• Title/Summary/Keyword: information system adoption

Search Result 500, Processing Time 0.025 seconds

A Study of Perceived Value and Intention to Use for Car Sharing Service : Based on User Experiences Serviced by Seoul Car Sharing (차량공유 서비스에 대한 지각된 가치와 이용의향에 관한 연구 : 서울시 나눔카 서비스 이용자를 중심으로)

  • Park, Keon Chul;Song, In-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.109-118
    • /
    • 2019
  • The purpose of this study is to deliver both market-practical and civil-centric political implication for sharing economy by investigating the nature of consumer-adoption for car-sharing service. With the global interest and market proliferation of the sharing economy, various service models for sharing idle resources have also been released in Korea. Particularly, in case of car sharing service, public - private partnership projects are spreading rapidly in various local governments including Seoul, along with the growing demand for alternative transportation system centering on the urban area. This study conducted an empirical study on the process of accepting the car sharing service by analyzing the data collected from users of the car sharing service "Sharing Car(Nanum Car)" of Seoul Metropolitan Government. A survey was conducted on 281 users in their twenties who are in the age of main use among the experienced users of the "Sharing Car(NaNum)" residing in Seoul. The result of analysis on the relationship between these users' perceived value and intention to use the vehicle sharing service would provide implications for establishing consumer(citizen)-centeric policies as well as market implications.

Public Key based Secure Data Management Scheme for the Cloud Data Centers in Public Institution (공공기관 클라우드 데이터 센터에 활용 가능한 공개키 기반의 안전한 데이터 관리 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.467-477
    • /
    • 2013
  • The cloud computing has propagated rapidly and thus there is growing interest on the introduction of cloud services in the public institution. Accordingly, domestic public institution are adoption of cloud computing impose and devise a plan. In addition, more specifically, is building a cloud computing system in the public institution. However, solutions to various security threats(e.g., availability invasion of storage, access by unauthorized attacker, data downloaded from uncertain identifier, decrease the reliability of cloud data centers and so on) is required. For the introduction and revitalize of cloud services in the public institution. Therefore, in this paper, we propose a public key based secure data management scheme for the cloud data centers in public institution. Thus, the use of cloud computing in the public institutions, the only authorized users have access to the data center. And setting for importance and level of difficulty of public data management enables by systematic, secure, and efficient. Thus, cloud services for public institution to improve the overall security and convenience.

A Study on the Perceived characteristics of the mobile payment service using the technology acceptance model (기술수용모델을 활용한 모바일 소액결제 시스템의 인지적 특성 분석)

  • 이석기;김성희
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.103-109
    • /
    • 2004
  • Mobile payment service is a new innovating technology in the micro payment industry. Although it emerged only one or two years a9o in Korea, it is now highly used and prospered by many online companies. Traditional studies concerning the electronic payment system are usually about the payment process itself, so they stressed the security or the robustness of the process. The study from the angle of behavioral science seldom exists. This article describes the phenomenon of technology adoption with a particular focus on telephone Payment service. The article identifies which characteristic of the telephone payment service affects to the user status (user, non-users). To do this, this article mainly used Roger's Technology Acceptance Model and some characteristics are added to the model. The most important perceptual characteristic that affects to the user status was not security, but ease of use-the telephone payment service had to enhance continuously for the competitive advantage over the other payment service. Observability and convenience are also noted as important.

  • PDF

Customer Model Analysis for UCC Knowledge Sharing Service : A Case (UCC 지식 동영상 공유 서비스의 고객 모델 분석 사례)

  • Yoon, Eun-Jung;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.1
    • /
    • pp.15-30
    • /
    • 2009
  • As knowledge is now being distributed and shared through the Internet not only in the form of text but also in that of video, UCC (User Created Content) knowledge video sharing services have emerged on the Internet such as Instructables.com. This paper deals with a UCC knowledge video service in real world and reports the case of analyzing its customer model. The knowledge video sharing service can be considered as both a kind of discontinuous innovation, which requires knowledge provider's technical ability of creating and editing UCC video, and a value network, which matches UCC providers and consumers therefore brings network effect, we first adopt the Chasm theory as the base of the customer model and refine the customer model referencing the Technographics, which is also an Internet-refinement of the Chasm model. Finally, non-customer analysis of Blue Ocean strategy is applied for exploring potential customers of the service.

  • PDF

Development of Low Latency Secure Communication Device for Legacy SCADA (저지연 Legacy SCADA 보안 통신장치 개발)

  • Choi, Moon-Suk;Kim, Chung-Hyo;Lim, You-Seok;Ju, Seong-Ho;Lim, Yong-Hun;Jeon, Kyung-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.339-346
    • /
    • 2013
  • As the need for security of SCADA systems is increasing, significant progress has been made in research on security of control protocol. However, very few security solutions were adapted to legacy SCADA system. The reasons for non-adoption are latency, cost and key management problem. We propose a low latency, economic security Solution to solve these issues. The proposed solution performs security function in data link layer and has minimum overhead to minimize latency. Furthermore, we try to solve the key management problem by providing systematic security keys and key distribution method.

An Exploratory Study on Buyer-Supplier Relationship in B2B with Internet (기업간 인터넷 전자상거래에서 구매자와 공급자간의 관계 형성에 관한 탐색적 연구: 건설부문 사례를 중심으로)

  • Kim, Hyo-Gun;Cho, Hyung-Seung;Choi, In-Young
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.169-182
    • /
    • 2003
  • The growth of electronic commerce make business to business electronic commerce market grow dramatically due to dramatic decrease of transaction cost and increase of productivity. It also influences the way of building transaction relationship between buyers and suppliers. This study tends to prove electronic market theory for Internet based 13213 commerce. We observe and analyze the implementation and usage patterns of procurement system of I company. The result shows that even through Internet enable many buyers and suppliers to participate and transact each other, the transaction pattern is different according to asset specificity and uncertainty as follows. First, with adoption of internet, the product with the higher asset specificity rather than lower asset specificity can be easily purchased. Second, Internet doesn't make any significant influence on the transaction of the product with higher uncertainty. But, organization's pre-audit process can indirectly influence on the decrease of the transaction uncertainty.

Analysis of Festival Ordinances of Gyeonggi Province: Focusing on Developing A Representative Festival of Seongnam City

  • PARK, Hyun Jung;HAN, Seon Mi;KWON, Ki Hyun;SEO, Won Jae
    • Journal of Sport and Applied Science
    • /
    • v.5 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • Purpose: In Seongnam City, a number of festivals are held in various areas, led by the city and private organizations. The necessity of developing a representative festival of Seongnam City, which can enhance the brand value of Seongnam, a cultural city, and promote a sense of local community and economic effects, is emerging. The purpose of this study is to analyze festival-related ordinances of Gyeonggi-do local governments, and to derive implications necessary for the development of festival support ordinances representing Seongnam City. Research design, data, and methodology: This study used the database of National Legal Information Center of the Ministry of Legislation and the autonomous legal information system to thoroughly investigate the ordinances related to festival support of basic local governments in Gyeonggi-do and the whole country. To do this, descriptive statistics analysis was conducted. Results: As a result of the study, it was found that 168 organizations (68.6%) of 245 local governments nationwide have adopted the festival support ordinance, and there are a total of 231 ordinances. In the case of basic organizations, out of 228 basic organizations, 151 organizations, including Seongnam City, adopted the ordinance on festival support, showing an adoption rate of about 66%. As a result of analyzing the basic organizations that enacted representative festival related ordinances among Gyeonggi-do basic organizations, 9 out of 28 cities adopted 16 representative festival ordinances, based on the legal and institutional basis for supporting representative festivals. Conclusions: In the case of Seongnam City, it is believed that in order to develop a representative festival, an ordinance to support the representative festival must be established. Considerations regarding the composition of the ordinance for the representative festival were discussed.

A Study on the Design Method of Magnetizing Yoke Circuit Constant of 200kJ Magnetizer for Rotor Magnetization of High Capacity Permanent Magnet Motors (고용량 영구자석형 모터의 회전자 착자를 위한200 kJ급 착자기의 착자요크 회로정수 설계 방법에 관한 연구)

  • Jeong Minuk;SoongKeun Lee;GwonHu Baek;TaeKue Kim
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.2
    • /
    • pp.21-30
    • /
    • 2023
  • As the adoption and high-performance enhancement of Electric Vehicles continue, the demand for high-output motors and high-capacity Magnetizer for producing large-scale IPMSM is increasing. The maximum peak current of the magnetization and the capacitor discharge time, which are important factors in the magnetization process, are determined by the circuit constants of the magnetizer. In this paper, we analyze the magnetizing system using MATLAB SIMULINK to design the circuit constant of the magnetizing yoke for magnetizing design and present the design procedure for Design the circuit constant. As a result, the parameters of the magnetizing yoke were derived to be 0.015[ohm] and 0.035[mH] based on the capacitance of 15,000[uF] and voltage of 5,000[V].

Privacy-Preserving Cloud Data Security: Integrating the Novel Opacus Encryption and Blockchain Key Management

  • S. Poorani;R. Anitha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.11
    • /
    • pp.3182-3203
    • /
    • 2023
  • With the growing adoption of cloud-based technologies, maintaining the privacy and security of cloud data has become a pressing issue. Privacy-preserving encryption schemes are a promising approach for achieving cloud data security, but they require careful design and implementation to be effective. The integrated approach to cloud data security that we suggest in this work uses CogniGate: the orchestrated permissions protocol, index trees, blockchain key management, and unique Opacus encryption. Opacus encryption is a novel homomorphic encryption scheme that enables computation on encrypted data, making it a powerful tool for cloud data security. CogniGate Protocol enables more flexibility and control over access to cloud data by allowing for fine-grained limitations on access depending on user parameters. Index trees provide an efficient data structure for storing and retrieving encrypted data, while blockchain key management ensures the secure and decentralized storage of encryption keys. Performance evaluation focuses on key aspects, including computation cost for the data owner, computation cost for data sharers, the average time cost of index construction, query consumption for data providers, and time cost in key generation. The results highlight that the integrated approach safeguards cloud data while preserving privacy, maintaining usability, and demonstrating high performance. In addition, we explore the role of differential privacy in our integrated approach, showing how it can be used to further enhance privacy protection without compromising performance. We also discuss the key management challenges associated with our approach and propose a novel blockchain-based key management system that leverages smart contracts and consensus mechanisms to ensure the secure and decentralized storage of encryption keys.

A Study on Gender Difference in Antecedents of Trust and Continuance Intention to Purchase Voice Speakers

  • Youness EL Mezzi;Nicole Agnieszka Rydz;Kyung Jin Cha
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.614-635
    • /
    • 2020
  • This study aims at understanding gender difference in trust and the related factors affecting the intention to purchase voice speakers VS. VS are one of the innovations that are emerging at a fast pace in the market. Although it seems to be widely embraced by both genders, people do not intend to use them in some cases due to a lack of trust and the rumors circling these types of technologies. Nevertheless, there are particular barriers to the acceptance of VS technology between females and males due to unfamiliarity with the effective components of such technologies. Therefore, assuming that increasing the knowledge-based familiarity with an effective technique is essential for accepting it. So far, only little is known about VS and its concepts to increase the familiarity and, as a consequence, the acceptance of effective technology. Technology adoption in gender has been studied for many years, and there are many general models in the literature describing it. However, having more customized models for emerging technologies upon their features seems necessary. This study is based on Theory of Reasoned Action and trust-based acceptance which provides a background for understanding the relationships between beliefs, attitude, intentions, and subject norms and how it's affecting gender trust in VS. The statistical analysis results indicate that perceived system quality and perceived interaction quality have stronger influences on trust for males, while privacy concern and emotional trust have stronger influences on trust for females with the intention of purchase for both genders. Our study can be beneficial for future research in the areas of Perceived risk and Perceived utility and behavioral intention to use and human-technology interaction and psychology.