• Title/Summary/Keyword: User adoption

Search Result 324, Processing Time 0.023 seconds

Synergy and contingency fit analysis for digital convergence value attributes (디지털융합 가치요소의 시너지와 상황 적합 분석)

  • Han, Hyun-Soo;Moon, Tae-Eun
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.403-418
    • /
    • 2012
  • In this paper, we attempted to theorize the synergy effect between the value creating attributes for digital convergence model in the service industry. Our investigation is based upon contingency fit theory to understand the strategic fit for the two inherent value attributes of fixed and mobile value, as well as resolving fundamental limitations of service processes. Empirical validation of the derived research model is analyzed using hierarchical regression method. The results indicate that the relative advantage of each value creating attributes are strongly associated with the characteristics of domain service industries, and compatibility is critical to user adoption of convergent service model. Moreover, the less significant statistical impact of the synergy between mobile and fixed value attributes and others implies that each value attribute uniquely contributes to particular IT convergence model, which thereby offers critical insight that focusing the convergent value in conjunction with specific application domain is the most appealing managerial focus. The findings provide useful insight for the further research in IT based industry convergent business model areas.

A Research Review on Effective Use of IS drawn on Multi-level Dynamic Capability (정보시스템 분석수준 별 역동적 역량에 기반한 효율적 사용에 관한 연구 리뷰)

  • Kang, Hyunjeong
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.27-50
    • /
    • 2020
  • Purpose The research on the effective use of IS needs to embrace the alignment to organization learning process, which expands the limited focus on dynamic capability of IS use. In addition, it should be done in multi-level analysis with system, user, task, and organization. The current study suggests the inclusion of multi-level analysis of effective use of IS in the perspective of exploration and exploitation. Design/methodology/approach This review selected the representative studies in IS discipline which have investigated the effective use of IS, dynamic capability, operational capability, exploration, exploitation, or organizational learning. In the search of academic archives with those keywords, seventeen papers which have been most cited were chosen and validated whether the focus constructs are directly theorized or validated the suggested keywords. In addition, the level of analysis was verified whether it includes one or more levels of system, individual, task, or organization. Based on the initial analysis of dynamic capability, the further review of research on explorational and exploitational capabilities was implemented. Findings The present review study on previous literature on effective use of IS presented that it is largely implemented in the level of individual but few of them has included organization level. Similarly, the direct investigation of explorational and exploitational use of IS has not been done so much. The needs of study on effective use of IS in depth have been inquired for a decade. However, the review presented that it still lacks profound theories and empirical validations compared to those of adoption stage of IS. Based on the review, future research on the transition between explorational and exploitational use of IS is suggested.

Development of Real-time Service Primitive in Message Handling System Supporting Desk-top Conferencing System (데스크탑 회의시스템 지원을 위한 메시지 처리 시스템의 실시간 서비스 프리미티브 개발)

  • 강승찬;김영준
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.2
    • /
    • pp.169-180
    • /
    • 1998
  • This research presents development of real-time service primitive in MHS(Message Hanling system) supporting desk-top conferencing system. Desk-top conferencing system is one of the real-time GC(Group Communication) services. The complexity of modem society has led to the consequent need for real-time GC between a number of people in order to jointly handle tasks in business, government and other forms of organization. Despite the many different form of desk-top conferencing systems developed to date, there are still few systems in widespred no. One of the biggest hurdle preventing the widespred adoption of real-time GC is the lack of agreement on user-friendly interchange environments. In distributed office environments, the MHS is one of the most widely used service for information interchange. It is a standard of electronic mail system which is concerned mostly with asynchronous exchange of short notes. It is clear that additional functions on MHS are necessary in order to allow users to properly process their real-time group messages and provide them with important facilities as a communication infrastructure for real-time GC.

  • PDF

How to Impact the Adoption of Managed Service on IT Governance of Enterprises? (매니지드 서비스 도입이 기업의 IT 거버넌스에 미치는 영향 분석)

  • Jang, Hyuk Soo;Jun, Eunsuk;Lee, Myung Jin;Oh, Jun-Tack;Lee, Bong Gyou
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.399-409
    • /
    • 2013
  • The development of IT has led to increase the business's dependence on IT and the interests of enterprises on IT governance. Also, more enterprises have adopted managed services to save operating costs in IT departments and to maximize their business efficiency. However, until recently, there are very few academic as well as practical researches regarding managed services, IT service effectiveness, IT governance and their interrelations. This study analyzes the effects of managed services on IT governance based on the IT-BSC (Balanced Scorecard) model. Using the expert FGI (Focus Group Interview) and survey, the research results present that managed services have the most significant effect on the user-oriented and the operational efficiency in enterprises. Also, managed services through the business process standardization can improve the IT governance more effectively. This study will be a relevant guideline for enterprises that will adopt managed services.

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

The Effects of Internal Communication, Techno-stress, and Task-Technology Fit on Intention of Continuous Use of Enterprise Content Management System (사내 커뮤니케이션, 기술 스트레스, 업무기술 적합성이 기업콘텐츠관리시스템 지속적 이용 의도에 미치는 영향)

  • Hwang, Inho
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.133-153
    • /
    • 2021
  • Recently, organizations are making significant technology investments to build a centralized content management system. However, high-quality technology adoption can conversely create techno-stress in the user and cause negative behavior. The purpose of this study is to suggest the negative effects and mitigation directions of enterprise content management system(ECMS) related techno-stress. In order to verify the hypothesis, this study conducted a questionnaire survey on employees of organizations that adopted content management technology and conducted structural equation modeling. As a result of the analysis, ECMS related techno overload and complexity decreased the intention of continuous use of ECMS. But, internal communication activities reduced ECMS related techno stress and task-technology fit moderated the relationship between techno-stress and intention of continuous use of ECMS. The study has implications in terms of suggesting a strategic direction to minimize the negative causes of the use of content management systems.

An empirical study on the influencing factors of learning through knowledge sharing live streaming - Based on live streaming platform in China (지식 공유 라방 학습 영향요인에 대한 실증 연구 - 중국 라이브 방송 플랫폼을 기반으로 하여)

  • Liu, Yi;Pan, Young-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.197-211
    • /
    • 2021
  • The emergence of knowledge-sharing live streamers provides more diversified content to the live streaming platform. Analysis of the factors affecting the intention to use knowledge sharing live streaming users can allow the live streaming platform to understand better the adoption characteristics of users who follow this type of content. Help platform operators provide better services and help live streaming platforms innovate. Based on the TAM model, this research uses questionnaire surveys and structural equation models to construct a conceptual model of the influencing factors of users' intentions in the knowledge sharing live streaming and conduct an empirical analysis on the influencing factor models. The results of data analysis show that a significant influence of users' attitudes of knowledge sharing live streaming is perceived usefulness, followed by flow experience; perceived value has a positive impact on users' attitudes and intention to use, and the positive influence of users attitude significantly affect the user's intention.

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.

The Influence of Perceived Value on Continuance Use Intention in Voice Commerce Context (비대면 음성 쇼핑의 인지된 가치, 지속이용의도에 미치는 영향 관계에 관한 연구)

  • Kim, Hyo-Jung
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.225-234
    • /
    • 2022
  • Voice commerce has emerged as a key channel for consumer searches and purchases. This study examines the continuance use intention of voice commerce, applying value-based adoption model. An online survey was conducted with 470 consumers who has experienced with voice commerce. As participants were who buys and purchases goods; or a user who uses food delivery service in voice commerce context. This study used SPSS 23.0 and Amos 23.0 for descriptive analysis, correlation analysis, confirmatory factor analysis, and structul equation modeling analysis. These reaults are as follows. First, usefuleness and response accuracy were significantly influenced the perceived value of voice commerce. Second, functional risk was significantly influenced the the perceived value of voice commerce. Third, perceived value was significantly influenced the continuance use intention of voice commerce. These results enhance understanding of voice commerce users and provide insight into the service provider of voice commerce.