Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seong-Taek Park is active.

Publication


Featured researches published by Seong-Taek Park.


Wireless Personal Communications | 2016

A Case Study on Effective Technique of Distributed Data Storage for Big Data Processing in the Wireless Internet Environment

Seong-Taek Park; Yeong-Real Kim; Seon-Phil Jeong; Chang-Ick Hong; Tae-Gu Kang

Technology industry is experiencing its dramatic changes in the amount of data that requires management and the place that such an asset are stored. Despite the exponential growth of information, business leaders are expecting agility in order to complete a lot of works much faster and less expensively using data. With the generalized spread of smart devices under this rapidly changing digital environment and subsequent spread of wireless Internet users and communication expenditure, the amount of data via wireless Internet worldwide is increasing rapidly at a faster rate every year. However, the communication environment cannot catch up with the demands of consumers for the super high-speed wireless Internet. Accordingly, this paper aims to look at the establishment of the cloud storage-based file system that can provide services to meet the needs of users in the cloud computing environment via wireless Internet and the examples of the establishment of such a system.


Cluster Computing | 2016

Factors affecting the continuous use of cloud service: focused on security risks

Seong-Taek Park; Eun-Mi Park; Joung-Hae Seo; Guozhong Li

Despite its many technology maturity and significant advantages, the cloud services are still far from success in the market. In accordance with some research, security risks have been regarded as the main factors that impede activating cloud service. Accordingly, this study divides the factors of security risk into Information leakage risk, Fault recovery risk, Compliance risk, Service interruption risk and made an empirical analysis of the impact of these four factors on continuous adoption intention. The effects of security risk and adoption intention of cloud service were analyzed via the moderation effects of trust. The analytical results of China data show that bo th Information Leakage Risk and Compliance Risk have negative impact on continuous adoption intention of cloud service. Neither Fault Recovery Risk nor Service Interruption Risk is significantly related with continuous adoption intention of cloud service. The analytical results of Korea data show that Fault Recovery Risk, Compliance Risk and Service Interruption Risk significantly impact continuous adoption intention of cloud service, whereas Information Leakage Risk insignificantly impact continuous adoption intention of the cloud service.


Wireless Personal Communications | 2016

A Study on Factors Affecting the Adoption of LTE Mobile Communication Service: The Case of South Korea

Seong-Taek Park; Hyuk Im; Kyoo-Sung Noh

AbstractSmartphones have a big advantage making infinite expandability possible by downloading new applications consistently through application store. These new devices provide us with multimedia features such as high quality voice calls, listening to music, and internet searching while previously cell phone just executed functions of voice calls, SMS, and PDA. So, recently people’s interest in mobile communication service is on the increase. When 3G service reached the boundary of its capacity due to increase of continuous data volume, LTE and LTE-A was commercialized and is being used. The goal of this study is to find factors affecting the intention to adopt LTE service through a survey conducted in South Korea. The present study focused on the functional dimension including cost, speed, and security, the social dimension including social influence, and the personal dimension including personal innovativeness and self-efficacy to find out their effects on intention to accept LTE service. As a result, our study showed the cost and speed of LTE service were not significant variables. Also, there were no differences between the effects of perceived usefulness, perceived ease of use, and perceived enjoyment on intention to use LTE service.


Peer-to-peer Networking and Applications | 2016

Effects of social media usage on country image and purchase intention from social P2P network perspective

Guozhong Li; Eun-Mi Park; Seong-Taek Park

Country image has been regarded as the source of competitiveness of a country in the age of globalization. The purpose of this study is to examine what impact does the utilization of social media has on country image, and the relationship between social media usage and the images of a country’s economy, politics, nationality, culture and the country itself; and to examine the impacts of country image on products image and purchase intention. We conducted our analysis in two aspects of social media utilization-usage volume and usage diversity. The comparison of the Korean and Chinese social media users would enrich the insight into the relationship between the various variables developed from a different perspective. In addition, we try to reveal the relationships from a social p2p network perspective that would also provide new insights into the effects between these variables. The results show that, unlike Koreans, Chinese users are significantly related with the social media usage levels. This could be due to various differences that exist between these two countries, such as the state systems, country size, economic development status, culture, etc.


The Journal of Digital Policy and Management | 2013

Appropriability Mechanism Strategy for Domestic IT Manufacturing Companies

Seung-Jun Lee; Seong-Taek Park; Young-Ki Kim

Abstract Securing the appropriability strategy of R&D funding for technology innovation is very important because R&D needs a lot of time and money. Appropriability means the environmental factors that govern an innovators ability to capture profits generated by an innovation. Generally appropriability mechanism has five kinds, including patent, secrecy, lead time advantage, complementary sales & service, complementary manufacturing. In this paper, we surveyed domestic software industry professionals about appropriability mechanism strategy, and presented a result of priority of each factor and difference between previous research and this study, using the pair-wise comparison method. The result of study showed that domestic IT manufacturing companies prefer patent better than other appropriability mechanism. Key Words : Appropriability, Appropriabiltiy Mechanism, IT, R&D, Technology Innovation * 본 논문은 2012년도 충북대학교 학술연구지원사업의 연구비지원에 의하여 연구되었음Received 16 September 2013, Revised 10 October 2013Accepted 20 November 2013Corresponding Author: Young-Ki Kim(Chungbuk National University) Email: [email protected]Ⓒ The Society of Digital Policy & Management. All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.otg/licenses/by-nc/3.0), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is ISSN: 1738-1916 properly cited.


Journal of Computer Virology and Hacking Techniques | 2017

A study on the service and trend of Fintech security based on text-mining: focused on the data of Korean online news

Guozhong Li; Jian Sheng Dai; Eun-Mi Park; Seong-Taek Park

The purpose of this research is to draw the direction and tasks for Korean Fintech industry taking into considerations of the importance of successful operation of Fintech and security. News data from Naver the most famous Korean portal site have been collected and analyzed and 20 most frequently used keyword were ranked both in 2015 and 2016. Payment, platform, banking, etc of Fintech service has become keywords since Fintech started its service in earnest in 2015, and security, enterprise, support, finance etc. are the keywords in 2016. The results show the difference in terms of importance. The results of this research also provide guidelines of security principles for enterprises who provide Fintech services.


Cluster Computing | 2016

Establishing the importance weight of appropriability mechanism by using AHP: the case of the China's electronic industry

Young-Ki Kim; Tae-Ung Kim; Seong-Taek Park; Jaerim Jung

Companies innovate to survive tough competition in a rapidly changing environment. Since companies have to invest much money and time in R&D for innovation, strategies to secure the appropriability of R&D spending may override all other concerns. Appropriability refers to the extent to which the return on innovation investment is exclusively protected and secured. Appropriability mechanisms are reported to typically comprise patent and trade secret. Corporate strategies for appropriability mechanisms to secure the return on innovation investment are highly important because companies might win or lose the competition depending on their selection of appropriability mechanisms. As Chinese ICT companies invest aggressively in R&D to enter the global market, it becomes a challenging issue for them to secure appropriability. This study aims to find which appropriability mechanisms Chinese ICT experts think are more important for their ICT industry. The Delphi method was employed to categorize appropriability mechanisms into three groups, namely, patent-related group, secrecy-related group, and complementary operation-related group. And the relative importance of the mechanisms in each group were figured out using the AHP method.


Cluster Computing | 2018

Factors enhancing mobile social networking friendship maintenance: a study of alumni community on Wechat

Guozhong Li; Jaerim Jung; Seong-Taek Park

This study aims to shed light on the influence of the factors (social presence, nostalgia, gratification opportunities and sense of virtual community) on users’ gratification of social connection needs and friendship maintenance under the context of group chatting community via mobile instant messaging application Wechat. Questionnaire survey was conducted with data collected from internet and then statistical analysis with SmartPLS was conducted to test the research model developed. The results showed that all of the factors (nostalgia, gratification opportunities and sense of virtual community) except social presence have positive effects on gratification of social connection needs and friendship maintenance. Therefore, it is important for social science researchers and businesses to have deep understandings of the Wechat users’ psychological and behavioral features in mobile internet era and this research will provide valuable experimental evidences for understanding the economy in mobile internet and contribute to the related scientific research.


Research Journal of Pharmacy and Technology | 2017

A Study on effects of Exploration and Exploitation on Patent Activities and Innovation

Soo-Myung Choi; Seong-Taek Park; Young-Ki Kim

Background/Objectives: This study identified the relationship between exploration and exploitation activities and patent activities and the relationship between such activities and innovation performance so as to present some reference data conducive to viable patent strategies. Methods/Statistical analysis: The present study used the PLS (Partial Least Square) method. The sample consisted of current or former R&D staff at small-and-medium-sized manufacturers in Korea. Hence, the constructs and question items used in the research model met the requirements for internal consistency, convergent validity and discriminant validity, and proved fit for the structural model analysis. Current or former R&D staff at Korean companies participated in the online questionnaire survey from August 20 to September 20, 2016. Excluding incomplete response sheets, a total of 142 copies were analyzed. Prior to the survey, the author conducted a preliminary survey from August 1, 2016. Findings: As a result of this study, first, this study divided R&D activities into explorative and exploitative activities and analyzed their causal effects on patent activities, i.e. patent management, patent development support and patent rights enforcement activities. Second, the present study reflected the trends in R&D, innovation and patents, presented three types of patent activities, i.e. patent management, patent development support and patent rights enforcement activities, and operationalized relevant constructs. Third, this study empirically analyzed the sub-classified patent activities using the data collected from R&D staff working at Korean companies. Improvements/Applications: This study focused on measuring the patent activities, i.e. patent management, patent development support and patent rights enforcement activities, from the perspective of corporate R&D staff.


Cluster Computing | 2017

An empirical study on the influential factors affecting continuous usage of mobile cloud service

Seong-Taek Park; Myeong-Ryoon Oh

Diffusion of smart devices, explosive growth of SNSs, increased speed of mobile network, alongside with the rapid development of ICT, all allow provision and use of many services on smart (mobile) devices, which have been provided in the wired network environment. Particularly, the use of a cloud service that allows users to access it in any place and at any time has increased on mobile devices, as well as on PCs. However, as compared to wired services, wireless services are likely to be exposed to the risk of security breach. This may inhibit the penetration of technologies. The purpose of the present study is to identify the factors that affect the intention of a continuous use (continuous intention) of mobile cloud services. For that purpose, the present study analyzes the effects of security breach risk on trust and the intention of a continuous use. The results of our analysis indicate the risks relevant to service authentication. Specifically, fault recovery and compliance exerted significant effects on trust and the continuous use intention. However, we also found that the service interruption risk and the personal information leakage risk have a significant influence on trust only. On the other hand, our findings demonstrate that trust also significantly affects the intention of a continuous use. Therefore, when a strategic decision making is considered a requisite to induce a continuous use, it is advisable to opt for and control the technologies relevant to service authentication, fault recovery, and compliance risks instead of those related to the disruption of services or leakage of personal information. Therefore, it appears to be imperative to adopt an integrated management and support process for developing a service equipped with security information technologies facilitating the continuity of businesses.

Collaboration


Dive into the Seong-Taek Park's collaboration.

Top Co-Authors

Avatar

Young-Ki Kim

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar

Guozhong Li

Kunming University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Tae-Ung Kim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Eun-Mi Park

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Seung-Jun Lee

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar

Soo-Myung Choi

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar

Mi-Hyun Ko

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar

Hyuk Im

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar

Jaerim Jung

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar

Joung-Hae Seo

Kyungpook National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge