Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 20, Issue 4 - Nov 2015
Volume 20, Issue 3 - Aug 2015
Volume 20, Issue 2 - May 2015
Volume 20, Issue 1 - Feb 2015
Selecting the target year
A Study of Factors Influencing the Intention to Share the Information Security Knowledge on SNS(Social Network Services)
Park, Taehwan ; Kim, Suhwan ; Jang, Jaeyoung ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 1~22
DOI : 10.7838/jsebs.2015.20.1.001
Due to recent growth in IT industry along with the expansion of smartphone, we came to connect to the Internet wherever and whenever we are. However, this causes negative side effects, though. One of them is a rapid increase of the financial crimes such as the Phishing and the SMishing. There have been many on-going researches about crimes such as Phishing and SMishing to protect users. However, the study about sharing knowledge on SNS to prevent such a crime can be hardly found. Based on social identity theory, we conduct the research about factors on SNS users' intention to share the information security knowledge on SNS. As a result, we found that knowledge provision self-efficacy has a significant impact on self-expression. In addition, it also found out self-expression, awareness about information security and the sense of belonging have a significant impact respectively on the intention to share the information security knowledge on SNS. On the other hand, the altruism didn't have a significant impact to the intention to share information security knowledge on SNS. With this research as a starting point, it seems necessary to expand its range to all types of online community in the future for the generalization of the hypotheses.
Identifying the Network Characteristics of Contributors That Affect Performance in Open Collaboration : Focusing on the GitHub Open Source
Baek, Hyunmi ; Oh, Sehwan ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 23~43
DOI : 10.7838/jsebs.2015.20.1.023
Information and communications technology facilitates collaboration among individuals by functioning as an open platform for open collaboration projects. In this regard, this study aims to understand the network characteristics of participants who contribute greatly to open collaboration by investigating the mutual cooperation network in an open source project, which represents a form of open collaboration based on social network theory. To achieve this objective, this study analyzes the network centrality of developers with a high number of commits, particularly 8,101 developers in 782 repositories in GitHub, a representative open source platform. This study also determines how the relationship between network centrality and number of commits depends on the size of a repository network and the presence of a hub. Consequently, the number of commits by developers with high degree, betweenness, and closeness centrality is increasing. Among which, betweenness centrality has the highest explanatory power. Furthermore, when a hub is present and as network size increases, the relationship between the betweenness centrality of a developer and his/her number of commits continues to grow. This study is expected to provide suggestions for the successful performance of open collaboration projects in the future.
Exploring User Attitude to Information Privacy
Baek, Seung Ik ; Choi, Duk Sun ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 45~59
DOI : 10.7838/jsebs.2015.20.1.045
As many companies have been interested in big data, they have invested a lot of resources to get more customer data. Some companies try to trade the data illegally. In order to collect more customer data, companies provide various incentive programs to customers. However, their results are normally much less than their expectations. This study focuses on exploring the relative importance of the factors which influence customer attitudes to providing his/her personal information. This study conducts a conjoint analysis to assess trade-offs among the five influential factors-monetary reward, concern for data collection, concern for secondary use, concern for unauthorized use, and concern for errors. This study finds that the customer attitude to providing personal information is most influenced by the concern for secondary use. Furthermore, it shows that there are some differences between the light internet user group and the heavy internet user group in the relative importances of these factors. The monetary rewards appeal to the heavy internet users, rather than the light internet users.
The Innovation Resistance of IT Workforce to Mobile Commerce
Lim, Sang Hyun ; Lee, Choong Kwon ; Cha, Kyung Jin ; Seo, Jongwon ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 61~78
DOI : 10.7838/jsebs.2015.20.1.061
This study investigates the differences between IT workers, who possess a high understanding of technology, and non-IT workers in the resistance to accepting an innovative service like mobile commerce. From a total of 317 survey respondents, the results of the study revealed that perceived risk, compatability, and complexity were the significant factors for resistance to mobile commerce for IT workers, while relative advantage, compatibility, and complexity were the factors of resistance for non-IT workers. Higher innovation resistance was shown to result in lower intention of use for both groups of mobile commerce users.
Minimizing the Total Stretch when Scheduling Flows of Divisible Requests without Interruption
Yoon, Suk-Hun ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 79~88
DOI : 10.7838/jsebs.2015.20.1.079
Many servers, such as web and database servers, receive a continual stream of requests. The servers should schedule these requests to provide the best services to users. In this paper, a hybrid genetic algorithm is proposed for scheduling divisible requests without interruption in which the objective is to minimize the total stretch. The stretch of a request is the ratio of the amount of time the request spent in the system to its response time. The hybrid genetic algorithm adopts the idea of seed selection and development in order to improve the exploitation and exploration power of genetic algorithms. Extensive computational experiments have been conducted to compare the performance of the hybrid genetic algorithm with that of genetic algorithms.
Padding Oracle Attack on Block Cipher with CBC|CBC-Double Mode of Operation using the BOZ-PAD
Hwang, Seongjin ; Lee, Changhoon ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 89~97
DOI : 10.7838/jsebs.2015.20.1.089
In the various application environments on the internet, we use verified cipher algorithm to protect personal information of electronic commerce or application environments. Even so, if an application method isn't proper, the information you want to keep can be intercepted. This thesis studied about result of Padding Oracle Attack, an application environment which apply CBC|CBC operational mode based on block cipher and BOZ padding method.
Importances of Smart Phone Attributes by Pursuit Benefits
Kim, Mi-Ae ; Joo, Young-Jin ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 99~115
DOI : 10.7838/jsebs.2015.20.1.099
This study aims to classify the pursuit benefits of smart-phone users, to find smart-phone market segments by pursuit benefits, and to analyze the relative importances of smart-phone attributes according to the smart-phone market segments. As a result, we found that smart-phone users are pursuing the network benefit as well as the two traditional benefits (the utilitarian benefit and the hedonic benefit). According to the levels of these three pursuit benefits, smart-phone users can be classified into four segments : All Benefits Cluster, Utilitarian-Network Benefits Cluster, Hedonic-Network Benefits Cluster, and Non-Network Benefits Cluster. We also verified that, according to the four smart-phone user segments by the pursuit benefits, there exist significant differences in relative importances of the seven smart-phone attributes : hand-set price, hand-set brand, hand-set speed, applications, tariff, mobile internet quality, and number of same service users.
Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model
Lee, Chungah ; Yun, Haejung ; Lee, Chunghun ; Lee, Choong C. ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 117~135
DOI : 10.7838/jsebs.2015.20.1.117
Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.
Factor Analysis of the Motivation on Crowdfunding Participants : An Empirical Study of Funder Centered Reward-type Platform
Lee, Chae Rin ; Lee, Jung Hoon ; Shin, Dong Young ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 137~151
DOI : 10.7838/jsebs.2015.20.1.137
Crowdfunding is a novel method for funding from many individuals using web based platform often in return for products or equity. It allows individual entrepreneurs to create diverse products and services. This thesis elaborates a theoretical foundation for identifying the factors that must have motivated the funders in sponsoring crowdfunding projects. Based on the motivation theory, the proposed research model is constructed with intrinsic and extrinsic motivations from relevant literatures. We also examined how different crowdfunding modes ('Keeping It All' and 'All or Nothing') moderate the proposed research model. Based on the survey from various crowdfunding service providers in Korea, this empirical study found that continuous participation in crowdfunding is positively correlated with factors such as enjoyment, familiarity, agency credibility and reward, while peer-influence shows negative correlation. Furthermore, moderating effects of funding modes significantly affect continuous participation. These empirical results contribute insights on the emerging phenomenon of crowdfunding from funders' perspectives and shed lights more on the ways that the actions of platform providers may affect their ability to receive entrepreneurial financing.
The Relationship between Technostress and Continuance Commitment within Organizations : The Moderating Effects of Involvement Facilitation and Technical Support Provision
Kim, Geuna ; Kim, Sanghyun ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 153~166
DOI : 10.7838/jsebs.2015.20.1.153
The main purpose of this study is to develop and empirically validate the research model that examines the relationship between technostress and employees' continuance commitment at their jobs. In addition, the moderating effects of involvement facilitation and technical support provision were examined as enhancing factors on the relationship among the proposed constructs. The data from 179 employees at various organizations were analyzed to test proposed hypotheses. Results show that all proposed hypotheses were supported. This study contributes to IS community in terms of theoretically research framework as well as understanding of technostress at a workplace.
User Requirement Elicitation for U-City Residential Environment : Concentrated on Smart Home Service
Kim, Hyang Sook ; Kim, Hyo Chang ; Ji, Yong Gu ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 167~182
DOI : 10.7838/jsebs.2015.20.1.167
The concept of Smart home is receiving a huge attention as a future living environment because of its advantages for elderly and disabled to maintain their quality of life. Smart home is a place equipped with integration of technology and services and closely intertwined with occupant's lifestyle. Therefore it is critical to consider the user's actual needs for ensuring satisfaction. However despite growing researches on user values for smart home, there have been few studies clearly categorizing smart home service and stating user values depending on characteristics of service. Thus, the aim of this research is to classify smart home services on user's perspective, and reveal user values for each smart home services. Through the in-depth literature review, we elicited technology-related user values and service-related user values, and state classification for smart home service. Also the relationship between user values and each smart home services were revealed. The results of this research should help to reflect user's actual needs for designing smart home services.
A Case Study on the Implementation of Integrated Operation System of the Nakdong River Estuary Barrage Due to the Drainage Gate Extension
Kim, Seokju ; Lim, Taesoo ; Kim, Minsoo ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 183~199
DOI : 10.7838/jsebs.2015.20.1.183
Due to the Four Major Rivers Restoration Project, Nakdong River Estuary Barrage's designed flood quantity has been largely increased, and this has caused to construct several drainage gates at the right side of Eulsukdo island to secure the safety of downstream river area. For successful functioning of Nakdong River Estuary Barrage, such as flood control, disaster prevention, and the securing of sufficient water capacity, drainage gates at the both sides of island have to operate systematically and reliably. To manage this under restricted personnel and resources, we have implemented the IOS (Integrated Operation System) by integrating previous facilities and resources via information and communication technologies. The IOS has been designed to have higher availability and fault tolerance to function continuously even with the partial system's failure under the emergency situation like flood. Operators can use the system easily and acknowledge alarms of facilities through its IWS (Integrated Warning System) earlier. Preparing for Integrated Water Resources Management and Smart Water Grid, the architecture of IOS conformed to open system standards which will be helpful to link with the other systems easily.
A Design on Information Security Occupational Classification for Future Convergence Environment
Lee, Yunsoo ; Shin, Yongtae ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 201~215
DOI : 10.7838/jsebs.2015.20.1.201
Recently advanced security threats have increasingly occurred, and the necessity and importance of Information Security has been growing with the advent of the era of convergence beyond information-oriented age. Most domestic studies in the field of occupational classification of Information Security have only focused on technology-oriented occupations. Relatively little research has been carried out on the occupational classification in the view of convergence environment. Therefore, in this paper we gave a definition of Information Security occupations, classified them and draw required capabilities by occupations in order to design the occupational classification system of Information Security and the required capabilities for future convergence environment by analyzing the previous studies. We also reclassified the occupational classification and required capabilities by occupations, and verified the validity of them based on National Initiative for Cybersecurity Education's the occupational classification system of Information Security considering the future convertgence environment. It is expected that the results of this study will be employed as base data for manpower demand and supply and improvement of working conditions in the future convergence environments. In the future study we will build standardized instruction methods which provide occupational capabilities by using the required capabilities by occupations.
The Effect of Anonymity on Virtual Team Performance in Online Communities
Lee, Un-Kon ; Lee, Aeri ; Kim, Kyong Kyu ;
The Journal of Society for e-Business Studies, volume 20, issue 1, 2015, Pages 217~241
DOI : 10.7838/jsebs.2015.20.1.217
One of the challenges in online community management is what level of perceived anonymity can be granted to encourage active participation from members while discouraging unhealthy activities. Few studies developed a scheme of anonymity and investigated how different levels of anonymity influence community activities. This study develops a classification scheme of anonymity encompassing the following three different levels : (1) real name(no anonymity), (2) nickname (partial anonymity), and (3) random assignment of a temporal ID (complete anonymity). Then, it examines how different levels of anonymity influence trust and perceived risk, which in turn affect virtual team performance. A series of laboratory experiments were performed, manipulating the levels of anonymity, in the context of well-structured communities that allow prior interactions among community members. The data was collected from 364 laboratory participants and analyzed using ANOVA and PLS. The results indicate that the difference of anonymity between (2) and (3) had not be significant and the only (1) could not guarantee the anonymity. The impact of anonymity on trust and perceived risk could not be significant in this situation. These findings could contribute to make more beneficial member identification strategies in online community practice.