• Title/Summary/Keyword: networking services

Search Result 685, Processing Time 0.024 seconds

A Study on Business Strategies and Success Factors of Social Network Service and Enterprises: Focusing on Representative SNS of Korea, China, and USA (소셜 네트워크 서비스 기업의 비즈니스 전략과 성공요인 분석에 관한 연구 : 한국, 중국, 미국의 대표적인 SNS을 중심으로)

  • Lee, Cheol-Min;Kim, Chang-Su;Park, Kyung-Won;Ahn, Hyun-Sook
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.177-187
    • /
    • 2014
  • In this paper, representative social network services(SNS) of Korea, China, and America such as Cyworld, Renren and Facebook were analyzed in regards to their business strategies and successful factors. From the analysis results, it was found that their common business strategies are strengthening a sense of belonging by providing differentiated customer services and by increasing customer satisfaction and this kind of strategies were naturally connected to the corporate marketing. So, Maintaining their own differentiated services, SNS companies should make a constant efforts to meet customers' needs on the base of success factors. Companies which will carry out marketing with SNS should also improve their images through communication with customers, utilizing services provided by SNS companies which match well with companies using SNS as a means of marketing. As various extensive researches are being conducted on SNS which enabled online networking, such findings will be usefully referred for similar researches and will provide theoretical basis and practical guidelines for future researches.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Characteristics of Foreign Firms업 Corporote Networks in Korea: The Case Study of Business Services (외국인직접투자기업의 기업네트워크 특성 한국 내 사업서비스업체 사례분석을 중심으로)

  • 이병민
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.3 no.2
    • /
    • pp.43-61
    • /
    • 2000
  • This study investigate the spatial characteristics and corporate networks of foreign business service firms in Korea. Specifically intrafirm and extrafirm organization of foreign firms are addressed utilizing the corporate network perspective. For this purpose, this study conducted questionnaire and interview surveys for the foreign firms. Parent-subsidiary relationships are focused on the mechanisms by which Transnational Corporations (TNCs) headquarters control and coordinate their foreign affiliates and subsidiaries in order to achieve investment purpose in Korea (overseas market expansion). But extrafirm networks of foreign business services firms in Korea do not appear to play an important role in regional development to date. A low proportion of foreign firms is engaged in academics-industry linkages, and a low number o( foreign firms is formally linked with government organizations, research institutes, and trade associations. To conclude, Foreign direct investment firms in business services in Korea are characteristics by globalized intrafirm networks and localized interfirm and extrafirm networks. It is understood that regional development can be vitalized when Korean local firms have close relationships with technologically advanced foreign firms in tacit knowledge capacity. Foreign firms are able to play an important role in the development of business services in Korea. This study suggests that regional foreign direct investment policy should be targeted towards the corporate networking with foreign firms and domestic firms and incrementation of the potential of foreign firms as a knowledge-intensive industry.

  • PDF

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

A User Profile-based Filtering Method for Information Search in Smart TV Environment (스마트 TV 환경에서 정보 검색을 위한 사용자 프로파일 기반 필터링 방법)

  • Sean, Visal;Oh, Kyeong-Jin;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.3
    • /
    • pp.97-117
    • /
    • 2012
  • Nowadays, Internet users tend to do a variety of actions at the same time such as web browsing, social networking and multimedia consumption. While watching a video, once a user is interested in any product, the user has to do information searches to get to know more about the product. With a conventional approach, user has to search it separately with search engines like Bing or Google, which might be inconvenient and time-consuming. For this reason, a video annotation platform has been developed in order to provide users more convenient and more interactive ways with video content. In the future of smart TV environment, users can follow annotated information, for example, a link to a vendor to buy the product of interest. It is even better to enable users to search for information by directly discussing with friends. Users can effectively get useful and relevant information about the product from friends who share common interests or might have experienced it before, which is more reliable than the results from search engines. Social networking services provide an appropriate environment for people to share products so that they can show new things to their friends and to share their personal experiences on any specific product. Meanwhile, they can also absorb the most relevant information about the product that they are interested in by either comments or discussion amongst friends. However, within a very huge graph of friends, determining the most appropriate persons to ask for information about a specific product has still a limitation within the existing conventional approach. Once users want to share or discuss a product, they simply share it to all friends as new feeds. This means a newly posted article is blindly spread to all friends without considering their background interests or knowledge. In this way, the number of responses back will be huge. Users cannot easily absorb the relevant and useful responses from friends, since they are from various fields of interest and knowledge. In order to overcome this limitation, we propose a method to filter a user's friends for information search, which leverages semantic video annotation and social networking services. Our method filters and brings out who can give user useful information about a specific product. By examining the existing Facebook information regarding users and their social graph, we construct a user profile of product interest. With user's permission and authentication, user's particular activities are enriched with the domain-specific ontology such as GoodRelations and BestBuy Data sources. Besides, we assume that the object in the video is already annotated using Linked Data. Thus, the detail information of the product that user would like to ask for more information is retrieved via product URI. Our system calculates the similarities among them in order to identify the most suitable friends for seeking information about the mentioned product. The system filters a user's friends according to their score which tells the order of whom can highly likely give the user useful information about a specific product of interest. We have conducted an experiment with a group of respondents in order to verify and evaluate our system. First, the user profile accuracy evaluation is conducted to demonstrate how much our system constructed user profile of product interest represents user's interest correctly. Then, the evaluation on filtering method is made by inspecting the ranked results with human judgment. The results show that our method works effectively and efficiently in filtering. Our system fulfills user needs by supporting user to select appropriate friends for seeking useful information about a specific product that user is curious about. As a result, it helps to influence and convince user in purchase decisions.

Building a Korean Sentiment Lexicon Using Collective Intelligence (집단지성을 이용한 한글 감성어 사전 구축)

  • An, Jungkook;Kim, Hee-Woong
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.49-67
    • /
    • 2015
  • Recently, emerging the notion of big data and social media has led us to enter data's big bang. Social networking services are widely used by people around the world, and they have become a part of major communication tools for all ages. Over the last decade, as online social networking sites become increasingly popular, companies tend to focus on advanced social media analysis for their marketing strategies. In addition to social media analysis, companies are mainly concerned about propagating of negative opinions on social networking sites such as Facebook and Twitter, as well as e-commerce sites. The effect of online word of mouth (WOM) such as product rating, product review, and product recommendations is very influential, and negative opinions have significant impact on product sales. This trend has increased researchers' attention to a natural language processing, such as a sentiment analysis. A sentiment analysis, also refers to as an opinion mining, is a process of identifying the polarity of subjective information and has been applied to various research and practical fields. However, there are obstacles lies when Korean language (Hangul) is used in a natural language processing because it is an agglutinative language with rich morphology pose problems. Therefore, there is a lack of Korean natural language processing resources such as a sentiment lexicon, and this has resulted in significant limitations for researchers and practitioners who are considering sentiment analysis. Our study builds a Korean sentiment lexicon with collective intelligence, and provides API (Application Programming Interface) service to open and share a sentiment lexicon data with the public (www.openhangul.com). For the pre-processing, we have created a Korean lexicon database with over 517,178 words and classified them into sentiment and non-sentiment words. In order to classify them, we first identified stop words which often quite likely to play a negative role in sentiment analysis and excluded them from our sentiment scoring. In general, sentiment words are nouns, adjectives, verbs, adverbs as they have sentimental expressions such as positive, neutral, and negative. On the other hands, non-sentiment words are interjection, determiner, numeral, postposition, etc. as they generally have no sentimental expressions. To build a reliable sentiment lexicon, we have adopted a concept of collective intelligence as a model for crowdsourcing. In addition, a concept of folksonomy has been implemented in the process of taxonomy to help collective intelligence. In order to make up for an inherent weakness of folksonomy, we have adopted a majority rule by building a voting system. Participants, as voters were offered three voting options to choose from positivity, negativity, and neutrality, and the voting have been conducted on one of the largest social networking sites for college students in Korea. More than 35,000 votes have been made by college students in Korea, and we keep this voting system open by maintaining the project as a perpetual study. Besides, any change in the sentiment score of words can be an important observation because it enables us to keep track of temporal changes in Korean language as a natural language. Lastly, our study offers a RESTful, JSON based API service through a web platform to make easier support for users such as researchers, companies, and developers. Finally, our study makes important contributions to both research and practice. In terms of research, our Korean sentiment lexicon plays an important role as a resource for Korean natural language processing. In terms of practice, practitioners such as managers and marketers can implement sentiment analysis effectively by using Korean sentiment lexicon we built. Moreover, our study sheds new light on the value of folksonomy by combining collective intelligence, and we also expect to give a new direction and a new start to the development of Korean natural language processing.

A Study of the Problem Analysis and Solution about the Car Sharing Service (카쉐어링 서비스의 문제점 분석 및 해결 방안 연구)

  • Lee, Young-Gyo;Ahn, Jeong-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.643-656
    • /
    • 2019
  • The development of hot social networking services, including the Internet, has transformed rental car services into IT-based car-sharing services. The car-sharing service is a service that allows people to rent cars online without having to face-to-face. It has become the preffered service among young people who are accustomed to drinking and eating alone. Users can use their smartphones to book their types of cars and hours of rent, and then go to a nearby designated parking lot to use their reserved cars. You can open a designated car door with a smart phone and drive. It is a very convenient service to pay for the distance you drive. However, the car-sharing service already in use in business has the following problems: underage who do not have a driver's license may drive a car borrowed by an acquaintance, the status of a license registered at the time of join membership with a car-sharing company may change to a suspension or cancellation of a license while renting and driving, or even a drunk person may rent a car and drive. In this paper, the method to solve these problems has been studied and proposed. The proposed method is to reduce the cost of investment by a car-sharing service provider and to minimize user inconvenience. And, it was compared and analyzed with the existing method. For the method to be used efficiently, the active operation of the car-sharing company and the government's policies will have to be supported.

Hybrid Multicast/Broadcast Algorithm for Highly-Demanded Video Services with Low Complexity (Highly-Demanded 비디오 서비스를 위한 낮은 복잡도의 혼합 멀티캐스트/브로드캐스트 알고리즘)

  • Li, Can;Bahk, Sae-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.101-110
    • /
    • 2011
  • With the deployment of broadband networking technology, many clients are enabled to receive various Video on Demand (VoD) services. To support many clients, the network should be designed by considering the following factors: viewer's waiting time, buffer requirement at each client, number of channel required for video delivery, and video segmentation complexity. Among the currently available VoD service approaches, the Polyharmonic and Staircase broadcasting approaches show best performance with respect to each viewer's waiting time and buffer requirement, respectively. However, these approaches have the problem of dividing a video into too many segments, which causes very many channels to be managed and used at a time. To overcome this problem, we propose Polyharmonic-Staircase-Staggered (PSS) broadcasting approach that uses the Polyharmonic and Staircase approaches for the head part transmission and the Staggered approach for the tail part transmission. It is simple and bandwidth efficient. The numerical results demonstrate that our approach shows viewer's waiting time is comparable to that in the Harmonic approach with a slight increase in the bandwidth requirement, and saves the buffer requirement by about 60\% compared to the Harmonic broadcasting approach by simply adjusting the video partitioning coefficient factor. More importantly, our approach shows the best performance in terms of the number of segments and the number of channels managed and used simultaneously, which is a critical factor in real operation of VoD services. Lastly, we present how to configure the system adaptively according to the video partitioning coefficient.

Performance Analysis of Mobility Support Protocols for IPv6 over Wireless LAN (IEEE 802.11 무선랜 환경에서의 이동성 지원 IPv6프로토콜의 성능분석)

  • Hwang Seung-Hee;Han Youn-Hee;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.391-403
    • /
    • 2005
  • Several nv6 mobility support protocols for mobile Internet services are proposed in IETP : Mobile Ipv6, Hierarchical Mobile Ipv6, and Fast Handovers over Mobile Ipv6. Recently, IEEE 802.11 network has also been widely deployed in public areas for mobile Internet services. In the near future, IPv6 mobility support over IEEE 802.11 network is expected to be a key function to actualize the All If-based mobile various services. For appropriate application of these protocols, the IPv6 mobility support protocols should be analyzed according to their characteristics in terms of signaling, handover latency, lost packets, and required buffer sire as well as the impact of lower layer such as IEEE 802.11 network. In this paper, we analyze the performance of the protocols over IEEE 802.11 network. We define a packet-level traffic model, a network system model, and a mobility model. From these models, we construct a framework for the performance analysis. We also make cost functions to formalize each protocol's performance. Lastly, we analyze the effect of varying parameters used to show diverse numerical results, and compare with each other. From the analysis results, it is concluded that each Protocol has contrary or contrastive advantages with other Protocols, so there is no protocol that holds a dominant position.

A Review of Research on Social Network Services Using the New Media Evolutionary Model (뉴미디어 발전단계모델을 적용한 소셜네트워크 서비스 분야의 연구동향분석)

  • Kwak, Hyun;Lee, Ho Geun
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.3-24
    • /
    • 2011
  • The purpose of this paper is to indicate possible future research directions for social network services(SNS) by reviewing past and recent trends in SNS studies. The framework used for the analysis is the New Media Evolutionary Model(NMEM) proposed by Wimmer and Dominick, a four-phase system for research on new media development. Although early forms of SNS emerged in the late 1990s, most research in this field has been published in the past five years. We searched for SNS-related articles published from 2006 to August 2011 from academic journal archives in information systems, communication, marketing, and other fields, and classified them according to the NMEM to analyze the current state of SNS research. Researchers in this field have so far focused on the first two phases of the model(the media itself and use of the media), but little research has been conducted on the third(effects of the media) and fourth phases(improvements in the media). Although SNS research is still in its early stages, we suggest the need for more studies on the effects of SNS and how it can be improved. Very few studies test existing theories or build new theories related to SNS. Thus, a more rigorous approach towards SNS research is warranted, and future research should focus on theory building and testing.

  • PDF