• Title/Summary/Keyword: fashion information search

Search Result 205, Processing Time 0.027 seconds

Costume Consumption Culture for Costumeplay (코스튬플레이 의상 소비문화)

  • Jang, Nam-Kyung;Park, Soo-Kyung;Lee, Joo-Young
    • Archives of design research
    • /
    • v.19 no.5 s.67
    • /
    • pp.203-212
    • /
    • 2006
  • With interests and participation in the costumeplay that mimics characters appeared on carton or animation in recent days, the costumeplay becomes one of cultural phenomena. Using a qualitative research method, this study identified costumeplayers' costume consumption pattern and explored its meanings from the perspective of consumption culture. Indeed, this study intended to help for understanding costumeplayer group as a consumer, and to provide basic knowledge about new market analysis related to fashion design and marketing. The results from the analyzing participant observation and in-depth interviews data are as follows: first, costumeplayers usually begin costumeplay by friends' invitations or by themselves and then continue on participating. Through the costumeplay, participants have benefits such as fun, departure from the daily life, and social interaction. Second, participants acquire costumes through purchase, rent, producing or combination of daily wear, but both purchase and rent account high. Third, the meanings of consumption culture in costumeplay include consumption behavior repeating possession and disposal. Also, costumeplayers concerns efficiency when purchasing or renting the costumes, and internet is a place where information search, comparison, and actual purchasing are occurred. Based on the results, fashion design and marketing implication, limitation of this study and further research ideas were suggested.

  • PDF

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

Assessing the Damage: An Exploratory Examination of Electronic Word of Mouth (손해평고(损害评估): 대전자구비행소적탐색성고찰(对电子口碑行销的探索性考察))

  • Funches, Venessa Martin;Foxx, William;Park, Eun-Joo;Kim, Eun-Young
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.2
    • /
    • pp.188-198
    • /
    • 2010
  • This study attempts to examine the influence that negative WOM (NWOM) has in an online context. It specifically focuses on the impact of the service failure description and the perceived intention of the communication provider on consumer evaluations of firm competence, attitude toward the firm, positive word of mouth and behavioral intentions. Studies of communication persuasiveness focus on "who says what; to whom; in which channel; with what effect (Chiu 2007)." In this research study, we examine electronic web posting, particularly focusing on two aspects of "what": the level of service failure communicated and perceived intention of the individual posting. It stands to reason electronic NWOM that appears to be trying to damage a product’s or firm's reputation will be viewed as more biased and will thus be considered as less credible. According to attribution theory, people search for the causes of events especially those that are negative and unexpected (Weiner 2006). Hennig-Thurau and Walsh (2003) state "since the reader has only limited knowledge and trust of the author of an online articulation the quality of the contribution could be expected to serve as a potent moderator of the articulation-behavior relationship. We therefore posit the following hypotheses: H1. Subjects exposed to electronic NWOM describing a high level of service failure will provide lower scores on measures of (a) firm competence, (b) attitude toward the firm, (c) positive word of mouth, and (d) behavioral intention than will subjects exposed to electronic NWOM describing a low level of service failure. H2. Subjects exposed to electronic NWOM with a warning intent will provide lower scores on measures of (a) firm competence, (b) attitude toward the firm, (c) positive word of mouth, and (d) behavioral intention than will subjects exposed to electronic NWOM with a vengeful intent. H3. Level of service failure in electronic NWOM will interact with the perceived intention of the electronic NWOM, such that there will be a decrease in mean response on measures of (a) firm competence, (b) attitude toward the firm, (c) positive word of mouth, and (d) behavioral intention from electronic NWOM with a warning intent to a vengeful intent. The main study involved a2 (service failure severity) x2 (NWOM with warning versus vengeful intent) factorial experiment. Stimuli were presented to subjects online using a mock online web posting. The scenario described a service failure associated with non-acceptance of a gift card in a brick-and-mortar retail establishment. A national sample was recruited through an online research firm. A total of 113 subjects participated in the study. A total of 104 surveys were analyzed. The scenario was perceived to be realistic with 92.3% giving the scenario a greater than average response. Manipulations were satisfactory. Measures were pre-tested and validated. Items were analyzed and found reliable and valid. MANOVA results found the multivariate interaction was not significant, allowing our interpretation to proceed to the main effects. Significant main effects were found for post intent and service failure severity. The post intent main effect was attributable to attitude toward the firm, positive word of mouth and behavioral intention. The service failure severity main effect was attributable to all four dependent variables: firm competence, attitude toward the firm, positive word of mouth and behavioral intention. Specifically, firm competence for electronic NWOM describing high severity of service failure was lower than electronic NWOM describing low severity of service failure. Attitude toward the firm for electronic NWOM describing high severity of service failure was lower than electronic NWOM describing low severity of service failure. Positive word of mouth for electronic NWOM describing high severity of service failure was lower than electronic NWOM describing low severity of service failure. Behavioral intention for electronic NWOM describing high severity of service failure was lower for electronic NWOM describing low severity of service failure. Therefore, H1a, H1b, H1c and H1d were all supported. In addition, attitude toward the firm for electronic NWOM with a warning intent was lower than electronic NWOM with a vengeful intent. Positive word of mouth for electronic NWOM with a warning intent was lower than electronic NWOM with a vengeful intent. Behavioral intention for electronic NWOM with a warning intent was lower than electronic NWOM with a vengeful intent. Thus, H2b, H2c and H2d were supported. However, H2a was not supported though results were in the hypothesized direction. Otherwise, there was no significant multivariate service failure severity by post intent interaction, nor was there a significant univariate service failure severity by post intent interaction for any of the three hypothesized variables. Thus, H3 was not supported for any of the four hypothesized variables. This study has research and managerial implications. The findings of this study support prior research that service failure severity impacts consumer perceptions, attitude, positive word of mouth and behavioral intentions (Weun et al. 2004). Of further relevance, this response is evidenced in the online context, suggesting the need for firms to engage in serious focused service recovery efforts. With respect to perceived intention of electronic NWOM, the findings support prior research suggesting reader's attributions of the intentions of a source influence the strength of its impact on perceptions, attitude, positive word of mouth and behavioral intentions. The implication for managers suggests while consumers do find online communications to be credible and influential, not all communications are weighted the same. A benefit of electronic WOM, even when it may be potentially damaging, is it can be monitored for potential problems and additionally offers the possibility of redress.

How Enduring Product Involvement and Perceived Risk Affect Consumers' Online Merchant Selection Process: The 'Required Trust Level' Perspective (지속적 관여도 및 인지된 위험이 소비자의 온라인 상인선택 프로세스에 미치는 영향에 관한 연구: 요구신뢰 수준 개념을 중심으로)

  • Hong, Il-Yoo B.;Lee, Jung-Min;Cho, Hwi-Hyung
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • Consumers differ in the way they make a purchase. An audio mania would willingly make a bold, yet serious, decision to buy a top-of-the-line home theater system, while he is not interested in replacing his two-decade-old shabby car. On the contrary, an automobile enthusiast wouldn't mind spending forty thousand dollars to buy a new Jaguar convertible, yet cares little about his junky component system. It is product involvement that helps us explain such differences among individuals in the purchase style. Product involvement refers to the extent to which a product is perceived to be important to a consumer (Zaichkowsky, 2001). Product involvement is an important factor that strongly influences consumer's purchase decision-making process, and thus has been of prime interest to consumer behavior researchers. Furthermore, researchers found that involvement is closely related to perceived risk (Dholakia, 2001). While abundant research exists addressing how product involvement relates to overall perceived risk, little attention has been paid to the relationship between involvement and different types of perceived risk in an electronic commerce setting. Given that perceived risk can be a substantial barrier to the online purchase (Jarvenpaa, 2000), research addressing such an issue will offer useful implications on what specific types of perceived risk an online firm should focus on mitigating if it is to increase sales to a fullest potential. Meanwhile, past research has focused on such consumer responses as information search and dissemination as a consequence of involvement, neglecting other behavioral responses like online merchant selection. For one example, will a consumer seriously considering the purchase of a pricey Guzzi bag perceive a great degree of risk associated with online buying and therefore choose to buy it from a digital storefront rather than from an online marketplace to mitigate risk? Will a consumer require greater trust on the part of the online merchant when the perceived risk of online buying is rather high? We intend to find answers to these research questions through an empirical study. This paper explores the impact of enduring product involvement and perceived risks on required trust level, and further on online merchant choice. For the purpose of the research, five types or components of perceived risk are taken into consideration, including financial, performance, delivery, psychological, and social risks. A research model has been built around the constructs under consideration, and 12 hypotheses have been developed based on the research model to examine the relationships between enduring involvement and five components of perceived risk, between five components of perceived risk and required trust level, between enduring involvement and required trust level, and finally between required trust level and preference toward an e-tailer. To attain our research objectives, we conducted an empirical analysis consisting of two phases of data collection: a pilot test and main survey. The pilot test was conducted using 25 college students to ensure that the questionnaire items are clear and straightforward. Then the main survey was conducted using 295 college students at a major university for nine days between December 13, 2010 and December 21, 2010. The measures employed to test the model included eight constructs: (1) enduring involvement, (2) financial risk, (3) performance risk, (4) delivery risk, (5) psychological risk, (6) social risk, (7) required trust level, (8) preference toward an e-tailer. The statistical package, SPSS 17.0, was used to test the internal consistency among the items within the individual measures. Based on the Cronbach's ${\alpha}$ coefficients of the individual measure, the reliability of all the variables is supported. Meanwhile, the Amos 18.0 package was employed to perform a confirmatory factor analysis designed to assess the unidimensionality of the measures. The goodness of fit for the measurement model was satisfied. Unidimensionality was tested using convergent, discriminant, and nomological validity. The statistical evidences proved that the three types of validity were all satisfied. Now the structured equation modeling technique was used to analyze the individual paths along the relationships among the research constructs. The results indicated that enduring involvement has significant positive relationships with all the five components of perceived risk, while only performance risk is significantly related to trust level required by consumers for purchase. It can be inferred from the findings that product performance problems are mostly likely to occur when a merchant behaves in an opportunistic manner. Positive relationships were also found between involvement and required trust level and between required trust level and online merchant choice. Enduring involvement is concerned with the pleasure a consumer derives from a product class and/or with the desire for knowledge for the product class, and thus is likely to motivate the consumer to look for ways of mitigating perceived risk by requiring a higher level of trust on the part of the online merchant. Likewise, a consumer requiring a high level of trust on the merchant will choose a digital storefront rather than an e-marketplace, since a digital storefront is believed to be trustworthier than an e-marketplace, as it fulfills orders by itself rather than acting as an intermediary. The findings of the present research provide both academic and practical implications. The first academic implication is that enduring product involvement is a strong motivator of consumer responses, especially the selection of a merchant, in the context of electronic shopping. Secondly, academicians are advised to pay attention to the finding that an individual component or type of perceived risk can be used as an important research construct, since it would allow one to pinpoint the specific types of risk that are influenced by antecedents or that influence consequents. Meanwhile, our research provides implications useful for online merchants (both online storefronts and e-marketplaces). Merchants may develop strategies to attract consumers by managing perceived performance risk involved in purchase decisions, since it was found to have significant positive relationship with the level of trust required by a consumer on the part of the merchant. One way to manage performance risk would be to thoroughly examine the product before shipping to ensure that it has no deficiencies or flaws. Secondly, digital storefronts are advised to focus on symbolic goods (e.g., cars, cell phones, fashion outfits, and handbags) in which consumers are relatively more involved than others, whereas e- marketplaces should put their emphasis on non-symbolic goods (e.g., drinks, books, MP3 players, and bike accessories).

  • PDF

Extension Method of Association Rules Using Social Network Analysis (사회연결망 분석을 활용한 연관규칙 확장기법)

  • Lee, Dongwon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.111-126
    • /
    • 2017
  • Recommender systems based on association rule mining significantly contribute to seller's sales by reducing consumers' time to search for products that they want. Recommendations based on the frequency of transactions such as orders can effectively screen out the products that are statistically marketable among multiple products. A product with a high possibility of sales, however, can be omitted from the recommendation if it records insufficient number of transactions at the beginning of the sale. Products missing from the associated recommendations may lose the chance of exposure to consumers, which leads to a decline in the number of transactions. In turn, diminished transactions may create a vicious circle of lost opportunity to be recommended. Thus, initial sales are likely to remain stagnant for a certain period of time. Products that are susceptible to fashion or seasonality, such as clothing, may be greatly affected. This study was aimed at expanding association rules to include into the list of recommendations those products whose initial trading frequency of transactions is low despite the possibility of high sales. The particular purpose is to predict the strength of the direct connection of two unconnected items through the properties of the paths located between them. An association between two items revealed in transactions can be interpreted as the interaction between them, which can be expressed as a link in a social network whose nodes are items. The first step calculates the centralities of the nodes in the middle of the paths that indirectly connect the two nodes without direct connection. The next step identifies the number of the paths and the shortest among them. These extracts are used as independent variables in the regression analysis to predict future connection strength between the nodes. The strength of the connection between the two nodes of the model, which is defined by the number of nodes between the two nodes, is measured after a certain period of time. The regression analysis results confirm that the number of paths between the two products, the distance of the shortest path, and the number of neighboring items connected to the products are significantly related to their potential strength. This study used actual order transaction data collected for three months from February to April in 2016 from an online commerce company. To reduce the complexity of analytics as the scale of the network grows, the analysis was performed only on miscellaneous goods. Two consecutively purchased items were chosen from each customer's transactions to obtain a pair of antecedent and consequent, which secures a link needed for constituting a social network. The direction of the link was determined in the order in which the goods were purchased. Except for the last ten days of the data collection period, the social network of associated items was built for the extraction of independent variables. The model predicts the number of links to be connected in the next ten days from the explanatory variables. Of the 5,711 previously unconnected links, 611 were newly connected for the last ten days. Through experiments, the proposed model demonstrated excellent predictions. Of the 571 links that the proposed model predicts, 269 were confirmed to have been connected. This is 4.4 times more than the average of 61, which can be found without any prediction model. This study is expected to be useful regarding industries whose new products launch quickly with short life cycles, since their exposure time is critical. Also, it can be used to detect diseases that are rarely found in the early stages of medical treatment because of the low incidence of outbreaks. Since the complexity of the social networking analysis is sensitive to the number of nodes and links that make up the network, this study was conducted in a particular category of miscellaneous goods. Future research should consider that this condition may limit the opportunity to detect unexpected associations between products belonging to different categories of classification.