• Title/Summary/Keyword: E-banking

Search Result 175, Processing Time 0.024 seconds

The Accuracy of Various Value Drivers of Price Multiple Method in Determining Equity Price

  • YOOYANYONG, Pisal;SUWANRAGSA, Issara;TANGJITPROM, Nopphon
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.1
    • /
    • pp.29-36
    • /
    • 2020
  • Stock price multiple is one of the most well-known equity valuation technique used to forecast equity price. It measures by multiplying "the ratio of stock price to a value driver" by a value driver. The value driver can be earning per share (EPS), sales or other financial measurements. The objective of price multiple technique is to evaluate the value of assets and compare how similar assets are priced in the market. Although stock price multiple technique is common in financial filed, studies on the application of the technique in Thailand is still limited. The present study is conducted to serve three major objectives. The first objective is to apply the technique to measure value of firms in banking sector in the Stock Exchange of Thailand. The second objective is to develop composite price multiple index to forecast equity prices. The third objective is to compare valuation accuracy of different value drivers of price multiple (i.e. EPS, Earnings Growth, Earnings Before Interest Taxes Depreciation and Amortization, Sales, Book Value and Composite Index) in forecasting equity prices. Results indicated that EPS is the most accurate value drivers of price multiple used to forecast equity price of firms in baking sector.

A Study on Payment Finality and Usefulness in the Electronic Payment System -Based on U.C.C. 4A- (국제전자자금이체시스템에서 지급의 최종성과 유용성에 관한 고찰(미국의 전자금융제도를 중심으로))

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.35-53
    • /
    • 2010
  • In connection with a non-cash payment through the banking system, "finality of payment" has acquired diverse meanings. In according to Section 4A-209(2), the acceptance by the beneficiary's bank by means of receiving payment "pursuant to section 4A-403(a)(1) or 4A-403(a)(2)," constitutes final settlement through a Federal Reserve Bank or through a funds-transfer system" or credit to the account of the beneficiary's bank. Above of all, Acceptance by beneficiary's bank is the most important. According to 4A-209(b), the beneficiary's bank can accept a payment order in one of four ways : First, by paying the beneficiary; obligating itself to pay the beneficiary or, Second, by notifying the beneficiary of receipt of the order or notifying the beneficiary that its account was credited or, Thirdly, by receiving full payment from the sender's order or Lastly, by passage of time, i.e., the opening of the next funds transfer business day of the bank following the payment date of the order. A beneficiary's bank is considered to have accepted a payment order when the earliest of the four means of acceptance occurs.

  • PDF

Secure OTP Smart Card Authentication Protocol for Denial of Service (서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.201-206
    • /
    • 2007
  • Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.

  • PDF

A study on high performance Java virtual machine for smart card (스마트카드용 고성능 자바가상기계에 대한 연구)

  • Jung, Min-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.1
    • /
    • pp.125-137
    • /
    • 2009
  • Smart card has a small sized micro computer chip. This chip contains processor, RAM, ROM, clock, bus system and crypto-co-processor. Hence it is more expensive, complicated and secure chip compared with RFID tag. The main application area of smart card is e-banking and secure communications. There are two kinds of smart card platforms; open platform and closed one. Java card is the most popular open platform because of its security, platform independency, fast developing cycle. However, the speed of Java card is slower than other ones, hence there have been hot research topics to improve the performance of Java card. In this paper, we propose an efficient transaction buffer management to improve the performance of Java card. The experimental result shows the advantage of our method.

  • PDF

Security Attack Analysis for Wireless Router and Free Wi-Fi Hacking Solutions (무선공유기 보안공격 분석 및 무료와이파이 해킹 해결방안)

  • Bae, Hee-Ra;Kim, Min-Young;Song, Su-Kyung;Lee, Seul-Gi;Chang, Young-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.65-70
    • /
    • 2016
  • As network communication increases by using public WiFi to check e-mail and handling Internet banking, the danger of hacking public routers continues to rise. While the national policy is to further propagate public routers, users are not eager to keep their information secure and there is a growing risk of personal information leakage. Because wireless routers implement high accessibility but are vulnerable to hacking, it is thus important to analyze hacking to tackle the attacks. In this study, an analysis is made of the encryption method used in WiFi and cases of hacking WiFi by security attacks on wireless routers, and a method for tackling the attacks is suggested.

A Study of the Analysis and Countermeasure about the Phishing Scam (피싱에 대한 분석 및 대응방안에 대한 연구)

  • Kang, Hyun Joong
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.65-74
    • /
    • 2014
  • Phishing scans through wired telephones have been evolving into smissing and pharming. While we use wire or wireless telephones, text messages, e-mails, and online-banking conveniently, the ways of hacking and phishing attacks are getting developed and various. This paper investigates the various aspects of attacks depending on the kinds of phishing and suggests general prevention measures. In addition, the user-oriented practical preventive measures and government-driven long term measures are proposed in this paper. Technological developments, short or long term preventive measures proposed by the government, and continuous public relations could be solutions since in a short time, it could be difficult to eradicate phishing scams evolving continuously. Besides, the internet media as well as SNS are great helps in promoting the preventives against phishing and smissing. Finally this paper asserts that the newly developed service technology should be made carefully without security problems.

Bank Dividend Policy and Degree of Total Leverage

  • TRAN, Dung Viet
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.53-64
    • /
    • 2020
  • We provide one of the first investigation on the impact of the degree of total leverage to the dividend policy of bank. We use a large sample of US bank holding companies from 2000:Q1 to 2017:Q4 to shed light our research question. Our empirical analysis provides consistent evidence that banks with high degree of total leverage (i.e. banks with a relatively high fixed-to-variables costs) are less likely to pay dividends, and they spend a lower fraction of incomes to pay back shareholders, suggesting a higher conservatism in dividend policy of banks subject to high degree of total leverage. The evidence remains unchanged with alternative econometric approaches, alternative measures of dividend policy and degree of total leverage. We further document that this higher conservatism is strengthened for a sample of banks with low franchise value during the financial crises. Our result suggests that the conservatism in dividend policy of banks with high degree of total leverage seems to be related to the precautionary motives aimed at preserving corporate resources under financial distress. Our study contributes to the literature of cost structure and dividend policy by pointing out that the impacts of the degree of fixed-to-variable expenses to dividend policy are extended to the case of banks.

Assessing Students' Satisfaction in Public Universities in Bangladesh: An Empirical Study

  • RAHMAN, S.M. Mahbubur;MIA, Md. Shahin;AHMED, Ferdoushi;THONGRAK, Sutonya;KIATPATHOMCHAI, Sirirat
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.8
    • /
    • pp.323-332
    • /
    • 2020
  • This study aims to examine the level of students' satisfaction toward the services (i.e. accommodation facilities, transportation facilities, and recreation and sports facilities) provided by the public universities in Bangladesh. The study also aims to identify the major service factors that influence students' satisfaction in public universities in the country. A cross-sectional survey was conducted at six public universities to obtain primary data. A standardized questionnaire was distributed to a total of 500 randomly selected students to collect the data. Several statistical tools, namely, reliability analysis, descriptive statistics, correlation analysis and multiple regression analysis were employed to analyze the data. The findings revealed that recreation and sports facilities have the strongest impact on students' satisfaction in the public universities in Bangladesh. Transportation facilities also have positive and significant impact on student's satisfaction. However, the study found a negative correlation between accommodation facilities and students' satisfaction indicating that students are not satisfied with the accommodation facilities provided by the public universities. The findings of this study provide an insight about students' satisfaction that might be useful to authorities of the public universities and other higher educational institutions in designing policies for various services and facilities to be provided to their students.

Analysis of Mobile Smishing Hacking Trends and Security Measures (Mobile Smishing 해킹 동향 분석 및 보안대책)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2615-2622
    • /
    • 2015
  • Using the mobile device, such as Smartphones tablet PC, online banking and e-commerce, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users. And, in this paper, i propose a secure way and measures of financial damage for mobile Smishing hacking.

A Meta-Analysis and Review of Relationship between Trust and Risk on Online Environment in Korean Research (온라인 환경에서 신뢰와 위험 관계에 대한 문헌적 고찰 및 메타분석: 국내 연구를 대상으로)

  • Kim, Jong-Ki;Kim, Jin-Sung;Kim, Sang-Hee
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.59-81
    • /
    • 2012
  • Recently, in the research on online environment such as e-commerce, and internet banking, the conceptual discussion about trust and risk in an effort to explain a user's behavior is briskly underway. Most of the research on trust and risk are setting up causal relationship without clearly establishing the relationship between trust and risk. Accordingly this study conducted a meta-analysis in order to consider the relationship between trust and risk and to take a look at the difference in causal relationship. This study includes a total of 18 research papers which are setting up the causal relationship between trust and risk in online environment among the research papers published in domestic academic journals since 2000. Result of the meta-analysis, showed that the effect size was -0.367 in the path from trust to risk; -0.131 in the path from risk to trust; -0.276 in the bidirectional path between trust and risk. In addition, this study was able to confirm through literature review that there appeared a high effect of path in case where trust and risk were measured by an uni-dimensional concept than by a multi-dimensional concept.