• Title/Summary/Keyword: blog types

Search Result 48, Processing Time 0.029 seconds

Importance Analysis on the Trytoursumer Social Media Channel (체험관광객(트라이투어슈머:Trytoursumer)의 관광 소셜미디어 채널 중요도 분석 연구)

  • Kim, Young-Ha
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.193-200
    • /
    • 2016
  • This study is focused on analyzing the tourism social media channel importance of Trytoursumer. On the basis of previous studies, the factors were divided into tourism communication, tourism cooperation, tourism contents sharing, tourism entertainment. As a result of the empirical analysis using AHP, Analytic Hierarchy Process, tourism communication relatively appeared as the most important factor. And order showed that the high importance of such tourism content sharing, tourism entertainment, tourism cooperation. Also, there was the highest priority of social networking in the area of tourism communication among 14 types of total evaluation factors regarding priority, followed by social news in the area of tourism cooperation, and micro-blog in the area of tourism communication. Analysis result, may contribute to the increase of social media channels effectiveness and strategy of application in social media channel of Trytoursumer.

The Effects of Perception Toward Cyber Identity on Loyalty and Purchase Intention (사이버 공간의 자아에 대한 인지가 충성도와 구매의도에 미치는 영향)

  • Kim Su-Yeon;Hwang Hyun-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.83-100
    • /
    • 2005
  • In this paper, we investigate the concept of cyber identity built in cyberspace and analyze the effects of general perception toward cyber identity on loyalty and purchase intent. Cyber identity is classified into two types: personal and social cyber identity, and has five components. Avatars and online gaming capability make up personal cyber identity while online communities and instant messenger count as social cyber identity. We regard blog personalities as having both personal and social characteristics. In our survey, we conclude that internet users want to purchase cyber items such as avatars, online game items, and wallpaper pictures to enhance their cyber identities. Based on the survey results , we derive five factors comprising personal cyber identity and social cyber identity using factor analysis and analyze overall effects of cyber identity on loyalty and purchase intention using Structural Equation Model.

  • PDF

Security Analysis on Password Authentication System of Web Sites (웹사이트 패스워드 인증 시스템의 보안성 분석)

  • Noh, Heekyeong;Choi, Changkuk;Park, Minsu;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.463-478
    • /
    • 2014
  • Portal site is not only providing search engine and e-mail service but also various services including blog, news, shopping, and others. The fact that average number of daily login for Korean portal site Naver is reaching 300 million suggests that many people are using portal sites. With the increase in number of users followed by the diversity in types of services provided by portal sites, the attack is also increasing. Most of studies of password authentication is focused on threat and countermeasures, however, in this study, we analyse the security threats and security requirement of membership, login, password reset first phase, password reset second phase. Also, we measure security score with common criteria of attack potential. As a result, we compare password authentication system of domestic and abroad portal sites.

A study on the design of T-shirt with fiber product recycling for using as learning material (섬유제품 재활용을 이용한 교육용 티셔츠 디자인 연구)

  • Lee, Seung Hee;Ha, Seung Yeon
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.21 no.1
    • /
    • pp.1-15
    • /
    • 2019
  • The purpose of this study is to develop ICT utilization learning materials for a chapter titled 'Environment Friendly Clothing and Reform of Clothing' in technology and home economics textbooks for Year 2 students in middle school. The research methods were selected from ten types of junior high school technology textbooks, which were revised in 2009, and mainly focused on items such as jeans, shirts, shirts, cardigans, and skirts, Using selected textiles and basic design t-shirts, five works were made using structural and decorative details. The results of this study are as follows. First, textile products shown in the chapter 'Environment Friendly Clothing and Reform of Clothing' are most commonly worn and found in daily life. With regard to a reuse method, structural changes to clothing are proposed. For example, cases relating to the changing of a neckline or the use of a shirt or a sleeve are presented. There are some decoration methods adapted in reuse; using ornaments, such as spangles and emblems, patchwork, shirring and the constucting of collages. Second, following the plan, 5 items are designed with T-shirts, shirts, cardigans and skirts. For the T-shirt design, other fabrics including organza and neoplan are used from design point of view, in addition to reused textile products. Detailed structural changes of necklines, sleeves and collars and detailed and the ornamentation method including shirring, smoking, patchwork and collages are used. Third, this study proposes 6 categories (profile, design planning, diagram, reused textile product, production method and order and pictures of T-shirts developed) under the title of 'T-shirt Made Out of Disposed Clothing', selecting a blog as active teaching and learning material as a part of the ICT utilization in educational settings.

Blockchain Technology and Application

  • Lee, Sae Bom;Park, Arum;Song, Jaemin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.89-97
    • /
    • 2021
  • Blockchain is designed to collect and store the data recorded on the network in one block unit, and is connected and stored back and forth, and its form is similar to how the blocks are connected, so it is called a blockchain. Many companies are trying to popularize blockchain-based services at home and abroad, and blockchains are used in various industries. This study introduces the technical characteristics of the blockchain and deals with application services utilizing the blockchain. Introducing 5 types of blockchain architecture and core technologies and introducing blockchain application services that are used in payment services, blockchain service networks, blockchain real estate platforms, identity verification, cryptocurrency, diamond distribution path tracking, and blog information recording. do. It is expected to increase the understanding of the blockchain and provide usefulness in future blockchain research and service development.

Effect of Online Word of Mouth on Product Sales: Focusing on Communication-Channel Characteristics

  • Jeon, Jaihyun;Lim, Taewook;Kim, Byung-Do;Seok, Junhee
    • Asia Marketing Journal
    • /
    • v.21 no.2
    • /
    • pp.73-98
    • /
    • 2019
  • As information and communication technology continue its remarkable development, the exchange of information online becomes as prevalent and frequent as face-to-face communication in daily life. Therefore, the management and application of WOM (word of mouth) practices will become more important than ever to companies. Currently, there are various types of communication channels for online WOM, and each channel has its own unique traits. Most of the previous research studies online WOM by examining the information inside a single communication channel, but this research chooses two different communication channels and analyzes the effects of online WOM with each channel's unique characteristics. More specifically, this research focuses on the expectation that the effects of information from Twitter and blogs on product sales may differ because Twitter and blogs, two different communication channels for online WOM, have their own unique traits. Our particular aim is to perform an in-depth examination on the effects of communication channel's volume and valence on product sales, two important attributes of online WOM. Furthermore, while most of the empirical research focuses on online WOM and analyzes its effect on markets of temporary experience goods, such as movies and books, this research highlights focuses on the automobile market, a durable goods market. The results of our analysis are as follows: First, regarding blogs, a positive valence significantly and positively affects the sales of products, and this result indicates that consumers are influenced more by the emotional aspect of a product presented in a post than by the number of blog posts. Second, regarding Twitter, the volume of online WOM significantly and positively affects sales, an indication that as the number of posts increase, the sales increase. Through this research, we suggest that even those firms that sell durable goods can increase sales through the management and application of online WOM. Moreover, according to the characteristics of communication channels, the effects of online WOM on sales differ. As a practical implication of this research, we suggest that companies can and should create marketing strategies appropriate to their targeted communication channels.

Classifying and Characterizing the Types of Gentrified Commercial Districts Based on Sense of Place Using Big Data: Focusing on 14 Districts in Seoul (빅데이터를 활용한 젠트리피케이션 상권의 장소성 분류와 특성 분석 -서울시 14개 주요상권을 중심으로-)

  • Young-Jae Kim;In Kwon Park
    • Journal of the Korean Regional Science Association
    • /
    • v.39 no.1
    • /
    • pp.3-20
    • /
    • 2023
  • This study aims to categorize the 14 major gentrified commercial areas of Seoul and analyze their characteristics based on their sense of place. To achieve this, we conducted hierarchical cluster analysis using text data collected from Naver Blog. We divided the districts into two dimensions: "experience" and "feature" and analyzed their characteristics using LDA (Latent Dirichlet Allocation) of the text data and statistical data collected from Seoul Open Data Square. As a result, we classified the commercial districts of Seoul into 5 categories: 'theater district,' 'traditional cultural district,' 'female-beauty district,' 'exclusive restaurant and medical district,' and 'trend-leading district.' The findings of this study are expected to provide valuable insights for policy-makers to develop more efficient and suitable commercial policies.

Analysis of Z Generation's Collaborative Information Activities through Challenges: Focusing on Korean College Students (챌린지에 나타난 Z세대의 협업 정보 활동 - 국내 대학생을 중심으로 -)

  • Ji Hei Kang
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.1
    • /
    • pp.173-192
    • /
    • 2024
  • Through a survey of college students, this study explained the process and aspects of how Generation Z interacted with information while collaborating on a daily basis. Applying the Radical Change Theory, the study investigated the platforms through which university students engaged in challenges and their information behaviors. University students primarily participated in challenges using platforms such as Instagram and Naver Blog. In terms of changes in information seeking, which is the first type of information seeking in the theory, a wide and diverse range of information behaviors were observed, with the way of searching for information being quite different from when the digital age arrived 10 years ago. Information sources included not only digitalized ones but also traditional sources such as printed materials and personal contacts. The utilization of various media types was prominent, and collaborative efforts were voluntarily undertaken for challenges. In terms of changing perspectives, type 2 of information behavior, the main motivation for acquiring information and securing knowledge led to participation in the challenge. Participants exhibited a sense of community consciousness, including mutual influence awareness, social participation consciousness, and emotional connection.

Intelligent Web Crawler for Supporting Big Data Analysis Services (빅데이터 분석 서비스 지원을 위한 지능형 웹 크롤러)

  • Seo, Dongmin;Jung, Hanmin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.575-584
    • /
    • 2013
  • Data types used for big-data analysis are very widely, such as news, blog, SNS, papers, patents, sensed data, and etc. Particularly, the utilization of web documents offering reliable data in real time is increasing gradually. And web crawlers that collect web documents automatically have grown in importance because big-data is being used in many different fields and web data are growing exponentially every year. However, existing web crawlers can't collect whole web documents in a web site because existing web crawlers collect web documents with only URLs included in web documents collected in some web sites. Also, existing web crawlers can collect web documents collected by other web crawlers already because information about web documents collected in each web crawler isn't efficiently managed between web crawlers. Therefore, this paper proposed a distributed web crawler. To resolve the problems of existing web crawler, the proposed web crawler collects web documents by RSS of each web site and Google search API. And the web crawler provides fast crawling performance by a client-server model based on RMI and NIO that minimize network traffic. Furthermore, the web crawler extracts core content from a web document by a keyword similarity comparison on tags included in a web documents. Finally, to verify the superiority of our web crawler, we compare our web crawler with existing web crawlers in various experiments.

A Study on Spam Document Classification Method using Characteristics of Keyword Repetition (단어 반복 특징을 이용한 스팸 문서 분류 방법에 관한 연구)

  • Lee, Seong-Jin;Baik, Jong-Bum;Han, Chung-Seok;Lee, Soo-Won
    • The KIPS Transactions:PartB
    • /
    • v.18B no.5
    • /
    • pp.315-324
    • /
    • 2011
  • In Web environment, a flood of spam causes serious social problems such as personal information leak, monetary loss from fishing and distribution of harmful contents. Moreover, types and techniques of spam distribution which must be controlled are varying as days go by. The learning based spam classification method using Bag-of-Words model is the most widely used method until now. However, this method is vulnerable to anti-spam avoidance techniques, which recent spams commonly have, because it classifies spam documents utilizing only keyword occurrence information from classification model training process. In this paper, we propose a spam document detection method using a characteristic of repeating words occurring in spam documents as a solution of anti-spam avoidance techniques. Recently, most spam documents have a trend of repeating key phrases that are designed to spread, and this trend can be used as a measure in classifying spam documents. In this paper, we define six variables, which represent a characteristic of word repetition, and use those variables as a feature set for constructing a classification model. The effectiveness of proposed method is evaluated by an experiment with blog posts and E-mail data. The result of experiment shows that the proposed method outperforms other approaches.