• Title/Summary/Keyword: 쇼핑 시스템

Search Result 672, Processing Time 0.032 seconds

A study on Administrative Countermeasures and Strategies between Off line Distributive Markets and Small Markets (오프라인 유통마트의 법·행정적 대응전략에 관한 연구)

  • Kim, Taek
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.69-80
    • /
    • 2015
  • The Purpose of this study is to establish efficient and balanced development and to make transparent marketing system, environment which is to protect small business, consumer's. This Goal of this study is that focus on development of regional and national economy. Especially, to protect small businessmen, to reserve consumer's buying choice. First of all, to examine causes of distribution maintenance and to will be analysed legal controversy of big distributive markets since local autonomy business limits. It is this study that concentrate on big distributive mart shutdown of business hours, Problems and Countermeasures. The main focus of in this study is as follows: First, to examine the ruling of the court that protest and accept of business hour in big distributive mart' problem and regulation, Second, to understand each of the judgement and problems of distributive shutdown systems, Third, to suggest the good distributive business trade act and the possible collaboration with focus on small and big mart System in Korea. This paper to analyze case of conflict and focus on establishment of transparent distribution since business limits.

XML-based Single Sign-On Scheme for Internet Protocol TV(IPTV)Services (IPTV 서비스 제공을 위한 XML 기반의 단일인증 구조)

  • Lee, Seung-Hun;Shin, Dong-Il;Shin, Dong-Kyoo
    • Journal of Broadcast Engineering
    • /
    • v.14 no.4
    • /
    • pp.463-474
    • /
    • 2009
  • By employing the subscriber concept in broadcasting services, IPTV (Internet Protocol Television) operators provide various grades of services to subscribers based on the billing level of the subscribers. With the income from subscribers for a basis, IPTV operators plan to provide high quality services. Since Web browser-based IPTV provides T-commerce and E-commerce services as well as television services, users may frequently visit other service domains to buy goods or content. To provide the user with charged or private services, these service domains request authentication of user. The existing authentication system is not appropriate for the IPTV service environment because the environment unavoidably forces the user to cross from one authentication-based service domain to another. Single sign-on provides a user with transparent authentication services by enabling an authenticated user to move between authentication-based service domains without any re-authentication. Like this distributed environment, since the IPTV service environment also provides a variety of authentication-based services, transparent authentication service needs to be provided to subscribers who want to access charged or private services. In this paper, we propose a new user authentication scheme for the IPTV environment. This scheme integrates the Security Assertion Markup Language (SAML), which is a standard for XML-based single sign on. We validate this scheme using a simple use case scenario.

A Study on the Promotion of Mobile Easy Payment Services in the Fintech Era (핀테크 모바일 간편결제 서비스 활성화 방안)

  • Cho, Eun-Young;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.22 no.4
    • /
    • pp.22-44
    • /
    • 2015
  • With the growing interest being reflected in the FinTech industry, much attention has been paid to mobile easy payment services as well. In the era of mobile commerce, the core advantage of using mobile easy payment services(simplifying complex payment procedures and thus facilitating user convenience and reducing the chance of giving up payment) are being more emphasized. Mobile easy payment service market not only includes mobile easy payment service providers but also users, non-users, affiliates, banks, and credit card companies as main stakeholders. Exploring those stakeholders is thus important to thoroughly understand such market. However, extant literature on mobile easy payment services mostly focuses on examining adoption intention of users or non-users. This study, an exploratory research based on interviews, thus aims to extract driving as well as inhibiting factors of mobile easy payment service use from six different perspectives (i.e., social platform, bank, credit card company, affiliate, user, and non-user) and analyze a sequence of cause and effect for each factor. For this, the causal loop diagram was developed to deduce key issues and propose an alternative. Theoretical and practical implications of this study will also be discussed.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

Application of GIS to Select Viewpoints for Landscape Analysis (경관분석 조망점 선정을 위한 GIS의 적용방안)

  • Kang, Tae-Hyun;Leem, Youn-Taik;Lee, Sang-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.2
    • /
    • pp.101-113
    • /
    • 2013
  • The concern on environmental quality makes the landscape analysis more important than before ever. For the landscape analysis, selection of viewpoint is one of most important stage. Because of its subjectiveness, the conventional viewpoint selection method often missed some viewpoints of importance. The purpose of this study is to develop a viewpoint selection method for landscape analysis using GIS data and techniques. During the viewpoint selection process, spatial and attribute data from several GIS systems were hired. Query and overlay methods were mainly adapted for analysis to find out meaningful viewpoints. The 3D simulation analysis on DEM(Digital Elevation Model) was used for every selected viewpoint to examine wether the view target is screened out or not. Application study at a sample site showed some omissions of good viewpoints without any screening. It also exhibited the possibility to reduce time and cost for the viewpoint selection process of landscape analysis. For the progress of applicability, GIS data analysis process have to be improved and more modules such as automatic screening analysis system on selected viewpoint have to be developed.

A Study on the Current Situation and Problems of Agricultural Products e-Commerce in Korea (B2B 농산물 전자상거래 활성화 방안과 과제에 관한 연구)

  • Kim, Kyu-Hyong;Lee, Moon-Seok
    • International Commerce and Information Review
    • /
    • v.13 no.1
    • /
    • pp.29-52
    • /
    • 2011
  • A predictable and manageable output is desirable for most businesses. However, it is very difficult to control the quality and quantity of products in the food and agriculture business. Predictable outputs help managers plan their marketing, sales, and inbound and outbound logistics, but these are not easy to achieve in the food and agriculture business. Various industries have adopted different levels of automation and utilization of information systems for quality/quantity control; however e-Commerce of the food and agriculture industry is far behind those of other industries. Today, the food and agriculture industry is supposed to be more integrated than ever in order to reduce risks and improve processing costs, from farm to table. Since its operations including production, processing, storage, distribution, and management are dispersed all over the world, the food and agricultural industries now depend more on IT than other industries. This study attempts to develop a framework to analyze the current situation of agricultural product e-Commerce in Korea, and finds out the actual situation of the farmers operating on-line shopping systems through the developed framework and suggests some improvements.

  • PDF

Optimizing Similarity Threshold and Coverage of CBR (사례기반추론의 유사 임계치 및 커버리지 최적화)

  • Ahn, Hyunchul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.535-542
    • /
    • 2013
  • Since case-based reasoning(CBR) has many advantages, it has been used for supporting decision making in various areas including medical checkup, production planning, customer classification, and so on. However, there are several factors to be set by heuristics when designing effective CBR systems. Among these factors, this study addresses the issue of selecting appropriate neighbors in case retrieval step. As the criterion for selecting appropriate neighbors, conventional studies have used the preset number of neighbors to combine(i.e. k of k-nearest neighbor), or the relative portion of the maximum similarity. However, this study proposes to use the absolute similarity threshold varying from 0 to 1, as the criterion for selecting appropriate neighbors to combine. In this case, too small similarity threshold value may make the model rarely produce the solution. To avoid this, we propose to adopt the coverage, which implies the ratio of the cases in which solutions are produced over the total number of the training cases, and to set it as the constraint when optimizing the similarity threshold. To validate the usefulness of the proposed model, we applied it to a real-world target marketing case of an online shopping mall in Korea. As a result, we found that the proposed model might significantly improve the performance of CBR.

The Detection of Online Manipulated Reviews Using Machine Learning and GPT-3 (기계학습과 GPT3를 시용한 조작된 리뷰의 탐지)

  • Chernyaeva, Olga;Hong, Taeho
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.347-364
    • /
    • 2022
  • Fraudulent companies or sellers strategically manipulate reviews to influence customers' purchase decisions; therefore, the reliability of reviews has become crucial for customer decision-making. Since customers increasingly rely on online reviews to search for more detailed information about products or services before purchasing, many researchers focus on detecting manipulated reviews. However, the main problem in detecting manipulated reviews is the difficulties with obtaining data with manipulated reviews to utilize machine learning techniques with sufficient data. Also, the number of manipulated reviews is insufficient compared with the number of non-manipulated reviews, so the class imbalance problem occurs. The class with fewer examples is under-represented and can hamper a model's accuracy, so machine learning methods suffer from the class imbalance problem and solving the class imbalance problem is important to build an accurate model for detecting manipulated reviews. Thus, we propose an OpenAI-based reviews generation model to solve the manipulated reviews imbalance problem, thereby enhancing the accuracy of manipulated reviews detection. In this research, we applied the novel autoregressive language model - GPT-3 to generate reviews based on manipulated reviews. Moreover, we found that applying GPT-3 model for oversampling manipulated reviews can recover a satisfactory portion of performance losses and shows better performance in classification (logit, decision tree, neural networks) than traditional oversampling models such as random oversampling and SMOTE.

The Effects of Device Switching on Online Purchase: Focusing on the Moderation Effect of Switching Time and Internet Infrastructure (기기전환이 온라인 구매에 미치는 영향: 전환 시점과 인터넷 인프라의 조절 효과를 중심으로)

  • Jungwon Lee;Jaehyun You
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.289-305
    • /
    • 2023
  • The rapid increase in the use of mobile devices is changing consumers' online shopping behavior. However, the difference in the effect on the conversion rate according to the time when consumers switch from a small screen to a large screen has not been sufficiently studied. In addition, the differences in the effect of device conversion on purchase performance according to the characteristics of each country's infrastructure have not been sufficiently studied. Against this background, this study aims to analyze whether the timing of switching from mobile devices to PC devices and the country's mobile Internet penetration rate are moderating the positive effect of device switching on purchase performance. For empirical analysis, Google Merchandise Store data was collected and 101,466 data from 130 countries were analyzed with a multilevel model. As a result of the analysis, consumers' device switching (i.e., mobile to PC) had a positive effect when it occurred in the middle of the consumer journey. However, it was analyzed that when device switching occurred at the later stage of the consumer journey, it had a negative effect on purchase performance. In addition, it was analyzed that the higher the mobile Internet penetration rate, the weaker the positive effect of consumer device conversion on purchase performance.

A study on the Revitalization of Traditional Market with Smart Platform (스마트 플랫폼을 이용한 전통시장 활성화 방안 연구)

  • Park, Jung Ho;Choi, EunYoung
    • Journal of Service Research and Studies
    • /
    • v.13 no.1
    • /
    • pp.127-143
    • /
    • 2023
  • Currently, the domestic traditional market has not escaped the swamp of stagnation that began in the early 2000s despite various projects promoted by many related players such as the central government and local governments. In order to overcome the crisis faced by the traditional market, various R&Ds have recently been conducted on how to build a smart traditional market that combines information and communication technologies such as big data analysis, artificial intelligence, and the Internet of Things. This study analyzes various previous studies, users of traditional markets, and application cases of ICT technology in foreign traditional markets since 2012 and proposes a model to build a smart traditional market using ICT technology based on the analysis. The model proposed in this study includes building a traditional market metaverse that can interact with visitors, certifying visits to traditional markets through digital signage with NFC technology, improving accuracy of fire detection functions using IoT and AI technology, developing smartphone apps for market launch information and event notification, and an e-commerce system. If a smart traditional market platform is implemented and operated based on the smart traditional market platform model presented in this study, it will not only draw interest in the traditional market to MZ generation and foreigners, but also contribute to revitalizing the traditional market in the future.