Earticle

현재 위치 Home

Issues

JITAM [Journal of Information Technology Applications and Management]

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    한국정보기술응용학회 [The Korea Society of Information Technology Applications]
  • pISSN
    1598-6284
  • eISSN
    2508-1209
  • 간기
    격월간
  • 수록기간
    1999 ~ 2026
  • 주제분류
    사회과학 > 경영학
  • 십진분류
    KDC 005 DDC 005
Vol.16 No.2 (8건)
No
1

업무특성과 BSC 시스템 특성의 적합도가 BSC 시스템 사용자 만족도에 미치는 영향

이창진, 이정훈, 이중정, 송준우

한국정보기술응용학회 JITAM Vol.16 No.2 2009.06 pp.1-21

※ 기관로그인 시 무료 이용이 가능합니다.

5,700원

The balanced scorecard(BSC) framework is a tool for strategic decision making and task support that aims for efficiency in performance management and strategy execution. BSC evolved from an old performance management practice, which tended to be limited to a finance-only perspective, to a new system of corporate management looking at corporate tasks from a multi-dimensional, future-inclined value perspective. This form of BSC amounts to a framework capable of driving management innovation and renewing the ways in which companies conceive their strategy and perform their operations. Since BSC draws integrally on user participation, it can be expected that users’ satisfaction with BSC systems is an important factor in systems’ success or failure. However, previous studies of the BSC system have not yet considered it as a theoretical model, specifically examining BSC system and task characteristics. To date, only a few studies have put forward plans for the implementation and use of BSC systems, and these studies have the common limitation of failing to consider the circumstances or theoretical structure of the companies for which a BSC system is being proposed. This paper then begins to fill some of this gap by characterizing the BSC system from the perspective of contingency theories. Contingency theories can be particularly useful in the Korean context in exploring how different companies use the BSC system in ways determined by their unique environmental characteristics, which may also determine the performance factors behind the application of a company’s particular BSC system. In order to provide concrete suggestions for implanting and using the BSC system from a contingency theory perspective, this study sets out to determine the relationships between the contingency variables affecting BSC system performance and BSC system property variables(in given cases) through an empirical analysis. The study takes into account the perspective from which contingency theory is to be applied in individual cases, sets contingency and BSC property variables with reference to the BSC system user’s environment and BSC system’s character, and frames initial hypotheses concerning corporate structure and environmental variables and BSC system performance variables with reference to previous studies. A survey was then conducted on users in Korean companies that have implemented the BSC system in order to verify the research model and understand results.

2

5,700원

For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. To improve the effectiveness of security engineering, this paper suggests a security methodology ISEM, which considers both product assurance and production processes, takes advantages in terms of quality and cost. To verify the effectiveness of ISEM, this paper introduces the concepts of quality loss, and compares the development costs and quality losses between ISEM and CC through the development of VPN system.

3

중국의 사회 연결망 서비스 이용에 영향을 미치는 요인에 관한 연구

방화룡, 권순동

한국정보기술응용학회 JITAM Vol.16 No.2 2009.06 pp.45-63

※ 기관로그인 시 무료 이용이 가능합니다.

5,400원

China has the largest number of the user of web 2.0 such as messengers and blogs, as of 2008 year. Chinese Internet digital market will grow from $85 billion in 2007 to $264 billion in 2015. The importance of Chinese Internet business is increasing, because of its size and growth potential. This research is focused on following two questions. First, what are the major characteristics of social networking services in China? In order to find out the answer about this question, the case study on Tencent QQ and Sina Poco, the most representative social networking services company in China, was done. And the reason of the use of social networking services, their contents, and the attitude toward the paid service were identified. Second, what are the major factors influencing the use of social networking services in China. User participation, network effect, usefulness, and system quality were inferred as the factors influencing the use. These factors were based on motivation theory, technology acceptance model, and the related research papers. This research model was proved by data analysis using Partial Least Square. As results, the use of social networking services was influenced by usefulness, network effect, user participation, and system quality. But social influence was not significant of the use of social networking services.

4

4,500원

This study explores the major factors that are likely to affect the acceptance and resistance of innovative products and services. The TAM (Technology Acceptance Model) has been widely used for understanding consumer acceptance of new technology. This model displays perceived usefulness and perceived ease of use as antecedents of intention to adopt and use. However, research has reported a variety of preceding variables for technology acceptance. In addition, considering paradoxes of technology, research regarding both acceptance and resistance in an integrated model can explain consumer perception and behavior in detail. The results of this study states that relative benefits, degree of innovation in technology, perceived usefulness and perceived ease of use have had positive influence on the intention to adopt but negative impact on that of resistance. However, alterations of usage and perceived risk positively affects resistance, but also have negative effects on the intention to adopt. Finally, intention to adopt has comparatively greater influence than that of resistance on intention to use. Theoretical and managerial implications of the results are also discussed.

5

IPTV 뱅킹 서비스 이용 의도에 영향을 미치는 요인

김문선, 김문오, 김효진, 류성렬

한국정보기술응용학회 JITAM Vol.16 No.2 2009.06 pp.79-98

※ 기관로그인 시 무료 이용이 가능합니다.

5,500원

IPTV has risen as a new driving force amid concerns against the saturated internet market and gained enormous attention of both the government and industry as niche market. Especially, IPTV banking which is one of the major services, IPTV has risen up recently as another financial service channel. Prior to the expansion of the new technology, this study attempts to predict its success possibility. In order to grasp variables that would effect formation of user intention of potential adopters, and external variables that influence user intention of IPTV banking have been confirmed and studied empirically based on Technology Acceptance Model(TAM). As a result, it was validated that self‐efficacy, facilitating condition, social influence, and perceived importance to TV banking needs are the influential variables. Therefore, one may able to find appropriate direction of marketing activities for effective expansion of IPTV banking service through this study. Also, considering the fact that the number of service users has absolute influence over profit determination in the IPTV banking service industry, the study about characteristics and intention of such potential adopters could certainly be significant.

6

성과지표 특성이 평가의 수용성에 미치는 영향에 관한 연구

최형섭, 오재인, 서현식

한국정보기술응용학회 JITAM Vol.16 No.2 2009.06 pp.99-120

※ 기관로그인 시 무료 이용이 가능합니다.

5,800원

The relationship between the performance measures and the acceptance of evaluation has been of importance not only in the academic field but in the business area. However, there had not been many studies on the factors which affect the goal core, that is, specificity and difficulty. The previous literature on the evaluation of measures has limitations in that the common and unique measures without suggesting the concept of shared measures are used. Thus, the purpose of this study is to examine the effects of the environmental characteristics of the goal setting on the result and acceptance of the evaluation, which is mediated by the characteristics of the goal core. This study further tests if there are any moderating effects from using the shared measures of performance.

7

ITSM 정착을 위한 6시그마 활용 방안에 관한 연구 : 서술적 사례 연구

박규리, 황경태

한국정보기술응용학회 JITAM Vol.16 No.2 2009.06 pp.121-133

※ 기관로그인 시 무료 이용이 가능합니다.

4,500원

Recently, as the importance of IT management is increasing, many companies have adopted ITSM(IT Service Management) as a solution to various IT management issues. In addition, some advanced companies are using 6 Sigma technique in their implementation of ITSM. The main purpose of this study is to analyze critical success factors of 6 Sigma in applying to the implementation of ITSM. For a case company, which is known to be successful in applying 6 sigma in its implementation of ITSM, six critical success factors were analyzed. The factors include leadership of CEO, capability and level of 6 Sigma belts, management of accurate data, building organizational systems, training and education, and evaluation and incentive. The results of the study are expected to be used as an useful information for companies to apply 6 Sigma in the implementation of ITSM.

8

Investigation on the Side Effects of Denormalizing Corporate Databases

Sangwon Lee, Namgyu Kim, Songchun Moon

한국정보기술응용학회 JITAM Vol.16 No.2 2009.06 pp.135-150

※ 기관로그인 시 무료 이용이 가능합니다.

4,900원

Corporate databases are usually denormalized, due to the data modelers’ impetuous belief that denormalization could improve system performance. By providing a logical insight into denormalization, this paper attempts to prevent every database modeler from falling into the denormalization pit. We indicate loopholes in the denormalization advocates’ assertions, and then present four criteria to analyze the usefulness and validity of denormalization; 1) the level of concurrency among transactions, 2) the database independence of the application program, 3) the independence between the logical design and the physical one, and 4) the overhead cost to maintain database integrity under various query patterns. This paper also includes experimental results to evaluate performance of denormalized and fully normalized structures under various workloads.

 
페이지 저장