• Title/Summary/Keyword: Network Service Industry

Search Result 607, Processing Time 0.027 seconds

Decomposing Twitter Network in Tourism Marketing

  • Kim, Wonsik;Kim, Daegeun
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.80-85
    • /
    • 2021
  • This study is to analyze the structure of the networks of tourism marketing on Twitter, identifying the most prominent users, the flow of information about tourism marketing, and the interaction between the users posting tweets. This study employs NodeXL pro as a visualization software package for social network analysis. The number of vertices or nodes is 171, and the number of the unique edges or links is 128, but there are 101 edges with duplicates, so the total links are 229, which means that there are fewer Twitter accounts in the social network on tourism marketing, but they have a few close relationships by sharing information. The research can map the social network of communicators of tourism marketing using Twitter data. The network has a complicated pattern, including one independent network and some connected networks. Some mediators connect each network and can control the information flow of tourism marketing. More communicators are getting the information than the ones providing it, which means that there is likely to be the dependence of information among communicators that can cause an obstacle and distortion of the information flow system, especially in the independent network.

Efficient Authentication Framework in Ubiquitous Robotic Companion

  • Chae, Cheol-Joo;Cho, Han-Jin;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.13-18
    • /
    • 2009
  • The robotics industry, that is the major industry of the future and one of the new growth power, is actively studied around ETRI, that is the leading under state-run research institute of the advanced technique of U.S. and Japanese and knowledge economy part. And positive and negative and academic circles, the research institute, and the industrial circles communally pursue the intelligent service robot enterprise of a network-based called URC. This network-based intelligent robot does the RUPI2.0 platform and URC environment by the base. Therefore, a stability need to be enhanced in the through this near future when the research for the preexistence vulnerability analysis and security request is needed than the commercialized network-based intelligent robot in order to implement the network-based intelligent robot. Thus, in this paper, we propose the efficient authentication Framework which is suitable for the URC environment.

Design and Implementation of Social Search System using user Context and Tag (사용자 컨텍스트와 태그를 이용한 소셜 검색 시스템의 설계 및 구현)

  • Yoon, Tae Hyun;Kwon, Joon Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.1-10
    • /
    • 2012
  • Recently, Social Network services(SNS) is gaining popularity as Facebook and Twitter. Popularity of SNS leads to active service and social data is to be increased. Thus, social search is remarkable that provide more meaningful information to users. but previous studies using social network structure, network distance is calculated using only familiarity. It is familiar as distance on network, has been demonstrated through several experiments. If taking advantage of social context data that users are using SNS to produce, then familiarity will be helpful to evaluate further. In this paper, reflect user's attention through comments and tags, Facebook context is determined using familiarity between friends in SNS. Facebook context is advantageous finding a friend who has a similar propensity users in context of profiles and interests. As a result, we provide a blog post that interest with a close friend. We also assist in the retrieval facilities using Near Field Communication(NFC) technology. By the experiment, we show the proposed soicial search method is more effective than only tag.

A Study on the Factors Influencing the Body Dissatisfaction and Eating Disorders of Female Social Network Service Users: Focusing on Objectification theory and Social Comparison theory (SNS 여성 이용자의 신체불만족과 식이장애에 미치는 영향요인에 관한 연구: 대상화이론과 사회비교이론을 중심으로)

  • Kim, Dahee;Park, Minjung
    • Fashion & Textile Research Journal
    • /
    • v.22 no.4
    • /
    • pp.469-480
    • /
    • 2020
  • The study investigated the effects of SNS usage on 20s and 30s female SNS users' internalization of thin body, body surveillance, appearance upper comparison, body dissatisfaction and eating disorders based on objectification theory and social comparison theory. The study examined differences on SNS usage and body image variables between high and low groups of SNS envy and self-compassion. Social Network Service (SNS) is used as a contemporary marketing tool for brands and companies. It also influences the body image of female SNS users. The survey used an online survey company for female SNS users in their 20s and 30s to analyze the effect of SNS usage. The results showed that SNS usage significantly impacted the internalization of a thin body, body surveillance and appearance upper comparison. The internalization of thin body also had a significant impact on body surveillance and appearance upper comparison. Appearance upper comparison positively affected body dissatisfaction and eating disorders. Finally, the group with higher SNS envy showed higher SNS usage, internalization of thin body, body surveillance, appearance upper comparison, body dissatisfaction and eating disorders. The group with higher self-compassion showed opposite results. This study provided a theoretical expansion for a SNS and female body image study with objectification theory and social comparison theory. It also suggests positive SNS marketing strategies use for brands. Lastly, this study emphasized the importance of the proper use of SNS to protect the body image of SNS users.

Effect of Home Network on Housing Selection (홈네트워크가 주택선택에 미치는 영향)

  • Chung, Jae-Ho;Cho, Su-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.7
    • /
    • pp.144-152
    • /
    • 2007
  • The home network service which has been set up in the high price residential-commercial composition building of high price is supplied in the general apartment plentifully recently. But it has been supplied without accurate grasp under the aim of the most up-to-date IT industry and the convenient characteristic of life. In this research we research the present condition of network service in domestic and analyze the recognition degree of network service and the need using survey method. We find that the recognition degree is very high and a main considerable factor to purchase a house. However they prefer to be supplied as option rather than as lump. The consumers are ready to pay an addition expense for home network. It explain that they expect considerably home network service and home network system should be developed as considering the various individual characteristics.

The Effects of Individualism-Collectivism Propensity, Social Capital, Participation Activity of Social Network Service Users on Fashion Brands Relationship Orientation (SNS 이용자의 개인주의-집단주의 성향과 사회적 자본, 참여활동이 패션브랜드 관계지향성에 미치는 영향)

  • Lee, Eun-Jin;Suk, HyoJung
    • Fashion & Textile Research Journal
    • /
    • v.19 no.2
    • /
    • pp.194-206
    • /
    • 2017
  • This study analyzed the effect of individualism-collectivism propensity and social capital on participation activity as well as the effect of participation activity on fashion brands relationship orientation of social network service users. Also, this study investigated the difference in participation activity and fashion brands relationship orientation by participation level of social network service. A survey was conducted from October 1 to November 31, 2015, and 476 responses were used in the analysis. As results, the individualism-collectivism propensity was composed of vertical-horizontal individualism and vertical-horizontal collectivism. The social capital was composed of trust, norm, and network. Also, the participation activity was composed of personal interaction, consumer rights, information pursuit, interest pursuit, and economic pursuit. Vertical individualism positively affected information pursuit and economic pursuit, and horizontal individualism positively affected personal interaction, consumer rights, and information pursuit; in addition, vertical collectivism positively affected personal interaction, consumer rights, and interest pursuit. Horizontal collectivism positively affected information pursuit, but it negatively affected consumer rights. Consumer rights, information pursuit, interest pursuit, and economic pursuit of participation activity positively affected fashion brands relationship orientation. Also, there were significant differences in the participation activity and fashion brands relationship orientation by participation level. The study results provide useful information to the marketing strategies using social network service of fashion brands.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Study on key standardization Work Item derivation and strategies for IoT services (사물인터넷 서비스의 중점 표준화 항목 도출 및 전략에 관한 연구)

  • Kim, Jungsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.13-26
    • /
    • 2016
  • Service and technology for the future hyper-connected society, which is every information receive through the mobile internet, will be an Internet of Things. Thus, it is mandatory to derive key standardization work item and establish strategy for the global business with the standardization of device and service platform by the application service. In this study, by analyzing the domestic and international market trends, state of technical development, and standardization of technology, we identified the open platform is the stepping stone for achieving the goal which is establishing the virtuous circulation of IoT ecosystem. Also, we defined emphasized key standardization work item for achieving the open platform are network, server, access authentication, billing system, and software platform. After that, we proposed future strategy direction of standardization. This research could be contribute to the IoT service diffusion by realizing IP communication among low power wireless terminals and implementing light-weight standard internet protocol.

An Experimental study on the Method of Detection and Blocking against SIP Flooding (SIP 플러딩 탐지 차단 실험방법에 대한 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • Privacy IP hacking problems such as invasion of privacy, password cracking, voice wiretapping and internet over charged occurred, because VoIP internet voice phone service gradually spread. This thesis attempted to attack the VoIP service network by application. First use application to spoof IP address then attempted wiretap the VoIP service and sends a lot of messages to disturb service movement. At this point, we connected VoIP soft terminal, so we can operate real-time filtering operator to block the SIP Flooding offence by monitor the traffic and detect the location where it got attacked. This thesis used experiment to prove it is possible to detect the offence and defend from SIP Flooding offence.

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.