• Title/Summary/Keyword: knowledge Management Process

Search Result 1,357, Processing Time 0.027 seconds

Comparison of Cognitive Loads between Koreans and Foreigners in the Reading Process

  • Im, Jung Nam;Min, Seung Nam;Cho, Sung Moon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.35 no.4
    • /
    • pp.293-305
    • /
    • 2016
  • Objective: This study aims to measure cognitive load levels by analyzing the EEG of Koreans and foreigners, when they read a Korean text with care selected by level from the grammar and vocabulary aspects, and compare the cognitive load levels through quantitative values. The study results can be utilized as basic data for more scientific approach, when Korean texts or books are developed, and an evaluation method is built, when the foreigners encounter them for learning or an assignment. Background: Based on 2014, the number of the foreign students studying in Korea was 84,801, and they increase annually. Most of them are from Asian region, and they come to Korea to enter a university or a graduate school in Korea. Because those foreign students aim to learn within Universities in Korea, they receive Korean education from their preparation for study in Korea. To enter a university in Korea, they must acquire grade 4 or higher level in the Test of Proficiency in Korean (TOPIK), or they need to complete a certain educational program at each university's affiliated language institution. In such a program, the learners of the Korean language receive Korean education based on texts, except speaking domain, and the comprehension of texts can determine their academic achievements in studying after they enter their desired schools (Jeon, 2004). However, many foreigners, who finish a language course for the short-term, and need to start university study, cannot properly catch up with university classes requiring expertise with the vocabulary and grammar levels learned during the language course. Therefore, reading education, centered on a strategy to understand university textbooks regarded as top level reading texts to the foreigners, is necessary (Kim and Shin, 2015). This study carried out an experiment from a perspective that quantitative data on the readers of the main player of reading education and teaching materials need to be secured to back up the need for reading education for university study learners, and scientifically approach educational design. Namely, this study grasped the difficulty level of reading through the measurement of cognitive loads indicated in the reading activity of each text by dividing the difficulty of a teaching material (book) into eight levels, and the main player of reading into Koreans and foreigners. Method: To identify cognitive loads indicated upon reading Korean texts with care by Koreans and foreigners, this study recruited 16 participants (eight Koreans and eight foreigners). The foreigners were limited to the language course students studying the intermediate level Korean course at university-affiliated language institutions within Seoul Metropolitan Area. To identify cognitive load, as they read a text by level selected from the Korean books (difficulty: eight levels) published by King Sejong Institute (Sejonghakdang.org), the EEG sensor was attached to the frontal love (Fz) and occipital lobe (Oz). After the experiment, this study carried out a questionnaire survey to measure subjective evaluation, and identified the comprehension and difficulty on grammar and words. To find out the effects on schema that may affect text comprehension, this study controlled the Korean texts, and measured EEG and subjective satisfaction. Results: To identify brain's cognitive load, beta band was extracted. As a result, interactions (Fz: p =0.48; Oz: p =0.00) were revealed according to Koreans and foreigners, and difficulty of the text. The cognitive loads of Koreans, the readers whose mother tongue is Korean, were lower in reading Korean texts than those of the foreigners, and the foreigners' cognitive loads became higher gradually according to the difficulty of the texts. From the text four, which is intermediate level in difficulty, remarkable differences started to appear in comparison of the Koreans and foreigners in the beginner's level text. In the subjective evaluation, interactions were revealed according to the Koreans and foreigners and text difficulty (p =0.00), and satisfaction was lower, as the difficulty of the text became higher. Conclusion: When there was background knowledge in reading, namely schema was formed, the comprehension and satisfaction of the texts were higher, although higher levels of vocabulary and grammar were included in the texts than those of the readers. In the case of a text in which the difficulty of grammar was felt high in the subjective evaluation, foreigners' cognitive loads were also high, which shows the result of the loads' going up higher in proportion to the increase of difficulty. This means that the grammar factor functions as a stress factor to the foreigners' reading comprehension. Application: This study quantitatively evaluated the cognitive loads of Koreans and foreigners through EEG, based on readers and the text difficulty, when they read Korean texts. The results of this study can be used for making Korean teaching materials or Korean education content and topic selection for foreigners. If research scope is expanded to reading process using an eye-tracker, the reading education program and evaluation method for foreigners can be developed on the basis of quantitative values.

An Evaluation on the Operating of Fisheries Extension Services (어촌지도사업의 평가)

  • 최정윤
    • The Journal of Fisheries Business Administration
    • /
    • v.17 no.2
    • /
    • pp.65-106
    • /
    • 1986
  • 1, The Purpose of Study This is a study on the Evaluation of the operating of Fisheries Extension Services of Korea, for performing the activities such as guiding fisheries technique as well as offering industrial information to the fishermen in fishing village. By doing so, the Fisheries Extension Sevices(FES) can materialize the continued growth of fisheries, the social and economic development of fishing village, and the increase in income by enhancing the knowledge level of Fishermen, etc. In performing fisheries policy, this activity plays a great role on the research and development activity, and it has become practical since 1976 in Korea. In order to meet immediately with the problem of fisheries technical innovation and rapid environmental changes surrounding the fisheries, the fishermen should not only enhance their scientific and comprehensive capacity in fisheries technique but abtain various effective information. Generally, as most of all the fishemen are poor in the managerial structure and scattered in fishing villages, they have little opportunity in the contact of information. As a result, it is nessessary for the FES to perform the fishing business by the extension service officials who has received special training and acquired fisheries know-how in these fields. And yet, FES is under the unfullfilled circumstance in such factors as manpower, technical know-how, equipment, and the service system etc., which is required in promoting the social, economic development of fishing village and in resolving the high technique demand of fisherman. This study on the fisheries extension services have been studied from those backgrounds. 2. Research Method The data of collecting methods which were necessary in carrying out this study was adopted by the questionaire research on the present extension service activity, through the subject of the extension services (driving agency of the work and the officials), the object(fishemen) and the 3rd observers to the extension services (the authorities concerned). The research sample was taken by the sampling extraction of total 1, 774 men from the above 3 groups. And the research was carried out from August, 1986 to October, 1986, supported from the Fisheries Extension Office (FEO) located in field during the research process. In this study, the levels of the extension operating were determined and estimated in accordance with the extension service method, morale of extension service officials and the extension service system, etc. through the collected data of the research questionaire paper. And based on this result, the essential conditions of the extension services were grasped, and also we tried to present the various activity plan necessary to promote the operating of the extension services. The questionaire research data was calculated by the computer center of National Fisheries University of Pusan, and the total result was again tried on the one demension analysis along with two dimension analysis to search out the relativity between the questionaire, and the statistical test was done $\chi$$^2$test in significance level of l~5%. 3. Contents of Study This study consists of 7 chapters and the contents are as follows : Chapter I : The object and method of the study Chapter II : The assessment and analysis of the extension services Chapter III : The contents and method of the extension services Chapter IV : Analysis of the essential conditions for the extension services Chapter V : The evaluation of activities of extension services Chapter Ⅵ : Conclusion.4. Results and RecommendationTherefore, the results of this study estimated by logical process and analysis are as follows : 1) Most of Korean fishing villages and coastal fishermen have shown much concerns about fisheries technique and social changes, thus many of them were confronted with new problems on how to adapt and to meet changes. 2) Majority of fishermen estimated FEO as an organization of specific technologies with all the thing concerning the fisheries technique in general. Therefore the fishermen wanted to utilize the FEO as an adaptable method for the modern fisheries techniques as well as the environmental changes. 3) In contrast with the fast changes of the fisheries technique, the complexity and variety of technical system and the broadness of fishing village and fishermen, it was revealed that the necessary factors such as the facilities, manpower, budget, and the level of applying techniques of the FEO located in field were highly insufficient. Accordingly, the guiding efficiency was low and the extension services did not provide full solution to the various request from fishermen. 4) It is possible to classify the activation factor for the extension service into two large dimension ; personal dimension relevant to guidance officials and work dimension relevant to the organization. And it was found that the activation level of the work dimension was far lower than the personal dimension between them. So, the activation should be done first in the dimesion to promote the activation of the extension services. 5) The extension services officials are now demoralized in general, thus it is necessary to take reality into consideration : the expense of activity, the adequate endowment of activity scope and the reasonable operation of the position class, etc to enhance its morale. However, in order to do the FES activation, first of all, the systems should be established which is lain unsettled stage until now. And there must be change in the understanding of government i.e. the fisheries extension services are the essential policy subject to build up the base of fisheries growth and modernize the fisheries management. And it should be driven positively with the recognition of the "lasting project".g project".uot;.

  • PDF

The Effect of Hospital Service Coordinator Education Curriculum on the Education Satisfaction and the Quality of Medical Service (병원서비스코디네이터 교육과정이 교육만족과 의료서비스 품질에 미치는 영향)

  • Choi, Eun-Kyoung;Park, Chang Sik;Seo, Jong-Bum
    • The Korean Journal of Health Service Management
    • /
    • v.2 no.1
    • /
    • pp.137-154
    • /
    • 2008
  • The increase of the supply of medical service and the increase of hospitals have intensified the competition of hospitals, and the advancement towards internationalization in the opening of medical industry has triggered the infinite competition of medical profession. In addition, the high expectation of customers and quality improvement in the medical care in accordance with the improvement of overall income, and the change of active role of medical consumers according to the popularization and the improvement of rights awareness reflect the customer needs and choice in the medical service. Customers wanted to receive the kind and pleasant service under the up-to-date medical service. Therefore, as a solution, hospital coordinators were emerged for the purpose of smooth treatment and customer satisfaction by generalizing all service of hospital. Accordingly, this thesis attempted to investigate the effect of hospital coordinator education curriculum on the education satisfaction and the quality of medical service. In order to solve the purpose of this study, I, author reviewed the existing literatures, established hypothesis, and verified hypothesis by using the variety of statistics techniques such as reliability, validity, frequency analysis, and regression analysis. The verification of hypothesis is as followings: First, among education training factors of hospital coordinators, the quality of instructor significantly affects the satisfaction of hospital coordinator education training. Second, among training factors of hospital coordinator, the attitude of trainee significantly affects the training satisfaction of hospital coordinator. Third, among education training factors of hospital coordinator, education course significantly affects the training satisfaction of hospital coordinator education. As the qualities of instructor are better equipped, the satisfaction of education becomes higher. It indicates that the education method of instructors is important as an index to represent the qualities of instructor such as the appropriateness of education method, preparation, passion, visual materials, the adequacy of education procession, and specialized knowledge, and it has important effect on the satisfaction of education. In order to enhance the satisfaction of hospital coordinator education, the creation of education environment, making trainee concentrate on the education, is required by appropriately allocating programs, arousing interest in education, based on the attitude of trainee, discussion, and preliminary programs, preparation, ahead of enforcement of education. Fourth, the satisfaction of hospital coordinator education training significantly affects the reliability among the qualities of medical service. Fifth, satisfaction of hospital coordinator education training significantly affects hospitality I kindness among the qualities of medical service. If the education satisfaction of trainee is high, it is effective in the practical application such as dealing with complaints, the duty performance for the patients, and so on in offering the medical service, related to reliability and furthermore, we can find the positive change in the attitude change of medical professions related to the reliability of hospital coordinator. In addition, in the process of offering medical services such as the kind explanation on the duty, rapid response to the customers inquiry, and tidy uniform, practical effect was verified. Sixth, the education training factor of hospital coordinator significantly affects the reliability among the quality of medical service. Seventh, the education training factors of hospital coordinator significantly affect hospitality/kindness. In the education of hospital coordinator, the methods to attract the interest of trainee by emphasizing reliability should be sought and for gaining the practical effect of hospital coordinator education, the sufficient preparation and investigation on the education curriculum should be prerequisite and under this condition, intensified discussion on the instructor and education course is needed. In the design of education course, more education hours and subjects should be allocated in the part of hospitality in order to improve the practical application of hospitality. Therefore, it is meaningful in a sense that this study newly approached the components of hospital coordinator education and the need to modify the quality components of medical service in accordance with the study subjects was raised. This study also finds its meaning in that it provides basic materials for the study of future hospital coordinator education by suggesting the system development model of hospital coordinator education through preliminary study of education training. In addition, this study is meaningful in the aspect that it suggested the direction of education training by showing how the hospital coordinator education training would applied to the hospital coordinator course of the Continuing Education Center at Pusan and Kyungnam National University to some extent. Since all investigation of this study was approached from the side of hospital coordinator, the thoughts of patients who are beneficiaries of medical service, and care givers cannot be identified. Therefore, the satisfaction of patients and care givers through the experience of medical service, which is the essential prerequisite of medical service, should be importantly considered and investigated. Accordingly, The study of comparing and analyzing the views of both patients and care givers should be carried out in the future.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Population Ecological Study of Cultured Sea Squirt (Halocynthia roretzi) and Management Implications (양식 우렁쉥이(Halocynthia roretzi)의 자원 생태학적 분석 및 적정관리 방안)

  • Zhang Chang Ik;Lim Hyun Sig
    • Journal of Aquaculture
    • /
    • v.3 no.1
    • /
    • pp.49-63
    • /
    • 1990
  • A population ecological study was carried out to estimate survival and growth rates, biomass, biological production and turnover ratio of cultured sea squirt, Halocynthia roretzi, by growth stages, using data from in situ culture experiment off Hansando in the southern part of Korea from February 1985 to July 1986. The squirt population followed an exponential decay function and the instantaneous coefficient of total mortality (Z) was estimated to be 0.0614 $month^{-1}$(Var (Z) = 0.000126). Growths in total weight and meat weight of squirts were expressed as linear functions during the period of culture experiment. The growth of squirts showed a negative correlation with the water temperature. The mean biomass per string ranged from 2.14 kg for March of the first year to 16.26 kg for March of the next year. The biological production per string was estimated to range from 3.28 kg for the first summer (June - July) to 6.46kg for the first late winter (February-March). The peak of turnover ratio occurred in the late winter (February-March) as 3.013 and the ratios sharply declined thereafter. Based on the results of this study, management implications for culturing sea squirts were also suggested. The optimum harvest time ($t_{mb}$) when the peak biomass in terms of total weight occurred was estimated to be late June of the second year, which corresponded to 16.7 months after the main hanging. However, the time when the peak biomass in terms of meat weight was occurred was early July of the second year. The maximum harvest biomass was 17.4 kg per string in terms of total weight and 6.3 kg per string in terms of meat weight. In conclusion, the process of culture should be conducted on the basis of the knowledge of population ecological theories as shown in this study.

  • PDF

A Study on Basic Plan for Upscaling Environmental Conservation Value Assessment Map(ECVAM) of National Land in South Korea (대축척 국토환경성평가지도 작성방안 연구)

  • Lee, Moung-Jin;Jeon, Seong-Woo;Lee, Chong-Soo;Kang, Byung-Jin;Song, Won-Kyong
    • Journal of Environmental Policy
    • /
    • v.6 no.3
    • /
    • pp.115-145
    • /
    • 2007
  • This study was performed for developing upscaling Environmental Conservation Value Assessment Map(ECVAM) of National Land in South Korea and presenting the application method of ECVAM. This ECVAM adopted the least indicator method and uses a Geographic Information System(GIS). This map is made through evaluation of 67 items. As a result, the construction of ECVAM was defined as a process of identifying land use to scientifically assess the physical and environmental value of land and classify conservation value into several grades for the sustainable management of environmental resources. After applying ECVAM criteria of five degrees to the whole of study area, Grade I, showing the highest conservation value, accounted for 29.3% by land area of ECVAM. Grades II, III, IV and V likewise accounted for, respectively, 21.7%, 17.2%, 7.1% and the lowest conservation value of 24.7%. other result, ECVAM and land suitability assessment agreement rate is Grade I 33.05%, Grades II, III, IV and V likewise accounted for 12.92%, 15.05%, 36.93% and last value of 53.28% This study set up "the realization of the improvement ECVAM" as the vision of the advancing strategy. In order to accomplish the vision, this study established the purpose as follow; constructing strategic assessment value relation to ECVAM based on knowledge, arranging the foundation to upscaling assessment value And this study devised preparatory plans to achieve the vision and the purpose as next; construction on base theme map by 1:5,000 scalie, base on land register theme map and precision land cover map. Therefore, for applying the result of this study to the upscaling Environmental Conservation Value Assessment Map(ECVAM), it considers regularly the systematic categorization of preceding item, consideration issue of national environmental geographic information using the ECVAM.

  • PDF

How Enduring Product Involvement and Perceived Risk Affect Consumers' Online Merchant Selection Process: The 'Required Trust Level' Perspective (지속적 관여도 및 인지된 위험이 소비자의 온라인 상인선택 프로세스에 미치는 영향에 관한 연구: 요구신뢰 수준 개념을 중심으로)

  • Hong, Il-Yoo B.;Lee, Jung-Min;Cho, Hwi-Hyung
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • Consumers differ in the way they make a purchase. An audio mania would willingly make a bold, yet serious, decision to buy a top-of-the-line home theater system, while he is not interested in replacing his two-decade-old shabby car. On the contrary, an automobile enthusiast wouldn't mind spending forty thousand dollars to buy a new Jaguar convertible, yet cares little about his junky component system. It is product involvement that helps us explain such differences among individuals in the purchase style. Product involvement refers to the extent to which a product is perceived to be important to a consumer (Zaichkowsky, 2001). Product involvement is an important factor that strongly influences consumer's purchase decision-making process, and thus has been of prime interest to consumer behavior researchers. Furthermore, researchers found that involvement is closely related to perceived risk (Dholakia, 2001). While abundant research exists addressing how product involvement relates to overall perceived risk, little attention has been paid to the relationship between involvement and different types of perceived risk in an electronic commerce setting. Given that perceived risk can be a substantial barrier to the online purchase (Jarvenpaa, 2000), research addressing such an issue will offer useful implications on what specific types of perceived risk an online firm should focus on mitigating if it is to increase sales to a fullest potential. Meanwhile, past research has focused on such consumer responses as information search and dissemination as a consequence of involvement, neglecting other behavioral responses like online merchant selection. For one example, will a consumer seriously considering the purchase of a pricey Guzzi bag perceive a great degree of risk associated with online buying and therefore choose to buy it from a digital storefront rather than from an online marketplace to mitigate risk? Will a consumer require greater trust on the part of the online merchant when the perceived risk of online buying is rather high? We intend to find answers to these research questions through an empirical study. This paper explores the impact of enduring product involvement and perceived risks on required trust level, and further on online merchant choice. For the purpose of the research, five types or components of perceived risk are taken into consideration, including financial, performance, delivery, psychological, and social risks. A research model has been built around the constructs under consideration, and 12 hypotheses have been developed based on the research model to examine the relationships between enduring involvement and five components of perceived risk, between five components of perceived risk and required trust level, between enduring involvement and required trust level, and finally between required trust level and preference toward an e-tailer. To attain our research objectives, we conducted an empirical analysis consisting of two phases of data collection: a pilot test and main survey. The pilot test was conducted using 25 college students to ensure that the questionnaire items are clear and straightforward. Then the main survey was conducted using 295 college students at a major university for nine days between December 13, 2010 and December 21, 2010. The measures employed to test the model included eight constructs: (1) enduring involvement, (2) financial risk, (3) performance risk, (4) delivery risk, (5) psychological risk, (6) social risk, (7) required trust level, (8) preference toward an e-tailer. The statistical package, SPSS 17.0, was used to test the internal consistency among the items within the individual measures. Based on the Cronbach's ${\alpha}$ coefficients of the individual measure, the reliability of all the variables is supported. Meanwhile, the Amos 18.0 package was employed to perform a confirmatory factor analysis designed to assess the unidimensionality of the measures. The goodness of fit for the measurement model was satisfied. Unidimensionality was tested using convergent, discriminant, and nomological validity. The statistical evidences proved that the three types of validity were all satisfied. Now the structured equation modeling technique was used to analyze the individual paths along the relationships among the research constructs. The results indicated that enduring involvement has significant positive relationships with all the five components of perceived risk, while only performance risk is significantly related to trust level required by consumers for purchase. It can be inferred from the findings that product performance problems are mostly likely to occur when a merchant behaves in an opportunistic manner. Positive relationships were also found between involvement and required trust level and between required trust level and online merchant choice. Enduring involvement is concerned with the pleasure a consumer derives from a product class and/or with the desire for knowledge for the product class, and thus is likely to motivate the consumer to look for ways of mitigating perceived risk by requiring a higher level of trust on the part of the online merchant. Likewise, a consumer requiring a high level of trust on the merchant will choose a digital storefront rather than an e-marketplace, since a digital storefront is believed to be trustworthier than an e-marketplace, as it fulfills orders by itself rather than acting as an intermediary. The findings of the present research provide both academic and practical implications. The first academic implication is that enduring product involvement is a strong motivator of consumer responses, especially the selection of a merchant, in the context of electronic shopping. Secondly, academicians are advised to pay attention to the finding that an individual component or type of perceived risk can be used as an important research construct, since it would allow one to pinpoint the specific types of risk that are influenced by antecedents or that influence consequents. Meanwhile, our research provides implications useful for online merchants (both online storefronts and e-marketplaces). Merchants may develop strategies to attract consumers by managing perceived performance risk involved in purchase decisions, since it was found to have significant positive relationship with the level of trust required by a consumer on the part of the merchant. One way to manage performance risk would be to thoroughly examine the product before shipping to ensure that it has no deficiencies or flaws. Secondly, digital storefronts are advised to focus on symbolic goods (e.g., cars, cell phones, fashion outfits, and handbags) in which consumers are relatively more involved than others, whereas e- marketplaces should put their emphasis on non-symbolic goods (e.g., drinks, books, MP3 players, and bike accessories).

  • PDF

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

A Study on the Effect of Booth Recommendation System on Exhibition Visitors Unplanned Visit Behavior (전시장 참관객의 계획되지 않은 방문행동에 있어서 부스추천시스템의 영향에 대한 연구)

  • Chung, Nam-Ho;Kim, Jae-Kyung
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.175-191
    • /
    • 2011
  • With the MICE(Meeting, Incentive travel, Convention, Exhibition) industry coming into the spotlight, there has been a growing interest in the domestic exhibition industry. Accordingly, in Korea, various studies of the industry are being conducted to enhance exhibition performance as in the United States or Europe. Some studies are focusing particularly on analyzing visiting patterns of exhibition visitors using intelligent information technology in consideration of the variations in effects of watching exhibitions according to the exhibitory environment or technique, thereby understanding visitors and, furthermore, drawing the correlations between exhibiting businesses and improving exhibition performance. However, previous studies related to booth recommendation systems only discussed the accuracy of recommendation in the aspect of a system rather than determining changes in visitors' behavior or perception by recommendation. A booth recommendation system enables visitors to visit unplanned exhibition booths by recommending visitors suitable ones based on information about visitors' visits. Meanwhile, some visitors may be satisfied with their unplanned visits, while others may consider the recommending process to be cumbersome or obstructive to their free observation. In the latter case, the exhibition is likely to produce worse results compared to when visitors are allowed to freely observe the exhibition. Thus, in order to apply a booth recommendation system to exhibition halls, the factors affecting the performance of the system should be generally examined, and the effects of the system on visitors' unplanned visiting behavior should be carefully studied. As such, this study aims to determine the factors that affect the performance of a booth recommendation system by reviewing theories and literature and to examine the effects of visitors' perceived performance of the system on their satisfaction of unplanned behavior and intention to reuse the system. Toward this end, the unplanned behavior theory was adopted as the theoretical framework. Unplanned behavior can be defined as "behavior that is done by consumers without any prearranged plan". Thus far, consumers' unplanned behavior has been studied in various fields. The field of marketing, in particular, has focused on unplanned purchasing among various types of unplanned behavior, which has been often confused with impulsive purchasing. Nevertheless, the two are different from each other; while impulsive purchasing means strong, continuous urges to purchase things, unplanned purchasing is behavior with purchasing decisions that are made inside a store, not before going into one. In other words, all impulsive purchases are unplanned, but not all unplanned purchases are impulsive. Then why do consumers engage in unplanned behavior? Regarding this question, many scholars have made many suggestions, but there has been a consensus that it is because consumers have enough flexibility to change their plans in the middle instead of developing plans thoroughly. In other words, if unplanned behavior costs much, it will be difficult for consumers to change their prearranged plans. In the case of the exhibition hall examined in this study, visitors learn the programs of the hall and plan which booth to visit in advance. This is because it is practically impossible for visitors to visit all of the various booths that an exhibition operates due to their limited time. Therefore, if the booth recommendation system proposed in this study recommends visitors booths that they may like, they can change their plans and visit the recommended booths. Such visiting behavior can be regarded similarly to consumers' visit to a store or tourists' unplanned behavior in a tourist spot and can be understand in the same context as the recent increase in tourism consumers' unplanned behavior influenced by information devices. Thus, the following research model was established. This research model uses visitors' perceived performance of a booth recommendation system as the parameter, and the factors affecting the performance include trust in the system, exhibition visitors' knowledge levels, expected personalization of the system, and the system's threat to freedom. In addition, the causal relation between visitors' satisfaction of their perceived performance of the system and unplanned behavior and their intention to reuse the system was determined. While doing so, trust in the booth recommendation system consisted of 2nd order factors such as competence, benevolence, and integrity, while the other factors consisted of 1st order factors. In order to verify this model, a booth recommendation system was developed to be tested in 2011 DMC Culture Open, and 101 visitors were empirically studied and analyzed. The results are as follows. First, visitors' trust was the most important factor in the booth recommendation system, and the visitors who used the system perceived its performance as a success based on their trust. Second, visitors' knowledge levels also had significant effects on the performance of the system, which indicates that the performance of a recommendation system requires an advance understanding. In other words, visitors with higher levels of understanding of the exhibition hall learned better the usefulness of the booth recommendation system. Third, expected personalization did not have significant effects, which is a different result from previous studies' results. This is presumably because the booth recommendation system used in this study did not provide enough personalized services. Fourth, the recommendation information provided by the booth recommendation system was not considered to threaten or restrict one's freedom, which means it is valuable in terms of usefulness. Lastly, high performance of the booth recommendation system led to visitors' high satisfaction levels of unplanned behavior and intention to reuse the system. To sum up, in order to analyze the effects of a booth recommendation system on visitors' unplanned visits to a booth, empirical data were examined based on the unplanned behavior theory and, accordingly, useful suggestions for the establishment and design of future booth recommendation systems were made. In the future, further examination should be conducted through elaborate survey questions and survey objects.

The Effect of Expert Reviews on Consumer Product Evaluations: A Text Mining Approach (전문가 제품 후기가 소비자 제품 평가에 미치는 영향: 텍스트마이닝 분석을 중심으로)

  • Kang, Taeyoung;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.63-82
    • /
    • 2016
  • Individuals gather information online to resolve problems in their daily lives and make various decisions about the purchase of products or services. With the revolutionary development of information technology, Web 2.0 has allowed more people to easily generate and use online reviews such that the volume of information is rapidly increasing, and the usefulness and significance of analyzing the unstructured data have also increased. This paper presents an analysis on the lexical features of expert product reviews to determine their influence on consumers' purchasing decisions. The focus was on how unstructured data can be organized and used in diverse contexts through text mining. In addition, diverse lexical features of expert reviews of contents provided by a third-party review site were extracted and defined. Expert reviews are defined as evaluations by people who have expert knowledge about specific products or services in newspapers or magazines; this type of review is also called a critic review. Consumers who purchased products before the widespread use of the Internet were able to access expert reviews through newspapers or magazines; thus, they were not able to access many of them. Recently, however, major media also now provide online services so that people can more easily and affordably access expert reviews compared to the past. The reason why diverse reviews from experts in several fields are important is that there is an information asymmetry where some information is not shared among consumers and sellers. The information asymmetry can be resolved with information provided by third parties with expertise to consumers. Then, consumers can read expert reviews and make purchasing decisions by considering the abundant information on products or services. Therefore, expert reviews play an important role in consumers' purchasing decisions and the performance of companies across diverse industries. If the influence of qualitative data such as reviews or assessment after the purchase of products can be separately identified from the quantitative data resources, such as the actual quality of products or price, it is possible to identify which aspects of product reviews hamper or promote product sales. Previous studies have focused on the characteristics of the experts themselves, such as the expertise and credibility of sources regarding expert reviews; however, these studies did not suggest the influence of the linguistic features of experts' product reviews on consumers' overall evaluation. However, this study focused on experts' recommendations and evaluations to reveal the lexical features of expert reviews and whether such features influence consumers' overall evaluations and purchasing decisions. Real expert product reviews were analyzed based on the suggested methodology, and five lexical features of expert reviews were ultimately determined. Specifically, the "review depth" (i.e., degree of detail of the expert's product analysis), and "lack of assurance" (i.e., degree of confidence that the expert has in the evaluation) have statistically significant effects on consumers' product evaluations. In contrast, the "positive polarity" (i.e., the degree of positivity of an expert's evaluations) has an insignificant effect, while the "negative polarity" (i.e., the degree of negativity of an expert's evaluations) has a significant negative effect on consumers' product evaluations. Finally, the "social orientation" (i.e., the degree of how many social expressions experts include in their reviews) does not have a significant effect on consumers' product evaluations. In summary, the lexical properties of the product reviews were defined according to each relevant factor. Then, the influence of each linguistic factor of expert reviews on the consumers' final evaluations was tested. In addition, a test was performed on whether each linguistic factor influencing consumers' product evaluations differs depending on the lexical features. The results of these analyses should provide guidelines on how individuals process massive volumes of unstructured data depending on lexical features in various contexts and how companies can use this mechanism from their perspective. This paper provides several theoretical and practical contributions, such as the proposal of a new methodology and its application to real data.