1 |
Kim, T. H., Y.-r. Kang, "Mobile Payment Trends and Discussion of Implication for Service Activation," Korea Association for Telecommunication Polices, Vol.22, No.18, (2010), 1-36.
|
2 |
Kim, D. K., J. S. Park, and S. G. Lee, "Analysis on the Reception Intention of Mobile Payment Service Based on User's Type:Focused on Card-based Solution and Card less-based Solution," Proceedings of the The Korea Society of Management Information Systems, (2003), 553-559.
|
3 |
Kim, T. H., Threat of Mobile Payment Security in Chaina, Boannews, 2014.05.01. Available at http://www.boannews.com/media/view.asp?idx=40843&kind=0
|
4 |
Kim, H., J. H. Huh, and Anderson R. "On the Security of Internet Banking in South Korea," Dept. of Com-puter Science, Oxford Univ., 2010.
|
5 |
Krueger, M., "The Future of M-payment: Business Options and Policy Issues," Electronic Payment Systems Observatory (ePSO), Background Paper No.2, (2001)
|
6 |
Lee, K. J., M. H. Choi, and S. H. Kwon, "Current Status and Future of Mobile Payment Business Models," Korea Payment & Settlement Association, Vol.5, No.2, (2011), 63-83.
|
7 |
Lee, S. H., H. Kim, and D. H. Lee, "Two-Factor Authentication Scheme based on Mobile Messenger with Improved Usability," Journal of Security Engineering, Vol.10, No.5, (2013), 549-566.
DOI
|
8 |
Min, C. H., and W. S. Ko, "The Empirical Research on Mobile Payment Commonplace Characteristics from the Recognition of Mobile Security Services," Korea Academic Society of e-Business, Vol.6, No.2, (2005), 43-53.
|
9 |
Park, A.-r., and K. J. Lee, "Case study on Critical Success factor of noble payment service," Proceedings of the The Korea Society of Management Information Systems, (2013), 591-605.
|
10 |
Seung, J. M., Y. T. Kim, Y. H. Jin, T. H. Kim, and J. H. Sa, "Investigation Report on Overseas Internet Banking Security Condition," Financial Security Association (FSA) Investigation Report, 2010.
|
11 |
Dahlberg, T., N. Mallat, J. Ondrus and A. Zmijewska, "Past, present and future of mobile payments research: A literature review," Electronic Commerce Research and Applications, Vol.7, No.2, (2008), 165-181.
DOI
ScienceOn
|
12 |
Cearly, D., Top 10 Strategic Technology Trends for 2014, Gartner, 2013. Available at http://www.gartner.com/technology/research/top-10-technology-trends/?fnl=search&srcId=1-3478922254
|
13 |
Choi, P. J., S. S. Park, and D. G. Kim, "Mobile Payment & Biometrics Convergence Technology Trends," Korea Institute of Information Security & Cryptology, Vol.22, No.4, (2012), 21-28.
|
14 |
Dahlberg, T. and N. Mallat, "Mobile payment service development-managerial implications of consumer value perceptions," Proceeding of 10th European conference on Information Systems, (2002), 649-657.
|
15 |
Finnin, H., "Second Major security flaw found in Google Wallet....Rooted or not No One is safe," The Smartphone Champ, (2012.02.09.) Available at http://thesmartphonechamp.com/second-majorsecurity-flaw-found-in-google-wallet-rooted-or-not-no-one-is-safe-video/
|
16 |
Insight Report: Investors in Cards and Payments, Timetric, 2014. Available at http://marketreportsstore.com/insight-report-investors-in-cards-and-payments/
|
17 |
Janessa, R., Gartner Says Worldwide Mobile Payment Transaction Value to Surpass $235 Billion in 2013, Gartner, 2013.06.04. Available at: http://www.gartner.com/newsroom/id/2504915
|
18 |
Jang, S. H., J. H. Lee, G. Y. Seung, and J. M. Oh, M-Payment: All about Mobile Payments, Cloud Nine, 2014
|
19 |
Jo, H. K., Security Threats around the Mobile Card, AsiaToday, 2014.05.12. Available at http://www.asiatoday.co.kr/view.php?key=20140512010003357
|
20 |
Joo, J. H., "An Analysis of Success Factors Important to Electronic Payment Systems Considering the Electronic Commerce Environment over the Internet in Korea," Asia Pacific Journal of Information Systems, Vol.9, No.1, (1999), 77-98.
과학기술학회마을
|
21 |
Kang, H. C., "Financial 마이크로SD-based Mobile Payment Service," The Institute of Electronics and Information Engineers, Vol.40, No.8, (2013), 55-63.
|
22 |
Kang, W. J., "Latest Authentication Technology Trends and Prospects," Financial Security Association (FSA) Investigation Report, 2011.
|
23 |
Armbrust, M., A. Fox, R. Griffith, A. D. Joseph, R. Katz, A Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, M. Zaharia, "A view of cloud computing," Communications of The ACM, Vol.53, No.4, (2010).
|
24 |
Bae, D. H., and C. J. Kim, "A Secure SMS Self-Authentication Method in Mobile Networks," Internet and Information Security, Vol.1, No.2, (2010), 24-41.
|