• Title/Summary/Keyword: attribute

Search Result 3,313, Processing Time 0.028 seconds

The Final Alternative Choice According to the Change of Product Attribute Information (제품 속성정보 강화에 따른 소비자 대안선택 변화에 관한 연구)

  • Kim, Sang-cheol
    • Journal of Distribution Science
    • /
    • v.4 no.1
    • /
    • pp.103-120
    • /
    • 2006
  • This study is composed of analyses about whether intensifying the attribute level of alternatives presented to consumers makes the effect of intensifying attributes and there is any significant difference among effects of the intensified attributes. For this, the most favorite alternative is extracted from each group of computers and jeans through conjoint analysis, which is used as a standard alternative during the process of experimentation. In conclusion, this research suggests that in terms of business, by intensifying the latter attribute of products rather than the early attribute, an enterprise acquire distinct and competitive superiority over similar competing products (esp. functional products), and theoretically, by expanding and analyzing decision models it can predict consumers' behaviors more correctly.

  • PDF

An Analysis of Consumer Preferences for Internet Medical Information Service in China Using the Multi-Attribute Utility Theory (다속성 효용이론을 활용한 중국시장에서의 인터넷 의료정보 서비스 선호속성 분석)

  • Kim, Kyoung-Hwan;Chang, Young-Il
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.93-107
    • /
    • 2009
  • This study investigated consumer preferences for Internet medical information service in China using the multi-attribute utility theory. The multi-attribute utility theory is a compositional approach for modeling consumer preferences wherein researchers calculate the overall service utility by summing up the evaluation results for each attribute. We found that Chinese Internet medical information users consider the availability of information and quick response to be the most important attributes. Further, they think that the comment feature is less important as compared to other attributes such as costs and updates. In addition, we found that the Internet users having more Internet experience consider these attributes to be more important as compared to the people who are just beginning to surf the Internet. For any successful Internet business, Internet marketers should assess individual-level preference and accordingly organize a fresh campaign. As of now, Internet marketers need estimation methods to predict the market performance of new services in many different business environments. We believe that the multi-attribute utility theory is a useful approach in this regard.

  • PDF

Content-based Image Retrieval Using Fuzzy Multiple Attribute Relational Graph (퍼지 다중특성 관계 그래프를 이용한 내용기반 영상검색)

  • Jung, Sung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.533-538
    • /
    • 2001
  • In this paper, we extend FARGs single mode attribute to multiple attributes for real image application and present a new CBIR using FMARG(Fuzzy Multiple Attribute Relational Graph), which can handle queries involving multiple attributes, not only object label, but also color, texture and spatial relation. In the experiment using the synthetic image database of 1,024 images and the natural image database of 1.026 images built from NETRA database and Corel Draw, the proposed approach shows 6~30% recall increase in the synthetic image database and a good performance, at the displacements and the retrieved number of similar images in the natural image database, compared with the single attribute approach.

  • PDF

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

A Study on the Analysis of Stmartphone's Functional Attribute (스마트폰의 기능적 속성의 분석에 관한 연구)

  • Chung, Soon-Suk;Kim, Kwang-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.283-289
    • /
    • 2012
  • In the future, smartphone convergences are not only based on the on/offline integration, but also with the integration between mobile communications and broadcasts. Therefore, there is a need to search for new direction of mobile device that enables variety user applications that are different from the existing size and application issue. The aim of this research is to improve user interface of smartphone's functional attribute. We study on the analysis of smartphone's functional attribute by AHP. The survey results in this paper showed that the most preferable attribute of smartphone among the 8 was the wireless internet 25.3%, followed by messaging 20% and application 19.8%, which totaled to 62.5%. But the samples used were mostly limited to those aged 20 through 30. So the results are not considered as a representative preference of all smartphone users, and should be considered otherwise before materializing them to a product. Therefore, for the more liable results the further research should be conducted to gather data from a variety of users of all ages, and the functional attribute should be analysed through QFD.

A multi-attribute index for evaluating of national nuclear R&D prniects in Korea: multi-attribute utility analysis (다속성 효용분석을 이용한 원자력연구개발과제 사후평가지표 개발)

  • 곽승준;유승훈;김찬준
    • Journal of Korea Technology Innovation Society
    • /
    • v.5 no.1
    • /
    • pp.90-109
    • /
    • 2002
  • The national nuclear R&D projects have been implemented for the purpose of supply of nuclear power which was proved to be safety and stability. Evaluating the national nuclear R&D projects has critical importance in nu-clear energy management aspect. This paper employs multi-attribute utility analysis as a basis for obtaining an evaluation index to assess the national nuclear R&D projects using a specific case study of Korea. To structure and quantify basic values for the evaluation, we elicited important attributes, then refined and structured them into a hierarchy. A multi-attribute index is constructed as a multi-attribute utility function, based on value judgments provided by a group of technical experts, policy makers, and faculties. As a result, the objective of attainment of a proposed object is given the highest priority, followed by appropriateness of project and research strategy, utilization of research output, within attribute ranges defined for the attributes. We found that the work and results of this study can provide valuable insights and decision opportunities for virtually all major decision making in evaluation of the national nuclear R&D projects in Korea.

  • PDF

Multi-Attribute Threat Index for Information Security : Simulation and AHP Approach (정보보호를 위한 다속성 위협지수 : 시뮬레이션과 AHP 접근방법)

  • Lee, Kang-Soo;Kim, Ki-Yoon;Na, Kwan-Sik
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.117-130
    • /
    • 2008
  • Multi-attribute risk assessments provide a useful framework for systematic quantitative risk assessment that the security manager can use to prioritize security requirements and threats. In the first step, the security managers identify the four significant outcome attributes(lost revenue, lost productivity, lost customer, and recovery cost). Next. the security manager estimates the frequency and severity(three points estimates for outcome attribute values) for each threat and rank the outcome attributes according to AHP(Analytic Hierarchy Process). Finally, we generate the threat index by using muiti-attribute function and make sensitivity analysis with simulation package(Crystal Ball). In this paper, we show how multi-attribute risk analysis techniques from the field of security risk management can be used by security managers to prioritize their organization's threats and their security requirements, eventually they can derive threat index. This threat index can help security managers to decide whether their security investment is consistent with the expected risks. In addition, sensitivity analysis allows the security manager to explore the estimates to understand how they affect the selection.

The Relationship Between the Quality of Destination and Tourist Satisfaction: The Role of Destination Attributes

  • SUMARYADI, Sumaryadi;HURRIYATI, Ratih;WIBOWO, Lili Adi;GAFFAR, Vanessa
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.929-937
    • /
    • 2021
  • This present research seeks to explore the empirical evidence about the relation between quality of destination and Islamic attribute of destination on tourist satisfaction. This research was conducted at the tourism sector in West Java, Indonesia. The participants were Muslim foreign tourists who were traveling to West Java, Indonesia. The total number of participants in the research was 200. Data collection was carried out using a questionnaire. Hypotheses were tested using structural equation modeling methods with AMOS version 23. The exogenous variables in this research consisted of the quality of the destination and Islamic attribute of destination. Tourist satisfaction was an endogenous variable in this research. We used a quantitative approach and structural equation modeling to examine the research hypotheses. The results showed that there was a positive and significant effect of the quality of destination on the tourist satisfaction, and the quality of destination positively affected Islamic attribute of destination, but Islamic attribute of destination had no significant effect on tourist satisfaction. We also found that Islamic attribute of destination did not mediate the relation between quality of destination and tourist satisfaction. We provided recommendations to strengthen or improve the quality of destination in order to increase tourist satisfaction.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Does Price Promotion Hurt Products' Perceived Quality? The Role of Attribute Alignability

  • CHAE, Myoung-Jin
    • The Journal of Economics, Marketing and Management
    • /
    • v.8 no.3
    • /
    • pp.9-21
    • /
    • 2020
  • Purpose: Previous literature shows that a price promotion serves as a negative cue of product quality especially when consumers have no additional information about the product's other attributes. In this research, we explore how the effect of price promotions on consumers' perceptions of product quality changes depending on their ability to compare promoted product attributes with competitive products' attributes. Research design, data and methodology: Specifically, we use a series of scenario-based lab experiments using different types of products and explore if attribute alignability among competing products in a consumer's choice set influences consumers' ability to compare the product attributes and perceived quality. Results: Our study findings show that high attribute alignability among products makes consumers easier to compare the product attributes and thereby focus more on non-price information than price information. We also show that attribute alignability serves as a moderator and decreases perceived quality when the promotion level is higher. Therefore, the attribute alignability weakens the negative impact of a price promotion on consumers' perceived product quality. Conclusions: Our study findings provide new insights on how to implement price promotion strategies while keeping products' perceived quality, by considering the product's relationships with competing products in a choice set.