• Title/Summary/Keyword: Mobile Stock Trading

Search Result 7, Processing Time 0.023 seconds

모바일 증권 서비스 이용에 관한 연구

  • Lee Min-Hwa;Kwon Hyun Young
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2003.05a
    • /
    • pp.55-73
    • /
    • 2003
  • As the development of wireless technologies continue, mobile stock trading has become a new channel for companies to reach their customers. This study examines the factors affecting customer acceptance of mobile stock trading services. The research model based on the previous studies was established and the research hypotheses were generated. The sample was divided into users and nonuser groups. The test results show that relative advantage and social influence are positively related to intention to accept mobile services as well as in intention to reuse, security risk is negatively related to intention to reuse, frequency of trading is positively related to intention to reuse, cost burden is negatively related to the probability of using mobile stock trading services, and social influence is positively related to the probability of using mobile services. The results also support that information quality and response time are positively related to relative advantage, and interface quality is negatively related to complexity. It is considered that the study results may help managers to increase customer use of mobile stock trading services.

  • PDF

Analysis of Security Vulnerability in Home Trading System, and its Countermeasure using Cell phone (홈트레이딩 시스템의 취약점 분석과 휴대전화 인증을 이용한 대응방안 제시)

  • Choi, Min Keun;Cho, Kwan Tae;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.19-32
    • /
    • 2013
  • As cyber stock trading grows rapidly, stock trading using Home Trading System have been brisk recently. Home Trading System is a heavy-weight in the stock market, and the system has shown 75% and 40% market shares for KOSPI and KOSDAQ, respectively. However, since Home Trading System focuses on the convenience and the availability, it has some security problems. In this paper, we found that the authentication information in memory remains during the stock trading and we proposed its countermeasure through two-channel authentication using a mobile device such as a cell phone.

Study on Low-Latency overcome of Stock Trading system in Cloud (클라우드 환경에서 주식 체결 시스템의 저지연 극복에 관한 연구)

  • Kim, Keun-Heui;Moon, Seok-Jae;Yoon, Chang-Pyo;Lee, Dae-Sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2658-2663
    • /
    • 2014
  • To minimize low latency and improve the processing speed of the stock trading system, various technologies have been introduced. However, expensive network equipment has limitation for improving speed of trading system. Also, it is true that there is not much advantage by introducing those kind of systems. In this paper, we propose a low-Latency SPT(Safe Proper Time) scheme for overcoming the stock trading system in a cloud. The proposed method minimizes the CPI in order to reduce the CPU overhead that is based on the understanding of the kernel. and this approach satisfies the data timeliness.

Elicitation of User-Centered Usability Attributes and Comparison of Attributes between User Group and Developer Group: Focus on Mobile Trading System (사용자 중심의 사용성 속성 도출과 사용자 그룹과 개발자 그룹 간의 속성 비교: 모바일 트레이딩 시스템 중심)

  • Lee, Woon-Kyo;Kim, Ja-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.53-79
    • /
    • 2021
  • With the revitalization of non-face-to-face transactions, the difference between the size of branches and transaction costs among securities firms has decreased, and the importance of the stock trading system has increased. In particular, the mobile trading system has become more important due to the increase in the proportion of transactions in the mobile trading system, which is widely used by individual investors, and the increase in the number of individual investors after COVID-19. However, user-centered usability studies are insufficient as usability studies on mobile trading systems are conducted through literature surveys or survey methods. Therefore, in this study, a repertory grid technique that finds user's empirical perception was used to find out user-centered usability attributes. The usability attributes of the mobile trading system from the user's point of view were elicited, and the difference in the usability attributes in terms of frequency and importance between the user group and the developer group was identified.

A study on the mobile Internet portal service types (무선인터넷 포털서비스의 유형과 유망 컨텐츠 분석 이동전화를 통한 무선인터넷을 중심으로)

  • 김주성;김태성;고석하
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.4
    • /
    • pp.151-164
    • /
    • 2002
  • This paper predicts how mobile Internet portal services will go ahead and what contents will be needed at the portal site. Mobile Internet interface needs to be concise and compressed because of the size of terminals Thus mobile internal service wants integrated portal service We study the service strategy for mobile internet portal Service according to the product life cycle Many Korean people who have used 'wired and fixed' Internet services and mobile phones want the mobile Internet portal to provide many attractive functions and high quality of service Thus we consider the current Korean mobile Internet service as the maturity phase of its life cycle The maturity phase needs the strategy of diversifying and focusing on, thus we recommend the hub portal model for Korean mobile Internet service, In this paper, we survey contents of mobile Internet portal service as a case study. With the result of the analysis, we present the promising contents as follows: video conference service, financial service, stock trading service, traffic information service, location map service, emergency rescue service, and so on.

  • PDF

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.