• Title/Summary/Keyword: networking services

Search Result 680, Processing Time 0.032 seconds

The Study of Factors to Affect on Users' Self-disclosure in Social Networking Services (SNS에서 사용자의 정보공개에 영향을 미치는 요인에 대한 연구)

  • Bang, Jounghae;Kang, Sora;Kim, Min Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.69-76
    • /
    • 2016
  • As the number of SNS users increases, so does their self-disclosure. This study examined the factors affecting self-disclosure based on Social Capital Theory and Regulatory Focus Theory. The (extent of self-disclosure by users/number of users disclosing themselves) in SNSs is expected to differ depending on their social capital (bonding capital vs. bridging capital) and regulatory focus (promotional vs. defensive). As a result of this study, it is found that bridging capital is positively related to self-disclosure in profile and in conversation, while bonding capital is positively related to self-disclosure only in conversation. With regard to regulatory focus, promotional orientation has a significant effect on self-disclosure in profile and in conversation, while defensive orientation is negatively related to self-disclosure in profile, but not related to self-disclosure in conversation. Promotional orientation is found to moderate the effect of bridging capital on self-disclosure.

A Scalable Resource-Lookup Protocol for Internet File System Considering the Computing Power of a Peer (피어의 컴퓨팅 능력을 고려한 인터넷 파일 시스템을 위한 확장성 있는 자원 탐색 프로토콜 설계)

  • Jung Il-dong;You Young-ho;Lee Jong-hwan;Kim Kyongsok
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.89-99
    • /
    • 2005
  • Advances of Internet and rC accelerate distribution and sharing of information, which make P2P(Peer-to-Peer) computing paradigm appear P2P computing Paradigm is the computing paradigm that shares computing resources and services between users directly. A fundamental problem that confronts Peer-to-Peer applications is the efficient location of the node that stoles a desired item. P2P systems treat the majority of their components as equivalent. This purist philosophy is useful from an academic standpoint, since it simplifies algorithmic analysis. In reality, however, some peers are more equal than others. We propose the P2P protocol considering differences of capabilities of computers, which is ignored in previous researches. And we examine the possibility and applications of the protocol. Simulating the Magic Square, we estimate the performances of the protocol with the number of hop and network round time. Finally, we analyze the performance of the protocol with the numerical formula. We call our p2p protocol the Magic Square. Although the numbers that magic square contains have no meaning, the sum of the numbers in magic square is same in each row, column, and main diagonal. The design goals of our p2p protocol are similar query response time and query path length between request peer and response peer, although the network information stored in each peer is not important.

Design and Analysis of Ubiquitous Social Network Management Service Model: u-Recruiting Service Model (유비쿼터스 사회연결망관리 서비스 모델 설계 및 분석: u-구인 구직 서비스 모델을 중심으로)

  • Oh, Jae-Suhp;Lee, Kyoung-Jun;Kim, Jae-Kyeong
    • Information Systems Review
    • /
    • v.13 no.1
    • /
    • pp.33-59
    • /
    • 2011
  • Although online social network services widely used in human networking and recruiting industries, it is showing off its limitations in followings-it's hard to reach the status of seamless connection between offline and online; the incompletion and low credibility of the information came from non-face-to-face profile exchange; and the restraint of user autonomy due to centralized control. This paper defines the ubiquitous social network management which enables the seamless real-time face-to-face social interactions of the users based on WPAN (Wireless Personal Area Network) who share the same interest in real word and deduces a ubiquitous social network management framework based on it. As an instance of ubiquitous social network management, u-Recruiting service model will be designed and analyzed. The Analysis using the business model will be followed by the possible scenario of service model. The role, value proposition and potential benefits of the each participants in this service model and will be given as well. In order to evaluate relative advantages of the model suggested by this study, 6 cases will be compared.

Effect of Emotional Elements in Personal Relationships on Multiple Personas from the Perspective of Teenage SNS Users (SNS 상의 대인관계에서 나타나는 감정적 요소와 청소년의 온라인 다중정체성 간의 영향관계)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.199-223
    • /
    • 2016
  • As social networking services (SNS) become widely used tools for maintaining social relationships, people use SNS to express themselves online. Users are free to form multiple characters in SNS because of online anonymity. This phenomenon causes SNS users to easily demonstrate multiple personas that are different from their identities in the real world. Therefore, this study focuses on online multi-personas that establish multiple fake identities in the SNS environment. The main objective of this study is to investigate factors that affect online multi-personas. Fake online identities can have various negative consequences such as cyber bullying, cyber vandalism, or antisocial behavior. Since the boundary between the online and offline worlds is fading fast, these negative aspects of online behavior may influence offline behaviors as well. This study focuses on teenagers who often create multi-personas online. According to previous studies, personal identities are usually established during a person's youth. Based on data on 664 teenage users, this study identifies four emotional factors, namely, closeness with others, relative deprivation, peer pressure and social norms. According to data analysis results, three factors (except closeness with others) have positive correlations with users' multi-personas. This study contributes to the literature by identifying the factors that cause young people to form online multi-personas, an issue that has not been fully discussed in previous studies. From a practical perspective, this study provides a basis for a safe online environment by explaining the reasons for creating fake SNS identities.

The Past, Present and Future Strategies of Korean Social Work in Hospice and Palliative Care (한국 호스피스.완화의료 사회복지의 과거, 현재 그리고 미래 전략)

  • Lee, Young Sook
    • Journal of Hospice and Palliative Care
    • /
    • v.16 no.2
    • /
    • pp.65-73
    • /
    • 2013
  • The objective of this paper is to suggest future goals and strategies for social work in hospice and palliative care in Korea by understanding its historical background. Both literature review and participant observation were performed to examine historical data relating to social work in hospice and palliative care in Korea. Also reviewed were the current trends with a focus on the roles of social workers in the said arena, qualifications, education, research and medical insurance policy. First of all, the roles of social workers do not appear to be clearly defined in the field of hospice and palliative care, which seems to lead to the lack of recognition as professional workers. The qualification standard for social workers in hospice and palliative care remains inadequate. Second, there seems to be insufficient professional social worker training resources, in terms of both the number of educators and training programs. Third, social workers in Korea produce significantly less publications than those in other professions. There is also a dearth of qualified evidence-based research that is needed to prove benefits of intervention and ultimately for policy implications. Last, the current medical insurance policy needs to be revised to secure fees for social work services and dedicated full-time social workers in hospice and palliative care. Korea needs to approach social work in hospice and palliative care with specific goals to develop future strategies. Related infrastructure and an executive structure should be established via networking and partnership with academic societies, associations and schools.

A Study on the Introduction of GPS Virtual Reference System in South Korea (GPS 가상기준점 도입에 관한 연구)

  • 최윤수;이용창;권재현;이재원
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.22 no.2
    • /
    • pp.105-116
    • /
    • 2004
  • According to the developing advanced techniques and removal of Selective Availability, much research has been conducted to improve the accuracy of GPS positioning in absolute and relative mode by estimating the nuisance parameters such as atmospheric effect, clock errors and multipath. Especially, the continuous effort of establishing the CORS in many countries and the effort of ICS making effective global networking make more application areas and the necessity of more precise location is being increased. Some of the countries like German, Japan and Swiss already utilized the Virtual Reference System for better location accuracy and services. In this study, the VRS system is investigated in terms of system principle, required H/W and S/W, management and operation, revision of related law, expected application and market etc. and find optimal solution in each aspect for economic and fast set up of the system in this country. The analysis of Korean CORS, communication infra and market estimation is performed for the efficient system establishment. Also. the suggestion on the advertisement and education of the system is also included. It is expected that this study contributes for the establishment of effective and precise nationwide location service so that many SOC areas including navigation, GIS, Telematics, LBS can provides better service for the users.

Implementation and Performance Analysis of the Group Communication Using CORBA-ORB, JAVA-RMI and Socket (CORBA-ORB, JAVA-RMI, 소켓을 이용한 그룹 통신의 구현 및 성능 분석)

  • 한윤기;구용완
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.81-90
    • /
    • 2002
  • Large-scale distributed applications based on Internet and client/server applications have to deal with series of problems. Load balancing, unpredictable communication delays, and networking failures can be the example of the series of problems. Therefore. sophisticated applications such as teleconferencing, video-on-demand, and concurrent software engineering require an abstracted group communication, CORBA does not address these paradigms adequately. It mainly deals with point-to-point communication and does not support the development of reliable applications that include predictable behavior in distributed systems. In this paper, we present our design, implementation and performance analysis of the group communication using the CORBA-ORB. JAVA-RML and Socket based on distributed computing Performance analysis will be estimated latency-lime according to object increment, in case of group communication using ORB of CORBA the average is 14.5172msec, in case of group communication using RMI of Java the average is 21.4085msec, in case of group communication using socket the average is becoming 18.0714msec. Each group communication using multicast and UDP can be estimated 0.2735msec and 0.2157msec. The performance of the CORBA-ORB group communication is increased because of the increased object by the result of this research. This study can be applied to the fault-tolerant client/server system, group-ware. text retrieval system, and financial information systems.

  • PDF

Effects of SNS user's Personality on Usage patterns and SNS commitment: A case study of Facebook (SNS 이용자의 성격이 SNS 이용유형과 SNS 몰입에 미치는 영향에 관한 연구: 페이스북을 중심으로)

  • Choi, Yena;Hwang, HaSung
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.95-106
    • /
    • 2016
  • The purpose of this study was to examine how college students use Facebook and the ways in which they feel of commitment while using Facebook. The Big Five Personality Model has been considerably used in the psychology fields, and the researchers have started to explore the role of characteristic factors in influencing an individual's use of social media, such as Facebook which has become one of the most popular social networking site in the world. Therefore, the current study aims to specify the links between The Big Five Personality Model and usage patterns as well as commitment of Facebook. Two hundreds thirty five college students participated in a survey and the results are as follows: First, participants who were high in extraversion and agreeableness were more likely to do information sharing activities such as sharing posts to their friends, writing comments on the other's posts. In addition, participants who were high in openness to experience, conscientiousness, and neuroticism were more likely to do information producing activities including offering events, group, or public pages to meet people both on and offline. Second, in terms of the relationship between personality traits and commitment to the Facebook, the study found that extraversion and neuroticism were related to users' commitment to Facebook. These findings are consistent with the existing literature regarding extraversion and neuroticism were representative personality factors when it comes to commitment of media. Specifically, the study found that those who were high in neuroticism were more likely to produce information such as posting photos repeatedly or tagging their friends on posts, and also more likely to feel commitment on Facebook. These findings confirm that personality is a highly relevant factor in determining individual's behavior and the degree of commitment on Facebook. Based on these findings implications and limitations of the study are discussed.

A Combined Call Control Algorithm based on Moving Speed and Bandwidth in Hierarchical Cellular Systems (계층셀 구조에서 이동 속도와 대역폭을 고려한 복합 호 처리 알고리즘)

  • Park, Jeong-Eun;Chae, Ki-Joon
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.299-313
    • /
    • 2002
  • Recently, the demand for mobile communications and multimedia services has rapidly increased so that conventional cellular system cannot fulfill the requirement of users (capacity and QoS) any more. Therefore, the hierarchical cellular system has been suggested in order to guarantee the QoS and to admit large population of users. IMT-2000 adopts the hierarchical cellular structure, which requires a call control algorithm capable of manipulating and utilizing the complicated structure of hierarchical cellular structure with handiness and efficiency. In this thesis, as an improvement of conventional combined algorithm, a new call control algorithm considering the moving speed of terminal and bandwidth is suggested. This algorithm employs buffers and guard channels to reduce the failure rate. Also, this algorithm considers the moving speed of terminal and bandwidth to elevate the efficiency. Furthermore, calls are handled separately according to the moving speeds of terminal and bandwidths to improve the QoS and reduce the handover rate. As an evaluation of the suggested algorithm, a model hierarchical cellular system is constructed and simulations are conducted with various types of traffic. As the result of the simulations, such indices as block rate, drop rate, channel utilization, and the number of inter layer handovers are examined to demonstrate the excellency fo the suggested algorithm.

Self-disclosure and Privacy in the Age of Web 2.0 A Case Study (웹 2.0 시대의 프라이버시 청년 UCC 이용자들의 인식과 실천을 중심으로)

  • Lee, Dong-Hoo
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.556-589
    • /
    • 2009
  • With the advent of the so-called Web 2.0 age, the interconnections of various contents on the web, as well as the user-participatory services from blogs, web-based communities, picture sharing sites, and social networking sites, to the sites for collective knowledge productions, have been further vitalized. As the User Generated Contents(UGCs) are flourishing on the web, they have channeled users' desires for self-expression and social acknowledgement, and yet have created the new kinds of invasion of privacy. This study attempts to look at how the networked individuals' everyday perceptions of privacy have been reconstructed in the age of Web 2.0. By investigating how users have used the UGCs for their sociality on the web and how they have set the boundaries of the private and the public in these public or semi-public disclosures of self-expressions, it has traced the changing perceptions of privacy in everyday communication practices. For this study, it has interviewed Korean youngsters in their 10s and 20s who have grown up with the Internet and have received self-expressions and social communication on the web as everyday activities. Based on their interviews, it inquires into the concurrent notion of privacy and discuss its cultural implications.

  • PDF