• Title/Summary/Keyword: Electronic Trust

Search Result 222, Processing Time 0.02 seconds

The Impact of Trust on Electronic Commerce Between Companies and Consumers (신뢰도가 기업대 소비자간 전자상거래에 미치는 영향 연구)

  • 박치관;박준병;김응규
    • Journal of Information Technology Application
    • /
    • v.1 no.3_4
    • /
    • pp.47-67
    • /
    • 1999
  • 전자상거래가 기대보다 미진한 여러 가지 이유들 중의 하나가 가상시장이 전통적인 시장에 비해서 본질적으로 제약이 있고, 아직은 그 제약을 극복할 수 있는 제도적인 장치가 구현되지 못했다는 점을 들 수 있다. 가상공간에서는 전통시장에서처럼 거래쌍방이 직접 만나서 상대방을 확인하거나 실물의 품질을 확인하고, 대금을 지불하면 바로 현물이 확보되는 것이 아니다. 그러므로 전통적인 시장에서의 거래습관에 익숙해진 소비자들로는 새로운 제도가 주는 파격적인 이익을 얻어서 경험해보거나 가상공간의 약점이 제도적으로 보완되기 이전에는 전자상거래에 대한 확산을 얻기가 쉽지 않을 것이다. 이는 거래행위에 있어서 신뢰도와 관계된 문제로, 본 연구는 신뢰도가 인터넷을 통한 구매행위에 어떻게 영향을 미치는 지를 규명하고, 신뢰도를 구축하기 위한 제도적인 방안들을 모색해봄으로써 초창기 전자상거래를 시도하려는 기업들과 전자상거래의 정책결정을 하게될 담당자들에게 몇 가지 시사점을 제공하고자 수행되었다. 본 연구의 실증조사에 의하면 전체적으로 신뢰도는 전자상거래 이용도에 유의적인 영향을 미치는 것으로 나타났다.

  • PDF

A Multi-Agent Negotiation System with Negotiation Models Changeable According to the Bargaining Environment

  • Ha, Sung-Ho;Kim, Dong-Sup
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.1
    • /
    • pp.1-20
    • /
    • 2009
  • Negotiation is a process of reaching an agreement on the terms of a transaction. such as price, quantity, for two or more parties. Negotiation tries to maximize the benefits for all parties concerned. instead of using human-based negotiation. the e-commerce environment provides such an environment as adopting automated negotiation. Thus. choosing agent technology is appropriate for an automatic electronic negotiation platform. since autonomous software agents strive for the best deal on behalf of the human participants. Negotiation agents need a clear-cut definition of negotiation models or strategies. In reality, most bargaining systems embody nearly one negotiation model. In this article. we present a mobile agent negotiation system with reusable negotiation strategies that allows agents to dynamically embody a user's favorite negotiation strategy which can be preinstalled as a component in the system. We develop a prototype system, which is fully implemented in compliance with FIPA specifications, and then. describe the benefits of using the system.

  • PDF

Applied Practices on Blockchain based Business Application

  • Park, Bo Kyung
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.198-205
    • /
    • 2021
  • With the development of blockchain technology, the scope of blockchain applications has expanded rapidly. Blockchain decentralization allows transaction participants to make transparent and safe transactions without a third trust agency. A distributed ledger-based system enables transparent and trusted business for anonymous users. For this reason, many companies apply blockchain to various fields such as logistics, electronic voting, and real estate. Despite this interest, there are still not enough case studies confirming the potential of blockchain as a concrete business model. Therefore, it is necessary to study how blockchain technology can change the existing business model and connect it to a new business model. In this paper, we propose blockchain-based business models and workflow types in various fields such as healthcare, logistics, and energy. We also present application cases. We expect to help companies apply blockchain to their business.

The Effect of eWOM Information Characteristics and Brand Community Experience Value on Brand Trust, Conversion

  • HAN, Sang-Seol
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.4
    • /
    • pp.35-49
    • /
    • 2022
  • Purpose - According to the recently changing consumer smart environment and consumer decision-making process, this study investigates the structural relationship between electronic(online) WOM information characteristics and brand community experience value types on specific brand reliability and brand transformation. In particular, the characteristics of word of mouth information and the experience value of brand community users were divided into detailed fac tors and approached. Methodology - In order to proceed with this study, we review previous studies and setting hypotheses. The hypothesis was verified through a survey that was conducted for the consumers with online consumption activities in less than six months. With reference to previous studies, operational definition was made for the questionnaire design. In order to verify the hypothesis, 282 people were statistically analyzed through the survey This data were used for AMOS for confirm hypothesis established. Results - eWOM information characteristics were classified into usefulness, timeliness and un-bias, and online community experience values were classified into interaction, playfulness, and virtuality. In addition, it is to investigate the relationship between the brand reliability and user's experience value in brad community. The main results are as follows. The first result was that usefulness and un-bias, which are the eWOM information characteristics had a positive effect on forming brand reliability. However, the factor of timeliness did not affect brand reliability. Second, in terms of user experience value and brand reliability in the brand community. It was fo und that experience values such as interaction, playfulness, and vituality all had a positive influence on brand reliability. Third, it was found that brand reliability has a positive influence on the on-line conversion activity of users. Conclusions - Through this study, the field of online consumer behavior research is expanding, and this study suggested that careful management is necessary according to the type or characteristics of eWOM information. Additionally, it presents the importance of the user's empirical value in the brand community influencing brand attitude and reliability. In practice, the implementation of the marketing communication mix in digital marketing has recently been underway to enhance the conversion behavior of users. At this level, it also reveals the preceding factors that increase user conversion behavior.

Applying the AHP approach to evaluate Mobile Commerce Environment (AHP 기법을 이용한 모바일 상거래 환경의 평가)

  • Oh, Gi-Oug
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2308-2314
    • /
    • 2006
  • Internet Technology allowed general commerce to have proceeded actively, and now it is sharply evolving into Mobile Commerce. Mobile Commerce came into an inheritance of the Electronic Commerce, thought the feature to be different form is various as well. Many researches that analyzed the feature of Electronic Commerce were carried out but those were processed according to its location and field only. This study extracted and analyzed the factor that considered the several positions for Mobile Commerce so that it can reflect diverse the demands from those related to Mobile Commerce. It sought the new characteristic which is different from the Electronic Commerce, and took account of the successful factor for Mobile Commerce which includes the position in a user, a developer and an operator. In addition AHP (Analytics Hierarchy Process) was used in order to evaluate the subject characteristic applied to each related to through more objective methods. The analysis results identified in this study such as the quality trust and understandability for an information duality might be the one of the chief elements of success in Mobile Commerce which applies at the present.

Vulnerability Analysis on Digital Signature Function of Word Processors (워드프로세서의 전자서명 기능에 대한 취약성 분석)

  • Lee, Chang-Bin;Park, Sun-Woo;Lee, Kwang-Woo;Kim, Jee-Yeon;Nam, Jung-Hyun;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.109-118
    • /
    • 2011
  • Recently, electronic documents are deployed in many areas. However, trust concerns arise owing to the fact that detecting whether an electronic document is modified or not is not an easy process. To facilitate this process, many word processors provide digital signature capabilities on themselves. However, there were not much research on the security of digital signature function of various programs including Microsoft Word and Hancom Hangul. Therefore, in this paper, we analyze the security of Microsoft Word and Hancom Hangul, and propose improvements for their digital signature schemes.

A Study on improvement for a means of access to electronic financial service (전자금융서비스 접근매체 변화에 따른 법제도 개선방안)

  • Han, Se Jin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.17-22
    • /
    • 2015
  • As financial deregulation policies implemented by the government, electronic financial service is improved but security concerns are increasing and ultimately weaken trust in the financial service. Electronic financial service becomes more and more dependant on the IT platform and the initiatives of access device is also gradually shift to that platform. As biometric sensor is mounted on the smartphone, structural change in the access device is coming. It must be a positive signs in terms of fintech development, in the other side, it can cause many problems such as weakness of regulation and ambiguity of principals of responsibility. So in this paper, by analysing this problem-the shift of service initiative-on the access device I'll propose the best way to the the legal amendments.

Interval Type-2 Fuzzy Logic Control System of Flight Longitudinal Motion (항공기 종 제어를 위한 Interval Type-2 퍼지논리 제어시스템)

  • Cho, Young-Hwan;Lee, Hong-Gi;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.2
    • /
    • pp.168-173
    • /
    • 2015
  • The flight control of aircraft, which has nonlinear time-varying dynamic characteristics depending on the various and unexpected external conditions, can be performed on two motions: longitudinal motion and lateral motion. In the longitudinal motion control of aircraft, pitch and trust are major control parameters and roll and yaw are control ones in the lateral motion control. Until now, a number of efficient and reliable control schemes that can guarantee the stability and maneuverability of the aircraft have been developed. Recently, the intelligent flight control scheme, which differs from the conventional control strategy requiring the various and complicate procedures such as the wind tunnel and environmental experiments, has attracted attention. In this paper, an intelligent longitudinal control scheme has been proposed utilizing Interval Type-2 fuzzy logic which can be recognized as a representative intelligent control methodology. The results will be verified through computer simulation with a F-4 jet fighter.

A Voter Verifiable Receipt in Electronic Voting with Improved Reliability (전자투표 신뢰성 향상을 위한 투표자 검증용 영수증 발급 기술)

  • Lee Kwang-Woo;Lee Yun-Ho;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.119-126
    • /
    • 2006
  • In order to improve voters' reliability in electronic voting system, voter verifiable receipt technique is being actively researched. Since the receipt should be verifiable not only inside but also outside a polling place, it satisfies the requirements, individual verifiability and receipt-freeness. In the previous researches, there are some problems that special paper and printer is necessary or frequent monitoring is needed to confirm the voting machine's trustworthiness. In this paper, we propose a new receipt issuing scheme. Our scheme does not require any special equipments such as special paper and printer or optical scanner. In addition to that it does not require voters to trust any devices in the polling station and there is no need of frequent observations to the voting machines.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.