• Title/Summary/Keyword: Weighted Subject-Method Network

Search Result 4, Processing Time 0.023 seconds

Weighted Subject - Method Network Analysis of Library and Information Science Studies (문헌정보학 분야 핵심 학술지들의 가중 주제-방법 네트워크 분석)

  • Lee, Keehoen;Jung, Hyojung;Song, Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.3
    • /
    • pp.457-488
    • /
    • 2015
  • In this study, we analyzed the current research state of Library and Information science in top 20 journals from 1990 to 2015, in subject and method perspectives. We developed weighted subject-method network to investigate on centralities of a subject and a method as well as their relations. This network is composed of subject nodes and method nodes and gives a weight on each node by topic occurrence. As a result, for 25 years, management information system, information need analysis, bibliometrics, information policy were top topics. Modeling, literature review, scientific research impact analysis, web data analysis were top methods. A recent rise of text mining is highlighted. We also analyzed communities made from the past 25 years and the recent 5 years. Bibliometrics is extending its field by applying various network analyzing algorithms. Text mining is specialized in medical information system and user interface. This result identifies the interests of excellent studies in Library and Information Science. It also can be fundamental resource for the development of Library and Information Science.

A Priority Time Scheduling Method for Avoiding Gateway Bottleneck in Wireless Mesh Networks (무선 메쉬 네트워크에서 게이트웨이 병목 회피를 위한 우선순위 타임 스케줄링 기법)

  • Ryu, Min Woo;Kim, Dae Young;Cha, Si Ho;Cho, Kuk Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.101-107
    • /
    • 2009
  • In existing wireless ad-hoc networks, how to distribute network resources fairly between many users to optimize data transmission is an important research subject. However, in wireless mesh networks (WMNs), it is one of the research areas to avoid gateway bottleneck more than the fair network resource sharing. It is because WMN traffic are concentrated on the gateway connected to backhaul. To solve this problem, the paper proposes Weighted Fairness Time-sharing Access (WFTA). The proposed WFTA is a priority time scheduling scheme based on Weighted Fair Queuing (WFQ).

Analysis of Research Subject Network in the Field of Oncogene (암유전자 연구주제 네트워크 분석)

  • Jang, Hae-Lan;Kang, Gil-Won;Lee, Eun-Jung;Kim, Seung-Ryul;Lee, Young-Sung
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.369-399
    • /
    • 2012
  • Purpose: Health technology research & development is an important area to leading future. This study examined the current trends for 'oncogene' based on the research subject network to deduce a research front. Method: Papers were extracted from PubMed database using MeSH term for studies on 'oncogenes' and further categorized as papers published by Korean. Keywords were collected from all of articles. Research subject network was generated by keywords. Research subject network was analyzed by weighted degree centrality based social network analysis and transition of research subjects was analyzed by the time series. Results: On 'oncogenes', 'Genes, ras', 'Apoptosis', 'Signal Transduction' had a high degree centrality and currently 'Antineoplastic Agents', 'Prognosis', and 'Tumor Markers, Biological' were widely conducted. Conclusion: Consistency of research trend pattern was found by analyzing oncogene network with compromised to international vs. domestic trends. Analyzing keyword networks in various subject area, those will allow us to predict the research progress and propose evidence of research & developmental strategy.

  • PDF

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF