• Title/Summary/Keyword: ISR

Search Result 593, Processing Time 0.02 seconds

The Relationship between Anonymity, Personal and Group Identities, and Discussion Quality in Online Discussion Communities (온라인 토론 커뮤니티에서의 익명성과 개인 및 집단 정체성, 토론의 질 간의 영향 연구)

  • Ae Ri Lee
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.63-86
    • /
    • 2019
  • As the use of ICT became a part of daily social life, online community has emerged as a new type of social organization. Online community is a virtual space which enables many people to participate and contribute together to collective knowledge. Anonymity in online communities can encourage active social participation by people with various social constraints, however, anonymity can also lead to serious social pathology. As a result, it is necessary to study on what is fundamentally influencing human behavior and how people's behavior is controlled in anonymous online community. This study focuses on human identity and investigate the factors affecting human behavior control in anonymous online environment by examining various aspects of identity in online discussion community. This study empirically verifies the causal relationship between factors, including social & technical anonymities, various identity dimensions, intrinsic motivation to participate in the community, group norm conformity, and quality of discussion. It also analyzes the difference between groups by the level of anonymity, gender, age, community usage period, and discussion topic. Based on the findings, this research provides theoretical and practical implications for online community management strategies and a better culture on Internet discussion.

The Role of Psychological Distance and Relative Optimism in Information Security Decision Making (정보보호 의사결정에서 정보보호 침해사고 발생가능성의 심리적 거리감과 상대적 낙관성의 역할)

  • Jongki Kim;Jiyun Kim
    • Information Systems Review
    • /
    • v.20 no.3
    • /
    • pp.51-71
    • /
    • 2018
  • Many studies in the field of information security reveal the need to increase awareness. However, although awareness of information security has been raised to a considerable extent, actual security behavior has been shown to fall short of that. Therefore, we wanted to identify the role of psychological factors in making information security decisions by conducting a experimental study. The results show that there are differences in perception of information security risks according to the probabilistic distance and the degree of relative optimism due to social distance. In relation to their relative optimism and intention of information security, they reduced the level of perceived risk compared to those close to them and found that their influence varied according to their probabilistic distance. This study has made valuable attempt in terms of methodology and it is meaningful that the psychological factor is taken into consideration for the information protection behavior, so that the range of relative optimism that actually affects the perception of risk is narrowed. It is expected to contribute to the improvement of information security level of information technology users and protection of information assets by empirically identifying necessity of various approaches to decision making process for information security.

Analysis of Startup Process based on Process Mining Techniques: ICT Service Cases (프로세스 마이닝 기반 창업 프로세스 분석: ICT 서비스 창업 사례를 중심으로)

  • Min Woo Park;Hyun Sil Moon;Jae Kyeong Kim
    • Information Systems Review
    • /
    • v.21 no.1
    • /
    • pp.135-152
    • /
    • 2019
  • Recently there are many development and support policies for start-up companies because of successful venture companies related to ICT services. However, as these policies have focused on the support for the initial stage of start-up, many start-up companies have difficulties to continuously grow up. The main reason for these difficulties is that they recognize start-up tasks as independent activities. However, many experts or related articles say that start-up tasks are composed of related processes from the initial stage to the stable stage of start-up firms. In this study, we models the start-up processes based on the survey collected by the start-up companies, and analyze the start-up process of ICT service companies with process mining techniques. Through process mining analysis, we can draw a sequential flow of tasks for start-ups and the characteristics of them. The analysis of start-up businessman, idea derivation, creating business model, business diversification processes are resulted as important processes, but marketing activity and managing investment funds are not. This result means that marketing activity and managing investment funds are activities that need ongoing attention. Moreover, we can find temporal and complementary tasks which could not be captured by independent individual-level activity analysis. Our process analysis results are expected to be used in simulation-based web-intelligent system to support start-up business, and more cumulated start-up business cases will be helpful to give more detailed individual-level personalization service. And our proposed process model and analyzing results can be used to solve many difficulties for start-up companies.

How to Identify Customer Needs Based on Big Data and Netnography Analysis (빅데이터와 네트노그라피 분석을 통합한 온라인 커뮤니티 고객 욕구 도출 방안: 천기저귀 온라인 커뮤니티 사례를 중심으로)

  • Soonhwa Park;Sanghyeok Park;Seunghee Oh
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.175-195
    • /
    • 2019
  • This study conducted both big data and netnography analysis to analyze consumer needs and behaviors of online consumer community. Big data analysis is easy to identify correlations, but causality is difficult to identify. To overcome this limitation, we used netnography analysis together. The netnography methodology is excellent for context grasping. However, there is a limit in that it is time and costly to analyze a large amount of data accumulated for a long time. Therefore, in this study, we searched for patterns of overall data through big data analysis and discovered outliers that require netnography analysis, and then performed netnography analysis only before and after outliers. As a result of analysis, the cause of the phenomenon shown through big data analysis could be explained through netnography analysis. In addition, it was able to identify the internal structural changes of the community, which are not easily revealed by big data analysis. Therefore, this study was able to effectively explain much of online consumer behavior that was difficult to understand as well as contextual semantics from the unstructured data missed by big data. The big data-netnography integrated model proposed in this study can be used as a good tool to discover new consumer needs in the online environment.

A Case Study on the Smart Tourism City Using Big Data: Focusing on Tourists Visiting Jeju Province (빅 데이터를 활용한 스마트 관광 도시 사례 분석 연구: 제주특별자치도 관광객 데이터를 중심으로)

  • Junhwan Moon;Sunghyun Kim;Hesub Rho;Chulmo Koo
    • Information Systems Review
    • /
    • v.21 no.2
    • /
    • pp.1-27
    • /
    • 2019
  • It is possible to provide Smart Tourism Service through the development of information technology. It is necessary for the tourism industry to understand and utilize Big Data that has tourists' consumption patterns and service usage patterns in order to continuously create a new business model by converging with other industries. This study suggests to activate Jeju Smart Tourism by analyzing Big Data based on credit card usage records and location of tourists in Jeju. The results of the study show that First, the percentage of Chinese tourists visiting Jeju has decreased because of the effect of THAAD. Second, Consumption pattern of Chinese tourists is mostly occurring in the northern areas where airports and duty-free shops are located, while one in other regions is very low. The regional economy of Jeju City and Seogwipo City shows a overall stagnation, without changes in policy, existing consumption trends and growth rates will continue in line with regional characteristics. Third, we need a policy that young people flow into by building Jeju Multi-complex Mall where they can eat, drink, and go shopping at once because the number of young tourists and the price they spend are increasing. Furthermore, it is necessary to provide services for life-support related to weather, shopping, traffic, and facilities etc. through analyzing Wi-Fi usage location. Based on the results, we suggests the marketing strategies and public policies for understanding Jeju tourists' patterns and stimulating Jeju tourism industry.

How Vulnerability Research Motives Influence the Intention to Use the Vulnerability Market? (취약점 연구동기가 취약점마켓 이용의도에 어떠한 영향을 미치는가?)

  • Hyeong-Yeol Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.201-228
    • /
    • 2017
  • Vulnerability information, which can cause serious damage to information assets, has become a valuable commodity, thereby leading to the creation of a vulnerability market. Vulnerability information is traded on the vulnerability market from several hundred dollars to hundreds of thousands of dollars depending on its severity and importance, and the types and scope of the vulnerability markets are varying. Based on previous studies on vulnerability markets and hackers, this study empirically analyzed the effects of the security researcher's vulnerability research motivation on his/her vulnerability market use intention. The results are discussed as follows. First, vulnerability research self-efficacy had a significant effect on flow and on white and black market use intention but not on perceived benefit. Second, flow had a significant effect on perceived benefit and on black market use intention but had no effect on white market use intention. Third, perceived profit had a significant effect on white and black market use intention. Fourth, vulnerability research self-efficacy had a significant effect on perceived benefit through flow. Fifth, flow had a significant effect on white and black market use intention through perceived profit. These findings can be used to predict the behavior of security researchers who have experience in exploiting vulnerabilities.

The Influence of IoT Technological Characteristics on Expected Achievement and Adoption Intention of SCM: On the Perspectives of Chinese Physical Supply Chain and Distribution Industry (사물인터넷(IoT) 기술특성이 SCM 기대성과 및 도입의도에 미치는 영향에 관한 연구: 중국 물류공급망 및 유통업체를 대상으로)

  • Shang Meng;Yong Ho Shin;Chul Woo Lee;Jun Ho Mun
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.1-21
    • /
    • 2017
  • The Internet of Things (IoT) analysis aims to verify the technical characteristics, performance expectations, and adoption intentions of IoT. This work refers to IoT data from foreign and domestic publications and websites as well as aims to benefit related organizations by referring to reports from agencies. The literature review summarizes the relevant theories and background of the unified theory of acceptance and use of technology. The SPSS 22.0 software and structural equation models (smart PLS 2.0) are used in the data analysis. Technical statistics analysis, reliability analysis, validity analysis, structural equation models, and statistical methods are employed to test the research hypotheses, that is, the technical characteristics of IoT will have positive effects on its performance expectations. This study introduces the characteristics and expected performance of IoT to present relevant IoT guidelines for companies that aim to adopt such technology.

A Case of Developing Performance Evaluation Model for Korean Defense Informatization (국방정보화 수준평가 모델 개발 사례)

  • Gyoo Gun Lim;Dae Chul Lee;Hyuk Jin Kwon;Sung Rim Cho
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.23-45
    • /
    • 2017
  • The ROK military is making a great effort and investment in establishing network-centric warfare, a future battlefield concept, as a major step in the establishment of a basic plan for military innovation. In the military organization level, an advanced process is introduced to shorten the command control time of the military and the business process is improved to shorten the decision time. In the information system dimension, an efficient resource management is achieved by establishing an automated command control system and a resource management information system by using the battle management information system. However, despite these efforts, we must evaluate the present level of informatization in an objective manner and assess the current progress toward the future goal of the military by using objective indicators. In promoting informatization, we must systematically identify the correct areas of improvement and identify policy directions to supplement in the future. Therefore, by analyzing preliminary research, workshops, and expert discussions on the major informatization level evaluation models at home and abroad, this study develops an evaluation model and several indicators that systematically reflect the characteristics of military organizations. The developed informatization level evaluation model is verified by conducting a feasibility test for the troops of the operation class or higher. We expect that this model will be able to objectively diagnose the level of informatization of the ROK military by putting budget and resources into the right place at the right time and to rapidly improve the vulnerability of the information sector.

A Study on the Cognitive/Affective Personality and Experiential Factors Influencing on Smart Phone Users' Emotional Exhaustion and Education Performance (스마트폰 이용자의 정서적 소진과 학습 성과에 영향을 주는 인지·감성 성향과 사용 경험에 관한 연구)

  • Ming-Yuan Sun;Sundong Kwon;Yong-Young Kim
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.69-88
    • /
    • 2016
  • Nowadays, organizations have adopted Smart Work to efficiently manage tasks, such as electronic document approval, customer management, and site inspection, without spatial-temporal constraints. Smartphones, which are commonly used in Smart Work, enable individuals to perform their jobs anytime and anywhere, thus blurring the boundary between work and non-work. To solve the problem of blurred work/non-work boundaries, a construct of self-control and affective factors needs to be considered because business style is changed from command to autonomy in the Smart Work context. Moreover, employees can convey their emotions easily over smartphones. Recent marketing studies have analyzed consumers' behavior based on the combination of cognitive, affective, and behavioral components, and researchers of information systems are also interested in these factors. However, previous research has some limitations, such as not classifying factors into cognitive, affective, and behavioral as well as not covering all three factors. Therefore, we explore the roles of cognitive, affective, and behavioral components in emotional exhaustion and education performance, and conduct a survey on undergraduate and graduate students, who are the major users of smartphones. Findings show that when individuals improve their cognitive capability (self-control) and usage experience (smartphone communication and internet usage), they can decrease emotional exhaustion and increase education performance. In the role of affective capability, increasing education performance is partially accepted. These results imply that organizations should not focus on controlling the usage of smartphones but on promoting appropriate smartphone usage.

An Exploratory Study on the Relationship between SNS Use during a Task and Task Performance: An Analysis of Task Complexity Difference (작업 수행 중 SNS 사용과 작업 성과의 관계에 관한 탐색적 연구: 작업의 난이도에 따른 차이 분석)

  • Jinyoung Min
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.105-125
    • /
    • 2017
  • Although the relationship between social networking sites (SNS) use and performance has been widely studied, most of these studies have focused on comparing the SNS users' overall performance with that of non-SNS users instead of examining how using SNS midway of a task affects one's task performance. To address this research gap, an experiment was conducted to examine SNS use during a task and its influence on the performance of that task. In this experiment, the role of SNS in various situations was examined by reviewing the literature on break and performance as well as the types of breaks and tasks. Owing to its exploratory nature, this study used various types of data, such as electroencephalography interpretation data generated from a brain-computer interface, self-reported data, and data recorded by a computer. Those participants who used SNS showed an improved performance compared with those who took a short break while doing a simple task. Further analysis showed that the degree of SNS usage and engagement with SNS had positive effects on the participants' simple task performance, while social presence and reassurance of self-worth had negative and positive effects on the participants' complex task performance, respectively.