• 제목/요약/키워드: Reputation Information

검색결과 421건 처리시간 0.023초

An Integer Programming Formulation for Outpatient Scheduling with Patient Preference

  • Wang, Jin;Fung, Richard Y.K.
    • Industrial Engineering and Management Systems
    • /
    • 제13권2호
    • /
    • pp.193-202
    • /
    • 2014
  • Patients' satisfaction while receiving medical service is affected by whether or not their preferences can be met, including time and physician preference. Due to scarcity of medical resource in China, efficient use of available resources is urgently required. To guarantee the utilization ratio, the scheduling decisions are made after all booking information is received. Two integer models with different objectives are formulated separately, maximizing the degree of satisfaction and revenue. The optimal value of the two models can be considered as the bound of corresponding objectives. However, it is improper to implement any of the extreme policies. Because revenue is a key element to keep the hospital running and satisfaction degree is related to the hospital's reputation, neither the revenue nor the satisfaction can be missed. Therefore, hospitals should make a balance. An integrated model is developed to find out the tradeoff between the two objectives. The whole degree of mismatching that is related to patient satisfaction and other separate mismatching degree are considered. Through a computational study, it is concluded that based on the proposed model hospitals can make their decisions according to service requirement.

From Invisible to Irresistible: Intellectual Property and Digital Media & Entertainment Ventures in Korea (지적재산권 관리가 국내 디지털 미디어 콘텐츠 업체 VC 투자 유치에 미치는 영향)

  • Eun Jung Hyun
    • Smart Media Journal
    • /
    • 제12권3호
    • /
    • pp.93-101
    • /
    • 2023
  • In this paper, we investigate the relationship between a company's Intellectual Property (IP) portfolio strength and its success in obtaining venture funding in the Korean digital media & entertainment industry. Using data from 685 Korean digital media & entertainment companies registered in Crunchbase, a global database provider of venture funding information, we found that a strong IP portfolio is positively associated with funding success. Furthermore, our study revealed that the effect of IP portfolio strength on funding success is stronger for younger companies, suggesting that IP portfolio is more critical for firms that have less reputation and track record.

Issue tracking and voting rate prediction for 19th Korean president election candidates (댓글 분석을 통한 19대 한국 대선 후보 이슈 파악 및 득표율 예측)

  • Seo, Dae-Ho;Kim, Ji-Ho;Kim, Chang-Ki
    • Journal of Intelligence and Information Systems
    • /
    • 제24권3호
    • /
    • pp.199-219
    • /
    • 2018
  • With the everyday use of the Internet and the spread of various smart devices, users have been able to communicate in real time and the existing communication style has changed. Due to the change of the information subject by the Internet, data became more massive and caused the very large information called big data. These Big Data are seen as a new opportunity to understand social issues. In particular, text mining explores patterns using unstructured text data to find meaningful information. Since text data exists in various places such as newspaper, book, and web, the amount of data is very diverse and large, so it is suitable for understanding social reality. In recent years, there has been an increasing number of attempts to analyze texts from web such as SNS and blogs where the public can communicate freely. It is recognized as a useful method to grasp public opinion immediately so it can be used for political, social and cultural issue research. Text mining has received much attention in order to investigate the public's reputation for candidates, and to predict the voting rate instead of the polling. This is because many people question the credibility of the survey. Also, People tend to refuse or reveal their real intention when they are asked to respond to the poll. This study collected comments from the largest Internet portal site in Korea and conducted research on the 19th Korean presidential election in 2017. We collected 226,447 comments from April 29, 2017 to May 7, 2017, which includes the prohibition period of public opinion polls just prior to the presidential election day. We analyzed frequencies, associative emotional words, topic emotions, and candidate voting rates. By frequency analysis, we identified the words that are the most important issues per day. Particularly, according to the result of the presidential debate, it was seen that the candidate who became an issue was located at the top of the frequency analysis. By the analysis of associative emotional words, we were able to identify issues most relevant to each candidate. The topic emotion analysis was used to identify each candidate's topic and to express the emotions of the public on the topics. Finally, we estimated the voting rate by combining the volume of comments and sentiment score. By doing above, we explored the issues for each candidate and predicted the voting rate. The analysis showed that news comments is an effective tool for tracking the issue of presidential candidates and for predicting the voting rate. Particularly, this study showed issues per day and quantitative index for sentiment. Also it predicted voting rate for each candidate and precisely matched the ranking of the top five candidates. Each candidate will be able to objectively grasp public opinion and reflect it to the election strategy. Candidates can use positive issues more actively on election strategies, and try to correct negative issues. Particularly, candidates should be aware that they can get severe damage to their reputation if they face a moral problem. Voters can objectively look at issues and public opinion about each candidate and make more informed decisions when voting. If they refer to the results of this study before voting, they will be able to see the opinions of the public from the Big Data, and vote for a candidate with a more objective perspective. If the candidates have a campaign with reference to Big Data Analysis, the public will be more active on the web, recognizing that their wants are being reflected. The way of expressing their political views can be done in various web places. This can contribute to the act of political participation by the people.

Animation Spectators' View Motive and Selection for Each of Group (애니메이션 관객의 집단별 관람동기와 선택기준)

  • So, Yo-Hwan
    • The Journal of the Korea Contents Association
    • /
    • 제8권12호
    • /
    • pp.109-117
    • /
    • 2008
  • This research analyzed which average comparisons and differences between groups' view motive and selection for information sources, product properties with theater animation spectator. Based on view frequency, each of groups' organization were classified to heavy, occasional, and thinly viewers. As average comparison analysis result, firstly, view motive appeared in order to "want to see animation", "to spend time and leisure activity", "to enjoy fun activity", and "because of others canvassing or recommendation", etc. Secondly, view selection for information source appeared in order to "rumor circumstance or reputation", "theater or TV previews", "internet evaluation and grade", etc. At last, view selection for practical property appeared in order to "story", "character", "special effects", "background music", "background art", "director/directing", "manufacturer/nation", and "dubbing of artist". As difference between group result, view motive and selection for product properties appeared significant differences between each of group. To the contrary, view selection for information sources did not appeared significant differences between each of group.

Consumers' Perception on Legal Liability of the Online Reviews (온라인 사용후기에 대한 법적책임의식에 관한)

  • Kim, Soyean
    • International Commerce and Information Review
    • /
    • 제17권3호
    • /
    • pp.3-27
    • /
    • 2015
  • As hostile online reviews can have a negative impact on a company's reputation, it is not surprising that online reviewers and business owners often get involved in conflicts which sometimes evolve into legal disputes. This research examines the legal dispute case in which the business owner charges an online reviewer for a defamation. Further, this research compares the supreme court's decision with general public's view on this defamation case, using a survey method. From the legal point of view, an online reviewer's primary motive determines whether the online reviews are defamatory statements or not. Specifically, if an online reviewer's primary motive is to increase the overall benefits for the public society, the online review does not bear any legal liability. According to our survey, consumers' view aligns with the final decision of the supreme court. They believe that online reviews should bear a minimum level of legal liability as online reviews often contain useful and valuable information which can enhance overall public benefits.

  • PDF

A Quantitative Trust Model with consideration of Subjective Preference (주관적 선호도를 고려한 정량적 신뢰모델)

  • Kim, Hak-Joon;Lee, Sun-A;Lee, Kyung-Mi;Lee, Keon-Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • 제16권1호
    • /
    • pp.61-65
    • /
    • 2006
  • This paper is concerned with a quantitative computational trust model which lakes into account multiple evaluation criteria and uses the recommendation from others in order to get the trust value for entities. In the proposed trust model, the trust for an entity is defined as the expectation for the entity to yield satisfactory outcomes in the given situation. Once an interaction has been made with an entity, it is assumed that outcomes are observed with respect to evaluation criteria. When the trust information is needed, the satisfaction degree, which is the probability to generate satisfactory outcomes for each evaluation criterion, is computed based on the outcome probability distributions and the entity's preference degrees on the outcomes. Then, the satisfaction degrees for evaluation criteria are aggregated into a trust value. At that time, the reputation information is also incorporated into the trust value. This paper presents in detail how the trust model works.

The Effective Blog Search Algorithm based on the Structural Features in the Blogspace (블로그의 구조적 특성을 고려한 효율적인 블로그 검색 알고리즘)

  • Kim, Jung-Hoon;Yoon, Tae-Bok;Lee, Jee-Hyong
    • Journal of KIISE:Software and Applications
    • /
    • 제36권7호
    • /
    • pp.580-589
    • /
    • 2009
  • Today, most web pages are being created in the blogspace or evolving into the blogspace. A blog entry (blog page) includes non-traditional features of Web pages, such as trackback links, bloggers' authority, tags, and comments. Thus, the traditional rank algorithms are not proper to evaluate blog entries because those algorithms do not consider the blog specific features. In this paper, a new algorithm called "Blog-Rank" is proposed. This algorithm ranks blog entries by calculating bloggers' reputation scores, trackback scores, and comment scores based on the features of the blog entries. This algorithm is also applied to searching for information related to the users' queries in the blogspace. The experiment shows that it finds the much more relevant information than the traditional ranking algorithms.

Development of Indicators for Evaluating the Web Credibility by Goodness-of-fit Analysis (지표 적합도 분석을 통한 웹 사이트 신뢰성 평가 지표 개발에 관한 연구)

  • Kim, Young-Kee
    • Journal of the Korean Society for information Management
    • /
    • 제25권4호
    • /
    • pp.185-204
    • /
    • 2008
  • The Internet is now an integral part of the everyday lives of a majority of people. Web users are demanding web sites that offer credible information. This study tired to comprehensively extract the factors that affect the perception web credibility based on preceding researches and develop of indicators for evaluating the web credibility by goodness-fit analysis. I modified more than 100 factors which presented by preceding researches to 28 factors, and allocated these factors into the hierarchical categories like followings; trustworthiness, expertness, safety are categorized as first level factors, trustfulness and reputation are placed to sub-factors of trustworthiness, usefulness, timeliness and competency to sub-factors of expertness, security and reliability to sub-factors of safety as second level factors. Finally this study developed evaluating indicators for web credibility by goodness-of fit analysis.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • 제11권5호
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario (단일 정보유출 시나리오를 이용한 개별 보안솔루션 로그 분석 방법)

  • Park, Jang-Su;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제4권2호
    • /
    • pp.65-72
    • /
    • 2015
  • According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.