Jongheon Kim

Learn More
a School of Business, Yeungnam University, South Korea, 241-1, Dae-dong, Gyeongsan-si, Gyeongsangbuk-do 712-749, South Korea Department of Information and Process Management, Bentley University, Adamian Academic Center 242, Waltham, MA 02452, USA Department of Information Technology, Seidenberg School of Computer Science and Information Systems, Pace(More)
The City of Philadelphia adopted an ambitious broadband internet plan to provide the city with comprehensive wireless coverage. The decision to adopt this project involved a tradeoff between the benefit of high-speed service to all residents and cost of the project. The project represents breaking a relatively new ground, with few experiences of other(More)
Previous research suggests that computer security countermeasures would be effective in preventing computer abuse in organizations. However, computer abuse problems still persist despite these efforts. This study proposes a new model of computer abuse that explains a causal link between abusive behavior and a psychological state toward this behavior, drawn(More)
User Generated Content (UGC) is a rapidly emerging growth engine of many Internet businesses and an important component of the new knowledge society. However, little research has been done on the mechanisms inherent to UGC. This research explores the relationships among the quality, value, and benefits of UGC. The main objective is to identify and evaluate(More)
As the importance of unconventional resource grows, the demand for the directional drilling technology is increasing. One of the key technologies of the directional drilling is a rotary steerable system (RSS). Among several types of RSS developed so far, `point-the-bit' and `push-the-bit' are the most commonly used ones. In this paper, a new rotary(More)
This paper proposes a novel vision-based jellyfish detection algorithm in underwater environment. Since jellyfish, especially Aurelia aurita, is translucent and amorphous when projected to the 2-dimensional image, its boundary is indistinct and detecting jellyfish is very challenging. To detect moving jellyfish, two types of features that present the(More)
Wireless broadband service has grown rapidly, with many local governments considering alternatives for providing such a service to their communities in order to make them more attractive to new businesses and tourists. The alternatives range from an unrestricted free market (with mixed service quality and coverage) to cityor community-sponsored service,(More)
This study examines affecting factors on a successful implementation of the ubiquitous supply chain management system (USCMS) perceived by industry managers from UK companies. Upon the thorough review of existing literature on both ubiquitous computing and supply management systems, the current study classified two construct groups for those success factors(More)
Mobile cloud computing represents the most explicit attempt yet to move computing technology beyond the confines of tool usage towards a pervasive penetration. The increasing role and importance of mobile technology and cloud computing in our daily lives implies the need for new approach. The mobile users' motivation and cloud computing characteristics make(More)