• Title/Summary/Keyword: Network Study

Search Result 20,435, Processing Time 0.04 seconds

Network Analysis on Communication of Welfare Policy Using Twitter Data

  • Seo, Bojun;Lee, Soochang
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.58-64
    • /
    • 2018
  • This main purpose of the study is to identify social network of communicators sharing information on Bokjiro for publicizing welfare policy. This study employs NodeXL pro to understand networks and their role in the social network. The data for social network analysis was collected from Twitter for a week. The result of the analysis shows that the social network of communicators on Bokjiro does not have many nodes. It also has an independent network with high possibility of information distortion. Little communicators have controlling power in information flow in one way of communication. According to the result, it is not effective for marketing strategy of welfare policy in providing online information through Bokjiro. The study suggests that the government should use the transactional approach to marketing based on agent-oriented activity focusing on the exchange relationship between information providers and demanders in an age of networked intelligence.

A Study on the Influences of Network Features on the Diffusion of Internet Fashion Information (인터넷 패션정보 확산에서 네트워크 특성의 영향에 관한 연구)

  • Song, Ki Eun;Hwang, Sun Jin
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.2
    • /
    • pp.1-13
    • /
    • 2013
  • The purpose of this study is to examine how the features of network in the Internet fashion community affect the diffusion of fashion information to members in the online community with other variables (informative features, consumer features). Communities that actively exchange fashion information among their members were selected for the social network analysis and hypothesis verification. As a result, we found that a few information activists influenced most of the information receivers in the network features of fashion communities. Also, we found that the informative features (usefulness, reliability), consumer features (NFC, innovation) as well as the network features (connectivity, power), have a significant influence on the diffusion of Internet fashion information which verified the importance of the network features in the study on the Internet.

Performance enhancement of GSO FSS TCP/IP network (정지위성 TCP/IP 네트워크 전송 성능 향상)

  • Hong, Wan-Pyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.118-123
    • /
    • 2007
  • This paper studied the transmission control protocol over IP network to enhance the performance of the GSO satellite communication networks. The focus of this study is how to reduce the long round trip time and the transmission data rates over satellite link in the bidirectional satellite network. To do it, this study applied the caching and spoofing technology. The spoofing technology is used to reduce the required time for the link connection during communication. The caching technology is to improve the transmission bandwidth efficiency in the high transmission data rate link The tests and measurements in this study was performed in the commercial GSO communication satellite network and the terrestrial Internet network. The results of this paper show that the studied protocol in this paper highly enhance the performance of the bidirectional satellite communication network compare to the using TCP/IP satellite network protocol.

A Network Analysis Approach to the Evaluation of Students' Laboratory Reports (계통도 분석법을 이용한 실험보고서 평가의 효과 분석)

  • Paik, Seoung-Hey;Pak, Sung-Jae
    • Journal of The Korean Association For Science Education
    • /
    • v.12 no.1
    • /
    • pp.93-101
    • /
    • 1992
  • The purposes of this study were; 1) to apply the network analysis to evaluation of students' laboratory reports, 2) to test the applicability of the systematic network analysis. For this purposes, 7th grade 88 students from 22 middle schools in Inchon city of Korea were selected and their laboratory reports were evaluated by a evaluation criterion network developed in this study. The evaluation criterion consisted of 4 categories and 10 subcategories. The results of this study suggested that the network analysis approach was suitable one for the evaluation of students' laboratory reports. This was supported by total score distribution, means/weight, Cronbach's ${\alpha}$ coefficient(0.70), and the subcategories' reliabilities. The resluts of the factor analysis indicated that the evaluation criterion network of this study had two factors.

  • PDF

A Study on the Factors Affecting Knowledge Contribution and Knowledge Utilization in an Online Knowledge Network (온라인 지식네트워크 내에서의 지식기여 및 지식활용 활동에 영향을 미치는 요인)

  • Jung, Jae-Hwuen;Yang, Sung-Byung;Kim, Young-Gul
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.34 no.3
    • /
    • pp.1-27
    • /
    • 2009
  • Since online knowledge networks usually consist of a larger, loosely knit, and geographically distributed group of "strangers" who may not know each other very well, members may not willingly share their knowledge with others. In order to address this challenge, this study looks Into the factors that are expected to affect knowledge sharing in an online knowledge network. For empirical validation, we choose "the global network of Korean scientists and engineers (KOSEN)" as one of the best practices of online knowledge networks. By using the archival, network, and survey data, we validate two models of knowledge sharing in sequence (i.e., knowledge contribution and knowledge utilization models) and then discuss the results. The findings of this study show that individuals not only contribute but also utilize knowledge in an online knowledge network when they are structurally embedded and perceive a strong reciprocity. In the network. In addition, taking pleasure in helping is found to positively affect knowledge contribution, whereas perceiving usefulness is found to Influence knowledge utilization. Contributions of this study and future research opportunities are also discussed.

Workplace Violence and Social Network Service Addiction

  • Choi, Young-Keun
    • The Journal of Industrial Distribution & Business
    • /
    • v.8 no.7
    • /
    • pp.21-29
    • /
    • 2017
  • Purpose - The purpose of this study is to investigate the impact of organizational politics on employees' social network service addiction and how it influences their job satisfaction and organizational citizenship behavior. And this study explores if leader-member exchange can moderate the relationship between organizational politics and social network service addiction. Research, design, data, and methodology - For this, this study collected data from 305 employees in Korean companies through a survey method and uses SPSS 18.0 for hierarchical regression analysis in the hypothesis test. Results - First, organizational politics increases immersion, compulsion and association among the sub-factors of social network service addiction. Second, each phenomena of social network service addiction such as salience, compulsion and association decrease each relevant factors of job satisfaction and organizational citizen behavior. Third, compulsion and association among the sub-factors of social network service addiction play the mediating roles between organizational politics and each relevant factors of job satisfaction/organizational citizen behavior. Finally, some of sub-factors of leader-member exchange decrease the effect of each characteristics of organizational politics on immersion, compulsion and association among the sub-factors of social network service addiction. Conclusions - This study provides some of managerial implications to corporate executives who try to manage organizational attitude.

Technology-Focused Business Diversification Support Methodology Using Item Network (아이템 네트워크를 활용한 기술 중심 사업 다각화 기회 탐색 지원 방법론)

  • Bae, Kukjin;Kim, Ji-Eun;Kim, Namgyu
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.17-34
    • /
    • 2020
  • Recently, various attempts have been made to discover promising items and technologies. However, there are very few data-driven approaches to support business diversification by companies with specific technologies. Therefore, there is a need for a methodology that can detect items related to a specific technology and recommend highly marketable items among them as business diversification targets. In this paper, we devise Labeled Item Network for Business Diversification Consulting Support System. Our research is performed with three sub-studies. In Sub-study 1, we find the proper source documents to build the item network and construct item dictionary. In Sub-study 2, we derive the Labeled Item Network and devise four index for item evaluation. Finally, we introduce the application scenario of our methodology and describe the result of real-case analysis in Sub-study 3. The Labeled Item Network, one of the main outcome of this study, can identify the relationships between items as well as the meaning of the relationship. We expect that more specific business item diversification opportunities can be found with the Labeled Item Network. The proposed methodology can help many SMEs diversify their business on the basis of their technology.

A Study on the Structural Characteristics of Collaborative Network with Small Libraries: Focus on Bucheon Region (작은도서관 협력네트워크의 구조적 특성에 관한 연구 - 부천지역 작은도서관을 중심으로 -)

  • Lee, Jeong-Ho
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.1
    • /
    • pp.149-169
    • /
    • 2013
  • This exploratory study analyzed the structure of collaborative network among small libraries. The survey was conducted with the small libraries in Bucheon region. In order to analyze the structural features of the network, this study used social network analysis methods. The results of the study indicate that public small libraries has high density networks with other small libraries and performed a central role in the whole network. Private small libraries were, however, isolated in the whole network indicating their weak collaboration with other small libraries.

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

A Case Study on Network Status Classification based on Latency Stability

  • Kim, JunSeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4016-4027
    • /
    • 2014
  • Understanding network latency is important for providing consistent and acceptable levels of services in network-based applications. However, due to the difficulty of estimating applications' network demands and the difficulty of network latency modeling the management of network resources has often been ignored. We expect that, since network latency repeats cycles of congested states, a systematic classification method for network status would be helpful to simplify issues in network resource managements. This paper presents a simple empirical method to classify network status with a real operational network. By observing oscillating behavior of end-to-end latency we determine networks' status in run time. Five typical network statuses are defined based on a long-term stability and a short-term burstiness. By investigating prediction accuracies of several simple numerical models we show the effectiveness of the network status classification. Experimental results show that around 80% reduction in prediction errors depending on network status.