Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea society of IT services
Journal Basic Information
Journal DOI :
The Korea Society of Information Technology Services
Editor in Chief :
Lim Gyu Geon
Volume & Issues
Volume 10, Issue 4 - Dec 2011
Volume 10, Issue 3 - Sep 2011
Volume 10, Issue 2 - Jun 2011
Selecting the target year
Bidimensionality of Trust In the Electronic Commerce
Kim, Jong-Ki ; Kim, Sang-Hee ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 1~20
DOI : 10.9716/KITS.2011.10.2.001
Due to the wide use of internet, electronic commerce market is gradually increasing but consumers still conceive various transaction-related problems. Various studies argue that those problems are obstructing trust in electronic commerce. Most studies on electronic commerce address that trust is measured as a Single dimension in which factors obstructing trust are same as those of increasing distrust. However, this study doesn`t view trust as a single dimensional level but understands trust and distrust are bidimensional. This study also holds a viewpoint that they are influenced by different antecedents. According to the results of empirical analysis, the antecedents of trust have a significant explanatory power to trust and those of distrust have it to distrust. Other relations among the notions of trust and distrust, perceived risk and purchase intention as depicted in the research model are all statistically significant except the relation between distrust and purchase intention. This study shows a strong evidence of the bidimensionality of trust with separate antecedents.
Impact of CRM Activities on Behavioral Intention Through the Relational Benefits : A Focus on the Cosmetic Industry
Zhang, Yuanrong ; Kang, Seung-Chul ; Min, Dai-Hwan ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 21~39
DOI : 10.9716/KITS.2011.10.2.021
After ten years from the introduction of CRM systems, many companies reevaluate CRM from the perspective of customers. This paper classifies CRM activities at the contact points with customers and investigates the effect of CRM activities on perceived benefits and the effect of perceived benefits on behavioral intention in the Korean cosmetic industry. The result showed that contact management and complaint handling affected social benefits and that customers perceived confidence benefits from contact management, complaint handling, and churn management. Special treatment benefits were affected by all CRM activities including compensation management. Finally, all kinds of benefits had effects on behavioral intention such as recommendation intention and repurchase intention.
A Study on the Effects of Perceived Characteristics on Continuous Usage Intention in Smartphone Application
Cho, Yoo-Jae ; Choi, Jeong-Il ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 41~60
DOI : 10.9716/KITS.2011.10.2.041
Due to the explosive growth of smartphone use, new type and format of business opportunity is being created. Despite the creation of added value using smartphone is very important, the past study on smart phone has been mainly focused on its functions and specifications. This study is intended to identify the factors that influence continuance usage intention of smartphone and to analyze the relationship between such factors and the expected confirmation. satisfaction, and usage intention. The result of this empirical study indicates that the perceived enjoyfulness and quality significantly affect users` expected confirmation and satisfaction, and social influence also affects users` continuance usage intention. Thus, it implies users place a high value on enjoyfulness and quality in using smartphone application and on social influence in choosing specific application. Finally this paper provides a detailed account of how customers accept smartphone application and their perceived characteristics affect the usage intention.
A Case Study on the Application of PSDM for Development of Product Information Systems
Joo, Seok-Jeong ; Hong, Soon-Goo ; Park, Soon-Hyoung ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 61~74
DOI : 10.9716/KITS.2011.10.2.061
SMEs(Small and Medium-sized Enterprises) have implemented the various IT-based Production Information Systems(PIS) to cope with the highly competitive environment as well as to improve their competitiveness and productivity. For the efficient development of PIS In SMEs, standardizing the system development process is required. Methodology for the development of PIS is especially important for the systematic and efficient implementation to communicate among the SI companies, SMEs, and a supervision agency. TIPA(Korea Technology and Information Promotion Agency for SMEs) has developed PSDM(Production System Development Methodology), and supplies it to the SI companies. The research goal of this paper is to explore the productivity improvement by adopting the PSDM with the cases of SI companies applied PSDM. The results show that such benefits as risk management, productivity improvement, easy system implementation and maintenance are perceived by PSDM Users. This research could be the first case study reveal the effectiveness of PSDM. For further research, the survey could be carried out with more samples.
Network Neutrality in the Digital Convergence Era : a System Dynamics Model with Two-Sided Market Framework
Kim, Do-Hoon ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 75~94
DOI : 10.9716/KITS.2011.10.2.075
The industrial ecosystem around the Internet services has been evolving since the Internet was first introduced. The Net Neutrality issue best represents the process of the evolution and presents an inevitable challenge that the industry should overcome. This paper deals with this structural change with the Two-Sided Market framework and provides a System Dynamics(SD) model to evaluate the economic implications of the net neutrality policy. In particular, our approach analyzes the policy impacts when two competing platforms (network providers) play a role of the platform in a typical two-sided market, which connects Content Providers(CPs) with users. Previous studies show that the indirect network externality between these two markets makes the entire system tip to one platform. When the multi-homing in the CP market is allowed as in our model, however, their argument may lose its validity. To examine the system behavior, conducted here is SD simulations of our model. The simulation results show that co-existence of the competing platforms persists with the network effects over a certain threshold. The net neutrality policy seems to lower the threshold based on our experimental outcomes.
A Study of IT Governance Model for Enterprise Information Management : Focused on Case Company
Ahn, Jong-Chang ; Kang, Youn-Chol ; Lee, Ook ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 95~117
DOI : 10.9716/KITS.2011.10.2.095
Today, IT governance has also become a subject of attention along with recent technologies such as ITSM (IT Service Management), PPM (Project Portfolio Management) and Compliance. At the national level, the market is fairly recent. and therefore, lacks detailed research in the field. Models specifically related to EIM has not yet been presented to this day, hence, firms that are considering EIM as a potential part of their information management system may fall into a state of disorder in the process of its implementation. To this end, this research attempts to construct an IT governance model for EIM based on existing models, surveys and interviews. In particular, E-discovery has been applied as means of protecting information assets and its use as evidence. In addition, by applying the research model to a particular global firm and then assessing its documentation management system, the overall feasibility of the research model has been tested.
Proposing User-Oriented u-Service Classification by Ubiquitous Characteristic
Woo, Hyeok-Jun ; Lee, Jung-Hoon ; Park, So-Yeon ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 119~139
DOI : 10.9716/KITS.2011.10.2.119
The concept of ubiquitous is being applied on diverse industry fields as a new growth engine in Korea. With constructing u-City, new services which are called `ubiquitous services` are developed actively. Even though there are active movement to develop u-service, there is no clear definition of what service can be defined as ubiquitous service. Given that this study proposes a u-service value classification framework focusing on services` characteristics. We conducted experts` group interviews to analyze new operating or developing services whether it can be ubiquitous. Study results show that some services are hard to be defined as u-service, so this study offers possible improvement alternative. The u-service value classification which offers clear definition of u-service can be used for the practitioners offering measurement framework of u-service level.
The Measurement Model for the Evaluation of Information Systems Service : The Case of Chinese SI Company
Lee, Sang-Jae ; Lim, Gyoo-Gun ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 141~162
DOI : 10.9716/KITS.2011.10.2.141
The controls of Information Systems (IS) have been an more critical issue controls as the sophistication and integration of IS is more proceeded. ITGI (The Information Technology Governance Institute) of ISACA (Information Systems Audit and Control Association) has suggested COBIT (Control Objectives for Information and related Technology) and this has been widely recognized the evaluation model of IS controls. In COBIT, IS was evaluated in terms of process, information quality, and IT resources. This study used COBIT in order to suggest and empirically test an evaluation model of IS service. The data was collated from one major Chinese SI (Systems Integration) company in four domains of processes : planning and organization, acquisition and implementation, delivery and support, and monitoring. Seven factors are extracted using an exploratory factor analysis as follows : Overall IT planning process, technological assessment process in IT planning of IT, cost-benefit assessment process in IT planning, implementation process, support process, monitoring process, post-implementation evaluation process. The results of confirmatory analysis of three alternative measurement models indicated that the measurement model with one inherent or conceptual variable has greater model fitness than the other models. This study suggests the logical and general way to test and apply COBIT in evaluating IS services.
Analysis of Authentication Systems for Future Internet Service Environments
Park, Seung-Chul ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 163~176
DOI : 10.9716/KITS.2011.10.2.163
In the current Internet environment, there may exist a number of independently-operating authentication systems even within a single organization, according to the service types and service providing entities. Current silo-style isolated authentication system model has revealed critical problems in the aspects of usability, cost-effectiveness, extensibility and flexibility, and privacy protection. Recently, several next generation authentication systems have been actively developed by leading industrial and standardization institutions. This paper firstly analyzes the problems of current Internet authentication system environments. And then, the underlying idea, operating procedures, and pros and cons of the newly developed next generation authentication systems are analyzed so as to provide the selection guidelines for the new authentication systems and drive further development directions for future Internet authentication systems.
The Efficiency Evaluation of Coking Coals Using Data Envelopment Analysis
Seong, Deok-Hyun ; Suh, Min-Soo ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 177~188
DOI : 10.9716/KITS.2011.10.2.177
This paper proposes a DEA model for the performance evaluation of each brand of coking coals in an integrated steel mill. The performance is defined as the efficiency which is the ratio of two linear combinations of the output factors to the input factors. There is only one input factor considered in the model : unit price of each brand based on CIF. Five output factors are chosen in consideration of their impact to the quality of cokes such as Ash, VM, LMF, TD, and Rm. Some of the output factors are treated as undesirable in DEA model because the quality criteria are given by the range. The CCR and BCC efficiencies are derived by the DEA model, and the scale efficiency is calculated, too. Each brand of coking coal is classified into four categories according to the CCR and BCC efficiencies, and the most inferior brands are identified as a result. The impact of the input and output factors to the efficiency is analyzed using a multiple regression, then the unit price is revealed as the most critical among them. Also, ANOVA results show that there exist efficiency differences among the coal types and the countries imported, respectively. Finally, the quantitative projection for the inefficient brands is performed if they are to be efficient. The result could be utilized in selecting the good or bad brands of coking coal based on the efficiency in an integrated steel mill. Also, this model will be used to assess the relative efficiency of a new brand of coking coal if it is a candidate to be imported.
Tag-based Evaluation Model for Economic Feasibility Analysis of Mobile RFID System in Ubiquitous Space
Lee, Kyoung-Jun ; Choi, Hyung-Kwang ; Jun, Jung-Ho ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 189~202
DOI : 10.9716/KITS.2011.10.2.189
It is important issue how to evaluate the economic feasibility of computing factors in the real world when we build ubiquitous spaces. In this paper, we propose a simple model that can evaluate the economic feasibility of mobile RFID-based ubiquitous computing system which enables seamless communication between offline and online via embedded computing factors in the real world. To achieve this, we explore the meaning of mobile RFID system, the difference between our research and extant researches concerning the evaluation of economic feasibility in RFID system, and propose the so-called `Tag-based Evaluation Model` (TEM) which is an evaluation model to access the economic feasibility of mobile RFID systems. We also analyze the TEM via simulation cases based on proposed model and discuss the future of TEM.
The Structural Equation Modeling in MIS : The Perspectives of Lisrel and PLS Applications
Kim, In-Jai ; Min, Geum-Young ; Shim, Hyoung-Seop ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 203~221
DOI : 10.9716/KITS.2011.10.2.203
The purpose of this study is to investigate the applications of Structural Equation Modeling(SEM) into MIS area in recent years. Two methodologies, Lisrel and PLS, are adopted for the method comparison. A research model, based upon TAM(Technology Acceptance Model) is used for the analysis of the data set of a previous study. The research model includes six research variables that are composed of twenty-eight question items. 272 data are used for data analyses through Lisrel v.8.72 and Visual PLS v.1.04. This study shows the statistical results of Lisrel are the same to those of PLS. The contribution of this study can be suggested as the followings; (1) A theoretical comparison of two methodologies is shown, (2) A statistical analysis is done at a real-situated data set, and (3) Several implications are suggested.
A SOA based Framework Using AOP for Reliable Service Applications
Kim, Eun-Sun ; Lee, Jae-Jeong ; Lee, Byung-Jeong ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 223~234
DOI : 10.9716/KITS.2011.10.2.223
Loosely coupled properties of SOA(Service Oriented Architecture) services do not guarantee that service applications always work properly. Service errors may also influence other services of SOA. These characteristics adversely affect software reliability. Therefore, it is a challenge to effectively manage system change and errors for operating services normally. In this study, we propose a SOA based framework using AOP(Aspect Oriented Programming) for reliable service applications. AOP provides a way to manipulate cross-cutting concerns such as logging, security and reliability and these concerns can be added to applications through weaving process. We define a service specification and an aspect specification for this framework. This framework also includes service provider, requester, repository, platform, manager, and aspect weaver to handle changes and exceptions of applications. Independent Exception Handler is stored to exhibited external Aspect Service Repository. When exception happened, Exception Handler is linked dynamically according to aspect rule that is defined in aspect specification and offer function that handle exception alternate suitable service in systematic error situation. By separating cross-cutting concerns independently, we expect that developer can concentrate on core service implementation and reusability, understanding, maintainability increase. Finally, we have implemented a prototype system to demonstrate the feasibility of our framework in case study.
Early Software Quality Prediction Using Support Vector Machine
Hong, Euy-Seok ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 235~245
DOI : 10.9716/KITS.2011.10.2.235
Early criticality prediction models that determine whether a design entity is fault-prone or not are becoming more and more important as software development projects are getting larger. Effective predictions can reduce the system development cost and improve software quality by identifying trouble-spots at early phases and proper allocation of effort and resources. Many prediction models have been proposed using statistical and machine learning methods. This paper builds a prediction model using Support Vector Machine(SVM) which is one of the most popular modern classification methods and compares its prediction performance with a well-known prediction model, BackPropagation neural network Model(BPM). SVM is known to generalize well even in high dimensional spaces under small training data conditions. In prediction performance evaluation experiments, dimensionality reduction techniques for data set are not used because the dimension of input data is too small. Experimental results show that the prediction performance of SVM model is slightly better than that of BPM and polynomial kernel function achieves better performance than other SVM kernel functions.
A Multiple-Disseminators Determining Mechanism for Fast Code Dissemination in Wireless Sensor Networks
Kim, Mi-Hui ; Hong, June-S. ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 247~257
DOI : 10.9716/KITS.2011.10.2.247
In this paper, we propose a multiple-disseminators determining mechanism for Efficient Code Dissemination with low-delay(ECoDi) for wireless sensor networks (WSN). Code dissemination is in the spotlight as an important research issue since sensor nodes are necessary for updating new software remotely or fixing bugs dynamically. In particular, the time factor for code dissemination is the most important factor in order that the normal operation of nodes can be continuously performed as soon as finishing the dissemination. For this factor, ECoDi determines the set of disseminators through regression analysis based on the size of distributed code and the time of past unicasts and broadcasts. Then it transmits the entire code as a unicast to multiple disseminators, and the disseminators broadcast the code to the remaining neighbor nodes. Performance results on a testbed show that ECoDi reduces dissemination time significantly compared to a conventional scheme.
An Extension of PC based B
sy Audiometer to Support Client/Server Model
Song, Bok-Deuk ; Kang, Deok-Hun ; Sim, Hye-Jin ; Shin, Bum-Joo ; Kim, Jin-Dong ; Jeon, Gye-Rok ; Wang, Soo-Geun ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 259~269
DOI : 10.9716/KITS.2011.10.2.259
sy audiometer is used to determine not only hearing threshold but also assumption of recruit phenomenon and cause of disease. However, current B
sy audiometer takes an operational model, so called face-to-face model, in which model one audiometrist can assess only one subject at a time. As a result, the face-to-face model leads to high audiometrist`s labor cost and long waiting time when there exist many subjects. To improve such weakness, this paper extends PC based B
sy audiometer to support client/server model in which model one audiometrist enables to concurrently access several subjects. As providing capabilities such as real-time transfer of assessment result, video monitoring of subject and video chat, the same effect as face-to-face model but overcomes weakness of face-to-face model.
Empirical Evaluation of Wireless Mesh Networks for Construction IT in Tunnel Environments
Yang, Chang-Mo ; Lee, Seung-Beom ; Choi, Soo-Hwan ; Eom, Doo-Seop ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 271~279
DOI : 10.9716/KITS.2011.10.2.271
This paper draws performance results through comparing WMNs` methods when the WMNs are used in tunnel construction sites. There are many advantages of WMNs : lower cost, easy to network maintenance, robustness and reliability within RF-ranges. As a result, using the WMNs would be suitable to employ as a network infrastructure for the construction sites. This paper evaluates the performance of WMNs which we have installed in a tunnel construction. Through the performance results, we conclude the performance of data throughputs gets lower when we perform the network in tunnel environments. We make attempts WMNs` two major methods which are SISC(Single Interface with Single Channel) and MIMC(Multi Interface with Multi Channel) to figure out which method will be better for the construction sites. Through the experiments, the WMN based on the MIMC method was comparatively suitable in network performance aspect for the tunnel Sites.
A Study of the Relationship between Purchase Association and Contents Similarity of Products in e-Commerce
Lee, Hong-Joo ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 281~292
DOI : 10.9716/KITS.2011.10.2.281
Many online stores provide relevant products in product pages or other pages to attract customer interests. Association rules based on customer purchases and personalized recommendations are most prominently used ways of providing relevant products. Though there have been many studies to apply tags of products as metadata of the products, there are few studies to investigate contents similarities between the products and the suggested products. Thus, this study collects books in purchase associations and their tags in Amazon.com and assesses the similarities between the books. We found out that the contents similarities based on tags are similar among business, literature, and computer networks. And the similarity is also similar among the relevant books that have different ranks.
A Study for Effectiveness of Preliminary Security Assessment on Online Game Service Domain
Yoo, Dong-Young ; Seo, Dong-Nam ; Kim, Huy-Kang ; Choi, Jin-Young ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 293~308
DOI : 10.9716/KITS.2011.10.2.293
The preliminary security assessment is an information security process to analyze security weaknesses before beginning of services. Discovering security weakness through preliminary security assessment is highly required because it costs much when security incident occur in the middle of service operation. However, this assessment is not widely spread in the online game service domain yet. In this paper, we summarize the security risk existed in the online game service, and we classify the security requirements related to the each risk. Also, through the case study, we evaluated the effectiveness of preliminary security assessment in this domain. In addition, we suggest checklists that should be reviewed once in game-client side, network-side and game-server side for the purpose of security enhancement.
A Methodology for Ontology-based Service Drawing for SOA
Jang, Ryo-Sun ; Park, Sei-Kwon ; Ryu, Seung-Wan ; Shin, Dong-Cheon ;
Journal of the Korea society of IT services, volume 10, issue 2, 2011, Pages 309~327
DOI : 10.9716/KITS.2011.10.2.309
Even though several methodologies for SOA(Service Oriented Architecture) have been proposed, in practical aspects most of them have some problems since they fail to propose specific policies in definition and identification of a service. This paper proposes a service modeling methodology. SOMO(Service Oriented Modeling using Ontology), which draws proper services in the process of defining and identifying services. SOMO defines a service ontology based on service definition and characteristics in SOA. The service drawing process consists of 3 steps : requirement analysis, service identification, and service definition. SOMO is expected to increase the degree of reuse and facilitates the definition and search of services by using service ontology. In addition, it clearly allows the definition and identification of services, satisfying the user requirements.