• Title/Summary/Keyword: University researchers

Search Result 6,657, Processing Time 0.045 seconds

A Study on ChoSonT'ongPaeJiIn (조선통폐지인(朝鮮通幣之印) 연구)

  • Moon, Sangleun
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.2
    • /
    • pp.220-239
    • /
    • 2019
  • According to the National Currency (國幣) article in GyeongGukDaeJeon (經國大典), the ChoSonT'ongPaeJiIn (朝鮮通幣之印) was a seal that was imprinted on both ends of a piece of hemp fabric (布). It was used for the circulation of hemp fabric as a fabric currency (布幣). The issued fabric currency was used as a currency for trade or as pecuniary means to have one's crime exempted or replace one's labor duty. The ChoSonT'ongPaeJiIn would be imprinted on a piece of hemp fabric (布) to collect one-twentieth of tax. The ChoSonT'ongPaeJiIn (朝鮮通幣之印) was one of the historical currencies and seal materials used during the early Chosun dynasty. Its imprint was a means of collecting taxes; hence, it was one of the taxation research materials. Despite its value, however, there has been no active research undertaken on it. Thus, the investigator conducted comprehensive research on it based on related content found in JeonRokTongGo (典錄通考), Dae'JeonHu-Sok'Rok (大典後續錄), JeongHeonSwaeRok (貞軒?錄) and other geography books (地理志) as well as the materials mentioned by researchers in previous studies. The investigator demonstrated that the ChoSonT'ongPaeJiIn was established based on the concept of circulating Choson fabric notes (朝鮮布貨) with a seal on ChongOseungp'o (正五升布) in entreaty documents submitted in 1401 and that the fabric currency (布幣) with the imprint of the ChoSonT'ongPaeJiIn was used as a currency for trade, pecuniary or taxation means of having one's crime exempted, or replacing one's labor, and as a tool of revenue from ships. The use of ChoSonT'ongPaeJiIn continued even after a ban on fabric currencies (布幣) in March 1516 due to a policy on the "use of Joehwa (paper notes)" in 1515. It was still used as an official seal on local official documents in 1598. During the reign of King Yeongjo (英祖), it was used to make a military service (軍布) hemp fabric. Some records of 1779 indicate that it was used as a means of taxation for international trade. It is estimated that approximately 330 ChoSonT'ongPaeJiIn were in circulation based on records in JeongHeonSwaeRok (貞軒?錄). Although there was the imprint of ChoSonT'ongPaeJiIn in An Inquiry on Choson Currency (朝鮮貨幣考) published in 1940, there had been no fabric currencies (布幣) with its imprint on them or genuine cases of the seal. It was recently found among the artifacts of Wongaksa Temple. The seal imprint was also found on historical manuscripts produced at the Jikjisa Temple in 1775. The investigator compared the seal imprints found on the historical manuscripts of the Jikjisa Temple, attached to TapJwaJongJeonGji (塔左從政志), and published in An Inquiry on Choson Currency with the ChoSonT'ongPaeJiIn housed at the Wongaksa Temple. It was found that these seal imprints were the same shape as the one at Wongaksa Temple. In addition, their overall form was the same as the one depicted in Daerokji (大麓誌) and LiJaeNanGo (?齋亂藁). These findings demonstrate that the ChoSonT'ongPaeJiIn at Wongaksa Temple was a seal made in the 15th century and is, therefore, an important artifact in the study of Choson's currency history, taxation, and seals. There is a need for future research examining its various aspects.

Semantic Interpretation of the Name "Cheomseongdae" (첨성대 이름의 의미 해석)

  • Chang, Hwalsik
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.2-31
    • /
    • 2020
  • CheomSeongDae (瞻星臺) is a stone structure built in Gyeongju, the former Silla Dynasty capital, during the reign of Queen Seondeok (632~647AD). There exist dozens of hypotheses regarding its original purpose. Depending on to whom you ask, the answer could be a celestial observatory, a religious altar, a Buddhist stupa, a monumental tower symbolizing scientific knowledge, and so on. The most common perception of the structure among lay people is a stargazing tower. Historians, however, have suggested that it was intended as "a gateway to the heavens", specifically the Trāyastriṃśa or the second of the six heavens of Kāmadhātu located on the top of Mountain Sumeru. The name "Cheom-seong-dae" could be interpreted in many different ways. 'Cheom (瞻)' could refer to looking up, staring, or admiring, etc.; 'Seong (星)' could mean a star, heaven, night, etc.; and 'heaven' in that context can be a physical or religious reference. 'Dae (臺)' usually refers to a high platform on which people stand or things are placed. Researchers from the science fields often read 'cheom-seong' as 'looking at stars'; while historians read it as 'admiring the Trāyastriṃśa' or 'adoring Śakra'. Śakra is said to be the ruler of Trāyastriṃśa' who governs the Four Heavenly Kings in the Cāturmahārājika heaven, the first of the six heavens of Kāmadhātu. Śakra is the highest authority of the heavenly kings in direct contact with humankind. This paper examined the usages of 'cheom-seong' in Chinese literature dated prior to the publication of 『Samguk Yusa』, a late 13th century Korean Buddhist historical book that contains the oldest record of the structure among all extant historical texts. I found the oldest usage of cheom-seong (瞻星臺) in 『Ekottara Āgama』, a Buddhist script translated into Chinese in the late 4th century, and was surprised to learn that its meaning was 'looking up at the brightness left by Śakra'. I also found that 'cheom-seong' had been incorporated in various religious contexts, such as Hinduism, Confucianism, Buddhist, Christianism, and Taoism. In Buddhism, there was good, bad, and neutral cheom-seong. Good cheom-seong meant to look up to heaven in the practice of asceticism, reading the heavenly god's intentions, and achieving the mindfulness of Buddhism. Bad cheom-seong included all astrological fortunetelling activities performed outside the boundaries of Buddhism. Neutral cheom-seong is secular. It may help people to understand the nature of the physical world, but was considered to have little meaning unless relating to the spiritual world of Buddhism. Cheom-seong had been performed repetitively in the processes of constructing Buddhist temples in China. According to Buddhist scripts, Queen Māyā of Sakya, the birth mother of Gautama Buddha, died seven days after the birth of Buddha, and was reborn in the Trāyastriṃśa heaven. Buddha, before reaching nirvana, ascended from Jetavana to Trāyastriṃśa and spent three months together with his mother. Gautama Buddha then returned to the human world, stepping upon the stairs built by Viśvakarman, the deity of the creative power in Trāyastriṃśa. In later years, King Asoka built a stupa at the site where Buddha descended. Since then, people have believed that the stairway to the heavens appears at a Buddhist stupa. Carefully examining the paragraphic structure of 『Samguk Yusa』's records on Cheomseongdae, plus other historical records, the fact that the alignment between the tomb of Queen Seondeok and Cheomseongdae perfectly matches the sunrise direction at the winter solstice supports this paper's position that Chemseongdae, built in the early years of Queen SeonDeok's reign (632~647AD), was a gateway to the Trāyastriṃśa heaven, just like the stupa at the Daci Temple (慈恩寺) in China built in 654. The meaning of 'Cheom-seong-dae' thus turns out to be 'adoring Trāyastriṃśa stupa', not 'stargazing platform'.

Deriving adoption strategies of deep learning open source framework through case studies (딥러닝 오픈소스 프레임워크의 사례연구를 통한 도입 전략 도출)

  • Choi, Eunjoo;Lee, Junyeong;Han, Ingoo
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.27-65
    • /
    • 2020
  • Many companies on information and communication technology make public their own developed AI technology, for example, Google's TensorFlow, Facebook's PyTorch, Microsoft's CNTK. By releasing deep learning open source software to the public, the relationship with the developer community and the artificial intelligence (AI) ecosystem can be strengthened, and users can perform experiment, implementation and improvement of it. Accordingly, the field of machine learning is growing rapidly, and developers are using and reproducing various learning algorithms in each field. Although various analysis of open source software has been made, there is a lack of studies to help develop or use deep learning open source software in the industry. This study thus attempts to derive a strategy for adopting the framework through case studies of a deep learning open source framework. Based on the technology-organization-environment (TOE) framework and literature review related to the adoption of open source software, we employed the case study framework that includes technological factors as perceived relative advantage, perceived compatibility, perceived complexity, and perceived trialability, organizational factors as management support and knowledge & expertise, and environmental factors as availability of technology skills and services, and platform long term viability. We conducted a case study analysis of three companies' adoption cases (two cases of success and one case of failure) and revealed that seven out of eight TOE factors and several factors regarding company, team and resource are significant for the adoption of deep learning open source framework. By organizing the case study analysis results, we provided five important success factors for adopting deep learning framework: the knowledge and expertise of developers in the team, hardware (GPU) environment, data enterprise cooperation system, deep learning framework platform, deep learning framework work tool service. In order for an organization to successfully adopt a deep learning open source framework, at the stage of using the framework, first, the hardware (GPU) environment for AI R&D group must support the knowledge and expertise of the developers in the team. Second, it is necessary to support the use of deep learning frameworks by research developers through collecting and managing data inside and outside the company with a data enterprise cooperation system. Third, deep learning research expertise must be supplemented through cooperation with researchers from academic institutions such as universities and research institutes. Satisfying three procedures in the stage of using the deep learning framework, companies will increase the number of deep learning research developers, the ability to use the deep learning framework, and the support of GPU resource. In the proliferation stage of the deep learning framework, fourth, a company makes the deep learning framework platform that improves the research efficiency and effectiveness of the developers, for example, the optimization of the hardware (GPU) environment automatically. Fifth, the deep learning framework tool service team complements the developers' expertise through sharing the information of the external deep learning open source framework community to the in-house community and activating developer retraining and seminars. To implement the identified five success factors, a step-by-step enterprise procedure for adoption of the deep learning framework was proposed: defining the project problem, confirming whether the deep learning methodology is the right method, confirming whether the deep learning framework is the right tool, using the deep learning framework by the enterprise, spreading the framework of the enterprise. The first three steps (i.e. defining the project problem, confirming whether the deep learning methodology is the right method, and confirming whether the deep learning framework is the right tool) are pre-considerations to adopt a deep learning open source framework. After the three pre-considerations steps are clear, next two steps (i.e. using the deep learning framework by the enterprise and spreading the framework of the enterprise) can be processed. In the fourth step, the knowledge and expertise of developers in the team are important in addition to hardware (GPU) environment and data enterprise cooperation system. In final step, five important factors are realized for a successful adoption of the deep learning open source framework. This study provides strategic implications for companies adopting or using deep learning framework according to the needs of each industry and business.

A Study on Practical Curriculum Development of the Education for Love based on the Understanding of Psychoanalytic 'Desire of Subject' (정신분석학적 '욕망의 주체' 이해에 기초한 사랑의 교육 교육과정 개발)

  • Kim, Sun Ah
    • Journal of Christian Education in Korea
    • /
    • v.68
    • /
    • pp.77-112
    • /
    • 2021
  • This study is based on the research of the first year, which is the National Research Foundation of Korea's R&D subject for middle-grade researchers. In this study, the practical curriculum development of the education for love - an according to the psychoanalytic perspectives of F. Dolto(1908-1988) - is suggested as follows. The first is 'the reconstruction of the directions of curriculum and its specific aims in accordance with such directions.' The reconstruction of the directions of curriculum aims at leading our future generation to live as a subject of desire through the mutual-communication of love. The second is 'the reconstruction of the tasks of curriculum and its specific contents in accordance with such tasks.' The reconstruction of the tasks of curriculum pursuit to help our future generation through the converting the education for love into the paradigm of desire of Agape to live as a subject of desire forming a whole personality and practicing the desire of Agape in daily life. as a source of desire. According to these aims, the reconstruction of directions of curriculum are presented as following: firstly, 'curriculum for the mutual-communication between subjects of love' and secondly, 'curriculum for the subject of desire'. The reconstruction of tasks of curriculum are like these: firstly, 'converting the education for love into the paradigm of desire of Agape', and secondly, 'forming a whole personality through the education for love'. Thus, with respect to two specific aims in accordance with the reconstruction of directions are suggested like these: Firstly, 'constructing a subject as a speaking existence' and secondly, 'realizing the subject as the autonomous source of desire'. In the two specific contents in accordance with the reconstruction of tasks are presented as following: Firstly, 'realizing the truth of the desire of Agape'.' Secondly, 'practicing the desire of Agape in daily life.' The third is 'the reconstruction of curriculum by life cycle' are suggested. They include the fetal life, infants and preschool children life, and childhood life. In further study, it is required to contain adolescent period. It will be useful to help them to recover their self-esteem with the experience of true love, especially, out-of-school young generation overcome negative perspectives and prejudice in the society, and challenges to their dreams and future through proper utilization of the study outcome. The outcome of this study, which presented practical curriculum development of the education for love based on the understanding of psychoanalytic 'desire of subject' can be used as basic teaching materials for our future generations. Furthermore, the results can be used as a resource for educating ministers and lay leaders in the religious world to build capabilities to heal their inner side as well as the society that is tainted with various forms of conflict. These include general conflicts, anger, pleasure and addiction, depression and suicide, violence and murder, etc. The study outcome can contribute to the prevention of antisocial incidents against humanity that have recently been occurring in our free-semester system implemented in all middle schools across the country to be operated effectively. For example, it is possible to provide the study results as lecture and teaching materials for 'character camp' (self-examination and self-esteem improvement training) and 'family healing camp' (solution of a communication gap between family members and love communication training), which help students participate in field trip activities and career exploration activities voluntarily, independently, and creatively. Ultimately, it can visibly present the convergent research performance by providing the study outcome as preliminary data for the development of lecture videos and materials including infant care and preschool education, parental education, family consultation education, and holistic healing education. Support from the religious world, including the central government and local governments, are urgently required in order for such educational possibilities to be fulfilled both in the society and the fields of church education and to be actively linked to follow-up studies.

Clustering Method based on Genre Interest for Cold-Start Problem in Movie Recommendation (영화 추천 시스템의 초기 사용자 문제를 위한 장르 선호 기반의 클러스터링 기법)

  • You, Tithrottanak;Rosli, Ahmad Nurzid;Ha, Inay;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.57-77
    • /
    • 2013
  • Social media has become one of the most popular media in web and mobile application. In 2011, social networks and blogs are still the top destination of online users, according to a study from Nielsen Company. In their studies, nearly 4 in 5active users visit social network and blog. Social Networks and Blogs sites rule Americans' Internet time, accounting to 23 percent of time spent online. Facebook is the main social network that the U.S internet users spend time more than the other social network services such as Yahoo, Google, AOL Media Network, Twitter, Linked In and so on. In recent trend, most of the companies promote their products in the Facebook by creating the "Facebook Page" that refers to specific product. The "Like" option allows user to subscribed and received updates their interested on from the page. The film makers which produce a lot of films around the world also take part to market and promote their films by exploiting the advantages of using the "Facebook Page". In addition, a great number of streaming service providers allows users to subscribe their service to watch and enjoy movies and TV program. They can instantly watch movies and TV program over the internet to PCs, Macs and TVs. Netflix alone as the world's leading subscription service have more than 30 million streaming members in the United States, Latin America, the United Kingdom and the Nordics. As the matter of facts, a million of movies and TV program with different of genres are offered to the subscriber. In contrast, users need spend a lot time to find the right movies which are related to their interest genre. Recent years there are many researchers who have been propose a method to improve prediction the rating or preference that would give the most related items such as books, music or movies to the garget user or the group of users that have the same interest in the particular items. One of the most popular methods to build recommendation system is traditional Collaborative Filtering (CF). The method compute the similarity of the target user and other users, which then are cluster in the same interest on items according which items that users have been rated. The method then predicts other items from the same group of users to recommend to a group of users. Moreover, There are many items that need to study for suggesting to users such as books, music, movies, news, videos and so on. However, in this paper we only focus on movie as item to recommend to users. In addition, there are many challenges for CF task. Firstly, the "sparsity problem"; it occurs when user information preference is not enough. The recommendation accuracies result is lower compared to the neighbor who composed with a large amount of ratings. The second problem is "cold-start problem"; it occurs whenever new users or items are added into the system, which each has norating or a few rating. For instance, no personalized predictions can be made for a new user without any ratings on the record. In this research we propose a clustering method according to the users' genre interest extracted from social network service (SNS) and user's movies rating information system to solve the "cold-start problem." Our proposed method will clusters the target user together with the other users by combining the user genre interest and the rating information. It is important to realize a huge amount of interesting and useful user's information from Facebook Graph, we can extract information from the "Facebook Page" which "Like" by them. Moreover, we use the Internet Movie Database(IMDb) as the main dataset. The IMDbis online databases that consist of a large amount of information related to movies, TV programs and including actors. This dataset not only used to provide movie information in our Movie Rating Systems, but also as resources to provide movie genre information which extracted from the "Facebook Page". Formerly, the user must login with their Facebook account to login to the Movie Rating System, at the same time our system will collect the genre interest from the "Facebook Page". We conduct many experiments with other methods to see how our method performs and we also compare to the other methods. First, we compared our proposed method in the case of the normal recommendation to see how our system improves the recommendation result. Then we experiment method in case of cold-start problem. Our experiment show that our method is outperform than the other methods. In these two cases of our experimentation, we see that our proposed method produces better result in case both cases.

The Effect of Corporate Association on the Perceived Risk of the Product (소비자의 제품 지각 위험에 대한 기업연상과 효과: 지식과 관여의 조절적 역활을 중심으로)

  • Cho, Hyun-Chul;Kang, Suk-Hou;Kim, Jin-Yong
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.4
    • /
    • pp.1-32
    • /
    • 2008
  • Brown and Dacin (1997) have investigated the relationship between corporate associations and product evaluations. Their study focused on the effects of associations with a company's corporate ability (CA) and its corporate social responsibility (CSR) on consumers' product evaluations. Their study has found that both of CA and CSR influenced product evaluation but CA association has a stronger effect than CSR associations. Brown and Dacin (1997) have, however, claimed that there are few researches on how corporate association impacts product responses. Accordingly, some of researchers have found the variables to moderate or to mediate the relationship between the corporate association and the product responses. In particular, there has been existed a few of studies that tested the influence of the reputation on the product-relevant perceived risk, but the effects of two types of the corporate association on the product-relevant perceived risk were not identified so far. The primary goal of this article is to identify and empirically examine some variables to moderate the effects of CA association and CSR association on the perceived risk of the product. In this articles, we take the concept of the corporate associations that Brown and Dacin (1997) had proposed. CA association is those association related to the company's expertise in producing and delivering its outputs and CSR association reflected the organization's status and activities with respect to its perceived societal obligations. Also, this study defines the risk, which is the uncertainty or loss of the product and corporate that consumers have taken in a particular purchase decision or after having purchased. The risk is classified into product-relevant performance risk and financial risk. Performance risk is the possibility or the consequence of a product not functioning at some expected level and financial risk is the monetary loss one perceives to be incurring if a product does not function at some expected level. In relation to consumer's knowledge, expert consumers have much of the experiences or knowledge of the product in consumer position and novice consumers does not. The model tested in this article are shown in Figure 1. The model indicates that both of CA association and CSR association influence on performance risk and financial risk. In addition, the effects of CA and CSR are moderated by product category knowledge (product knowledge) and product category involvement (product involvement). In this study, the relationships between the corporate association and product-relevant perceived risk are hypothesized as the following form. For example, Hypothesis 1a($H_{1a}$) is represented that CA association has a positive influence on the performance risk of consumer. Also, the hypotheses that identified some variables to moderate the effects of two types of corporate association on the perceived risk of the product are laid down. One of the hypotheses of the interaction effect is Hypothesis 3a($H_{3a}$), it is described that consumer's knowledges of the product moderates the negative relationship between CA association and product-relevant performance risk. A field experiment was conducted in order to examine our model. The company tested was not real but imagined to meet the internal validity. Water purifiers were used for our study. Four scenarios have been developed and described as the imaginary company: Type A with both of superior CA and CSR, Type B with superior CSR and inferior CA, Type C with superior CA and inferior CSR, and Type D with both inferior of CA and CSR. The respondents of this study were classified into four groups. One type of four scenarios (Type A, B, C, or D) in its questionnaire was given to the respondent who filled out questions. Data were collected by means of a self-administered questionnaire to the respondents, chosen in convenience. A total of 300 respondents filled out the questionnaire but 207 were used for further analysis. Table 1 indicates that the scales in this study are reliable because the range of coefficients of Cronbach's $\alpha$ are from 0.85 to 0.92. The composite reliability is in the range of 0,85 to 0,92 and average variance extracted is in 0.72-0.98 range that is higher than the base level of 0.6. As shown in Table 2, the values for CFI, NNFI, root-mean-square error approximation (RMSEA), and standardized root-mean-square residual (SRMR) are acceptably close to the standards suggested by Hu and Bentler (1999):.95 for CFI and NNFI,.06 for RMSEA, and.08 for SRMR. We also tested discriminant validity provided by Fornell and Larcker (1981). As shown in Table 2, we found strong evidence for discriminant validity between each possible pair of latent constructs in all samples. Given that these batteries of overall goodness-of-fit indices were accurate and that the model was developed on theoretical bases, and given the high level of consistency across samples, this enables us to proceed the previously defined scales. We used the moderated hierarchical regression analysis to test the influence of the corporate association(CA and CSR associations) on product-relevant perceived risk(performance and financial risks) and to identify the variables moderating the relationship between the corporate association and product-relevant performance risk. In this study, dependent variables are performance and financial risk. CA and CSR associations are described the independent variables. The moderating variables are product category knowledge and product category involvement. The results are, as expected, found that CA association has statistically a significant influence on the perceived risk of the product, but CSR association does not. Product category knowledge and involvement moderate the relationship between the CA association and the perceived risk of the product. However, the effect of CSR association on the perceived risk of the product is not moderated by the consumers' knowledge and involvement. For this result, it is necessary for a corporate to inform its customers CA association more than CSR association so that they could be felt to be the reduction of the perceived risk. The important theoretical contribution of this research is the meanings that two types of corporate association that Brown and Dacin(1997), and Brown(1998) have proposed replicated the difference of the effects on product evaluation. According to Hunter(2001), it was an important affair to accomplish the validity of a particular study and we had to take about ten studies to deduce a strict study. Next, there is the contribution of the this study to find that the effects of corporate association on the perceived risk of the product are varied by the moderator variables. In particular, the moderating effect of knowledge on the relationship between corporate association and product-relevant perceived risk has not been tested in Korea. In the managerial implications of this research, we suggest the necessity to stress the ability that corporate manufactures the product well(CA association) than the accomplishment of corporate's social obligation(CSR association). This study suffers from various limitations that imply future research directions. The moderating effects of product category knowledge and involvement on the relationship between corporate association and perceived risk need to be replicated. Next, future research could explore whether the mediated effects of the perceived risk has the relationship between corporate association and consumer's product purchase. In addition, to ensure the external validity of the study will be needed to use realistic company, not artificial.

  • PDF

Incorporating Social Relationship discovered from User's Behavior into Collaborative Filtering (사용자 행동 기반의 사회적 관계를 결합한 사용자 협업적 여과 방법)

  • Thay, Setha;Ha, Inay;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.1-20
    • /
    • 2013
  • Nowadays, social network is a huge communication platform for providing people to connect with one another and to bring users together to share common interests, experiences, and their daily activities. Users spend hours per day in maintaining personal information and interacting with other people via posting, commenting, messaging, games, social events, and applications. Due to the growth of user's distributed information in social network, there is a great potential to utilize the social data to enhance the quality of recommender system. There are some researches focusing on social network analysis that investigate how social network can be used in recommendation domain. Among these researches, we are interested in taking advantages of the interaction between a user and others in social network that can be determined and known as social relationship. Furthermore, mostly user's decisions before purchasing some products depend on suggestion of people who have either the same preferences or closer relationship. For this reason, we believe that user's relationship in social network can provide an effective way to increase the quality in prediction user's interests of recommender system. Therefore, social relationship between users encountered from social network is a common factor to improve the way of predicting user's preferences in the conventional approach. Recommender system is dramatically increasing in popularity and currently being used by many e-commerce sites such as Amazon.com, Last.fm, eBay.com, etc. Collaborative filtering (CF) method is one of the essential and powerful techniques in recommender system for suggesting the appropriate items to user by learning user's preferences. CF method focuses on user data and generates automatic prediction about user's interests by gathering information from users who share similar background and preferences. Specifically, the intension of CF method is to find users who have similar preferences and to suggest target user items that were mostly preferred by those nearest neighbor users. There are two basic units that need to be considered by CF method, the user and the item. Each user needs to provide his rating value on items i.e. movies, products, books, etc to indicate their interests on those items. In addition, CF uses the user-rating matrix to find a group of users who have similar rating with target user. Then, it predicts unknown rating value for items that target user has not rated. Currently, CF has been successfully implemented in both information filtering and e-commerce applications. However, it remains some important challenges such as cold start, data sparsity, and scalability reflected on quality and accuracy of prediction. In order to overcome these challenges, many researchers have proposed various kinds of CF method such as hybrid CF, trust-based CF, social network-based CF, etc. In the purpose of improving the recommendation performance and prediction accuracy of standard CF, in this paper we propose a method which integrates traditional CF technique with social relationship between users discovered from user's behavior in social network i.e. Facebook. We identify user's relationship from behavior of user such as posts and comments interacted with friends in Facebook. We believe that social relationship implicitly inferred from user's behavior can be likely applied to compensate the limitation of conventional approach. Therefore, we extract posts and comments of each user by using Facebook Graph API and calculate feature score among each term to obtain feature vector for computing similarity of user. Then, we combine the result with similarity value computed using traditional CF technique. Finally, our system provides a list of recommended items according to neighbor users who have the biggest total similarity value to the target user. In order to verify and evaluate our proposed method we have performed an experiment on data collected from our Movies Rating System. Prediction accuracy evaluation is conducted to demonstrate how much our algorithm gives the correctness of recommendation to user in terms of MAE. Then, the evaluation of performance is made to show the effectiveness of our method in terms of precision, recall, and F1-measure. Evaluation on coverage is also included in our experiment to see the ability of generating recommendation. The experimental results show that our proposed method outperform and more accurate in suggesting items to users with better performance. The effectiveness of user's behavior in social network particularly shows the significant improvement by up to 6% on recommendation accuracy. Moreover, experiment of recommendation performance shows that incorporating social relationship observed from user's behavior into CF is beneficial and useful to generate recommendation with 7% improvement of performance compared with benchmark methods. Finally, we confirm that interaction between users in social network is able to enhance the accuracy and give better recommendation in conventional approach.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

The Status, Problems and Countermeasure of Direct Rice Seeding in Honam Province - On Weed control - (호남지방(湖南地方) 직파재배(直播栽培)의 현황(現況), 문제점(問題點) 및 대책(對策) - 잡초방제적(雜草防除的) 측면(側面)에서 -)

  • Ryang, Hwan-Seung;Kim, Jong-Seog
    • Korean Journal of Weed Science
    • /
    • v.12 no.3
    • /
    • pp.271-291
    • /
    • 1992
  • This study was conducted to survey the situation of direct rice seeding in Honam province in Korea to investigate problems and seek countermeasure of weed control in direct rice seeding. The total area of direct rice seeding in the south-western part of Korea (Chonbuk, Chonnam, and Chungnam) was 1650.8ha (732.1ha for direct seeding in dry field and 918.7ha for direct seeding in flooding field) in 1992. The followings are summary of the study. 1. In case of direct rice seeding in dry field, butachlor EC and G at 3 to 5 DAS was mostly selected by farmers to control weeds in dry field. Benthiocarb or chlornitrofen was also used in few cases. At 10 to 14 DAS just before rice emergence, tank misture of butachlor EC and paraquat was treated by some farmers. At 35 to 40 days, after flooding mixture of sulfonylurea derivatives was sequentially applied. Surviving weeds including barnyardgrass were finally controlled by mixture of bentazon+quinclorac WP foliage application. 2. In case of direct rice seeding in flooding field, weed control were mostly unsuccessful partially due to wrong selection of herbicide and missing the optimum application time. Three relatively successful weed control in the survey were summarized as follows. 1) Oxadiazon EC, butachlor or benthiocarb were treated just after puddling(5 to 7 days before seeding). then mixture of bentazone+quinclorac WP or sulfonylurea derivatives was sequently applied to control remaining weeds at 20 days after seeding. 2) Mixtures of bensulfuronmethyl+dimepiperate G, pyrazosulfuronethyl+molinate G, or bensulfuronmethyl+mefenacet+dymron G were applied at 11 days after puddling when barnyardgrass were at 2.0 leaf stage. Phytotoxicity was not found in case of mixture of bensulfuronmethyl+dimepiperate G but found in the other two cases but disappeared later. 3) Mixtures of bensulfuronmethyl+quinclorac G., pyrazosulfuronethyl+quinclorac G or betazone and quinclorac G were treated after 18 to 20 days after puddling when barnyardgrass was within 3.0 leaf stage. It showed good weed control in both annuals and perrenials without phytotoxicity. On the contrary, other sulfonylurea derivatives such as middle periodic herbicide showed poor weed control against barnyardgrass, so that sequential treatment of bentazone+quinclorac WP mixture was required. 3. Herbicidal characteristics and optimum application time of 45 rigistered herbicides in Korea were analyzed to discover new substitute for quinclorac mixture, that showed excellent weed control against barnyardgrass at its 3 leaf stage or older. The analysis revealed that 70% of herbicides were for preemergence and the others were post periodic herbicide. Most farmers favor to apply herbicide when rice seedlings completely rooted, at this time barnyardgrass are at 2.5-3.0 leaf stage. Therefore herbicide of which optimum application time had long is required. In this study. 6 middle periodic herbicides among sulfonylurea derivatives and 2 quinclorac mixture were selected and evaluated their weeding spectrums at different leaf stage of barnyardgrass in both soil application in flooding condition and foliage application in dry paddy field. The order of weeding spectrum in magnitude was as follows : bentazone+quinclorac WP> bentazone + quinclorac G>bensulfuronmethyl + quinclorac G>pyrazosulfuronethyl + quinclorac G> pyrazosulfuronethyl + Molinate G>bensulfuronmethyl + mefenacet + dymron G>bensulfuronmethyl + mefenacet G>bensulfuron methyl+benthiocarb G. The above results coincided with that of the survey. In conclusion, there is no proper substitute for quinclorac mixrure, which can control barnyardgrass at 3.0 leaf stage or even older. Therefore quinclorac should be supplied continuously to farmers in order to anchor direct rice seeding in Korea. Author suggested the followings to eastablish direct rice seeding technology effectively and quickly : 1) A tentatively named "The research committee for direct rice seeding" which was composed of farmers. researchers and goberment. should be eastablished to cooperate effectively. 2) Development of a pricise direct rice seeding machine for both dry and flooding paddy field. which is workable regardless of condition and varieties of seeds. 3) Study on protecting rice seed and seedling from sparrows. 4) Systematic studies of weed control techniques in direct rice seeding to standardize herbicide application. 5) Studies on farm-land reformation. techniques of precise land preparation. and direct rice seeding using an airplane.

  • PDF