Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 16, Issue 4 - Nov 2011
Volume 16, Issue 3 - Aug 2011
Volume 16, Issue 2 - May 2011
Volume 16, Issue 1 - Feb 2011
Selecting the target year
Group Cohesiveness Context Aware Computing Methodology for Computer Mediated Communication
Kim, Jong-Ok ; Kwon, Oh-Byung ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 1~18
DOI : 10.7838/jsebs.2011.16.2.001
Context-aware computing aims to enable the on-line applications and services to be executed in a timely and automated manner. Many of such applications and services involve group-level interactions. For more smoothing communication within a community, specific group-level issues such as group dynamics must be considered. To do so, obtaining group-level contexts such as the role, conflict resolution and norms, are key ingredients to improve group performance. Since group context is not the same as a simple summation of individual context, as group is not just a simple set of individuals, awaring individual context is not sufficient for group-level communication support. However, context-aware computing research still has stressed more on individual context. This leads us to the motivation of searching for group context aware method. Hence, the of this paper is to propose a novel methodology which automatically recognizes group context. Especially, we focus on group conhesiveness in this paper just because group cohosiveness is one of the important variables to control the performance of group interaction. To verify the applicability of the proposed method, an empirical test has been conducted to compare the performance of the proposed methodology with that of conventional methods.
An Empirical Study on Price Changes in e-Commerce
Lee, Hong-Joo ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 19~37
DOI : 10.7838/jsebs.2011.16.2.019
With the advancement of Internet, electronic commerce has rapidly expanded and considered as a major retail channel. In the early days of the Internet, many studies compared offline and online stores on their price level and dispersion. Since e-commerce is considered matured, we need to see price change behavior in e-commerce rather than comparing it with traditional channels. Thus, this study investigated the trend of price changes in e-commerce. The data that was gathered from a price comparison site also contained six product categories. The decrease in minimum and average price was identified and the increase in maximum price was also identified. The critical factors in the increase of maximum price are number of sellers (positive effect) and the time span after a product was released (negative effect). The differences in price changes between product categories were also investigated.
An Interpretation of Interoperability Definitions Using Association Rules Discovery
Heo, Hwan ; Kim, Ja-Hee ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 39~71
DOI : 10.7838/jsebs.2011.16.2.039
Lately, developing systems fully interoperable with others is considered an essential element for successful projects, as not only do e-commerce becomes ubiquitous but also distributed systems' paradigm spreads. However, since definitions of interoperability vary by viewpoints, it is still difficult to have the same understanding and evaluation criteria on interoperability. For instance, various interoperability parties in military use different definitions of interoperability, and its T&E is not conducted according to the definition, but only to levels of information exchange. In this paper, we proposed a new definition of interoperability as followsm First of all, we collected existing and various interoperability definitions, extracting key components in each of them. Second, we statistically analyzed those components and applied the association rules discovery in data mining. We compared existing interoperability definitions to ours. From this research, we found associations among the components from various definitions applying market-basketanalysis, redefining interoperability. Key findings of this research can contribute to a unified viewpoint on the definition, level, and evaluation items of interoperability.
Development of Framework for Effective Integration of RFID Systems with Enterprise Information Systems
Kang, Yong-Shin ; Kim, Sang-Hee ; Lee, Yong-Han ; Kim, Hoon-Tae ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 73~89
DOI : 10.7838/jsebs.2011.16.2.073
RFID technology enables companies to precisely manage their inventories at the item level. Recently, due to the wide spread of RFID data-exchange standards, RFID systems are being recognized as separate information systems, each of which is consist of RFID hardwares, a middleware and data repositories, thereby RFID systems become common targets for system integration. In this paper, we proposed an effective integration framework between RFID systems and existing enterprise information systems (EIS). We also surveyed the current state of the RFID-EIS system integration practices. The proposed framework will be helpful for system developers to effectively integrate RFID systems with EIS's.
Success Factors for IT-based Coalition Loyalty Programs: The Case of OKCashbag
Jung, Gi-Youn ; Lee, Hee-Jin ; Jang, Seung-Kwon ; Choi, Woo-Suk ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 91~109
DOI : 10.7838/jsebs.2011.16.2.091
Loyalty programs are everywhere these days, and among them, coalition programs, where a hub company makes a network of participating companies and users can collect and use points in a large number of participating shops, are in increase. There is little research on the coalition loyalty program. Using the case of OKCashbag, the first and biggest coalition loyalty program in Korea, this study examines whether success factors of single operator program are relevant to coalition programs. This paper contributes first by turning attention to an unexplored area of coalition loyalty programs. By offering an opportunity to reflect on success factors of both single operator and coalition programs, it will help practitioners in loyalty programs to develop innovative loyalty programs using increasingly sophisticated data collection capabilities of IT.
A Study on the Effects of Government and Electronic Public Procurement on the Private Sector's Technical Inefficiency
Roh, Jae-Whak ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 111~127
DOI : 10.7838/jsebs.2011.16.2.111
The aim of this study is to reveal the effects of government and public electronic procurement on the private sector's productivity and technical inefficiency. Three cases are analyzed. The first scenario is that the government just appears as a new consumer to enterprises. Simply participating as a new consumer to enterprises reveals that government does not contribute to the private sector's productivity or improve technical efficiency. The second case is one where the government publicly procures the private sector's service or goods using IT technologies. It is revealed that government contribute to improve the private sector's productivity and reduce inefficiency. The last case is where the government demands business to connect to governments using new IT technologies. The government demands to adopt the IT technology for connection results in improved productivity and efficiencies in the private sectors.
SOA Vulnerability Evaluation using Run-Time Dependency Measurement
Kim, Yu-Kyong ; Doh, Kyung-Goo ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 129~142
DOI : 10.7838/jsebs.2011.16.2.129
Traditionally research in Service Oriented Architecture(SOA) security has focused primarily on exploiting standards and solutions separately. There exists no unified methodology for SOA security to manage risks at the enterprise level. It needs to analyze preliminarily security threats and to manage enterprise risks by identifying vulnerabilities of SOA. In this paper, we propose a metric-based vulnerability assessment method using dynamic properties of services in SOA. The method is to assess vulnerability at the architecture level as well as the service level by measuring run-time dependency between services. The run-time dependency between services is an important characteristic to understand which services are affected by a vulnerable service. All services which directly or indirectly depend on the vulnerable service are exposed to the risk. Thus run-time dependency is a good indicator of vulnerability of SOA.
A Framework for Q&A Community based Vertical Search
Jeong, Ok-Ran ; Oh, Je-Hwan ; Lee, Eun-Seok ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 143~158
DOI : 10.7838/jsebs.2011.16.2.143
This study suggests a framework which extracts features of collective intelligence from social Q&A community sites and takes advantage of those features upon vertical search for domain specific knowledge or information retrieval. One source of collective intelligence on the internet is the question and answer(Q&A) data available from many Q&A sites. Vertical search is focused on searching special areas or specific domains. This paper proposes a framework for extending the relevant terms by using Q&A information connected with query that the user wants to retrieve, and then applies them to specific domain field that requires professional and detailed knowledge.
Developing the Assessment Method for Information Security Levels
Oh, Nam-Seok ; Han, Young-Soon ; Eom, Chan-Wang ; Oh, Kyeong-Seok ; Lee, Bong-Gyou ;
The Journal of Society for e-Business Studies, volume 16, issue 2, 2011, Pages 159~169
DOI : 10.7838/jsebs.2011.16.2.159
In order for agencies and companies at the IT service industry to check as well as to upgrade the current status of their information security programs, this paper suggests the assessment method for information security levels. The study developed 12 assessment fields and 54 assessment items derived from domestic and foreign cases including SP800-26, SP800-53, ISMS, and ISO27001. It categorized 54 assessment items into 5 levels for determining information security levels. Also, the study presents 7 strategies for performing their efficient evaluations. The proposed method and process in this paper can be useful guidelines for improving the national information security level.