Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 12, Issue 4 - Nov 2007
Volume 12, Issue 3 - Aug 2007
Volume 12, Issue 2 - May 2007
Volume 12, Issue 1 - Feb 2007
Selecting the target year
A Feature-Oriented Requirement Tracing Method with Value Analysis
Ahn, Sang-Im ; Chong, Ki-Won ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 1~15
Traceability links are logical links between individual requirements and other system elements such as architecture descriptions, source code, and test cases. These are useful for requirements change impact analysis, requirements conflict analysis, and requirements consistency checking. However, establishing and maintaining traceability links places a big burden since complex systems have especially yield an enormous number of various artifacts. We propose a feature-oriented requirements tracing method to manage requirements with cost benefit analysis, including value consideration and intermediate catalysis using features. Our approach offers two contributions to the study of requirements tracing: (1)We introduce feature modeling as intermediate catalysis to generate traceability links between user requirements and implementation artifacts. (2)We provide value consideration with cost and efforts to identify traceability links based on prioritized requirements, thus assigning a granularity level to each feature. In this paper, we especially present the results of a case study which is carried out in Apartment Ubiquitous Platform to integrate and connect home services in an apartment complex in details.
A improved authentication protocol for the forward security
Shi, Wenbo ; Jang, In-Joo ; Yoo, Hyeong-Seon ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 17~27
This paper proposes a key distribution and authentication protocol between user, service provider and key distribution center (KDC). This protocol is based on symmetric cryptosystem, challenge-response, Diffie-Hellman component and hash function. In the proposed protocol, user and server update the session key under token-update operation, and user can process repeated efficient authentications by using updated session keys. And another merit is that KDC needs not to totally control the session key between user and server in proposed protocol. Even an attacker steals the parameters from the KDC, the attacker still can not calculate session key. According to the comparison and analysis with other protocols, our proposed protocol provides good efficiency and forward secure session key.
A Secure Protocol for the Electronic Auction
Shi, Wenbo ; Jang, In-Joo ; Yoo, Hyeong-Seon ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 29~36
Recently, Jaiswal et al. proposed a protocol to improve the multi-agent negotiation test-bed which was proposed by Collins et al. Using publish/subscribe system, time-release cryptography and anonymous communication, their protocol gives an improvement on the old one. However, it is shown that the protocol also has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, anonymity disclosure, collusion between customers and a certain supplier. So proposed protocol reduces DOS attack and avoids replay data attack by providing ticket token and deal sequence number to the supplier. And it is proved that the way that market generates random number to the supplier is better than the supplier do by himself in guaranteeing anonymity. Market publishes interpolating polynomial for sharing the determination process data. It avoids collusion between customer and a certain supplie
Study on How Service Usefulness and Privacy Concern Influence on Service Acceptance
Lee, Zoon-Ky ; Choi, Hee-Jai ; Choi, Seon-Ah ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 37~51
As the highly improved Internet and information technology has led to the diversification of users' demands, personalization service attract lots of attention as a means to meet highly diversified demand of users. However, personalization service costs a lot. Also concerns over a possible violation of privacy have been raised since the service uses technology to find out the users' profiles. This research studies the advantages individuals acquire from personalization service and how privacy concern influences service acceptance. Research on related documents and information gathering from e-commerce sites derived six representative types of service. Questionnaires were utilized to research privacy concern according to services, service usefulness, and service acceptance. As expected, privacy concern has a negative relation to acceptance while service usefulness has a positive relation to it, thereby resulting in an offset between two variables. Moreover, they play a different role depending on what kinds of service or in formation should be provided. The results derived from this paper will help the e-commerce sites provide personalization service by collecting personal information while protecting users' privacy.
Understanding the Adoption of Telecommunications-Broadcasting Convergence Services : The Case of DMB
Kim, Eun-Jin ; Ahn, Joong-Ho ; Park, Chul-Woo ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 53~69
The convergence of telecommunications and broadcasting is representative of many innovative technologies in the digital environment. It has recently been emphasized as an alternative solution to overcome the on-going saturation of the telecommunications and broadcasting markets. Despite this effort, however, growth of the market and its related services cannot reach prior expectations due to lack of understanding on the real user-end. Telecommunications technology used to serve its instrumental purpose and broadcasting services usually support entertainment functions which in themselves have an inherent value. Our research questions what factors influence users' attitude and decision-making when it comes to using telecommunications-broadcasting convergence services. The research model of this paper proposes intrinsic motivator focusing on hedonic value, extrinsic motivator having utilitarian values, and perceived control as internal and external conditions. To verify our model empirically, we selected the DMB technology which is a good example of distinctive telecommunications-broadcasting convergence service.
Design and Implementation of an Intelligent Agent for RFID-based Home Network Management
Kim, Ju-Il ; Lee, Woo-Jin ; Chong, Ki-Won ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 71~84
The architecture for RFID-based home network and an intelligent agent for efficiently managing home network are proposed in this paper. The agent consists of six modules-Agent Manager, Data Collector, Execution Controller, Data Storage, Data Queue and User Interface. Agent Manager manages the tasks of modules, and Data Collector collects the data from home appliances through the RFID readersm Execution Controller determines the operations home appliances according to the conditions of the home environment and transfers the operations to the appliances through the RFID readers. Moreover, Data Storage keeps the data which is necessary for the operations of the agent, and Data Queue temporarily stores the data which is collected from home appliances. Lastly, User Interface provides the graphical user interface in which an individual can directly control and monitor the home network. The proposed intelligent agent autonomously learns the circumstances of a home network by analyzing the data about the state of home appliances, and controls home appliances according to the preference of the user. Therefore, the user can live in the best-suited home environment without direct appliance control if he/she performs home networking through the agent.
Conjoint Analysis of Online Content : A Case of Video on Demand Service
Lee, Jung-Woo ; Lee, Moon-Kyu ; Choi, Hong-Joon ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 85~98
This study uses conjoint analysis technique to calculate relative importance of each attribute of a specific online content: video-on-demand (VoD) services of TV soap operas. A series of interviews were conducted to identify and derive critical attributes for VoD services. Conjoint instrument was constructed using attributes identified and administered among actual viewers. Price, genre, additional service, and actors were found to be the most highly valued attributes of the VoD services. While price was the most valued attribute for female viewers, it was genre for male viewers. The result suggests that these attribute differentiation would lead to more profitable pricing scheme, and development of additional services may be critical for online content business' success.
Space Reengineering and Amended UML Approach to Requirement Analysis for Ubiquitous Smart Space Development
Kwon, Oh-Byung ; Lee, Nam-Yeon ; Sim, Jae-Mun ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 99~125
Recently, as the development of Ubiquitous Smart Space (USS) such as U-City is proliferating, preparing a development methodology dedicated to USS characteristics has become one of the crucial issues to increase the productivity of the USS projects. However, since the legacy development methodologies such as traditional UML do not consider the critical components of ubiquitous computing space such as context-awareness, service oriented architecture and multi-agent communication, they are not optimized for USS analysis and design. Hence, the purpose of this paper is to propose a USS-sophisticated development methodology. To do so, a hybrid approach, BPR-USS for space reengineering and UML-USS by amending UML with corresponding toolkit based on StarUML has been implemented. To show the feasibility of the approach described in this paper, an illustrative example with an actual USS development project for a multiplex space in Seoul is shown.
RFID Access Control Using Extended Usage Control Model
Shin, Woo-Chul ; Yoo, Sang-Bong ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 127~144
This paper describes an Security Manager that integrally manages the Information Service related to RFID middleware, Object Name Service, and Web Service for upper level applications. In order to provide the access control of distributed RFID objects, Single-Sign-On has been implemented by extending existing UCON (Usage Control) model and SAML (Security Assertion Markup Language) assertions. The security technology of distributed RFID systems can be included in middleware and protect RFID information. In the future, it can be also applied to ubiquitous sensor networks.
Services Identification based on Use Case Recomposition
Kim, Yu-Kyong ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 145~163
Service-Oriented Architecture is a style of information systems that enables the creation of applications that are built by combining loosely coupled and interoperable services. A service is an implementation of business functionality with proper granularity and invoked with well-defined interface. In service modeling, when the granularity of a service is finer, the reusability and flexibility of the service is lower. For solving this problem concerns with the service granularity, it is critical to identify and define coarse-grained services from the domain analysis model. In this paper, we define the process to identify services from the Use Case model elicited from domain analysis. A task tree is derived from Use Cases and their descriptions, and Use Cases are reconstructed by the composition and decomposition of the task tree. Reconstructed Use Cases are defined and specified as services. Because our method is based on the widely used UML Use Case models, it can be helpful to minimize time and cost for developing services in various platforms and domains.
Factors Affecting Blog Use : An Empirical Study Using Extended TAM and Perceived Encouragement
Kwon, Oh-Byung ; Wen, Yixing ; Kim, Min-Yong ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 165~184
Recently, blogging has been regarded as a promising media for information sharing and relationship building. However, it is not quite sure if the technology acceptance model could be completely adopted also in relationship-based system such as blog. Hence, the purpose of this paper is to identify the factors affecting the usage of blogs. To do so, content analysis methodology is applied to extract meaningful factors affecting the usage of blogs in the opinions of the bloggers in a Korean portal site : Naver. We investigates the causal relationship among three factors ; perceived usefulness, perceived encouragement, and actual use in blogging. Moreover, public self-consciousness, self disclosure and telepresence are also considered as the determinants. The results show that public self-consciousness and self disclosure are significant elements affecting perceived usefulness and perceived encouragement, while perceived usefulness and perceived encouragement both affecting the actual use of blogs.
Effect of Online Education on Training Effectiveness: Conceptual Framework and Empirical Validation
Kim, Jeong-Wook ; Nam, Ki-Chan ;
The Journal of Society for e-Business Studies, volume 12, issue 4, 2007, Pages 185~209
The development of information technologies has contributed on-line training as one of important education methods. On-line training in firms, which is similar to e-learning or virtual education, provides trainees with more education opportunities in diverse ways. It has developed a range of innovative services with a one-stop solution of education within the electronic sector. Also under the on-line training environment, trainees can undertake customized training packages at anytime and any places. Moreover, information technology allows both the trainers and other trainees to be decoupled in any of the elements of tune, place, and space. Two research questions are investigated : what are the determinants affecting the on-line training effectiveness and how those variables affect the two aspects of training effectiveness: learning performance and transfer performance. Based on the previous literature conducted on the traditional training environment, the determinants of training effectiveness are derived. Eight hypotheses are developed based on literature reviews and tested by questionnaires survey data. The collected data have been analyzed by LISREL. It is found that the relationship between individual, organizational and on-line site design variables and training effectiveness (learning and transfer) are significant. The contribution and limitations of this research are also discussed with future studies.