• Title/Summary/Keyword: Social network information

Search Result 2,467, Processing Time 0.031 seconds

The Analysis on the KAIE Articles using Social Network Analysis (사회연결망 분석을 활용한 정보교육학회 논문 분석)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.6
    • /
    • pp.543-552
    • /
    • 2016
  • Recently, a number of researches focus on social network analysis and it is applied to various fields not only in social science area but also in natural science area. Therefore, the social network analysis and the text analysis were conducted in order to analyze the current trend of the theses in information education field. The result indicated that the most frequently mentioned words were consistent with the development of information technology and the change in information education curriculum. That is, the mentioned words were computer aided instruction (CAI) and courseware for period 1, ICT for period 2, smart and scratch for period 3, and in period 4, computational thinking ability and coding appeared for the first time. Moreover, as the result of social network analysis, it concluded the research topics became more complicated and detailed as the words diversified throughout the period in which the simplified network in period 1 changed its configuration into a structure with more diversified words of higher centrality.

Status and Prevention of Negative Behavior due to Disinhibition Effect in SNS(Social Network Service) (사회 관계망 서비스(SNS)에서 탈억제 효과로 인한 부정적 행위의 실태 및 예방 대책)

  • Kang, Moon-seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2370-2378
    • /
    • 2016
  • Social Network Service(SNS) users are increasing globally. Within that trend, 'SNS attacking' victims are increasing in social network service space like KakaoStory, facebook, or Instargram as people damage others' personality or reputation. In this paper is to investigate and analyze awareness of negative behavior attributed to disinhibition effect with undergraduates who are the group of people using social network service the most diversely in smart environment and devise preventive measures to reduce social network service attacking victims and attackers. In social network service space, undergraduates are hardly aware of other people's personality, defamation, or invasion of privacy, and the level of guilt they feel towards social network service attacking is seriously low. To solve this problem, this study suggests preventive measures so that they can be equipped with awareness and regulations right for this social network service age and can prevent negative behavior resulted from disinhibition effect.

Analysis of Social Network According to The Distance of Characters Statements (소설 등장인물의 텍스트 거리를 이용한 사회 구성망 분석)

  • Park, Gyeong-Mi;Kim, Sung-Hwan;Cho, Hwan-Gue
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.427-439
    • /
    • 2013
  • With the fast development of complex science, lots of social networks are studied. We know that the social network is widely applied in analyzing issues in human culture, economics and web sciences. Recently we witness that some researchers began to compare the social network constructed from fiction literatures(literature social network) and the real social network obtained from practice. But we point that previous approaches for literature social network have some drawbacks since they completely depend on the biographical dictionary constructed for a designated literature. So since the previous approach focus on the few important characters and peoples around them, we can not understand the global structure of all characters appeared in the literature at least once. We propose one method to extract all characters appeared in the literature and how to make the social network from that information. Also we newly propose K-critical network by applying frequency of the named characters and the strength of relationship among all textual characters. Our experiment shows that the K-critical measure could be one crucial quantitative measure to compute the relationship strength among characters appeared in the object literature.

A Network Analysis of Information Exchange using Social Media in ICT Exhibition (ICT전시회에서 소셜 미디어를 활용한 정보교환 네트워크 분석)

  • Ha, Ki Mok;Moon, Hyun Sil;Choi, Il Young;Kim, Jae Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.1-17
    • /
    • 2014
  • The proliferation of using social media and social networking services affects the lifestyles of people. These phenomena are useful to companies that wish to promote and advertise new products or services through these social media; these social media venues also come with large amounts of user data. However, studies that analyze the data of social media within the perspective of information exchanges are hard to find. Much of the previous research in this area is focused on measuring the performance of exhibitions using general statistical approaches and piecemeal measures. Therefore, in this study, we want to analyze the characteristics of information exchanges in social media by using Twitter data sets, which are relating to the Mobile World Congress (MWC). Using this methodology provides exhibition organizers and exhibitors to objectively estimate the effect of social media, and establish strategies with social media use. Through a user network analysis, we additionally found that social attributes are as important as the popular attribute regarding the sustainability of information exchanges. Consequently, this research provides a network analysis using the data derived from the use of social media to communicate information regarding the MWC exhibition, and reveals the significance of social attributes such as the degree and the betweenness centrality regarding the sustainability of information exchanges.

A Re-configuration Scheme for Social Network Based Large-scale SMS Spam (소셜 네트워크 기반 대량의 SMS 스팸 데이터 재구성 기법)

  • Jeong, Sihyun;Noh, Giseop;Oh, Hayoung;Kim, Chong-Kwon
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.801-806
    • /
    • 2015
  • The Short Message Service (SMS) is one of the most popular communication tools in the world. As the cost of SMS decreases, SMS spam has been growing largely. Even though there are many existing studies on SMS spam detection, researchers commonly have limitation collecting users' private SMS contents. They need to gather the information related to social network as well as personal SMS due to the intelligent spammers being aware of the social networks. Therefore, this paper proposes the Social network Building Scheme for SMS spam detection (SBSS) algorithm that builds synthetic social network dataset realistically, without the collection of private information. Also, we analyze and categorize the attack types of SMS spam to build more complete and realistic social network dataset including SMS spam.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

The Impact of Social Network Service, Trust and Cognition on Customer Loyalty in Internet Shopping

  • Sun, Han-Gil
    • Journal of Information Management
    • /
    • v.42 no.2
    • /
    • pp.211-234
    • /
    • 2011
  • The development of information technology improves the globalization of the world economy. This change was able to expand the cyber space, and the online community known as the cyber community is made within the existing offline community. From the cyber community's activity, the concept of social network services created, and recently developed social computing. Social computing is the current situation and the next step in the online community. Currently, most CIOs are using social computing for workplace empowerment. As online transactions become more active, the strategy to increase customer loyalty in Internet shopping is an effective tool to increase profit for the company, and as a method to maintain competitive. With the growth of electronic commerce, through insurance of customer loyalty on the Internet, a company can establish a long-term relationship with customers, so for this, it is important to have reliable relationship with customers. Also, through advertisement and commercial information, the cognition of Internet shopping looks can be effective in retaining customers. In this study, it explores how social computing and trust and cognition of Internet shopping are effective in maintaining customer loyalty. As the result of study, the trust and cognition of Internet shopping are significantly effective on customer loyalty, but the sense of social computing. Still, social computing has not matured enough to be as effective in retaining customer loyalty. However, it does indicate that social computing has significantly increased the trust and cognition in Internet shopping. In this study, as the concepts of the social network service and social computing are applied in Internet shopping, which are actively discussed by scholars, it is expected that the basis of the study could improve and present the idea of social shopping.

Unusual Suspect of Societal Innovativeness in Online Social Innovation Community: A Network and Communication Framework

  • Lee, Jemin Justin;Cheon, Youngjoon;Han, Sangyun;Kwak, Kyu Tae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5841-5859
    • /
    • 2018
  • The widespread adoption of the social computing paradigm has ushered in the development of online social innovation community (OSIC) as a promising method for solving social problems. Previous studies have not explicitly considered the conceptual factors that facilitate these communities' users' innovative activities, so it is vital to conduct empirical studies to verify the effectiveness of these factors. In this paper, the primary goals are to construct a theoretical model of the social innovation and empirically verify the casual relationship between theoretical factors and societal innovativeness. A survey of 398 OSIC users was conducted to empirically validate the theoretical model. The causal relationships between network characteristics and social innovativeness were experimentally tested. The results of this study indicated that ambiguity, switching, and multiplexity are important factors that facilitate social innovativeness, which contradicts the prior assumptions about innovation performance.

A Study on Complexity Theory of e-Business Domain - A Focused on Strategic Alliance Modeling Using Social Network - (e비즈니스 분야에서의 복잡계론 접목에 관한 연구 -사회연결망을 활용한 전략적 제휴모형을 중심으로-)

  • Park, Ki-Nam;Lee, Moon-Noh
    • The Journal of Information Systems
    • /
    • v.18 no.3
    • /
    • pp.47-70
    • /
    • 2009
  • Social network is one of the representative analytical method of the complexity theory and this research analyzed various and unique strategic alliance model of e-business domain using social network technique. A lot of small and medium firms of e-business field had developed many useful type of strategic alliances for the firms tried to maximize the effect of advertisement, marketing and to make up for their weak points and to compete with huge company with capital strength long before. But it is too rare to analyze the structure of the firm networks and to study the evolution and extension of business model considered the role of each company in the network. Social network analysis helps each firm's network easily visualized and completely modelized. Additionally, this paper cries to analyze the relationship between the role of hub and broke in the firm networks for strategic alliance, and financial performance. We demonstrate the firm with finer business model to the business environment can make higher financial performance. This implies that the firm that can create new finer business model, will lead the network of e-business firms and evolve the industry of e-business.

Research on the Discourse of Libraries During COVID-19 in YouTube Videos Using Topic Modeling and Social Network Analysis

  • Euikyung Oh;Ok Nam Park
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.3
    • /
    • pp.29-42
    • /
    • 2023
  • This study explored issues related to the library in the COVID-19 era in YouTube videos in Korea. This study performed social network analysis and topic modeling analysis by collecting 479 YouTube videos, 20,545 words, and 8,379 channels related to COVID-19 and the library from 2019 to 2020. The study results confirmed that YouTube, a social media platform, was used as an important medium to connect users and physical libraries and provide/promote online library services. In the study, major topics and keywords such as quarantine, vlog, and library identity during the COVID-19 pandemic, library services and functions, and introductions and user guides of libraries were derived. Additionally, it was identified that videos about COVID-19 and the library are being produced by various actors (news and media channels, libraries, government agencies, librarians, and individual users). However, the study also identified that the actor network is fragmented through the channel network, showing a low density or weak linkage, and that the centrality of the library in the actor network is weak.