Shuchih Ernest Chang
National Chung Hsing University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Shuchih Ernest Chang.
Industrial Management and Data Systems | 2007
Shuchih Ernest Chang; Chin-Shien Lin
Purpose – This paper aims to examine the influence of organization culture on the effectiveness of implementing information security management (ISM).Design/methodology/approach – Based on a literature review, a model of the relationship between organizational culture and ISM was formulated, and both organizational culture characteristics and ISM effectiveness were measured empirically to investigate how various organizational culture traits influenced ISM principles, by administrating questionnaires to respondents in organizations with significant use of information systems.Findings – Four regression models were derived to quantify the impacts of organizational culture traits on the effectiveness of implementing ISM. Whilst the control‐oriented organizational culture traits, effectiveness and consistency, have strong effect on the ISM principles of confidentiality, integrity, availability and accountability, the flexibility‐oriented organizational culture traits, cooperativeness and innovativeness, are n...
Industrial Management and Data Systems | 2006
Shuchih Ernest Chang; Chien-Ta Bruce Ho
Purpose – This paper aims to examine the influence of organization factors on the effectiveness of implementing BS7799, an information security management (ISM) standard.Design/methodology/approach – Based on literature review, a research model was formulated by extracting the antecedents of ISM, and an empirical study was conducted to show how the organizational factors influence organizations in carrying out BS7799.Findings – The study result revealed that there were significant impacts of organizational factors, including IT competence of business managers, environment uncertainty, industry type, and organization size, on the effectiveness of implementing ISM.Research limitations/implications – The sample is limited to the organizational factors in Taiwan. It is suggested to replicate this study in other countries to reconfirm the result before adopting its general implications. Owing to the highly intrusive nature of ISM surveys, a cautious approach with rapport and trust is a key success factor in co...
Behaviour & Information Technology | 2009
Shuchih Ernest Chang; Shiou-Yu Chen; Yen-Hong Liu
Although most users currently receive web services from web browser interfaces, pervasive computing is emerging and offering new ways of accessing Internet applications from any device, any time and anywhere. It is not only a technological change, but a philosophical and psychological one. Our research project investigated the theoretical concepts of pervasive computing as well as their practical applications, by using cellular phones as the pervasive device to access a web application prototype, the voice-enabled web system (VWS), through the voice user interface technology. The acceptance rate of consumers on new pervasive interfaces was studied using factors (including perceived usefulness, perceived ease of use, attitude, subjective norms, perceived behavioural control and fun) adapted from technology acceptance theories. Although our empirical findings were in general consistent with the findings from several prior studies on various information technologies, there were still some discrepancies. Our overall research results, including the implications derived from the user study, may be useful for the purpose of designing and developing successful business applications based on VWS.
Multimedia Tools and Applications | 2015
Yu-Teng Jang; Shuchih Ernest Chang; Po-An Chen
This study aims to explore how social networking sites (SNS) can be used to influence consumer behavior in the context of multi-channel retailing. A research framework with ten hypotheses was proposed to study important relationships between various consumer behaviors related to trust on physical stores, access to SNS fan pages, physical-store purchase, online information search, and online purchase. An empirical test was conducted by using PLS, a second-generation multivariate analysis tool, to analyze survey data collected from 205 SNS users. Our findings revealed that consumers’ intention to online information search would significantly influence their intention to online purchase. Trust on physical stores would affect consumers’ attitudes toward not only purchasing at physical-store but also joining retailers’ SNS fan pages. In addition, attitude toward joining SNS fan pages was found to affect consumers’ intention to online information search and physical-store purchasing. Moreover, consumers’ physical-store purchasing would also affect their intention to related online information search. Based on the validated research model and corresponding findings, retail managers are suggested to use SNS fan pages to enhance consumers’ purchase at physical stores and information search on their online stores, thus increasing overall sales. Retail managers should build and maintain consumer trust on their stores, since such trust significantly affects consumers’ attitude to access SNS fan pages.
Industrial Management and Data Systems | 2015
Shuchih Ernest Chang; Anne Yenching Liu; Sungmin Lin
Purpose – The purpose of this paper is to evaluate privacy boundaries and explores employees’ reactions in employee monitoring. Design/methodology/approach – The research used the metaphor of boundary turbulence in the Communication Privacy Management (CPM) theory to demonstrate the psychological effect on employees. The model comprised organizational culture, CPM, trust, and employee performance in employee monitoring to further investigated the influence exerted by organizational culture and how employees viewed their trust within the organization when implementing employee monitoring. Variables were measured empirically by administrating questionnaires to full-time employees in organizations that currently practice employee monitoring. Findings – The findings showed that a control-oriented organizational culture raised communication privacy turbulence in CPM. The communication privacy turbulence in CPM mostly had negative effects on trust in employee monitoring policy, but not on trust in employee moni...
International Journal of Technology Management | 2011
Shuchih Ernest Chang; Shiou Yu Chen; Chun Yen Chen
This study surveyed 288 organisations to explore the relationship between information technology (IT) capabilities and information security management (ISM). A review of the literature helped to not only identify the important factors of IT capabilities and ISM implementation, but also formulate a research framework. Both IT capabilities and ISM implementation were subsequently empirically measured to study how IT practice influenced the organisational implementation of ISM principles. SPSS and LISREL were used to analyse the collected data and validate the proposed framework. Subsequently, the study’s hypotheses were examined via path analyses and the analytical results revealed that IT capabilities were significantly associated with the effectiveness of ISM. The validated model and the corresponding study results can provide a reference for enterprise managers and decision makers to develop favourable tactics for achieving their goal of ISM – mitigating information security risks.
International Journal of Mobile Communications | 2009
Shuchih Ernest Chang
Pervasive computing may provide multiple modes of interface for end users to access the internet applications at anytime from anywhere using any device. This article describes how multimodal user-interface pages for supporting various wireless devices can be implemented with multimodal transformation. It also illustrates how a Multimodal Web System (MWS) could be voice-enabled to support an interactive voice channel. This study provides insights for the design and implementation of successful business applications to catch the revolutionary opportunity and benefit of voice-enabled MWSs. In doing so, it contributes to the body of knowledge associated with the emergent pervasive computing environment.
international conference on ubiquitous and future networks | 2015
Shuchih Ernest Chang; Kuo-Ming Chiu; Yu-Ching Chiao
Cloud computing is becoming increasingly popular because it offers valuable benefits, such as on-demand services, resource pooling, rapid elasticity, measured service, etc. However, recent studies indicate that many enterprises still hesitate to adopt cloud services due to various security concerns and implementation obstacles. Particularly, there is little research devoted to exploring the influences on cloud migration execution. To bridge this gap, our study derived some comprehensive cloud migration execution influences by interview approach, based on the technology-organization-environment (TOE) theory. We posit that system configuration (the technological aspect, which consists of complexity and compatibility), organizational fit (the organizational aspect, which consists of member reflection and operation process), and external support (the environmental aspect, which affects the migration execution of cloud computing). The findings in this paper can help enterprises facilitate various cloud migration activities, achieve their goals of migrating applicable legacy applications to the cloud environment, and realize the benefits provided by the cloud computing paradigm.
ieee international conference on green computing and communications | 2013
Pin-Fan Lee; Shuchih Ernest Chang
With the rapid progress of sensing and tracking technology, more and more location-based services (LBS) and applications are nowadays available in the market. But while it is convenient to retrieve various kinds of information via LBS, it is not easy to build up LBS apps which support a large amount of users and information. Therefore, it is important for developers to utilize the free application programming interface (API) resources available on the Internet for harvesting the benefit of the cloud computing, particularly for individual developers who have limited resources. This research explores the benefits of building LBS service/application based on free APIs and service-oriented computing (SOC). Using a social check-in app as example, the design and implementation of a smartphone application using the proposed approach will be described in this article. Moreover, by comparing with some other smartphone applications which also provide check-in services, the advantages and potential value of our approach to integrating social network APIs and SOC concept will be discussed.
Multimedia Tools and Applications | 2017
Shuchih Ernest Chang; Wei-Cheng Shen; Chun-Hsiu Yeh
This study aims to explore user intention to recommend multimedia content on mobile social networks. To better understand user behavioral differences in content recommendations, this study utilizes user behavioral responses on social network services to determine heavy and light users. By analyzing data collected from 258 respondents, the findings reveal that the factors that influence intention to recommend vary among heavy and light users. First, trust, subjective norm, perceived ease of use, and perceived usefulness are considered as predictors for heavy users. Second, subjective norm, trust, perceived ease of use, and perceived usefulness are not influencing factors relative to recommendation intention for light users. Third, trust facilitates heavy users to share their content recommendations on mobile social networks. From theoretical perspectives, the results confirm that dynamic trust transfer could be integrated using the theory of planned behavior with a technology acceptance model. Considering practical implications, our findings regarding the prediction of heavy users provide business insights to content recommendation service. Our study highlights trust strategies related to migrating light users to heavy users. Overall, mobile social network providers must consider user technology perception enhancements and reduce trust concerns. Our findings contribute to theoretical applications and provide practical implications for social service providers in relation to social applications on mobile devices.