• Title/Summary/Keyword: Research Information Systems

Search Result 12,224, Processing Time 0.04 seconds

The Effect of Message Completeness and Leakage Cues on the Credibility of Mobile Promotion Messages (기업의 스마트폰 메시지에 대한 고객 신뢰도에 관한 연구: 메시지 정교화 모델을 중심으로)

  • Hyun Jun Jeon;Jin Seon Choe;Jai-Yeol Son
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.61-80
    • /
    • 2018
  • Individuals often receive smishing campaigns (mobile phishing messages), which they treat as spam. Thus, firms should understand how their customers distinguish their promotion messages from smishing. However, only a few studies examined this important issue. The present study employs the elaboration likelihood model to develop research hypotheses on the relationship between message cue and message credibility. The message cue in this study is classified as content cue, which is found in the content of promotion messages, and as leakage cue, which is found in peripheral information in the message. Leakage cue includes orthography (inclusion of special characters)and an abbreviated link sent by a faithless sender. We also propose that contextualization has a moderating effect on the relationship between content cue and credibility. We conducted a survey experiment to examine the effect of message cues on message credibility in the context of respondents receiving discount coupons through mobile messages. The result of data analysis based on 166 responses suggests that leakage cue had a negative effect on message credibility. A message with defective content cue has a marginally negative effect on message credibility. In particular, defective content cue in a high-contextual message has a strong negative impact on message credibility. This effect was not observed in low-contextual messages. Moreover, message credibility is significantly low regardless of the degree of contextualization if there is a leakage cue in the message. Our findings suggest that mobile promotion messages should be customized for message receivers and should have no leakage cues.

Smartwork Application & Effects: Empirical Test for the Extended Work Design Theory (스마트워크 적용과 효과: 업무 설계 이론을 중심으로)

  • Hyejung Lee;Jun-Gi Park
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.21-37
    • /
    • 2018
  • Under ubiquitous work environment, innovative changes occur in work process with ICT. The work process for collaboration through mobile devices and network should be investigated. The research model consists of two major antecedents: autonomy and interdependence as a task characteristic and job satisfaction as ultimate consequence followed by work design theory. To elaborate work design theory, smartwork application (app) use, communication extent, and work-life balance were reviewed from the literature. Data were collected from three ICT firms, which adopted certain smartwork app, and a partial least squares analysis was made on 175 data points. The analysis results show that task interdependence exerts a statistically significant effect on the level of smartwork app usage. Communication extent directly affects job satisfaction and work-life balance. The remarkable point is that smartwork app usage does not affect employees' work-life balance; the former can only affect the latter indirectly by increasing communication extent. This study attempts to explain the organizational impact by considering smartwork app and the effects simultaneously. We proposed and empirically tested the extended work design theory including information technology and its environment. Based on the results, other theoretical and practical contributions are discussed at the end with limitations and further studies.

Research on Usability of Mobile Food Delivery Application: Focusing on Korean Application and Chinese Application (모바일 배달 애플리케이션 사용성 평가 연구: 한국(배달의민족)과 중국(어러머)을 중심으로)

  • Yang Tian;Eunkyung Kweon;Sangmi Chai
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.1-16
    • /
    • 2018
  • The development and generalization of the Internet increased the popularity of food delivery service applications in Korea. The food delivery market based on online-to-offline service is growing rapidly. This study compares the usability of Korean food delivery service application between that of Chinese food delivery service application. This study suggests improvement points for Korean food delivery service applications. To conduct this study, we explore the status of various food delivery service applications and conduct interviews and surveys based on the honeycomb model developed by Peter Morville. This study obtained the following results. First, all restaurants participating in the Korean food delivery service must be able to accept order through the application. Second, the shopping cart function must be able to accept order of all restaurants simultaneously. Third, when users look for menu recommendation, their purchase history and shopping cart functions should appear at the first page of the website. Users should be able to perceive the improved usability of the website using those functions. Fourth, when the search window is fixed on the top of each page, users should be able to find the information they need. Fifth, the application must allow users to find the exact location of the delivery person and the estimated delivery time. Finally, the restaurants'address should be disclosed and fast delivery time should be confirmed to enhance users'trust on the application. This study contributes to academia and industry by suggesting useful insight into food delivery service applications and improving the point of food delivery service application in Korea.

Research on functional area-specific technologies application of future C4I system for efficient battlefield visualization (미래 지휘통제체계의 효율적 전장 가시화를 위한 기능 영역별 첨단기술 적용방안)

  • Sangjun Park;Jungho Kang;Yongjoon Lee;Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.109-119
    • /
    • 2023
  • C4I system is an integrated battlefield information system that automates the five elements of command, control, communications, computers, and information to efficiently manage the battlefield. C4I systems play an important role in collecting and analyzing enemy positions, situations, and operational results to ensure that all services have the same picture in real time and optimize command decisions and mission orders. However, the current C4I has limitations whenever a new weapon system is introduced, as it only provides battlefield visualization in a single area focusing on the battlefield situation for each military service. In a future battlefield that expands not only to land, sea, and air domains but also to cyber and space domains, improved command and control decisions will be possible if organic data from various weapon systems is gathered to quickly visualize the battlefield situation desired by the user. In this study, the visualization technology applicable to the future C4I system is divided into map area, situation map area, and display area. The technological implementation of this future C4I system is based on various data and communication means such as 5G networks, and is expected to enable hyper-connected battlefield visualization that utilizes a variety of high-quality information to enable realistic and efficient battlefield situation awareness.

A Study on Improving the Acceptability of Security Policies among Organizational Members: Based on the Health Belief Model (조직구성원의 보안정책 수용성 향상에 관한 연구: 건강신념모델을 바탕으로)

  • Boyoung Kim;Woojong Suh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.5
    • /
    • pp.69-94
    • /
    • 2024
  • In order to improve the security policy compliance performance of an organization, it is crucial for organizational members to have a strong intention to actively accept these policies. Accordingly, this study proposes a research model based on the Health Belief Model, a key theory in the field of health psychology, with the aim of seeking ways to enhance the acceptability of security policies among organizational members. Data were collected through surveys and analyzed using statistical methods. The results of the study revealed that the perceived security threats and the perception of support for security policy compliance at the organizational level significantly influence the acceptance of security policies through the mediating role of perceived benefits from security policy compliance. Additionally, the study demonstrated that the perceived burden of effort and work disruption associated with complying with security policies, i.e., perceived barriers, has a significant negative impact on the acceptance of security policies. This study holds academic significance as it presents a model that effectively analyzes the cognitive mechanisms influencing the acceptance of security policies by applying the Health Belief Model, originally rooted in healthcare. The analysis results and various implications discussed in this study are expected to provide useful information and insights for developing strategies to enhance the acceptance of security policies among organizational members in the future.

How Enduring Product Involvement and Perceived Risk Affect Consumers' Online Merchant Selection Process: The 'Required Trust Level' Perspective (지속적 관여도 및 인지된 위험이 소비자의 온라인 상인선택 프로세스에 미치는 영향에 관한 연구: 요구신뢰 수준 개념을 중심으로)

  • Hong, Il-Yoo B.;Lee, Jung-Min;Cho, Hwi-Hyung
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • Consumers differ in the way they make a purchase. An audio mania would willingly make a bold, yet serious, decision to buy a top-of-the-line home theater system, while he is not interested in replacing his two-decade-old shabby car. On the contrary, an automobile enthusiast wouldn't mind spending forty thousand dollars to buy a new Jaguar convertible, yet cares little about his junky component system. It is product involvement that helps us explain such differences among individuals in the purchase style. Product involvement refers to the extent to which a product is perceived to be important to a consumer (Zaichkowsky, 2001). Product involvement is an important factor that strongly influences consumer's purchase decision-making process, and thus has been of prime interest to consumer behavior researchers. Furthermore, researchers found that involvement is closely related to perceived risk (Dholakia, 2001). While abundant research exists addressing how product involvement relates to overall perceived risk, little attention has been paid to the relationship between involvement and different types of perceived risk in an electronic commerce setting. Given that perceived risk can be a substantial barrier to the online purchase (Jarvenpaa, 2000), research addressing such an issue will offer useful implications on what specific types of perceived risk an online firm should focus on mitigating if it is to increase sales to a fullest potential. Meanwhile, past research has focused on such consumer responses as information search and dissemination as a consequence of involvement, neglecting other behavioral responses like online merchant selection. For one example, will a consumer seriously considering the purchase of a pricey Guzzi bag perceive a great degree of risk associated with online buying and therefore choose to buy it from a digital storefront rather than from an online marketplace to mitigate risk? Will a consumer require greater trust on the part of the online merchant when the perceived risk of online buying is rather high? We intend to find answers to these research questions through an empirical study. This paper explores the impact of enduring product involvement and perceived risks on required trust level, and further on online merchant choice. For the purpose of the research, five types or components of perceived risk are taken into consideration, including financial, performance, delivery, psychological, and social risks. A research model has been built around the constructs under consideration, and 12 hypotheses have been developed based on the research model to examine the relationships between enduring involvement and five components of perceived risk, between five components of perceived risk and required trust level, between enduring involvement and required trust level, and finally between required trust level and preference toward an e-tailer. To attain our research objectives, we conducted an empirical analysis consisting of two phases of data collection: a pilot test and main survey. The pilot test was conducted using 25 college students to ensure that the questionnaire items are clear and straightforward. Then the main survey was conducted using 295 college students at a major university for nine days between December 13, 2010 and December 21, 2010. The measures employed to test the model included eight constructs: (1) enduring involvement, (2) financial risk, (3) performance risk, (4) delivery risk, (5) psychological risk, (6) social risk, (7) required trust level, (8) preference toward an e-tailer. The statistical package, SPSS 17.0, was used to test the internal consistency among the items within the individual measures. Based on the Cronbach's ${\alpha}$ coefficients of the individual measure, the reliability of all the variables is supported. Meanwhile, the Amos 18.0 package was employed to perform a confirmatory factor analysis designed to assess the unidimensionality of the measures. The goodness of fit for the measurement model was satisfied. Unidimensionality was tested using convergent, discriminant, and nomological validity. The statistical evidences proved that the three types of validity were all satisfied. Now the structured equation modeling technique was used to analyze the individual paths along the relationships among the research constructs. The results indicated that enduring involvement has significant positive relationships with all the five components of perceived risk, while only performance risk is significantly related to trust level required by consumers for purchase. It can be inferred from the findings that product performance problems are mostly likely to occur when a merchant behaves in an opportunistic manner. Positive relationships were also found between involvement and required trust level and between required trust level and online merchant choice. Enduring involvement is concerned with the pleasure a consumer derives from a product class and/or with the desire for knowledge for the product class, and thus is likely to motivate the consumer to look for ways of mitigating perceived risk by requiring a higher level of trust on the part of the online merchant. Likewise, a consumer requiring a high level of trust on the merchant will choose a digital storefront rather than an e-marketplace, since a digital storefront is believed to be trustworthier than an e-marketplace, as it fulfills orders by itself rather than acting as an intermediary. The findings of the present research provide both academic and practical implications. The first academic implication is that enduring product involvement is a strong motivator of consumer responses, especially the selection of a merchant, in the context of electronic shopping. Secondly, academicians are advised to pay attention to the finding that an individual component or type of perceived risk can be used as an important research construct, since it would allow one to pinpoint the specific types of risk that are influenced by antecedents or that influence consequents. Meanwhile, our research provides implications useful for online merchants (both online storefronts and e-marketplaces). Merchants may develop strategies to attract consumers by managing perceived performance risk involved in purchase decisions, since it was found to have significant positive relationship with the level of trust required by a consumer on the part of the merchant. One way to manage performance risk would be to thoroughly examine the product before shipping to ensure that it has no deficiencies or flaws. Secondly, digital storefronts are advised to focus on symbolic goods (e.g., cars, cell phones, fashion outfits, and handbags) in which consumers are relatively more involved than others, whereas e- marketplaces should put their emphasis on non-symbolic goods (e.g., drinks, books, MP3 players, and bike accessories).

  • PDF

The Efficient Measurement Method of Buried Heritage by 3D Image Acquisition (3차원 영상취득에 의한 매장문화재의 효율적 측정기법)

  • Lee, Kye-Dong;Lee, Jae-Kee;Jung, Sung-Heuk
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.2
    • /
    • pp.157-163
    • /
    • 2007
  • Recently, industrialization of a country is accelerated and request of society infrastructure is raised so national land development is activity view. Accordingly, the search for a wide-ranging buried heritage do acted in large construction region. Because the buried heritage get buried in land that it is necessary to the precision search and research for a record and a preservation. Until now, Surveying techniques of a historic site have made status map, profile and cross section map through leveling survey, total-station survey and sketch of specialist. So, to solve problems existing relic survey or drawing making method have using digital camera these researches rapidly and economically obtain stereo image of object and present a technique that constructs 3D image model for digital photogrammetry method. Also, these researches construct 3D image model for record and preservation of a historic site through site test and in 3D and graphical express a historic site and support works that produce other maps if we need it. offer base data of GIS (Geographic Information System) to collect and analyze overall, information of a historic site.

Design and Implementation of an Integrated Property Management System on Web using RFID (RFID 기반의 웹 통합자산관리 시스템 설계 및 구현)

  • Seo, Dong-Min;Yeo, Myung-Ho;Cho, Young-Jun;Park, Jun-Ho;Han, Ji-Yeong;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.10
    • /
    • pp.27-36
    • /
    • 2008
  • As ubiquitous computing technologies become the important paradigm for replacing internet based IT paradigm and developing the next generation IT, the research and development on the ubiquitous technologies are progressed actively. One of the core technologies for ubiquitous computing is RFID. In this paper, we design and implement the property management system as a new business item using the RFID since the demands for the u-business model that considers the ubiquitous environment are being grown. There are many properties in the organizations such as companies, schools and so on. Many users share these properties. Thus, these fields require efficient management systems for monitoring a variety of information such as the locations and the detailed information of the properties for the monitoring and lending services. We attach RFID tags to every property and monitor their information with our web-based management system. Our management system provides the monitoring service and the lending service for properties and users.

ODYSSEUS/XMLStore: An XML Storage System for the ODYSSEUS Object-Relational DBMS (ODYSSEUS/XMLStore : 오디세우스 객체관계형 DBMS를 위한 XML 저장 시스템)

  • 이기훈;한욱신;김민수;이종학;황규영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.2
    • /
    • pp.109-122
    • /
    • 2003
  • As XML documents become popular in the World Wide Web, a lot of research is being done on XML storage systems that store and manage XML documents using existing DBMSS. However, most of them have been done in the context of relational DBMSS rather than object-relational DBMSS, which have more powerful modeling capability than relational ones. In this paper, we design and implement an XML storage system, ODYSSEUS/XMLStore, for the ODYSSEUS object-relational DBMS that has been under development at KAIST. First, we analyze the mapping from the structure of XML documents to the relational or object-relational database schema. Second, we propose a method for describing the mapping analyzed using a standard language, XML Schema. Third, we propose a storage structure for storing the mapping information specified by the users in the database. Fourth, we propose detailed algorithms for storing XML documents in the relational or object-relational database based on the mapping information provided by the users.

The Expert Search System using keyword association based on Multi-Ontology (멀티 온톨로지 기반의 키워드 연관성을 이용한 전문가 검색 시스템)

  • Jung, Kye-Dong;Hwang, Chi-Gon;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.183-190
    • /
    • 2012
  • This study constructs an expert search system which has a mutual cooperation function based on thesis and author profile. The proposed methodology is as follows. First, we propose weighting method which can search a keyword and the most relevant keyword. Second, we propose a method which can search the experts efficiently with this weighting method. On the preferential basis, keywords and author profiles are extracted from the papers, and experts can be searched through this method. This system will be available to many fields of social network. However, this information is distributed to many systems. We propose a method using multi-ontology to integrate distributed data. The multi-ontology is composed of meta ontology, instance ontology, location ontology and association ontology. The association ontology is constructed through analysis of keyword association dynamically. An expert network is constructed using this multi-ontology, and this expert network can search expert through association trace of keyword. The expert network can check the detail area of expertise through the research list which is provided by the system.