• Title/Summary/Keyword: Electronic Commerce Convergence

Search Result 138, Processing Time 0.022 seconds

Security Requisite Definition-Analysis (Identification and Authentication) (보안 요건의 정의 - 분석(식별 및 인증))

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.83-84
    • /
    • 2014
  • 식별 및 인증은 어플리케이션 보안 요건에서 분석단계의 보안 요건의 한 영역이다. 어플리케이션은 개별 ID를 유일하게 식별해야 한다. 패스워드는 길이 제한을 두어서 관리하고 패스워드 조합 표준을 적용해서 저장해 두어야 한다. 패스워드는 일정한 주기적인 변경을 수행해야 한다. ID/PW 이외의 강화된 인증 방식을 제공하여 관리를 해야 하는 것은 당연하다. 이러한 인증 프로세스는 정의된 보안 요건을 충분히 총족해야 한다.

  • PDF

The Effects of Strategic Orientation of ECS on Performance (전자상거래시스템의 전략적 지향성이 성과에 미치는 영향)

  • Kang, Teagyung;Kim, Daeup
    • Journal of Industrial Convergence
    • /
    • v.1 no.2
    • /
    • pp.81-94
    • /
    • 2003
  • This study is an empirical analysis of causal relationship that is the effect of strategic importance and orientation of electronic commerce system on performance. Among four industries(financial, retailing wholesaling, service, and manufacturing), financial industry has high level of strategic importance and orientation, that of manufacturing industry is low level. strategic importance has highest effects on strategic orientation. strategic importance and orientation has a positive effects on internal, financial performance significantly. effects of strategic orientation on performance is much than that of strategic importance.

  • PDF

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

Instructor's Smart Learning Acceptance : Focusing on TAM Model (교수자의 스마트학습 수용 : TAM 모형을 중심으로)

  • Kim, Do-Goan;Lee, Hyun-Chang;Rhee, Yang-Won;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1081-1086
    • /
    • 2016
  • While smart learning have been introduced for more learning effect, this study is to understand instructor's smart learning acceptance using technology acceptance model(TAM). This study developed the extended TAM model, including external pressure for smart learning and smart self efficacy for smart devices as study variables and attempted to examine the research model through the empirical analysis. The research model has the 7 variables including smart self-efficacy and external pressure. For the empirical study, the survey was conducted for the one month, March, 2016, and the total 143 data among the collected 167 responses were used for the empirical analysis. As the result of the analysis through the structural equation model, the 9 paths among the total 10 paths show the significant relationships between the variables. Through using the result of this study, it is to provide suggestions for the improvement of smart learning environments.

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.

Factors Influencing on Continuous Usage Intention of Smartphone Based on the TAM (Technology Acceptance Model) (기술수용모델 기반 스마트폰 지속사용의도에 미치는 영향)

  • Nam, Soo-Tai;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2076-2082
    • /
    • 2017
  • Users of Smartphone in Korea are using the majority of the economically active population over 99% and experts have seen that they have reached saturation after the initial formation stages. The purpose of this study is to investigate the influencing factors of dominant design attributes on the intention of continuous use of Smartphone users. Predictor factors were selected perceived usefulness and perceived ease of use suggested on extended the technology acceptance model. The concept model was completed by selecting the dominant design attribute as a mediator. Participants of this study were 135 Smartphone users in Busan Gyeongnam and Iksan Jeonbuk province in accordance with convenience sampling. IBM SPSS Statistics 19 were employed for descriptive statistics, Smart PLS (partial least squares) was employed for confirmatory factor analysis and path analysis of casual relationship among variables. Therefore, when moderating mediated factor of dominant design and attitude, factor of continuous usage intention showed 76% explanatory power.

A Suggestion of Baseball Simulation Game Using High Speed Camera Sensor (초고속카메라 센서를 활용한 야구시뮬레이션 게임 제안)

  • Kim, Do-Goan;Jin, Chan-Yong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.535-540
    • /
    • 2014
  • Due to the recent popularity of sports, business items which combine IT technologies with sports have appeared. 'Sportainment' which combines the elements of sports and entertainment have a lot of potential and development as new business items in the view of overcoming many limitations such as time and place in real sports. For suggesting a baseball simulation game 'sportainment', this paper is to review the technologies in the existing indoor baseball ranges and to provide the possibility of indoor baseball simulation using various sensor technologies. This baseball simulation game is expected to develop as one of successful indoor 'sportainment' businesses such as Golfzon.

Rebuilding of Image Compression Algorithm Based on the DCT (discrete cosine transform) (이산코사인변환 기반 이미지 압축 알고리즘에 관한 재구성)

  • Nam, Soo-Tai;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.1
    • /
    • pp.84-89
    • /
    • 2019
  • JPEG is a most widely used standard image compression technology. This research introduces the JPEG image compression algorithm and describes each step in the compression and decompression. Image compression is the application of data compression on digital images. The DCT (discrete cosine transform) is a technique for converting a time domain to a frequency domain. First, the image is divided into 8 by 8 pixel blocks. Second, working from top to bottom left to right, the DCT is applied to each block. Third, each block is compressed through quantization. Fourth, the matrix of compressed blocks that make up the image is stored in a greatly reduced amount of space. Finally if desired, the image is reconstructed through decompression, a process using IDCT (inverse discrete cosine transform). The purpose of this research is to review all the processes of image compression / decompression using the discrete cosine transform method.

Design of customized product recommendation model on correlation analysis when using electronic commerce (전자상거래 이용시 연관성 분석을 통한 맞춤형 상품추천 모델 설계)

  • Yang, MingFei;Park, Kiyong;Choi, Sang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.203-216
    • /
    • 2022
  • In the recent business environment, purchase patterns are changing around the influence of COVID-19 and the online market. This study analyzed cluster and correlation analysis based on purchase and product information. The cluster analysis of new methods was attempted by creating customer, product, and cross-bonding clusters. The cross-bonding cluster analysis was performed based on the results of each cluster analysis. As a result of the correlation analysis, it was analyzed that more association rules were derived from a cross-bonding cluster, and the overlap rate was less. The cross-bonding cluster was found to be highly efficient. The cross-bonding cluster is the most suitable model for recommending products according to customer needs. The cross-bonding cluster model can save time and provide useful information to consumers. It is expected to bring positive effects such as increasing sales for the company.

Advertisement Coverage Analysis of Social Commerce Service with D2D Communications (D2D 통신을 이용한 소셜커머스 광고 커버리지 분석)

  • Kim, Jun-Seon;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1547-1556
    • /
    • 2014
  • In this paper, we propose cost-effective device-to-device (D2D) advertisement scenario with properties of proximity and timeliness through the convergence of D2D communications and social commerce service. We numerically analyze advertisement dissemination effect of the proposed scenario according to the number of sectors, and demonstrate the performance of the normalized D2D coverage, the average number of D2D users, and the average D2D coverage per user via intensive simulations. We verify the accuracy of the results for our numerical analysis compared with the simulation results.