간행물

한국정보시스템학회> 정보시스템연구

정보시스템연구 update

The Journal of Information Systems

  • : 한국정보시스템학회
  • : 사회과학분야  >  경영학
  • : KCI등재
  • :
  • : 연속간행물
  • : 계간
  • : 1229-8476
  • :
  • :

수록정보
수록범위 : 1권1호(1992)~27권1호(2018) |수록논문 수 : 731
정보시스템연구
27권1호(2018년 03월) 수록논문
최근 권호 논문
| | | |

KCI등재

1정보기술 비사용의 결정요인과 동태적 성격의 규명: 근거이론방법론에 의한 질적 연구

저자 : 이웅규 ( Lee Woong-kyu )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 1-20 (20 pages)

다운로드

(기관인증 필요)

초록보기

Purpose The purpose of this study is to identify the determinants of non-use and the dynamic nature of non-use by the qualitative research methodology, grounded theory methodology, as part of identifying the nature of non-use. Design/methodology/approach We applied the grounded theory methodology to a total of 23 college students, including non-users who are not currently using them, users with low intention to use them, and users with high intention to use. We extracted the codes related to the use and proposed the non-use dynamics conversion process based on the coding results. Findings First, the use of information technology can also promote the frequency of use, but can also lead to the use of negative attitudes which would fall in the state of non-use. Second, the user may have both positive and negative attitudes toward the current information technology. Third, if usage is dominated by habits, it is not so easy to change persistent use into an unused state. Fourth, factors that determine the use of specific information technology can be a factor in determining nonuse. This study has contributed to understand the essence of non - use as well as the nature of use, overcoming limitations of quantitative research approach and confirming possibility of grounded theory method in information system research.

KCI등재

2팬페이지에서 심리적 주인의식의 경로와 고객로열티

저자 : 이주민 ( Lee Ju-min ) , 차민정 ( Cha Min-jung )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 21-42 (22 pages)

다운로드

(기관인증 필요)

초록보기

Purpose This study investigates that the routes of psychological ownership in Fanpage and the effect of psycholoigical ownership on customer loyalty based on psychological ownership theory. Fans are customers who clicked 'Like' on the fan page. These fans have a lot of friends on Facebook, so the word-of-mouth is more effective than other online communities. Therefore, it is necessary for fans to have psychological ownership, actively responding to the fan pages, and recommending them to friends. However, previous social network service studies have overlooked the importance of psychological ownership. In this study, we examine what factors can increase psychological ownership and show that customer loyalty can be enhanced through psychological ownership. Design/methodology/approach This study was designed to investigate the structural relationship between Fanpage Familiarity, Interaction(Customer-Brand interaction and Customer-customer interaction), Psychological Ownerhisp, and Customer Loyalty. Structural equation modeling with SmartPLS2.0 was used to analyze the relationships in the research model. Findings The results showed that Fanpage Familiarity and Customer-customer interaction is positively related with Psychological Ownership. However, Customer-Brand interaction did not influence Psychological Ownership. Psychological Ownership has a positive impact on Intention to Continue Using Fanpage and Recommend.

KCI등재

3Classification and Evaluation of Service Requirements in Mobile Tourism Application Using Kano Model and AHP

저자 : 뗀진최된 ( Tenzin Choedon ) , 이영찬 ( Lee Young-chan )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 43-65 (23 pages)

다운로드

(기관인증 필요)

초록보기

Purpose The emergence of mobile applications has simplified our life in various ways. Regarding tourism activities, mobile applications are already efficient in providing personalized tourism related information and are very much effective in booking hotels, flights, etc. However, there are very few studies on classifying the actual service requirements and improving the customer satisfaction in mobile tourism applications. The purpose of this study is to implement a practical mobile tourism application. To serve the purpose, we classify and categorize the service requirement of mobile tourism applications in Korea. We employed Kano model and analytic hierarchy process (AHP). Specifically, we conducted a focus group study to find out the service requirements in mobile tourism applications. Design/methodology/approach The data for this study were collected from Koreans and Foreigners who has the experience using mobile tourism applications. Participants needed to be familiar with mobile tourism applications because such users may be more aware of the mobile tourism applications services. We analyzed 147 valid data using Kano model and conducted AHP analysis on five experts in the field of tourism using Expert Choice software. Findings In this paper, we identified the 17 service quality requirements in the mobile tourism applications. The results reveal that the service requirement such as Geo-location map, Multilingual option, Compatibility with different operating systems were unavoidable service, absent of such requirements leads to the dissatisfaction. Based on the results of the integrated application of both Kano model and AHP analysis, this study provide specific implications for improving the service quality of the mobile tourism applications in Korea.

KCI등재

4SNS 이용동기가 브랜드 관계에 미치는 영향 관계 고찰: 자기결정이론 적용을 중심으로

저자 : 이은지 ( Lee Eun-ji ) , 구철모 ( Koo Chul-mo )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 67-88 (22 pages)

다운로드

(기관인증 필요)

초록보기

Purpose The purpose of this study is to verify motivations of corporate Facebook usage and to examine the impacts of usage motivations on brand attachment, trust and loyalty. Design/methodology/approach A conceptual model is developed based on Self-determination theory(SDT) and the previous studies. We conducted a web survey with a convenient sample of 121 Facebook users who clicked “Like” button on the corporate Facebook pages. Findings The followings are the findings of the study. First, intrinsic motivation(Entertainment) turned out to have positive effects on brand attachment. Second, extrinsic motivation(information exchange) turned out to have positive effects on brand trust. Third, brand attachment turned out to have positive effects on brand loyalty. These findings provide a valuable basis for constructing an explanatory model for “Like”-clicking behaviors of corporate's Facebook community platform users, as well as making significant practical contributions to enhance social and commercial benefits for businesses and individuals.

KCI등재

5LDA를 이용한 온라인 리뷰의 다중 토픽별 감성분석 - TripAdvisor 사례를 중심으로 -

저자 : 홍태호 ( Hong Tae-ho ) , 니우한잉 ( Niu Hanying ) , 임강 ( Ren Gang ) , 박지영 ( Park Ji-you

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 89-110 (22 pages)

다운로드

(기관인증 필요)

초록보기

Purpose There is much information in customer reviews, but finding key information in many texts is not easy. Business decision makers need a model to solve this problem. In this study we propose a multi-topic sentiment analysis approach using Latent Dirichlet Allocation (LDA) for user-generated contents (UGC). Design/methodology/approach In this paper, we collected a total of 104,039 hotel reviews in seven of the world's top tourist destinations from TripAdvisor (www.tripadvisor.com) and extracted 30 topics related to the hotel from all customer reviews using the LDA model. Six major dimensions (value, cleanliness, rooms, service, location, and sleep quality) were selected from the 30 extracted topics. To analyze data, we employed R language. Findings This study contributes to propose a lexicon-based sentiment analysis approach for the keywords-embedded sentences related to the six dimensions within a review. The performance of the proposed model was evaluated by comparing the sentiment analysis results of each topic with the real attribute ratings provided by the platform. The results show its outperformance, with a high ratio of accuracy and recall. Through our proposed model, it is expected to analyze the customers' sentiments over different topics for those reviews with an absence of the detailed attribute ratings.

KCI등재

6정보 기술을 이용한 공급 기업과의 공동 혁신이 제조기업 제품 및 과정 혁신에 미치는 영향

저자 : 최종민 ( Choe Jong-min )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 111-131 (21 pages)

다운로드

(기관인증 필요)

초록보기

Purpose This study empirically investigated the impact of information technology(IT) capability on the co-innovation with suppliers and the effects of the co-innovation with suppliers on the product and process innovations in manufacturing firms. We demonstrated that IT promotes innovations trough the sharing of knowledge with suppliers. Design/methodology/approach The empirical data were collected through post-survey. 97 valid survey data were finally collected. With a multiple-regression analysis, we confirmed the influence relationships among critical variables. Findings In the empirical results, it was found that IT integration positively and significantly influences the amount of inter-organizational information exchange with suppliers. The results showed that the inter-organizational information flow with suppliers has a positive and significant impact on the inter-organizational learning with suppliers. It was also observed that the inter-organizational learning with suppliers facilitates and promotes the co-innovation with suppliers. From these results, it is concluded that the co-innovation with suppliers is activated through the knowledge transfer or sharing caused by an inter-organizational information flow or learning. Finally, the positive effects of the co-innovation with suppliers on the product and process innovations were empirically confirmed. Thus, it is suggested that IT capability influences innovations through the co-innovation with suppliers caused by an inter-organizational information flow.

KCI등재

7핀테크 지급결제 서비스 수용 저항요인 연구 : 혁신저항이론과 현상유지편향이론을 중심으로

저자 : 황신해 ( Hwang Sin-hae ) , 김정군 ( Kim Jeoung-kun )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 133-151 (19 pages)

다운로드

(기관인증 필요)

초록보기

Purpose Global fintech industry is proliferating. Although domestic investment in fintech service is also increasing fast, user acceptance of fintech payment service seems slower than expected. Previous fintech literature mainly focuses on overall characteristics and technical aspects of fintech including security issues and explores factors affecting the service adoption. This study aims to examine crucial factors affecting user's resistance intention to fintech payment service adoption. The research model was formulated based on innovation diffusion theory and status quo bias theory and validated empirically. Design/methodology/approach The proposed research model was empirically validated with 149 responses from college students who have used fintech payment service. The component-based SEM was employed for data analysis. Findings The significant findings are as follow. First, compatibility has significant negative effect and complexity, and perceived risk has a positive effect on user resistance. Second, institutional trust does not show a significant effect on user resistance but has an indirect effect through the mediation of trust in service provider. Finally, trust in service provider shows the significant negative effect on user resistance.

KCI등재

8The Effect of Graphical Formats on Computer-Based Idea Generation Performance

저자 : 정종호 ( Jung Joung-ho )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 153-169 (17 pages)

다운로드

(기관인증 필요)

초록보기

Purpose Since human brains catch images faster than texts or numbers, infographics has been widely used in business in the form of “information dashboard” to enhance the efficiency of decision-making. Groupware, however, has neglected the adoption and use of infographics, in particular, in the idea generation process. Given that an overall performance of groupware-based idea generation is no better than that of the (paper-and-pencil-based) Nominal Group Technique, Jung et al. (2010) adopted the notion of infographics in the form of performance feedback to solve the productivity paradox. With the consistent results, which demonstrate beneficial effects of infographics on performance enhancement, an interesting observation that groups with the bar chart treatment performed better than groups with the dot chart treatment was made. The main purpose of this study was to find if there were a performance consistency between the outcomes from the previous study and the outcomes from the current study. Design/methodology/approach In experiment 1, we employed the same system used in the previous study (i.e., Jung et al., 2010). As individuals' contributions accumulated, the mechanism visually displayed individuals' performances two-dimensionally in the form of a bar chart or a dot chart. Then, we compared the performance outcomes from this study to the outcomes from previous study (i.e., Jung et al., 2010). In experiment 2, we modified the performance graph to test the effect of “playfulness” on performance by converting dots to car images. Then, we compared the performance outcome from experiment 2 to the outcomes from experiment 1. Findings Just like our interesting (and unexpected) finding in Jung et al.'s study (2010), the outcome confirmed a consistent superior performance of a bar chart. This implies that a bar chart is a better choice when stimulating performance with a visual aid in the context of groupware-based idea generation. Although a bar chart was criticized in a way that errors of length-area judgments are 40 ~ 250% greater than those of positional judgments along a common scale, such illusion turned out to be facilitating upward performance comparison better. Regarding Experiment 2, the outcome showed that the revised-dot graph is as good as the bar graph in terms of quantity and quality score of ideas. We attribute the performance enhancement of the resized-dot to the interaction between the motivational characteristic and the situational characteristic of playfulness because individuals in the revised-dot graph treatment performed better than individuals in the dot graph treatment. Given the order of performance (Bar >= Revised Dot > Dot) that the revised-dot treatment performed the same as (or lower than) the bar treatment, an additional research is warranted to reach to a consistent outcome.

KCI등재

9중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구

저자 : 유인진 ( Yoo In-jin ) , 박도형 ( Park Do-hyung )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 171-191 (21 pages)

다운로드

(기관인증 필요)

초록보기

Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

KCI등재

10개인정보 유출의 정보전이 효과

저자 : 박상수 ( Park Sang-soo ) , 이현철 ( Lee Hyun-chul )

발행기관 : 한국정보시스템학회 간행물 : 정보시스템연구 27권 1호 발행 연도 : 2018 페이지 : pp. 193-224 (32 pages)

다운로드

(기관인증 필요)

초록보기

Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

1
권호별 보기
가장 많이 인용된 논문

(자료제공: 네이버학술정보)

가장 많이 인용된 논문
| | | |
1연안해역에서 석유오염물질의 세균학적 분해에 관한 연구

(2006)홍길동 외 1명심리학41회 피인용

다운로드

2미국의 비트코인 규제

(2006)홍길동심리학41회 피인용

다운로드

가장 많이 참고한 논문

(자료제공: 네이버학술정보)

가장 많이 참고한 논문

다운로드

2미국의 비트코인 규제

(2006)홍길동41회 피인용

다운로드

해당 간행물 관심 구독기관

연세대학교 경희대학교 고려대학교 서울대학교 부산대학교
 50
 43
 38
 32
 25
  • 1 연세대학교 (50건)
  • 2 경희대학교 (43건)
  • 3 고려대학교 (38건)
  • 4 서울대학교 (32건)
  • 5 부산대학교 (25건)
  • 6 이화여자대학교 (24건)
  • 7 세종대학교 (23건)
  • 8 서강대학교 (22건)
  • 9 중앙대학교(서울) (21건)
  • 10 충북대학교 (20건)

내가 찾은 최근 검색어

최근 열람 자료

맞춤 논문

보관함

내 보관함
공유한 보관함

1:1문의

닫기