• Title/Summary/Keyword: Digital commerce

Search Result 643, Processing Time 0.037 seconds

Storage Policies for Versions Management of XML Documents using a Change Set (변경 집합을 이용한 XML 문서의 버전 관리를 위한 저장 기법)

  • Yun Hong Won
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1349-1356
    • /
    • 2004
  • The interest of version management is increasing in electronic commerce requiring data mining and documents processing system related to digital governmentapplications. In this paper, we define a change set that is to manage historicalinformation and to maintain XML documents during a long period of time and propose several storage policies of XML documents using a change set. A change set includes a change oper-ation set and temporal dimensions and a change operation set is composed with schema change operations and data change operations. We pro-pose three storage policies using a change set. Three storage policies are (1) storing all the change sets, (2) storing the change sets and the versions periodically. (3) storing the aggregation of change sets and the versions at a point of proper time. Also, we compare the performance between the existing storage policy and the proposed storage policies. Though the performance evaluation, we show that the method to store the aggregation of change sets and the versions at a point of proper time outperforms others.

A Methodology for u-Service Business Model Diagram and Analysis (u-서비스에 대한 비즈니스 모델 다이어그램 및 분석 방법론 개발)

  • Lee, Nam-Yeon;Kwon, Oh-Byung
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.1
    • /
    • pp.13-34
    • /
    • 2009
  • As ubiquitous computing technology is proliferating, a wider range of u-services applying ubiquitous computing technology has been implemented and some of the u-services have been actively considered for commercialization. Accordingly, establishing corresponding business models based on u-services also have been increased. However, structured methodologies to build u-service business models are still in its very early age. Moreover, since most of the legacy business model formulation and analysis methodologies have stressed on conventional or digital services, not u-services. Hence, the purpose of this paper is to propose a structured methodology of formulating and analyzing business models for u-services. An illustrative example is described to show the feasibility of the proposed methodology. To do so, Business Model Diagram (BMD), which adopts model components for u-services, is newly developed.

  • PDF

Innovation and the Learning Organisation

  • Yoon, Joseph
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.57-64
    • /
    • 2006
  • Arguably, the term "Learning Organisation" (LO) was coined in the 1970's, in the organisational learning context, by Chris Argyris. Certainly it has been around for many years. But it achieved new heights of popularity after the publication of Peter Senge's book "The Fifth Discipline the Art and Practice of the Learning Organisation". Now every respectable Government Agency and major company feels obliged to call themselves a L0. A review of the academic literature and organisation documents show many different concepts being described. Indeed, it seems that some organisations claiming to be a L0 have no clear idea of what they mean by the concept. This paper seeks to go behind the confusion to see whether there is still value for serious practitioners to continue using this concept, or whether it is now such a hackneyed phrase that more precise concepts are desirable. The Literature relating to the L0 is vast and it is beyond the scope of a conference presentation to give a comprehensive literature review. Instead, the paper gives an overview of the broad groups using the term and summarises their similarities and differences. It then reviews the key concepts in Senge's work in the light of this cacophony. The paper concludes that the diversity of definitions render the term "Learning Organisation" virtually meaningless. unless it is accompanied by a specific definition. The paper also concludes that the central tenet of Senge's work, which played a major role in popularising the concept, has been largely overlooked by the many organisations claiming this proud title "A Learning Organisation." It is argued that Senge's contribution to the literature in this field, the centrality of systems thinking to effective organisation learning remains a little understood, but critical insight.

  • PDF

Image Encryption using the chaos function and elementary matrix operations (혼돈함수와 기본 행렬 연산을 이용한 영상의 암호화)

  • Kim Tae-Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.1
    • /
    • pp.29-37
    • /
    • 2006
  • Due to the spread of mobile communication with the development of computer network, nowadays various types of multimedia data play an important role in many areas such as entertainments, culture contents, e-commerce or medical science. But for the real application of these data, the security in the course of saving or transferring them through the public network should be assured. In this sense, many encryption algorithm have been developed and utilized. Nonetheless, most of them have focused on the text data. So they may not be suitable to the multimedia application because of their large size and real time constraint. In this paper, a chaotic map has been employed to create a symmetric stream type of encryption scheme which may be applied to the digital images with a large amounts of data. Then an efficient algebraic encryption algorithm based on the elementary operations of the Boolean matrix and image data characteristics.

  • PDF

The Strategies of Logistics Management for SMEs through CALS/EC under the Circumstance supervised by IMF (IMF 환경하에서 CALS/EC를 통한 중소기업 물류경영 전략)

  • Ku, Keun-Wan;Kim, Chang-Gyun
    • Journal of Distribution Science
    • /
    • v.1 no.1
    • /
    • pp.1-24
    • /
    • 1999
  • CALS/EC is about doing business electronically. It is based on the electronic processing and transmission of data, including text, sound and video. It encompasses many diverse activities including electronic trading of goods and services, online delivery of digital content, electronic fund transfers, electronic share trading, electronic bills of lading, commercial auctions, collaborative design and engineering, online sourcing, public procuremet, direct consumer marketing, and after-sales service. It involves both products(e.g. consumer goods, specialised medical equipment) and services(e.g. information services, financial and legal services); traditional activities(e.g. healthcare, education) and new activities (e.g. virtual malls). CALS/EC will be emerging to replace and substitute the role of the conventional market. By changing and eliminating some processes of the transactions, the electronic market and the electronic commerce will redistribute the power and hence the benefits of the market activities. Traditional way of doing business may enter into the new electronic market because the role and function of trust and established reputation will be reinforced in the electronic market. The CALS/EC through the Internet has been in the spotlight in the shopping behavior of the consumers. Accordingly Corporates are trying to adapt themselves to those rapidly changing environments being affected by the Internet. Among others, particularly to be noted is the CALS/EC between corporations and consumers whose potential growth can be considered very substantial. This report, focusing on the introduction of CALS/EC for the logistics of SMEs, will allow us to prepare more efficiently for the coming 21st Century. It is obvious that CALS/EC is fast becoming the useful way of exchanging not only information but products in business between firm-to-firm and firm-to-customer.

  • PDF

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms (MD5 및 HAS-160 해쉬 알고리즘을 통합한 면적 효율적인 설계에 관한 연구)

  • Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.1015-1022
    • /
    • 2012
  • This paper deals with hardware design which unifies MD5 and HAS-160 hash algorithms. Two algorithms get a message with arbitrary length and process message blocks divided into 512 bits each time and output a hash code with a fixed length. MD5 ouputs a hash code of 128 bits and HAS-160 a hash code of 160 bits. The unified hash core designed has 32% of slices overhead compared to HAS-160 core. However, there is only a fixed message buffer space used. The unified hash core which run a step in one clock cycle operates at 92MHz and has performance which digests a message in the speed of 724Mbps at MD5 and 581Mbps at HAS-160 hash mode. The unified hash core which is designed can be applicable to the areas such as E-commerce, data integrity and digital signature.

Empirical Analysis of the Effects of Service Quality of the Smartphone App Store on Users' Repurchase Intention (스마트폰 앱 스토어의 서비스 품질이 재구매 의도에 미치는 요인에 관한 실증연구)

  • Lee, Myung Moo;Lee, Kun Chang
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.1-18
    • /
    • 2015
  • Recent trends of mobile convergence has already brought about many changes in our digitally-powered society. Especially, taking advantage of strengths of existing mobile devices and smart phones have already been established as a primary standard in the business intelligence world. Such high-powered digital devices equipped with mobile convergence functions are getting more momentum as app stores are prevailing. Basically, the app stores are administered by smart phone manufacturers, creating a new business ecosystem among app developers and end-users. However, there are paucity of studies tackling an issue about how users' repurchase intention of the apps is influenced by the service qualities of the app stores. In this respect, this study aims to investigate the effect of app store service quality on users' satisfaction and repurchase intention. As the value of loyal customers is incomparably high in app commerce, winning customers' loyalty is vital to the success of app stores. In this study, a customer is defined as one who has purchased goods or services at least once from the app stores. The proposed research model includes a number of constructs such as app perceptions, customer service, perceived ease of use, design, promotion, perceived consumer risk and connectivity. Empirical results revealed that perceived consumer risk has a negative relationship with consumer's perceived repurchase intention. All the other variables-app perceptions, customer service, perceived ease of use, design, promotion, connectivity- are found to be positively related with the repurchase intentions.

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF