• 제목/요약/키워드: M-payment

검색결과 122건 처리시간 0.027초

베트남 모바일결재시스템 수용의도에 영향을 미치는 요인에 관한 실증연구 (An Empirical Study on Factors Affecting Customer Intention to Use Mobile Payment System in Vietnam)

  • 응엔프엉이;이성택;강위만;김정석;김광용
    • 한국IT서비스학회지
    • /
    • 제14권4호
    • /
    • pp.171-184
    • /
    • 2015
  • Nowadays, mobile commerce is having an increasingly profound impact on our daily lives, and offer interesting and advantageous new services. Mobile payment is an emerging and important application of mobile commerce in smart work, enabling users to use their mobile devices (especially mobile phones) for paying goods and services wherever they go. The appearance of m-payment is expected to provide us a convenient and bright future to enjoy. That is the common trend on over the world, but in Vietnam, although the number of smart phone users has been increasing rapidly, the adoption of m-payment system still didn't succeed completely. The research reviewed literature regarding mobile payment services, analyzed the impact of customer characteristics and system characteristics on m-payment adoption in Vietnam. To analyze the adoption behaviors of m-payment users, m-payment research model which consists of three customer-characteristics (m-payment trust, personal innovativeness, m-payment knowledge) and four m-payment system characteristics (mobility, reachability, convenience, compatibility) were studied. The results indicate that perceived usefulness, trust, and compatibility are the important predictors to the intention to use m-payment. This study will assist m-payment services suppliers in implementing appropriate business models and service strategies to successfully attract customer to use m-payment in Vietnam, allowing managers to exert appropriate investment, time, and effort for m-payment system development in designing smart working.

Gamification on Mobile Payment Application: Uses and Gratification Perspective

  • Mutia Fadhila Putri;Ratna Juita;Achmad Nizar Nidayanto;Dedi I. Inan
    • Asia pacific journal of information systems
    • /
    • 제32권4호
    • /
    • pp.750-769
    • /
    • 2022
  • Indonesia has the largest potential mobile payment (m-payment) market in Southeast Asia. The government has realised this through Government's National Non-Cash Movement to increase its adoption. This is then followed up by advocating its adoption massively. However, for this movement to be a success, ensuring its continued use is critical. Various studies have attempted to contribute to this issue. Incorporating game elements into the application that brings benefits and satisfaction to its user is envisaged as one of the most feasible ways. This study, therefore, sets out to investigate the effects of gamification on the m-payment application, which drive the intention to continued use by employing the Uses dan Gratification Theory (UGT). A total of 826 m-payment users were gathered to be analysed using Structural Equation Modelling. The results show that utilitarian, hedonic and social gratifications have significant effects on the continuance usage intention of m-payment. Theoretically, this study contributes to the literature by showing that gamification applied in the payment significantly affects the m-payment continuance usage intention. Practically, this research informs the m-payment providers to maintain the gamification elements in their applications to ensure their sustainable use. Limitations and future research directions are also discussed.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권1호
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

M-Commerce 보안 플랫폼상의 무선 전자지불시스템 설계 및 구현 (Design and implementation of Mobile Electronic Payment Gateway System based on M-Commerce Security Platform)

  • 김성한;이강찬;민재홍
    • 한국전자거래학회지
    • /
    • 제7권1호
    • /
    • pp.35-50
    • /
    • 2002
  • Recently, payment method is one of the most hot issues for transaction of contents in mobile and internet markets. Many kinds of mobile contents services are rapidly growing with the combination of internet application services. Payment method algorithms are demanded for the stable transaction between producer and consumer. Security protocol algorithms are widely adapted for mobile Platform terminals. In this Paper, we described security mechanism for the current wireless internet services and compared with the performance result. There are security protocols that based on java machine platform or WAP protocols. The system is based on J2ME technology for the java mobile platform. Based on this technology, a security system is proposed for the service of mobile commerce electronic payment. The system is designed for the stability of transaction so that it enables to apply into many kinds of internet payment system.

  • PDF

IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구 (Implementation of Offline Payment Solution using USIM in IMT-2000)

  • 백장미;하남수;홍인식
    • 한국멀티미디어학회논문지
    • /
    • 제6권5호
    • /
    • pp.849-860
    • /
    • 2003
  • 모바일 기기의 사용이 증가하면서 E-Commerce에서 M-Commerce로 변화하고 있다 특히 IMT-2000(International Mobile Telecommunication 2000) 서비스가 준비중에 있으며, USIM(Universal Subscriber Identi쇼 Module) 기술을 내장함으로써 서비스의 폭이 넓어질 전망이다. 그러나 아직 USIM을 내장하는 서비스는 미흡한 단계로써 기본적인 애플리케이션의 개발조차 미비한 상태이다. 따라서 본 논문에서는 USIM의 전반적인 구조와 프로토콜의 분석을 통하여, 모바일 기기와 USIM 상에서 안전하게 지불할 수 있는 지불 솔루션을 제안한다. 특히 모바일 기기의 유동성과USIM의 안전성 및 계산능력, 저장능력을 이용하여 오프라인 상에서 안전하게 거래할 수 있는 시스템을 제안한다. 또한 제안한 시스템의 유효성을 입증하기 위하여 Jana Card 상에서의 지불 시스템을 개발하여 시뮬레이션 한다.

  • PDF

모바일 전자상거래를 위한 ID 기반 지불 프로토콜 (ID-based Payment Protocol for Mobile Electronic Commerce)

  • 이현주;김선신;이충세
    • 한국정보과학회논문지:정보통신
    • /
    • 제31권4호
    • /
    • pp.405-413
    • /
    • 2004
  • M-commerce가 활성화되기 위한 주요 요건 중의 하나는 안전성과 효율성을 갖춘 전자 지불 시스템을 개발하는 것이다. 본 논문에서는 ID 기반 공개키 암호 시스템을 이용하여 다중 거래에 적용할 수 있는 효율적인 소액 지불 프로토콜 (Micro-Payment Protocol)을 제안한다. 기존의 PayWord 시스템은 다수의 판매자와 거래를 하기 위해 매번 판매자의 인증서를 생성하였다. 본 논문에서는 인증서 대신 유한체 $F_q$에서 타원곡선(Elliptic Curve Cryptosystem)을 이용한 Weil pairing에 의해 생성된 세션키를 거래에 사용하기 때문에 알려진 키 공격(Known key attacks)과 위장 공격(Man-in-the-middle attacks)에 안전하다.

M2M에서 무선충전 시스템의 보안 위협 (A Security Threats in Wireless Charger Systems in M2M)

  • 이근호
    • 한국융합학회논문지
    • /
    • 제4권1호
    • /
    • pp.27-31
    • /
    • 2013
  • 최근 IT기술의 발전에 따라 언제 어디서나 이용할 수 있는 M2M기반의 무선 충전 분야의 기술 개발이 빠르게 진행되고 있다. M2M에서 무선충전기술은 무선 네트워크를 기반으로 하기 때문에 다양한 보안의 위협요소가 발생된다. 본 논문에서는 무선 충전 시 무선 네트워크 공격 기반의 인증 및 지불 공격에 대한 위협을 알아보고, 기존의 인증 및 지불을 위하여 무선충전 서비스 상황에 맞는 대응 기법을 제안한다.

M-Commerce보안기술동향

  • 류재철
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 2002년도 e-Biz World Conference
    • /
    • pp.214-220
    • /
    • 2002
  • 안전한 지불 : M-Payment, M-Cash, M-Banking... 안전한 통신 : TLS, WTLS, ... 인증기술 : Wireless PKI, Smart Card, ... 암호화 기술 : 관용 암호 알고리즘, 공개키 알고리즘, 해쉬 함수 무선인터넷 기술 : WAP, HTTP, ...(중략)

  • PDF

고객의 체류시간의존 보상에 기반한 M/M/1 대기행렬 시스템에서의 최적 가격책정 전략 (An Optimal Pricing Strategy in An M/M/1 Queueing System Based on Customer's Sojourn Time-Dependent Reward Level)

  • 이두호
    • 한국콘텐츠학회논문지
    • /
    • 제16권7호
    • /
    • pp.146-153
    • /
    • 2016
  • 본 연구에서는 연속시간 M/M/1 대기행렬 시스템에서 고객들의 평형행동과 서버의 최적 가격책정 전략에 대해 다룬다. 본 연구에서는 두가지 유형의 가격지불 모형을 고려한다. 첫 번째로, 정액지불 모형은 고객의 시스템 내 체류시간에 관계없이 고정된 요금을 부과한다. 두 번째로, 정률지불 모형은 고객의 시스템 내 체류시간에 비례하여 요금을 부과한다. 각 지불 모형에서 시스템을 이탈하는 고객의 보상은 체류시간에 반비례한다. 본 연구는 각 가격지불 모형에서 단위시간당 서버의 기대수익을 최대화하기 위한 가격책정 전략과 그 전략에 따른 고객의 시스템 입장행동에 대해 분석한다. 마지막으로 수치예제를 통해 정액지불 모형과 정률지불 모형을 비교분석하고, 서버측면에서 어떤 가격지불 모형을 선택해야하는 지를 살펴본다.

Theoretical Grounding of Perceived Risk in Adoption of Mobile Payment System and Behavioural Intention

  • Bharti Ramtiyal;Deepak Verma;Ajay Pal Singh Rathore
    • Asia pacific journal of information systems
    • /
    • 제31권4호
    • /
    • pp.543-574
    • /
    • 2021
  • This study focuses on a better understanding of the importance of risk perception in adopting Mobile Payment Systems (MPS) by conducting a systematic literature review. From the social science field (using Scopus and Web of Science database) articles were selected. Overall, forty-four significant pieces were determined using a systematic methodology. In addition to providing a summary of the most used theories used to address perceived risk in MPS this paper also investigates the definition for the perceived risk in MPS literature. The study is performed through the identification of dominant theories used to explain perceived risk in the literature. The article gives a thematic analysis of theories and the relation of perceived risk with behavioural intention. As far as we know, this is the first effort of its kind to give a holistic, systematic literature review in light of perceived risk in MPS. Consequently, it is a crucial first step in establishing a solid theoretical framework involving the constructs of perceived risk and laying the groundwork for future research in this area.