Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 17, Issue 4 - Nov 2012
Volume 17, Issue 3 - Aug 2012
Volume 17, Issue 2 - May 2012
Volume 17, Issue 1 - Feb 2012
Selecting the target year
Smart Phone Picture Recognition Algorithm Using Electronic Maps of Architecture Configuration
Yim, Jae-Geol ; Joo, Jae-Hun ; Lee, Gye-Young ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 1~14
DOI : 10.7838/jsebs.2012.17.3.001
As the techniques of electronic and information are advancing, the computing power of a smart phone is becoming more powerful and the storage capacity of a smart phone is becoming larger. As the result, various new useful services are becoming available on smart phones. The context-aware service and mobile augmented reality have recently been the most popular research topics. For those newly developed services, identifying the object in the picture taken by the camera on the phone performs an extremely important role. So, many researches of identifying pictures have been published and most of them are based on the time consuming image recognition techniques. On the contrary, this paper introduces a very fast and effective method of identifying the objects on the photo making use of the sensor data obtained from the smart phone and electronic maps. Our method estimates the line of sight of the camera with the location and orientation information provided by the smart phone. Then it finds any element of the map which intersects the line of sight. By investigating those intersecting elements, our method identifies the objects on the photo.
A Large Number of Consumer Recommendations? or A Small Number of Friend Recommendations? : Purchasing Decision Making based on SNS
Shim, Seon-Young ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 15~41
DOI : 10.7838/jsebs.2012.17.3.015
Recently, there happens many purchasing cases encouraged by friends' recommendation in SNS (Social Network Service). This study investigates the effect of friend recommendation on consumers' purchasing heuristic. For this purpose, we compare the effect of friend recommendation with consumer recommendation in terms of trustworthy, specialty, relevancy. Usually, the frequency of friend recommendation is far lower than that of consumer recommendation. Hence, we examine how the effect of information source (friend recommendation or consumer recommendation) is moderated by the frequency of recommendation, as well. As results, this study finds out that, under the same frequency, friend recommendation does not have significantly stronger effect on the purchasing heuristic, although friend recommendation is evidenced as one of significant heuristic inducers. However, in terms of trustworthy, friend recommendation is significantly superior to the consumer recommendation. Moreover, under sufficiently higher frequency, friend recommendation works as better heuristic factor than consumer recommendation. The results deliver managerial implications in the perspective of understanding consumers' purchasing decisions and responding strategies of firms.
The Life Cycle Model Considering Legal and Technical Characteristics of Personal Data
Jang, Jae-Young ; Park, Tae-Hwan ; Kim, Beom-Soo ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 43~60
DOI : 10.7838/jsebs.2012.17.3.043
This study reviews the life cycle models considering legal and technical characteristics of personal data respectively. Based on the reviews, this research proposes 'consent and management based model of personal data' which is applicable to the domestic IT companies. The model suggested in this paper has characteristics that 'Consent' and 'Management' factors are ㅁpositively considered, which is overlooked in the other models. The validity of the model is examined by two methods, validation of the model of excellence by contrast of the other models, and 'consent' and 'management' factors cover all the life cycle processes. Using this model, IT companies will be contributed to the analysis of the personal data utilization and the development of IT system protection.
A Minimization Technique of XML Path Comparison Based on Signature
Jang, Kyung-Hoon ; Hwang, Byung-Yeon ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 61~72
DOI : 10.7838/jsebs.2012.17.3.061
Since XML allows users to define any tags, XML documents with various structures have been created. Accordingly, many studies on clustering and searching the XML documents based on the similarity of paths have been done in order to manage the documents efficiently. To retrieve XML documents having similar structures, the three-dimensional bitmap indexing technique uses a path as a unit when it creates an index. If a path structure is changed, the technique recognizes it as a new path. Thus, another technique to measure the similarity of paths was proposed. To compute the similarity between two paths, the technique compares every node of the paths. It causes unnecessary comparison of the nodes, which do not exist in common between the two paths. In this paper, we propose a new technique that minimizes the comparison using signatures and show the performance evaluation results of the technique. The comparison speed of proposed technique was 20 percent faster than the existing technique.
The Effects of Financial Information to the Firm Valuation for Information Technology Related Companies : Evidences from Software, Degital Content, Internet Related Companies listed in KOSDAQ
Kim, Jeong-Yeon ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 73~84
DOI : 10.7838/jsebs.2012.17.3.073
With transition to Knowledge society and introduction of information industry, there are many companies which have higher stock price than the suggested value from its financial information. To explain similar cases in capital markets, many researchers focus on non-financial information such as Web Traffic data or intangible assets such as intellectual property rights rather than traditional financial analysis. Besides, the relationships between financial and non-financial information with firm value are changed according to industry lifecycle. As Industry grows, financial information of company is more important for firm valuation in Capital market. We'd like to review the changes of relationships between financial information and firm valuation in Capital market especially for "Software", "Digital Contents", and "Internet" companies listed in Kosdaq market during 2000~2011. The result of data analysis shows the financial information gets more important after 2007. Inversely, it provides analytical bases that related industry gets mature. Also we show that intangible properties are more relevant to stock price of those technical based companies than others.
An Integrated Perspective of User Evaluating Personalized Recommender Systems : Performance-Driven or User-Centric
Choi, Jae-Won ; Lee, Hong-Joo ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 85~103
DOI : 10.7838/jsebs.2012.17.3.085
This study focused on user evaluation for personalized recommender systems with the integrated view of performance of the system and user attitude of recommender systems. Since users' evaluations of recommender systems can be affected by recommendation outcomes and presentation methods, both system performances based on outcomes and user attitudes formed by the presentation methods should be considered when explaining users' evaluations. However, an integrated view of system performance and user attitudes has not been applied to explain users' evaluation of recommender systems. Thus, the goal of this study is to explain users' evaluations of recommender systems under the integrated view of predictive features and explanation features at the same time. Our findings suggest that social presence, both accuracy and noveltyhave impacts onuser satisfaction for recommender systems. Especially, predictive features including accuracy and novelty affected user satisfaction. Novelty as well as accuracy is one of the significant factors for user satisfaction while recommender systems provided usual items users have experienced when systems provide serendipitous items. Likewise, explanation features with social presence and self-reference were important for user evaluation of personalized recommender systems. For explanation features, while social presence appears as one of important factors to user satisfaction of evaluating personalized recommendations, self-reference has no significant effect on user's satisfaction for recommender systems when compared to the result of social presence. Self-referencing messages did not affect user satisfaction but the levels of self-referencing are different between low and high groups in the experiment.
Strategies for Successful Supplier Relationship Management(SRM) in the SI Industry
Cha, Kyung-Jin ; Lee, Zoon-Ky ; Cha, Joon-Seub ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 105~116
DOI : 10.7838/jsebs.2012.17.3.105
In the system integration (SI) industry, improving relationships with outsourcing partners is one of the key challenges faced by SI companies that aim to increase productivity and reduce costs. In the SI industry, over 80% of project development work is performed by these outsourcing partners. Hence, large SI companies focus on fostering high-performing partners through improved cooperation and mutual relations. However, in the SI industry the existing process of managing outsourcing partners is unable to advance to the level of long-term partnerships due to inadequate information sharing and communication in the process of selecting and assessing a potential and existing partner. Based on the theory of partnership, this study identifies the success factors for new strategic partnerships. Further, this study presents a model for assessing partner companies to promote increased productivity and improve the relationship between an SI company and its partner. In addition, this model is used to assess partner relationships for a well-known SI company "A". This study explores the feasibility of a new framework model.
Detection System Model of Zombie PC using Live Forensics Techniques
Hong, Jun-Suk ; Park, Neo ; Park, Won-Hyung ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 117~128
DOI : 10.7838/jsebs.2012.17.3.117
There was a large scale of DDoS(Distributed Denial of Service) attacks mostly targeted at Korean government web sites and cooperations's on March 4, 2010(3.4 DDoS attack) after 7.7 DDoS on July 7, 2009. In these days, anyone can create zombie PCs to attack someone's website with malware development toolkits and farther more improve their knowledge of hacking skills as well as toolkits because it has become easier to obtain these toolkits on line, For that trend, it has been difficult for computer security specialists to counteract DDoS attacks. In this paper, we will introduce an essential control list to prevent malware infection with live forensics techniques after analysis of monitoring network systems and PCs. Hopefully our suggestion of how to coordinate a security monitoring system in this paper will give a good guideline for cooperations who try to build their new systems or to secure their existing systems.
The Application for the Protection System of Location-based Information on a Smart-phone Environment
Kim, In-Jai ; Choi, Jae-Won ; Kim, Woon-Yoeng ;
The Journal of Society for e-Business Studies, volume 17, issue 3, 2012, Pages 129~147
DOI : 10.7838/jsebs.2012.17.3.129
In this paper, we research on the personal information protection system in smart-phone based on mobile environment. This paper proposes the enhanced personal location privacy mechanism in location-based service environment of a smart phone operating system(iOS, Android) for the relevant regulations on location-based protection and utilization. Also, the result verified that possibility on a self-control mechanism of the personal information protection system's subject in the window platform throughout the experiment. Therefore, this study have drew a method that user positively can cope with a protection of personal location information by having a user's self-control method in the system under development or done by illegal location-based service providers and illegal application developer.