible in-depth, in sloughing off old habit of functional quantity analysis about medical-information advertising. The perception pattern come out in this study were divided into five types in Q-methodology. The result is as follows ; it is divided into 1[(N=4) : Interest Type], 2[(N=3) : comparison Type], 3[(N=3) : Product-focus Type], 4[(N=3) : Disbelief Type], 5[(N=2) : Improvement Type]. In conclusion, this study is to ascertain acceptance behavior about Reception Type on medical-information advertising ; to offer a developmental suggestion about it.

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Mukbang's Foodcasting beyond Korea's Borders: A Study Focusing on OTT Platforms

  • Lim, Jia
    • Journal of Information Processing Systems
    • /
    • v.18 no.4
    • /
    • pp.470-479
    • /
    • 2022
  • Mukbang is a type of foodcasting where a host records or streams their eating rituals for audience consumption in live format. With origins in South Korea via the online broadcast genre found on Afreeca TV in the mid-2000s, the phenomenon has since found global popularity. Its development as a full-fledged genre is based on a communication culture that invites people to a meal rather than to talk to one another; viewers watch in silence as a host consumes a copious number of dishes from Korean gastronomy to fast food to other ethnic cuisine on display. An invitation to eat means the beginning of a public relationship that quickly turns to a private shared experience. This study analyzes several Mukbang video postings and makes use of Linden's culture approach model to provide a view toward a number of cross-cultural connections by Koreans and non-Korean audiences. Prior to the study, 10 Korean eating shows were selected and used as standard models. Korean Mukbang mainly consists of eating behavior and ASMR, with very few storytelling or narrative devices utilized by its creators. For this reason, eating shows make a very private connection. In other ways, this paper shows how 28 Mukbang-related YouTube contents selected by Ranker were evolving and examined through notions of acculturation and reception theory.

Selective Advertisement Transmission System Design Using Smart Sensor

  • Lim, Myung-Jae;Chung, Dong-Kun;Kim, Kyu-Dong;Kwon, Young-Man
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.66-71
    • /
    • 2021
  • In this paper, we sought ways to accept and reject advertisements using the function of a smartphone gyro sensor to enable selective transmission and reception of YouTube advertisements by linking the gyro function of mobile phones. In the case of YouTube advertisements, the skip button is activated after the advertisement is played for a certain period of time (about 5 seconds) before and after the video is played. During the time the advertisement is maintained, it can be used to achieve various goals such as increased website traffic, brand awareness, and sales induction. Since this type of advertisement is not a setting in which the transition takes place immediately, it can be seen as the most suitable setting to strengthen brand awareness. However, due to the nature of the YouTube advertising system, it is often discarded through users' skipping behavior in the process of sharing and reproducing information. Therefore, in this paper, we implemented an optional advertisement transmission system that applies the principle of gyroscope to minimize wasted advertisements and selectively maintain desired advertisements in consideration of the transmission and reception aspects of advertisement broadcasts. It measures rotational repulsive force with directional stability and car wash characteristics, and uses algorithms to identify the slope and angular speed of mobile phones to ensure that advertisements are transmitted and received. Through this, it is expected that advertisement transmission can be performed on the side of an advertisement provider, and selective advertisement reception can be performed on the side of a user.

Priority-Based Network Interrupt Scheduling for Predictable Real-Time Support

  • Lee, Minsub;Kim, Hyosu;Shin, Insik
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.2
    • /
    • pp.108-117
    • /
    • 2015
  • Interrupt handling is generally separated from process scheduling. This can lead to a scheduling anomaly and priority inversion. The processor can interrupt a higher priority process that is currently executing, in order to handle a network packet reception interruption on behalf of its intended lower priority receiver process. We propose a new network interrupt handling scheme that combines interrupt handling with process scheduling and the priority of the process. The proposed scheme employs techniques to identify the intended receiver process of an incoming packet at an earlier phase. We implement a prototype system of the proposed scheme on Linux 2.6, and our experiment results show that the prototype system supports the predictable real-time behavior of higher priority processes even when excessive traffic is sent to lower priority processes.

A study on the Throughput Guarantee with TCP Traffic Control (전송률 보장을 위한 TCP 트래픽 제어에 관한 연구)

  • Lee, Myun-Sub
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.3
    • /
    • pp.303-308
    • /
    • 2016
  • Recently, as the rapid development of network technology and the increase of services required high bandwidth such as multimedia service, the network traffic dramatically increases. This massive increase of network traffic causes some problems such as the degradation of QoS and the lack of network resources and, to solve these problems, various research to guarantee QoS have been performing. Currently, The most representative method to guarantee the QoS is the DiffServ(: Differentiated Service). The DiffServ defines the AF(: Assured Forwarding) PHB(: Per Hop Behavior) and statistically ensures the throughput over the certain level of data rate. However, the TCP congestion control method that make up the majority of the Internet traffic is not fundamentally suitable to the DiffServ that guarantees the throughput without managing the individual flow. Therefore, in this paper, we present this mismatch through the simulation as an example and propose the solution by controlling the TCP of the terminal in the network. The proposed scheme utilizes the information of the reception window size included in the ACK frame and does not require any modification of the TCP algorithms currently in use.

Smart Radar System for Life Pattern Recognition (생활패턴 인지가 가능한 스마트 레이더 시스템)

  • Sang-Joong Jung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.91-96
    • /
    • 2022
  • At the current camera-based technology level, sensor-based basic life pattern recognition technology has to suffer inconvenience to obtain accurate data, and commercial band products are difficult to collect accurate data, and cannot take into account the motive, cause, and psychological effect of behavior. the current situation. In this paper, radar technology for life pattern recognition is a technology that measures the distance, speed, and angle with an object by transmitting a waveform designed to detect nearby people or objects in daily life and processing the reflected received signal. It was designed to supplement issues such as privacy protection in the existing image-based service by applying it. For the implementation of the proposed system, based on TI IWR1642 chip, RF chipset control for 60GHz band millimeter wave FMCW transmission/reception, module development for distance/speed/angle detection, and technology including signal processing software were implemented. It is expected that analysis of individual life patterns will be possible by calculating self-management and behavior sequences by extracting personalized life patterns through quantitative analysis of life patterns as meta-analysis of living information in security and safe guards application.

Dementia Patient Wandering Behavior and Anomaly Detection Technique through Biometric Authentication and Location-based in a Private Blockchain Environment (프라이빗 블록체인 환경에서 생체인증과 위치기반을 통한 치매환자 배회행동 및 이상징후 탐지 기법)

  • Han, Young-Ae;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.119-125
    • /
    • 2022
  • With the recent increase in dementia patients due to aging, measures to prevent their wandering behavior and disappearance are urgently needed. To solve this problem, various authentication methods and location detection techniques have been introduced, but the security problem of personal authentication and a system that can check indoor and outdoor overall was lacking. In order to solve this problem, various authentication methods and location detection techniques have been introduced, but it was difficult to find a system that can check the security problem of personal authentication and indoor/outdoor overall. In this study, we intend to propose a system that can identify personal authentication, basic health status, and overall location indoors and outdoors by using wristband-type wearable devices in a private blockchain environment. In this system, personal authentication uses ECG, which is difficult to forge and highly personally identifiable, Bluetooth beacon that is easy to use with low power, non-contact and automatic transmission and reception indoors, and DGPS that corrects the pseudorange error of GPS satellites outdoors. It is intended to detect wandering behavior and abnormal signs by locating the patient. Through this, it is intended to contribute to the prompt response and prevention of disappearance in case of wandering behavior and abnormal symptoms of dementia patients living at home or in nursing homes.