• Title/Summary/Keyword: Web business model

Search Result 476, Processing Time 0.022 seconds

A Study on the necessity of Open Source Software Intermediaries in the Software Distribution Channel (소프트웨어 유통에 있어 공개소프트웨어 중개자의필요성에 대한 연구)

  • Lee, Seung-Chang;Suh, Eung-Kyo;Ahn, Sung-Hyuck;Park, Hoon-Sung
    • Journal of Distribution Science
    • /
    • v.11 no.2
    • /
    • pp.45-55
    • /
    • 2013
  • Purpose - The development and implementation of OSS (Open Source Software) led to a dramatic change in corporate IT infrastructure, from system server to smart phone, because the performance, reliability, and security functions of OSS are comparable to those of commercial software. Today, OSS has become an indispensable tool to cope with the competitive business environment and the constantly-evolving IT environment. However, the use of OSS is insufficient in small and medium-sized companies and software houses. This study examines the need for OSS Intermediaries in the Software Distribution Channel. It is expected that the role of the OSS Intermediary will be reduced with the improvement of the distribution process. The purpose of this research is to prove that OSS Intermediaries increase the efficiency of the software distribution market. Research design, Data, and Methodology - This study presents the analysis of data gathered online to determine the extent of the impact of the intermediaries on the OSS market. Data was collected using an online survey, conducted by building a personal search robot (web crawler). The survey period lasted 9 days during which a total of 233,021 data points were gathered from sourceforge.net and Apple's App store, the two most popular software intermediaries in the world. The data collected was analyzed using Google's Motion Chart. Results - The study found that, beginning 2006, the production of OSS in the Sourceforge.net increased rapidly across the board, but in the second half of 2009, it dropped sharply. There are many events that can explain this causality; however, we found an appropriate event to explain the effect. It was seen that during the same period of time, the monthly production of OSS in the App store was increasing quickly. The App store showed a contrasting trend to software production. Our follow-up analysis suggests that appropriate intermediaries like App store can enlarge the OSS market. The increase was caused by the appearance of B2C software intermediaries like App store. The results imply that OSS intermediaries can accelerate OSS software distribution, while development of a better online market is critical for corporate users. Conclusion - In this study, we analyzed 233,021 data points on the online software marketplace at Sourceforge.net. It indicates that OSS Intermediaries are needed in the software distribution market for its vitality. It is also critical that OSS intermediaries should satisfy certain qualifications to play a key role as market makers. This study has several interesting implications. One implication of this research is that the OSS intermediary should make an effort to create a complementary relationship between OSS and Proprietary Software. The second implication is that the OSS intermediary must possess a business model that shares the benefits with all the participants (developer, intermediary, and users).The third implication is that the intermediary provides an OSS of high quality like proprietary software with a high level of complexity. Thus, it is worthwhile to examine this study, which proves that the open source software intermediaries are essential in the software distribution channel.

  • PDF

A Study on Detecting Fake Reviews Using Machine Learning: Focusing on User Behavior Analysis (머신러닝을 활용한 가짜리뷰 탐지 연구: 사용자 행동 분석을 중심으로)

  • Lee, Min Cheol;Yoon, Hyun Shik
    • Knowledge Management Research
    • /
    • v.21 no.3
    • /
    • pp.177-195
    • /
    • 2020
  • The social consciousness on fake reviews has triggered researchers to suggest ways to cope with them by analyzing contents of fake reviews or finding ways to discover them by means of structural characteristics of them. This research tried to collect data from blog posts in Naver and detect habitual patterns users use unconsciously by variables extracted from blogs and blog posts by a machine learning model and wanted to use the technique in predicting fake reviews. Data analysis showed that there was a very high relationship between the number of all the posts registered in the blog of the writer of the related writing and the date when it was registered. And, it was found that, as model to detect advertising reviews, Random Forest is the most suitable. If a review is predicted to be an advertising one by the model suggested in this research, it is very likely that it is fake review, and that it violates the guidelines on investigation into markings and advertising regarding recommendation and guarantee in the Law of Marking and Advertising. The fact that, instead of using analysis of morphemes in contents of writings, this research adopts behavior analysis of the writer, and, based on such an approach, collects characteristic data of blogs and blog posts not by manual works, but by automated system, and discerns whether a certain writing is advertising or not is expected to have positive effects on improving efficiency and effectiveness in detecting fake reviews.

Does Social Distance Always Increase Content Performance in Online Distribution Channels? (온라인 유통 채널에서 컨텐츠의 성과는 사회적 거리에 의해 항상 증가하는가? YouTube의 문화별컨텐츠를 중심으로)

  • Son, Jung-Min;Kang, Seong-Ho
    • Journal of Distribution Science
    • /
    • v.13 no.8
    • /
    • pp.97-104
    • /
    • 2015
  • Purpose - This study examines the positive impact of the social distance between producers and users of online content, investigating and analyzing the most popular Web content. In addition, it tries to elicit the matching effect that appears when the individuals'cultural background is consistent with social distance. Research design, data, and methodology - We collected and analyzed actual data about 4,981 videos clips on YouTube, looking at six countries in order to verify the content of this study. Based on the results of the data analysis, the study conducted behavioral measurements on popularity, social distance, culture, and user engagement. The unit of analysis was the content and we collected information about the content producers and the content records. We controlled the views, comments, likes, calendar dates, and ages in the empirical models. The data was collected in 2011, with the records coming from South Korea, Japan, China, U.S., German, and France. A total of 4,980 elements were analyzed in the model. The empirical model estimated is the bivariate negative binomial distribution (NBD) model. Results - It turns out that there is a possibility that the matching effect can be diminished by variables that reflect the psychological involvement of user engagement. This study proposes academic and practical implications based on these research results. This research shows the positive effect of social distance between users and producers on the increased performance of the online content. We find the effect of social distance to be a stronger tendency in collectivism. The collectivists follow their sense of friendship and intimacy in their culture and, the social congruence effect can be found there as well. The effect, however, could erode in a social case where users are motivated by strong intrinsic and psychological factors. In addition, user engagement complicates the process of user decision making regarding the information. Conclusions - This study examines how the differential effects of social distance caused by culture could disappear through user commitment as a complicated user motivation. Some potential implications are as follows. First, a firm in the collectivism culture has to communicate based on the social distance. In fact, most online channels do not have a function that indicates the social distance as measured by favorites or subscribers. This function could help increase the performance of the content in online channels, but this increasing effect can only be found in a collectivist culture. Based on this, the firms have to communicate and announce to users the actual social distance between users and producers. Second, firms should develop a system that discovers the social distance and culture and shows these measures to users and producers, since the congruence effect between social distance and culture is found only for low user engagement. The firms can take the advantage of the congruence effect only for the development of the social distance and culture visualized system.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

A Study on The Integration of Healthcare Information Systems based on SOA for PHR services (PHR 서비스를 위한 SOA 기반 보건의료분야 통합정보시스템에 관한 연구)

  • Park, Yong-Min;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.2
    • /
    • pp.29-35
    • /
    • 2011
  • PHR(Personal Health Record) to support the lifelong healthcare of their medical information to consumers anytime, anywhere can view and manage health information to help direct input can be defined as a service. The PHR is to provide services efficiently and PHR systems and health-related information systems should be integrated and linked. However, the current healthcare information systems field in order to meet the growing demand for healthcare construction and operation of various systems, and accordingly continues to increase budget for information, but the current system, although the association between a variety of system integration and linkage is being made. This paper proposes a Integrated information system on Healthcare based on Web service to solve problems mentioned above. SOA(Service Oriented Architecture) is a major method of integrating services on the Web. It enables new requirements to be added to existing systems without modification of legacy services, so it makes rapid adaption to varying business environment. Therefore, In this paper, PHR services based on SOA as a platform for the health care sector to design and implement an integrated information system by web services based PHR services for the construction of a new integrated information system is proving to be a suitable model.

A Case Study of the Construction Management Applied to I-Project (I-프로젝트의 건설사업 관리(Construction Management) 적용사례)

  • Kim Jong-Hoon;Seo Bong-Whan
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.102-112
    • /
    • 2001
  • It has been passed $5\~6$ years since Construction Management introduced in Korea, but a few government projects have been presented as CM instances. We performed CM service, on behalf of the foreign Client, in the Insa-dong construction, I-Project. Even though there were many limits in cost, time and other aspects, we have attained satisfaction of the Client and successful businesses of all the construction parties as adopting the advanced management methods. Many advanced construction methods have been applied for the purpose of time reduce, cost save and quality assurance as well as to the webbased project management has been imported to overcome the limits of time and place. They have actualized to increase the productivity of the project by managing the floor to floor cycle and quality systemically pursuant to ISO 9002, and by adopting Real-name construction and completion system (or individual activity. While carrying out this project, it is possible to establish mutual reliability and understanding enable to resolve the issues occurring in the early stage due to insufficient understanding of CM, lack of communications and team work, indistinct work scope through continuos training and conferences. Additionally, we became to share business targets among the parties and promoted the project in confidence. We wish that the success of I- project to be rated as a standard model of CM in Korea.

  • PDF

An Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류를 통한 프라이버시 보호를 위한 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.39-52
    • /
    • 2006
  • Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.

Characteristics and Implications of Sports Content Business of Big Tech Platform Companies : Focusing on Amazon.com (빅테크 플랫폼 기업의 스포츠콘텐츠 사업의 특징과 시사점 : 아마존을 중심으로)

  • Shin, Jae-hyoo
    • Journal of Venture Innovation
    • /
    • v.7 no.1
    • /
    • pp.1-15
    • /
    • 2024
  • This study aims to elucidate the characteristics of big tech platform companies' sports content business in an environment of rapid digital transformation. Specifically, this study examines the market structure of big tech platform companies with a focus on Amazon, revealing the role of sports content within this structure through an analysis of Amazon's sports marketing business and provides an outlook on the sports content business of big tech platform companies. Based on two-sided market platform business models, big tech platform companies incorporate sports content as a strategy to enhance the value of their platforms. Therefore, sports content is used as a tool to enhance the value of their platforms and to consolidate their monopoly position by maximizing profits by increasing the synergy of platform ecosystems such as infrastructure. Amazon acquires popular live sports broadcasting rights on a continental or national basis and supplies them to its platforms, which not only increases the number of new customers and purchasing effects, but also provides IT solution services to sports organizations and teams while planning and supplying various promotional contents, thus creates synergy across Amazon's platforms including its advertising business. Amazon also expands its business opportunities and increases its overall value by supplying live sports contents to Amazon Prime Video and Amazon Prime, providing technical services to various stakeholders through Amazon Web Services, and offering Amazon Marketing Cloud services for analyzing and predicting advertisers' advertising and marketing performance. This gives rise to a new paradigm in the sports marketing business in the digital era, stemming from the difference in market structure between big tech companies based on two-sided market platforms and legacy global companies based on one-sided markets. The core of this new model is a business through the development of various contents based on live sports streaming rights, and sports content marketing will become a major field of sports marketing along with traditional broadcasting rights and sponsorship. Big tech platform global companies such as Amazon, Apple, and Google have the potential to become new global sports marketing companies, and the current sports marketing and advertising companies, as well as teams and leagues, are facing both crises and opportunities.

Analysis of Technology Value Strategy using Technology Valuation System (기술가치 평가시스템을 이용한 기술가치 전략 분석)

  • Kwon, Bang-Hyun;Whang, Kyu-Seung
    • Information Systems Review
    • /
    • v.5 no.1
    • /
    • pp.129-146
    • /
    • 2003
  • Increasing number of transactions and investments in technology has sparked a growing interest in technology valuation. However, it has not been easy to come up with an objective valuation of technology due to variance in technology value and specialty of technology valuation. The main objective of this paper lies in the development of a new system for technology valuation, Web-based Interactive Technology Valuation (WITV) system, which valuate the technology and analyze the technology value strategy. WITV system uses the Technology Valuation Attractiveness Model (TVAM). TVA is composed of the Intrinsic Value of Technology (IVT) and the Extrinsic Value of Technology (EVT). This paper experiment the feasibility of the TVA Model and WITV System by conducting an empirical study on small & medium sized manufacturing companies in IT industry, registered on KOSDAQ. In this study, the potential value is defined as the technology value. It is represents the expected profit appraised by the market under the competitiveness of technology and the growth of the market. TVA is measured as the index to forecast the Price-to-Book value Ratio (PBR), which is the proxy variable for the potential value of the technology. The results identify the feasibility of the TVAM through a high correlation between the TVA and the PBR.

A Study on the Agent Component Development Support to PDA (PDA 지원 에이전트 컴포넌트 개발에 대한 연구)

  • Kim Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.37-50
    • /
    • 2006
  • In the focusing on the important of wireless internet, mobile terminal device plays a central role in tracking and coordinating terms in mobile business processing. Especially, mobile device has been considered as a key technology for embedded software and ubiquitous era. Because existing web environments is moving to wireless internet, the new concepts for wireless internet computing environments has gained increasing interest. Mobile agents provide a new abstraction for deploying over the existing infrastructures. Mobile application systems require the flexibility, adaptability, extensibility, and autonomous. New software developments methodology is required to meet the requirements. In this paper, we present an agent architectures model that allows compassable components with pluggable and independable. Our approach involves wrapping components inside a servlet. We have used the model and components to develop the PDA mobile agent.