Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 17, Issue 4 - Nov 2012
Volume 17, Issue 3 - Aug 2012
Volume 17, Issue 2 - May 2012
Volume 17, Issue 1 - Feb 2012
Selecting the target year
Vulnerability Analysis and Improvement in Man-in-the-Middle Attack for Remote User Authentication Scheme of Shieh and Wang's using Smart Card
Shin, Kwang-Cheul ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 1~16
DOI : 10.7838/jsebs.2012.17.4.001
Shieh and Wang  recently proposed an efficient mutual authentication scheme that combined the cost-effectiveness of operations of Lee et al. . scheme and the security and key agreement of Chen and Yeh scheme. Shieh and Wang  scheme, however, does not satisfy the security requirements against a third party (the man-in the middle, attacker) that have to be considered in remote user authentication scheme using password-based smart cards. Shieh and Wang weaknesses are the inappropriateness that it cannot verify the forged message in 3-way handshaking mutual authentication, and the vulnerability that the system (server) secret key can easily be exposed. This paper investigates the problems of Shieh and Wang scheme in the verification procedure of the forged messages intercepted by the eavesdrop. An enhanced two-way remote user authentication scheme is proposed that is safe and strong against multiple attacks by adding the ability to perform integrity check on the server and proposed scheme is not expose user password information and the system's confidential information.
The Defense Strategies against Consumer Unethical Behaviors
Lee, Un-Kon ; Park, Jong Pil ; Choi, Young Eun ; Oh, Yonghui ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 17~37
DOI : 10.7838/jsebs.2012.17.4.017
The evolution of the IT facilitated the social actions of the consumers by supporting social communication of the online users. At the same time it help for the consumer to post malicious comments on the Internet or to spread the unproven news for distorting the public opinion in the SNSs. Although the number of the consumer unethical behaviors and the estimated damage of the innocent companies have been increased, a few studies had investigate on this issue. Based on the Literature on the consumer unethical behaviors and the institution based trust, we had developed the defense strategies against the consumer unethical behaviors. This study would introduce the new perspective that the consumer could always not be innocent. Also, the defense strategy developed in this study could contribute to make the guideline for consumer service manual.
Development of Shopping Path Analysis System(SPAS)
Jung, In-Chul ; Kwon, Young S. ; Lee, Yong-Han ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 39~56
DOI : 10.7838/jsebs.2012.17.4.039
Technological advancements in information technology including RFID and mobile technologies have made it feasible to track the customers travel path in a store. The customer travel paths provide valuable implications to understanding the customer behaviors in a store. In our research, we develop a shopping path analysis system to track and analyze the customer travel path. The proposed system consists of RFID systems for collecting the customer paths and analysis system. The analysis system conducts clustering for identifying the distinctive shopping patterns, and analyzes the profile of a grocery, such as congestion rate, visiting rate, and staying time, etc. We show the applicability of our proposed system using the actual data obtained at a grocery in Seoul as a case study.
Analysis of the Effects of Common Criteria Certification on the Information Security Solutions
Hong, Young Ran ; Kim, Dongsoo ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 57~68
DOI : 10.7838/jsebs.2012.17.4.057
As the functions and technology of IT security solution has been diversified and complicated, it is necessary to make the functions standardized. The common criteria (CC) evaluation and certification scheme was introduced with this background in 2000. For over 10 years after the introduction of CC evaluation and certification scheme, many security solution vendors have developed functions following the security functional requirement in CC. Most of CC evaluators and developers think that CC has helped to enhance the security of the solution. So, it is a right time to prove the affirmative effects of CC in quantity. In this research, we compare two cases, the security status of the solution before and after the experience of CC evaluation, and analyze the results. We made the questionnaire for the domestic solutions vendors. We show that CC has made positive effects on the security of the solution quantitatively using statistical analysis. This research is meaningful security enhancement of domestic security solutions.
Finding Influential Users in the SNS Using Interaction Concept : Focusing on the Blogosphere with Continuous Referencing Relationships
Park, Hyunjung ; Rho, Sangkyu ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 69~93
DOI : 10.7838/jsebs.2012.17.4.069
Various influence-related relationships in Social Network Services (SNS) among users, posts, and user-and-post, can be expressed using links. The current research evaluates the influence of specific users or posts by analyzing the link structure of relevant social network graphs to identify influential users. We applied the concept of mutual interactions proposed for ranking semantic web resources, rather than the voting notion of Page Rank or HITS, to blogosphere, one of the early SNS. Through many experiments with network models, where the performance and validity of each alternative approach can be analyzed, we showed the applicability and strengths of our approach. The weight tuning processes for the links of these network models enabled us to control the experiment errors form the link weight differences and compare the implementation easiness of alternatives. An additional example of how to enter the content scores of commercial or spam posts into the graph-based method is suggested on a small network model as well. This research, as a starting point of the study on identifying influential users in SNS, is distinctive from the previous researches in the following points. First, various influence-related properties that are deemed important but are disregarded, such as scraping, commenting, subscribing to RSS feeds, and trusting friends, can be considered simultaneously. Second, the framework reflects the general phenomenon where objects interacting with more influential objects increase their influence. Third, regarding the extent to which a bloggers causes other bloggers to act after him or her as the most important factor of influence, we treated sequential referencing relationships with a viewpoint from that of PageRank or HITS (Hypertext Induced Topic Selection).
The Determinants of User Resistance to Adopting e-Books : Based on Innovation Characteristics and User Attitude
Lee, Aeri ; Choi, Jaewon ; Kim, Kyung Kyu ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 95~115
DOI : 10.7838/jsebs.2012.17.4.095
The e-Book market has rapidly grown as an innovative product which is mixed its traditional and technological characteristics. However, decreasing user resistance to the e-Book is very important to continually keeping up its market growth. Previous studies for user resistance have been studied as a negative barrier for various innovative products with importance of user resistance. Nevertheless, the factors for user' resistance to the e-Book field have not been found out considering both perceived value and switching cost. Especially, both innovative technology and user specifics should be considered when explaining user resistance to adopting e-Books. Thus, the purpose of this study is to understand the process for user resistance to the e-book and find out its antecedents with perceived value and switching cost at the same time. As a result, it appeared that triability, uncertainty and complexity affected perceived value and switching cost. The user-based antecedents like social norm and perceived value increased the effect of self-efficacy. Also, self-efficacy and perceived value decreased user resistance whereas switching cost increase user resistance to the e-Book perspective.
A Study on Competitive Analysis Using Multidimensional Efficiency Analysis
Yang, Dong-Heon ; You, Yen-Yoo ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 117~140
DOI : 10.7838/jsebs.2012.17.4.117
This study focuses on the use of competitive analysis to identify the effective benchmarking target through consulting techniques to derive improvements. After developed using DEA(Date Envelopment Analysis) the relative efficiency analysis tool for competitor analysis to apply in consulting on-site or within the organization, this study compared the new techniques and the existing techniques. This study was carried out as follows. First, through a review of the literature, consulting competitive analysis techniques and methodologies relative efficiency analysis technique DEA for research scholars examined. Second, DEA-based competitive analysis, multidimensional efficiency analysis is presented. Third, The case study was conducted to determine the suitability and practicality of this analysis method for public company "A".
A Study on Network Redesign for Supply Chain Expansion
Song, Byung Duk ; Oh, Yonghui ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 141~153
DOI : 10.7838/jsebs.2012.17.4.141
According to the environment change of market, supply chain network needs to be redesigned for efficient provision of product within the budget constraint. Also, it is desired that the customer satisfaction such as on time delivery should be considered as an important element at redesigning of supply chain network in addition to the cost reduction. In this paper redesign of supply chain network for its expansion is treated as a problem situation and a related mathematical model is suggested. Moreover, the numerical examples about the total weighted distance of the redesigned supply chain network are presented with various budget constraints by using genetic algorithm to help the managerial decision.
Analysis and Proposal of "Do Not Track" Regulations for Online Behavioral Advertising
Choi, Jinju ; Lee, Chunghun ; Kim, Beomsoo ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 155~174
DOI : 10.7838/jsebs.2012.17.4.155
As Online Behavioral Advertising is dramatically growing with usefulness of information and user convenience in recent years, there are privacy issues caused by collecting user's behavioral information without their consent. To tackle the problem, the need of Do Not Track regulations is getting much higher. In Korea, however, it has never existed. So, this study is examining the case of the major countries have been enforcing the law and regulations of DNT. After that, it is classified with four domain (law/regulation, corporation, individual, society) to include all stakeholders of OBA. Furthermore, this study may have academic significance by suggesting DNT framework through analysis of them. Providing DNT mechanism consisted of three type (behavioral information, control, DNT system), it can be useful guidelines for companies to support decision making as introduced DNT. As analyzed between DNT and stakeholders based on the study of OBA market, it will be useful basic material of OBA study later.
A Study on Modeling Framework of Convergence Business
Kim, Duk-Hyun ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 175~196
DOI : 10.7838/jsebs.2012.17.4.175
Compared to the wide spread of convergence in government and industries there are still lack of theoretical foundation and effective methodologies to successfully implement it. Especially, there are few remarkable results on the ideal types of convergence business model (BM) in both domestic and foreign researchers. In this paper we show theoretical types, strategic alternatives, and design steps of convergence BM could be developed based on '4WH1H model' which is a conceptual framework of a BM. 4W1H model includes 5 constituents of a BM, i. e., customer value, value proposition, operation, target market, and supply capability. We derive 5 theoretical types of convergence BMs depending on the focus of innovation, i.e., value, product, operation, market, and capability. After defining the constituents and types (i.e., structural aspects) of convergence BM, we also show a BM could be linked with business strategy by defining the interaction among 5 constituents (i.e., behavioral aspects) of convergence BM.
A Requirement Analysis Method of Smart-Phone Users by Using Contents Analysis of SNS
Kim, Tae Woo ; Baek, Dong Hyun ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 197~208
DOI : 10.7838/jsebs.2012.17.4.197
Recently, the development of smart devices such as smart phones and tablet PCs, with mobility, convenience and real-time computing, promotes proliferation and activation of social media. It also causes innovative changes in communication methods. Since 2010, researches in SNS (Social Networking Services) have focused on developing marketing strategies using SNS. On the other hand, the main purpose of this study is to provide a requirement analysis method of smart phone users by using content analysis of SNS. An information systems developed in this study in order to analyze content of SNS automatically because it is very difficult and time consuming to analyze it manually. In addition, this study compares the result of content analysis with that of Kano survey in order to examine consistency between the two results.
Survey on Vector Similarity Measures : Focusing on Algebraic Characteristics
Lee, Dongjoo ; Shim, Junho ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 209~219
DOI : 10.7838/jsebs.2012.17.4.209
Objects such as products, product reviews, and user profiles are important in e-commerce domain. Vector is one of the most widely used object representation scheme. Information of e-commerce objects may be modeled by vectors in which the featured values are assigned to various dimensions. E-commerce objects are in general quantitatively large while some are similar or even same in reality. It Plays, therefore, an important role to measure the similarity between objects. In this paper, we survey the state-of-the -art vector similarity measures. Similarity measures are analyzed to feature the algebraic characteristics and relationship of those, and upon which we classify the related measures accordingly. We then present such features that standard vector similarity measures should convey.
A Study on the Effects of Software Developer's Job Satisfaction on Organizational Commitment and Turnover Intension
Jeon, Ho-Jin ; Lee, Young-Joo ; Lee, Jung-Hoon ;
The Journal of Society for e-Business Studies, volume 17, issue 4, 2012, Pages 221~242
DOI : 10.7838/jsebs.2012.17.4.221
The rising value of software developers has made corporations, including IT companies, to focus on recruitment of software developers. However, the domestic software industry, where SMEs represents quite a large proportion of the industry, is facing problems of low rate of human resources and high rate of job turnover. These problems have not been solved until today. This study hypothesizes that software developer's job satisfaction has an effect on organizational engagement and intention to job transfer. The purpose of this study is to provide implications on desirable human resources management and work environment, that lowers intentions to job transfer by elevating job satisfaction of the software developers. The results of the study reveal that among job satisfaction factors, recognition, autonomy, work-life balance, work environment have significant effects on fob satisfaction. Also, the software developer's job satisfaction elevates organizational engagement and lowers intention to job transfer. In addition, job satisfaction is has partly has mediating effect between job satisfaction and intention to job transfer. Several practical implications are discussed.