• Title/Summary/Keyword: use of information technology

Search Result 8,807, Processing Time 0.037 seconds

기업의 경쟁전략과 정보비중이 조직 구성원의 통신기술 이용에 미치는 영향

  • Park Sang Hyeok;Jo Nam Jae;Kang Tae Gyeong
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2004.05a
    • /
    • pp.202-213
    • /
    • 2004
  • An effective use of information and communications technology is thought of as critical for achieving corporate competitiveness. This study identifies patterns of corporate use of communications technology, and examines how the use of those technologies is associated with business strategies and the level of information intensity. A survey study on a sample of Korean corporations shows that the use of communications technology is closely related both to business strategy and information intensity, and that communications technologies can be divided into two types in terms of their usage pattern. The structured communication technology is found to be related to the tools and services that support structured tasks, and the The unstructured technology to the tools the use of which is less structured and more flexible. Cost-based strategy is found to be closely related to the use of structured communication technology, while differentiation strategy is closely related to the use of unstructured communication technology.

  • PDF

A Study on the Effect of Social Contribution of reCAPTCHA Technology on the Continuance Intention to Use (reCAPTCHA 기술의 사회공헌성이 지속사용의도에 미치는 영향에 관한 연구)

  • Yoon, Seong Jeong;Kim, Min Yong
    • Journal of Information Technology Services
    • /
    • v.15 no.2
    • /
    • pp.107-123
    • /
    • 2016
  • The purpose of this study is to find the continuance intention to use for reCAPTCHA technology which has information security and social contributions (decrypting archives) according to the user's pro-social level. In this research, reCAPTCHA technique generally gives users to information security and decrypting archives. However, as a result of preliminary survey, most users were not even aware of information security and social contributions (decrypting archives) functions. Therefore, in this research, we will measure with two kinds of focus. The first is the assumption that there will be also a difference in the continuance use depending pro-social level of the user of information technology, second we explain only the function of information security to the first group as well as decrypting archives to the second group. Generally, pro-social means that degree of understanding and supporting to the other people's interest, actions, needs, help, and care. In this research, we assume that if users have a low level of others care, they might evaluate that reCAPTCHA technology's social contributions is low. While they have a high level of others care, they recognize reCAPTCHA technology's social contribution is high and then they tend to use this technology continuously. Through this research, we finally find the most efficient way to increase the degree of continuance use of information technology.

Identifying the Determinants and the Dynamic Characteristics of ICT Non-Use: A Qualitative Study by Grounded Theory Methodolgy (정보기술 비사용의 결정요인과 동태적 성격의 규명: 근거이론방법론에 의한 질적 연구)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.1-20
    • /
    • 2018
  • Purpose The purpose of this study is to identify the determinants of non-use and the dynamic nature of non-use by the qualitative research methodology, grounded theory methodology, as part of identifying the nature of non-use. Design/methodology/approach We applied the grounded theory methodology to a total of 23 college students, including non-users who are not currently using them, users with low intention to use them, and users with high intention to use. We extracted the codes related to the use and proposed the non-use dynamics conversion process based on the coding results. Findings First, the use of information technology can also promote the frequency of use, but can also lead to the use of negative attitudes which would fall in the state of non-use. Second, the user may have both positive and negative attitudes toward the current information technology. Third, if usage is dominated by habits, it is not so easy to change persistent use into an unused state. Fourth, factors that determine the use of specific information technology can be a factor in determining nonuse. This study has contributed to understand the essence of non - use as well as the nature of use, overcoming limitations of quantitative research approach and confirming possibility of grounded theory method in information system research.

The Effects of Information System Architecture and Organization Structure on the Use of e-Business in Korean Companies (정보시스템 기술 및 관리구조가 e-비즈니스 활용정도에 미치는 영향에 관한 연구)

  • 윤중현
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.2
    • /
    • pp.1-18
    • /
    • 2003
  • Recently, e-business has very much attention in the management fields because it is expected to fundamentally change the way many business compete. Business that don't understand the changes and that can't change their operating model in time will be at a disadvantage. Information technology infrastructure and its management are key components of e-business The purpose of this study was to investigate the effects of information technology infrastructure and its management to the type of information systems used and the use of e-business. A total of 56 Korean firms responded to the survey instrument. There was indirect effect to the use of e-business from the information technology structure via communication capacity and direct effect from management type. The study also found that firms with less centralized forms of information technology were more frequent users of e-business, Firms that have more freedom in information technology decision making tended to be users of the new technology and take advantage opportunities that exits on the information technology.

  • PDF

A Study on the Development for the Real Estate Appraisal Information System (부동산 감정평가정보체계 구축을 위한 기초적 연구)

  • 김한수
    • Journal of the Korean housing association
    • /
    • v.14 no.5
    • /
    • pp.153-161
    • /
    • 2003
  • As development of Information Technology and Internet are available, many industries are creating a lot of values through extension from physical space to virtual reality. However, use of Information Technology and Internet in real estate appraisal is unprepared. As a result, There is necessity of appraisal information system development based on GIS and Internet for pratical use of Information Technology. Therefore, in this study, presented development model which present a basic design of appraisal information system to fulfill information request in appraisal and use GIS and Internet.

Visions and the Use of a Community Information and Communication Technology (ICT): Assessing the Effectiveness of the Delivery of Community Network Services

  • Kwon, Nahyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.1
    • /
    • pp.377-397
    • /
    • 2004
  • This study investigated the use of community information and communication technologies in light of its dual visions (i.e., serving as an affordable Internet service provider and a community building tool). Surveying the randomly selected users of a community network (n = 213), this study examined the influence of the community features on service use compared to that of Internet features. The present study found that the respondents were using the service mainly for general Internet features, such as email and web access. More than two-thirds of the respondents did not recognize community contents as available service. Community features of the service were found as significant predictors of use only among people who were aware of community contents but not among people who were not. Nonetheless, there was no difference in the amount of use between the two groups, indicating that the awareness of community contents itself did not increase use. Findings suggest that the service providers did not fully communicate the community aspect of the service with the users although the very aspect distinguishes the service from other Internet services.

  • PDF

Understanding the Employee's Intention to Use Information System: Technology Acceptance Model and Information System Success Model Approach

  • MARTONO, S.;NURKHIN, Ahmad;MUKHIBAD, Hasan;ANISYKURLILLAH, Indah;WOLOR, Christian Wiradendi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.1007-1013
    • /
    • 2020
  • This study aims to understand the determinant of the employee's intention to use information system within the framework of the Technology Acceptance Model (TAM) and Information System Success Model (ISSM). This paper also aims to examine the influence of ISSM dimension on the perceived usefulness and the perceived ease of use. The research respondents were 248 employees of Universitas Negeri Semarang (UNNES) who are users of the Financial Information System (SIKEU). Data was obtained using a questionnaire that was distributed online via Google form. The data analysis method used is Structural Equation Model (SEM) analysis using the Warp-PLS software. The results showed that the dimensions of TAM (perceived ease of use and perceived usefulness) had a positive and significant influence on the employee's intention to use SIKEU. The ISSM dimension (system quality and information quality) also had a significant influence, although other ISSM dimensions (service quality) had not been proven to have a significant influence on the employee's intention to use SIKEU. Moreover, the results showed that the employee's intention to use is a determinant of SIKEU's actual usage. Perceived ease of use was significantly determined by system quality, information quality, and service quality. In addition, the perceived usefulness was significantly determined by system quality and information quality.

Ethical Issues and Information Communication Technology (ICT) Use in the New Era

  • Otulugbu, Dumebi;Ogunobo, Marvellous-Mary
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.3
    • /
    • pp.19-29
    • /
    • 2022
  • The new age is characterised by information communication technology, where computers, laptops, mobile gadgets such as palmtops, tablets, mobile phones and the internet have made their way to every sphere of life from our domestic environments such a homes, small retail shops, banks to large industries and the world at large. Over time, so many questions about the ethical use of Information and Communication Technology (ICT) have emerged on who has access to what technology and the use of it and like every other technological invention. This paper will look at the morality involved in making use of ICT to promote ethical use of data or information in a virtual environment. ICT also possesses both positive and negative impacts; the questions that these impacts raise are what this piece attempts to answer, providing global scrutiny to these ethical issues, situations and questions; and providing recommendations in line with global best practices.

Proxy based Access Privilige Management for Tracking of Moving Objects

  • Cha, Hyun-Jong;Yang, Ho-Kyung;Song, You-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.225-232
    • /
    • 2022
  • When we drive a vehicle in an IoT environment, there is a problem in that information of car users is collected without permission. The security measures used in the existing wired network environment cannot solve the security problem of cars running in the Internet of Things environment. Information should only be shared with entities that have been given permission to use it. In this paper, we intend to propose a method to prevent the illegal use of vehicle information. The method we propose is to use attribute-based encryption and dynamic threshold encryption. Real-time processing technology and cooperative technology are required to implement our proposed method. That's why we use fog computing's proxy servers to build smart gateways in cars. Proxy servers can collect information in real time and then process large amounts of computation. The performance of our proposed algorithm and system was verified by simulating it using NS2.

Rethinking Information Technology-Organizational Structure Relationship (정보기술과 조직구조의 관련성에 대한 재고찰)

  • Seong, Tae-Gyeong
    • Asia pacific journal of information systems
    • /
    • v.5 no.1
    • /
    • pp.129-163
    • /
    • 1995
  • Past research linking information technology and organizational structure has been inconclusive and contradictory. The purpose of this study is to resolve some of this confusion by taking into consideration one theoretical issue and three methodological problems. The one theoretical issue is an assessment of the importance of environment as a key external variable constraining both organizational structure and the use of information technology. To date, there has been no systematic, empirical research on the conceptual linkage among all three of these variables. The three methodological issues concern measurement problems associated with (1) controlling for different levels of analysis, (2) establishing a clear operationalization of information technology, and (3) differentiating institutional and questionnaire approaches to data collection. The research results in four conclusions. First, data confirm the environment as a key external variable in the linkage between information technology and organizational structure. Second, three central dimensions of information technology are identified: Growth of Capacity, extensiveness of information technology use, and information technology sophistication. Third, in order to maximize the explanatory power of information technology on other organizational constructs, it is necessary to differentiate between the actual use of information technology as opposed to the mere presence of information technology. Fourth, carefully designed questionnaire measures reveal no significant differences from institutional measures in the assessment of key organizational constructs.

  • PDF