Search results

1 – 7 of 7
Article
Publication date: 1 January 2004

Choon Seong Leem, Hyung Sik Suh and Dae Seong Kim

Although there have been a lot of studies on mobile business, it is hard to find ones in which an integrated perspective of mobile business based on both customers’ and companies’…

7403

Abstract

Although there have been a lot of studies on mobile business, it is hard to find ones in which an integrated perspective of mobile business based on both customers’ and companies’ needs is suggested. This research develops a mobile business model classification scheme and applies it to analysis of current status in mobile business. In the first case study on 65 firms in Korea, mobile solutions are categorized based on the classification scheme in order to analyze an overall market environment of mobile business. In the second case study on mobile service trend analysis, a set of evaluation indices including four general indices, ten effectiveness indices and 13 measurement indices were developed to analyze mobile service environment in the perspective of B2C (business to customer). For the second case study, 200 mobile heavy users were questioned on the mobile service‐related issues.

Details

Industrial Management & Data Systems, vol. 104 no. 1
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 September 2005

Sangkyun Kim and Choon Seong Leem

To provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information security…

2800

Abstract

Purpose

To provide the strategic model of approach which helps enterprise executives to solve the managerial problems of planning, implementation and operation about information security in business convergence environments.

Design/methodology/approach

A risk analysis method and baseline controls of BS7799 were used to generate security patterns of business convergence. With the analysis of existing enterprise architecture (EA) methods, the framework of the enterprise security architecture was designed.

Findings

The adaptive framework, including the security patterns with quantitative factors, enterprise security architecture with 18 dimensions, and reference models in business convergence environments, is provided.

Research limitations/implications

Information assets and baseline controls should be subdivided to provide more detailed risk factors and weight factors of each business convergence strategy. Case studies should be performed continuously to consolidate contents of best practices.

Practical implications

With the enterprise security architecture provided in this paper, an enterprise that tries to create a value‐added business model using convergence model can adapt itself to mitigate security risks and reduce potential losses.

Originality/value

This paper outlined the business risks in convergence environments with risk analysis and baseline controls. It is aguably the first attempt to adapt the EA approach for enterprise executives to solve the security problems of business convergence.

Details

Industrial Management & Data Systems, vol. 105 no. 7
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 February 2005

Sangkyun Kim and Choon Seong Leem

To identify controls that can harness the power and capabilities of instant messengers (IM) while minimizing potential security risks.

2097

Abstract

Purpose

To identify controls that can harness the power and capabilities of instant messengers (IM) while minimizing potential security risks.

Design/methodology/approach

A risk analysis method and (CIS)2 model are used.

Findings

IM is a great tool for enterprise productivity. However, it has so many risks, but one could identify and control these risks with technical and managerial countermeasures.

Research limitations/implications

This paper fails to provide detailed and specific risks of commercial IMs, and the case study provided in this paper focuses on the technical rather than managerial issues.

Practical implications

A very helpful case study which provides general risks and controls of recent IMs for the security officers of various organizations.

Originality/value

This paper outlined the risks of IM and potential controls for securing public IM in the workplace.

Details

Internet Research, vol. 15 no. 1
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 31 October 2008

Choon Seong Leem, Byeong Wan Kim, Eun Jung Yu and Min Ho Paek

Recently, many enterprises are using a variety of methods and techniques to examine and improve their current maturity level of information technology (IT). Although IT evaluation…

2144

Abstract

Purpose

Recently, many enterprises are using a variety of methods and techniques to examine and improve their current maturity level of information technology (IT). Although IT evaluation studies based on IT maturity stages have been conducted widely, the stages theory has not been confirmed through statistical testing. IT evaluation activities can present managerial implications to an enterprise by determining where it stands within the stages theory. The purpose of this paper is to test empirically and repeatedly the once‐defined maturity model in order to make its validity more powerful.

Design/methodology/approach

To define IT maturity stages and benchmarks with statistical testing, evaluation fields and factors of the L&K Model are referred to. Data were gathered by a questionnaire survey and interviews, in which 312 enterprises in South Korea participated. Consequently, IT maturity stages are defined and significant benchmarks of each stage are validated through ANOVA and post hoc comparison methods.

Findings

The results of the study indicate the meanings and benchmarks of newly defined five stages of IT maturity: initiation, recognition, diffusion, control, and integration.

Practical implications

The aim of this study is not only to apply an advanced methodology to study empirically how IT maturity level of an enterprise is improved, but also to suggest practical guidelines for actions to improve it.

Originality/value

The five stages model is totally enhanced and reformulated from the previous stages theories. First, well‐combined and comprehensive evaluation factors are used to critically appraise the evolutionistic characteristic of IT in enterprises. Second, the definition and benchmarks of the five stages model are confirmed through statistical testing with sufficient sample size (n=312).

Details

Industrial Management & Data Systems, vol. 108 no. 9
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 1 May 2004

Choon Seong Leem and YongKi Yoon

The importance of software has been growing rapidly owing to the development of various Internet and e‐business applications. One of the active research areas in software involves…

3784

Abstract

The importance of software has been growing rapidly owing to the development of various Internet and e‐business applications. One of the active research areas in software involves its evaluation methods or models. The traditional approaches to software evaluation are based on the development process point of view, and their major concerns are not strongly related to user or customer‐oriented evaluation of software. In this paper, a maturity model and a corresponding evaluation system are suggested that focuses on software customer satisfaction. As a case study, they are applied to 18 software companies and their 180 customers in Korea to prove their practical values.

Details

Industrial Management & Data Systems, vol. 104 no. 4
Type: Research Article
ISSN: 0263-5577

Keywords

Article
Publication date: 8 July 2014

Dae Jung Bae and Choon Seong Leem

Despite the importance of the service design process, existing prototyping methods still have technical limitations, thus hampering the development of realistic service-experience…

1547

Abstract

Purpose

Despite the importance of the service design process, existing prototyping methods still have technical limitations, thus hampering the development of realistic service-experience simulations that can effectively reproduce service delivery situations and environments. In this study, a service-prototyping method based on 3D virtual reality (VR) technologies, the physical environment of a test bed, and related standard management procedures are described. In addition, a service-prototyping process for a servicescape is proposed based on a case study of an actual duty-free shop. The paper aims to discuss these issues.

Design/methodology/approach

The study adopts a qualitative approach, using case studies to undertake a design and improvement plans for brand guidance structures for the brand observation convenience of customers in a duty-free shop.

Findings

The findings of the study suggested environmental components and concept of 3D VR based test bed as an effective tool at the stage of service prototyping the core of new service development (NSD), and introduced practical methods for service prototyping in actual duty-free shop. The case study is significant due to the fact that it proved validity and practicality of the methods applied to service prototyping topic derivation and test process through target service analysis rather than optimal alternative selection.

Practical implications

This study emphasizes the importance of prototyping during NSD and the value of the service prototyping test bed for practical use. It also proposes guidelines for the establishment and management of the test bed.

Originality/value

In terms of service design research, this study also presented detailed operating procedures and methods through the new concept and in-depth case study of service prototyping using 3D VR technology.

Details

Managing Service Quality, vol. 24 no. 4
Type: Research Article
ISSN: 0960-4529

Keywords

Article
Publication date: 1 February 2004

Choon Seong Leem and Injoo Kim

In order to achieve competitive business goals, every enterprise needs to evaluate the current level of information systems performance and their utilization. The evaluation…

2686

Abstract

In order to achieve competitive business goals, every enterprise needs to evaluate the current level of information systems performance and their utilization. The evaluation measures the technical capacity and operational capability of enterprise information systems and diagnoses their effectiveness in business goals and efficiency in resources. An integrated evaluation system is developed based on the continuous improvement model of information systems performance. The system has been applied to performance measurement of information systems with a huge set of data from Korean industries, and proven reliable and practical

Details

Industrial Management & Data Systems, vol. 104 no. 2
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 7 of 7