• Title/Summary/Keyword: 정보경영학

Search Result 1,609, Processing Time 0.027 seconds

A Study on The Identification Formation and Engagement of The Metaverse Community: Value of Virtual Assets (메타버스 커뮤니티 구성원의 정체성 형성과 참여에 대한 연구: 가상 자산의 가치의 역할)

  • Lee, Min Young;Kim, Sang Hyun;Sohn, Chang Yong
    • The Journal of Information Systems
    • /
    • v.33 no.1
    • /
    • pp.183-205
    • /
    • 2024
  • Purpose This study aims to identify the factors that form the social identity of metaverse community users and to investigate the processes that influence engagement behavior. Specifically, this study is to verify the structural relationship between socio-technical factors and social identity of metaverse community. Furthermore, we would figure out the role of psychological ownership and virtual assets in engagement of metaverse community members. Design/methodology/approach Hypotheses were derived through literature research and a survey was conducted for users of the metaverse community. 357 collected responses were analyzed for the structural equitation modeling(SEM) with AMOS 24.0. Findings As a result of the study, all of the proposed hypotheses were supported. As a result, it was found that technical and social perceptions of the metaverse community platform had a positive effect on social identity. Social identity affects the intention to engage in the metaverse community through psychological ownership, and its influence is reinforced by the perceived value of virtual assets.

An Efficient Data Traffic Estimation Technique in Defense Information Network through Network Simulation (네트워크 시뮬레이션을 통한 군 통신 정보유통량의 효율적 예측 기법)

  • An, Eun-Kyung;Lee, Seung-Jong
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.1
    • /
    • pp.133-158
    • /
    • 2006
  • The change of information and communications technology affects into many parts of military battlefield as the future warfare will be information-oriented warfare, relying on information technology. The more IT-based military systems are deployed the more multimedia data traffic increase. To accommodate such user's requirements the bandwidth capacity of military communications network must be upgraded. The cost of upgrading network capacity is increasing as well. But there has no systematic estimation approach to analyze the amount of data traffic in the military network. In this paper we suggest an efficient data traffic estimation technique using network simulation with the respect of Input and output, scenario, toolset and technique, and experimental environments.

A Study on the Improvement of Defense Standardization Information Management (국방표준화 정보관리 개선방안 연구)

  • Jang, Pil-Hoon;Choi, Seok-Cheol
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.13-30
    • /
    • 2008
  • In this study, the establishment strategies of Military Standardization Information System and Integrated Database(DB) based on standardization information are provided. The establishment strategies introduced here are based on the appliable common(commercial and military) classification of specifications/standards. The common(commercial and military) classification of specifications/standards adapted in this study can be constructed through mapping by 'grouping' between the MS(Military Specification/Standards) and KS(Korean industry Standards) to increase efficiency. In detail, the establishment of Integrated Database(DB) based on standardization information provides the various channel of interactive communication among specifications/standards. Additionally, standardization information systems provide the basis of the integrated specifications/standards converged between the commercial and military sector.

Exploring Spatio-temporal Patterns of Population and its Influential Factors in Jeonju (거주인구의 시공간 변화 및 영향요인 분석: 전라북도 전주시 사례를 중심으로)

  • Jicheol Yang;Jooae Kim;Kuk Cho;Sangwan Lee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.3
    • /
    • pp.251-258
    • /
    • 2023
  • This study (1) explored spatio-temporal population distribution patterns in Jeonju by using emerging hot spot analysis and (2) identified the influential factors to determine the spatio-temporal patterns by using multinomial logit model. The major findings are as follows. First, the results of emerging hot spot analysis indicated that the 100*100m grid in the urban area of Jeonju was found to have a category of hot spots, whereas most of the cold spot series was concentrated in the outskirts of the city. Also, new towns such as Jeonju Eco City, Jeonbuk Innovation City, and Hyocheon District were persistent or intensifying hot spots, Third, the results of multinomial logit model revealed that the factors influencing deterrmining the spatio-temporal patterns were accessibility to schools, hospitals, parks, and walfare services. This study offered a deeper understanding of urbanization and regional changes in Jeonju, and important information for urban planning.

Recent Trends in Research Methods in Library and Information Science : Content Analysis of the Journal Articles (내용분석법에 의한 문헌정보학 학술지 연구논문 분석)

  • Lee, Myeong-Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.3
    • /
    • pp.287-310
    • /
    • 2002
  • This study used content analysis to examine the research methods in Library and Information Science journals from 1997 to 2001. Analyses measured research subjects, research method, data collection methods, data analysis methods, hypotheses, theories and research funds. Brief consideration is given to possible future methodological trends : web-based research methods, qualitative research, cooperation between academic society and librarians and research fundraising.

The Impact of Mobile Channel Adoption on Video Consumption: Are We Watching More and for Longer? (모바일 채널 수용이 고객의 동영상 소비에 미치는 영향에 관한 실증 연구)

  • SangA Choi;Minhyung Lee;HanByeol Stella Choi;Heeseok Lee
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.121-138
    • /
    • 2023
  • The advancement in mobile technology brought disruptive innovation in media industry. The introduction of mobile devices broke spatial and temporal restrictions in media consumption. This study investigates the impact of mobile channel adoption on video viewing behavior, using real-world dataset obtained from a particular on-demand service provider in South Korea. We find that the adoption of a mobile channel significantly increases the total viewing time of video-on-demand via TV and the number of contents viewed. Our results suggest that the mobile channels act as a complement channel to conventional TV channels. We provide theoretical and practical insights on consumer usage in the emerging over-the-top market.

Exploring Public Digital Innovation using Robotic Process Automation: A Case in National Information Society Agency (RPA를 활용한 공공기관 디지털 혁신에 관한 연구: 한국정보화진흥원 사례를 중심으로)

  • Myung Ki Nam;Young Sik Kang;Heeseok Lee;Chanhee Kwak
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.157-173
    • /
    • 2019
  • Robotic Process Automation (RPA) has attracted great attention from diverse home and foreign industries. To provide lessons learned and action principles based on real RPA adoption and application experiences, various case studies have been conducted. However, lacking is an investigation of public sector for RPA adoption, especially in Korea. To reduce the research gap, this study presents a case study of RPA adoption by a representative Korean ICT public organization, NIA (National Information society Agency). By automating a core process, entering a document to a governmental portal service, NIA has achieved various management performances in terms of cost, operation, and business impacts. Especially, by relieving four types of rigidity of public institutions (i.e. structure, human resource, tasks, and rules), Our case study result suggests that RPA enables public institutes to overcome obstacles of pursuing digital transformation. Implications and limitations for future public RPA adopters are offered.

The Effect of E-commerce Platform Seller Signals on Revenue: Focusing on the Moderating Effect of Keyword Specificity (e-커머스 플랫폼 판매자 신호가 수익에 미치는 영향: 키워드 구체성의 조절 효과를 중심으로)

  • Jungwon Lee;Jaehyun You
    • Information Systems Review
    • /
    • v.25 no.2
    • /
    • pp.103-123
    • /
    • 2023
  • One of the valid perspectives in the e-commerce platform literature is the seller signaling strategy in the information asymmetry situation. In this study, a research model was constructed based on signaling theory and shopping goal theory to systematically explore the effects of a seller's signaling strategy on consumer decision-making. Specifically, the study examined whether the signaling effects (i.e., reputation, electronic word-of-mouth, price) provided by the seller differed based on consumers' shopping goals. For the empirical analysis, the Gaussian Copula method was employed, utilizing 26,246 data collected from Amazon, a leading e-commerce platform. The analysis revealed that the signals provided by the seller positively impacted sales, and this effect was moderated by consumers' shopping goals. Drawing on shopping goal theory, this study contributes to signaling theory and e-commerce literature by discovering differences in the effectiveness of a seller's signaling strategy based on the keywords input by consumers.

Ethical Consciousness: Passive Privacy Intrusion versus Active Privacy Intrusion on a SNS (윤리의식: SNS상의 수동적 개인정보 침해와 능동적 개인정보 침해)

  • Sanghui Kim;DongBack Seo
    • Information Systems Review
    • /
    • v.24 no.4
    • /
    • pp.55-76
    • /
    • 2022
  • People have adopted Social Networking Sites (SNSs) as a part of their daily lives. When a person uses SNSs, (s)he intentionally or unintentionally discloses her/his personal information. Although using SNSs can provide benefits to a person such as maintaining relationships with people who does not see often, it also opens a dark side. Someone can use one's disclosed information without the acknowledgement of the information owner. It is called a privacy intrusion on SNSs, which has become a social problem and needs attention. This study examined factors affecting privacy intrusion intention on SNSs. This study classifies privacy intrusions into passive intrusion (collector) and active intrusion (distributor). The results reveal that low ethical consciousness positively affects enjoyment in both of collecting and distributing someone's personal information on SNSs. A person who has the low ethical consciousness also tends to raise her/his curiosity of collecting someone's private information on SNSs. Apart from low ethical consciousness, this study discloses how enjoyment, curiosity, experience of being a victim of privacy intrusion, experience of intruding others' privacies, and self-efficacy of collecting or distributing others' private information are related to passive or/and active privacy intrusion on SNSs with survey data.

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.