• Title/Summary/Keyword: USER MANAGEMENT

Search Result 6,203, Processing Time 0.028 seconds

A Study on Factors causing the employer's Resistance (정보시스템 사용에 대한 종업원들의 저항에 관한 연구)

  • Lee, Jae-Jin;Park, Jong-Hyuk
    • Management & Information Systems Review
    • /
    • v.23
    • /
    • pp.233-260
    • /
    • 2007
  • Now a day, Information and its related system has been more important in our competitive environment. In this situation, there is also an important thing that we must take into consideration, that's the employer's resistance. Until now we have little material concerning the issue, user's resistance. Owing to that, it's a little hard to study the user's resistance against the IS. Dealing with the resistance effectively helps companies save a great deal of cost and build the information system successfully. This paper takes the Markus's theories about user's resistance. According to the theories, there are three keys theories affecting resistance. To sum this, people-oriented theory, system-oriented theory and Interaction theory. To complement the theories, this paper includes another theories related with resistance and takes total seven factors causing user's resistance. Among these seven factors, four factors have a meaningful effect on the user's resistance, that is, Self-efficacy, System Complexity, Threat of the one's status and politics and System Staff's service quality. Managers and system-related company should keep it in mind very carefully, and I hope they make the best use of the result of this study.

  • PDF

Analysis of Privacy Vulnerability Caused by Location-Based Service (위치기반 서비스에 따른 개인정보보안 취약점의 사례분석)

  • Choi, Hee Sik;Cho, Yang Hyun;Kim, Jung Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.151-159
    • /
    • 2014
  • Recently, spread of large amount Smartphones made users to download location-based service applications, which provided by application developers. These location-based service applications are convenient tool for users. Location-based service use technology to find location of user and provide information of user's location. Leakage of information of user's location and expose of privacy life raised new controversy. In this thesis, it will analyze relations of increase of Smartphone market, usage of Location-based service and severity of personal information leakage. Also, it will analyze examples of user's case of damage which caused by leakage personal information and find solutions to reduce damage of personal information leakage. In research, it will find cases of damage that cause by Location-based service. Also it will analyze and research cases of damage and present with graph and chart. In conclusion, to reduce and prevent from damage which caused by leakage personal information, it is important that users and application developers to realize danger of private and personal information leakage. Also, user's personal information must deal with cautiously and application developers have to research and develop the application with powerful security.

An Effect of Information System Quality of BRIS on Perceived Usefulness and User's Continuous Use Intention

  • Kim, Sang-tae;Lee, Seung-hyeon;Lee, Kang-o
    • Agribusiness and Information Management
    • /
    • v.11 no.2
    • /
    • pp.16-24
    • /
    • 2019
  • BRIS has been established by the Ministry of Agriculture, Food and Rural Affairs since 2011 under Article 21 of the Act on the Preservation, Management and Utilization of Agricultural Life Resources. It is an information service that provides information related to agricultural life resources in connection with the Rural Development Administration, the Forest Service, and Korea Seed & Variety Service, Agricultural Resources and Agricultural and Livestock Quarantine Headquarters. The purpose of this study is to evaluate how the users assess the information system quality (information quality, system quality) for the current Bio Resource Information Service (BRIS). Ultimately, the structural equation modeling analyzes the causal relationship between each variable and how it responds to the user's continuous use intention. As a result, information quality among information system quality and information quality among system quality used as the main variables for the evaluation of BRIS were statistically positively influenced by users' perceived usefulness, while system quality It has been analyzed to have a positive effect on the sustained use intention. The user's continuous use intention is positively influenced by the information system quality and perceived usefulness at a statistically significant level. Especially, the perceived usefulness plays a role in mediating the user's continuous use intention.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

The influence of the IoT based healthcare user's experience value on the usage and continuous use intention -Focused on Xiaomi Mi band user in china- (IoT기반 헬스케어 사용자 경험가치가 사용량과 지속적 사용의도에 미치는 영향에 관한연구 -중국내 샤오미 미밴드 사용자를 중심으로-)

  • Shang, Meng;Shin, Yong Ho;Lee, Chul Woo
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.3
    • /
    • pp.689-706
    • /
    • 2016
  • Purpose: This study identifies causality in IoT-based healthcare user's experience(playful experience, economical experience), trust, usage, degree of dependence and continuous use intention, especially focused on chinese case. Methods: Face to face interviews was conducted for people who has experience in the use of the Xiaomi Mi band. This study used Partial Least Square(PLS) method with the questionnaires from the interview. Results: IoT-based healthcare users taking playful experience have a strong trust in a positive economic experiences. Also, the user recognizing the experience as an economic one shows stronger intention to use continuously. Conclusion: By getting healthcare users have more economic experience, they have continuous use intention of healthcare product. The empirical findings can be applied to the related companies strategy building.

The Attitude Characteristics of Consumers using Internet & e-Biz - A Comparative Analysis on Korea & Japan's auction websites - (소비자의 Internet 및 e-Biz 이용에 대한 태도적 특성 -한국과 일본의 옥션 사이트 비교분석-)

  • So, Youn-Koung;Park, Sun-Young;Kim, Eu-Gene
    • Journal of Family Resource Management and Policy Review
    • /
    • v.9 no.4
    • /
    • pp.145-159
    • /
    • 2005
  • The main purpose of this study is to statistically analyze the difference between Korea and Japan's consumer attitudes towards e-commerce through the use of auction websites. Here are the results. First, there was a significant difference between the Korean user's attitude and the Japanese user's attitude towards Internet usage; especially, the Japanese user's attitude towards convenience showed a much higher degree than that of the Korean user. Second, Korean users preferred brand image to price, while Japanese users preferred price to brand image. Third, both the Korean users and the Japanese showed a positive relationship between Internet usage and the use of e-commerce. In contrast to the Korean user's frequent use of the bulletin board, Japanese users tended to use the bulletin board less frequently.

  • PDF

A DEA-Based Portfolio Model for Performance Management of Online Games (DEA 기반 온라인 게임 성과 관리 포트폴리오 모형)

  • Chun, Hoon;Lee, Hakyeon
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.4
    • /
    • pp.260-270
    • /
    • 2013
  • This paper proposes a strategic portfolio model for managing performance of online games. The portfolio matrix is composed of two dimensions: financial performance and non-financial performance. Financial performance is measured by the conventional measure, average revenue per user (ARPU). In terms of non-financial performance, five non-financial key performance indicators (KPIs) that have been widely used in the online game industry are utilized: RU (Register User), VU (Visiting User), TS (Time Spent), ACU (Average Current User), MCU (Maximum Current User). Data envelopment analysis (DEA) is then employed to produce a single performance measure aggregating the five KPIs. DEA is a linear programming model for measuring the relative efficiency of decision making unit (DMUs) with multiple inputs and outputs. This study employs DEA as a tool for multiple criteria decision making (MCDM), in particular, the pure output model without inputs. Combining the two types of performance produces the online game portfolio matrix with four quadrants: Dark Horse, Stop Loss, Jack Pot, Luxury Goods. A case study of 39 online games provided by company 'N' is provided. The proposed portfolio model is expected to be fruitfully used for strategic decision making of online game companies.

Implementation of a Performance Monitor using Object Oriented Concept (객체 지향 개념을 적용한 성능 모니터의 구현)

  • Kim, Yong-Soo;Lee, Keum-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.2038-2059
    • /
    • 1997
  • The physical attributes of a computer, such as processor speed, size and access time of memory, and I/O bandwidth, are fixed when the computer is delivered to the user. Under these conditions, the performance of a multi-process system where multiple processes share various resources can be enhanced by monitoring and controlling the relationship between the user processes and the system resources. This paper applies object oriented concept to the performance management and suggests a standard for the management. Resource managers and user processes are defined as managed object and a performance manager is defined as a managing object. A protocol between the user processes and performance manager is designed and attributes and methods of the objects are also defined. Through the standardization, the user processes and the performance manager can be developed independently and the system's performance can also be collectively managed.

  • PDF

A Study on Personalized Recommendation Method Based on Contents Using Activity and Location Information (이용자 이용행위 및 콘텐츠 위치정보에 기반한 개인화 추천방법에 관한 연구)

  • Kim, Yong;Kim, Mun-Seok;Kim, Yoon-Beom;Park, Jae-Hong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.81-105
    • /
    • 2009
  • In this paper, we propose user contents using behavior and location information on contents on various channels, such as web, IPTV, for contents distribution. With methods to build user and contents profiles, contents using behavior as an implicit user feedback was applied into machine learning procedure for updating user profiles and contents preference. In machine learning procedure, contents-based and collaborative filtering methods were used to analyze user's contents preference. This study proposes contents location information on web sites for final recommendation contents as well. Finally, we refer to a generalized recommender system for personalization. With those methods, more effective and accurate recommendation service can be possible.