The Journal of Supercomputing

, Volume 71, Issue 6, pp 2020–2034 | Cite as

ICT use level and performance evaluation on the social network environment: Korea case study

Article

Abstract

As social network services have been integrated with organizations’ business, it is trying to apply them to a variety of organizations’ tasks from normal enterprise processes such as tourism, fashion and distribution to public institutions’ processes. Organizations need to build an environment not resistant to new environments by enhancing applications of the existing built ICT technologies for focusing on various utilizations of SNS and integrating with the existing enterprise systems within the organizations to use them. Accordingly, there is a need to develop the ICT use index and the ICT use development level for objectively diagnosing enterprises’ ICT use state to integrate with SNS services. However, the studies so far have focused on only understanding enterprises’ introduction effects of ICT technologies or fragmentary status of ICT use and external use of SNS. In addition, there are insufficient studies on the business processes that could show results of applying ICT technologies which are bases to be integrated with SNS. Therefore, this study would like to analyze characteristics and performance by organizations’ ICT use levels so that SNS services could be applied in earnest from various perspectives based on the organizations’ characteristics.

Keywords

ICT use levels ICT use performance evaluation  Social network environment 

References

  1. 1.
    Akuegwu B, Ntukidem E, Ntukidem P, Jaja G (2011) Information and communications technology (ICT) facilities utilization for quality instructional service delivery among university lecturers in Nigeria. Rev High Educ Africa 3(1):33–53Google Scholar
  2. 2.
    Al-Mutairi MS, Mohammed LA (2011) Cases on ICT utilization, practice and solutions:tools for managing day-to-day issues. IGI GlobalGoogle Scholar
  3. 3.
    Bonchi F, Castillo C, Gionis A, Jaimes A (2011) Social network analysis and mining for business applications. ACM Trans Intell Syst Technol 2(3):22CrossRefGoogle Scholar
  4. 4.
    Deise MV, Wright A, Nowikow C (2000) Executive’s guide to e-business: from tactics to strategy. Wiley, New YorkGoogle Scholar
  5. 5.
    Dijst M (2009) ICT and social networks: towards a situational perspective on the interaction between corporeal and connected presence. The expanding sphere of travel behaviour research, pp 45–75Google Scholar
  6. 6.
    Isari D, Pontiggia A, Virili F (2011) Working together in organizations using social network sites: a laboratory experiment on microblog use for problem-solving. Soc Sci Res Netw 1875924:1–26Google Scholar
  7. 7.
    Kawsar F, Nakajima T, Park JH, Yeo SS (2010) Design and implementation of a framework for building distributed smart object systems. J Supercomput 54(1):4–28CrossRefGoogle Scholar
  8. 8.
    Kim SC, Jeong YS, Park SO (2013) RFID-based indoor location tracking to ensure the safety of the elderly in smart home environments. Pers Ubiquitous Comput 17(8):1699–1707CrossRefGoogle Scholar
  9. 9.
    Kwon O, Wen Y (2010) An empirical study of the factors affecting social network service use. Comput Hum Behav 26(2):254–263CrossRefGoogle Scholar
  10. 10.
    Lau KH, Huang H (2013) Adoption and utilization of ICT in the Chinese third-party logistics industry. Manag Sci Logist Oper Res 13:221–241Google Scholar
  11. 11.
    Mohsen K, Eng T (2013) Enhancing inter functional coordination and marketing performance: utilization of the motivation/ability/opportunity framework. EBS Working PapersGoogle Scholar
  12. 12.
    Rayport JF, Sviokla JJ (1995) Exploiting the virtual value chain. Harv Bus Rev 73(6):75–85Google Scholar
  13. 13.
    Scupola A, Tuunainen V (2011) Open innovation and role of ICT in business-to-business services: empirical evidence from facility management servicesGoogle Scholar
  14. 14.
    Tomic Rotim S, Dobsa J, Krakar Z (2013) Using decision trees for identification of most relevant indicators for effective ICT utilization. Cybern Inf Technol 13(1):83–94Google Scholar
  15. 15.
    Venkatraman N (1994) IT-enabled business transformation: from automation to business scope redefinition. Sloan Manag Rev 35:73–73Google Scholar
  16. 16.
    Yamamoto S, Kanbe M (2008) Knowledge creation by enterprise SNS. Int J Knowl Cult Change Manag 8(1):255–264Google Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Department of Information and Communications EngineeringKorea Advanced Institute of Science and TechnologyDaejeonKorea
  2. 2.National IT Industry Promotion AgencyDaejeonKorea
  3. 3.Department of Industrial Security, College of Business and EconomicsChung-Ang UniversitySeoulKorea

Personalised recommendations