Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 10, Issue 4 - Nov 2005
Volume 10, Issue 3 - Aug 2005
Volume 10, Issue 2 - May 2005
Volume 10, Issue 1 - Feb 2005
Selecting the target year
A Study on the Factors Affecting Customer's Intention to Use the Mobile Game Service
Kim Hyo-Jeung ; Han Chang Hee ; Suh Bomil ; Kim Keun-Chong ;
The Journal of Society for e-Business Studies, volume 10, issue 1, 2005, Pages 1~19
Recently, the mobile game industry is explosively extending and advancing. Nevertheless, although research on IT acceptance has been actively performed, the effective studies have not been accomplished in the acceptance of mobile game. This study, therefore, explores the factors affecting customer's intention to use mobile game. Five external factors(service quality, social influence, instant connectivity, self-innovativeness, and self-efficacy) are proposed to test the several hypotheses. The factors are classified to three dimensions - system, individual, and society. The research model is based on various studies on TAM(Technology Acceptance Model) and mobile service. A survey of mobile game users collected 270 cases, and we used 261 cases for statistical analyses. The analyses show that service quality, instant connectivity, self-innovativeness, and self-efficacy have an indirect effect on the intention to use through perceived usefulness and perceived ease of use. We provide the important factors that should be focused on when an enterprise develops and promotes new mobile game products.
An Exploratory Investigation of On-line Organizational Structure Design for the E-Commerce Firm
Yoon, Jung-Hyeon ;
The Journal of Society for e-Business Studies, volume 10, issue 1, 2005, Pages 21~39
This paper focused on exploratory testing the organizational management area by examining conceptualized relationships between e-commerce usage type and organizational structure. The research model consists of three e-commerce usage type such as buy-side, internal, sell-side activities and four organizational structure dimensions like decentralization, specialization, formalization, and administration intensity. An interview and an e-mail survey of managers were used to obtain information on the variables relevant to e-commerce activities and organizational structure. The data resulted in response from 58 companies. Major findings of this research are summarized as follows: buyer related e-commerce activities is positively relate to the administrative intensity and the specialization, internal process is positively relate to the formalization, while customer related e-commerce is directly relate to the decentralization and the specialization in terms of organizational management.
A Study on the Information Modeling of Defense R&D Process Using IDEF Methodology
Kim, Chul-Whan ;
The Journal of Society for e-Business Studies, volume 10, issue 1, 2005, Pages 41~60
IDEF(Integrated Definition) method, a standard methodology of CALS process modelling, was applied to the weapon system R&D process to provide information modelling by analysing about goal, input, output and constraints in the R&D process. The information to be managed in R&D institutes was identified by using SmartER which is the automation program of IDEF1/1X and obtained information modelling for TO-BE model. The work process of weapon system R&D consists of the concept study phase, the exploration development phase, the system development phase, the prototype manufacturing phase, and the report writing of R&D results phase. The information modelling of weapon system R&D is the R&D work process with information sharing by means of IWSDB Since IDEF is suitable for large scale system development like weapon system R&D, further studies on IDEF would be required to achieve the goal of defense CALS.
Efficient Execution Method for Business Process Management using TOC Concepts
Rhee Seung-Hyun ; Bae Hyerim ; Won Hyungjun ; Kim Hoontae ; Kang Suk-Ho ;
The Journal of Society for e-Business Studies, volume 10, issue 1, 2005, Pages 61~80
Business Process Management (BPM) System is a software system to support an efficient execution, control and management of business processes. The system automates complex business processes and manages them effectively to raise productivity. Traditional commercial systems mainly focus on automating processes and do not have methods for enhancing process performances and task performer's efficiency. Therefore, there is room for enhancement of task performers' productivities and efficiency of business processes. In this paper, we propose a new method of executing business processes more efficiently in that a whole process is scheduled considering the degree of participants' workload. The method allows managing the largest constraints among constituent resources of the process. This method is based on the DBR (Drum-Buffer-Rope) in TOC (Theory of Constraints) concepts. We first consider the differences between business process models and DBR application models, and then develop the modified drum, buffer and rope. This leads us to develop BP-DBR (Business Process-DBR) that can control the proper size of task performers' work list and arrival rate of process instances. Use of BP-DBR improves the efficiency of the whole process as well as participants' working condition. We then carry out a set of simulation experiments and compare the effectiveness of our approach with that of the scheduling techniques used in existing systems.
A research on an Evaluation Framework of BPM
Kim Hoontae ; Lee Yong-Han ;
The Journal of Society for e-Business Studies, volume 10, issue 1, 2005, Pages 81~101
Dynamic changes of the recent business environment draw more attention to Business Process Management (BPM). In this research, we derive a comprehensive BPM framework, define the functional and technical requirements, and classify the requirements into the framework. Based on the framework we suggest a standard procedure for BPM planning and implementation along with critical considerations. In addition, we propose an evaluation framework, which includes a comprehensive checklist and the evaluation method. The proposed evaluation framework can be used as an evaluator's useful reference.
Migration Strategies for the EDI Company to Web-based e-Business Frameworks
Kim Minsoo ; Kim Dongsoo ; Kim Hoontae ; Yoon Jung-Hee ;
The Journal of Society for e-Business Studies, volume 10, issue 1, 2005, Pages 103~120
The purpose of this research is to provide strategic guidelines for EDI transaction companies to migrate from EDI system to Web-based e-Business frameworks such as ebXML, RosettaNet and Web Services. Due to various limitations of EDI and evolution of Web technologies, a lot of firms want to adopt Internet based B2B standards However, they are seeking ways of migrating from EDI to open and public B2B frameworks smoothly not giving up existing EDI system at a time. Therefore, it is very important to provide migration strategies and guidelines for companies to migrate from EDI system to Web-based B2B frameworks. The strategic guidelines provided in this paper can be used as a practical guidance in developing migration strategies of EDI companies.
An Effective Authentication in Mobile Ad Hoc Networks
Kim Yoon-Ho ;
The Journal of Society for e-Business Studies, volume 10, issue 1, 2005, Pages 121~134
The MANET has many problems in security despite of its many advantages such as supporting the mobility of nodes, independence of the fixed infrastructure, and quick network establishment. In particular, in establishing security, the traditional certification service has many difficult problems in applying to the MANET because of its safety, expandability, and availability. In this paper, a secure and effective distributed certification service method was proposed using the Secret Sharing scheme and the Threshold Digital Signature scheme in providing certification services in the MANET. In the proposed distributed certification service, certain nodes of relatively high safety among the mobile nodes consisting of the MANET, were set as privileged nodes, from which the process of issuing a certification started. The proposed scheme solved problem that the whole network security would be damaged by the intrusion to one node in the Centralized Architecture and the Hierarchical Architecture. And it decreased the risk of the exposure of the personal keys also in the Fully Distributed Architecture as the number of the nodes containing the partial confidential information of personal keys decreased. By the network simulation, the features and availability of the proposed scheme was evaluated and the relation between the system parameters was analyzed.