Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 16, Issue 4 - Nov 2011
Volume 16, Issue 3 - Aug 2011
Volume 16, Issue 2 - May 2011
Volume 16, Issue 1 - Feb 2011
Selecting the target year
Securing the Private Key in the Digital Certificate Using a Graphic Password
Kang, Byung-Hoon ; Kim, Beom-Soo ; Kim, Kyung-Kyu ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 1~16
DOI : 10.7838/jsebs.2011.16.4.001
A digital certificate mandated by the Electronic Signature Act has become familiar in our daily lives as 95% of the economically active population hold certificates. Due to upgrades to 256 bit level security that have become effective recently, the security and reliability of digital certificates are expected to increase. Digital certificates based on Public Key Infrastructure (PKI) have been known as "no big problem," but the possibility of password exposure in cases of leaked digital certificates still exists. To minimize this vulnerability, various existing studies have introduced alternative password methods, expansion of certificate storage media, and multiple certification methods. These methods perform enhanced functions but also have limitations including the fact that the secureness of passwords is not guaranteed. This study suggests an alternative method for enhancing the level of password secureness as a way to improve password security. This new method improves security management and enhances the convenience of using digital technologies. The results may be used for developing digital certificate related security technologies and research in the future.
A Quantitative Assessment Model of Private Information Breach
Han, Chang-Hee ; Chai, Seung-Wan ; Yoo, Byung-Joon ; Ahn, Dae-Hwan ; Park, Chae-Hee ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 17~31
DOI : 10.7838/jsebs.2011.16.4.017
Damage caused by private information breach causes serious problems and huge social losses. In order to make a better policy that prevents society from suffering from the damage, we have to know about the actual size of damage. So it is needed to develop a quantitative model of private information breach that helps catching the more accurate size of damage. In our study, we suggest a method which calculate not only the costs of damage from firms' perspective but also those from individual and social perspectives. In this process, we refer to methods adopted by JNSA(Japan Network Security Association) and Ponemon Research Institue and modify it with considering our current situation. Also we try to make a new model by using new methods(web traffic analysis, survey, indirect comparison, etc.) and verify it with theories and methods from econometrics, cost accounting and theory of producer.
Influencing Factors for Compliance Intention of Information Security Policy
Kim, Sang-Hoon ; Park, Sun-Young ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 33~51
DOI : 10.7838/jsebs.2011.16.4.033
This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.
Analysis of the Impact of Security Liability and Compliance on a Firm's Information Security Activities
Shim, Woo-Hyun ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 53~73
DOI : 10.7838/jsebs.2011.16.4.053
Many governments have tried to develop a liability and compliance law that can improve cyber security in a sustainable way. This paper explores whether a liability and compliance law is effective in motivating firms' information security activities. In particular, I empirically investigate the impact of the 2007 Electronic Financial Transaction Act (EFTA), a liability and compliance law in Korea, on the information security activities of financial institutions and services providers. In spite of various criticisms of the effectiveness of EFTA, the empirical findings of this study clearly show that EFTA is having a positive impact on information security activities. From these findings, this article concludes that a liability and compliance law is likely to contribute to a certain degree to the achievement of sustainable development of cyber security.
Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP
Park, Kwang-Cheol ; Lim, Young-Hwan ; Lim, Jong-In ; Park, Won-Hyung ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 75~85
DOI : 10.7838/jsebs.2011.16.4.075
Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.
A Study on the Security Management System Model for the Information Security of the Aviation infrastructure
Jung, Chang-Hwa ; Lee, Joon-Taik ; Chung, Dong-Keun ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 87~96
DOI : 10.7838/jsebs.2011.16.4.087
The importance of the security management system for the aviation infrastructure cannot be overemphasized. What is especially important on the security management system for it is the assessment that is detaild and systematic. This article presents a framework based on a Hanulcha-type security management system model for a Information security of the Aviation infrastructure. This system checks, estimates and analyzes the goal of security with effect, especially in case of the security-accident on the aviation infrastructure because this system model gives the integrated security assessment method.
A Study on Classification of Information Asset Considering Business Process Characteristics for Small IT Service Organization
Kang, Jong-Gu ; Lim, Jae-Hwan ; Lee, Hong-Joo ; Chang, Hang-Bae ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 97~108
DOI : 10.7838/jsebs.2011.16.4.097
Small IT service organizations operate their business with limited resources and workforce in comparison with large enterprises, and they could be categorized in various types based on the method of value creation. But the recent studies on information security have been conducted and they were focused on the construction of general information security countermeasure, without considering size of the business and characteristic. Hence we have undergone the process of classifying information assets. Then we extracted and categorized the information assets considering characteristics of small organization's size and business process. Specifically we have classified the information assets according to business scenario design through qualitative observation method. Then we have validated the classified information assets by utilizing statistical method. We may anticipate that this study results could be basic data for developing the differentiated information security countermeasures for small IT service organization.
A Study on an Estimation of Adjusted Coefficient for the Maintenance of Information Security Software in Korea Industry
Park, You-Jin ; Park, Eun-Ju ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 109~123
DOI : 10.7838/jsebs.2011.16.4.109
The maintenance prices in information security industry between Korean companies and foreign companies have been a big difference. Korea Information Security SW maintenance standards were not adequate for the rate, and there was disagreement between domestic companies and governments. This research, therefore, surveyed a standard of information SW and the status of maintenance payment rates. The study suggests an estimation method and verifies the method and an appropriate maintenance cost rate. According to the results of the study, the current maintenance cost should be increased or decreased independent with a kind of information security systems. Based on the study, Korea government is able to change the maintenance policy in information security. And the domestic companies get a theoretical ground for improving the rates of maintenance costs in information security systems and are able to allot the resources effectively.
Product Review Data and Sentiment Analytical Processing Modeling
Yeon, Jong-Heum ; Lee, Dong-Joo ; Shim, Jun-Ho ; Lee, Sang-Goo ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 125~137
DOI : 10.7838/jsebs.2011.16.4.125
Product reviews in online shopping sites can serve as a useful guideline to buying decisions of customers. However, due to the massive amount of such reviews, it is almost impossible for users to read all the product reviews. For this reason, e-commerce sites provide users with useful reviews or statistics of ratings on products that are manually chosen or calculated. Opinion mining or sentiment analysis is a study on automating above process that involves firstly analyzing users' reviews on a product to tell if a review contains positive or negative feedback, and secondly, providing a summarized report of users' opinions. Previous researches focus on either providing polarity of a user's opinion or summarizing user's opinion on a feature of a product that result in relatively low usage of information that a user review contains. Actual user reviews contains not only mere assessment of a product, but also dissatisfaction and flaws of a product that a user experiences. There are increasing needs for effective analysis on such criteria to help users on their decision-making process. This paper proposes a model that stores various types of user reviews in a data warehouse, and analyzes integrated reviews dynamically. Also, we analyze reviews of an online application shopping site with the proposed model.
A Study on the Efficiency of Internet Keyword Advertisement According to CPM and CPC Methods by Analyzing Transactional Data
Kim, Do-Yeon ; Lim, Gyoo-Gun ; Lee, Dae-Chul ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 139~154
DOI : 10.7838/jsebs.2011.16.4.139
Recently Internet keyword search service providers tends to use CPC advertizement method rather than CPM method. However researches how much the CPC method is beneficial to advertisers than CPM method in certain perspectives are insufficient and not performed systematically. So this paper tries to do comparative analysis about the two methods by analyzing the real transactional DB data from an advertizement agency. Due to the difficulties of direct comparison between the two methods because of their different expose positions on the Web and different types of attributes in DB, we did some preprocessing step for the transactional data. From the result of analysis, the click rate of CPC is higher than CPM by 1.3% and the unit cost for the CPC per one click is lower than CPM method by 51 Won. It shows the CPC method is more effective than CPM method for advertizement from the point of advertizement effectiveness (CTR) and advertizement cost (CPC). We hope this research would give useful information to advertisers and marketing managers in making advertizement strategy, marketing decision and budgeting.
Factors for the Adoption of Smartphone-based Mobile Banking : On User's Technology Readiness and Expertise
Lee, Ji-Eun ; Shin, Min-Soo ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 155~172
DOI : 10.7838/jsebs.2011.16.4.155
The purpose of this study is to examine factors affecting an individual's acceptance of mobile banking, which is a typical example of smartphone based self-service. We derive three personal traits(positive technology readiness, negative technology readiness and individual's expertise) as antecedent variables that affect intention to use mobile banking from previous studies, and adopt a technology readiness and acceptance model(TRAM) to investigate factors that determine an individual's intention to use mobile banking. TRAM, which integrates technology readiness index(TRI) into the technology acceptance model (TAM) in the context of consumer adoption of e-service systems, is adopted to examine personal traits influencing on the factors forming the attitude of mobile banking. The new findings of this study are as follows. First, individual's expertise and positive technology readiness(ptr) have significant effect on both perceived usefulness and perceived easy of use. However, negative technology readiness(ntr) has significant effect on only perceived easy of use.
An Exploratory Study on the Determinants of Mobile Application Purchase
Kim, Hee-Woong ; Lee, Hyun-Lyung ; Choi, Su-Jin ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 173~195
DOI : 10.7838/jsebs.2011.16.4.173
The ability of offering various and abundant mobile applications has emerged as the knowledge of the smartphone has grown in the smartphone market. The mobile application market has emerged as a competitive new market with enormous potential. Although many users download paid or free mobile applications through the app markets such as the Appstore, there is no significant research regarding customer's application purchase yet. Hence, we refer to the purchase motivation of mobile applications among experienced users who have bought paid applications. We conducted the interview with 30 users and suggest four categories of applications (productivity, entertainment, information, and social networking) and also classify the purchase intentions on each category based on the ground theory. The comparison analysis of the interview provides us what factors affect the application purchase. This framework may advance effective mobile application business model development, implicate the strategy for boosting mobile application market.
An Empirical Study Applying the Self-Determination Factors to Flow and Satisfaction of SmartPhone
Kwon, Do-Soon ; Kim, Jin-Hwa ; Yu, Cheol-Ha ; Kim, Say-June ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 197~220
DOI : 10.7838/jsebs.2011.16.4.197
The smartphone is simply beyond the means of communication equipment, to line up the turning point of mobile convergence, is recognized as a service tool of new concept the camera, game, multimedia function, digital multimedia broadcasting, mobile internet etc, that use of smartphone is working toward developed a variety and new business models. The study is empirically studied casualties that self-determination influences flow and satisfaction which is intrinsic motivation of smartphone. There are many studies on flow, is intrinsic motivation, influencing satisfaction and Loyalty, but there are little studies which variables influences flow. this study is explore causality of autonomy, competence, relatedness which are major variables of self-determination theory that studied factors effecting intrinsic motivation influencing flow and satisfaction. This study developed a research model to explain the use of smartphone, and collected 670 survey responses from the office workers of seoul S company who had experiences with such smartphone. To prove the validity of the proposed research model, SEM analysis is applied with valid 670 questionnaires. The results, firstly, autonomy positively influences flow. secondly, competence significantly influences flow. thirdly, relatedness significantly influenced flow. also, upper above results shows that flow influences satisfaction.
The Analysis of Advertisement Effect in Smart Phone Environment : The Comparison of Users with Providers of Commercial
Ha, Seong-Ho ; Oh, Jun-Seok ; Lee, Bong-Gyou ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 221~239
DOI : 10.7838/jsebs.2011.16.4.221
Various applications are developed with the extension of the smart phone market. This affects the change of contents and market for mobile advertisement. Mobile advertisement has been changed from the text type in feature phone environment to banner type which are added on the applications and branded app which are application itself for commercials. This research shows the difference in views between users and professions for the factors which affects the acceptance of mobile advertisement in smart phone environment. The analysis results present two groups have significant differences in the views for the users' acceptances of mobile advertisement. This research provides the important factors which need to be considers in creating mobile commercials. It also suggests that professions in advertisement field have to consider the aspects of smart phone users when they create advertisements in smart phone environment.
How eWOM Reduces Uncertainties in Decision-making Process： Using the Concept of Entropy in Information Theory
Lee, Jung ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 241~256
DOI : 10.7838/jsebs.2011.16.4.241
The present study examines the impact of eWOM on consumer decision making process by viewing eWOM as the product information supplier. We employ the concept of information entropy which was proposed in the information theory to explain different consumer responses to various types of product information in eWOM. Information entropy is the degree of uncertainty associated with the information in the message. In eWOM, a variety of information with different levels of entropy is available, and these different entropy levels result in different impacts on consumer behavior. The preliminary hypotheses are formulated to examine the impact of eWOM on consumer behavior, at the product attribute level and the purchase action level separately. An experiment was conducted to online shopping mall users and the analysis gives valuable insights into our future research.
The Effect of Social Anonymity on Community Quality : Mediated by Self Expression, Self Control, and Community Ties
Shin, Ji-Myoung ; Kim, Kyung-Kyu ; Park, Joo-Yeon ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 257~281
DOI : 10.7838/jsebs.2011.16.4.257
The purpose of this study is to examine the effect of social anonymity on community quality and find out mediating factors that affect the relationship between social anonymity and community quality in online community sites. This study focuses on the factors such as self expression, self control, and community ties to investigate their mediating roles on the relationship between social anonymity and community quality. Also, discussion quality and information quality are used to measure online community quality. The results of this study show that social anonymity is directly related to discussion quality but not related to information quality. As for the mediating effects, self expression, self control and community ties are all shown to have strong mediating effects on the social anonymity and community quality relationship.
Exploring the Technology Fit of Digital Media on Product Shopping Task
Han, Hyun-Soo ; Joung, Seok-In ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 283~299
DOI : 10.7838/jsebs.2011.16.4.283
In this paper, we draw upon Task-Technology Fit theory to investigate the fit attributes which impacted on customer preference over three virtual shopping channels which included TV home shopping, Internet shopping, and broadband applications, i.e. IPTV. The fit attributes also reflected the product category contingency, which is classified based on the degree of quality assessing difficulty on the web, such as quasi-commodity, look and feel goods, and look and feel with variable quality goods. Using the collected survey data, we employed stepwise regression analysis to validate the fit attributes in the context of performing virtual shopping task via those three distinctive media technologies. Furthermore, through ANOVA test with Duncan statistics, we reported comparative intensity of the valid fit attributes across the product categories and distinct media technologies. The results validated four critical fit attributes and significant distinctions among product categories and three virtual shopping channels. The findings provide practical insights in distribution channel design exploiting digital convergence technologies.
Post Clustering Method using Tag Hierarchy for Blog Search
Lee, Ki-Jun ; Kim, Kyung-Min ; Lee, Myung-Jin ; Kim, Woo-Ju ; Hong, June-S. ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 301~319
DOI : 10.7838/jsebs.2011.16.4.301
Blog plays an important role as new type of knowledge base distinguishing from traditional web resource. While information resources in their existing website dealt with a wide range of topics, information resources of the blog are concentrated in specific units of information depending on the user's interests and have the criteria of classification forresources published by tagging. In this research, we build a tag hierarchy utilizing title keywords and tags of the blog, and propose apost clustering methodology applying the tag hierarchy. We then generate the tag hierarchy reflected the relationship between tags and develop the tag clustering methodology according to tag similarity. In this paper, we analyze the possibility of applying the proposed methodology with real-world examples and evaluate its performances through developed prototype system.
A Study on the Priorities of Key Performance Indicators for Efficient Business Process Management of Small and Medium Enterprises
Hong, Jung-Wan ; Moon, Sung-Hyun ; Lee, Young-Han ; Kim, Hoon-Tae ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 321~334
DOI : 10.7838/jsebs.2011.16.4.321
As Small and Medium Enterprises(SMEs)' dependency on major companies is increasing every day, the importance of the IT collaboration between those is being highlighted more than ever. However, the information level of the SMEs is much inferior and lack of capital, low level of management and the problem of the informatization are being raised. Therefore, the methods to improve the level of the infrastructure for the informatization need to be performed based on the current status of the SMEs. In this paper, we proposed the ways to manage key performance indicators(KPI) of each business process by inducing and prioritizing the KPIs which has higher accomplishment compared to its management rate. As the result of the present study reflects the priorities of KPIs, it may contribute to the accomplishment of the efficient informatization that considers the enterprise's size.
Applications of Innovation Adoption and Diffusion Theory to IPTV Loyalty Formation Process
Han, Hyun-Soo ; Joung, Seok-In ; Park, Woo-Sung ;
The Journal of Society for e-Business Studies, volume 16, issue 4, 2011, Pages 335~357
DOI : 10.7838/jsebs.2011.16.4.335
In this paper, we report the empirical study results theorizing IPTV user's loyalty formation process. Considering the convergent characteristics ofinnovative media and telecommunication, we employed innovation adoption and diffusion as our theoretical framework for research model development. As the purpose of this research includes verification of detail attributes of IPTV service, we formulated structural model which treats relative advantage as the second order factor, of which incorporates the seven detail attributes as the first order factors. Then, using the data collected from 250 Korean IPTV subscribers, the model is validated and relevant attributes are identified through PLS analysis. The results provide insights for future research on the adoption and diffusion of new digital convergent high-tech services.