Earticle

현재 위치 Home

International Journal of Security and Its Applications

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSIA) [Science & Engineering Research Support Center, Republic of Korea(IJSIA)]
  • pISSN
    1738-9976
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 등재여부
    SCOPUS
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.8 No.4 (32건)
No
31

A Study on Behavioral Intention of Sharp (#) Mail Potential Users Focused on Non-Repudiation Function

Kil-Hwan Shin, Choon Yeul Lee

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.4 2014.07 pp.341-352

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

As a rapid change has taken place around 2010 in existing media, they have expanded into smart media through next-generation networking by adopting reinforced computing functions and platforms. Such a timely, new emerging paradigm has brought out new technology and service in the field of electronic document. Out of the electronic document systems, a new emerging one that is valid is Sharp(#) Mail, which is different from existing e-mail systems. As explosive growth is expected in Sharp(#) Mail since 2013, many providers have started their business with Sharp(#) Mail solution and service, which, however, is low in the practical use of them, contrary to expectations in Sharp(#) Mail. This study herein aims to provide data and implications in which theories can be used in business by drawing a conclusion that can invigorate Sharp(#) Mail from a theoretical perspective through analysis on individual-targeted acceptance factor for individuals' Sharp(#) Mail. Unified Theory of Acceptance and Use of Technology (UTAUT) was conducted for the study, which has much used in the research on users’ acceptance factor recently. For the subject of study, data were collected through the questionnaire survey developed to measure the use intention targeted for potential users who have an intention to use Sharp(#) Mail, research models and hypotheses were developed by using the PLS Path Modeling Approach to verify research hypotheses, and statistical analysis was conducted by using SMART PLS 2.0 analysis tool. Results derived from the study are as follows. Measurement results analyzed that as suggested in UTAUT, performance expectancy and social influence were a positive effect on potential users' use intension of Sharp(#) Mail. However, contrary to what is suggested in UTAUT, effort expectancy factor was analyzed as the outcome dismissed on significant effect relation with the use intention of Sharp(#) Mail users. As suggested in analysis results, this indicates that there is no significant effect of individuals' effort expectancy factor in that Sharp(#) Mail is a business-based solution used in a policy-wise, business-wise manner.

32

Preventive Maintenance Model Analysis Based on Condition

Hongsheng Su

보안공학연구지원센터(IJSIA) International Journal of Security and Its Applications Vol.8 No.4 2014.07 pp.353-366

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To improve operation maintenance management levels and increase economic profits for repairable devices, condition based preventive maintenance (CBM) has been widely applied in industrial enterprises in recent years. Compared with traditional time based maintenance (TBM), CBM not only can ensure the production process more safety but also dramatically reduce the examining-maintenance cost, which can be thought as a proactive maintenance scheme, practically. In this paper, we firstly construct the full life cycle model with four-state of the devices, and then simplified it into three-state model based on some practical considerations. On the basis of it, the paper analyzes its reliability operation characteristics under diverse maintenance models such as the proactive maintenance based on CBM, and the proactive maintenance based on TBM, and the passive maintenance, and the redundant maintenance scheme, and computes its desired maintenance cost and the investment payback period. The computing results show that the investments payback period is the shortest of the proactive maintenance rule based on CBM, and the one based on TBM comes second, and the one based on passive maintenance comes third, and the one of the redundant management model is the inferior. The investigations show that proactive maintenance based on CBM is a very effective operation maintenance management mode for repairable devices, and possesses very broad applications prosperity.

 
1 2
페이지 저장