scispace - formally typeset
Search or ask a question

Showing papers in "The e-Business Studies in 2014"



Journal ArticleDOI
TL;DR: 클라우드 스토리지 서비스와 관련된 핵심적인 투자를 하고 있으며, 가능성이 높다
Abstract: Cloud storage service has the potential to be a core infrastructure for the future mobile and Internet service; thus related service providers have been investing in it and trying to attract as many users as possible. In addition, those need to find out what motivates the users to keep using their service not only to attract new customers but also to secure their subscribers. Therefore, this study will examine its relationship with userʼs motivation based on the extended TAM model with external variables for objective research about continuous use of cloud storage service. As a result, it was found that personal innovativeness, self efficacy, functional attributes, and psychological switching cost influence the continuous use of cloud storage service. Also, it is expected they can guide service providers to the right track when setting up their business strategy in the future.

14 citations


Journal ArticleDOI
TL;DR: The IMDB, the Internet Movie Database, is a database of movie trailers, reviews and trailers for films and television shows dating back to 2002.
Abstract: 인터넷에서 매 순간 발생하는 데이터의 홍수는 사용자가 필요로 하는 유용한 정보를 검색하는데 어려움을 초래한다. 그래서 많은 사용자들이 자신이 원하는 정보를 쉽게 찾기 위한 기법을 고안하고 이를 지원하는 도구를 개발하게 되었다. 이런 유용한 도구 중 하나인 추천시스템은 기존의 사용자 정보를 분석하여 사용자가 원하는 제품이나 정보를 추천하는 것이다. 본 논문에서는 추천시스템을 활용하여 원하는 정보를 제안하는데 인구통계학적인 기법을 사용한다. 인구통계학 기반 추천시스템은 나이, 성별과 같은 인구통계학적인 특성을 사용하여 유용한 정보를 추출한다. 본 연구는 영화 선택 시 중요한 요소인 사용자 평점을 분석하고 이를 활용할 수 있는 방법을 제시하였다. 이를 위해 Internet Movie Database(IMDB) 웹 사이트에 있는 영화의 사용자 평점을 인구통계학적 요인으로 분석하였다. 본 논문에서는 인구통계학적 분석을 위해 사용자를 성별과 연령대로 분류하였고, 각 영화를 22개 장르로 나눈 IMDB 기준에 따라 사용자 평점을 분석하였다. 각 장르별 영화에 대해 사용자 그룹의 평균 평점을 F-테스트와 T-테스트를 수행하여 그 장르 영화 평점과 동일한 결과를 나타내는 대표 그룹을 찾아내었다. 인구통계학적 분석 결과인 대표 그룹은 새로운 영화가 개봉될 때 대표 그룹에 대한 프로모션과 추천을 통해 영화 홍보를 할 수 있는 대상을 찾아내는데 유용하다.

12 citations



Journal ArticleDOI
TL;DR: The relationship among the worker’s job satisfaction, smart work continued usage, and the results of this study are expected to help companies to establish strategies connected with ‘Smart Work.’
Abstract: Development of smart devices and the network of the company change the way of working. ‘Smart work’ is a type of work method expected to handle business regardless of the time and space. Therefore, ‘Smart Work’ is being introduced and gradually expanded in variety of companies. However, despite this popularity its effect is under question. This article reports on the effect of ‘Smart Work’ through literature review and analyzed the relationship among the worker’s job satisfaction, smart work continued usage. The results of this study are expected to help companies to establish strategies connected with ‘Smart Work.’

10 citations


Journal ArticleDOI
TL;DR: In this paper, the authors studied the relationship between entrepreneurship and dynamic capabilities and found that entrepreneurship will have a significant impact on dynamic capability and that dynamic capabilities will have an impact on organizational effectiveness.
Abstract: A purpose of this study is to learn about the impact on organizational effectiveness by analyzing the relationship between entrepreneurship and dynamic capabilities. Investigation was based on the theory of dynamic capabilities of Teece (2002), and established a research model to study the details accordingly. The research hypothesis is as follows. First, entrepreneurship will have a significant impact on dynamic capability. Second, dynamic capabilities will have a significant impact on organizational effectiveness. Survey was conducted for employees in IT ventures, which was used to analyze 412 additional. The results are as follows. Has had a significant impact on organizational effectiveness is the relationship between entrepreneurship and dynamic capabilities. In particular, this shows that a high impact on the organizational effectiveness of the organization`s dynamic capabilities are assimilation exploitation capabilities, not the absorptive transformation capability of dynamic capabilities. CEO should actively consider whether the employees of the organization are developing the assimilation exploitation capabilities to make an impact on their organization`s effectiveness.

7 citations






Journal ArticleDOI
TL;DR: In this article, the authors tried to know some factors to influence on the acceptance of customer to receive the referring advertisement continually through the study of "KaKaotalk Plus Friends", a kind of marketing platform of KaKaOTalk, the model killer application of Smart Phone.
Abstract: Advancement of mobile technology opened new business field in existing marketing area and in spirit of depression of advertisement market due to worldwide shrunken business, investment mobile advertisement market only jas a tendency to increase. In this paper I tried to know some factors to influence on the acceptance of customer to receive the referring advertisement continually through the study of ‘KaKaotalk Plus Friends’, a kind of marketing platform of KaKaotalk, the model killer application of Smart Phone. For this purpose I developed the research model based on Customer Value Theory and Social Exchange Theory etc. Futhermore based on these theories I studied the facts to influence on the acceptance of customer using KaKaotalk Plus Friends Service. 키워드:모바일 마케팅, 승낙의도, 카카오톡 플러스 친구, 고객가치이론, 사회교환이론 Mobile Marketing, Intention of permit, KaKaotalk Plus Friends, Customer Value Theory, Social Exchange Theory www.calsec.or.kr http://dx.doi.org/10.7838/jsebs.2014.19.2.001


Journal ArticleDOI
Jinho Yoo1
TL;DR: In this article, the authors analyze how the information security leadership of top management affects the control of information security and find the implications of Internet incidents on information security policies and security awareness and training.
Abstract: This paper is to analyze how the information security leadership of top management affects controls of information security. Controls of information security include the activity related to making information security policy, the activity related to making up information security organizational structure and job responsibilities, the activity related to information security awareness and training, the activity related to technical measures installation and operation, and the activity related to emergency response, monitering and auditing. Additionally we will analyze how Internet incidents affect controls of information security and find implications.

Journal ArticleDOI
TL;DR: In this paper, the authors analyze case studies of unusual financial transactions detection and prevention system that is built and operated in financial companies and current operating status and propose effects of the accident prevention and security measures later.
Abstract: Financial companies are providing electronic financial transactions through a variety of user terminals for non-face-to-face services such as Internet banking, smart phone banking, or etc. However, in these services users’ security awareness and the limitations of technical responses has frequently caused the financial loss so that fundamental protection measures are required from financial authorities. Accordingly, financial industry is planning and establishing systems that block unusual financial transactions by comprehensively analyzing and detecting user’s electronic information, access information, transaction information, and so on in accordance with “Guide for building Unusual financial transactions detection system” to prevent the financial loss that happens in electronic financial transactions. In this paper, we analyze case studies of unusual financial transactions detection and prevention system that is built and operated in financial companies and current operating status and propose effects of the accident prevention and security measures later.

Journal ArticleDOI
TL;DR: In this article, the authors present the following: 1.1.1 히 이루어지고 있다.
Abstract: 초 록빅데이터 내에 존재하는 감정 정보를 추출하여 사용자들이 특정 대상에 대하여 갖고 있는 인식이 어떠한지를 파악하고자 하는 노력이 활발히 이루어지고 있다. 상품, 영화, 그리고 사회적 이슈 등에 대한 문장을 분석하여 사람들이 해당 주제에 어떠한 견해를 가지고 있는지를 분석하고 측정하여 구체적인 선호도를 알아내는 것이다. 문장에서 드러나는 감정 정도를 얻기 위해서는 감정어휘의 목록과 정도값을 제시할 수 있는 감정어휘사전이 필요하므로 본 연구에서는 감정어휘를 발견하는 방법과 이들의 정도값을 결정하는 문제를 다룬다. 기본적인 방법은 기초 감정어휘의 목록 수집과 이들의 정도값은 선행연구 결과와 직접 설문 방식을 이용하고, 확장된 목록의 수집과 정도값은 사전의 표제어 설명부(glosses)를 이용해 추론하는 것이다. 그 결과 발견된 감정어휘는 전형성을 띠고 있는 기본형 감정어휘, 기본형 감정어휘의 gloss에 사용된 확장형 1단계 1층위 감정어휘, 비 감정어휘 중 gloss에 기본형 또는 확장형 감정어휘를 가지고 있는 확장형 2단계 1층위 감정어휘, gloss의 gloss에 기본형 또는 확장형 감정어휘가 사용된 확장형 2단계 2층위 감정어휘의 네 종류로 나뉜다. 그리고 확장형 감정어휘의 정도값은 기본형 감정어휘의 정도값을 기초로 문형의 가중치와 강조승수를 적용하여 얻었다. 실험 결과 AND, OR 문형은 내포된 어휘의 감정 정도값을 평균 내는 가중치를, Multiply 문형은 정도 부사어의 종류에 따라 1.2~1.5의 가중치를 갖는 것으로 파악되었다. 또한 NOT 문형은 사용된 어휘의 감정 정도를 일정 정도로 낮추어 역전시키는 것으로 추정된다. 또한 확장형 어휘에 적용되는 강조승수는 1층위에서 2, 2층위에서 3을 갖는 것으로 예상된다.ABSTRACTEfforts to identify user’s recognition which exists in the big data are being conducted actively. They try to measure scores of people’s view about products, movies and social

Journal ArticleDOI
TL;DR: In this paper, the authors proposed a method to solve the problem of the lack of resources in the South Korean market, which is a problem in many aspects of the world. But, their method is limited to the following:
Abstract: 신뢰는 전자상거래 사이트의 지속적 사용에 있어서 중요한 요소로 인정되어오고 있다. 신뢰란 상호작용적임에도 불구하고 대부분의 연구는 고객의 전자상거래 사이트에 대한 신뢰에만 초점을 두어오고 있었다. 신뢰의 상호작용성 관점에서 볼 때, 고객이 특정 전자상거래 사이트가 자신에 대해 얼마나 신뢰하고 있다고 지각하는지도 지속적 사용에 영향을 줄 것으로 보이나 이를 실증 분석한 연구는 그 중요성에도 불구하고 거의 드물다. 따라서 본 연구는 고객이 사이트에 대해 얼마나 자신을 신뢰하고 있느냐 하는 지각이 그 사이트의 지속적 사용에 영향을 미치는지를 규명하고자 한다. 특히 전자상거래 사이트들이 고객으로부터 신뢰를 얻기 위해 취하는 행동이 신뢰에 어떠한 영향을 주는지에 대해서도 조사하였다. 본 연구는 전자상거래 사이트의 신뢰 구축 행동이 신뢰 및 신뢰를 받고 있다는 자각에 각각 중요한 요인임을 보였다.

Journal ArticleDOI
TL;DR: In this paper, the authors examined the role of emotional intelligence, trust, perceived value and perceived value as significant psychological elements in predicting consumers' decisions to engage in social networking online purchase.
Abstract: The social networking has become a phenomenon not only to the social system, but also to the business activities. Engaging the social network for buying and selling products and services has become common, although these shopping sites are lacking of many trustworthy elements due to their limited virtual characteristics. Thus, it motivates us to examine the role of emotional intelligence, trust and perceived value as significant psychological elements in predicting consumers’ decisions to engage in social networking online purchase. We then proposed a model that links relationships of emotional intelligence, trust, perceived value, purchased intention and confirmation. Using a survey conducted via a cross sectional study, we collected data from 334 respondents who have taken part in social networking online purchase. Based on the regression analyses, the findings reveal that consumers’ decisions are explained by emotional intelligence and trust. Besides, trust plays the role as a predictor for perceived value and purchase intention. In addition, there are also significant relationships between perceived value and purchase intention, and between purchase intention and confirmation. The study contributes to the understanding of emotional intelligence as the basis for online and mobile retailers in taking the appropriate strategies to attract more consumers and generate higher sales. Building on this research and for knowledge enrichment, future study may incorporate social informatics in building social intelligence of the future social business community.


Journal ArticleDOI
TL;DR: In this paper, a conceptual framework of mobile shoppers' perception on the mobile system was developed to investigate the relationship among mobile device factors, consumer's perception on mobile system in internet shopping, and re-purchase intention of the internet shoppers.
Abstract: This study is to contribute to a better understanding of mobile users" perception on the mobile systems by carrying out the survey among consumers on the factors of mobile shopping. Based on the literature study, a conceptual framework of mobile shoppers" perception on the mobile system was developed to investigate the relationship among mobile device factors, consumer’s perception on the mobile system in internet shopping, and re-purchase intention of the internet shoppers.

Journal ArticleDOI
TL;DR: In this paper, the authors investigated the impact of risk invasion on personal risk in financial products and showed that the risk invasion can be used as an incentive to increase the value of financial products.
Abstract: 초 록개인정보는 금융거래의 성립조건이며 금융회사의 핵심자산이다. 그러나 정보사회의 부작용 으로써 나타난 개인정보 침해사고는 중대한 사회적 위험이 되고 있으며, 이러한 위험은 개인과 회사의 실제적 피해로써 현실화되고 있다. 본 연구는 소비자의 손실 측면에서 개인정보 침해 사고로 인해 금융 분야에서 발생한 금전적, 정신적 손해 현황을 분석하고, 이러한 실제 손해를 최소화하기 위한 위험전가의 수단으로써 보험의 유용성을 제시하였다. 그리고 개인 정보 침해 사고 보상보험의 구성요소와 보험료의 산정원리를 검토하고 최종적으로 이러한 보험 제도를 활성화하기 위한 정책을 제안하였다. 위험관리의 한 방법으로써 보험은 소비자 보호와 회사의 재무적 건전성을 동시에 확보할 수 있는 유용한 수단이며, IT 리스크의 계량적 측정을 위한 기반을 제공할 수 있다.ABSTRACTPersonal information is a requisite for financial transactions as well as a core asset of financial companies. However, as a side effect of the information society, personal infor-mation infringements have emerged as significant social risks, causing realized loss to individuals and companies. This study analyzes results of financial and emotional loss in terms of consumer loss and also presents usefulness of insurance in order to minimize such actual damages as a means of risk transfer. In addition, this study investigates components and premium calculation principles of compensation insurance against personal information invasion and finally presents policies to activate these insurance product. As a method of risk management, insurance not only is a useful tool to guarantee consumer protection and companies’ financial soundness simultaneously but also provides a basis of quantitative measurement of IT risks.


Journal ArticleDOI
TL;DR: The future of U-City is in the hands of the people, not the company or the authorities.
Abstract: Ubiquitous City(U-City) is spotlighted for the new paradigm to solve the problem of urbanization using ICT technology. However, due to the lower profit and the insufficient of citizen-experience service, ubiquitous service(U-Service) is perceived negatively. In this sense, a study for user-centric profitable service development is needed. This study, as a basic research for the development of U-service, is conducted to identify the factors which are affected to acceptance of th e U-Service. Technology Acceptance Model is applied for the basic model of the research. The model is modified by the U-City charac teristic which has user, technology, and service perspective. The proposed model is empirically tested using survey data collected from 600 citizens of 7 U-City. Structural equatio n modeling is employed to test the research hypotheses. The survey analysis results are able to apply for basic research of U-Service design, and provide theoretical and practical implications.

Journal ArticleDOI
TL;DR: This paper analyzes the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method.
Abstract: As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, `FSS`, `FISS`, `G`) are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, `FSS`, `FISS`and `G`.

Journal ArticleDOI
TL;DR: In this article, the authors explore SMEs that have developed start-up Internet based e-commerce businesses in Australia and the methods they have engaged to keep trust and loyalty, and conclude that trust, once gained, is very fragile requiring constant vigilance, essential to overcome the risks that will sustain trust in clients.
Abstract: The introduction of e-commerce holds substantial potential for marketing and selling products and services online while also introducing a plethora of risks and concerns for consumers. In the context of business-to-consumer (B2C) electronic commerce (e-commerce), the consumer compares not only product and pricing alternatives, but also the risks of conducting the transaction online. Maintaining trust in a risk ridden environment provids challenges for many online businesses. E-commerce, although growing in usage, is also experiencing a growing hostility from non-users and from previous users who have determined not to return. Small to medium enterprise (SMEs) who are starting in the e-commerce arena are at a disadvantage in presenting a trustworthy venture not having the reputation, finances or infrastructure to create an online business that exudes safety, security and trust. The SME must explore methods that will assist them in surviving the competitive e-commerce market place. This paper will explore SMEs that have developed start-up Internet based e-commerce businesses in Australia and the methods they have engaged to keep trust and loyalty. It concludes that trust, once gained, is very fragile requiring constant vigilance, essential to overcome the risks that will sustain trust and loyalty in clients. In conclusion this paper offers guidelines for new B2C e-commerce SMEs to assist in reducing security and business risks.



Journal ArticleDOI
TL;DR: In this paper, Park et al. compared the performance of the two teams and concluded that the former was better than the latter, and the latter was worse than the former, in terms of performance.
Abstract: 본 논문은 의류 상품 전시와 상품에 대한 관여도가 소비자의 인지, 감성적 반응, 구매 의도에 미치는 영향에 대하여 살펴보았다. 의류 상품 전시의 세 가지 종류(모델 없이 펼쳐놓은 의류상품 전시 vs. 모델, 얼굴이 없는 의류 상품 전시 vs. 모델, 얼굴을 포함한 의류 상품 전시)의 집단간 실험 설계를 하였으며 상품에 대한 관여도(관여도 높음 vs. 낮음)를 조절변수로 하였다. 429명의 학생을 대상으로 온라인 실험 연구를 실시하였다. 분석 결과, 모델을 이용한 상품 전시의 효율성이 검증되었으며, 의류 상품에 대한 관여도가 높은 소비자들은 관여도가 낮은 소비자들에 비하여 모든 상품전시에 더 긍정적인 반응을 보이는 것으로 나타났다. 본 연구 결과는 실험적인 증거를 통하여 이론적인 통찰력을 제시하였으며, 의류 소매 업체에 유용한 지식을 제시하였다.

Journal ArticleDOI
TL;DR: A new paradigm of text representation model is required which can analyse huge amounts of textual documents more precisely and ignore semantical information, sequential order information, and structural information of terms.
Abstract: Current text mining techniques suffer from the problem that the conventional text representation models cannot express the semantic or conceptual information for the textual documents written with natural languages. The conventional text models represent the textual documents as bag of words, which include vector space model, Boolean model, statistical model, and tensor space model. These models express documents only with the term literals for indexing and the frequency-based weights for their corresponding terms; that is, they ignore semantical information, sequential order information, and structural information of terms. Most of the text mining techniques have been developed assuming that the given documents are represented as ‘bag-of-words’ based text models. However, currently, confronting the big data era, a new paradigm of text representation model is required which can analyse huge amounts of textual documents more precisely. Our text model regards the ‘concept’ as an independent space equated with the ‘term’ and ‘document’ spaces used in the vector space model, and it expresses the relatedness among the three spaces. To develop the concept space, we use Wikipedia data, each of which defines a single concept. Consequently, a document collection is represented as a 3-order tensor with semantic information, and then the proposed model is called text cuboid model in our paper. Through experiments using the popular 20NewsGroup document corpus, we prove the superiority of the proposed text model in terms of document clustering and concept clustering.


Journal ArticleDOI
TL;DR: An effective method for providing nutrition information by analyzing web posting on Facebook that can be called a typical social network service is described and sodium and sugars were important variables from diet of user.
Abstract: Personalized data of users at social network service can be used as a new resource for providing personalized nutrition information. Although providing personalized information for nutrition using social data, there are a few studies on providing personalized nutrition information with customized user preference based on social network service. The purpose of this study is to implement the clustering of data analysis with collected personal data of Facebook users. To find out the method for providing personalized information, this study described an effective method for providing nutrition information by analyzing web posting on Facebook that can be called a typical social network service. According to the result from clustering, sodium and sugars were important variables from diet of user. Furthermore, the importance of elements of user’s diet has some differences according to vendor/manufactures. 키워드:영양정보, 소셜 네트워크 서비스, 개인화, 소셜 네트워크 분석, 군집화 Nutrition Information, Social Network Service, Personalization, Social Network Analysis, Clustering http://www.calsec.or.kr/jsebs ISSN: 2288-3908 The Journal of Society for e-Business Studies Vol.19, No.4, Nov 2014, pp.21-30 http://dx.doi.org/10.7838/jsebs.2014.19.4.021