• 제목/요약/키워드: Bank Card

검색결과 66건 처리시간 0.024초

사이버 무역시대(貿易時代)의 신결제방식(新決濟方式)에 관한 연구(硏究) (A Study on the New Payment Methods in the Cyber Trade Age)

  • 박석재
    • 무역상무연구
    • /
    • 제14권
    • /
    • pp.237-256
    • /
    • 2000
  • Electronic commerce has been threatening to address the transaction inefficiencies in international trade that is conducted through letters of credit(L/Cs) and other forms of traditional paper-based financial instruments. The replacement of traditional paper documets with electronic alternatives is becoming more of a relity within a number of business sectors. The conceptual model of electronic L/Cs presented in this paper is intended to provide a framework for discussing the development of a paperless credit. The TradeCard network provides a business-to-business e-commerce infrastructure that enables buyers and sellers to conduct and settle international trade transactions securely over the Internet. Sellers and Buyers should select the best payment methods of traditional L/Cs, electronic L/Cs, TradeCard, Bank Credit Card etc. in consideration of their business circumstances.

  • PDF

Mouse Bank at CARD Kumamoto University, Japan

  • Nakagata, Naomi
    • Interdisciplinary Bio Central
    • /
    • 제2권4호
    • /
    • pp.16.1-16.4
    • /
    • 2010
  • Cryopreservation of mouse embryos and spermatozoa has become the foremost technique for preserving large numbers of different strains of mice with induced mutations. In 1998, our mouse bank was established in the Center for Animal Resources and Development (CARD), Institute of Resource Development and Analysis, Kumamoto University, Japan, based on the Preservation, supply and development of genetically engineered animals report published by the Ministry of Education, Culture, Sports, Science and Technology. We cryopreserve mouse embryos and sperm, supply these resources, organize training courses to educate people and form part of a domestic and international network of both mutagenesis and resource centers. We currently have over 1,500 mouse strains, 842,000 frozen embryos and 26,000 straws containing frozen sperm. Moreover, we disclose information about 1,300 deposited strains. Furthermore, over 400 strains of frozen embryos or mice produced from frozen embryos and sperm are being supplied to the requesters both domestically and internationally. Additionally we hold training courses on the cryopreservation of mouse germplasm 2~3 times a year, both domestically and internationally. In the course, we teach basic reproductive engineering techniques to trainees on a man-to-man basis. We have already held 28 training courses on the cryopreservation of mouse germplasm at our center and at other institutes.

Mining Association Rules of Credit Card Delinquency of Bank Customers in Large Databases

  • Lee, Young-Chan;Shin, Soo-Il
    • 지능정보연구
    • /
    • 제9권2호
    • /
    • pp.135-154
    • /
    • 2003
  • Credit scoring system (CSS) starts from an analysis of delinquency trend of each individual or industry. This paper conducts a research on credit card delinquency of bank customers as a preliminary step for building effective credit scoring system to prevent excess loan or bad credit status. To serve this purpose, we use association rules as a rule generating data mining technique. Specifically, we generate sets of rules of customers who are in bad credit status because of delinquency by association rule mining. We expect that the sets of rules generated by association rule mining could act as an estimator of good or bad credit status classifier and basic component of early warning system.

  • PDF

Mining Association Rules of Credit Card Delinquency of Bank Customers in Large Databases

  • Lee, Young-chan;Shin, Soo-il
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2003년도 Proceeding
    • /
    • pp.149-154
    • /
    • 2003
  • Credit scoring system (CSS) starts from an analysis of delinquency trend of each individual or industry. This paper conducts a research on credit card delinquency of bank customers as a preliminary step for building effective credit scoring system to prevent excess loan or bad credit status. To serve this purpose, we use association rules that ore generating method. Specifically, we generate sets of rules of customers who are in bad credit status because of delinquency by using association rules. We expect that the sets of rules generated by association rules could act as an estimator of good or bad credit status classifier.

  • PDF

Fantastic Collaboration of Financial Services and Telecommunication: a Frontier Case of Integrated Marketing Communication of 'Club SK Card'

  • Lee, Seon Min;Chun, Seungwoo;Joo, Young Hyuck;Yoo, Changjo
    • Asia Marketing Journal
    • /
    • 제15권4호
    • /
    • pp.223-241
    • /
    • 2014
  • In May 2012, the collaboration of Hana Bank, top financial service company, and SK Planet, top telecommunication service provider, introduced a new credit card that was filled with all-in-one benefits into the market. Leveraging strong infrastructure of two companies, each top in its own industries, the awareness and preference of 'Club SK Card' brand rapidly increased to about 25% in less than one year. Moreover, this new card was enthroned in the most sold credit card of year 2012, accounting for a market share of 7.2% in the credit card market and more than 80% in the mobile credit card market. To make these results possible, 'Club SK Card' marketing team developed an effective marketing communication strategy which followed the 6M model. The mission of the marketing communication strategy was simple and clear. It was to deliver the card's inherent strengths on consumer benefits that come from the support of subsidiary and affiliated companies of SK Planet. According to OK Cashbag data, the marketing communication team selected the appropriate target consumers and approached them directly, inducing actual purchase behavior. The target consumers received straightforward messages about 'Club SK Card' and were led to join in the new membership at their most frequently visited supermarket or franchise restaurant. The straightforward communication message embedded in an eye-catching commercial ad with a hook song accompanied with a dance was delivered via public media. The ad became so popular that many other television programs quoted or made parodies of the ad. Courtesy of the commercial ad, the brand name disseminated rapidly and widely among the public. In October 2012, an ingenious planning and persistent implementation of the communication strategy results 'Club SK Card' to be ranked top in brand awareness as well as advertising preference tests.

  • PDF

불완전 정보와 신용카드 이자율 (Credit Card Interest Rate with Imperfect Information)

  • 송수영
    • 재무관리연구
    • /
    • 제22권2호
    • /
    • pp.213-226
    • /
    • 2005
  • 역선택은 금융 산업에서 많이 연구되는 주제이다. 은행 대출 이자율에 대해서는 이자율과 역 선택의 관계에 대해서 공감을 형성하고 있지만, 신용카드 이자율에 있어서 이자율의 변화와 역선택이 발생하는 방향에 대해서 아직 논쟁 중이다. 그러므로 이 논문에서는 신용카드 이자율에 있어서 역선택이 어떻게 발생하는 지를 밝히고, 균형 이자율이 결정되는 과정을 보이려 한다. 신용카드 이용자들과 공급자 사이의 상호 작용이 이자율을 결정하게 되는 중요한 요소이다. 신용카드 이용자들은 거래수단으로서 혹은 자금 조달 수단으로 신용카드와 현금을 이용할 수 있는데, 단위 화폐가치당 소용 비용을 최소화하려는 선택을 하는 합리적인 소비자로 가정하고 있다. 반면에 신용카드 공급자들은 그들의 이익을 최대화하려는 노력을 기울이는데, 현금보다 신용카드가 널리 쓰일수록 유리하다. 이런 가정하에서 신용카드 이자율과 역선택의 관계를 이론적 모형을 통해서 분석하였고, 은행 대출 이자율에서 발생하는 역선택과 같은 역선택이 발생함을 보였다. 즉 증가하는 신용카드 이자율은 역선택을 유발하는 것이다.

  • PDF

인터넷 뱅킹의 사례연구를 통한 서비스모델 구현에 관한 연구 (The Study on Service Model through the Case Study of Internet Bank)

  • 박종돈
    • 통상정보연구
    • /
    • 제7권1호
    • /
    • pp.75-94
    • /
    • 2005
  • With most major full service banks having launched transactional Internet banking, attention is shifting to the realities of managing the Internet channel as a profitable component of an overall delivery strategy. In addition to examining Case Study and Internet Bank Model. Services of Internet Banking available through the Internet are as follows. 1. credit card loans, personal loans. 2. high-yield financial products. 3. insurance products. 4. securities products. 5. Case study of Foreign Internet Banking(ING, BNP, HSNC, City Bank). The study reviewed fields, including financial services, customer service, Website formation and design, convenience of use and system safety, Internet Banking Model, and many related areas. Internet Banking earned high marks in most fields. This study review focuses on the following: Understanding and meeting consumer expectations for us ability, site performance and functionality. Integrating the Internet channel into overall marketing, product delivery and customer service strategies. Strategies to increase customer satisfaction with Internet Banking and to attract new Internet bankers. therefore this study review activity model concretion of Internet Banking Model and Case Study.

  • PDF

S카드사의 가맹점 분류체계 정비를 통한 고객세분화 전략 (Reforming Business Classification Systems of Merchants: A Case of S-Card's Customer Segmentation Strategy)

  • 박진수;장남식;황유섭
    • 경영정보학연구
    • /
    • 제10권3호
    • /
    • pp.89-109
    • /
    • 2008
  • 후발카드사들의 시장 확대 전략, 은행계 카드사의 약진 등 점차 치열해지는 경쟁 구도에 대비하기 위해 S카드사는 과거와 같이 단순 신용카드 상품이나 '고수익 고위험'의 대출서비스에 주력하는 수익모델로는 향후 생존하기 어렵다는 현실을 인식하고 신용판매 활동의 내실 강화를 통해 지속적으로 수익을 창출할 수 있는 방안을 강구하였는데 이것이 바로 가맹점 업종분류체계 정비를 통한 고객세분화이다. 즉, 기존의 수수료율 책정기준으로 만들어진 가맹점 업종분류체계를 마케팅 목적으로 재편하고 새로운 업종분류체계에 맞춰 고객의 정확한 카드 사용실적을 파악한 후 고객을 세분화하는 개념으로, 가맹점과 고객의 다양한 니즈를 연계 관리함으로써 고객에게는 맞춤 정보 및 오퍼를 제공하고, 가맹점과의 긴밀한 협력관계를 통해 가맹점 매출을 증대하며, 이로 인해 자사의 신용판매를 확대하고 수익을 극대화하는 고객, 가맹점, 자사 상호간의 Win-Win-Win 관계 형성을 목표로 하였다. 본 연구에서는 S카드사가 어떠한 방식으로 기존의 업종분류체계를 정비하여 고객세분화를 수행하였으며, 어떻게 활용하고 있는가를 살펴봄으로써 효과적인 고객세분화에 기반한 마케팅 전략수립 의 방향을 제시하고자 한다.

IC신용카드(EMV)를 이용한 T-커머스 결제처리 모듈 개발 (Development of T-commerce Processing Payment Module Using IC Credit Card(EMV))

  • 최병규;이동복;김병곤;허신
    • 정보처리학회논문지A
    • /
    • 제19A권1호
    • /
    • pp.51-60
    • /
    • 2012
  • 일반적으로 스마트카드라고 불리는 IC(Integrated Circuit)카드는 작은 크기의 마이크로칩(MPU)과 메모리, EEPROM, 카드 운영체제(COS) 및 보안 알고리즘을 내장하고 있다. 이러한 IC카드는 금융(카드,은행,증권 등), 교통, 통신, 의료, 전자여권, 멥버쉽 회원관리 등 거의 모든 산업분야에서 이용되고 있다. 최근 방송통신융합 및 TV의 스마트기기화 추세에 따라 TV전자상거래(T-커머스)가 방송산업의 신성장 동력이 되면서 T-커머스 지불결제 방법으로 IC카드를 이용하는 등 응용분야가 증가하고 있다. 예를 들어, T-커머스에서 IC신용카드(또는 IC현금카드)를 이용하여 결제를 하거나, IC현금카드를 이용하여 ATM과 같은 방식으로 TV뱅킹 서비스를 제공한다. 하지만 아직까지 대부분의 T-커머스 신용카드 결제 서비스는 리모콘을 이용한 카드정보 입력 방식을 이용하고 있기 때문에 고객 편의성이 크게 떨어지고, 카드정보 저장 및 노출 등 보안성에 있어서 취약성을 가지고 있다. 이러한 문제점을 해결하고자, 본 논문에서는 IC신용카드 결제 표준기술인 EMV기술을 이용한 TV전자 지불 결제시스템 구현을 위한 결제처리 모듈을 개발하였다.

금융회사의 고객정보보호에 대한 내부직원의 태도 연구 (The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea)

  • 정우진;신유형;이상용
    • Asia pacific journal of information systems
    • /
    • 제22권1호
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF