• 제목/요약/키워드: System performance

검색결과 49,593건 처리시간 0.071초

인공지능 기술에 관한 가트너 하이프사이클의 네트워크 집단구조 특성 및 확산패턴에 관한 연구 (Structural features and Diffusion Patterns of Gartner Hype Cycle for Artificial Intelligence using Social Network analysis)

  • 신선아;강주영
    • 지능정보연구
    • /
    • 제28권1호
    • /
    • pp.107-129
    • /
    • 2022
  • 기술경쟁이 심화되고 있는 오늘날 신기술에 대한 선도적 위치의 선점이 중요하다. 선도적 위치의 선점과 적정시점에 기술 획득·관리를 위해 이해관계자들은 지속적으로 기술에 대한 탐색활동을 수행한다. 이를 위한 참고 자료로서 가트너 하이프 사이클(Gartner Hype Cycle)은 중요한 의미가 있다. 하이프 사이클은 기술수명주기(S-curve)와 하이프 수준(Hype Level)을 결합하여 새로운 기술에 대한 대중의 기대감을 시간의 흐름에 따라 나타낸 그래프이다. 새로운 기술에 대한 기대는 기술사업화뿐만 아니라 연구개발 투자의 정당성, 투자유치를 위한 기회의 발판이 된다는 점에서 연구개발 담당자 및 기술투자자의 관심이 높다. 그러나 산업계의 높은 관심에 비해 실증분석을 시도한 선행연구는 다양하지 못하다. 선행문헌 분석결과 데이터 종류(뉴스, 논문, 주가지수, 검색 트래픽 등)나 분석방법은 한정적이었다. 이에 본 연구에서는 확산의 주요한 채널이 되어가고 있는 소셜네트워크서비스의 데이터를 활용하여 'Gartner Hype Cycle for Artificial Intelligence, 2021'의 단계별 기술들에 대한 집단구조(커뮤니티)의 특성과 커뮤니티 간 정보 확산패턴을 분석하고자 한다. 이를 위해 컴포넌트 응집규모(Component Cohesion Size)를 통해 각 단계별 구조적 특성과 연결중심화(Degree Centralization)와 밀도(Density)를 통해 확산의 방식을 확인하였다. 연구결과 기술을 수용하는 단계별 집단들의 커뮤니케이션 활동이 시간이 지날 수록 분절이 커지며 밀도 역시 감소함을 확인하였다. 또한 새로운 기술에 대한 관심을 촉발하는 혁신태동기 집단의 경우 정보확산을 촉발하는 외향연결(Out-degree) 중심화 지수가 높았으며, 이후의 단계는 정보를 수용하는 내향연결(In-degree) 중심화 지수가 높은 것으로 나타났다. 해당 연구를 통해 하이프 사이클에 관한 이론적 기초를 제공할 것이다. 또한 인공지능기술에 대한 기술관심집단들의 기대감을 반영한 정보확산의 특성과 패턴을 소셜데이터를 통해 분석함으로써 기업의 기술투자 의사결정에 새로운 시각을 제공할 것이다.

대영향(对影响)HSDPA복무적태도화사용의도적인소적연구(服务的态度和使用意图的因素的研究): 재아주화구주지간적(在亚洲和欧洲之间的)-개과문화비교(个跨文化比较) (The Factors Affecting Attitudes Toward HSDPA Service and Intention to Use: A Cross-Cultural Comparison between Asia and Europe)

  • Jung, Hae-Sung;Shin, Jong-Kuk;Park, Min-Sook;Jung, Hong-Seob;Hooley, Graham;Lee, Nick;Kwak, Hyok-Jin;Kim, Sung-Hyun
    • 마케팅과학연구
    • /
    • 제19권4호
    • /
    • pp.11-23
    • /
    • 2009
  • HSDPA(高速下行分组接入)是在第三代的W-CDMA技术基础上的3.5代移动通信异步服务. 在韩国, 它主要是通过提供可视电话服务. 由于更强大和多元化的服务扩散, 随着移动通信技术迅速的进步, 消费者需要更多的选择. 然而, 由于各种技术, 不论消费者偏好往往会溢出市场, 消费者感到越来越迷惑. 因此, 我们不应该采取只注重发展假设是下一代新技术项目的战略相反, 我们应该了解消费者接受新的形式和技术的过程, 通过制定战略, 使开发人员能够理解并提供消费者真正想要的, 从而降低进入市场的障碍. 在技术接受模型(TAM)中, 感知到的有用性和使用的简单性被认为是影响人们接受新技术的态度的最重要因素(Davis, 1989; Taylor and Todd, 1995; Venkatesh, 2000; Lee et al., 2004). 感知到的有用性是一个人相信某种特定的技术能提高他或她工作绩效的程度. 感知易用性是主观认为使用某种特定技术不需要太多体力和精力的付出的程度(Davis, 1989; Morris and Dillon, 1997; Venkatesh, 2000). 感知的愉悦性和感知的有用性已经被清楚的证明对接受技术的态度有影响(Davis et al., 1992). 比如, 网上购物的愉悦性已经表现出对消费者对网上商家的态度有积极的影响(Eighmey and McCord, 1998; Mathwick, 2002; Jarvenpaa and Todd, 1997). 消费者的感知风险是一种主观风险. 这种风险和客观可能的风险是有显著区别的. 感知风险包括心理上的风险, 这是当消费者为某一特定物品而选择品牌, 商店和购买方式时所感知到的. 企业革新产品的能力取决于有效的获得有关新产品的知识(Bierly and Chakrabarti, 1996; Rothwell and Dodgson, 1991). 知识获取是公司感知外界新事物和技术的价值的能力(Cohen and Levinthal, 1990); 是公司评估外界最新的技术的能力(Arora and Gambaradella, 1994); 是公司正确预测这项科技对未来革新的能力(Cohen and Levinthal, 1990). 消费者创新是一种在社会体系中比其他人更早接受创新的程度(Lee, Ahn, and Ha, 2001; Gatignon and Robertson, 1985). 也就是说, 它显示了消费者如何快速、方便地接受新的思路. 创新被认为是重要的, 因为它对消费者是否接受新产品和他们多快接受新产品有显著的影响(Midgley and Dowling, 1978; Foxall, 1988; Hirschman, 1980). 我们用技术接受模型来进行跨国家的研究比较, 此模型实证验证了影响态度的因素-感知有用性, 易用性, 感知愉悦, 感知风险, 创新和感知的知识管理水平-和对HSDPA服务的态度之间的关系. 我们为HSDPA服务提供商开发更有效的管理方法还验证了态度和使用意图之间的关系. 在本研究中, 我们在韩国350名学生中分发了346份问卷调查. 由于其中26份收回的问卷时不完整的或者有缺失数据, 所以在假设检验时320份问卷被使用. 在英国, 200份问卷收回了192份, 舍弃了两份不完整的之后, 总共有190份问卷用于统计分析中. 整体模型的分析结果如下: 韩国, x2=333.27(p=0.0), NFI=0.88, NNFI=0.88, CFI=0.91, IFI=0.91, RMR=0.054, GFI=0.90, AGFI=0.84; 英国, x2=176.57(p=0.0), NFI=0.88, NNFI=0.90, CFI=0.93, IFI=0.93, RMR=0.062, GFI=0.90, AGFI=0.84. 在韩国消费者中, 从有关影响HSDPA服务的使用意图和态度之间的关系的假设检验的结果中, 感知的有用性, 易用性, 乐趣, 知识管理的高水平和促进创新对HSDPA移动手机的态度有积极的影响. 然后, 易用性和感知的乐趣对HSDPA服务的使用意图没有直接的影响. 这可能是因为在日常生活中使用视频电话还不是必需的这一现实. 而且消费者对HSDPA视频电话的态度和使用意图有直接的关系, 这些态度包括感知的有用性, 易用性, 乐趣, 知识管理的高水平和创新. 这些关系构成了购买意图的基础, 并造成消费者决定谨慎购买的情况. 对欧洲消费者的假设检验结果揭示了感知的有用性, 乐趣, 风险和知识管理水平是影响态度形成的因素, 而易用性和创新则对态度没有影响. 特别是效果价值和感知有用性, 在快乐和知识管理之后对态度有最大的影响. 相反, 认为感知风险对态度影响较小. 在亚洲模型中易用性和感知的乐趣没有发现对使用意图有直接影响. 然而, 因为态度广泛的影响使用意图, 感知有用性, 乐趣, 风险和知识管理可被视为从使用意图中的态度发展的关键因素. 总之, 感知的有用性, 愉悦和知识管理水平在亚洲和欧洲消费者中对态度形成都有影响, 这些梯度形成了消费者的使用意图. 而且, 易用性和感知的乐趣对使用意图的假设被拒绝. 然而, 易用性, 感知风险和创新有不同的结果. 在亚洲消费者中, 感知风险对态度形成没有影响, 而在欧洲消费者中, 易用性和创新对态度都没有影响.

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • 제20권2호
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.