Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea society of IT services
Journal Basic Information
Journal DOI :
The Korea Society of Information Technology Services
Editor in Chief :
Lim Gyu Geon
Volume & Issues
Volume 7, Issue 4 - Dec 2008
Volume 7, Issue 3 - Sep 2008
Volume 7, Issue 2 - Jun 2008
Volume 7, Issue 1 - Mar 2008
Selecting the target year
A Study on the Effect of Quality and Benefit of Business Consulting Service on Customer Commitment
Kang, Hyoung-Mo ; Gim, Gwang-Yong ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 1~22
A business consulting service combines company's knowledge and information with external's ones systematically. This combination achieve knowledge synergy and make added value for the business as a whole. Therefore, a business consulting service has been called Knowledge Ware Industry. Consulting corporations and consultants must provide valuable services for running and growing their business successfully. A value of business consulting service could be identified offset quality and benefits from costs. This study conducted survey about business consulting service quality by SERVPERF model and benefit, customer commitment. The research result showed that the quality of business consulting service effects on the benefit positively and benefit increased customer commitment. Finally, there is positive relationship between customer commitment and intention of continuing of the business consulting service.
A Study on Establishing Guidelines for Information Protection and Security for Educational Institutes
Yu, Ki-Hun ; Choi, Woong-Chul ; Kim, Shin-Kon ; Goo, Chun-Yul ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 23~43
Because IT security guidelines for universities and colleges mostly focus on hardware aspects, the problems such as security incidents by a user's mistake and personal information leakage by hacking are serious in our higher educational institutes. In order to solve these information protection and security problems in the educational institutes, realizable and implementable information protection and security guidelines which will contribute to escalate information protection level should be established and at the same time, specific guidelines should be provided to make the guidelines efficient. In this paper, the information security problems and cases are categorized to develop information security guidelines for the higher educational institutes in terms of short, mid, and long term aspects and the solutions to the problems are sought. In addition, a serious of approaches to the information security are proposed such as the improvement measures for the employees of the institute to have desirable security-minded, security problem prevention and resolving methods, developing conflict coordination procedure and law and regulation system establishment for making the educational institutes be information-oriented.
A Review on the Change of Telecommunication Market in Perspective of Customer
Hwang, Min-Woo ; Jung, Sang-Ik ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 45~62
This review examines the rapid growth of qualitative and quantitative of telecommunication industry for past couple of years from customer's viewpoint. Most of the telecommunication products were positioned in the market by the businesses and government's support, but the entity of telecommunication products were never interpreted from the user's viewpoint. Even though, various kinds of telecommunication services have been actively discussed by businesses, government, and IT professionals, it has not been sufficiently discussed by the marketing academia where they need to focus a lot on customer's utility. For the purpose of providing an insight of the telecommunication service marketing strategy, this study looked over old and new directions of growth, failure and evolution of services by focusing on two main pillar of communication business, which is high-speed internet and mobile phone service. Additionally, the research explains and mentions the limit and trend of the telecommunication service marketing, and the future research task that needs to be solved.
The Influence Factors on Usage and Performance of Group Support System
Kang, So-Ra ; Yang, Hee-Dong ; Park, Hyun-Yoe ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 63~87
This study investigates the effects of individual and group level factors on the use of GSS (Group Support System) and task performance from GSS use. GSS facilitates the group work, so that GSS adoption is not necessarily influenced only by individual perceptions on information systems as TAM insists. Adaptive Structuration. Theory (AST) joins with TAM in our study to explain the adoption and success from GSS use. AST contends that the success of IS is not necessarily the technical fit between tasks and technology, instead the political outcome among user socializations. We found that collected data from 303 individual IT staffs in a national bank. Our results demonstrate that traditional theories on TAM (Technology Acceptance Model) need to be refined, when considering the TTF(task-technology fit). TTF render high influences on PU(perceived usefulness). PEU(perceived ease of use) and FOA(faithfulness on appropriation). And FOA influences highly on our dependent variable. Implications and directions for future research are discussed.
A Preferencee Analysis of IT Components for Mobile Banking Service
Kim, Nam-Hee ; Kim, Byeong-Suk ; Seo, Ji-Hae ; Kim, Jae-Kyeong ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 89~101
Recently, mobile banking service comes into the spotlight in the mobile environment. Considering design theory, this empirical study focuses on understanding the characteristics of mobile banking and measuring the priority of IT composition elements organizing the mobile banking service. That is, by empirically analyzing affecting factors of mobile service acceptance as an aspect of customer, this study would like to understand important factors of mobile banking use. The result of study will be used to strategic decision making for the company providing mobile banking service and great help to reinvigorate mobile banking service.
A Study on Effective Utilization of Historical Data of Software Companies
Kim, Joong-Han ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 103~116
Efficiency and objectiveness are the most critical issues in the evaluation of software projects. It is beneficial not only to software companies participated in bids, but to administrators of projects. This study attempts to find an improvement in the evaluation process by connecting the historical data of bidding companies in the software company report system with the governmental procurement system. The proposed means will eliminate unnecessary and repetitive submission step of bidding companies and provide the administrator with objective evaluation process. Also, this paper proposes an automated process for quantifying the business experience of bidding companies.
Multi-Attribute Threat Index for Information Security : Simulation and AHP Approach
Lee, Kang-Soo ; Kim, Ki-Yoon ; Na, Kwan-Sik ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 117~130
Multi-attribute risk assessments provide a useful framework for systematic quantitative risk assessment that the security manager can use to prioritize security requirements and threats. In the first step, the security managers identify the four significant outcome attributes(lost revenue, lost productivity, lost customer, and recovery cost). Next. the security manager estimates the frequency and severity(three points estimates for outcome attribute values) for each threat and rank the outcome attributes according to AHP(Analytic Hierarchy Process). Finally, we generate the threat index by using muiti-attribute function and make sensitivity analysis with simulation package(Crystal Ball). In this paper, we show how multi-attribute risk analysis techniques from the field of security risk management can be used by security managers to prioritize their organization's threats and their security requirements, eventually they can derive threat index. This threat index can help security managers to decide whether their security investment is consistent with the expected risks. In addition, sensitivity analysis allows the security manager to explore the estimates to understand how they affect the selection.
Evolution of Internet Interconnections and System Architecture Design for Telecom Bandwidth Trading
Kim, Do-Hoon ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 131~149
Bandwidth Trading(BT) represents a potential market with over 1 trillion USD across the world and high growth potential. BT is also likely to accelerate globalization of the telecommunications industry and massive restructuring driven by unbundling rush. However, systematic researches on BT remain at an infant stage. This study starts with structure analysis of the Internet industry, and discusses significance of Internet interconnection with respect to BT Issues. We also describe the bandwidth commoditization trends and review technical requirements for effective Internet interconnection with BT capability. Taking a step further, this study explores the possibility of improving efficiency of network providers and increasing user convenience by developing an architectural prototype of Hub-&-Spoke interconnection model required to facilitate BT. The BT market provides an Innovative base to ease rigidity of two-party contract and Increase service efficiency. However, as fair, efficient operation by third party is required, this research finally proposes an exchanging hub named NIBX(New Internet Business eXchange).
A Descriptive Study of IT Outsourcing Risk Factors in the Korean Financial Industry
Lee, Moo-Seok ; Lee, Jung-Hoon ; Park, Jong-Sung ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 151~166
The Outsourcing Industry has grown at a swift pace and evolved over time, and the Global IT Outsourcing market has shown signs of a steady growth. In the Korean financial industry, however, IT Outsourcing is not active as that of the advanced countries and there is lack of literature to understand the characteristics of IT Outsourcing in the financial industry. This paper, therefore, analyze the outcomes surveying 40 financial companies in Korea to investigate how IT Outsourcing risk factors affects IT Outsourcing intention. Based on our literature reviews based on number of key articles, journals, and the focus group interviews, IT Outsourcing risk factors are proposed into four different domains: Transaction, Client, Vendor and Environmental perspective. It found that two risk factors (Client and Environmental perspective) are closely related to the IT Outsourcing intention of the Korean financial industry. Finally, this paper concludes that concrete SLAs (Service Level Agreements) of the clients and support of government agencies are important to mitigate the IT Outsourcing risks.
Clients' Strategic Choices to Mitigate Their Dependence on Vendors in IT Outsourcing : Resource Dependence and Opportunism Prospects
Lee, Jae-Nam ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 167~193
Clients' outsourcing strategies noted in the IT outsourcing literature generate varying levels of client dependence on vendors. This study investigates clients' efforts to mitigate such dependence by utilizing multiple vendors. We use the theoretical lenses of resource dependency and opportunism to study this phenomenon. Specifically. we consider degree of outsourcing, duration of contract, and externalization of control as strategic choices that engender vulnerabilities that clients seek to offset by using multiple vendors. This study then considers the basis of the outsourcing relationships, clients' satisfaction with the relationships. and clients' IT workforce size as conditions that induce clients' concerns about vendor opportunism. This study argues that these conditions can exacerbate clients' experience of vulnerability. further encouraging clients' use of multiple vendors. The research model developed is tested in a survey of firms in South Korea. Results suggest a strong impact of outsourcing strategic choices on the number of vendors used by clients. The anticipated moderating effects of opportunism were only weakly supported by the data though. Theoretical and practical implications of the results are considered and suggestions for future research are offered.
Performance Analysis of Cluster File System
based on Storage Area Network
Lee, Kyu-Woong ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 195~204
As the dependency to network system and demands of efficient storage systems rapidly grows in every networking filed, the current trends initiated by explosive networked data grow due to the wide-spread of internet multimedia data and internet requires a paradigm shift from computing-centric to data-centric in storage systems. Furthermore, the new environment of file systems such as SAN(Storage Area Network) is adopted to the existing storage paradigm for providing high availability and efficient data access. We describe the design issues and system components of
, which is the cluster file system based on SAN environment. We, especially, present the comparative results of performance analysis for the intensive I/O test by using the DBMSs that are operated at the top of cluster file system
, EXT3 and NFS respectively.
Design and Implementation of a Geospatial Data Visualization System Considering Validation and Independency of GML Documents
Jeong, Dong-Won ; Kim, Jang-Won ; Ahn, Si-Hoon ; Jeong, Young-Sik ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 205~218
This paper proposes a geospatial data visualization system supporting validation of GML documents. GIS systems manage and use both of spatial and non-spatial data. Currently, most GIS systems represent spatial data in GML (Geography Markup Language) developed by OGC. GML is a language for representation and sharing of spatial information, and until now many systems have been developed in GML. GML does not support expression of non-spatial data, i.e., relational information of spatial objects, and thus most systems extend GML to describe non-spatial information. However, it causes an issue that the systems only accepting standard GML documents cannot process the extended documents. In this paper, we propose a new GIS data visualization system to resolve the aforementioned Issue. Our proposed system allows the representation of both types of data supporting independency of spatial data and non-spatial data. It enhances interoperability with other relevant systems. Therefore, we can develop a rich and high Quality geospatial information services.
A Strategy to Implement RFID in the Marine Equipment Distribution Center
Kang, Yang-Suk ; Choi, Hyung-Rim ; Kim, Hyun-Soo ; Hong, Soon-Goo ; Park, Jae-Young ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 219~235
In this paper, we suggest a strategy to implement RFID in the Marine Equipment Distribution Center. Although RFID technology has be applied to the various business areas, due to the immature technological market and other reasons, for the successful RFID implementations, it is necessary for the company to review RFID implementations methodology. The aims of the Marine Equipment Distribution Center is to share storages for the marine equipment enterprises and to gain the max efficiency in the logistics flow. To achieve this goal RFID can be one of the alternatives. This paper suggests major issues that can help to reach the successful implementation of RFID in the distribution center.
A Study on the Strategies of Electronic Government Services based on Web2.0
Ra, Jong-Hei ; CHoi, Yong-Jin ; Jung, Seung-Ho ; Oh, Kang-Tak ; Kang, Dong-Suk ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 237~254
Government itself produces a vast amount of highly valuable information, and the internet increases its potential social and economic value. So far, government provide web services that is web 1.0 style. To meet the user's needs, that is online collaboration and sharing, government web services also change to web 2.0. This paper argues that government could now grasp the opportunities that are emerging in terms of web 2.0. Current policy and action is not yet adequate to grasp these opportunities. So, this study focused on the strategic development of electronic government services based on web 2.0. For the purpose, we reviewed the web 2.0 cases and former electronic government services. And then, we defined government 2.0 that is electronic government services based on web 2.0, and provided reference model of government 2.0. Government 2.0 reference model will help the administrators to find better ways to use the technological infrastructure and save efforts for trial and errors from the lack of systematic approach.
An Information Technology Usage Level Assessment Model for Service Industry
Kim, Hyun-Soo ;
Journal of the Korea society of IT services, volume 7, issue 1, 2008, Pages 255~274
The purpose of this research is to develop an information technology (IT) usage level assessment model for service industry. It is necessary to develop an assessment model for service industry's IT usage to improve service productivity. However, it is not easy to develop assessment models due to service industry's diversity. In this paper a generic IT usage assessment model for service industry has been developed and validated through a descriptive approach. Key factors affecting service productivity have been identified and analysed. A pilot test on IT usage level has been performed to investigate the relevance and importance of IT usage indicators (factors). As a result, a set of effective IT usage indicators for service industry have been found. A short-cut model and a full scale model have been proposed for efficient and effective usage. The results of this study can be used for enhancement of service industry productivity through the increase of IT usage level.