• Title/Summary/Keyword: E-commerce security

Search Result 256, Processing Time 0.022 seconds

Customer Buying Process Based B2C Differentiation Strategy Analysis (고객 구매 프로세스 기반 B2C 차별화 전략 분석)

  • Gu, Ja-Heon;Park, U-Seong;Han, Hyeon-Su
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.488-492
    • /
    • 2007
  • In this study, we investigated how to distinguish customer delivered value to re-purchasing in fierce B2C industry. To identify key managerial variables that could distinctively impact re-purchasing, we first identified customer value proposition as per the customer buying decision process. Next, core value propositions of choice efficiency and competitive price are defined to determine vendor satisfaction during the searching stage and purchasing stage. The trust level is also introduced in the sense of reflecting confirmation to guarantee after purchase security. Then, significant managerial variables to impact on core value propositions are extracted. The resulting structural model illustrated that search convenience and quality assurance affect the choice efficiency, and re-purchase intention is strongly explained by both the vendor satisfaction and trust level. The empirical testing results also support that transaction cost reduction is key determinant of shopping at the Internet shopping mall. Furthermore, trust level should be combined to induce re-purchasing in addition to transaction cost savings.

  • PDF

A Study on Resolution Methods of Overseas Direct Purchase Dispute by ODR (ODR을 통한 해외직구 분쟁해결방안)

  • Shin, Koon-Jae
    • Journal of Arbitration Studies
    • /
    • v.25 no.1
    • /
    • pp.3-23
    • /
    • 2015
  • As the Internet rapidly emerges as a speedy and cost-effective way of purchasing goods from overseas websites, the number of disputes arising out of overseas direct purchases also increases. In such situations, a disgruntled consumer might be left without an effective remedy. Providing an alternative approach to redress such grievances might assist in resolving such disputes and in increasing consumer confidence in e-commerce. Online Dispute Resolution (ODR) will allow consumers to solve their disputes without going to court, in a quick, low-cost, and simple way. It also helps to eliminate complex jurisdictional and choice-of-law problems. On the other hand, it has many problems such as having inadequate confidentiality and security, not being able to meet the "writing" requirement for arbitration of disputes, having difficulty in enforcing online arbitration agreements, having difficulties in enforcing online decisions and so on. This article investigates relationship online disputes and ODR and suggests ways that ODR can work best in resolving disputes arising out of overseas direct purchases. To expand the ODR system in online disputes, it is very important for domestic consumers to recognize the concept and usefulness of the Alternative Dispute Resolution (ADR) and ODR systems. The Korean government must also help consumers recognize the ADR mechanisms of dispute resolution by public campaign advertisement of ADR systems. Further education of dispute resolution in higher educational institutions is also required as well as assisting the KCAB with funds and the establishment of ADR Law.

Generation of Forensic Evidence Data from Script (Script에서 Forensic 증거자료 확보 방안)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.353-355
    • /
    • 2017
  • Recently developed digital devices are being used in cyberspace. Digital device users are engaged in activities such as financial settlement and e-commerce using cyber-connected terminals. With the activation of cyber trading, cyber crimes against users are increasing. Forensic evidence should be obtained from investigations of cybercrime. However, there is a lot of information to analyze digital forensic evidence. In many of these digital information, Scripts are an effective way to secure evidence for cybercrime. In this paper, we study how to secure forensic evidence using scripts. Extract evidence from EnCase and study how to obtain evidence using scripts. This study will be used as the basic data for cyber security for the safe life of the people.

  • PDF

Development of Customer Satisfaction Index (CSI) Model for Pakistan

  • HAMAYUN, Khadija;HAFEEZ, Shakir
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.7
    • /
    • pp.153-171
    • /
    • 2022
  • To measure economic performance, customer satisfaction indices are constructed. This study proposes an index for banking and telecom, a significant evaluative system for comparing and enhancing customer satisfaction across the industries. The study suggests and examines amendments and improvements to the prior indices and incorporates ignored indicators to propose a punier index for Pakistan. The study is a pioneer in integrating online and offline indices into a single comprehensive model. The study is enriched by the Theory of Reasoned Action and Technological Acceptance Model. A sample of 320 respondents was used. The sample was divided based on gender and marital status. To authenticate the theoretical model, PLS-SEM was applied. We discovered nine latent variables that define customer satisfaction and conclude that a single model can be utilized for e-commerce enterprises as well. The index scores are comparable to the American index for banking and the Turkish index for telecom. Multi-group analysis (MGA) was used to comprehend the differences among the groups. This reveals that customization, design, reliability, and responsiveness induce satisfaction in telecom male and married customers. For the banking industry, the difference exists in complaint handling, customization, corporate image, perceived price, reliability, responsiveness, sentiments, convenience, and security to satisfaction links, image and complaint handling to loyalty links.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

A Study on Key Protection Method based on WhiteBox Cipher in Block Chain Environment (블록체인 환경에서 화이트박스 암호기반 키 보호 기법에 관한 연구)

  • Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.9-15
    • /
    • 2019
  • Recently, in the field of next-generation e-commerce and finance, interest in blockchain-based technologies such as Bitcoin and Ethereum is great. Although the security of blockchain technology is known to be secure, hacking incidents / accidents related to cryptocurrencies are being issued. The main causes were vulnerabilities in the external environment, such as taking over login sessions on cryptocurrency wallets, exposing private keys due to malware infection, and using simple passwords. However, private key management recommends general methods such as utilizing a dedicated application or local backup and physical archiving through document printing. In this paper, we propose a white box password-based private key protection scheme. As a result of safety and performance analysis, we strengthened the security against vulnerability of private key exposure and proved the processing efficiency of existing protocol.

A Study on the Influence of Securities on Corporate Financing Behavior in Financial Markets (금융시장에서 담보가 기업의 자금조달선택에 미치는 영향에 관한 연구)

  • Park, seok gang
    • International Area Studies Review
    • /
    • v.22 no.3
    • /
    • pp.201-219
    • /
    • 2018
  • This paper suggested a theoretical model, in which a security-based(secured loan, non-secured loan) credit agreement determines the form of corporate cost function through a loaning company's cost minimization in the light of a company which behaves monopolistically in product markets. Also, this paper analyzed the influence of a corporate credit agreement on market equilibrium, and economic welfare in product markets. As a result, it was found that in case a company, whose equity capital is small, implements borrowing based on a secured loan from a financial institution, the company comes to face borrowing restraints, in which the company has no choice but to get a loan within the scope of securities. When a company offers its capital goods, i.e. a production factor, as a security, there occurs a distortion to the production factor input ratio. Meanwhile, when a company comes to get a loan based on an unsecured loan, for which the interest rate is high, marginal cost rises; accordingly, the company comes to choose a credit agreement aiming at maximizing its profits. However, a company's choice of a credit agreement is not quite desirable from a consumer's viewpoint, and from the whole economic point of view; overall, such a choice is likely to aggravate economic welfare.

An Anonymous Rights Trading System using group signature schemes (그룹서명을 이용하여 익명성이 보장되는 디지털 권한 전달 시스템)

  • 주학수;김대엽;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.3-13
    • /
    • 2004
  • E-Commerce is suddenly spreading in a daily life. A rights trading system is a system that circulates digital-tickets such as plane tickets, software license, coupon. There are two main approaches so far account-based and smart-card based systems. The NTT Proposed FlexToken, a new smart card based copy prevention scheme for digital rights. They Proposed using pseudonymous self certified keys of Petersen and Horster in order to ensure anonymity of users. However. Petersen and Holster's scheme should register a pseudonymous key pair at TTP (One-time) every time so that users create the signature which is satisfied with unlinkability property In this paper, we propose a new anonymous rights trading system using group signature. This paper has a meaning having applied to digital rights trading system an efficient smart card based group signature.

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.