• Title/Summary/Keyword: E-Banking

Search Result 175, Processing Time 0.023 seconds

Moving from Cash to Cashless Economy: Toward Digital India

  • AGGARWAL, Kartik;MALIK, Sushant;MISHRA, Dharmesh K.;PAUL, Dipen
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.4
    • /
    • pp.43-54
    • /
    • 2021
  • The study evaluates India's technological advancement, which has created a range of opportunities for consumers to enter into digital payment space. Demonetization in India has forced all consumers and companies to embrace and create cashless digital payment platforms. The cashless economy scenario involves various factors for its adoption such as reach, availability and awareness. This study considers factors responsible for adopting new digital payment technologies in India's different regions across various consumers. The study includes descriptive statistics and variance analysis (ANOVA) to identify elements to achieve maximum satisfaction. The research collects data from 250 respondents living in India, experiencing digital payments and online transactions. The data is collected through a structured questionnaire and critically analyzed using statistical analysis. The data has been analyzed with no sectorial biases and tracked by creating real-time indications. The study uses various hypotheses after taking responses from a sample of respondents. Cronbach's Alpha analysis is also used to determine the validity and reliability of the data. The study illustrates the complete shift of consumer behavior from cash to a cashless economy. A certain number of factors are shown to directly influence the rate of such a shift toward digital transactions in India.

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

IP Design of Corrected Block TEA Cipher with Variable-Length Message for Smart IoT

  • Yeo, Hyeopgoo;Sonh, Seungil;Kang, Mingoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.724-737
    • /
    • 2020
  • Corrected Block TEA(or XXTEA) is a block cipher designed to correct security weakness in the original block TEA in 1998. In this paper, XXTEA cipher hardware which can encrypt or decrypt between 64-bit and 256-bit messages using 128-bit master key is implemented. Minimum message block size is 64-bit wide and maximal message block size is 256-bit wide. The designed XXTEA can encrypt and decrypt variable-length message blocks which are some arbitrary multiple of 32 bits in message block sizes. XXTEA core of this paper is described using Verilog-HDL and downloaded on Vertex4. The operation frequency is 177MHz. The maximum throughput for 64-bit message blocks is 174Mbps and that of 256-bit message blocks is 467Mbps. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Design Proposition for ATMs as a Integrated Banking Service Provider (새로운 금융환경에서의 원스톱 금융 서비스 제공 거점으로서의 ATM 을 위한 사용자 인터페이스 디자인 제안)

  • Eom, Hye-Yoon;Lee, Soo-Jin;Lee, Ji-Young;Ryu, Joong-Hee
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.367-374
    • /
    • 2007
  • 금융 상품의 교차 판매, 복합 매장에서의 금융서비스 제공 등 판매 채널의 다각화, 인터넷 뱅킹, 모바일 뱅킹 등의 비대면 채널의 약진 등은 금융 산업에서의 유통 혁명을 예고하고 있다. 이제 ATM(Automatic Teller Machine: 현금자동지급기)을 통한 금융 거래는 단순한 결제 수단 및 현금 처리의 차원을 넘어 복합적인 종합 금융 서비스를 담당하는 원스톱 금융 서비스 제공 거점으로 새로이 자리매김하게 될 것이다. 하지만, 현재의 ATM에는 사용자와의 인터랙션을 중심으로 하는 여러 문제들이 도사리고 있다. 따라서, 시장 변화의 요구에 맞추어 기능을 발전시키기 위하여, 사용자의 복합적인 요구를 충족시킬 수 있는 ATM의 기능 설계 및 인터페이스 디자인이 요구된다. 본 논문에서는 사용자 인터뷰를 통하여 현행 ATM의 인터페이스가 사용자들에게 야기하는 불편 요인들을 찾아내고, 그에 대한 대안적 인터페이스를 설계하고, 사용자 평가를 통해 그 실효를 확인하여, 궁극적으로는ATM사용자 중심 인터페이스 표준의 구축을 시도하고자 한다.

  • PDF

Efficient Signature Scheme with Batch Verifications in Identity-Based Framework

  • Gopal, P.V.S.S.N.;Vasudeva Reddy, P.;Gowri, T.
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.397-404
    • /
    • 2016
  • In group-oriented applications, it is often required to verify a group of signatures/messages. The individual verification of signed messages in such applications comes at a high cost in terms of computations and time. To improve computational efficiency and to speed up the verification process, a batch verification technique is a good alternative to individual verification. Such a technique is useful in many real-world applications, such as mail servers, e-commerce, banking transactions, and so on. In this work, we propose a new, efficient identity-based signature (IDS) scheme supporting batch verifications. We prove that the proposed IDS scheme and its various types of batch verifications is tightly related to the Computational Diffie.Hellman problem under a random oracle paradigm. We compare the efficiency of the proposed scheme with related schemes that support batch verifications.

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

Successful CRM implementation strategy for a manufacturing company;A case of firm L (제조업의 성공적인 고객관계경영(CRM) 구현 전략;L 기업의 사례)

  • Yim, Sung-Sic;Kwon, Young-S
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.06a
    • /
    • pp.238-243
    • /
    • 2002
  • With the advancement of information technology and the proliferation of e-Business, CRM has been emerging as a powerful concept or strategy for dealing with customer relationship, though not a new concept. Most CRM applications have been focused on business situation where there are direct channels with customers, as in retailing and banking industry, etc. In this paper, we analyze the case of a manufacturing company where the primary concern lies on indirect channels management, such as selling agencies and distributors. Some issues related to the characteristics of the manufacturing company and the interface with ERP and SCM need to be investigated. Based on the consultation project with L company, we propose a successful CRM implementation strategy and point out some issues in implementing the CRM for a manufacturing company.

  • PDF

Treatment of Missing Data by Decomposition and Voting with Ordinal Data

  • Chun, Young-M.;Son, Hong-K.;Chung, Sung-S.
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.3
    • /
    • pp.585-598
    • /
    • 2007
  • It is so difficult to get complete data when we conduct a questionaire in actuality. And we get inefficient results if we analyze statistical tests with ignoring missing values. Therefore, we use imputation methods which evaluate quality of data. This study proposes a imputation method by decomposition and voting with ordinal data. First, data are sorted by each variable. After that, imputation methods are used by each decomposition level. And the last step is selection of values with voting. The proposed method is evaluated by accuracy and RMSE. In conclusion, missing values are related to each variable, median imputation method using decomposition and voting is powerful.

  • PDF

Corporate Reputation and Accountability of Corporate Environmental Responsibility: Theoretical Triangulation and Conflicting Accountabilities

  • BUI, Minh Le
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.21-28
    • /
    • 2021
  • The purpose of this study is twofold. First, this paper argues that a theoretical lens that can connect three crucial concepts is often missing when it comes to assessing the success or failure of corporate reputation in terms of corporate environmental responsibility. These three concepts include the legitimacy of environmental disclosure information, stakeholder interest in corporate environmental responsibility, and the relationship between corporate environmental practices and disclosure. The second purpose is to investigate the roles of transparency and systemic thinking in corporate environmental responsibility and disclosure that could help to connect the information from environmental disclosure to internal information in firms, thereby minimizing conflicting accountabilities and increasing stakeholder engagement in environmental disclosure. Rather than conducting an empirical study, the author has followed a theoretical examination of legitimacy, stakeholder, and stewardship theories. This study, thus, suggests the retention of many theories (e.g. legitimacy, stakeholder, and stewardship) to study and explain the relationship of corporate environmental practices, environmental disclosure, and corporate reputation.

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.