Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where JinYoung Han is active.

Publication


Featured researches published by JinYoung Han.


Computers in Human Behavior | 2014

Why smartphone advertising attracts customers: A model of Web advertising, flow, and personalization

Yoo Jung Kim; JinYoung Han

Thirty-five percent of US adults own a smartphone and more than seventy-three percent of the population in South Korea owns a smartphone in the first quarter of 2013. The number of people that use a smartphone has radically increased. Smartphone users always maintain connectivity, and frequent and swift communication with others. As the mobile advertising market is drastically expanded, advertisers and companies should be more attentive to effective smartphone advertising. This study suggests a comprehensive advertising model that combines a Web advertising model, personalization and flow theory in understanding the antecedents of purchase intention and influence processes in the context of smartphone advertisements. The results show that personalization has a positive association with informativeness, credibility, and entertainment of the advertising message while having a negative association with irritation. Purchase intention is increased by advertising value and flow experience. Advertising value has a positive relationship with credibility, entertainment, and incentives. Flow experience is positively associated with credibility, entertainment, incentives. Irritation negatively affects flow experience but advertising value. This study theoretically contributes to the application of the smartphone advertising model and practically contributes influential factors for effective advertising to marketers and advertisers.


Computers & Security | 2017

An integrative model of information security policy compliance with psychological contract

JinYoung Han; Yoo Jung Kim; Hyungjin Kim

Psychological contract fulfillment is integrated into ISP compliance research model.The difference between supervisor and supervisee groups was found in the integrated model.The mediating effect of psychological contract fulfillment exists in the supervisor group.Employees anticipate to comply with ISP when they recognize the benefits of ISP compliance. Organizations are trying to induce employees to comply with information security policy (ISP) as organizational damage of information breach incidents gets serious. Many previous approaches to ISP compliance have focused on security technologies. However, researchers in this area agree that technology approach is not sufficient so that other approaches such as behavioral and social are required. This study suggests the integrated research model including ISP compliance antecedents and psychological contract fulfillment. The study investigates the mediating effect of psychological contract fulfillment between perceived costs and ISP compliance intention comparing supervisor and supervisee groups. The results show that psychological contract fulfillment can mitigate the negative effect of costs on ISP compliance intention in supervisor group. Employees also anticipate complying with ISP when they recognize the benefits of ISP compliance. This study could shed more lights on the ISP compliance area by integrating and examining ISP compliance research model with psychological contract as a social factor.


Journal of Computer Information Systems | 2016

Dimensionality of Social Capital and Organizational Citizenship Behavior in Information Systems Project Teams

JinYoung Han; Anat Hovav

ABSTRACT Knowledge sharing and organizational citizenship behavior (OCB) among project team members are crucial for project success due to the particularities of information systems (IS) projects. Bonding social capital is known to increase knowledge sharing and collaboration. However, the influence of bridging social capital on knowledge sharing is unclear. The interplay between bridging and bonding social capital is especially interesting in a collectivistic society such as South Korea where in-group ties are particularly strong. In this study, we examine the effect of the sub-dimensions of the above constructs (i.e., bonding, bridging, OCB) on knowledge sharing. The results suggest that bonding and citizenry behavior improves knowledge sharing. Bridging improves knowledge sharing by increasing organizational citizenry behavior. Unexpectedly, the effect of citizenship behavior on knowledge sharing differs from the effect of its sub-dimensions. Only helping others is positively related to knowledge sharing. Similarly, the sub-dimensions of bridging and bonding influence knowledge sharing and citizenship behavior differently than the first-order constructs. For example, shared team mental model positively affects OCB, but has no direct influence on knowledge sharing. Conversely, shared vision is the only sub-dimension of bridging that positively affects OCB. Thus, the results suggest that project managers should facilitate shared project vision and team mental model to encourage team members’ citizenship behavior and control the potential adverse influence of bridging social capital.


ACM SIGMIS Database: the DATABASE for Advances in Information Systems | 2017

Market Reaction to Security Breach Announcements: Evidence from South Korea

Anat Hovav; JinYoung Han; Joonghyuk Kim

Event studies have been used to assess the financial impact of cyber incidents on firms since the methodology is believed to reflect tangible, intangible and potential gains/losses. While most prior studies examined the impact of security breach announcements on the United States? market reaction, our study examines the South Korean markets reaction to similar events. Investor protection theory suggests that different markets react differently to similar events. Specifically stronger investor protection leads to lower information asymmetry, which in turn results in a more efficient market valuation. Koreas investor protection index is lower than that of the U.S., suggesting higher information asymmetry and less efficient market valuation. Our study found that the Korean market reaction to cyber incidents was relatively slow, supporting the above assertion. In addition, regulated industries experienced significant negative abnormal returns post-2007 when privacy laws were enacted in South Korea. The study also found that Korea?s market reaction to security incident announcements varied over time as the nature of cyber attacks and attackers changed. For example, while the negative market reaction to denial-of-service and corruption of data events were significant pre-2007, the negative reaction to disclosure of private information was significant post-2007.


Innovation-the European Journal of Social Science Research | 2018

Customer-favourable idea versus company-adoptable idea: comparative analysis through elaboration likelihood model

Hanjun Lee; JinYoung Han; Yongmoo Suh

Abstract Recent years have witnessed the growing trend of open innovation, and participating customers have become an important source of innovation for companies. The effectiveness of this open approach remains a matter of controversy, however. We examine the value of customer ideation in a coffee brand community by employing the ideas posted by community members and investigating whether they are customer-favourable and/or company-adoptable. Using the elaboration-likelihood model (ELM) that explains the factors for persuasion, we propose several hypotheses on how the content/contextual factors of ideas relate to both customer favourableness and company adoption. The hypothesis tests, via ordinary least-squares and binomial logistic regression models, show that customer-favourable ideas have a positive but marginal effect on company adoption, while the antecedents of customer favourableness differ from those of company adoption. We also confirm that peer engagement has a moderating effect on the relationship between idea content factors and company favourableness. This study offers theoretical implications by extending the ELM research stream and also provides managerial implications that can lead to a more effective exploitation of open innovation communities.


Electronic Commerce Research and Applications | 2014

Gift or threat? An examination of voice of the customer: The case of MyStarbucksIdea.com

Hanjun Lee; JinYoung Han; Yongmoo Suh


Journal of the Korean Data and Information Science Society | 2013

Enhancing the corporate image through social media: An approach based on multi-dimensional scaling

Suhyun Kim; Hanjun Lee; Yongmoo Suh; JinYoung Han


pacific asia conference on information systems | 2011

Organizational Informal Structure Influence On Project Success: Social Capital Approach.

JinYoung Han; Anat Hovav


Information Technology & People | 2018

Do employees in a “good” company comply better with information security policy? A corporate social responsibility perspective

Hyung Jin Kim; JinYoung Han


ACM SIGMIS Database: the DATABASE for Advances in Information Systems | 2018

Rethinking the Prevailing Security Paradigm: Can User Empowerment with Traceability Reduce the Rate of Security Policy Circumvention?

Soohyun Jeon; Anat Hovav; JinYoung Han; Steven Alter

Collaboration


Dive into the JinYoung Han's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Steven Alter

University of San Francisco

View shared research outputs
Researchain Logo
Decentralizing Knowledge