Search results
1 – 7 of 7Choon Seong Leem, Hyung Sik Suh and Dae Seong Kim
Although there have been a lot of studies on mobile business, it is hard to find ones in which an integrated perspective of mobile business based on both customers’ and companies’…
Abstract
Although there have been a lot of studies on mobile business, it is hard to find ones in which an integrated perspective of mobile business based on both customers’ and companies’ needs is suggested. This research develops a mobile business model classification scheme and applies it to analysis of current status in mobile business. In the first case study on 65 firms in Korea, mobile solutions are categorized based on the classification scheme in order to analyze an overall market environment of mobile business. In the second case study on mobile service trend analysis, a set of evaluation indices including four general indices, ten effectiveness indices and 13 measurement indices were developed to analyze mobile service environment in the perspective of B2C (business to customer). For the second case study, 200 mobile heavy users were questioned on the mobile service‐related issues.
Details
Keywords
Sangkyun Kim and Choon Seong Leem
To provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information security…
Abstract
Purpose
To provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information security in business convergence environments.
Design/methodology/approach
A risk analysis method and baseline controls of BS7799 were used to generate security patterns of business convergence. With the analysis of existing enterprise architecture (EA) methods, the framework of the enterprise security architecture was designed.
Findings
The adaptive framework, including the security patterns with quantitative factors, enterprise security architecture with 18 dimensions, and reference models in business convergence environments, is provided.
Research limitations/implications
Information assets and baseline controls should be subdivided to provide more detailed risk factors and weight factors of each business convergence strategy. Case studies should be performed continuously to consolidate contents of best practices.
Practical implications
With the enterprise security architecture provided in this paper, an enterprise that tries to create a value‐added business model using convergence model can adapt itself to mitigate security risks and reduce potential losses.
Originality/value
This paper outlined the business risks in convergence environments with risk analysis and baseline controls. It is aguably the first attempt to adapt the EA approach for enterprise executives to solve the security problems of business convergence.
Details
Keywords
Sangkyun Kim and Choon Seong Leem
To identify controls that can harness the power and capabilities of instant messengers (IM) while minimizing potential security risks.
Abstract
Purpose
To identify controls that can harness the power and capabilities of instant messengers (IM) while minimizing potential security risks.
Design/methodology/approach
A risk analysis method and (CIS)2 model are used.
Findings
IM is a great tool for enterprise productivity. However, it has so many risks, but one could identify and control these risks with technical and managerial countermeasures.
Research limitations/implications
This paper fails to provide detailed and specific risks of commercial IMs, and the case study provided in this paper focuses on the technical rather than managerial issues.
Practical implications
A very helpful case study which provides general risks and controls of recent IMs for the security officers of various organizations.
Originality/value
This paper outlined the risks of IM and potential controls for securing public IM in the workplace.
Details
Keywords
Choon Seong Leem, Byeong Wan Kim, Eun Jung Yu and Min Ho Paek
Recently, many enterprises are using a variety of methods and techniques to examine and improve their current maturity level of information technology (IT). Although IT evaluation…
Abstract
Purpose
Recently, many enterprises are using a variety of methods and techniques to examine and improve their current maturity level of information technology (IT). Although IT evaluation studies based on IT maturity stages have been conducted widely, the stages theory has not been confirmed through statistical testing. IT evaluation activities can present managerial implications to an enterprise by determining where it stands within the stages theory. The purpose of this paper is to test empirically and repeatedly the once‐defined maturity model in order to make its validity more powerful.
Design/methodology/approach
To define IT maturity stages and benchmarks with statistical testing, evaluation fields and factors of the L&K Model are referred to. Data were gathered by a questionnaire survey and interviews, in which 312 enterprises in South Korea participated. Consequently, IT maturity stages are defined and significant benchmarks of each stage are validated through ANOVA and post hoc comparison methods.
Findings
The results of the study indicate the meanings and benchmarks of newly defined five stages of IT maturity: initiation, recognition, diffusion, control, and integration.
Practical implications
The aim of this study is not only to apply an advanced methodology to study empirically how IT maturity level of an enterprise is improved, but also to suggest practical guidelines for actions to improve it.
Originality/value
The five stages model is totally enhanced and reformulated from the previous stages theories. First, well‐combined and comprehensive evaluation factors are used to critically appraise the evolutionistic characteristic of IT in enterprises. Second, the definition and benchmarks of the five stages model are confirmed through statistical testing with sufficient sample size (n=312).
Details
Keywords
Choon Seong Leem and YongKi Yoon
The importance of software has been growing rapidly owing to the development of various Internet and e‐business applications. One of the active research areas in software involves…
Abstract
The importance of software has been growing rapidly owing to the development of various Internet and e‐business applications. One of the active research areas in software involves its evaluation methods or models. The traditional approaches to software evaluation are based on the development process point of view, and their major concerns are not strongly related to user or customer‐oriented evaluation of software. In this paper, a maturity model and a corresponding evaluation system are suggested that focuses on software customer satisfaction. As a case study, they are applied to 18 software companies and their 180 customers in Korea to prove their practical values.
Details
Keywords
Choon Seong Leem and Injoo Kim
In order to achieve competitive business goals, every enterprise needs to evaluate the current level of information systems performance and their utilization. The evaluation…
Abstract
In order to achieve competitive business goals, every enterprise needs to evaluate the current level of information systems performance and their utilization. The evaluation measures the technical capacity and operational capability of enterprise information systems and diagnoses their effectiveness in business goals and efficiency in resources. An integrated evaluation system is developed based on the continuous improvement model of information systems performance. The system has been applied to performance measurement of information systems with a huge set of data from Korean industries, and proven reliable and practical
Details
Keywords
Dae Jung Bae and Choon Seong Leem
Despite the importance of the service design process, existing prototyping methods still have technical limitations, thus hampering the development of realistic service-experience…
Abstract
Purpose
Despite the importance of the service design process, existing prototyping methods still have technical limitations, thus hampering the development of realistic service-experience simulations that can effectively reproduce service delivery situations and environments. In this study, a service-prototyping method based on 3D virtual reality (VR) technologies, the physical environment of a test bed, and related standard management procedures are described. In addition, a service-prototyping process for a servicescape is proposed based on a case study of an actual duty-free shop. The paper aims to discuss these issues.
Design/methodology/approach
The study adopts a qualitative approach, using case studies to undertake a design and improvement plans for brand guidance structures for the brand observation convenience of customers in a duty-free shop.
Findings
The findings of the study suggested environmental components and concept of 3D VR based test bed as an effective tool at the stage of service prototyping the core of new service development (NSD), and introduced practical methods for service prototyping in actual duty-free shop. The case study is significant due to the fact that it proved validity and practicality of the methods applied to service prototyping topic derivation and test process through target service analysis rather than optimal alternative selection.
Practical implications
This study emphasizes the importance of prototyping during NSD and the value of the service prototyping test bed for practical use. It also proposes guidelines for the establishment and management of the test bed.
Originality/value
In terms of service design research, this study also presented detailed operating procedures and methods through the new concept and in-depth case study of service prototyping using 3D VR technology.
Details