• Title/Summary/Keyword: Mobile Financial Information Systems

Search Result 66, Processing Time 0.02 seconds

A study on the ecosystem activation of mobile sector: focused on small and medium businesses (모바일 분야 생태계 활성화 방안 연구 : 중소기업을 중심으로)

  • Ahn, Jong-Chang;Lim, Chae-Young;Joe, Moon-Jeung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.390-398
    • /
    • 2017
  • In this study, we conducted a questionnaire survey for the purpose of finding a method of mobile sector ecosystem activation targeted at small and medium businesses (SMBs). Through the total of 204 responders consisting of business employees from each mobile sector, we analyzed the factors inhibiting the development of the mobile ecosystem and preventing the activation the mobile market, as well as conducting a diagnosis of the digital potential. This paper presented suggestions for searching for a systematic supporting strategy considering the short-term inhibitory factors (market structure improvement, financial support, etc.) and long-term orientation factors (personnel nurturing, strengthening of supporting role by governmental initiative) for the activation of the domestic mobile market. After measuring the digital potential, we found that domestic mobile SMBs have perceived the importance of the digital potential and have considered and readied themselves for the future market. The present survey found that if suitable digitalization can be accomplished for their firms' products and services, they have the ability and willingness to succeed in the market. However, they have a hard task ahead of them from adigital delivery perspective given the potential for digital disruptions.

A Study of Response and Plan to Decrease Damage of ISP Secure Payment (ISP 안전결제 서비스 피해를 최소화하기 ISP 대응방안 연구)

  • Kim, Byung-Man;Ma, Sangjun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.33-38
    • /
    • 2015
  • The damage to the security is increasing as public key-based ISP secure payment service is used in online banking payment system. Security technology aspect to ISP secure payment security has no special problems. But, security damage that occurs due to the simplicity of the payment system is a problem. In this paper, we propose response and plan for ISP secure payment service to minimize the damage that occurs due to the simplicity of a security settlement system. Proposed scheme is applicable to various billing systems such as secure payments, online payment, mobile payment, credit card. Proposed scheme is characterized in that can stably support the capabilities of the new billing system. Also, proposed scheme is to analyze the various security threats arising from the payment of the financial services and to describe response and plan technology.

  • PDF

Do Innovation and Relative Advantage Affect the Actual Use of FinTech Services?: An Empirical Study using Classical Attitude Theory (핀테크 서비스의 혁신성과 상대적 장점은 실질이용에 영향을 미칠까?: 고전적 태도이론을 이용한 실증 연구)

  • Se Hun Lim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.87-110
    • /
    • 2019
  • The Fintech services provide innovation to financial services users using various mobile devices and computers in wired and wireless communication environments. In this study, we develope a theoretical research framework to explain the psychology of Fintech services users based on a cognitive, affective, and conative framework. Using this framework, this study analyzes the relationships between the cognitive characteristics (i.e., innovation, relative advantage, ease of use, and usefulness), emotional characteristic (i.e., attitude), and behavioral characteristic (i.e., actual use) toward Fintech services users. This study conducted an online survey of people who have experienced using Fintech services. And the data of the collected Fintech services users was analyzed using structural equation model software (i.e., SMART PLS 2.0 M3). The results of the empirical analysis show the relationships between innovation, relative advantage, perceived usefulness, perceived ease of use, attitude, and actual use of Fintech service users. The results of this study provide useful information to improve the practical use of Fintech services users in the Internet of Things (IoT) environment.

Vulnerabilities and Countermeasures of Dynamic Virtual Keyboard in Android Banking Apps (안드로이드 은행앱의 동적 가상키보드에 대한 취약점 및 대응방안)

  • Cho, Taenam;Choi, SookHee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.1
    • /
    • pp.9-16
    • /
    • 2019
  • Smartphones are becoming a portable computer. As a result, even the most sensitive financial application services are now available anywhere on the smartphone. Compared to general PCs, smartphones communicate with external devices through various channels such as wireless internet, mobile communication network, Bluetooth, and NFC, and a wide variety of applications are provided. Therefore, if vulnerabilities exist, the possibility of attack damage increases. In this paper, we analyze the vulnerabilities of dynamic virtual keyboards used in login of banking apps of smartphones with various physical constraints and propose countermeasures.

Gradual Certification Correspond with Sensual Confidence by Network Paths (본인인증의 네트워크 경로와 감성신뢰도에 연동한 점진적 인증방법)

  • Suh, Hyo-Joong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.955-963
    • /
    • 2017
  • Nowadays, fintech becomes the key technology of the mobile banking and payments. Financial market is moved to fintech-based non-face-to-face trade/payment from traditional face-to-face process in Korea. Core of this transition is the smartphones, which have several sensitive sensors for personal identifications such as fingerprint and iris recognition sensors. But it has some originated security risks by data path attacks, for instance, hacking and pharming. Multi-level certification and security systems are applied to avoid these threats effectively, while these protections can be cause of some inconvenience for non-face-to-face certifications and financing processes. In this paper, I confirmed that it have sensible differences correspond with the data connection paths such as WiFi networks and mobile communication networks of the smartphones, and I propose a gradual certification method which alleviates the inconvenience by risk-level definitions of the data-paths.

The Effect of Perceived Customer Orientation on the Customer Intention in Fintech Service: Focused on the Technology Acceptance Model (핀테크 서비스에서 지각된 고객 지향성이 고객 의도에 미치는 영향: 기술수용 모델을 중심으로)

  • Jinyong Choi
    • Information Systems Review
    • /
    • v.23 no.1
    • /
    • pp.93-113
    • /
    • 2021
  • Service orientation and customer orientation are recognized as important success factors in service companies. However, these constructs are evaluated through self-diagnosis within the service company based on service delivery experience. For this reason, Fintech companies that provide financial services based on non-face-to-face channels such as mobile APP have limitations in evaluating their service orientation and customer orientation. Therefore, in this study, the perceived customer orientation is conceptualized so that service orientation and customer orientation can be evaluated through customer evaluation. In addition, the antecedents and consequences of the perceived customer orientation based on the technology acceptance model were demonstrated. As a result, it was confirmed the mediating effect of perceived customer orientation in the relationship between perceived ease of use and usefulness and customer's continuous use intention and word of mouth intention. This study laid the foundation for the Fintech companies that provide all financial services throughout non-face-to-face to measure their service orientation and customer orientation through customer evaluation and utilize them in establishing service operation strategies.

A Study on Modern Military Uniform Design (현대 군복 디자인에 대한 연구 -전쟁양상과 군복 디자인의 관계를 중심으로-)

  • Kwon, Sang-Hee;Ha, Ji-Soo
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.9 s.109
    • /
    • pp.143-156
    • /
    • 2006
  • The purpose of this study is to analyze changes in military uniform design according to the type of war in history and to suggest factors to be considered when designing military uniforms. Military uniform in this study has been limited to uniforms of land active soldiers and not only includes battle dress but also bombproof helmets, combat boots and webbing systems. Western military uniform was investigated starting from World War I focusing on the United States, United Kingdom, Germany and the Soviet Union, and Korean military uniform was analyzed starting from the Korean Day of Independence. Historical research, case studies and in-depth interviews were included in the study. World War I was a trench war. Khaki colors began to be used in battle dress, and steel helmets and gas masks were invented. World War II was a full-stale war. Many kinds of uniform were designed with various environments and roles of soldiers in mind, and camouflage was adopted in military uniform. Modern wars were wars of technique. Strong protectors were invented and diverse camouflages were adopted as rifles became increasingly accurate and biochemical weapons started to be used. Korea referred largely to the uniforms of the United States because it lacked both information on war and the financial power to invest in development of military uniforms. Finally, this study presents 5 factors to be considered when designing military uniforms: protection, camouflage, mobile and utility convenience, compatibility and symbolism. Wars of the future are predicted to be information wars utilizing realtime information collected through computers. Therefore new military uniforms with computers, communication devices and strong protective capacities need to be developed. This study aims to provide a theoretical basis for designing military uniforms of the future.

Effects of FIN-TECH use motivation on User Attitude and Word Of Mouth Intention: Focus on a Innovation Resistance Tendency and Type of Message (Rational, Emotional) (핀테크 이용 동기에 따른 이용자 태도와 구전의도의 관계 - 혁신저항과 메시지 유형의 조절효과 -)

  • Seol, Sang-Cheol;Jung, Sung-Gwang;Choi, Woo-Young
    • Management & Information Systems Review
    • /
    • v.36 no.5
    • /
    • pp.195-222
    • /
    • 2017
  • Today's economy is becoming more and more convergence between different industries as the demarcation of the boundaries of all areas is leading to innovations such as mobile and social network services. So Fin-tech is a new technology that can combine the advantages of mobile and Internet with the technology revolution to easily handle financial and IT tasks. This Fin-tech is a compound word of finance and technology. The purpose of this study is to investigate the overall structural relationship between Fin-Tech use motivation (usefulness, enjoyment) on user attitude and word of mouth intention. In addition, we investigated how FinTech use motivation, user attitude, and word of mouth intention change according to innovation resistance tendency. And, we examined how the motivation, user attitude, and word of mouth intention of FinTech change according to the message type (rational and emotional). The main results of this study are as follows. First, the usefulness and enjoyment of motivation for using FinTech have a positive effect on user attitude, and user attitude also has a positive effect on word of mouse intention. Second, the relationship between FinTech use motivation, user attitude, and word of mouth intention was found to difference according to consumers' innovation resistance. Third, it was found that the relationship between FinTech use motivation, user attitude, and word of mouth intention differs according to type of message (rational, emotional). At the conclusion of the study, the summary of the research results, implications and limitations, and future research direction are described.

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment (이종 네트워크 환경에서 다중 인터페이스 단말을 활용한 끊김 없이 안전한 서비스 프레임워크)

  • Yoon, Sung-Hun;Lee, Soon-Seok;Kim, Sang-Ha
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.53-65
    • /
    • 2011
  • As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.

A Model for Evaluating Technology Importance of Patents under Incomplete Citation (불완전 인용정보 하에서의 특허의 기술적 중요도 평가 모형)

  • Kim, Heon;Baek, Dong-Hyun;Shin, Min-Ju;Han, Dong-Seok
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.121-136
    • /
    • 2008
  • Although domestic research funding organizations require patented technologies as an outcome of financial aids, they have much difficulty in evaluating qualitative value of the patented technology due to lack of systematic methods. Especially, because citation data is not essential to patent application in Korea, it is very difficult to evaluate a patent using the incomplete citation data. This study proposes a method for evaluating technology importance of a patent when there is no or insufficient citation data in patents. The technology importance of a patent can be evaluated objectively and quantitatively by the proposed method which consists of 5 steps such as selection of a target patent, collection of related patents, preparation of key word vector, clustering patents, and technological importance assessment. The method was applied to a patent on 'user identification method for payment using mobile terminal' in order to evaluate technology importance and demonstrate how the method works.

  • PDF