• Title/Summary/Keyword: Mobile Financial Service

Search Result 140, Processing Time 0.023 seconds

O2O Market Expansion and Women's University Students of Current Use of Mobile Shopping and Financial Services (O2O 시장 확대와 여자대학생의 모바일쇼핑·금융서비스 이용 현황)

  • Hwang, Eui-Chul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.167-168
    • /
    • 2016
  • 2015년 대한민국을 관통하는 키워드 중 하나가 O2O (Online to Offline)이다. 대기업과 중소기업까지 O2O를 전면에 내세우고 새로운 비즈니스를 모색하는 기업들이 확대되고 있다. O2O 비즈니스 기업들의 업종도 모바일 메신저, 포털을 비롯한 인터넷 사업자, 통신사업자, 모바일 기기 제조사, 전자상거래 기업과 같은 정보통신기술(ICT) 관련 기업부터 유통기업까지 다양하다. 본 연구를 위하여 2014.5~2015.5 1년 간 여자대학생 92명의 '모바일 쇼핑 금융서비스 이용 현황' 조사를 실시하였다. 조사 결과, 상품정보검색(96.7%), 구매(88%), 주문 배송(77.2%), 할인 프로모션정보(62%) 등 모바일 쇼핑을 하였고, 모바일금융 서비스로는 하루에 1번정도 (20.4%), 월1~3회(20.4%), 1주 3~4회(16.3%), 이용 안하는 경우(24.5%)로 조사 되었다. 모바일 금융서비스를 이용하지 못하는 이유로는 개인정보보안 및 해킹우려(39%), 이용/결제 과정의 불편함(25.8%) 등 이었으며, 국내 O2O 플랫폼이 제공하는 서비스는 쇼핑부터 결제까지 완결적인 구조로 보완할 부분이 필수적이다.

  • PDF

A Comparative Study on the Structural Characteristics of Railway Reservation Mobile Applications in Korea and Czech Republic (한국과 체코의 철도 탑승권 예약 애플리케이션의 구조적 특성 비교연구)

  • Nam, Minkyung;Kim, Suktae;Kim, Tae-Sik;Jung, Eui Tay
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.8
    • /
    • pp.960-973
    • /
    • 2019
  • The increased use of smartphones has made it easier to plan travel. Especially for people travelling in Europe, it is common to move between cities by train, and reserving passes with a mobile app offers many advantages. The Czech Republic, which is a familiar destination for Koreans, is called the "heart of Europe" and it is in central Europe, so it is inevitable to use the railway when travelling. This study has been compared with the structural characteristics of the railway reservation service operated by the Czech and Korean railways. In general, when evaluating the usability of an app, we often use a method that allows a group of users or experts to spot problems. However, this study suggests an analytical method to obtain more reliable and objective results. Also, the analysis of the structural characteristics has an advantage that the problem can be predicted at the prototype stage. This, of course, comes with time and financial benefits. The purpose of this research is to contribute to the development of applications that are more convenient to use and efficiency of development.

Trend Analysis of FinTech and Digital Financial Services using Text Mining (텍스트마이닝을 활용한 핀테크 및 디지털 금융 서비스 트렌드 분석)

  • Kim, Do-Hee;Kim, Min-Jeong
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.131-143
    • /
    • 2022
  • Focusing on FinTech keywords, this study is analyzing newspaper articles and Twitter data by using text mining methodology in order to understand trends in the industry of domestic digital financial service. In the growth of FinTech lifecycle, the frequency analysis has been performed by four important points: Mobile Payment Service, Internet Primary Bank, Data 3 Act, MyData Businesses. Utilizing frequency analysis, which combines the keywords 'China', 'USA', and 'Future' with the 'FinTech', has been predicting the FinTech industry regarding of the current and future position. Next, sentiment analysis was conducted on Twitter to quantify consumers' expectations and concerns about FinTech services. Therefore, this study is able to share meaningful perspective in that it presented strategic directions that the government and companies can use to understanding future FinTech market by combining frequency analysis and sentiment analysis.

Fantastic Collaboration of Financial Services and Telecommunication: a Frontier Case of Integrated Marketing Communication of 'Club SK Card'

  • Lee, Seon Min;Chun, Seungwoo;Joo, Young Hyuck;Yoo, Changjo
    • Asia Marketing Journal
    • /
    • v.15 no.4
    • /
    • pp.223-241
    • /
    • 2014
  • In May 2012, the collaboration of Hana Bank, top financial service company, and SK Planet, top telecommunication service provider, introduced a new credit card that was filled with all-in-one benefits into the market. Leveraging strong infrastructure of two companies, each top in its own industries, the awareness and preference of 'Club SK Card' brand rapidly increased to about 25% in less than one year. Moreover, this new card was enthroned in the most sold credit card of year 2012, accounting for a market share of 7.2% in the credit card market and more than 80% in the mobile credit card market. To make these results possible, 'Club SK Card' marketing team developed an effective marketing communication strategy which followed the 6M model. The mission of the marketing communication strategy was simple and clear. It was to deliver the card's inherent strengths on consumer benefits that come from the support of subsidiary and affiliated companies of SK Planet. According to OK Cashbag data, the marketing communication team selected the appropriate target consumers and approached them directly, inducing actual purchase behavior. The target consumers received straightforward messages about 'Club SK Card' and were led to join in the new membership at their most frequently visited supermarket or franchise restaurant. The straightforward communication message embedded in an eye-catching commercial ad with a hook song accompanied with a dance was delivered via public media. The ad became so popular that many other television programs quoted or made parodies of the ad. Courtesy of the commercial ad, the brand name disseminated rapidly and widely among the public. In October 2012, an ingenious planning and persistent implementation of the communication strategy results 'Club SK Card' to be ranked top in brand awareness as well as advertising preference tests.

  • PDF

Secure One-Time Password Authentication in Mobile Environments (모바일 환경에서 안전한 일회용 패스워드 인증)

  • Kim, Dong-Ryool
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.423-430
    • /
    • 2013
  • With the active Internet e-commerce and the financial sector, mutual authentication between users and service providers has become very important. Because ID- and password-based authentication is of low security, one-time password authentication methods are widely used. The existing one-time password authentication scheme of S/Key authentication method is fraught with a number of issues in addition to plain text transmission, and the method of Kim Gong-ki et al. does not offer suggestions for session key generation and distribution method. Proposed in this paper is a protocol that solves these problems.

Advanced Information Security Management Evaluation System

  • Jo, Hea-Suk;Kim, Seung-Joo;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1192-1213
    • /
    • 2011
  • Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation.

Development of a Social Network Service Closely Coupled with Local Broadcasting Media

  • Kim, Hyeon Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.129-137
    • /
    • 2021
  • Recently, local broadcast companies are experiencing financial shortages and business deterioration due to difficulties in securing income sources. This is due to the continuous decrease in viewership ratings as the contents of the broadcast companies do not attract the interest and participation of local residents. To resolve this issue, this paper presents a social network service closely coupled with local broadcasting. In the proposed service, the exposure range of articles is limited to a region so that reporters could easily find the interests of local residents. In addition, among the articles written by local residents, the articles requested to be broadcast by reporters are placed at the top section of the main page. From this UI configuration, local residents can easily recognize that their opinions can be directly connected to the broadcast, which is intended to activate their participation. The proposed service was implemented in the form of a prototype system with JCN, a broadcasting company in Ulsan, and this paper discusses its user interfaces, system structure, and an algorithm to estimate the priority of the written articles.

A Study on Authentication Process in Smartphone Electronic Financial Services (스마트폰 전자금융서비스에서의 인증과정에 관한 연구(앱카드를 중심으로))

  • Kim, Hanwoo;Lee, Keun Young;Lim, Jong In;Kwon, Hun Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.579-590
    • /
    • 2018
  • In May 2014, AppCard(Which is a smartphone application designed to register and use a credit card in a mobile phone by credit card company.) was attacked by smshing and a vulnerability which could not obtainable phone number. After that, credit card companies have supplemented and operated by introducing additional authentication methods to supplement the vulnerability. However, The analysis of the authentication environments, purposes and methods is not enough to lower the level of vulnerability and risk from existing accidents. This study analyzes the authentication process of the AppCard in the electronic financial service by applying the NIST's authentication guidelines, identifies the problems and suggests improvement directions. The method analyzed in this study can be applied to the analysis of the authentication method in addition to the application card, so that it will be highly utilized.

Analysis of the Influence of Domestic Open Banking Quality Factors on Intention to Use (국내 오픈뱅킹 품질요소가 사용자 이용의도에 미치는 영향분석)

  • Jung, Bo-chun;Hong, Suk-ki
    • Journal of Internet Computing and Services
    • /
    • v.22 no.5
    • /
    • pp.69-77
    • /
    • 2021
  • The main channels of the financial industry are rapidly changing to mobile. In this environment, banks are focusing on information and communication technology to secure their competitiveness, and rapid innovation is being pursued especially in the payment settlement sector. In October 2019, Korea also introduced open banking services to accelerate the financial innovation, such as the open conversion of financial settlement networks and the expansion of the use of simple payments. In this paper, an empirical study was conducted on the effect of domestic open banking quality factors on usage intention. The service quality factors for open banking were classified into interface design, innovation, security, and data sharing, and the technology acceptance model (TAM) was used to verify whether it has a significant effect on perceived convenience, usefulness and intention to use. According to the analysis results, while innovation and security did not have a significant effect on convenience and usefulness, interface design and data sharing were found to have an effect on perceived convenience. The results would provide implications for some quality issues for companies seeking to introduce open banking services as well as for the related academic arena.

Implementation and Test of GPS Jamming Monitoring Equipment (GPS 교란 감시 장치 구현 및 시험)

  • Joo, Inone;Lee, Jeom Hun;Lee, Sanguk;Kim, Jaehoon
    • Journal of Satellite, Information and Communications
    • /
    • v.8 no.4
    • /
    • pp.95-99
    • /
    • 2013
  • GPS service is generally being used in the navigation application such as the car navigation and the smart phone. Recently, GPS service continues to increase in the timing application such as the mobile telecommunication network, the smart grid, and the financial network. As GPS signals are sensitive to GPS jamming, it should be monitored and protected. In oder to prevent and minimize the damage caused by GPS jamming, many countries are developing and operating GPS jamming monitoring system. This paper presents the implementation and the test results of the GPS jamming equipment which provides the detection, the direction finding and the location of GPS jamming.