• Title/Summary/Keyword: Digital payment system

Search Result 108, Processing Time 0.029 seconds

The Implication of Trust that Influences Customers' Intention to Use Mobile Banking

  • RAMLI, Yanto;HARWANI, Yuli;SOELTON, Mochamad;HARIANI, Swarmilah;USMAN, Fadlil;ROHMAN, Fatchur
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.353-361
    • /
    • 2021
  • The aim of this research is to understand and analyze the ways in which the current digital financial technology is impacting on the financial payment system provided by most of the commercial banks in Indonesia. This research analyzes the variables such as perceived ease-of-use, perceived usefulness, and perceived value on customer's intention to use in relation to the variable of trust as the intervening variable. The data collection is done through distribution of questionnaire; the population of this research consisted of the commercial banking customers located in Jakarta, Indonesia. The sample determination is done through Purposive Sampling and the analysis technique is using Partial Least Square (PLS). The results show that perceived ease-of-use, perceived usefulness, and perceived value have positive and significant effect on intention to use the mobile banking system; perceived usefulness of the application has the most significant influence on intention to use compare to the perceived of ease-of-use and perceived value of the mobile banking system. The results also indicate that, even though the mobile banking system has offered several benefits to the customer, yet it was not actively used by the banking customer compared to other commercial bank's mobile banking system in Indonesia.

An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks (SSL MITM 프록시 공격에 대한 효과적 방어방법)

  • Lim, Cha-Sung;Lee, Woo-Key;Jo, Tae-Chang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.693-697
    • /
    • 2010
  • In current e-commerce system, it happens that client's confidential information such as credit card numbers, pin numbers, or digital certificate may pass through a web proxy server or an altered proxy server without client's awareness. Even though the confidential information is encrypted and sent through SSL(Secure Sockets Layer) or TLS(Transport Layer Security) protocol, it can be exposed to the risk of sniffing by the digital certificate forgery at the proxy server, which is called the SSL MITM(Man-In-The-Middle) Proxy attack. In this paper, current credit card web-payment systems, which is weak at proxy information alternation attack, are analyzed. A resolution with certificate proxy server is also proposed to prevent the MITM attack.

Mining Loot Box News : Analysis of Keyword Similarities Using Word2Vec (확률형 아이템 뉴스 마이닝 : Word2Vec 활용한 키워드 유사도 분석)

  • Kim, Taekyung;Son, Wonseok;Jeon, Seongmin
    • Journal of Information Technology Services
    • /
    • v.20 no.2
    • /
    • pp.77-90
    • /
    • 2021
  • Online and mobile games represent digital entertainment. Not only the game grows fast, but also it has been noted for unique business models such as a subscription revenue model and free-to-play with partial payment. But, a recent revenue mechanism, called a loot-box system, has been criticized due to overspending, weak protection to teenagers, and more over gambling-like features. Policy makers and research communities have counted on expert opinions, review boards, and temporal survey studies to build countermeasures to minimize negative effects of online and mobile games. In this process, speed was not seriously considered. In this study, we attempt to use a big data source to find a way of observing a trend for policy makers and researchers. Specifically, we tried to apply the Word2Vec data mining algorithm to news repositories. From the findings, we acknowledged that the suggested design would be effective in lightening issues timely and precisely. This study contributes to digital entertainment service communities by providing a practical method to follow up trends; thus, helping practitioners have concrete grounds for balancing public concerns and business purposes.

The Payment System for Digital Music Products based on P2P Service (P2P 기반 디지털 음악상품 유료화 시스템)

  • Jeong, Myeong-Sook;Kang, Woo-Jun
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.05a
    • /
    • pp.500-505
    • /
    • 2007
  • 디지털 음악상품의 유료화 서비스를 위해 P2P 서비스 업체들은 콘텐츠를 다운로드 할 때 주는 자와 받는 자간에 포인트를 주고받는 것이 일반화되어 있었다. 그러나 이러한 방식은 다운로드 건별로 사용료를 지급해야 할 권리자와 콘텐츠를 명확하게 연결할 수 있는 콘텐츠 식별 방법이 없는 상태에서 진행되는 것이다. 따라서 명확한 음악식별이 중요한데, 불특정 다수가 제공하는 콘텐츠는 일반적으로 정보가 부정확하고 일관성이 결여되어 있어 해시 기술이나 음악인식 기술 등의 신뢰할 수 있는 콘텐츠 식별 방법을 이용하여 저작권 관리를 하여야 한다. 본 연구에서는 해시 기술 및 콘텐츠 인식 기술을 융합하여 두 기술의 장점만을 활용함으로써 해시 기술의 빠른 속도와 콘텐츠 인식 기술의 편리함을 동시에 제공한다. 이를 바탕으로 저작권 DB 관리 방법, 요금 결제 및 정산 방법 등을 이용하여 P2P 서비스의 유료화를 구현하고자 한다.

  • PDF

Structural Model of Antecedents and Consequences of Trust in e-Business (e-비즈니스의 신뢰선행요인과 결과의 구조적 모형)

  • Kim, Yeon-Jeong;Gwak, Won-Seop
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.447-463
    • /
    • 2005
  • The purposes of this study is to investigate the factor structure of web-site characteristics and antecedents factors affected to trust, satisfaction and behavioral intention of web-site. Refined data were consisted of 4 internet shopping mall survey and estimated the perception to visiting web site. Statistical methods are adapted Frequency, Factor Analysis and CFA(Confirmatory Factor Analysis) of LISREL. 8 program. Research findings are as follows. The factors of web characteristics indicated to product information/buying procedure clarification, stability and function of system, usability of web site, security and protection of individual information, design, clarification of enterpriser information, various payment methods and customer service. In regression analysis, dependent variables were trust, satisfaction and behavioral intention. reputation of site were significantly effected variables. External variables consisted of the 4 characteristics of web-site and reputation and trust, satisfaction and behavioral intention were internal factor.

  • PDF

Design and implementation of Digital signature and Payment system based J2ME for Mobile Commerce (이동거래를 위한 J2ME 기반 전자서명 및 전자지불 시스템 설계 및 구현)

  • 이대하;김순자
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.195-197
    • /
    • 2000
  • J2ME(Java 2 Micro Edition)는 소비자/임베디드 디바이스 시장을 목표로 한 자바2 플랫폼으로서 이는 컨피규레이션(Configuration)과 프로파일(Profile)로 구성된다. SLDC/ MIDP(Connected Limited Device Configuration/Mobile Information Device Profile)는 그 중에서도 휴대폰과 양방향 페이저 같은 제한된 메모리를 가진 장치 위에서 사용되는 플랫폼이다. 본 논문에서는 J2ME 기반 하에서 CLDC/MIDP를 이용하여 보안모듈을 작성하고 휴대폰에서도 안전한 전자서명 및 전자지불을 가능케 하여 Mobile Commerce의 기초를 이루었다. 여기서 서명은 XML 기반으로 구성되었고, 시스템은 MIDlet으로 구현하였다.

  • PDF

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Design of Interoperable DRM System in Home Domain (상호 호환성을 위한 홈 도메인 DRM 설계)

  • Moon, Ju-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.117-123
    • /
    • 2010
  • In this paper, we proposed the interoperable DRM(Digital Rights Management) system that allows to redistribute contents safely based on home domain. We tried to solve the problem about contents redistribution between devices under different DRM regime so that we suggested a interoperable DRM system that allow end users to redistribute contents within home domain can solve the restriction and the inconvenience occuring in using contents and at the same time protect the right of contents producer and provider as well. In order that end users can use freely their contents using home digital device without additional payment, we must build a home domain for interoperable DRM system for contents redistribution among devices. If both of exporting device and importing device are authenticated in home domain by HADM(Home Authorized Domain Manager), then the exporting device can redistribute packaged contents under importing DRM regime to the importing device by DIM(DRM Interoperability Manager).

A Study on the Current Status and Policy Direction of Open Banking (오픈뱅킹(Open Banking)의 현황과 정책방향에 관한 연구)

  • Park, Jeongkuk;Kim, Injai
    • Journal of Service Research and Studies
    • /
    • v.10 no.1
    • /
    • pp.17-31
    • /
    • 2020
  • Open banking, the global trend of the financial industry, is the driving force behind various innovations in the financial market in the future. The right policy direction and detailed tasks are important for triggering the differentiation and reunion of the financial industry. The purpose of this study is to investigate and analyze the background of open banking, domestic and international trends, and Korea's open banking policy. The policy directions and tasks for successful settlement and activation of open banking system are carefully suggested. Open banking is a policy to allow third party provider(TPP) access to bank accounts and open payment functions under the explicit consent of the customer. The opening of the open banking era is expected to begin competition and cooperation between banks and fintech companies in earnest, thus enhancing the competitiveness of the financial industry and contributing to the utility of financial consumers. To this end, policymakers should make every effort to advance open-ended financial settlement infrastructure, open banking legal grounds, and minimize side effects such as customer data leakage and poor financial system stability. Banks and fintech companies will need to focus on scattered customer financial information on a single platform and develop it into a convergence and discrimination of true financial services.

CAS-based Security System for IPTV (CAS기반 IPTV 보안 시스템)

  • Kim, Dae-Youb;Ju, Hak-Soo
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.221-226
    • /
    • 2008
  • IPTV is well known services of TPS (Triple play service). Since TPS supplies the bundle service, service providers can supply low-priced services for their subscribers. To supply high quality contents stably, it is an essential requirement to make payment for the services. According to the type of services, either CAS or DRM is used to protect the pay-contents service. Also IPTV uses or will use these security systems to protect the service. In this paper, we will describe security problems when a IPTV service provider chooses either CAS or DRM, and then propose a new security system to solve the problems.