• Title/Summary/Keyword: Business Application

Search Result 3,108, Processing Time 0.022 seconds

Perceived Enjoyment, Application Self-efficacy, and Subjective Norms as Determinants of Behavior Intention in Using OVO Applications

  • WINARNO, Wahyu Agus;MAS'UD, Imam;PALUPI, Trias Widya
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.2
    • /
    • pp.1189-1200
    • /
    • 2021
  • This study examines the role of perceived enjoyment, self-efficacy, and subjective norms as determinants of behavioral intention to use the OVO application. This study's target population is the users of the OVO application who have used it as an electronic transaction. This study's population was the OVO application users as an electronic transaction tool in Jember Regency. Samples were randomly selected at the time of the survey with specific criteria. The survey location is determined at the Plaza because it is a shopping center that mostly has payments at OVO partner merchants. The model empirically tested using data gathered from 150 respondents of OVO users. The research model was tested by using the structural equation modeling (SEM) approach. The results showed that all constructs in the original TAM model were statistically significant. Subjective norm has a positive effect on perceived usefulness, and perceived enjoyment positively affects perceived ease of use of OVO applications. On the other hand, applications' self-efficacy does not affect the perceived ease of using OVO applications for electronic transactions. This condition shows that subjective norms are dominant external individual perspectives compared to self-efficacy, which are personal internal characteristics in determining the behavioral intention of using OVO applications in electronic transactions.

The Role of Interpersonal Trust in On-line Learning Communities and Application of Knowledge

  • Kang, Sungmin;Suh, Hyunju;Kym, Hyogun
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.642-661
    • /
    • 2015
  • Interpersonal trust has become essential for online communities because people have managed to be in a situation without face-to-face encounters. To identify the structural relationships between interpersonal trust and learning performance, we analyzed the relationship between two types of trust, namely, cognitive and affective, as well as two dimensions of learning performance, namely, learning satisfaction and knowledge application. We also identified the moderating role of social norms in the relationship between trust and learning performance. Results of analysis are as follows. First, cognitive trust significantly affected the two dimensions of performance. Second, affective trust exhibited a significant effect on learning satisfaction, but did not affect knowledge application. Third, the relationships between the two performance factors were significant and direct. Lastly, social norms appeared to moderate the effects of cognitive trust on knowledge application and affective trust on satisfaction. These findings suggest that organizations, which would like to optimize task-oriented performance of their learning communities, should consider linking strategies between community satisfaction and practical knowledge application.

Use of Software Agent Technology in Management Information System: A Literature Review and Classification

  • Hamirahanim Abdul Rahman;Jinsoo Park;Jihae Suh
    • Asia pacific journal of information systems
    • /
    • v.29 no.1
    • /
    • pp.65-82
    • /
    • 2019
  • Technological innovations over the years have accentuated the workings in corporate- connected organizations and different application platforms. Hence, a unified management information system (MIS) that can utilize the Web and propel programming developments is required. Software agents, the latest developments in computer software technology, can be utilized to rapidly and effortlessly build integrated information systems. Consequently, 59 research papers on the use of software agents in MIS were identified from top 40 MIS journals published between 2007 and 2017. Then, we reviewed and classified all the research papers according to two categories: application fields and application categories. The application fields consisted of eight sub-groups: manufacturing, telecommunication systems, traffic and transportation management, information filtering and gathering, electronic commerce, business process management, entertainment, and medical care; whereas the application categories consisted of three sub-groups: multi-agent systems, personal assistants, and multi-agent simulation. The research papers were further divided into journal and year of publication, and journal and application field. The objective of our research was to understand the trend of the use software agent technology in MIS by examining the published research paper beside to add knowledge and content to the information system academic discipline.

A Study on the Transaction Matching Application and Major BPO Business Scenarios (TMA의 운용과 주요 BPO 비즈니스 시나리오에 관한 연구)

  • CHAE, Jin-Ik
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.65
    • /
    • pp.117-139
    • /
    • 2015
  • The BPO is an irrevocable undertaking given by an obligor bank to a recipient bank to pay a specified amount under the condition of a successful electronic matching of data or acceptance of mismatches. The BPO enables the participating banks to provide sellers and buyers with enhanced financing services. Therefore, BPO gives banks the tools to provide them with guarantees and other multi-banking services. All the participating banks must use the same Transaction Matching Application(TMA) for BPO business. In order to exchange BPO-related data, banks must be subscribed to the same TMA scheme. Participation in the TMA scheme is limited to banks only. The TMA is matching and workflow application as instrument to determine whether to pay the BPO or not. Therefore, TMA will have an important role to play in the business of the BPO. So, This paper is to review the mechanism of a TMA and the major business scenarios in Banking Payment Obligation Transactions. In Particular, it has been included the exchange and matching of data messages, the disposal of discrepancies, document payment and others based on URBPO. This study will be based on documentary research including swift com and icc.org and so on.

  • PDF

A Study on RFID Application Method in Franchise Business (프랜차이즈산업에서의 RFID 적용 방법에 대한 연구)

  • Rim, Jae-Suk;Choi, Wean-Yang
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2008
  • At present, companies write daily work record or use bar-code in order to collect distribution flow data in real time. However, it needs additional works to check the record or read the bar-code with a scanner. In this case, human error could decrease accuracy of data and it would cause problems in reliability. To solve this problem, RFID (Radio Frequency Identification) is introduced in many automatic recognition sector recently. RFID is a technology that identification data is inserted into micro-mini IC chip and recognize, trace, and manage object, animal, or person using wireless frequency. This is being emerged as the core technology in future ubiquitous environment. This study is intended to suggest RFID application method in franchise business. Traceability and visibility of individual product are supplied based on EPCglobal network. It includes DW system which supplies various assessment data about product in supply chain, financial transaction system which is based on product transaction and position information, and RFID middleware which refines and divides product data from RFID tag. With the suggested application methods, individual product's profile data are supplied in real time and it would boost reliability to customer and make effective cooperation with existing operation systems (SCM, CRM, and e-Business) possible.

Data Type-Tolerant Component Model: A Method to Process Variability of Externalized Data (데이터 타입 무결성 컴포넌트 모델 : 외부화된 데이터 가변성 처리 기법)

  • Lim, Yoon-Sun;Kim, Myung;Jeong, Seong-Nam;Jeong, An-Mo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.5
    • /
    • pp.386-395
    • /
    • 2009
  • Business entities with which most service components interact are kind of cross-cutting concerns in a multi-layered distributed application architecture. When business entities are modified, service components related to them should also be modified, even though they implement common functions of the application framework. This paper proposes what we call DTT (Data Type-Tolerant) component model to process the variability of business entities, or externalized data, which feature modern application architectures. The DTT component model expresses the data variability of product lines at the implementation level by means of SCDTs (Self-Contained Data Types) and variation point interfaces. The model improves the efficiency of application engineering through data type converters which support type conversion between SCDTs and business entities of particular applications. The value of this model lies in that data and functions are coupled locally in each component again by allowing service components to deal with SCDTs only instead of externalized business eutities.

The Effects of Dissatisfaction on Consumer Behavioral Response in Smartphone Application Service (스마트폰 어플리케이션 서비스의 불만족이 고객 행동에 미치는 영향에 관한 연구)

  • Kim, Yong-Hee;Choi, Jeong-Il;Jin, Yeong-Ho;Lee, Dong-Won
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.3
    • /
    • pp.359-371
    • /
    • 2012
  • Purpose: Due to the explosive growth and widespread use of smartphones, new business opportunities are emerging. Despite the importance of creating customer value in using smartphone applications, past studies on have mainly focused on functions or factors and specifications that influence users to use the device. Methods: This study is intended to identify how customer dissatisfaction from the use of smartphone application services affects customer sentiment and behavior. The research model is tested via a survey of 290 smartphone application users. Results: The result of this empirical study indicates that customer dissatisfaction significantly affects the user's disappointment and regret in using a service, which are subordinate values of customer emotion. The user's anger is positively associated with 'Negative word of mouth' and 'Complaint', which are subordinate values of customer behavior, but not with an intention to switch to another service. 'Regret' and 'Disappointment' are positively associated with 'Negative word of mouth' and 'Switching intention', but not with 'Making direct complaints'. Finally, customer's negative sentiments are a significant intermediary in the relationship between customer dissatisfaction and behavioral response. Conclusion: Finally, the study offers a more systematic understanding on the phasal response process of customer dissatisfaction in relation to the provision of smartphone application services.

Development of RFID Middleware with Business Process Logic Representation Capability (비즈니스 프로세스 로직 표현을 지원하는 RFID 미들웨어 개발)

  • Park, Chul-Soon;Bae, Sung-Moon;Lu, Gao
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.80-89
    • /
    • 2008
  • Because of different hardware specifications, there are no unified protocol commands to use with various kinds of RFID readers. The current commercial RFID middlewares do not satisfy the various requirements from users to support business process logic representation. The EPCglobal, which is leading organization for the RFID research, suggested a RFID middleware architecture which is called ALE(Application Level Events) standard. However, their architecture also does not provide the application level's interfaces. Therefore, a new RFID middleware architecture is required to provide basic RFID functions, conform to ALE's specification and, additionally, support application level's business logic representation. This paper proposes a ALE-based RFID middleware architecture which provides business process logic representation. At first, the basic RFID control functionalities are identified. Secondly, the business process logic requirements in RFID applications are identified and classified Into six categories. Third, the Middelware architecture is implemented with Java and XML technology so that it can easily extended to support the various RFID hardware's protocols. Finally, an example RFID prototype system is developed to show the proposed architecture's feasibility and validate it. The proposed middleware is expected to be used In various application areas since it is using XML technology for easy adaptation and it also con- forms to ALE interface which is standard specification.

An Empirical Study on the causal relation of Business Performance, Information Capability and Risk Management in the Supply Chain Management (SCM의 정보역량 및 위험관리가 사업성과에 미치는 영향요인에 관한 실증연구)

  • Kim, Chang-Bong
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.295-315
    • /
    • 2012
  • This paper attempts to reveal the relationships between IT capacity, SCM risk management factors and Business Performance. According to precedent studies, Our study analysed 153 cases from Korean companies which perform a supply chian risk management and then developed a structural equation model. As a result of the model test, this empirical study found that IT Infrastructure have a positively significant influence on companies' IT application and risk management. Second, there was a positive relationship between IT application and Business performance. Last and foremost, SCM risk management affects positively on Business performance. From this study, we found that investment in IT infrastructure will increase Business performance via raising risk management level, but there was less relationship between IT application level and that of risk management. For further study should be conducted for discovering effective practice factors of risk management.

  • PDF

Conflicts between Protected Franchise Territory and Unrestricted Delivery Trading Area

  • LEE, Soo-Duck
    • The Korean Journal of Franchise Management
    • /
    • v.11 no.1
    • /
    • pp.45-60
    • /
    • 2020
  • Propose: The expansion of the delivery market in franchise business is a positive means of advertising and promotion for franchisees and contributes to substantial sales growth for stores. However, unrestricted and uncontrolled delivery sales and business activity of franchisee directly lead to encroachment of business territory between franchisees, resulting in increased operating costs of franchisees and conflicts between franchisees over rights and interests on franchise business. Moreover, in relation to the restrictions on the opening of competitors, it is incapacitating the law intent of prohibiting unfair encroachment of business territory, in the issue of the Fair Franchise Act in regard to guarantee of exclusive sales and business activity rights of franchisee. This study aims to point out major problems arising out of franchisee's infinite competition on delivery sales and business activity that are not restricted or controlled and then suggest legal supplements, policy tasks, and practical implications for improvement on the issues. Literature Review: In franchising business transactions, vertical restraints are associated with the exclusive territory establishment, control of transaction area, restriction of intangible sales and business activity of franchisee. Therefore, in the franchise business, it is necessary to take positive interpretation and application on e-commerce, the area of e-commerce, and delivery trading area and find proper and practical ways, by virtue of constructive attitude of each actor, to reduce the encroachment of business territory and various conflicts caused by unrestricted delivery trading area. Conclusion and suggestion: The finding shows that unrestricted or uncontrolled delivery sales and business activity of franchisees cause encroachment of business territory and many conflicts among franchisees. And this matters also weaken the legislation of the law on the protection of the business territory and can be negative factors that disrupt the protection of identity and sound development of the franchise industry in the long run. Therefore, in the franchise business, it is necessary to take positive interpretation and application on e-commerce, the area of e-commerce, and delivery trading area and find proper and practical ways, by virtue of constructive attitude of each actor, to reduce the encroachment of business territory and various conflicts caused by unrestricted delivery trading area.