• Title/Summary/Keyword: Electronic Commerce Convergence

Search Result 138, Processing Time 0.024 seconds

Design and Implementation of Dynamic Group Key Management Protocol for Multicast Information Security (전자상거래를 위한 멀티캐스트 그를 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.99-107
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication under electronic commerce. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

Relative Location based Risk Calculation to Prevent Identity Theft in Electronic Payment Systems (전자지불거래에서 상대위치와 연동한 도용 위험성 산출방법)

  • Suh, Hyo-Joong;Hwang, Hoyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.455-461
    • /
    • 2020
  • Electronic payment system using Internet banking is a very important application for users of e-commerce environment. With rapidly growing use of fintech applications, the risk and damage caused by malicious hacking or identity theft are getting significant. To prevent the damage, fraud detection system (FDS) calculates the risk of the electronic payment transactions using user profiles including types of goods, device status, user location, and so on. In this paper, we propose a new risk calculation method using relative location of users such as SSID of wireless LAN AP and MAC address. Those relative location information are more difficult to imitate or copy compared with conventional physical location information like nation, GPS coordinates, or IP address. The new method using relative location and cumulative user characteristics will enable stronger risk calculation function to FDS and thus give enhanced security to electronic payment systems.

The Popularization of True Self Tea Ceremony Using the Standard Web Protocol Technology (표준 웹 프로토콜 기술을 융합한 참나다례의 대중화)

  • Kim, In-Sook;Cho, Kwangmoon;Kim, Tae-Kook
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.253-258
    • /
    • 2017
  • Urbanization, industrialization, and informatization raised quality of life in modern society. However, many people face with social maladjustment phenomena of human alienation and loss of true self due to mechanization, competition and stress. To alleviate the social maladjustment, people should look for their true self and the self. Drinking tea may play an important role in bringing your true self and the self and be a vehicle for them to meet in daily life. Therefore, this study uses the standard web protocol technology to popularize the True Self Tea Ceremony which helps to enhance true self and self-respect. The True Self Tea Ceremony uses the basic utensils. The paper proposes the popularization of the True Self Tea Ceremony using the standard web protocol technology. Using the standard web protocol technology enhances the accessibility of users.

Factors that Influence the Sharing Intention of Vehicle and Sharing Behavior in China (중국에서의 자동차 공유의도 요인과 공유 행동에 관한 연구)

  • Zhang, Ji-Yun;Lee, Sang-Joon;Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.195-203
    • /
    • 2017
  • Sharing economy which is sharing and borrowing goods, space, and services as a social and economic activity based on the Internet and smart phones is a new research topic in convergence area. The most representative areas of shared economy are space sharing and vehicle sharing. This paper aims to explore the factors affecting sharing intention of vehicle. We have identified the independent variables which include economic benefit, social benefit, social influence, psychological benefit and perceived risk. We also have done how these variables affect on sharing intention. Unlike Korea, in China vehicle sharing is legally allowed and has a large scale economy. To prove the hypothesis, we performed questionnaire investigation in China and analyzed with SPSS program. The result of hypothesis is the followings: The economic benefit, psychological benefit, social influence and perceived risk are affects sharing intention, and social benefit is not affect sharing intention and sharing intention is affect sharing behavior.

Development of Guide and Facility Management App by using Augmented Reality and QR Code (증강 현실과 QR 코드를 이용한 안내 및 설비 관리 앱 개발)

  • Cho, Kwangmoon
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.245-249
    • /
    • 2014
  • An app based on the augmented reality and QR codes is developed in this paper. This app is for guidance to the harbor and management the facilities in ships. Using the smart device app people could receive guidance the course to visit Mokpo harbor and information for the port and ship's facilities. Through the utilization of smart devices, the app is easy to find the desired destination to and provide the convenience of tourists. In addition, by using the QR code people could see an explanation of the ship's facilities and write the inspection reports for the facilities.

An Understanding the Factors That Influence on Unconcern about Privacy Information (프라이버시 무관심에 영향을 미치는 요인에 관한 연구)

  • Jeong, Tae-Seok;Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.49-59
    • /
    • 2012
  • This study is to explain why internet users are unconcerned with their privacy information. For this purpose, this study focuses on the Nate.com case. Nate.com recently suffered from external intrusion. They announced this fact to their users. However, users did not leave the Nate.com. To explain the reason, this study used a combination of qualitative and quantitative techniques. The grounded theory approach was used to analyze responses to open-ended questions answered by 240 Nate.com users. Using these responses, a survey instrument was developed. Survey results were analyzed using structural equation modeling. The conclusions and implications are discussed.

A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step (분석단계에서 취약점 관리의 보안 요건 정의에 관한 연구)

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.75-80
    • /
    • 2015
  • Vulnerability management is in compliance with security policies, and then, this is to ensure the continuity and availability of the business. In this paper, the application vulnerability management and IT infrastructure of the system is that it must be identified. And a viable vulnerability management plan should be drawn from the development phase. There are many that are not defined vulnerability in the area of identification and authentication, encryption, access control in identification and classification of vulnerabilities. They define the area without missing much in technical, managerial, and operational point of view. Determining whether the response of the identified vulnerability, and to select a countermeasure for eliminating the vulnerability.

Big-Data Integration in Public Institutions for Supporting Start-up Businesses (창업지원을 위한 공공기관 빅데이터 통합)

  • Shin, Seong-Yoon;Kim, Do-Goan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1341-1346
    • /
    • 2015
  • Nowadays, many small businesses have experienced the failure of business or hardship. In this point, specific and integrated information for startup business should be required to decrease the rate of failure and to increase the rate of success. This study is to suggest the integration of various data which various public institutions have separately. For this purpose, it is to classify the data types in constructing big-data for start-up business and to suggest a way of data integration, analysis method, and web or services of information system for supporting startup businesses.

An Empirical Study of the Factors Influencing the Task Performances of SaaS Users

  • Park, Sung Bum;Lee, Sangwon;Chae, Seong Wook;Zo, Hangjung
    • Asia pacific journal of information systems
    • /
    • v.25 no.2
    • /
    • pp.265-288
    • /
    • 2015
  • IT convergence services, as the main stream of the digital age, are currently on their way to include the concept of Software as a Service (SaaS), where IT products and services are integrated as one. In particular, the recently introduced web-service-based SaaS is expected to be a more developed SaaS model. This new model provides greater influence on clients' job performances than its previous models, such as application service providers and the web-native phase. However, the effects of technology maturity on task performance have been overlooked in adoption and performance studies. Accordingly, this study introduces SaaS technology maturity as the exogenous technological characteristic influencing job performance. This study also examines the relationships among various SaaS-related performances according to the different levels of SaaS maturity. Results suggest that applying innovative technologies (such as SaaS), particularly when the technology reaches a certain level of maturity, is more helpful for managers in improving task-technology fit and job performance. This study makes an academic contribution by establishing and validating a performance model empirically with SaaS technology maturity perspectives.

Application Plan of Column-Family Stores in the Big Data Environment (빅데이터환경에서의 칼럼-패밀리 저장소 활용방안)

  • Park, Sungbum;Lee, Sangwon;Ahn, Hyunsup;Jung, In-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.237-239
    • /
    • 2013
  • Data so as to meet key values are preserved at Column-Family Stores such as Cassandra, HBase, Hypertable, and Amazon Simple DB in the Big Data environment. In this paper, with referring to Cassandra, we define column-family data stores and its structure. And then, we check out their characteristics such as consistency, transaction, availability, retrieval function (basic queries and advance queries) with CQL (Cassandra Query Language), and expandability. Also, we appropriate or inappropriate subjects for application of column-family stores.

  • PDF