• Title/Summary/Keyword: Integrated Adoption Model

Search Result 67, Processing Time 0.024 seconds

Effects of Omnichannel on Pleasure, Resistance, and Repurchase Intention

  • JUNG, Eun-A;KIM, Jung-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.3
    • /
    • pp.95-106
    • /
    • 2022
  • Purpose: This study aims to verify the effects of omnichannel characteristics on pleasure, resistance and repurchase intention in the omnichannel situation in order to provide the innovative commercial business. Research design, data and methodology: The study examined relations between research concepts centered on previous studies, set hypotheses, developed a research model, and verified the model through a questionnaire survey. A total of 297 questionnaires were used for the final analysis, excluding the questionnaires showing insincere or outliers. Results: First, Omnichannel showed multi-dimensional characteristics consisting of consistency, innovation, economy, and integration. Second, innovation and economic feasibility had a positive effect on pleasure. Third, only economic feasibility had a negative effect on user resistance. Fourth, consumers' shopping pleasure had a negative effect on user resistance. Fifth, repurchase intention of consumers was positively affected by innovation. Conclusions: This research contributed to extend academic framework of distribution research by examining causal relationship through adoption of economic and innovation factors as new characteristics from the integrated perspective beyond the research frame of the existing omnichannel distribution environment. Companies should provide meaningful experiences by resolving concerns about side effects caused by human-computer interaction and providing smart information that matches the products most suitable for consumer needs.

Design of an Integrated University Information Service Model Based on Block Chain (블록체인 기반의 대학 통합 정보서비스 실증 모델 설계)

  • Moon, Sang Guk;Kim, Min Sun;Kim, Hyun Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • Block-chain enjoys technical advantages such as "robust security," owing to the structural characteristic that forgery is impossible, decentralization through sharing the ledger between participants, and the hyper-connectivity connecting Internet of Things, robots, and Artificial Intelligence. As a result, public organizations have highly positive attitudes toward the adoption of technology using block-chain, and the design of university information services is no exception. Universities are also considering the application of block-chain technology to foundations that implement various information services within a university. Through case studies of block-chain applications across various industries, this study designs an empirical model of an integrated information service platform that integrates information systems in a university. A basic road map of university information services is constructed based on block-chain technology, from planning to the actual service design stage. Furthermore, an actual empirical model of an integrated information service in a university is designed based on block-chain by applying this framework.

Experimental investigation of dynamic trim control devices in fast speed vessel (고속선의 트림제어 장치가 항주 자세 및 저항 성능에 미치는 영향)

  • Seo, Kwang-Cheol;Gopakumar, Nithin;Atlar, Mehmet
    • Journal of Navigation and Port Research
    • /
    • v.37 no.2
    • /
    • pp.137-142
    • /
    • 2013
  • The displacement Deep-V catamaran concept was developed in Newcastle University(UNEW) through development of the systematic Deep-V catamaran series. One of the most important Deep-V catamaran launched to date is Newcastle University's own multi-purpose research vessel, The Princess Royal. The vessel was launched in 2011 and enhanced the Deep-V catamaran concept further with the successful adoption of a novel anti-slamming bulbous bow and tunnel stern for improved efficiency. It was however identified that the vessel has substantial amount of dynamic trim that limited the visibility of the captain. The dynamic trim also increased the wave-making resistance thereby preventing the vessel from attaining its maximum speed in certain sea states. This paper therefore presents the application of devices such as Trim Tabs, Interceptors, Transom Wedges and Integrated Transom Wedges-Tabs to control the dynamic trim and improvement of fuel efficiency of the vessel. All of these energy saving devices were fitted into a model for tests in Newcastle University's Towing Tank. Model test verification confirmed that the optimum appendage was the interceptors, they produced a 5% power saving and 1.2 degree trim reduction at 15 knots, and investigations of full scale trials will be scheduled with and without application of device to compare the improvement of performance.

A Case Study of IT Architecture Implementation: Office of Postal Service-Korea Post (정보기술아키텍처 구축 사례 연구: 우정사업본부)

  • Moon, Heoung-Keun;Kim, Yong-Jae;Cho, Sook-Jin;Oh, Kwang-Su;Lee, Seog-Jun
    • Information Systems Review
    • /
    • v.9 no.3
    • /
    • pp.183-204
    • /
    • 2007
  • As the innovation of Information technology in the Public sector is in progress, the "Efficient adaptation and management of information system Act" (passed the National Assembly in December 30, 2005) was established to support the information system planning and development which are systematic and integrated in the enterprise view point. The public sector should adopt Information Technology Architecture into it's organization by the act. This paper reports on the issues, solutions and CSFs (Critical Success Factors) considering the adoption of ITA through the implementation for the case of the Korea Post. To adopt ITA program to the Public sector successfully, Korea Government should set the clear goals for IT A, set the standards for IT A project pricing, and collaborate with the system integration industry to make successful IT A program cases. The case study of Korea Post of MIC will be useful in developing and managing ITA programs for all agencies and organizations considering adoption of ITA.

The Effects of Influentials on Successful and Unsuccessful Diffusion in the Social Network (인터넷 정보확산의 성공과 실패에 미치는 사회적 네트워크 영향자의 영향)

  • Han, Sangman;Cha, Kyoung Cheon;Hong, Jae Weon
    • Asia Marketing Journal
    • /
    • v.11 no.2
    • /
    • pp.73-96
    • /
    • 2009
  • In this paper, authors focused on the difference between successful and unsuccessful items in terms of the innovation and imitation parameters of Bass diffusion model. Each item was scraped by members directly from the minihompies they visit. Top 50 items in terms of total number of adoption are classified as successful items and the 50 items whose total number of adoption was just below the average are classified as unsuccessful items. In particular, authors are interested in investigating the role of influentials in the diffusion process. Influentials are defined as those people whose network centrality (Indegree, Outdegree, and Betweeness centrality) was larger than the mean centrality in their social network. Figure 1 shows the plots of number of scraping, cumulative scraping, indegree, outdegree and betweenness of the people who scraped the most popular item among 100 items.

  • PDF

An Empirical Study on the Acceptance of Knowledge Management Systems in Public Institutions : Using Technology Acceptance Model (공공기관의 지식관리시스템 수용모형에 관한 실증적 연구)

  • Jeong, Dae-Yul;Seo, Jeong-Sun
    • The Journal of Information Systems
    • /
    • v.13 no.2
    • /
    • pp.22-48
    • /
    • 2004
  • Information systems that are not used cannot be useful. In order to increase user acceptance, it is necessary to understand why people accept or reject information systems. Technology Acceptance Model(TAM) is one of the most influential research models for studying determinants how users accept information systems. Recently, Knowledge Management Systems(KMS) have become important components of corporate systems as the foundation of industrialized economics has shifted from natural resources to knowledge assets. This paper applies TAM to investigate users' acceptance of KMS in public administration institutions. It sampled 182 users who had experience in using KMS. Many empirical researches have suggested that TAM can be integrated with other organizational theories to improve its predictive and explanatory ower. We extended the basic TAM by the integration of appraisal and reward satisfaction theory. There are many external variables that influence the perception and the belief of system users. We introduced two external variables(job characteristics, IT self-efficacy) and one additional perception variable, perceived appraisal and reward(PAR) in the basic TAM model. The LISREL model analysis is used for finding out the causality among variables and testing the model fitness. As result, The IT self-efficacy influences to the perceived ease of use(PEOU) and the PAR, and the PEOU influences directly to the perceived usefulness(PU), the PAR, and the attitude toward KMS. The KMS participation intention(PI) was influenced by the PAR and the attitude directly,andbythePEOUindirectly. Finally, this paper suggests some guidelines for the adoption of KMS in public sectors on the basis of the study results.

  • PDF

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

A Study of Countermeasure against Security Risk of Fintech Services for Financial Innovation (금융혁신을 위한 핀테크 서비스의 보안 리스크 대응방안 연구)

  • Park, Jeong-Kuk;Kim, Injai
    • Knowledge Management Research
    • /
    • v.16 no.4
    • /
    • pp.35-45
    • /
    • 2015
  • Fintech, which means the convergence of finance and information technology, becomes a hot topic in the financial sector. Through innovative activities on financial services, ICT(Information and Communication Technology) is integrated into the overall financial industry, and a new form of financial services could be expected to improve the existing financial system. On the other hand, fintech services are relatively vulnerable to security issues. Due to the process simplication and the channel fusion, the leakage of personal and financial informations, authentication bypass, phishing, and pharming are getting more concerned. In this study we investigated the security risk of fintech services in the viewpoints of service provider, technology adoption, and security policy. The possible countermeasures to reduce those risks are suggested because security is an important criterion for selecting financial services. This study basically offers quantification of the potential security risks and step-by-step control measures about business processes in the fintech services. The suggested security model includes user authentication, terminal security, payment information protection, API(Application Programming Interface) security, and abnormal transaction monitoring. This study might contribute to an understanding of the security risks and some possible measures for mitigating those risks on the practical perspective.

Evaluation of Reactor Internals Integrity due to 5.5m Concentric Free Fall of KSNP+ Reactor Vessel Closure Head (KSNP+ 원자로덮개 5.5m 수직 낙하 시 원자로내부구조물 건전성 평가)

  • Namgyng, Ihn;Jeong, Seung-Ha;Lee, Dae-Hee;Choi, Taek-Sang
    • Proceedings of the KSME Conference
    • /
    • 2003.11a
    • /
    • pp.1358-1363
    • /
    • 2003
  • Due to the application of Integrated Head Assembly (IHA) in KSNP+ reactor design, an investigation of reactor internals integrity is carried out to assure that the adoption of IHA does not affect the safety of reactor operation. One of the postulated accident events is the R.V. closure head fall from 5.5m high directly above the reactor vessel that may occur during the refueling operation. The analysis model consists of lumped mass elements of the entire reactor vessel and internals. Because of extreme load, separate elastic-plastic analyses are done for the members that undergo plastic deformation. The analysis verified that the stresses of the reactor internals and the fuel assemblies are within the bound of allowable stress limits and the integrity of the fuel assemblies is maintained.

  • PDF

The Comparative Study on Third Party Mobile Payment Between UTAUT2 and TTF

  • Wu, Run-Ze;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.15 no.11
    • /
    • pp.5-19
    • /
    • 2017
  • Purpose - According to the research findings, it proposes corresponding market promotion schemes, for Alipay, WeChat wallet and even other payment service providers and mobile internet companies to understand the factors which promote or hinder users' acceptance of mobile payment. Research design, data, and methodology - Statistic analysis of data and social science statistical software of IBM Statistics 23.0 and IBM SPSS AMOS 23.0 were adopted for all the data researched. Results - The technical features of the third party mobile payment and the task characteristics of users have positive influence on the matching degree between task and technology, and the matching degree between task and technology of the third party mobile payment has positive influence on the performance expectancy, effort expectancy and usage intention. The social influence, facilitating condition, price value and enjoyment motivation have significant and positive influence on users' intention of mobile payment adoption. The perceive security of the mobile fingerprint payment of users has positive influence on users' intention of usage. Conclusions - This research has the main contribution on the analysis on the key factors with influence on the third party mobile payment usage by utilizing the integrated model of UTAUT2 and TTF.