Earticle

현재 위치 Home

Issues

JITAM [Journal of Information Technology Applications and Management]

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    한국정보기술응용학회 [The Korea Society of Information Technology Applications]
  • pISSN
    1598-6284
  • eISSN
    2508-1209
  • 간기
    격월간
  • 수록기간
    1999 ~ 2026
  • 주제분류
    사회과학 > 경영학
  • 십진분류
    KDC 005 DDC 005
Vol.26 No.5 (5건)
No
1

A Study on the Sustained Use of Mobile Payment Services : Comparison of Alipay and WeChatpay in China

Giseob Yu, Qiqi, Namjae Cho

한국정보기술응용학회 JITAM Vol.26 No.5 2019.10 pp.1-12

※ 기관로그인 시 무료 이용이 가능합니다.

4,300원

This study conducted an empirical study on factors affecting the continuous use of mobile payment for users. Based on Technology Acceptance Model (TAM) and Extended Expectation-Confirmation Model of lS Continuance (ECM-ISC), we set up the model and hypothesis by adding habit and utilization range as independent variables. We received 426 valid questionnaires from users who have used continuously mobile payments such as Alipay and Wechatpay in China. The collected data was analyzed by SPSS for validity, reliability, factor analysis, T-test and regression analysis. The result shows that perceived usefulness, perceived risk, habits and utilization range have positive effects on users who use AliPay. Users who use Wechatpay have been affected by perceived usefulness, perceived use of ease, habit and application scope. However, the social influence does not affect both.

2

4,500원

Recently, as evaluation of information security (IS) management become more diverse and complicated, the contents and procedure of the evidence to prepare for actual assessment are rapidly increasing. As a result, the actual assessment is a burden for both evaluation agencies and institutions receiving assessments. However, most of them reflect the evaluation system used by foreign government agencies, standard organizations, and commercial companies. It is necessary to consider the evaluation system suitable for the domestic environment instead of reflecting the overseas evaluation system as it is. The purpose of this study is as follows. First, we will present the problems of the existing information security assessment system and the improvement direction of the information security assessment system through analysis of existing information security assessment system. Second, it analyzes the technical guidance for information security testing and assessment and the evaluation of information security management in the Special Publication 800-115 'Technical Guide to Information Security Testing and Assessment' of the National Institute of Standards and Technology (NIST). Third, we will build a framework to implement the evidence collection system and present a system implementation method for the ‘6. Information System Security’ of ‘information security management actual condition evaluation index’. The implications of the framework development through this study are as follows. It can be expected that the security status of the enterprises will be improved by constructing the evidence collection system that can collect the collected evidence from the existing situation assessment. In addition, it is possible to systematically assess the actual status of information security through the establishment of the evidence collection system and to improve the efficiency of the evaluation. Therefore, the management system for evaluating the actual situation can reduce the work burden and improve the efficiency of evaluation.

3

The Influence of Learning Styles on a Model of IoT-based Inclusive Education and Its Architecture

Dulan Sayassatov, Namjae Cho

한국정보기술응용학회 JITAM Vol.26 No.5 2019.10 pp.27-39

※ 기관로그인 시 무료 이용이 가능합니다.

4,500원

The Internet of Things (IoT) is a new paradigm that is revolutionizing computing. It is intended that all objects around us will be connected to the network, providing “anytime, anywhere” access to information. This study introduces IoT with Kolb’s learning style in order to enhance the learning experience especially for inclusive education for primary and secondary schools where delivery of knowledge is not limited to physical, cognitive disabilities, human diversity with respect to ability, language, culture, gender, age and of other forms of human differences. The article also emphasizes the role of learning style as a discovery process that incorporates the characteristics of problem solving and learning. Kolb’s Learning Style was chosen as it is widely used in research and in practical information systems applications. A consistent pattern of finding emerges by using a combination of Kolb’s learning style and internet of things where specific individual differences, learning approach differences and IoT application differences are taken as a main research framework. Further several suggestions were made by using this combination to IoT architecture and smart environment of internet of things. Based on these suggestions, future research directions are proposed.

4

Mobile Guidance System for Evacuation based on Wi-Fi System and Node Architecture

Timalsina Raju, Woo Sung Kim

한국정보기술응용학회 JITAM Vol.26 No.5 2019.10 pp.41-56

※ 기관로그인 시 무료 이용이 가능합니다.

4,900원

Recently great loss of life and property is occurring because of fire, natural disaster, earth quake, tsunami and so on. People spend 80~90% of their time indoor environment like office, supermarket, campus. Therefore Indoor navigation and guidelines system became so essential for most of all. Incase of emergency we must be careful earlier, in such a cases 5G kind of new technology may also cannot work. So immediate action and quick routing notification for guidelines and protection is the most. Considering this issue We proposed indoor evacuating guidance system based on microcontroller Wi-Fi board for Indoor APP using mobile. Focusing various kind of technology like, ok google, voice search APP we purposed node architecture based system. When we listen fire alarm while living inside the room. Then to be safe we connect with server and start Arduino UNO+IoT ESP8266 Wi-Fi shield version1-IoT module to store data in MySQL DB server. We make application to escape out from the building up-to the three exits giving information from source point to destination. Our program can send information to the users emergency location and situations. For this when the user get sound or vibration in their mobile device it indicate fire out near by. At that time we update message from Arduino to DB server for the fixed current position inside the building which give routing signal for that fire out location by changing values from 0 to 1. We have user in point 10 where user is near by. Later we detect Wi-Fi signal form Nodemcu as room of each floor and try to connect with user. Main purpose of this paper is to save life of people in short time and find out the shortest path up to nearest exits in the time of emergencies and rescue them.

5

Design and Implementation of Dynamic Recommendation Service in Big Data Environment

Kim Ryong, Kyung-Hye Park

한국정보기술응용학회 JITAM Vol.26 No.5 2019.10 pp.57-65

※ 기관로그인 시 무료 이용이 가능합니다.

4,000원

Recommendation Systems are information technologies that E-commerce merchants have adopted so that online shoppers can receive suggestions on items that might be interesting or complementing to their purchased items. These systems stipulate valuable assistance to the user’s purchasing decisions, and provide quality of push service. Traditionally, Recommendation Systems have been designed using a centralized system, but information service is growing vast with a rapid and strong scalability. The next generation of information technology such as Cloud Computing and Big Data Environment has handled massive data and is able to support enormous processing power. Nevertheless, analytic technologies are lacking the different capabilities when processing big data. Accordingly, we are trying to design a conceptual service model with a proposed new algorithm and user adaptation on dynamic recommendation service for big data environment.

 
페이지 저장