• Title/Summary/Keyword: Electronic Commerce Manager

Search Result 17, Processing Time 0.024 seconds

A Study on the Improvements of Qualification Items for Electronic Commerce Manager (전자상거래관리사 출제기준에 대한 개선방안 연구)

  • Cho, Se-Hyung;Lee, Jae-Won
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.2
    • /
    • pp.47-74
    • /
    • 2007
  • This research purpose to improve the qualification items for electronic commerce manager. Former qualification system for the electronic commerce manager was executed 11 times from year 2000 to 2005. To improve the standard for test questions and contents of qualification items, we reviewed literatures about job analysis for electronic commerce manager, electronic commerce curriculum, e-Business market and other countries' similar qualification systems and items. We also analysed the job related knowledge, skill, and abilities using job analysis by DACUM method, subject matter experts interview and workshop committee for development and validation of qualification items. Based on the results of job analysis and DACUM workshop, we derived a job model for electronic commerce manager and then validated it through field survey and additional expert review. Finally we developed and suggested an alternated qualification items using matrix analysis between categorized job knowledge and job tasks.

  • PDF

Development for Qualification Item of Electronic Commerce in National Technology Qualification (전자상거래관리사 직무분석에 관한 연구)

  • Hwang Seok-Hae;Cho Jeong-Yoon;Kim Duk-Ki;Park Jong-Sung
    • Journal of Engineering Education Research
    • /
    • v.4 no.2
    • /
    • pp.45-56
    • /
    • 2001
  • This paper is aimed to design for qualification structure and contents of Electronic Commerce Manager which was executed in the second half year of the 2000. To obtain research object. An analysis about e-business law was studied. Also experts of education and related field performed job analysis, on the basis of this study qualification structure and contents of Electronic Commerce Manager was designed and suggestions are proposed for the substantiality and activity. This research is performed through literature review, expert association, interview, and job analysis.

  • PDF

A Study on the Instance Management for EJB Server System (EJB 서버 시스템에서 인스턴스 관리 방법에 관한 연구)

  • Jung, Seung-Woog;Lee, Kyeong-Ho;Kim, Joong-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.2179-2182
    • /
    • 2002
  • EJB(Enterprise Java Beans)는 비즈니스 로직을 컴포넌트 형태로 작성하여 재 사용성을 향상시킨 서버 측 컴포넌트 모델로서, J2EE(Java2 Enterprise Edition)의 핵심이다. EJB는 컴포넌트를 특성에 따라 일반적인 비즈니스 로직을 나타내는 세션 빈(Session Bean), 데이터베이스에 저장된 데이터를 나타내는 엔터티 빈(Entity Bean) 그리고 JMS 메시지를 처리하는 메시지 드리븐 빈(Message-driven Bean)으로 구분한다. 이러한 빈들은 EJB 서버에 의해 관리된다. 본 논문에서는 EJB 서버에서 EJB 빈의 라이프 싸이클을 관리해주는 인스턴스 관리자(Instance Manager)에 대해 논의한다.

  • PDF

The Construction of Electronic Commerce infra for Bank usin Internet (인터넷에서의 금융권 전자상거래 인프라 구축)

  • 신현호;조범준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.131-137
    • /
    • 1999
  • In order to operate Internet Banking, there is a important thing to precede, That is to carry out a scheme of one-stop to let clients transact anything they want to buy and establish the preservation of public security system between existing banking networks. (of course, that should be designed handily to the clients). In this paper, the protocol which is determined between banking network and Internet to maintain the preservation of public security. In other words, each XPM(X.25 Packet Manager) is a program to manage both system security and service at each other side; manage all packets which are connected by X.25 protocol. If other condition like law and institution is improved, it will be adopted to real operation with various service. Further more, we tan construct Electronic Commerce and adopt various digital money like electronic coin or check.

  • PDF

A Design of Cache Manager for Contents Transcoding in Mobile Application Server (모바일 응용 서버에서 컨텐츠 변환을 위한 캐쉬 관리자의 설계)

  • Jang, Choul-Soo;Kim, Seong-Hoon;Byeon, Yeong-Cheol;Jang, Min-Su
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1407-1410
    • /
    • 2002
  • 무선 인터넷 환경에서 무선 인터넷 브라우징을 지원하는 휴대폰 단말기는 각 단말기 종류별로 표시 가능한 줄 수, 화면 넓이, 칼라 지원 여부 등과 같이 다양한 표현 능력을 갖고 있음에 따라, 휴대폰 단말기를 통해 클라이언트에 의해 요청된 해당 컨텐츠는 각 단말기의 표현 능력에 따라 응용 서버에 의해 적절하게 변환되어 클라이언트에게 제공되어야 한다. 그러나 변환 작업은 처리 시간이 매우 많이 소모되는 작업이므로 캐쉬를 이용하는 방법이 효율적이다. 그러나, 무선 인터넷 환경에서는 다양한 종류의 휴대폰 단말기가 존재하므로 변환된 컨텐츠는 오직 그 컨텐츠를 요청한 단말기에만 유효하도록 캐쉬에 저장되기 때문에 캐쉬에 대한 적중률이 매우 떨어질 수 있는 문제점이 있다. 본 논문에서는 무선 인터넷 환경에서의 이러한 캐쉬의 약점을 극복하기 위해, 모바일 환경의 응용 서버에서 다양한 단말기를 위한 컨텐츠 변환을 지원하면서도 캐쉬의 적중률을 높일 수 있는 방법을 제안하며 이에 대한 설계를 논한다.

  • PDF

A Threshold Ring Group Signature for Ubiquitous Electronic Commerce (유비쿼터스 전자거래를 위한 쓰레시홀드 링 그룹 서명)

  • Sung, Soon-Hwa
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.373-380
    • /
    • 2007
  • Ubiquitous electronic commerce can offer anytime, anywhere access to network and exchange convenient informations between individual and group, or between group and group. To use secure ubiquitous electronic commerce, it is essential for users to have digital signature with the properties of integrity and authentication. The digital signature for ubiquitous networks is required neither a trusted group manager, nor a setup procedure, nor a revocation procedure etc. because ubiquitous networks can construct or deconstruct groups anytime, anwhere as occasion demands. Therefore, this paper proposes a threshold ring signature as digital signature for secure ubiquitous electronic commerce using the ring signature without forgery (integrity) and the (n,t) ring signature solving the problem cannot prove the fact which a message is signed by other signer. Thus the proposed threshold ring signature is ubiquitous group signature for the next generation.

A Study on the Activation Plans of Business Incubators's E-Commerce (창업보육센터 입주기업 전자상거래 활성화 방안)

  • Kim, Jin-Su;Jang, Won-Chul;Hwang, Ki-Tae;Kim, Dae-Jin;Hwang, In-Ho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.2 no.1
    • /
    • pp.65-82
    • /
    • 2007
  • This aim of study is to offer three way(the E-commerce operations site, electronic catalog site, the E- commerce function improvement, the off-line E-biz revitalization) for E-commerce revitalization of business incubator center's resident enterprise through interview with business incubator center's resident enterprise, business incubator center's manager and the operation company of the COBIAN as E-commerce site of business incubator center. Solutions presented by business incubator center are considered from various angles to improve law perception in the COBIAN and to exchange contact information among BI companies in the COBIAN. And The solution emphasize an efficiency as well as an absolute investment to present the solutions that are able to do better important function as business incubator center than any other. furthermore, a business incubator center presents solutions for solving problems with small and medium enterprises as well as the COBIAN, which is doing E-commerce operation.

  • PDF

Design and Implementation of Dynamic Group Key Management Protocol for Multicast Information Security (전자상거래를 위한 멀티캐스트 그를 키 관리 프로토콜 설계 및 구현)

  • 홍종준;김태우
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.99-107
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication under electronic commerce. Each subgroup manager gives a secure key to it's own transmitter and the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepares to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after checking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. Therefore, transmission time is shortened because there is no need to data translation by the group key on data sending and the data transmition is possible without new key distribution at path change to shortest path of the router characteristic.

  • PDF

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.

A Study on E-trade Securities and Strategic Solutions (전자무역보안과 전략적 대응방안에 대한 소고)

  • Jung, Jo-Nam;Lee, Chun-Su;Kang, Jang-Mook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.577-584
    • /
    • 2004
  • Recently many company has been cracked by crackers information security and everyday new computer virus come out. so e-trade partners should prevent the disasters. A few studies researched e-trade securities broadly but the new trend in information security division especially focused on electronic payment, EDI, Transportation, Contracts, Insurances and that of subjects have been researched through interdisciplinary evolution. Our research e-trade security on three part, First system attack, second is data attack and third is business attack. the attacks have theirs own solution, so e-trade company use this solution timely and powerfully. It is the most important thing to prepare the cracking with securities system. also manager should catch recent hacking technologies. The research results propose that e-trade firms should use information security policies and securities systems that including H/W and S/W. therefore manager's security mind is very important and also using electronic commerce securities device and should be considered exploiting solutions by each special usage according to e-trade company' environments.