• Title/Summary/Keyword: E-Banking

Search Result 175, Processing Time 0.021 seconds

The Present and Future of Avata Fashion Market - The Strategic of Avata Fashion Marketing- (아바타 패션시장의 현재와 미래 -아바타 시장 패션 마케팅의 전략적 접근-)

  • 송영주
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.5 no.1
    • /
    • pp.47-57
    • /
    • 2003
  • Today there are increasing number of internet users. Internet is wide use of banking, shopping, school and studding. Also, internet is used in everyday living and its use is getting larger. Korea has the one of the most use of internet in the world. Most of houses have computer with internet, and there are alot of PC rooms in the streets. anyone can enjoy the internet anytime anywhere. Now, in internet there are group formed by community purpose. The 'dot com' companies was not making much of profit from their goods. However, they came out with an idea "avata" Soon, the avata became a hit and its known for its success. Avata is used for E-mail, name card, post stamp, and chatting. Also, Avata is very popular among chatting service, icon chatting, and 3D graphic chatting. Avata represent the user himself in internet and computer created imaginary space, and it connects between imaginary space and reality, also it exist between real name and nick name. Past years, the internet users were satisfied with their nick name, however resent year users wants to express them more. For the result the "Avata" is created to fulfill the need to express user themselves. There are three different ways to see how Korean react to fashion industry. first, Korea's land structure makes the density of population high, the transmission of information is very fast. Next, collectively is high among Koreans. Finally wide use to internet made the transmission of the fashion information much faster. The User wants to keep up with the fashion at the sametime they want to express themselves, and "avata" is the one that fulfill their needs. New technology and the desire to express themselves made the new term "avata industry". which was never existed before. In addition, the internet markets have potential power. Although, it is in start stage of avata industry. However, the experts say that its possibility of its development is not predictable. In conclusion, watch the development of a situation to analyze the avata industry and develop new avata fashion market.

  • PDF

An Implementation of Web Site Login System Using Fingerprint Identification (지문인증을 이용한 웹 사이트 로그인 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.207-213
    • /
    • 2002
  • Fingerprint has the characteristics that do not change with time and is unique to an individual. And fingerprint identification is considered the best choice for most biometric applications because of its accuracy, speed, reliability, non-intrusive interfaces and cost-effectiveness. In this paper, we applies fingerprint Identification to web site login to raise the quality of personal identification when we use e-commerce, internet banking, stock dealings, shopping mali, etc. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing system carries out fingerprint identification in the web server, but the system Implemented in this paper carries out it in client. Therefore the loads of server are reduced and the confidence of internet service is improved because login is forbidden without fingerprint identification success.

A Methodology for the Improvement of Accredited Digital Certificate Integrating FIDO Biometric Technology and TrustZone (FIDO 생체기술과 안전영역을 연계한 공인인증서 효율화 방법)

  • Cho, Hwa-Gun;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.183-193
    • /
    • 2017
  • Digital accredited certificates issued under the Digital Signature Act provide essential functionalities for online service, so certificates are used for various services such as online banking, e-government. However, certificates can be stolen by hackers and users need to install separate software to use certificates. Recently FIDO, which aims to solve the problems of password-based authentication and the lack of interoperability between authentication methods, is used for biometric authentication and TrustZone, hardware-based secure environment, is used for safe smartphone usage. In this paper, the new service method is suggested which uses FIDO-based biometric authentication and stores certificates in TrustZone. This method can not only improve security and convenience but also be easily applied to the service because it uses built-in functionalities of new smartphones such as biometric sensors and TrustZone. It is expected that people can use certificates in a safe and convenient way with this method.

Internet Revolution in Bangladesh

  • Rahman, Mizanoor
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.65-72
    • /
    • 2004
  • The Internet is a social and economic foundation, apparently destined for human communication and interaction. It is supposed to allow for more interactive and innovative ways for people to do what they do in 'real lift'. There is no shilly-shallying to say that at present, Internet has become a commanding and useful tool for empowerment and income making in developing countries. It is very difficult to say that at present internet has turned into a popular and useful thing among the Bangladeshi people like students, doctors, engineers, businessmen, researchers as well as politician who are being logged into the internet for getting information what they want. Though the Internet was invented in 1970 but it came late in Bangladesh through UUCPs (Unix-to-Unix copy) email connectivity in 1993 and IP connectivity in 1996. Having launched Internet, on June 1996 National polls result were broadcast through the using of World Wide Web (WWW) that was the first ever practice trial in Bangladesh. On June 1996, the government has approved to allow VSAT (Very Small Aperture Terminal) in the country's private sector to operate as Internet Service Provider (ISPs). At the end of year, there were only two ISPs in the country and number of users near about one thousand only. But next year in 1997, the total number of ISPs was more than a dozen and the clientele growth was ten times higher than that of the previous year. From then, the number of Internet users and ISPs are increasing significantly in Bangladesh. About 40 ISP are providing internet service among as many as 3, 20,000 users at present out of almost 130 license holder ISP provider but among the ISPs, most of the ISPs are placed in Dhaka and few are working in Comilla, Sylhet, Rajshahi, Chittagong and Khulna. It should be mention that currently, broadband internet (Radio, Cable) connection is working side by side dial -up connection where broadband accounts 10,000. This paper will have a comprehensive discussion on the current situations of Internet and some of the contemporary issues in the matter concerned.

  • PDF

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.517-520
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking stork dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

An Analysis of Potential Customer Satisfaction Improvement Index of Smart Phone by Usage Characteristics (스마트폰 사용 특성별 잠재적 고객만족 개선지수 분석)

  • Hong, Jung-Sik;Lee, Sang Cheon;Park, Jong Hun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.2
    • /
    • pp.56-64
    • /
    • 2020
  • This paper is a follow up to the previous study which reveals that smartphone users are divided into three subcategories according to their usage characteristics. In this paper, these groups are called as 'general', 'entertainment', and 'work-assistant', taking into account their respective characteristics. The 'general' is a group whose smartphone usage characteristics are not focused on a specific purpose, the 'entertainment' is focused on music, internet, SNS, picture, and e-banking, and the 'work-assistant' is on work, GPS, diary. Inter-relation between the importance and satisfaction for the purchase determinants to the groups is investigated. In addition, Kano analysis of quality attributes is also performed, which includes quality type, satisfaction/dissatisfaction index, and PCSI (Potential Customer Satisfaction Improvement) index. The analysis result are as follows. Firstly, inter-relation between importance and satisfaction differs by user group. 'Internet', 'Ease of use', and 'Performance' purchase determinants are evaluated as competitive determinants in 'work-assistant' user group. Secondly Kano quality types of quality characteristics also differs by user group. 'Application' was classified as an attractive (A) types to 'entertainment' group and so on. 'Internet' 'Failure/Bug', 'Touch response rate' and 'Charging' are located in 'Nice' Region of S-PCSI Diagram and have to be considered as strategic quality characteristics. The results of this study is expected to give some helps in establishing a customer tailored quality strategy.

Digital Divide in Internet Access and Internet Usage in Korea (인터넷 접근과 활용에서의 디지털 격차)

  • Ju, Young-Wan;Kim, Yoo-Jung;Cho, Chang-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5601-5613
    • /
    • 2011
  • The purpose of this paper is to better understand the socio-economic differentials of Internet access and use. Data from '2008 Korean Internet usage behavior' were used to conduct logistic regression analysis. The findings show that there are significant socio-economic(age, gender, educational attainment, employment situation, and Internet access type) disparity in Internet access(Internet access at home, broadband Internet access). Also socio-economic variables enter in as statistically significant in most specifications for Internet use intensity (Intensive internet use, frequent internet use, less frequent internet use). The gender, household income and education attainment explanations for large differential in Internet use intensity are generally very similar. It is shown that age, education attainment and household income level cause a large digital divide on Internet service use(information use, communication and community use, e-commerce use, Internet banking use).

Analysis on Smishing Attack Trends and Mobile Forensic (스미싱 공격 동향 분석 및 Mobile Forensic)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.394-397
    • /
    • 2014
  • Most of Koreans have smartphone. By using smartphone, they have done internet-banking, e-commerce and private scheduling. However, convenience of smart phone has been made side effect such as tool of fraud and crime. Especially, Smishing on smartphone has been increased rapidly since 2013. Smishing have utilized social-engineering technique with social issue such as Korean near-sea cruse ship, 'Sewol-Ho', Sinking and traditional thanks-giving holiday, 'Chu-Seok', etc. This paper proposed the oncoming trend of smishing on smartphone after 2014. This paper also analyzed the process and technique of smishing on internal financial fraud. It also covered smartphone forensic for using legal evidence. By discovering the connectivity of smishing and financial fraud, this paper could be reference for social security on smartphone.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.