• Title/Summary/Keyword: MOBILE

Search Result 25,771, Processing Time 0.049 seconds

A Study on Marketing Strategy of MIM Emoticon Using Customized Bundling (맞춤 번들링을 활용한 MIM 이모티콘 마케팅 전략에 관한 연구)

  • Heo, Su-Chang;Jeon, Gyeahyung;Heo, Jae-Kang
    • Management & Information Systems Review
    • /
    • v.38 no.4
    • /
    • pp.1-24
    • /
    • 2019
  • This study confirms the responses of consumers when the composition of emoticon bundles can be selected by individuals in MIM service. This aims to verify that customized bundling is a valid marketing strategy in the MIM emoticon market. Currently, the emoticon bundling used in Korean MIM services is in the form of pure bundling. As a result, Consumers must purchase an entire bundle even though he/she doesn't need to use all the emoticons contained in it. Some researches(e.g. Hitt & Chen, 2005; Wu & Anandalingam, 2002) show that when consumers value only part of the products or services included in pure bundling, customized bundling is much more profitable. In their works, customized bundling is appropriate when marginal costs are near zero. Information goods, such as emoticons, meet the condition. On the other hand, customized bundling increase the choosable options, so it can pose a problem of complexity (Blecker et al., 2004). And consumers may experience information overload(Huffman & Kahn, 1998). Thus, judgement on the necessity to introduce customized bundling needs to be made through empirical analyses in the light of characteristics of the product and the reaction of consumers. Results show that when customized bundling was introduced, consumers' purchase intention and willingness to pay significantly increased. Purchase intention for customized bundles has increased by 0.44 based on the five point Likert scale than the purchase intention for existing pure bundles. The increase in purchase intention for customized bundles was statistically independent of the existing purchasing experience. In addition, the willingness to pay was increased by about 2.8% compared to the price of the existing emoticon bundles in the whole group. The group with experience in purchasing pure bundles were willing to pay 5.9% more than pure bundles. The other group without experience in purchasing pure bundles were willing to buy if they were about 5% cheaper than the existing price. Overall, introducing customized bundling into emoticon bundles can lead to positive consumers responses and be a viable marketing strategy.

Photocatalytic Oxidation of Arsenite Using Goethite and UV LED (침철석과 자외선 LED를 이용한 아비산염의 광촉매 산화)

  • Jeon, Ji-Hun;Kim, Seong-Hee;Lee, Sang-Woo;Kim, Soon-Oh
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.39 no.1
    • /
    • pp.9-18
    • /
    • 2017
  • Arsenic (As) has been considered as the most toxic one among various hazardous materials and As contamination can be caused naturally and anthropogenically. Major forms of arsenic in groundwater are arsenite [(As(III)] and/or arsenate [(As(V)], depending on redox condition: arsenite and arsenate are predominant in reduced and oxidized environments, respectively. Because arsenite is much more toxic and mobile than arsenate, there have been a number of studies on the reduction of its toxicity through oxidation of As(III) to As(V). This study was initiated to develop photocatalytic oxidation process for treatment of groundwater contaminated with arsenite. The performance of two types of light sources (UV lamp and UV LED) was compared and the feasibility of goethite as a photocatalyst was evaluated. The highest removal efficiency of the process was achieved at a goethite dose of 0.05 g/L. Based on the comparison of oxidation efficiencies of arsenite between two light sources, the apparent performance of UV LED was inferior to that of UV lamp. However, when the results were appraised on the basis of their emitting UV irradiation, the higher performance was achieved by UV LED than by UV lamp. This study demonstrates that environmentally friendly process of goethite-catalytic photo-oxidation without any addition of foreign catalyst is feasible for the reduction of arsenite in groundwater containing naturally-occurring goethite. In addition, this study confirms that UV LED can be used in the photo-oxidation of arsenite as an alternative light source of UV lamp to remedy the drawbacks of UV lamp, such as long stabilization time, high electrical power consumption, short lifespan, and high heat output requiring large cooling facilities.

An Improved CBRP using Secondary Header in Ad-Hoc network (Ad-Hoc 네트워크에서 보조헤더를 이용한 개선된 클러스터 기반의 라우팅 프로토콜)

  • Hur, Tai-Sung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.31-38
    • /
    • 2008
  • Ad-Hoc network is a network architecture which has no backbone network and is deployed temporarily and rapidly in emergency or war without fixed mobile infrastructures. All communications between network entities are carried in ad-hoc networks over the wireless medium. Due to the radio communications being extremely vulnerable to propagation impairments, connectivity between network nodes is not guaranteed. Therefore, many new algorithms have been studied recently. This study proposes the secondary header approach to the cluster based routing protocol (CBRP). The primary header becomes abnormal status so that the primary header can not participate in the communications between network entities, the secondary header immediately replaces the primary header without selecting process of the new primary header. This improves the routing interruption problem that occurs when a header is moving out from a cluster or in the abnormal status. The performances of proposed algorithm ACBRP(Advanced Cluster Based Routing Protocol) are compared with CBRP. The cost of the primary header reelection of ACBRP is simulated. And results are presented in order to show the effectiveness of the algorithm.

  • PDF

Optimization of HPLC Method and Clean-up Process for Simultaneous and Systematic Analysis of Synthetic Color Additives in Foods (식품 중 타르색소의 동시분석 및 계통분석을 위한 HPLC 분석조건 및 정제과정 확립)

  • Park, Sung-Kwan;Hong, Yeun;Jung, Yong-Hyun;Lee, Chang-Hee;Yoon, Hae-Jung;Kim, So-Hee;Lee, Jong-Ok
    • Korean Journal of Food Science and Technology
    • /
    • v.33 no.1
    • /
    • pp.33-39
    • /
    • 2001
  • To develop a method for separation process using Sep-pak $C_18$, simultaneous and systematic analysis of 8 permitted and 11 non-permitted synthetic food colors in Korea, optimization of analysis conditions for reverse phase ion-pair high performance liquid chromatography was carried out. For the best result of Sep-pak $C_18$ separation the pH of color standard mixture solution was $5{\sim}6$ and 0.1% HCl-methanol solution were set as eluent. The colors eluated from Sep-pak $C_18$ cartridge were determined and confirmed by high performance liquid chromatography with a photodiode array detector at 420 nm for yellow colors type, at 520 nm for red colors type, at 600 nm for blue and green colors type and at 254 nm for mixed colors. Conditions for HPLC analysis were as follows: column, Symmetry $C_18$ (5 m, 3.9 mm $i.d.{\times}150\;mm$); mobile phase, 0.025 M ammonium acetate (containing 0.01 M tetrabutylammonium bromide) : acetonitrile : methanol (65 : 25 : 10) and 0.025 M ammonium acetate(containing 0.01 M tetrabutylammonium bromide) : acetonitrile : methanol (40 : 50 : 10); flow rate, 1 mL/min. It takes 35 minutes for simultaneaus analysis and 18 minutes for systematic analysis. The detection limits range of each colors were $0.01{\sim}0.05\;{\mu}g/g$.

  • PDF

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

A Study of well-being in Caregivers Caring for Chronically Ill Family Members (만성 질환자 가족의 부담감에 관한 연구)

  • 서미혜;오가실
    • Journal of Korean Academy of Nursing
    • /
    • v.23 no.3
    • /
    • pp.467-486
    • /
    • 1993
  • Today, more chronically ill and handicapped people are being cared for at home by a family member caregiver. The task of caring for a family momber may mean that the caregiver has less time and money and more work which may result in increased fatigue and symptoms of illness. This study was done to examine the well-being of family caregivers. Fifty three family caregivers were interviewed. Concepts were measured using existing tools and included : Burden(25 item 5 point scale), Social sup-port (21 item 7 point scale), Health status defined by a symptom checklist(48 item S point scale), and Well -being defined by a quality of life scale (14 item 7 point scale) and caregiving activities. Data collection was done by interview and Q-sort. Social support and well - being were positively correlated as were symptoms and burden. Symptoms and burden were negatively correlated with social support and well-being. Items on the quality of life scale had a mean score range from 3.09 to 4.96. Quality of life related to income was lowest (3.09) but the desire to use more money for the patient was rated 2.90 on the burden scale where the item means ranged from 0.73 to 3.55. The high mean of 3.55 was for obligation to give care and the low 0.73 was (or not feeling that this was helping the patient. Mean scores for symptoms ranged from 0.26 to 2.15 with the 2.15 being for “worry about all the things that have to be done.” Over half of the patients were dependent for help with some activities of daily living. The caregivers reported doing an average of 3.40 out of five patient care activities including bathing (77.4%), shampooing (67.9%), and washing face and hands (49.1%), and 3.74 out of seven home maintenance activities including laundry (98.1%), cooking (83.0%), and arranging bed-ding(75.5%). The caregivers reported their spouse as one of the main sources of social support, including in times of loneliness and anger The mean score for loneliness as burden was 2.15 and ranked fourth and 31 (58.5%) of the sample reported being lonely recently and not being satisfied with the support received. Similarly anger caused by the patient was given a mean score of 2.13, and anger was reported to have been present recently by 38 (71.7%) of the sample and satis-faction with the support given was low. Having someone to help deal with anger ranked twelfth out of 21 items on the social support scale and had a mean score of 3.98 (range 3.49 to 5.98). Spouses were reported as a major source of social support but the fact that 50% of the caregivers were caring for a spouse, may account for the quality of this source of social support having been affected. These caregivers faced the same problems as others at the same stage of life. but because of the situation, there was a strain on their resources, particularly financial and social. In conclusion it was found that burden is correlated negatively to quality of life and positively to symptoms, but in this sample, symptoms and bur-den were scored relatively low. Does this indicate that the caregivers accept caregiving as part of their destiny and accept the quality of their lives with burden and symptoms just being a part of caregiving\ulcorner Does the correlation between the bur-den and symptoms indicate they are a measure of the same phenomenon or that the sample was of a more mobile, less burdened group of caregivers\ulcorner Quality of life was the one variable that was significant in explaining the varience on burden. Further study is needed to validate the conclusions found in this study but they indicate a need for nurses to ap-proach these caregivers with a plan tailored to each individual situation and to give consideration to interventions directed at improving quality of life and expanding social support networks for those caring for spouses.

  • PDF

A Study on the Intelligent Service Selection Reasoning for Enhanced User Satisfaction : Appliance to Cloud Computing Service (사용자 만족도 향상을 위한 지능형 서비스 선정 방안에 관한 연구 : 클라우드 컴퓨팅 서비스에의 적용)

  • Shin, Dong Cheon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.35-51
    • /
    • 2012
  • Cloud computing is internet-based computing where computing resources are offered over the Internet as scalable and on-demand services. In particular, in case a number of various cloud services emerge in accordance with development of internet and mobile technology, to select and provide services with which service users satisfy is one of the important issues. Most of previous works show the limitation in the degree of user satisfaction because they are based on so called concept similarity in relation to user requirements or are lack of versatility of user preferences. This paper presents cloud service selection reasoning which can be applied to the general cloud service environments including a variety of computing resource services, not limited to web services. In relation to the service environments, there are two kinds of services: atomic service and composite service. An atomic service consists of service attributes which represent the characteristics of service such as functionality, performance, or specification. A composite service can be created by composition of atomic services and other composite services. Therefore, a composite service inherits attributes of component services. On the other hand, the main participants in providing with cloud services are service users, service suppliers, and service operators. Service suppliers can register services autonomously or in accordance with the strategic collaboration with service operators. Service users submit request queries including service name and requirements to the service management system. The service management system consists of a query processor for processing user queries, a registration manager for service registration, and a selection engine for service selection reasoning. In order to enhance the degree of user satisfaction, our reasoning stands on basis of the degree of conformance to user requirements of service attributes in terms of functionality, performance, and specification of service attributes, instead of concept similarity as in ontology-based reasoning. For this we introduce so called a service attribute graph (SAG) which is generated by considering the inclusion relationship among instances of a service attribute from several perspectives like functionality, performance, and specification. Hence, SAG is a directed graph which shows the inclusion relationships among attribute instances. Since the degree of conformance is very close to the inclusion relationship, we can say the acceptability of services depends on the closeness of inclusion relationship among corresponding attribute instances. That is, the high closeness implies the high acceptability because the degree of closeness reflects the degree of conformance among attributes instances. The degree of closeness is proportional to the path length between two vertex in SAG. The shorter path length means more close inclusion relationship than longer path length, which implies the higher degree of conformance. In addition to acceptability, in this paper, other user preferences such as priority for attributes and mandatary options are reflected for the variety of user requirements. Furthermore, to consider various types of attribute like character, number, and boolean also helps to support the variety of user requirements. Finally, according to service value to price cloud services are rated and recommended to users. One of the significances of this paper is the first try to present a graph-based selection reasoning unlike other works, while considering various user preferences in relation with service attributes.

A Methodology for Extracting Shopping-Related Keywords by Analyzing Internet Navigation Patterns (인터넷 검색기록 분석을 통한 쇼핑의도 포함 키워드 자동 추출 기법)

  • Kim, Mingyu;Kim, Namgyu;Jung, Inhwan
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.123-136
    • /
    • 2014
  • Recently, online shopping has further developed as the use of the Internet and a variety of smart mobile devices becomes more prevalent. The increase in the scale of such shopping has led to the creation of many Internet shopping malls. Consequently, there is a tendency for increasingly fierce competition among online retailers, and as a result, many Internet shopping malls are making significant attempts to attract online users to their sites. One such attempt is keyword marketing, whereby a retail site pays a fee to expose its link to potential customers when they insert a specific keyword on an Internet portal site. The price related to each keyword is generally estimated by the keyword's frequency of appearance. However, it is widely accepted that the price of keywords cannot be based solely on their frequency because many keywords may appear frequently but have little relationship to shopping. This implies that it is unreasonable for an online shopping mall to spend a great deal on some keywords simply because people frequently use them. Therefore, from the perspective of shopping malls, a specialized process is required to extract meaningful keywords. Further, the demand for automating this extraction process is increasing because of the drive to improve online sales performance. In this study, we propose a methodology that can automatically extract only shopping-related keywords from the entire set of search keywords used on portal sites. We define a shopping-related keyword as a keyword that is used directly before shopping behaviors. In other words, only search keywords that direct the search results page to shopping-related pages are extracted from among the entire set of search keywords. A comparison is then made between the extracted keywords' rankings and the rankings of the entire set of search keywords. Two types of data are used in our study's experiment: web browsing history from July 1, 2012 to June 30, 2013, and site information. The experimental dataset was from a web site ranking site, and the biggest portal site in Korea. The original sample dataset contains 150 million transaction logs. First, portal sites are selected, and search keywords in those sites are extracted. Search keywords can be easily extracted by simple parsing. The extracted keywords are ranked according to their frequency. The experiment uses approximately 3.9 million search results from Korea's largest search portal site. As a result, a total of 344,822 search keywords were extracted. Next, by using web browsing history and site information, the shopping-related keywords were taken from the entire set of search keywords. As a result, we obtained 4,709 shopping-related keywords. For performance evaluation, we compared the hit ratios of all the search keywords with the shopping-related keywords. To achieve this, we extracted 80,298 search keywords from several Internet shopping malls and then chose the top 1,000 keywords as a set of true shopping keywords. We measured precision, recall, and F-scores of the entire amount of keywords and the shopping-related keywords. The F-Score was formulated by calculating the harmonic mean of precision and recall. The precision, recall, and F-score of shopping-related keywords derived by the proposed methodology were revealed to be higher than those of the entire number of keywords. This study proposes a scheme that is able to obtain shopping-related keywords in a relatively simple manner. We could easily extract shopping-related keywords simply by examining transactions whose next visit is a shopping mall. The resultant shopping-related keyword set is expected to be a useful asset for many shopping malls that participate in keyword marketing. Moreover, the proposed methodology can be easily applied to the construction of special area-related keywords as well as shopping-related ones.

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF