Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Myeonggil Choi is active.

Publication


Featured researches published by Myeonggil Choi.


International Journal of Entrepreneurial Behaviour & Research | 2017

Modeling complex entrepreneurial processes: A bibliometric method for designing agent-based simulation models

Jaehu Shim; Martin J. Bliemel; Myeonggil Choi

Purpose – The purpose of this paper is to suggest a bibliometric method for designing agent-based models (ABMs) in entrepreneurship research. The application of this method is illustrated with an exemplary agent-based modeling and simulation (ABMS) regarding the early venture growth process. This bibliometric approach invigorates the utilization of ABMS as a viable research methodology in process-oriented entrepreneurship research. Design/methodology/approach – In the bibliometric method, a domain corpus composed of scholarly articles is established and systematically analyzed through co-word analysis to discern essential concepts (i.e. agents, objects, and contexts) and their interrelations. The usefulness of the bibliometric method is elucidated by constructing an illustrative ABMS. Findings – The bibliometric method for designing ABMs identifies essential concepts in the entrepreneurship literature and provides contexts in which the concepts are interrelated. The illustrative ABMS based on these concepts and interrelations accurately and consistently reproduces the emergence of power-law distributions in venture outcomes consistent with empirical evidence, implying further merit to bibliometric procedures. Practical implications – The proposed method can be used not only to build simple models with essential concepts, but also to build more complex models that take a large number of concepts and their interrelations into consideration. Originality/value – This study proposes a bibliometric method for designing ABMs. The proposed method extends similar procedures that are limited to thematic or cluster analysis by examining the semantic contexts in which the concepts co-occur. This research suggests that ABMS from bibliographic sources can be built and validated with empirical evidence. Several considerations are provided for the combined utilization of the bibliometric method and ABMS in entrepreneurship.


Government Information Quarterly | 2017

Effects of innovation-supportive culture and organizational citizenship behavior on e-government information system security stemming from mimetic isomorphism

Kumju Hwang; Myeonggil Choi

Abstract Using institutional theory as a theoretical framework, this study illuminates organizational changes stemming from institutional pressures to investigate innovation in e-government information system security (ISS). From the perspective of mimetic isomorphism, the study examines ISS innovation by the South Korean government to elucidate organizational factors affecting organizational changes. This study attempted to investigate the interrelation of institutional influences and internal organizational factors in the course of ISS innovation. A research model was developed to elucidate the effects of mimetic isomorphism on innovation-supportive culture, legitimacy, and organizational citizenship behavior (OCB); furthermore, the relationships among innovation-supportive culture, legitimacy, and OCB, as well as how they influence organizational ISS effectiveness, were examined. A survey was administered to 489 civil servants working for the South Korean national government; valid data were analyzed using the partial least squares method. The results showed that mimetic isomorphism positively affected both innovation-supportive culture and legitimacy in ISS innovation. However, mimetic isomorphism influenced only individual OCB, not organizational OCB. Consistent with our hypotheses, innovation-supportive culture, legitimacy, and OCB positively influenced ISS effectiveness, whereas organizational cynicism negatively influenced ISS effectiveness. These findings provide interesting insights into how ISS innovation for e-government can be viewed within institutional theory and organizational behavior. As this studys results show the appropriateness of ISS innovation-supportive culture for ISS effectiveness in the government, the government should diagnose cultural manifestations or cultural artifacts to help ISS practitioners formulate, implement, and manage ISS strategies.


software engineering, artificial intelligence, networking and parallel/distributed computing | 2008

Managing Quality Level for Developing Information Security System Adopting QFD

Pauline Kongsuwan; Sangmun Shin; Myeonggil Choi

An increase in internet threats forces organizations to integrate information security system into their fundamental systems. Developers who work in this area should focus on both functionality and quality aspects because a malfunctioned system can endanger organizationpsilas most critical information. Although several approaches to solve a resource distribution problem have been proposed, little attention has been given to the problem which is a combination of resource distribution, tradeoff and multi-criteria optimization. This paper proposes a systematic approach for project leaders to efficiently distribute their limited resource to gain an optimum quality software product by using QFD (Quality Function Deployment) to prioritize quality factors and DF (Desirability Function) to optimize the product quality.


International Journal of Information Management | 2018

The impact of relational leadership and social alignment on information security system effectiveness in Korean governmental organizations

Yun Ji Moon; Myeonggil Choi; Deborah J. Armstrong

Empirical data collected from 102 government organizations in the Republic of Korea.Chief Security Officer (CSO) relational leadership positively influenced social alignment between the CSO and business executives.Social alignment between CSO and business executives positively influenced integrated knowledge.Integrated knowledge positively influenced ISS effectiveness, which, in turn positively influenced organizational performance.Contrary to expectations, the technical knowledge of the CSO negatively moderated the integrated knowledge ISS effectiveness relationship. While information technology has increasingly created various innovation opportunities in organizations, these opportunities have caused serious risks associated with information. Due to these potential risks, information security has become a major concern in organizations, and the role of the chief security officer has begun to attract research attention. Using a social capital theory perspective, this study aims to explore how the level of relational leadership of the chief security officer drives the social alignment between business and IT executives. Specifically, we study how social alignment influences integrated knowledge, information security system (ISS) effectiveness, and organizational performance. Empirical data from one hundred and two government organizations in the Republic of Korea confirms the impact of relational leadership, social alignment, and ISS effectiveness on organizational performance.


soft computing | 2018

Social control through deterrence on the compliance with information security policy

Myeonggil Choi; Jeongseok Song

Information system security (ISS) has become an extremely significant issue in organizations to protect information as an organizational asset. The purpose of this study is to investigate what factors affect individuals’ perception of sanction threats. This study uses social control theory to understand the effects of deterrence on public corporation employees’ ISS compliance and elucidate employees’ motivations of ISS violation and different perceptions of sanction threats. The effects and their significance in the model were tested. The results of this study help information security institutions to consider deterrence and self-punishment and to manage compliance with information security policy effectively and securely.


information security and cryptology | 2014

A Study on the Methodology in Classifying the Importance of Information System

Myeonggil Choi; Kang-Rae Cho

ABSTRACT The importance of information security is increasing in the public and private organizations. The interruption of the information system might cause massive disorder. To protect inf ormation systems effectively, information systems would be categorized and managed in terms of degree of importance. In th is study, we suggest a new evaluation method that categorizes information systems based on the three nature of security, confidentiality, integrity and availability. For validation of the method, we use a case study in a public sector. Through the validation of method, the availability of applying the method for categorization information systems to other domains could be suggested. Keywords: Classification of Information System, The Degree of Importance in Information System, Information Security Management I.서 론 * 2009년 7ㆍ7 대규모 DDoS 공격, 2011년 은행 전산망 마비, 재난 및 재해 발생 시 대규모의 국가 ㆍ공공기관의 정보시스템의 운용이 중단되어 국가적 혼란이 발생 가능성이 잠재되어 있다. 대규모의 혼란이 접수일(2014년 11월 5일), 게재확정일(2014년 11월 17일)* 이 논문은 2012년도 중앙대학교 연구장학기금 지원에 의한 것임†주저자, [email protected]‡교신저자, [email protected](Corresponding author)


information security and cryptology | 2013

A Study on Security Evaluation Methodology for Industrial Control Systems

Myeonggil Choi

ABSTRACT Industrial Control systems which are operated in the industrial infrastructure adopts the various functions and face various threats in these days. To assure the security of the industrial control systems, the security evaluation methodology should be necessarily developed. This study suggests the processes and me thodology for evaluating control systems, verifies the effectiveness of processes and methodologies through developmen t of security checklists. The results of the study will be utilized for operators, evaluators and obtainers of industrial controls and be basis for developing and assuring the industria l controls systems. Keywords: Security Assurance, Security Evaluation, Evaluation Methodolo gy, Security Checklists, Industrial Control Systems I.서 론 주요기반시설을 관리하는 제어시스템(industrial control systems)이 폐쇄 네트워크(closed net-work)에서 인터넷 기반 네트워크(Internet-based network)로 변화되면서 다양한 보안 위협 및 취약성이 증가되고 있다. 국가주요기반시설을 제어하는 제어 접수일(2013년 2월 18일), 수정일(2013년 4월 9일), 게재확정일(2013년 4월 9일)†주저자, [email protected]‡교신저자, [email protected]


Sustainability | 2016

Leadership of Information Security Manager on the Effectiveness of Information Systems Security for Secure Sustainable Computing

Myeonggil Choi


The e-Business Studies | 2011

A Study on Factors Affecting the Level of Information Security Governance in Korea Government Institutions and Agencies

Jeongseok Song; Minjun Jeon; Myeonggil Choi


Sustainability | 2015

Information Security Management as a Bridge in Cloud Systems from Private to Public Organizations

Myeonggil Choi; Changhan Lee

Collaboration


Dive into the Myeonggil Choi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jaehu Shim

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Martin J. Bliemel

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yun Ji Moon

Catholic University of Pusan

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge