• Title/Summary/Keyword: ISR

Search Result 593, Processing Time 0.017 seconds

Authing Service of Platform: Tradeoff between Information Security and Convenience (플랫폼의 소셜로그인 서비스(Authing Service): 보안과 편의 사이의 적절성)

  • Eun Sol Yoo;Byung Cho Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.137-158
    • /
    • 2018
  • Online platforms recently expanded their connectivity through an authing service. The growth of authing services enabled consumers to enjoy easy log in access without exerting extra effort. However, multiple points of access increases the security vulnerability of platform ecosystems. Despite the importance of balancing authing service and security, only a few studies examined platform connectivity. This study examines the optimal level of authing service of a platform and how authing strategies impact participants in a platform ecosystem. We used a game-theoretic approach to analyze security problems associated with authing services provided by online platforms for consumers and other linked platforms. The main findings are as follows: 1) the decreased expected loss of consumers will increase the number of players who participate in the platform; 2) linked platforms offer strong benefits from consumers involved in an authing service; 3) the main platform will increase its effort level, which includes security cost and checking of linked platform's security if the expected loss of the consumers is low. Our study contributes to the literature on the relationship between technology convenience and security risk and provides guidelines on authing strategies to platform managers.

Smartwork Application & Effects: Empirical Test for the Extended Work Design Theory (스마트워크 적용과 효과: 업무 설계 이론을 중심으로)

  • Hyejung Lee;Jun-Gi Park
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.21-37
    • /
    • 2018
  • Under ubiquitous work environment, innovative changes occur in work process with ICT. The work process for collaboration through mobile devices and network should be investigated. The research model consists of two major antecedents: autonomy and interdependence as a task characteristic and job satisfaction as ultimate consequence followed by work design theory. To elaborate work design theory, smartwork application (app) use, communication extent, and work-life balance were reviewed from the literature. Data were collected from three ICT firms, which adopted certain smartwork app, and a partial least squares analysis was made on 175 data points. The analysis results show that task interdependence exerts a statistically significant effect on the level of smartwork app usage. Communication extent directly affects job satisfaction and work-life balance. The remarkable point is that smartwork app usage does not affect employees' work-life balance; the former can only affect the latter indirectly by increasing communication extent. This study attempts to explain the organizational impact by considering smartwork app and the effects simultaneously. We proposed and empirically tested the extended work design theory including information technology and its environment. Based on the results, other theoretical and practical contributions are discussed at the end with limitations and further studies.

Self-Disclosure and Cyberbullying on SNS (SNS상에서 자기노출과 사이버불링)

  • Jooyeon Won;DongBack Seo
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.1-23
    • /
    • 2017
  • Since the development of information communication technologies, social networking sites (SNSs) have been diffused to the world with benefits such as building and maintaining relationships among people. SNSs have become more popular with the development of mobile devices. Despite this advantage, SNSs also present unexpected effects on people, such as cyberbullying and identity theft. Cyberbullying has emerged as one of the most serious issues among people who use SNSs. In fact, almost 20% of teenagers confessed that they have been cyberbullied on SNSs. In consideration of this serious social issue, this study investigates the influences of self-disclosure and self-control on the cyberbullying victimization experience from the perspective of Social Exchange Theory. Self-disclosure is a basic characteristic of SNSs. It is classified into self-disclosure for access to SNS and self-disclosure for relationship building and maintaining on SNSs. The cyberbullying victimization experience is classified into being cyber-excluded and being cyber-attacked. We examine how two types of self-disclosure and self-control affect two types of cyberbullying victimization experience based on the survey data of people who are in their 20s and are greatly familiar with SNSs.

An Analysis on the Impact of Information Technology Usage on the Social Capital and Innovation Performance in an Industrial Cluster: Based on the PanGyo Technovalley (정보기술 활용이 사회적 자본과 산업 클러스터 혁신성과에 미치는 영향 분석: 판교 테크노벨리를 중심으로)

  • Yeonsoon Kim;Seonyoung Shim
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.43-62
    • /
    • 2017
  • This study investigates the effect of bonding and bridging social capital on the technological innovation performance in the Pangyo Techno Valley. In particular, we consider the information technology (IT) usage in industrial cluster as an antecedent of social capital. IT instigates the intra and extra communication and information sharing between employees, thereby promoting the formation of a network of various members. Results show that the IT usage factor positively affects both bridging and bonding social capital, but an evident difference exists among the effects of social capital on the technological innovation performance. In case of Pangyo industrial cluster, bridging social capital exerts significant effect on the technological innovation performance, whereas bonding social capital shows insignificance. Bridging social capital is composed of the interactions of various networks. Bonding social capital is based on the strong tie from trust and internal cooperation. Results are related with the characteristics of Pangyo Techno Valley, where various IT ventures need active communication and information sharing with other organizations for technological innovation performance.

A Big Data Analysis Methodology for Examining Emerging Trend Zones Identified by SNS Users: Focusing on the Spatial Analysis Using Instagram Data (SNS 사용자에 의해 형성된 트렌드 중심지 도출을 위한 빅 데이터 분석 방법론 연구: 인스타그램 데이터 활용 공간분석을 중심으로)

  • Il Sup Lee;Kyung Kyu Kim;Ae Ri Lee
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.63-85
    • /
    • 2018
  • Emerging hotspot and trendy areas are formed into alleys and blocks with the help of viral effects among social network services (SNS) users called "Golmogleo." These users search for every corner of the alleys to share and promote their own favorite places through SNS. An analysis of hot places is limited if it is only based on macroeconomic indicators such as commercial area data published by national organizations, large-scale visiting facilities, and commuter figures. Careful analyses based on consumers' actual activities are needed. This study develops a "social big data analysis methodology" using Instagram data, which is one of the most popular SNSs suitable to identify recent consumer trends. We build a spatial analysis model using Local Moran's I. Results show that our model identifies new trend zones on the basis of posting data in Instagram, which are not included in the commercial information prepared by national organizations. The proposed analysis methodology enables better identification of the latest trend areas formulated by SNS user activities. It also provides practical information for start-ups, small business owners, and alley merchants for marketing purposes. This analytical methodology can be applied to future studies on social big data analysis.

A Study on the Certification System for Offline Stores Selling Copyrighted Contents: Copyright OK Case (정품 콘텐츠 판매 오프라인 업체 인증제도 방안 연구: 저작권 OK 사례)

  • Gyoo Gun Lim;Jae Young Choi;Woong Hee Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.27-42
    • /
    • 2017
  • With the rapid development in network, graphic technology, and digital technology, content industry is emerging as an important industry for new cultural development and economic development. The development in digital content technology has remarkably expanded the generation and distribution of contents, thereby creating new value and extending into a large distribution market. However, the ease of distribution and duplication, which characterizes digital technology, has increased the circulation of illegal contents due to illegal copying, theft, and alteration. The damage caused by this illegal content is severe. Currently, a copyright protection system targeting online sites is available. By contrast, no system has been established for offline companies that sell offline genuine content, which compete with online companies. The demand for content of overseas tourists is increasing due to the Korean wave craze. Nevertheless, many offline content providers have lost competitiveness due to illegal content distribution with online companies. In this study, we analyzed the case and status of similar copyright certification systems in Korea and overseas through previous research and studied a system to certify the offline genuine contents business. In addition to the case analysis, we focused on interviews obtained through in-depth interviews with the copyright stakeholders. We also developed a certification framework by establishing the certification domain, certification direction, and incentive of the certification system for offline businesses with genuine content. Selected certification direction is ethical, open, inward, store, and rigid (post evaluation). This study aimed to increase awareness among consumers about the use of genuine content and establish a transparent trading order in a healthy content market.

Measuring the Economic Value of Open Government Data: A Consumer Utility Perspective (공공데이터의 경제적 가치 측정: 소비자 효용 관점)

  • Chihong Jeon;Jaeung Sim;Daegon Cho
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.1-19
    • /
    • 2018
  • In many countries, governments invest a substantial amount of budget in open government data (OGD) for governmental performance and transparency. To understand the actual performance of such policies, the governments should measure the realized value. Many organizations and researchers have attempted to assess the value of OGD. However, they have neglected a perspective of consumers who benefit from OGD. Moreover, little research has quantified the economic value. This research examines extant methods of intangible asset valuation to quantify the economic value of OGD in a citizen perspective. In consideration of the extant research methods and the characteristics of OGD, the contingent valuation method is the most appropriate because it effectively reflects various users and their purpose of use. We then conduct a survey of citizens living in Seoul, Korea and assess the economic value of OGD provided by the Seoul government. Findings show that citizens' willingness to pay (WTP) differs across respondents' prior experience, tax resistance, perceived benefit and perceived reality of virtual scenario, but it does not differ across their demographics. WTP also significantly varies across the question formats. We discuss the reliability of the results and implications for future research.

A Study on the Relationship between Enterprise RFID Capability and Strategic Supply Chain Capability and Firm Performance: Focusing on Logistics, Distribution and Supply Chain Enterprises in China (기업의 RFID 역량과 전략적 공급사슬역량 및 기업성과 간 관계에 관한 연구: 중국 내 물류, 유통, 공급망 기업을 중심으로)

  • Shang Meng;Yong Ho Shin;Chul Woo Lee
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.87-110
    • /
    • 2018
  • This study reviews previous studies about the effects of RFID capabilities on strategic supply chain competence and business performance in the Chinese context. This study introduces a new perspective that measures the degree to which RFID capability levels contribute to business performance. Such an assumption is based on the fact that companies build their own capabilities through RFID capabilities and that these capabilities provide a competitive advantage for enterprises. Data on all sorts of logistics, distribution, and manufacturing companies that introduced RFID system in China were collected for data analysis. This study analyzes the structural equation modeling using Smart-PLS 2.0 program. This study confirms that internal reliability, convergent validity, and discriminant validity are satisfied. The hypothesis test result on the relationship between RFID capacity and strategic supply chain competence and strategic supply chain competence and company results is partially adopted. This study aids in establishing a RFID system construction strategy to enhance supply chain competence by suggesting guidelines for the successful introduction of RFID system through identifying the causal relationship between RFID capacity and strategic supply chain competence. This study also suggests the influence of RFID competency on visibility, agility, flexibility, and collaborations.

Understanding Gender Differences in Social Media "like" Behavior: Empathy, Social Support, Relationship Building and Information Sharing (소셜 미디어 상 '좋아요'를 누르는 행위를 인식함에 있어 남녀 차이에 대한 탐색적 연구: 공감 혹은 지지, 그리고 관계 강화 혹은 정보 공유)

  • Jung Lee;Soonhui Lee
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.101-121
    • /
    • 2017
  • This study explored the emotional and social implications of social media "like" behavior and examined the difference in this behavior across gender. Most studies on social media have analyzed the "like" behavior quantitatively and determined the number of "likes" produced and exchanged. The current study presented a different view by applying a social perspective and analyzing the user intrinsic motives embedded in the "like" behavior. Specifically, we identified empathy and social support as the "like" motivations and used relationship building and information sharing as the mediators. Furthermore, we hypothesized that empathy and social support exhibit different effects on the use of social media across gender: the female group shows strong empathy, and the male group shows strong social support. Validation was performed through a survey of 285 social media users. The results confirmed that empathy and social support have significant effects on the use of social media. However, gender difference in the use of social media was not evident and was only partially evident in the effects of empathy and social support.

A Framework for Identifying and Analyzing IT Project Risk Factors (IT프로젝트 위험 요인 식별 및 분석 프레임워크 연구)

  • Jangho Choi;Chanhee Kwak;Heeseok Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.87-110
    • /
    • 2017
  • Analyzing and finding the risk factors in information technology (IT) projects have been discussed because risk management is an important issue in IT project management. This study obtained the risk factor checklists with priorities, analyzed the causal relationship of risk factors, and determined their influences on IT project management. However, only few studies systematically classified IT project risk factors in terms of risk exposure. These studies considered both the probability of occurrence and the degree of risk simultaneously. The present study determined 53 IT project risk factors on the basis of literature and expert group discussions. Additionally, this study presented clustering analysis based on the data of 140 project managers. The IT project risk factor classification framework was divided into four areas (HIHF, HILF, LIHF, and LILF). The present results can be used to help IT project managers establish effective risk management strategies and reduce IT project failures. This study also provides academic implication because it considers both the probability of occurrence and the degree of influence of risk factors.