• Title/Summary/Keyword: systems-theory

Search Result 5,367, Processing Time 0.029 seconds

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.

Identifying Antecedents of Service Innovation: Based on Service-Dominant Logic and Resource-Advantage Theory (서비스 혁신의 선행요인에 관한 연구: 서비스 지배적 논리와 자원 우위 이론을 중심으로)

  • Ryu, Hyun-Sun;Han, Jin Young
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.79-106
    • /
    • 2016
  • Service innovation is one means of gaining an advantage in a highly competitive environment. Although numerous studies have stressed the importance of service innovation, traditional good-dominant logic is still used in service innovation literature. Furthermore, few studies have been conducted on the link between service innovation and its antecedents in terms of service-oriented approach. To fill the gap, this article theoretically and empirically examines service innovation and its antecedents and consequences. Based on service-dominant logic and resource advantage theory, the current study aims to understand the effect of antecedents on service innovation as well as to identify the effect of service innovation on firm performance (i.e., non-financial and financial performance). Three service innovation activities, namely service creation-focused innovation, service delivery-focused innovation, and customer interaction-focused innovation, and four antecedents of service innovation, including human resource management capability, collaboration capability, marketing capability, and information technology capability, are identified based on Den Hertog (2000)'s service innovation framework. By using the empirical data collected from 189 service firms in Korea, this study explores the causal relationship among antecedents, service innovation and firm performance. Findings indicate that human resource management and marketing capabilities influence the three types of service innovation, whereas collaboration and information technology capabilities have a significant effect on both service creation-focused innovation and service delivery-focused innovation. In particular, human resource management capability is strongly related to customer interaction-focused innovation. The three types of service innovation have a positive influence on non-financial performance, whereas service delivery-focused innovation and customer interaction-focused innovation positively influence financial performance. These results support the crucial effects of antecedents, such as human resource management, collaboration, marketing and information technology capabilities, on service innovation.

Empirical Analyses of the Factors Influencing on the Intention to Use Smart Home Services (스마트 홈 서비스 이용의도에 대한 영향요인에 관한 실증적 분석)

  • Lee, Il-Gu;Kim, Sang-Hoon
    • Journal of Service Research and Studies
    • /
    • v.9 no.2
    • /
    • pp.55-76
    • /
    • 2019
  • This study conducted empirical analyses to investigate the factors affecting the intention to use smart home services. Based on the previous relevant studies, the characteristics of smart home service were found to influence on the intention to use smart home service, and four variables(ubiquitous connectivity, reliability, context awareness, and security) concerning the service characteristics could be derived. And referring to the technology acceptance model(TAM), the updated TAM, IS success model, and the theory of reasoned action(TRA), three variables such as perceived ease of use, perceived usefulness and subjective norm were also likely to affect the intention to use smart home service, and the user innovativeness was inferred to play a role of moderating variable. In order to examine the research model and the hypotheses which could describe the relationship of the above mentioned variables, this study surveyed 447 people who were currently using or would use the smart home services, and then tested the hypotheses for 436 valid responses. The results of hypotheses testing showed that reliability, context awareness, and security have a significant effect on perceived usefulness and on perceived ease of use. However, it was found that ubiquitous connectivity significantly affected perceived usefulness but did not affect perceived ease of use. And perceived ease of use, perceived usefulness and subjective norm had significant effect on the intention to use smart home services. Also, user innovativeness as moderating variable was found to significantly influence on the magnitude of the relationship between ubiquitous connectivity and perceived usefulness and on that between reliability and perceived ease of use. This can be interpreted as the findings implying that innovative smart home-service users are likely to feel the smart home-services more useful than ordinary users when the degree of ubiquitous connectivity is higher, and are likely to perceive the use of smart home-services to be easier than ordinary ones when the degree of reliability is higher.

Tracing the Development and Spread Patterns of OSS using the Method of Netnography - The Case of JavaScript Frameworks - (네트노그라피를 이용한 공개 소프트웨어의 개발 및 확산 패턴 분석에 관한 연구 - 자바스크립트 프레임워크 사례를 중심으로 -)

  • Kang, Heesuk;Yoon, Inhwan;Lee, Heesan
    • Management & Information Systems Review
    • /
    • v.36 no.3
    • /
    • pp.131-150
    • /
    • 2017
  • The purpose of this study is to observe the spread pattern of open source software (OSS) while establishing relations with surrounding actors during its operation period. In order to investigate the change pattern of participants in the OSS, we use a netnography on the basis of online data, which can trace the change patterns of the OSS depending on the passage of time. For this, the cases of three OSSs (e.g. jQuery, MooTools, and YUI), which are JavaScript frameworks, were compared, and the corresponding data were collected from the open application programming interface (API) of GitHub as well as blog and web searches. This research utilizes the translation process of the actor-network theory to categorize the stages of the change patterns on the OSS translation process. In the project commencement stage, we identified the type of three different OSS-related actors and defined associated relationships among them. The period, when a master commences a project at first, is refined through the course for the maintenance of source codes with persons concerned (i.e. project growth stage). Thereafter, the period when the users have gone through the observation and learning period by being exposed to promotion activities and codes usage respectively, and becoming to active participants, is regarded as the 'leap of participants' stage. Our results emphasize the importance of promotion processes in participants' selection of the OSS for participation and confirm the crowding-out effect that the rapid speed of OSS development retarded the emergence of participants.

  • PDF

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

An Empirical Study of Social Network Service (SNS) Continuance: Incorporating the Customer Value-Satisfaction-Loyalty Model into the IS Continuance Model (소셜 네트워크 서비스(SNS)의 지속이용의도에 관한 연구: IS 지속이용모델과 고객 가치-만족-충성도 모델의 통합적 접근)

  • Choi, Sujeong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.1-28
    • /
    • 2013
  • Given that smartphone-based social network services (SNS), such as KakaoStory is now being widely used as a way for people to connect and communicate with each other, this study examines key factors leading to the continued use of SNS. People have been using PC-based SNS, such as Cyworld, for years are now using smartphone-based SNS, such as KakaoStory. KakaoStory developed by KakaoTalk has rapidly grown up as the largest smartphone-based SNS in Korea as smartphone penetration increases. It is more difficult for firms to maintain their current users over time in that alternative SNSs satisfying people's new needs are constantly emerging and evolving. In this sense, one of the most challenging issues for SNS firms is how to retain their current users in the long run. However, there are few empirical studies on this issue. Applying the IS continuance model proposed by Bhattacherjee [2001], this study explores key determinants of users' smartphone-based SNS continuance intention. The model suggests that perceived usefulness and user satisfaction are the key determinants of IS continuance intention. However, the model includes only the utilitarian value that users can obtain through the use of smartphone-based SNS, by considering perceived usefulness. Therefore, the study attempts to extend the IS continuance model by considering hedonic and social values simultaneously. More specifically, we consider subjective norms as social value that are proposed by the theory of reasoned action and the theory of planned behavior. We also consider perceived enjoyment as hedonic value that is emphasized as a key factor influencing users' behavior intention and actual behavior, particularly in the context of hedonic IS use. By considering the three values in our model simultaneously, we could offer a deeper understanding of smartphone-based SNS continuance. That is, this study could offer an explanation of how each value is associated with user satisfaction and SNS continuance intention. The customer value-satisfaction-loyalty model can strengthen the assertion that smartphone-based SNS continuance intention is determined by various different types of customer values, such as utilitarian, hedonic, and social ones. Moreover, the model provides a theoretical basis for the assertion that customer values lead to increased loyalty via customer satisfaction. In this regard, we theorize that SNS continuance intention is influenced by users' various values, namely perceived usefulness, perceived enjoyment, and subjective norms, via user satisfaction. To test the proposed research model and hypotheses, we conducted a partial least squares analysis using a total of 253 data collected on the users of smartphone-based SNS (i.e., KakaoStory). The key findings are as follows: First, it has been found that SNS continuance intention considerably depends on user satisfaction. Second, user satisfaction is determined by confirmation, perceived usefulness, and perceived enjoyment. Third, concerning the effects of the three values on SNS continuance intention, only perceived enjoyment regarded as hedonic value was statistically significant. That is, perceived usefulness considered as utilitarian value and subjective norms considered as social value had no effect on SNS continuance intention. Finally, our results indicate that confirmation increases perceived usefulness, perceived enjoyment, and user satisfaction. The results reconfirm the effectiveness of IS continuance model in predicting smartphone-based SNS continuance intention. Moreover, the results demonstrate that perceived enjoyment reflecting hedonic value is the most important predictor of SNS continuance intention. Therefore, it is imperative for firms to meet SNS users' hedonic value to retain them in the long run. Meanwhile, we could not find any empirical evidence to support the assertion that subjective norms are associated with user satisfaction and SNS continuance intention. The results lead us to conclude that when users have enough direct experience in SNS use, subjective norms have no effect on SNS continuance intention. Discussions and implications of the results are provided.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

Comparison of Uptake of Ionic and Tf-bound Fe-59 and Ga-67 in Transformed and Untransformed Cells (변형세포와 비변형세포에서 이온형과 Transferrin 결합형 Fe-59와 Ga-67 섭취율의 비교)

  • Sohn, Myung-Hee;Lee, Young-Hwan;Lee, Sang-Yong;Chung, Gyung-Ho;Han, Young-Min;Kim, Jong-Soo;Choi, Ki-Chul;Yim, Chang-Yeol
    • The Korean Journal of Nuclear Medicine
    • /
    • v.30 no.1
    • /
    • pp.145-151
    • /
    • 1996
  • Pathways both mediated by and independent of transferrin(Tf) and the TfR have been described for the accumulation of iron. Although it is not clear whether the same systems take up iron and gallium, these pathways may suggest the contention that uptake of Ga-67 can, in fact, occur by both Tf-independent and Tf-dependent systems and may share with Fe-59 in part the same mechanism for uptake. The predominant system by which uptake of both radiometals occurs may be different in the degree of the transformation of tumor. Transformed(MMSV/3T3) and untransformed(BALB/3T3) cells were incubated with luM of Ga-67-citrate of Fe-59-chloride for 15 min. at $37^{\circ}C$ in either the presence or absence of Tf. After then, the monolayers were washed with HBSS or PBS, and the cells were solubilized in 1% SDS for gamma well counting and protein determinations. There were similarities, as well as differences, in the pattern of uptake of Fe-59 and Ga-67 presented both in ionic from and as bound to Tf. Both radiometals appeared gain to cells in either ionic or Tf-bound forms. Transformed cells appeared to accumulate more radiometal, either Ga-67 or Fe-59 in the presence of Tf than do the their untransforemd counterparts. Conversly the presentation of either radiometal in ionic form resulted in significantly greater accumulation of metal by the untransformed cells than those transformed. The efficiency for uptake of Ga-67 or Fe-59 in the absence of Tf was greater than for uptake of the Ga-Tf or Fe-Tf. However, the magnitude of difference in efficiency of uptake was greater for Fe-59(10-fold) than for Ga-67 (3-fold). Our results Supports the theory that both Tf-independent and Tf-dependent systems for the uptake of Ga-67 both systems operate oppositely between transformed cells and those untransformed, with uptake by the predominating in transformed cells by the Tf-mediated system and in untransformed cells by the Tf-independent. The uptake of Ga-67 by tumor may share with Fe-59 in part the same mechanism.

  • PDF

Study on Electronic Structures and Properties in High $T_c\;YBa_2Cu_O_{7-x}\;and\;YBa_2Cu_4O_8$ Superconductors (고온 초전도체 YBa$_2 Cu_3O_{7-x}$와 YBa$_2Cu_4O_8$의 전자구조와 성질에 관한 연구)

  • Son Man-Shick;Ha Hyun-Shick;Paek U-Hyon;Lee Kee-Hag
    • Journal of the Korean Chemical Society
    • /
    • v.35 no.4
    • /
    • pp.316-323
    • /
    • 1991
  • We calculated a difference between the YBa$_2Cu _3O_{7-x}$ superconductor (123 system) of critical temperature, 95 K and the YBa$_2Cu_4 O_8$ superconductors (124 system) of critical temperature, 80 K in Y-system superconductors using Extended Huckel Theory (EHT). The valence electron population (VEP), reduced overlap population (ROP) and net charge for the charged cluster models relating to the layer and the chain in 123 and 124 systems were compared. The VEPs of Cu atom in the layer of 123 and 124 systems populated d$_{z^2}$ orbital more than d$_{x^2-y^2}$ orbital, and in the chain of 123 and 124 systems populated d$_{y^2-z^2}$ orbital more than d$_{z^2}$ orbital. The ROP of the Cu(1)-O(1) in the layer of 123 system was larger than the value of the Cu(1)-O(2), but the ROP of the Cu(1)-O(2) in the layer of 124 system was larger than the value of the Cu(1)-O(1). The ROP of Cu(2)-O(4) in the chain of 123 and 124 systems were larger than the value of the Cu(2)-O(3). In 123 system the net charge values of the Cu in the layer was larger than the value of the Cu in the chain. However, in 124 system the net charge value of the Cu in the chain was larger than the value in the layer.

  • PDF

Institutional approaches in geography -Institutional changes in the Korean financial system- (지리학에서 제도적 접근법에 관한 연구 -한국금융부문의 제도적 변 화를 사례로-)

  • Choi, Jae Heon
    • Journal of the Korean Geographical Society
    • /
    • v.30 no.4
    • /
    • pp.364-388
    • /
    • 1995
  • Even though rarely recognized as a separate approach, the institutional approach in geography is defined as an attempt to seek an explanation of the phenomena of geographical interest through focusing on the effects of institutional structure and actions. It can provide interdisciplinary links with other works and can offer complementary explanations for geographical interests. The concerns for institutions in geography can be found in early studies, the study of the state, the managerial approach, and the regulation approach. The Korean financial systems can provide good examples to apply institutional concepts into creating spatial outcomes, as it has been regarded as a useful tool to promote Korean economic development. Behind the current spatial pattern of financial systems, four different stages of institutional changes are identified in Korea. Each stage has different institutional features reflecting unique spatial implication.

  • PDF