• Title/Summary/Keyword: Networking behavior

Search Result 148, Processing Time 0.022 seconds

The Effect of Blog Commitment to Fashion Product Purchase and Information Reproduction Behavior -Focus on Blog Characteristic and Consumer Information Variety Seeking- (블로그 몰입이 패션제품 구매행동과 정보 재생산 활동에 미치는 영향 -블로그 특성과 소비자 정보 다양성 추구를 중심으로-)

  • Kim, Seu-La;Hong, Keum-Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.9
    • /
    • pp.1028-1038
    • /
    • 2011
  • A blog has significant effect as a new online medium and as a tool to share information with its powerful networking function. Blogs are established based on personal experience and their impact is stronger than conventional media in terms of informativeness, credibility and interactivity. Such characteristics of blogs lead to blog commitment (a phenomenon that has behavioral consequences) that eventually influences consumer fashion purchase behavior. The more a consumer is interested in fashion and seeks diverse information from a wide range of media, the more personally committed they become to certain blogs; in addition, they will also post the results of their fashion product purchases on their blog to further create and reproduce information. This research discovers how blog commitment affects fashion product purchase behavior and information reproduction activity among consumers as well as explores the impact of blog characteristics and information variety seeking by individual consumers on these factors. The data was collected from 428 adults who purchased a fashion product based on information they found on a blog. The results are as follows. First, blog characteristics are composed of accessibility, interactivity, credibility of the information, and informativeness. Second, in terms of the blog commitment, informativeness, credibility, and consumer information diversification (respectively), turned out to have positive effects; in addition, accessibility and credibility had positive effects for corporate blogs. The comparison between private and corporate blogs showed that consumers tend to be more committed to private blogs. Third, in terms of the brand attitude, private/corporate blog commitment, credibility, and consumer information diversification (respectively) had a positive influence. Fourth, blog characteristics and consumer information diversification led consumers (through private/corporate blog commitment) to form a favorable attitude towards the brand and purchase products that resulted in information reproduction of the purchased product.

Framework for Measuring Dynamic Influence Index & Influence Factors using Social Data on Facebook (페이스북 소셜 데이터를 이용한 동적 영향 요인 및 영향력 측정 방법에 관한 프레임워크)

  • Koh, Seoung-hyun;You, Yen-yoo
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.137-145
    • /
    • 2016
  • The explosive growth of social networking services based on smart devices popularize these relationships and activities online in accordance with the far larger impact of this on the real life offline, the interest and importance for the online activity is increasing. In this study, factors affecting the SNS activity are defined by object, user, influence direction, influence distance and proposed a method to measure organic terms in effect between the SNS users. Influence Direction and Influence Strength (or Distance) are elaborated by using the existing influence measurement element such as structured data - the number of friends, the difference between the number of contacts - and the new influence measurement element such as unstructured data - gap between the former time and the latter time, preference and type of response behavior - that occur in social network service. In addition, the system for collecting and analysing data for measuring influence from social network service and the process model on the method for measuring influence is tested by using sample data on Facebook and explained the implementation probability.

Effect of the Addition of Si and Alkali Metal on the Viscosity and Molecular Behavior of Water Glass (Si와 알칼리 금속의 첨가에 따른 물유리의 점도 및 분자결합구조 특성변화)

  • Ryu, Young Bok;Lee, Man Sig
    • Applied Chemistry for Engineering
    • /
    • v.29 no.1
    • /
    • pp.112-116
    • /
    • 2018
  • In this study, the mixing characteristics of water glass and additives (Si, alkali metal), which are one of the main raw materials of silicate based binder used in the production of molds during casting process, were examined. Molecular structures of water glass, additives and mixtures were analyzed FT-IR and viscosity measurements and their correlation were compared. The addition of Si source to the water glass accelerated the Si networking in the material and increased the viscosity. When the alkali metal was added, the viscosity of the water glass decreased by suppressing the Si networking of the water glass. Viscosities of the water glass and lithium silicate (LS) mixtures increased when the content of LS was less than 20 wt% and gradually decreased when the content was more than 20 wt%. By adding KOH to the water glass, the viscosity could be lowered and it could be used effectively to mix with colloidal silica (CS) or potassium methyl siliconate (PMS).

Context-aware Ontology Modeling using by Legacy Home Appliences (생활기기 센서를 이용한 상황인지 온톨로지 모델링)

  • Lee, Eunyoung;Min, Ukki;Won, Yusuk;Kim, Bonam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.737-740
    • /
    • 2013
  • The widespread use of smart home appliances with smart home networking is leading to a next generation of a new technology that exploit user contextual information to provide a richer experience. However, in the most part of home networking systems the intelligent personalization services between user and home appliances have not been adequately supplied in respect of the long lifespan of the legacy home appliances. In addition, without installing smart home appliances when constructing new building the users can not use this service. To use this service, the legacy home appliance need to attach enabler equipped with the various sensors just as it is smart home appliances. The goal is to create a service that enables appliances to exchange information and control their actions through the IoT gateway to achieve nonintrusive behavior and customized services without human intervention. In this paper, we propose a ontology model to represent the user context to be able to induce right service automatically and use it to discover, utilize and enhance different services in real time that the user may be interested in.

  • PDF

Analysis of the TCP performance over IEEE1394 based Home Networkings (IEEE1394 기반의 홈 네트워킹에서의 TCP 성능 분석)

  • 장종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.4
    • /
    • pp.706-715
    • /
    • 2001
  • TCP typically offers reasonable end-to-end performance to users regardless of the bandwidth and error characteristics of particular network technology, The robustness of TCP has contributed to its success in the internet environment. The role of communications is already well established in the office environment. With the advent of cheap, affordable broadband communications and the increasing complexity of consumer goods, it seems natural to extend the network into homes. In-home networking means a high-speed communication among the digital appliances within a home. Introduction of application over high-speed home network using TCP/IP protocol is increasing. The integrated environment of internet and home network is demanding as well. We have validated TCP model over high speed home network environment, investigated the throughput behavior of TCP over IEEE 1399 home networks, and evaluated a potential solution for high performance of TCP over IEEE 139t home networks. The simulation model has produced several interesting results in the performance of TCP over IEEE 1394 home network.

  • PDF

A Reputation Compensation Protocol For Mobile Ad Hoc Networks (모바일 Ad hoc 네트워크를 위한 신용 평가 보상 프로토콜)

  • Lei, Zhu;Kang, Jeon-Il;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.1
    • /
    • pp.35-44
    • /
    • 2006
  • The area of ad hoc networking has been receiving increasing attention among researchers in recent years and a variety of routing protocols targeted specifically at the ad hoc networking environment have been proposed. Selfish nodes are those which do not perform certain operations that the protocol specifies that they should, through a wish to conserve power. We propose a scheme as a mean to mitigate the detrimental effect of selfish nodes. We also propose a new area that might affect nodes' behavior - the environment's influence. In order to let nodes fairly be able to communicate in the networks we proposed solution to this problem. And our scheme can be applied to other reputation methods. We also contain the simulation results in our paper, and through the result, we can conclude that we can solve the problem by adding a little overhead.

Verifying Active Network Applications (액티브 네트워크 응용의 검증)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

A Comparative Estimation of Performance of Average Loss Interval Calculation Method in TCP-Friendly Congestion Control Protocol (TFRC 프로토콜의 평균 손실 구간 계산방식의 비교평가)

  • Lee, Sang-Chul;Jang, Ju-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.495-500
    • /
    • 2002
  • We propose a new estimation method for rate adjustment in the face of a packet loss in the TFRC protocol, a TCP-Friendly congestion control protocol for UDP flows. Previous methods respond in a sensitive way to a single packet loss, resulting in oscillatory transmission behavior. This is an undesirable for multimedia services demanding constant bandwidth. The proposed TFRC provides more smooth and fair (against TCP flows) transmission through collective response based on multiple packets loss events. We show our "Exponential smoothing method" performs better than known "Weight smoothing method" in terms of smoothness and fairness.

Using System Dynamics to study systemic corruption (시스템다이내믹스를 활용한 체제적 부패 연구)

  • Lim, Seong Bum
    • Korean System Dynamics Review
    • /
    • v.15 no.4
    • /
    • pp.29-60
    • /
    • 2014
  • As every commentators has noted, bureaucratic corruption, which has complicated causes, is prevalent phenomenon in Korean society. Especially, most people realize that systemic corruption has a strong negative effect on society; however, only few studies reflect on the nature of 'systemic corruption' and it seems that no established theory explains the phenomenon. Thus, this study suggest that we look more carefully into the nature and mechanisms of 'systemic corruption'. Interdisciplinary approach based on the integrated model of structure-behavior to analyse the nature of bureaucratic corruption. The system dynamics method can test the mechanisms of 'systemic corruption'. With this way, the factors generating systemic corruption represent the relationships reinforcing and balancing within system dynamics model. This paper also consider 'isomorphism' and 'dominance' as control mechanisms to systemic corruption. From the CLD(Causal Loop Diagram), three main areas(rent in organization, networking, control mechanisms) are overlapped and it indicates dynamic relationships of systemic corruption in organizations.

  • PDF

Predicting Information Self-Disclosure on Facebook: The Interplay Between Concern for Privacy and Need for Uniqueness

  • Kim, Yeuseung
    • International Journal of Contents
    • /
    • v.15 no.4
    • /
    • pp.74-81
    • /
    • 2019
  • This study examined the overall relationship between information privacy concern, need for uniqueness (NFU), and disclosure behavior to explain the personal factors that drive data-sharing on Facebook. The results of an online survey conducted with 222 Facebook users show that among diverse data that social media users disclose online, four distinct factors are identified: basic personal data, private data, personal opinions, and personal photos. In general, there is a negative relationship between privacy concern and a positive relationship between the NFU and the willingness to self-disclose information. Overall, the NFU was a better predictor of willingness to disclose information than privacy concern, gender, or age. While privacy concern has been identified as an influential factor when users evaluate social networking sites, the findings of this study contribute to the literature by demonstrating that an individual's need to manifest individualization on social media overrides privacy concerns.