Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea society of IT services
Journal Basic Information
Journal DOI :
The Korea Society of Information Technology Services
Editor in Chief :
Lim Gyu Geon
Volume & Issues
Volume 13, Issue 4 - Dec 2014
Volume 13, Issue 3 - Sep 2014
Volume 13, Issue 2 - Jun 2014
Volume 13, Issue 1 - Mar 2014
Selecting the target year
Factors Affecting Intention to Use Security Functions in SNS
Kim, Hyeob ; Kim, Kyung Kyu ; Lee, Ho ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 1~17
DOI : 10.9716/KITS.2014.13.2.001
Social networking service (SNS) is a service that allows people to share information, manage relationships with others, and express themselves on the Internet. The number of SNS users have increased explosively with the growth of mobile devices such as smartphones. As the influence of SNS has grown extensively, potential threats to privacy have also become pervasive. The purpose of this study is to empirically examine the main factors that affect users' intentions to use security functions provided by their SNS. The main theories for this study include the rational choice theory and the theory of planned behavior. This study has identified the factors that affect intention to use security functions. In addition, security function awareness and information security awareness are found to be important antecedents for intention to use security functions. The results of this study implies that when SNS providers develop security policies, they should consider the ways to improve users information security awareness and security function awareness simultaneously.
A Study on Factors that Influence the Attitude to Pirate Smartphone Application
Kim, Joong Han ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 19~34
DOI : 10.9716/KITS.2014.13.2.019
As the global smartphones market is growing at a brisk pace, their associated mobile applications are becoming increasingly ubiquitous in our daily life. The growth of mobile application business is explosive. Like other digital contents businesses, illegal downloads of copyrighted mobile applications become major obstacle in the future of the industry. In spite of anti-piracy efforts, the phenomenon has been getting worse. It is necessary to change the focus of current deterrence policies and strategies. This study investigates the factors influencing smartphone applications piracy behavior. For better understanding of illegal behavior, a research model of potential determinants for the piracy behavior is developed and empirically tested via path analysis using structural equation modeling. Findings show that social factors, beliefs concerning benefits from piracy, self-efficacy, and habit have significant effects on attitude toward smartphone application piracy. The result also shows perceived risks and facilitating conditions were not significantly related to their attitude. Implications for research and practice are discussed.
A Study on User's Voluntary Behavior in Company Social Networks(CSN)
Kang, Inwon ; Cho, Eunsun ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 35~53
DOI : 10.9716/KITS.2014.13.2.035
Company Social Networks (CSN) has emerged as a commonly used marketing channel. One of the most important advantages in CSN is the user's voluntary behavior as a relational performance. We classified level of voluntary behavior, as 'consumption', 'active participation', and 'creative contribution' to comprehend different relational performance of CSN. Moreover, we proposed research model to compare positive attitude and negative attitude. This study aims to investigate 'the process of user's voluntary behavior in CSN' which is causal relationship between benefits of CSN, user's attitude and voluntary behavior. Empirical results with 175 valid questionnaire data revealed that CSN benefit factors played a significant role in trust and distrust. Based on these effects, trust and distrust have different influences as level of voluntary behavior, just as proposed. For practitioners, it is crucial finding that users are more active behavior based on strong trust.
Required Skill Set for Global Sourcing : Narrative Analysis
Kim, Gyeung-Min ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 55~69
DOI : 10.9716/KITS.2014.13.2.055
As Korea's global IT sourcing is sluggish and supply of qualified IT personnel does not meet the demand, IT developers currently do not worry about their job security. The sluggish global sourcing is attributed to the lack of system design and analysis skills as well as lack of communication skills of IT personnel. Most of big Korean IT service firms operate in captive market. This is also attributed to the cause of the sluggish global sourcing. Some IT managers, especially in global IT service firms, concerned about the negative long term effect of the sluggish global sourcing on competitiveness and human infra capability of Korea's IT service industry. Managers in IT service firms expect skill requirement changes in the future when global sourcing becomes active. The skills and knowledge that they wish to retain in-house is business knowledge, system analysis and design knowledge, customer relation management skills, project management skills and industry knowledge. The jobs with the above knowledge usually involve customers.
Developing Performance Indicator for Smart-Exhibition
Choe, Jae-Ho ; Moon, Hyun-Sil ; Kim, Jae-Kyeong ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 71~82
DOI : 10.9716/KITS.2014.13.2.071
Exhibitions are important sales promotional method commonly used by the marketer of industrial products. Exhibition utilized as a means of effective marketing tools, company's interest and demand is rising. Especially in recent years, visitors' activity within the exhibition space can be monitored in real time by applying near-field sensing technology such as RFID, NFC, RQ code. Exhibition organizers are also applying the near-field sensing technology in order to attract the participating companies and visitors. With the introduction of near-field sensing technology, the exhibition has been a lot of changes occur in the exhibition environment. However absence of performance indicators to measure new exhibition environment which adopt ubiquitous technology, still the exhibition performance is not properly measured. In this study, we use the Delphi technique with the performance indicators based on previous research, and propose performance indicators for measuring achievement of exhibition in the smart-exhibition environment.
The Development and Operation of NFC-based Exhibition Support Service : A Motor Show Case
Jun, Jungho ; Choi, Myoung Hee ; Lee, Kyoung Jun ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 83~97
DOI : 10.9716/KITS.2014.13.2.083
With NFC technology, visitors can easily enjoy exhibit-related information and services. The participating firms can accumulate the visitor data and build up networks with potential visitors. This paper is to report an implementation and operation case of an NFC-based exhibition support service which creates new value as above. For this objective, we introduce the issues in constructing NFC-based exhibition support service. Moreover, we analyze visitor behaviors based on the tag touch data collected, and calculate the economic values generated. The NFC-based exhibition support service in this paper was applied to Hyundai Motors' booth in the 2013 Seoul Motor Show. This paper concludes with implications for business operators that are interested in applying NFC technology to exhibition spaces.
An Evaluation of Web Accessibility for Idea Proposal Websites
Hong, Soon-Goo ; Lee, Hyun-Mi ; Kim, Na-Rang ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 99~111
DOI : 10.9716/KITS.2014.13.2.099
For joint value creation, collaboration among different interested parties is vital and should be supported by information technology. Currently, both government and private companies have launched websites to collect ideas. However, the information poor, including the visually disabled, have difficulty in gaining access to those websites. Therefore, the aim of this paper is to evaluate the level of web accessibility to websites, operated by companies or the government, for idea proposals. According to the automatic assessments, regarding proposal specific websites, 77%, 69% of the websites operated by the government and 41%, 44% of those operated by private companies were extremely inadequate. According to the expert's assessments, regarding proposal specific websites, 67%, 52% of the websites operated by the government and 39%, 26% of those operated by private companies were extremely inadequate in their level of accessibility. A range of policies should be prepared to improve web accessibility.
The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW
Jang, Jaeyoung ; Kim, Jidong ; Kim, Beomsoo ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 113~131
DOI : 10.9716/KITS.2014.13.2.113
Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.
A Decision Support System for Product Design Common Attribute Selection under the Semantic Web and SWCL
Kim, Hak-Jin ; Youn, Sohyun ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 133~149
DOI : 10.9716/KITS.2014.13.2.133
It is unavoidable to provide products that meet customers' needs and wants so that firms may survive under the competition in this globalized market. This paper focuses on how to provide levels for attributes that compse product so that firms may give the best products to customers. In particular, its main issue is how to determine common attributes and the others with their appropriate levels to maximize firms' profits, and how to construct a decision support system to ease decision makers' decisons about optimal common attribute selection using the Semantic Web and SWCL technologies. Parameter data in problems and the relationships in the data are expressed in an ontology data model and a set of constraints by using the Semantic Web and SWCL technologies. They generate a quantitative decision making model through the automatic process in the proposed system, which is fed into the solver using the Logic-based Benders Decomposition method to obtain an optimal solution. The system finally provides the generated solution to the decision makers. This presentation suggests the opportunity of the integration of the proposed system with the broader structured data network and other decision making tools because of the easy data shareness, the standardized data structure and the ease of machine processing in the Semantic Web technology.
Development of Options Trading System using KOSPI 200 Volatility Index
Kim, Sun Woong ; Choi, Heung Sik ; Oh, Jeong Hwan ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 151~161
DOI : 10.9716/KITS.2014.13.2.151
KOSPI 200 index options market has the highest trading volume in the global options markets. The risk and return structure of options contracts are very complex. Volatility complicates options trading because volatility plays a central role in options pricing process. This study develops a trading system for KOSPI 200 index options trading using KOSPI 200 volatility index. We design a database system to handle the complex options information such as price, volume, maturity, strike price, and volatility using Oracle DBMS. We then develop options trading strategies to test how the volatility index is related to the prices of complicated options trading strategies. Back test procedure is presented with PL/SQL of Oracle DBMS. We simulate the suggested trading system using historical data set of KOSPI 200 index options from December 2008 to April 2012.
A Model of Authority Management for the Protection of Personal Information in OLAP
Kim, Hyoung-Gyu ; Kim, Min-Ho ; Kwon, Jung-Sook ; Choi, Yong-Lak ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 163~172
DOI : 10.9716/KITS.2014.13.2.163
Personal information has been stolen continuously and it is also affected from development of the Internet. So the government requires that companies spend more effort for protecting customers' personal information. The OLAP server also should meet this requirement, but it is hard to satisfy for the authority management. The OLAP server must use personal information to extract required information from database. This thesis suggests a model of separating between general information and personal information, so this model can help to minimize the leakage of personal information. The model is implemented and tested as a prototype. This prototype can prove that the new model is better than the original one. This study presents that the authority management on the separation between personal information and general information helps protect the personal information of customers.
Comparison of Recommendation Using Social Network Analysis with Collaborative Filtering in Social Network Sites
Park, Sangun ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 173~184
DOI : 10.9716/KITS.2014.13.2.173
As social network services has become one of the most successful web-based business, recommendation in social network sites that assist people to choose various products and services is also widely adopted. Collaborative Filtering is one of the most widely adopted recommendation approaches, but recommendation technique that use explicit or implicit social network information from social networks has become proposed in recent research works. In this paper, we reviewed and compared research works about recommendation using social network analysis and collaborative filtering in social network sites. As the results of the analysis, we suggested the trends and implications for future research of recommendation in SNSs. It is expected that graph-based analysis on the semantic social network and systematic comparative analysis on the performances of social filtering and collaborative filtering are required.
The Analyzing Risk Factor of Big Data : Big Data Processing Perspective
Lee, Ji-Eun ; Kim, Chang-Jae ; Lee, Nam-Yong ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 185~194
DOI : 10.9716/KITS.2014.13.2.185
Recently, as value for practical use of big data is evaluated, companies and organizations that create benefit and profit are gradually increasing with application of big data. But specifical and theoretical study about possible risk factors as introduction of big data is not being conducted. Accordingly, the study extracts the possible risk factors as introduction of big data based on literature reviews and classifies according to big data processing, data collection, data storage, data analysis, analysis data visualization and application. Also, the risk factors have order of priority according to the degree of risk from the survey of experts. This study will make a chance that can avoid risks by bid data processing and preparation for risks in order of dangerous grades of risk.
A Study on Factors for Influence SW Development Productivity on The IT Service Company
Song, Young-Woon ; Kim, Wanki ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 195~217
DOI : 10.9716/KITS.2014.13.2.195
This paper has explored when implementing SW development project of the IT service corporations, what factors affect its productivity in SW development methodology. The importance of the AHP analysis surveyed from the experts in IT service companies and related committee, was shown in the order of the following processes : 1) Deployment process 2) Management process 3) Establishment process. It is measured the methodology levels of establishment, deployment and management in each project using the survey results collected from project execution members and analyzed the productivity of projects that have been executed within 2 years. Using project methodology level, productivity correlation analysis, and regression analysis, this study confirms that the methodology deployment level brings positive effects significantly to SW development productivity. The significance of this study would be not only to research and analyze SW development productivity using the real project execution data but also to underline the necessities and the importance of steady research, deployment and support for SW development productivity improvement.
An Exploratory Study on Effect of Call Center Representatives' Emotional Intelligence, Organizational Citizenship Behavior and IT Utilization Ability on Job Performance : A Comparative Analysis by Representatives' Career
Lee, Byeong-Hoon ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 219~250
DOI : 10.9716/KITS.2014.13.2.219
Corporations look for their competitiveness in many different areas, and one of them is customer call center, which provides professional, special service to the customers. The importance and the value of realization of customer satisfaction at each call center have become significant as it plays a leading role and is responsible for customer recreation and follow-up services. This study held in-depth interviews with 3 groups of professional call representatives (categorized by experience) from popular property and life insurance companies in Korea who operate in and outbound calls. Three variables, emotional quotient, organizational citizenship behavior (OCB), and IT utilization skill, were selected and it was observed how these variables affect the job performance of in and outbound call center representatives. The importance of the relationship between the variables and the key factors in the future direction of improvement of the call center representative organization was analyzed. Emotional quotient refers to the ability to recognize and use the emotion of oneself and others. It was considered it would be effective in enhancing the counseling ability of call center representatives, This study identifies the effect of emotional quotient on job performance and organizational citizenship behavior, which is defined as actions outside of normative roles in the organization. Also, the study aims to prove the effect of emotional quotient on the rapidly developing IT utilization ability in relation to job performance. As a result, it was found that service career (3 months, 3 years, 10 years) had a significant effect on the key factors that affect the organization-emotional quotient, IT utilization skill, and OCB. Especially for OCB, it was considered relatively less important to the new employees, while it greatly affected the job performance, rate of settlement, and sustainment of the working life for those with longer experience. Also, the result of the interview for each variable differed by the service career. Emotional quotient, IT utilization skill, and OCB were close connection for the representatives with longer experience than for those with shorter experience. And the level of intimacy of their relationship with job performance was in proportion to the years of service. Thus, to secure stability for the call center representatives and enhance their job performance continually, the importance of emotional quotient and IT utilization skill shall be reflected in the operation process actively. In particular, in order to lead a organization with outstanding culture, a management system shall apply OCB from the recruitment process.
A Study on Readability Improvement Method for Ancient Inscription of Irregularity Surface using Cross Section Analysis
Choi, Won-Ho ; Ko, Sun-Woo ;
Journal of the Korea society of IT services, volume 13, issue 2, 2014, Pages 251~259
DOI : 10.9716/KITS.2014.13.2.251
Outdoor cultural properties have been damaged by natural weathering and air pollution for a long time. For this reason, there are many characteristics it is hard to decipher some carved inscription on the surface of damaged outdoor cultural properties. Until now, Rubbed copy has been widely used to decode engraved inscription. A investigation for epigraph has been made by the rubbing that has resulted in a lower resolution from the viewpoints of extraction process and used materials. Rubbing's results are not satisfied in the damaged inscriptions which are weathered by natural environment and pollution for a long time and in the narrowed one. The main analysis presented in this paper is a cross section analysis method using 3d scanning technique for epigraph not read. Cross section analysis is a study on readability improvement method for ancient inscription of irregularity monument surface. Cross section analysis confirms information that separated the inscription information of monument and the ground information to read a ancient inscription and decode the inscription information. The proposed character identification method contributed to decoding an ancient inscription on Silla Monument in Jungseong-ri of Pohang.