• Title/Summary/Keyword: 전자상거래 융복합

Search Result 87, Processing Time 0.025 seconds

Research Trend Analysis of 'International Commerce and Information Review' Using SNA-based Keyword Network Analysis (SNA 기반 키워드 네트워크 분석을 활용한 '통상정보연구'의 연구동향 분석)

  • Yang, Kunwoo
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.23-42
    • /
    • 2017
  • International Commerce and Information Review has been playing an important role of disseminating the outstanding research results in the fields such as trade information and systems, e-trade, regional studies, e-commerce, service trade, trade laws since 1999. This paper aims to find the research trends and distinguished characteristics in the field of trade information by analyzing research keywords of the research papers published in this journal using a social network analysis method. Research keyword data collected from the homepage of the academic society were cleaned and transformed into the co-occurrence network data, which are suitable for social network analysis. NodeXL Pro was used to analyze and visualize the pre-processed data. Through clustering analysis, the most important subject fields or interests were identified as well as those which worked as intermediaries for interdisciplinary researches.

  • PDF

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

An Understanding the Factors That Influence on Unconcern about Privacy Information (프라이버시 무관심에 영향을 미치는 요인에 관한 연구)

  • Jeong, Tae-Seok;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.49-59
    • /
    • 2012
  • This study is to explain why internet users are unconcerned with their privacy information. For this purpose, this study focuses on the Nate.com case. Nate.com recently suffered from external intrusion. They announced this fact to their users. However, users did not leave the Nate.com. To explain the reason, this study used a combination of qualitative and quantitative techniques. The grounded theory approach was used to analyze responses to open-ended questions answered by 240 Nate.com users. Using these responses, a survey instrument was developed. Survey results were analyzed using structural equation modeling. The conclusions and implications are discussed.

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 식별 및 인증)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang;Lee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.211-212
    • /
    • 2014
  • This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process.

  • PDF

Legal System and Regulation Analysis by S/W Development Security (주차시설 현황 조사를 통한 주차 회전율 파악)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.227-228
    • /
    • 2014
  • In this paper, a license plate investigation which is one of parking usage is performed. We survey research that should be given time interval using the camera without the observer. We assigned the investigation time interval to each of to each of the parking car, average parking duration is determined. Parking turnover, the number of vehicles of parking per hour per parking surface, is examined.

  • PDF

Legal System and Regulation Analysis by S/W Development Security (승강기 내에서 폭행의 추출)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.205-207
    • /
    • 2014
  • This paper uses $Color-x^2$ histogram that is composed of merits of color histogram and ones of histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing $Color-x^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

  • PDF

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 보안에 따른 법 제도 및 규정 분석)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang;Lee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.201-202
    • /
    • 2014
  • In this paper, we research on domestic or international hacking cases that could damage us mentally or financially. Seventy five percent of Web-site attacks abuses weak points of application programs, or software. We also research on major issues related to software development security with these demerits.

  • PDF

A Study on ALTIBASETM LOG ANALYZER method for highly scalable, high-availability (고확장성, 고가용성을 위한 ALTIBASETM LOG ANALYZER 기법에 관한 연구)

  • Yang, Hyeong-Sik;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.1-12
    • /
    • 2014
  • Recently, the need for non-stop service is increasing by the business mission-critical Internet banking, e-payment, e-commerce, home shopping, securities trading, and petition business increases, clustered in a single database of existing, redundant research on high-availability technologies related to technique, etc. is increasing. It provides an API based on the Active Log in addition to the technique of redundancy, ALTIBASE$^{TM}$ Log Analyzer (below, ALA), provides scalability and communication of the same model or between heterogeneous. In this paper, we evaluated the performance of ALA by presenting the design of the database system that you can use the ALA, to satisfy all the synchronization features high scalability and high availability, real-time.

The Characteristics and Implications of the largest e-commerce day in the world, China's Singles Day (세계 최대 규모의 전자상거래, 중국 광군제의 특징과 시사점 - 4차 산업혁명에 따른 스마트 물류의 도입을 중심으로 -)

  • Song, Min-Geun
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.9-21
    • /
    • 2020
  • The Gross Merchandise Volume for the China's Singles day event in 2019 is about $38.4 billion. More than 500 million customers placed about 1.3 billion orders a day, and the related delivery volume is 2.8 billion. The main technologies associated with the 4th Industrial Revolution are bringing about a big change in the logistics industry. The purpose of this study is to present implications by reviewing the main technologies which are applied to China's Singles day event, the introduction of smart logistics in China, and analyzing the progress of Singles day, smart system of Alibaba, its significance. China still has poor infrastructure in non-capital areas. And many Chinese companies are actively introducing and developing smart logistics to cover the vast continental area of China. Singles Day is a representative case in point where the smart logistics and main technologies related to 4th Industrial Revolution are applied. The data obtained through smart logistics would be reused for inventory management, production planning, and order processing, contributing to the optimization of the company's operations. In the era of the 4th Industrial Revolution, domestic companies and governments need to make efforts to expand the introduction of smart logistics to secure competitiveness with global advanced companies.

A Collaborative Reputation System for e-Learning Content (협업적 이러닝 콘텐츠 평판시스템 연구)

  • Cho, Jinhyung;Kang, Hwan Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.235-242
    • /
    • 2013
  • Reputation systems aggregate users' feedback after the completion of a transaction and compute the "reputation" of products, services, or providers, which can assist other users in decision-making in the future. With the rapid growth of online e-Learning content providing services, a suitable reputation system for more credible e-Learning content delivery has become important and is essential if educational content providers are to remain competitive. Most existing reputation systems focus on generating ratings only for user reputation; they fail to consider the reputations of products or services(item reputation). However, it is essential for B2C e-Learning services to have a reliable reputation rating mechanism for items since they offer guidance for decision-making by presenting the ranks or ratings of e-Learning content items. To overcome this problem, we propose a novel collaborative filtering based reputation rating method. Collaborative filtering, one of the most successful recommendation methods, can be used to improve a reputation system. In this method, dual information sources are formed with groups of co-oriented users and expert users and to adapt it to the reputation rating mechanism. We have evaluated its performance experimentally by comparing various reputation systems.