Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 20, Issue 4 - Nov 2015
Volume 20, Issue 3 - Aug 2015
Volume 20, Issue 2 - May 2015
Volume 20, Issue 1 - Feb 2015
Selecting the target year
A Study on the Relationship between Internet Search Trends and Company's Stock Price and Trading Volume
Koo, Pyunghoi ; Kim, Minsoo ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 1~14
DOI : 10.7838/jsebs.2015.20.2.001
In this paper, we investigate the relationship between Internet search trends and stock market. Under the assumption that investors may use Internet search engine to obtain information for companies of their interests before taking actual investment actions, the relationship between the changes on Internet search volume and the fluctuation of trading volume as well as stock price of a company is analyzed with actual market data. A search trend investment strategy that reflects the changes on Internet search volume is applied to large enterprises' group and to small and medium enterprises' (SMEs) group, and the correlation between profit rate and trading volume is analyzed for each company group. Our search trend investment strategy has outperformed average stock market returns in both KOSPI and KOSDAQ markets during the seven-year study period (2007~2013). It is also shown that search trend investment strategy is more effective to SMEs than to large enterprises. The relationship between changes on Internet search volume and stock trading volume is stronger at SMEs than at large enterprises.
Development of Electronic Documents and Management System for Transfer of Disaster Damage and Recovery Information
Yoon, Hyuk-Jin ; Kim, Joo-Sung ; Park, Jung-Jun ; Chang, Tai-Woo ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 15~26
DOI : 10.7838/jsebs.2015.20.2.015
To prevent the spread of damage, initial reaction and emergency repair are important. But up to now they depend on some guidelines and man power owing to the lack of technical support. In this paper, we described the development process of several electronic documents and information management system of them to rapidly acquire and share damage information of the infrastructure. The damage information, which is acquired by the computer and smart phone, is transformed to the electronic documents and connected to data management system through the damage information acquisition network. These systems could readily be used for preparing a countermeasure of the disaster and disaster recovery.
An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage
Lee, Chi-Seok ; Kim, Yanghoon ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 27~36
DOI : 10.7838/jsebs.2015.20.2.027
Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.
A Study on the Effect of Smartwork Environment on Office Administrators' Organizational Effectiveness: Moderated by Concerns and Work-Life Balance
Kim, Myong Ok ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 37~71
DOI : 10.7838/jsebs.2015.20.2.037
At present, the importance of organizational effectiveness is highlighted even more as business environment enters into a new type of work setting, the smartwork environment. This new type of work environment could be significantly influential in promoting organizational effectiveness of office administrators who carry out atypical types of tasks in general and are exposed to emotional labor excessively. Organizational effectiveness of office administrators could also be controlled by their concerns at work, their personal values and the increasing demand for work-life balance. The main purpose of this research is to investigate how smartwork environment perceived by office administrators is related with organizational effectiveness. In addition, this research places the focus on how concerns and work-life balance moderate the relationship between smartwork environment and organizational effectiveness. The survey was conducted among 102 office administrators, and data were analyzed by moderated multiple regression analysis method. Job autonomy of smartwork environment showed positive effect on job satisfaction, organizational commitment, and innovative behavior. IT dependence of smartwork environment showed negative effect on job satisfaction and organizational commitment and positive effect innovative behavior. It was found that concerns with impact positively moderate the effects of job autonomy on job satisfaction and innovative behavior; concerns with self negatively moderate the effects of job autonomy on organizational commitment and innovative behavior. Also, it was found that work-life balance moderates the effects of job autonomy on organizational commitment and the effects of IT dependence on innovative behavior. The result of this research can be taken into consideration when a strategic human resource development plan is prepared for office administrators in smartwork environment.
e-Book Viewer's Quality Factors Influencing User Satisfaction: Comparison by Content Type
Yun, Haejung ; Kim, Doojong ; Lee, Choong C. ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 73~91
DOI : 10.7838/jsebs.2015.20.2.073
Nowadays, 'books' are not limited to tangible items no longer, but can be intangible digital contents, along with advancement in e-Book technology and the growth of the markets. However, the role of e-Book viewers that links digital contents and readers has been rarely studied. In this study, therefore, we examined the effects of e-Book viewer's system quality (ease-of-use, functional diversity, interactivity) and design quality (convenient design, intuitive design, emotional design) on user satisfaction, and also tested if these relations are different by the content types (cartoon, novel, and learning contents). Research findings show that all the independent variables, except for interactivity, affect user satisfaction in overall groups. In viewing cartoon content, ease-of-use, convenient design, and emotional design were significant antecedents, and intuitive design and emotional design were found important factors in novel content, while functional diversity and interactivity affect user satisfaction in learning content. We expect these findings can provide useful insights to the providers of e-Book viewers.
Analysis of Loss Expectancy on Personal Information leakage using Quantitative Invest Decision Model
Kim, Jeong Yeon ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 93~106
DOI : 10.7838/jsebs.2015.20.2.093
Providing trading partners with personal information to establish an e-commerce financial transaction is inevitable. Most e-commerce companies keep personal information and transaction data for user's convenience and develop additional services as their applications. However, keeping personal information increases the likelihood of identity theft causing direct or indirect damage while it may simplify repetitive financial transactions. This study introduces risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management. The empirical analysis with survey results from KISA (Korea Information Security Agency) shows that the root cause of different statistics of personal information leakage incidents according to core business of internet companies is the difference in their Loss Expectancy caused by them. Also we suggest disciplinary compensation and higher standard for personal information protection as a solution to prevent the variation of investment on it between individual companies.
A Study on Development and Application of Taxonomy of Internet of Things Service
Kim, Eun-A ; Kim, Kwang Soo ; Leem, Choon Seong ; Lee, Choong Hyun ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 107~123
DOI : 10.7838/jsebs.2015.20.2.107
Internet of Things (IoT) is being globally spotlighted as a fundamental technology to realize hyper-connected society, and as new growth engines of nation and enterprises. Although the technical aspect of IoT receives a great deal of attention as a new business opportunity, the business aspect of IoT is suffering insufficient scholarly research and objective insight. Thus, the business aspect of IoT requires a thorough research on its service market and business opportunities. In order to stimulate the IoT service market and facilitate objective statistic data aggregation, this paper aims to suggest an IoT service categorization model. This model is comprised of three perspectives which are IoT purpose, IoT Player, and IoT Domain; they function as tools to comprehensively analyze the IoT industry. Efficacy of this model has been confirmed by simulating 117 IoT services on the model, in which the results successfully offered the market trend of the IoT service based on Case. This study is able to apply for basic research of IoT-Service Development Plan, and provide practical implications.
Designing Index for Assessing Structural Vulnerability of Supply Chain considering Risk Propagation
Moon, Hyangki ; Shin, KwangSup ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 125~140
DOI : 10.7838/jsebs.2015.20.2.125
It is general that the impact of supply chain risk spread out to the whole network along the connected structure. Due to the risk propagation the probability to exposure a certain risk is affected by not only the characteristics of each risk factor but also network structure. It means that the structural connectivity among vertices should be considered while designing supply chain network in order to minimize disruption cost. In this research, the betweenness centrality has been utilized to quantitatively assess the structural vulnerability. The betweenness centrality is interpreted as the index which can express both the probability of risk occurrence and propagation of risk impact. With the structural vulnerability index, it is possible to compare the stability of each alternative supply chain structure and choose the better one.
Analysis of C2C Internet Fraud and Its Counter Measures
Jung, Jinhyo ; Lee, Chang-Moo ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 141~153
DOI : 10.7838/jsebs.2015.20.2.141
In recent days, internet appears to be a daily necessity, which leads to the increase of internet fraud. This study particularly focuses upon C2C internet fraud, while other researches on internet fraud seldom touch such a topic. The aim of this study is to grasp the stark reality of the soaring C2C online fraud, to categorize the type of the frauds, to identify the root causes of the fraud, and to suggest security measures to prevent the C2C online fraud.
Fast Random Walk with Restart over a Signed Graph
Myung, Jaeseok ; Shim, Junho ; Suh, Bomil ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 155~166
DOI : 10.7838/jsebs.2015.20.2.155
RWR (Random Walk with Restart) is frequently used by many graph-based ranking algorithms, but it does not consider a signed graph where edges may have negative weight values. In this paper, we apply the Balance Theory by F. Heider to RWR over a signed graph and propose a novel RWR, Balanced Random Walk (BRW). We apply the proposed technique into the domain of recommendation system, and show by experiments its effectiveness to filter out the items that users may dislike. In order to provide the reasonable performance of BRW in the domain, we modify the existing Top-k algorithm, BCA, and propose a new algorithm, Bicolor-BCA. The proposed algorithm yet requires employing a threshold. In the experiment, we show how threshold values affect both precision and performance of the algorithm.
A Study on Information Security Departmentalization Model
Kang, Hyunsik ; Kim, Jungduk ;
The Journal of Society for e-Business Studies, volume 20, issue 2, 2015, Pages 167~174
DOI : 10.7838/jsebs.2015.20.2.167
Information security organization has normally been organized under the IT department. However, as the importance of information security has gradually increased, the way of information security organized for enterprise security management has become a noteworthy issue. The need for separation of Information security organization from IT department is growing, such as restriction on the concurrent positions in CIO and CISO. Nowadays there are many studies about Information security organization while relatively there has been minimal research regarding a departmentalization. For these reasons this study proposes a Information Security Departmentalization Model which is based on business risk and reliance on the IT for effectively organizing Information security organization, using Contingency theory. In addition, this study classified the position of Information security organization into Planning & Coordination, Internal Control, Management and IT and analyze the strengths and weaknesses of each case.