• Title/Summary/Keyword: Electronic Transaction

Search Result 448, Processing Time 0.022 seconds

A Multi-Agent Platform Capable of Handling Ad Hoc Conversation Policies (Ad Hoc한 대화 정책을 지원하는 멀티 에이전트 플랫폼에 관한 연구)

  • Ahn, Hyung-Jun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1177-1188
    • /
    • 2004
  • Multi-agent systems have been developed for supporting intelligent collaboration of distributed and independent software entities and are be-ing widely used for various applications. For the collaboration among agents, conversation policies (or interaction protocols) mutually agreed by agents are used. In today's dynamic electronic market environment, there can be frequent changes in conversation policies induced by the changes in transaction methods in the market, and thus, the importance of ad hoc conversation policies is increasing. In existing agent platforms, they allow the use of only several standard or fixed conversation policies, which requires inevitable re implementation for ad hoc conversation policies and leads to inefficiency and intricacy. This paper designs an agent platform that supports ad hoc conversation policies and presents the prototype implementation. The suggested system includes an exchangeable and interpretable conversation policy model, a meta conversation procedure for exchanging new conversation policies, and a mechanism for performing actual transactions with exchanged conversation policies in run time in an adaptive way.

The Development of a Mobile-based E-Bookstore system (모바일 E-Book Store System의 설계 및 구현)

  • Min, Gi-Hong;Jeon, Seung-Min;Kim, Song-Rae;Park, Dong-Won
    • The Journal of Engineering Research
    • /
    • v.6 no.1
    • /
    • pp.29-39
    • /
    • 2004
  • In the recent IT field, the biggest concerns may be Mobile environment. This means that it becomes part of our life: the Mobile is applied to the areas of teaching, studying, commercial transaction, entertainment etc. In this paper, we implemented Mobile E-BOOK bookstore using WEB, DB, and a Mobile technology. This system takes duplex from to be available in Mobile WEB environment by PDA and actuality WEB site under desk top environment. This paper have presented big possibility in terms of embodied electronic commerce based on the Mobile-based E-BOOKstore system that has not attempted yet commercially.

  • PDF

Performance Enhancement Architecture including Location Information Secrecy for HLR System (위치 정보의 보안성이 고려된 가입자 위치등록기 시스템의 새로운 구조)

  • 김자환
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.103-108
    • /
    • 2004
  • A Home Location Register(HLR) database system manages each subscriber's location information, which continuously changes in a cellular network. For this purpose, the HLR database system provides table management, index management, and backup management facilities. In this thesis, I propose using a two-level index method for the mobile directory number(MDN) as a suitable method and a chained bucket hashing method for the electronic serial number(ESN). Both the MDN and the ESN are used as keys in the HLR database system. I also propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. The insertion and deletion overhead of the chained bucket hashing method is less than that of the modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solvethe performance degradation problem caused by frequent registration-location operations. I also propose using additional attributes in the HLR database scheme for location information secrecy as a suitable security method.

  • PDF

Migration Strategies for the EDI Company to Web-based e-Business Frameworks (EDI 기업의 웹기반 e-비즈니스 프레임워크 전환 전략)

  • Kim Minsoo;Kim Dongsoo;Kim Hoontae;Yoon Jung-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.1
    • /
    • pp.103-120
    • /
    • 2005
  • The purpose of this research is to provide strategic guidelines for EDI transaction companies to migrate from EDI system to Web-based e-Business frameworks such as ebXML, RosettaNet and Web Services. Due to various limitations of EDI and evolution of Web technologies, a lot of firms want to adopt Internet based B2B standards However, they are seeking ways of migrating from EDI to open and public B2B frameworks smoothly not giving up existing EDI system at a time. Therefore, it is very important to provide migration strategies and guidelines for companies to migrate from EDI system to Web-based B2B frameworks. The strategic guidelines provided in this paper can be used as a practical guidance in developing migration strategies of EDI companies.

  • PDF

The effect of electronic commerce on the economy - logistics industry perspective - (전자상거래가 경제에 미치는 효과 - 물류 정보화를 중심으로 -)

  • 김범환
    • Proceedings of the Technology Innovation Conference
    • /
    • 1999.12a
    • /
    • pp.281-295
    • /
    • 1999
  • This paper analyses the effects of the increase of logistics outsourcing on the economy which are largely classified into three parts. The firm level and industry level are two among them which will be summarized below. The another is consumers level. On the fm level, the logistics outsourcing of a manufacturing firm not only helps to increase the efficiency of itself and but also confront the competitive environments by weakening the entry barriers, i.e., the emergence of contestable market. The reasons why the efficiency of the firm enhances are also largely divided into two parts. One is due to the reduction of inventory cost by replacing it by the information cost resulting from internet use. The other is owing to reducing the life cycle of production process by the emergence of virtual enterprises which are located in one point in De process of supply chain management. The weakening of entry barriers is directly affected by the drastic increase of internet users in twofold reasons: one is based on the restricted competitive characteristics due to the long-term transaction relationship between logistics providers and the companies who offer logistics services and the other, due to the weakening of the restriction of space and time. The effect of industry level is due to the transition of traditional to virtual vertical integration system The firms corresponding to a connection point in the process of supply chain management would try to realize both the scale of economy and the scope of economy for strengthening the competitiveness. We indicated above the emergence of contestable market however, it is a short-term phenomenon and result in the oligopoly market due to the entry barriers in the long-run sense.

  • PDF

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

A Study on Consumer Protection Measures and Actual State of Consumer Complaints in E-Commerce (전자상거래 소비자 피해실태와 소비자보호 대책에 관한 연구)

  • Moon, Tae-Hyun
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.69-80
    • /
    • 2003
  • The electronic commerce continues to grow dramatically. Also, consumer complaints and damages related to e-commerce grow rapidly. The analysis of consumer complaints showed that consumer of e-commerce tended to buy the various product categories including cloth and home appliance. The damages of delivery problem rapidly rose by 1,185.3%. In categories of transaction including of 'internet shopping mall', 'internet contents' and 'internet auction', about 90% of consumer damages was related to 'internet shopping mall' but consumer damages of 'internet contents' was anticipated to be increased in the near future. The major goods and services of damages was 'digital camera', notebook PC', 'internet game service' etc. Therefore, it is required to establish consumer protection measures to be prevent consumer fraud such as internet shopping mall, Halfplaza.com, and major goods and services of damages. Also, it is need to establish system of spontaneous consumer protection improving consciousness of e-commerce companies.

  • PDF

Design and Implementation of Modified Web Contents Detection System (웹 컨텐츠 변경 탐지 시스템의 설계 및 구현)

  • 김영선;장덕철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.91-97
    • /
    • 2004
  • As the electronic commercial transaction is being transacted by contents which can get an illegal intrusion from the outside, we sincerely require security for them. We must consider a protection countermeasure about intrusion from protection of the passive form to protection intrusion of the active one. So the security is required against hackers illegality intrusion into the contents. As soon as the intrusion happens about the contents, the tools providing the monitor of contents are required to minimize the damage to the systems. Modified web contents detection system in this paper prevents the loss of resources and manpower required through individually monitoring on the web. Also, this paper offers rapid support of security that it analyzes the weakness of contents security of the web environment and the cause of the problem with the leakage of information. So this system has the pur pose of protecting the weakness of contents security and the leakage of information.

  • PDF

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

"Q-Bone", a 3rd Generation Blockchain Platform with Enhanced Security and Flexibility (보안성 및 범용성이 강화된 3세대 블록체인 플랫폼 "큐본")

  • Im, Noh-Gan;Lee, Yo-Han;Cho, Ji-Yeon;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.791-796
    • /
    • 2020
  • In this paper, "Q-Bone", a 3rd generation blockchain platform with enhanced security and flexibility, was developed. As a 3rd generation blockchain platform, it exploits BP (block producer) to increase processing speed. It has many advantages as follows. It improves both security and speed by mixing RSA (Rivest-Shamir-Adleman) and AES (advanced encryption standard). It improves flexibility by exploiting gateway to convert between apps and blockchain with different programming language. It increases processing speed by combining whole transactions into one block and distribute it when too many transactions occur. It improves search speed by inserting sequence hash into transaction data. It was implemented and applied to pet communication service and academy-instructor-student matching service, and it was verified to work correctly and effectively. Its processing speed is 3,357 transactions/second, which shows excellent performance.