A Study on the Selection Attribute of Screen Golf Using Social Network Big Data Analysis and IPA Analysis

2019 ◽  
Vol 13 (2) ◽  
pp. 131-146
Author(s):  
Seung-Heon Baek ◽  
◽  
Gi-Tak Kim
2017 ◽  
Vol 22 (6) ◽  
pp. 73-89
Author(s):  
Jeoung-Hak Lee ◽  
Jae-Moon Lee ◽  
Yong-Seok Jang

Author(s):  
Yuriy V. Kostyuchenko ◽  
Maxim Yuschenko

Paper aimed to consider of approaches to big data (social network content) utilization for understanding of social behavior in the conflict zones, and analysis of dynamics of illegal armed groups. Analysis directed to identify of underage militants. The probabilistic and stochastic methods of analysis and classification of number, composition and dynamics of illegal armed groups in active conflict areas are proposed. Data of armed conflict – antiterrorist operation in Donbas (Eastern Ukraine in the period 2014-2015) is used for analysis. The numerical distribution of age, gender composition, origin, social status and nationality of child militants among illegal armed groups has been calculated. Conclusions on the applicability of described method in criminological practice, as well as about the possibilities of interpretation of obtaining results in the context of study of terrorism are proposed.


2020 ◽  
Vol 4 (1) ◽  
pp. 73-86 ◽  
Author(s):  
Jinghuan Zhang ◽  
Wenfeng Zheng ◽  
Shan Wang

Purpose The purpose of this paper is to explain the difference and connection between the network big data analysis technology and the psychological empirical research method. Design/methodology/approach This study analyzed the data from laboratory setting first, then the online sales data from Taobao.com to explore how the influential factors, such as online reviews (positive vs negative mainly), risk perception (higher vs lower) and product types (experiencing vs searching), interacted on the online purchase intention or online purchase behavior. Findings Compared with traditional research methods, such as questionnaire and behavioral experiment, network big data analysis has significant advantages in terms of sample size, data objectivity, timeliness and ecological validity. Originality/value Future study may consider the strategy of using complementary methods and combining both data-driven and theory-driven approaches in research design to provide suggestions for the development of e-commence in the era of big data.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Dongning Jia ◽  
Bo Yin ◽  
Xianqing Huang

Compared with the conventional network data analysis, the data analysis based on social network has a very clear object of analysis, various forms of analysis, and more methods and contents of analysis. If the conventional analysis methods are applied to social network data analysis, we will find that the analysis results do not reach our expected results. The results of the above studies are usually based on statistical methods and machine learning methods, but some systems use other methods, such as self-organizing self-learning mechanisms and concept retrieval. With regard to the current data analysis methods, data models, and social network data, this paper conducts a series of researches from data acquisition, data cleaning and processing, data model application and optimization of the model in the process of application, and how the formed data analysis results can be used for managers to make decisions. In this paper, the number of customer evaluations, the time of evaluation, the frequency of evaluation, and the score of evaluation are clustered and analyzed, and finally, the results obtained by the two clustering methods applied in the analysis process are compared to build a customer grading system. The analysis results can be used to maintain the current Amazon purchase customers in a hierarchical manner, and the most valuable customers need to be given key attention, combining social network big data with micro marketing to improve Amazon’s sales performance and influence, developing from the original single shopping mall model to a comprehensive e-commerce platform, and cultivating their own customer base.


2019 ◽  
pp. 525-537
Author(s):  
Yuriy V. Kostyuchenko ◽  
Maxim Yuschenko

Paper aimed to consider of approaches to big data (social network content) utilization for understanding of social behavior in the conflict zones, and analysis of dynamics of illegal armed groups. Analysis directed to identify of underage militants. The probabilistic and stochastic methods of analysis and classification of number, composition and dynamics of illegal armed groups in active conflict areas are proposed. Data of armed conflict – antiterrorist operation in Donbas (Eastern Ukraine in the period 2014-2015) is used for analysis. The numerical distribution of age, gender composition, origin, social status and nationality of child militants among illegal armed groups has been calculated. Conclusions on the applicability of described method in criminological practice, as well as about the possibilities of interpretation of obtaining results in the context of study of terrorism are proposed.


Author(s):  
Yuriy V. Kostyuchenko ◽  
Victor Pushkar ◽  
Olga Malysheva ◽  
Maxim Yuschenko

This chapter aimed to consider of approaches to big data (social network content) utilization for understanding social behavior in the conflict zones, and analysis of dynamics of illegal armed groups. The analysis directed to identify of structure of illegal armed groups, and detection of underage militants. The probabilistic and stochastic methods of analysis and classification of number, composition, and dynamics of illegal armed groups in active conflict areas are proposed. Data of armed conflict in Donbas (Eastern Ukraine) in the period 2014-2015 is used for analysis. The numerical distribution of age, gender composition, origin, social status, and nationality of militants among illegal armed groups has been calculated. Conclusions on the applicability of described method in criminological practice, as well as about the possibilities of interpretation of obtaining results in the context of study of terrorism are proposed.


Sign in / Sign up

Export Citation Format

Share Document