Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Beomsoo Kim is active.

Publication


Featured researches published by Beomsoo Kim.


International Journal of Information Management | 2012

Knowledge complementarity and knowledge exchange in supply channel relationships

Kyung Kyu Kim; Narayan S. Umanath; Joo Young Kim; Fred Ahrens; Beomsoo Kim

Abstract Existing literature on knowledge exchange in inter-organizational relationships (e.g., a supply channel) reveals two opposing forces at work: (1) collaborative behavior and (2) opportunistic behavior. A concurrent assessment of the opposing perspectives and the contingencies under which each is relevant for supply channel performance can add valuable insights about the dynamics of knowledge exchange. We juxtapose the two behavior patterns using social capital theory and transaction cost economics (TCE) respectively as the explicators and employ knowledge complementarity as the contingency to reconcile the opposing behavior patterns. The choice of knowledge complementarity in this role stems from ample theoretical and empirical support in prior literature about the criticality of this factor in inter-firm knowledge exchange. We propose a research model, and use data from a field study of 82 firms in the Electronics Manufacturing Services (EMS) industry to test our model. Our findings indicate that overall inter-organizational trust (a surrogate for social capital) and knowledge complementarity promote knowledge exchange behavior in a supply channel. The retarding effect of risk of opportunism (a TCE dimension) manifests only when knowledge complementarity is low. However, when knowledge complementarity is high, contrary to expectations, inter-organizational trust appears to impede knowledge exchange. Our post hoc analysis of this intriguing, counterintuitive result leads us to knowledge interdependence and dependence asymmetry as potentially critical antecedents to knowledge complementarity. Implication of our findings to academic research and supply chain scenario is also articulated.


Journal of Information Management | 2009

A Study on the Effects of the Information Asset Protection Performance on the Organization Performance: Management Activity and Control Activity

Kyung-Kyu Kim; Ho-Kyoung Shin; Sung-Sik Park; Beomsoo Kim

ABSTRACT Recently, enterprises are protecting information assets with the various means of control and management. Nevertheless, they are confronted with the dile mma which the higher securitylevel they request, the lesser efficiency and productivity in short terms they acquire by the inconvenience of business process. In addition, in spite of the steady increase of organization’s investment on information protection, the systematic way for the perfor- mance measurement of information protection has not been suggested, so that in reality, it is difficult to make the decision to invest on information-prot ection and elicit the direction to improve it. For this reason, this study intended to establish the concept of the pro- tection and security of information assets of enterprises and to categorize the type of activities to protect information assets into management activi ty and control activity, and analyze the effects of management activity and control activity for information asset protection on the performance of information asset protection activity and organization. For this research, questionnaire survey was conducted with literature study and the PLS(Partial Least Square) was used to analyze the measurement model and hypotheses testing. The PLS analysis results indicate that management acti vity for information asset protection affects information asset protection performance. Further, organizational perfor- mance is influenced by information asset protection performance. Practical implications of these findings and future research implications are also discussed.


The e-Business Studies | 2012

The Life Cycle Model Considering Legal and Technical Characteristics of Personal Data

Jaeyoung Jang; Taehwan Park; Beomsoo Kim

초 록본 논문은 개인정보의 법적 및 기술적 특성을 고려한 라이프 사이클 모델들을 각각 검토했다. 그리고, 이를 토대로 국내 IT 기업에 적합한 ‘개인정보의 동의․관리 기반 모델’을 제안했다. 본 논문에서 제시한 모델은 기존의 모델이 간과하고 있던 ‘동의’와 ‘관리’ 요소를 모델에 적극 반영했다는 특징이 있다. 본 모델의 타당성은 2가지 방식으로 검증했다. 첫째, IT 기업의 개인정보 라이프 사이클 구성 요소를 파악 후 모델별로 적용하여 ‘동의․관리’ 모델의 우수성을 검증했다. 둘째, 개인정보의 라이프 사이클 전체 프로세스에 ‘동의’와 ‘관리’ 내용이 포함됨을 입증했다. 본 연구 결과를 활용하면 IT 기업이 개인정보 활용 현황을 분석하고 보호 체계를 마련하는데 기여할 수 있을 것으로 기대된다.ABSTRACTThis study reviews the life cycle models considering legal and technical characteristics of personal data respectively. Based on the reviews, this research proposes ‘consent and management based model of personal data’ which is applicable to the domestic IT companies. The model suggested in this paper has characteristics that ‘Consent’ and ‘Management’ factors are ㅁpositively considered, which is overlooked in the other models. The validity of the model is examined by two methods, validation of the model of excellence by contrast of the other models, and ‘consent’ and ‘management’ factors cover all the life cycle processes. Using this model, IT companies will be contributed to the analysis of the personal data utilization and the development of IT system protection.키워드:개인정보의 동의․관리 기반 모델


Journal of the Korea society of IT services | 2014

The Factors Affecting Smartphone User`s Intention to use Mobile Anti-Malware SW

Jaeyoung Jang; Jidong Kim; Beomsoo Kim

The purpose of this study is to estimate factors affecting Smartphone user’s intention to use of the mobile Anti-Malware SW. For this study, the protection motivation theory is utilized and a questionnaire-based field survey was conducted with 263 smartphone users in Korea. As a result of the verification processes, It was found that the installation perception of mobile Anti-Malware SW predicts a significant effect only on response efficacy and self-efficacy factors among the variables on protection motivation theory. Moreover, all the 4 main variables of Protection Motivation Theory were found to affect the SW intended use of all mobile phones. On the other hand, It was found that the installation perception of mobile Anti-Malware SW does not predict a significant effect on perceived severity and perceived vulnerability, and the installation perception does not directly affect to the intention to use of the mobile SW. This research revealed some contributions that the scope of Protection Motivation Theory is expanded to the field of IS domain by applying the theory to the mobile Anti-Malware SW and it is possible to be utilized the results obtained to increase the utilization of improved mobile Anti-Malware SW usage rates.


Global Economic Review | 2011

Regulatory Policies and Business Strategies on Patent Protection: A General Model and Cases for the East Asian Economy

Taeha Kim; Beomsoo Kim

Abstract This paper proposes a general framework of patent protection which can be applied to most existing theories, and can be used to resolve various issues regarding the protection of information technology (IT)-enabled innovations, especially those involving business methods (BMs) and software. We suggest that one should consider that firms have many strategic choices or mixtures of appropriate combinations of innovations, examine different combinations of menu components rather than focusing on well-explored policies, revise market assumptions to make them more realistic and capture the complexity of policy-strategy assumptions by applying methodologies, such as experiments, system dynamics and intelligent agent theory. The work explores how these innovations are protected using the cases in the East Asian economy and find out that software and BMs are better protected in the nations that enforce strong patent rights.


Electronic Commerce Research and Applications | 2011

The role of psychological traits and social factors in using new mobile communication services

Kyung Kyu Kim; Ho Kyoung Shin; Beomsoo Kim


Journal of Chemical & Engineering Data | 2012

Density and Solubility of CO2 in Aqueous Solutions of (Potassium Carbonate + Sarcosine) and (Potassium Carbonate + Pipecolic Acid)

Hoyong Jo; Min-Gu Lee; Beomsoo Kim; Ho-Jun Song; Hyungbae Gil; Jin-Won Park


Asia pacific journal of information systems | 2005

Does Knowledge-sharing Intent Matter in the Use of Knowledge Management Systems?

Kyung Kyu Kim; Ho Kyoung Shin; Beomsoo Kim; 송세정


Bioresources | 2012

PRETREATMENT OF CELLULOSIC WASTE SAWDUST INTO REDUCING SUGARS USING MERCERIZATION AND ETHERIFICATION

Beomsoo Kim; Ishan Gulati; Jin-Won Park; Jong Shik Shin


The e-Business Studies | 2011

Securing the Private Key in the Digital Certificate Using a Graphic Password

Byung-Hoon Kang; Beomsoo Kim; Kyung-Kyu Kim

Collaboration


Dive into the Beomsoo Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge