Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
The Journal of Society for e-Business Studies
Journal Basic Information
Journal DOI :
Society for e-Business Studies
Editor in Chief :
Volume & Issues
Volume 20, Issue 4 - Nov 2015
Volume 20, Issue 3 - Aug 2015
Volume 20, Issue 2 - May 2015
Volume 20, Issue 1 - Feb 2015
Selecting the target year
Small Business Technological Assets Protection Factors Analysis Using Logistic Regression Analysis
Hong, Jun Suk ; Park, Won Hyung ; Kim, Yanghoon ; Kook, Kwang Ho ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 1~10
DOI : 10.7838/jsebs.2015.20.3.001
The main objective of this study was to identify the factors that can maximize the effect of preventing technology leakage by government support. Therefore we used the 2013 small business technology protection capabilities and level of research which is conducted by the Small and Medium Business Administration, and have analyzed the presence of small business technological assets leakage protection eand skills. Multiple logistic regression analysis was performed to identify 1,518 small companies (43 big companies are excluded) which are divided into 155 technological assets leaked small business and non-leaked 1363 small business. The most important factors associated with technology leakage were entrant control system, security audit, employee absence of security activities and important data protection measures. This result shows that if the government can support more for these details, technological asset leakage prevention effect is expected to be maximized.
Factors Influencing User Satisfaction and Continuous Usage Intention on Mobile Credit Card: Based on Innovation Diffusion Theory and Post Acceptance Model
Jung, Young Hoon ; Kim, Gun ; Lee, Choong C. ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 11~28
DOI : 10.7838/jsebs.2015.20.3.011
Due to the mobil-centered lifestyle following the wider use of Smartphones, Mobile services, including mobile banking and mobile shopping business have increased rapidly. Also with the emergence of "Fintech", which finance combined with technology, IT based financial market is going to be highly promising. In this trend, interests mobile credit cards are increasing. But diffusion of the mobile credit card services is still in the low level. In this situation, to identify factors that influencing satisfaction and continuous usage intention on mobile credit card, this study applied innovation diffusion theory (IDT) and post acceptance model (PAM). To conducting this research, survey data were collected, and we used SmartPLS to analyze survey data. As a result of the study, perceived easy of use, image, compatibility and facilitation positively affect user's satisfaction in mobile credit cards and that such satisfaction have a positive impact on continuous intention to use. The facilitation influences user satisfaction more strongly for those who use mobile credit cards more than plastic credit cards. Also, perceived of use and image influence user satisfaction more strongly for those who use plastic credit cards more than mobile credit cards. It is expected that this study can be a guideline for credit card service providers and policy makers to invigorate mobile credit card business. Also it worths as a early-stage research on Fintech-related studies.
A Study of PD System Effectiveness based on R&D Network Analysis
Park, Mi-Yeon ; Lee, Sangheon ; Shen, Hongme ; Leem, Choon Seong ; Kim, Wooju ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 29~46
DOI : 10.7838/jsebs.2015.20.3.029
Examined how it varied the knowledge network of the country along with R&D changes in planning policy for the research and development of government. Therefore, in this study, chronological Analysis analyzed separately the network between each entity of participate in the industry fusion source technology development business of industry trade and Energy. Planning policy of industrial fusion source technology development business, to change the starting point before and after 2012, before 2012 from selected planning issues at the center "planning committee" and in 2012 'PD' changes to a system for planning issues around. First of all, an attempt to analyze the R&D network based on the "planning committee" current situation of 2009~2011, from 2012 to analyze the variation of the R&D network with the introduction of the 'PD' system after it was analyzed by dividing the time in the current state of up to 2013. The results of the analysis, since the PD system was introduced, such as self-relationship (the form of planning user to run directly challenges the person was planning to challenge participants)is greatly improved, I was able to grasp the effect became clear. The more the self-relation, and the budding scholars considering that there is inequality of the planning, the introduction of the PD scheme, it can be seen to have resulted in a positive effect. These studies, quantitatively analyzed to improve the results to the effects associated with changes in the planning policy of the government, I think that there is a meaning in terms of presenting the future direction of R&D policy.
Security Knowledge Classification Framework for Future Intelligent Environment
Na, Onechul ; Lee, Hyojik ; Sung, Soyung ; Chang, Hangbae ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 47~58
DOI : 10.7838/jsebs.2015.20.3.047
Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.
An Empirical Study of Discontinuous Use Intention on SNS: From a Perspective of Society Comparison Theory
Cha, Kyung Jin ; Lee, Eun Mok ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 59~77
DOI : 10.7838/jsebs.2015.20.3.059
Social networking sites (SNS), such as Facebook, provide abundant social comparison opportunities. Given the widespread use of SNSs, the purpose of the present study was to examine the impact of exposure to social media-based social comparison on user's negative emotions and discontinuous use intention on SNS. We present evidence that under the use of SNS, social comparison activities diverge into three patterns, with explicit self-evaluation desire made against similar target (lateral comparison), self-defense desire made against less fortunate target (downward comparison), and self-enhancement desire made with more fortunate target (upward comparison). Such social comparison processes frequently arise, as people are increasingly using on SNSs, the downward contacts ameliorating self-esteem with positive emotions, but the upward contacts and standard contacts with lateral status enabling a person to compare his or her situation with others and simultaneously increase negative emotions due to its differences with others. In other words, as people increasingly relying on SNSs for a variety of everyday tasks, they risk overexposure to upward or standard social comparison information that may have a cumulative detrimental impact on future intention on SNS use. This study with survey with 209 SNS users found that these negative emotions lead to negative fatigue (attitude) and then discontinuous use intention (behavior) on SNS. Our findings are among the first to explicitly examine discontinuous use intention on SNS using social comparison theory and our results are consistent with those of past research showing that upward social comparisons can be detrimental.
A Study for Personalized Multimedia Information Services
Park, Jisoo ; Kim, Mucheol ; Rho, Seungmin ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 79~87
DOI : 10.7838/jsebs.2015.20.3.079
With recent emergence of Web 2.0 technology, many services are encouraging the user participation. Then, many approaches dealing with multimedia contents focused on the personalized information provisioning. The proposed approach analyzes the user requirements and previous methodology for personalized information provisioning. Furthermore, we propose the user participation based multimedia services with collaborative tagging.
A Study on the Architecture of Cloud Hospital Information System for Small and Medium Sized Hospitals
Lee, Nan Kyung ; Lee, Jong Ok ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 89~112
DOI : 10.7838/jsebs.2015.20.3.089
Recently, the business environment of healthcare has changed rapidly due to the entering the mobile era, the intensifying global competition, and the explosion of healthcare needs. Despite of necessity in expanding new IT-based medical services and investing IT resources to respond environmental changes, the small and medium sized hospitals could not realize these requirements due to the limited management resources. CHISSMH is designed and presented in this research to provide high valued clouding medical services with reasonable price. CHISMH is designed and presented in this research to provide high valued medical services with reasonable price through cloud computing. CHISME is designed to maximize resource pooling and sharing through the visualization. By doing so, Cloud Service provider could minimize maintenance cost of cloud data center, provide high level services with reasonable pay-per-use price. By doing so, Cloud Service provider could minimize maintenance cost of cloud data center, and could provide high level services with reasonable pay-per-use price. CHISME is expected to be base framework of cloud HIS services and be diffusion factor of cloud HIS services Operational experience in CHISSMH with 15 hospitals is analyzed and presented as well.
A Design on Information Security Core Knowledge for Security Experts by Occupational Classification Framework
Lee, Hyojik ; Na, Onechul ; Sung, Soyoung ; Chang, Hangbae ;
The Journal of Society for e-Business Studies, volume 20, issue 3, 2015, Pages 113~125
DOI : 10.7838/jsebs.2015.20.3.113
Information Security Incidents that have recently happen rapidly spread and the scale of that incidents' damage is large. In addition, as it proceeds to the era of converged industry in the future environment and the virtual cyber world expands to the physical world, new types of security threats have occurred. Now, it is time to supply security professionals who have a multi-dimensional security capabilities that can manage the strategies of technological security and physical security from the management point of view, rather than the ones who primarily focus on the traditional technologic-centered strategies to solve new types of security threats. In conclusion, in this paper we try to produce the curriculum of information security featured in the occupational classification system and analyze the subjects that are additionally required for those who move to other occupations to cultivate security professionals who suited to the converged-industrial environment. It is expected that multi-dimensional security professionals who suited to the converged-industrial environment will be cultivated by harmoniously integrating information security subjects from technological and business/managerial perspectives, and education training courses will be developed that effectively provide core knowledges per occupational classification when people moves to other occupations in the areas of information security.