• Title/Summary/Keyword: Mobile Transaction

Search Result 226, Processing Time 0.025 seconds

Analysis of the Valuation Model for the state-of-the-art ICT Technology (첨단 ICT 기술에 대한 가치평가 모델 분석)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.705-710
    • /
    • 2021
  • Nowadays, cutting-edge information communication technology is the genuine core technology of the fourth Industrial Revolution and is still making great progress rapidly among various technology fields. The biggest issue in ICT fields is the machine learning based Artificial Intelligence applications using big data in cloud computing environment on the basis of wireless network, and also the technology fields of autonomous control applications such as Autonomous Car or Mobile Robot. Since value of the high-tech ICT technology depends on the surrounded environmental factors and is very flexible, the precise technology valuation method is urgently needed in order to get successful technology transfer, transaction and commercialization. In this research, we analyze the characteristics of the high-tech ICT technology and the main factors in technology transfer or commercialization process, and propose the precise technology valuation method that reflects the characteristics of the ICT technology through phased analysis of the existing technology valuationmodel.

Effects of Consumer Trust and Perceived Usefulness on Mobile Payments and Online Shopping Website Loyalty (간편결제 서비스에 대한 지각된 유용성 및 신뢰가 결제 및 쇼핑몰 충성도에 미치는 영향)

  • Han, Jin-Hee;Jae, So-Hyun;Kim, Bo-Hyun;Park, Jee-Sun
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.75-87
    • /
    • 2015
  • The current study examines whether consumers' perceived usefulness of and trust in the integrated mobile payments services positively influence consumer loyalty to the payments system as well as to the online shopping websites where they have used the payments system. Moreover, the study investigates the effects of individual characteristics and brand awareness of the provider of mobile payments on perceived usefulness and trust. Online survey was administered to consumers ranging in age from 20s to 40s. Data analysis reveals that as consumers' perceived usefulness of and trust in the mobile payments system positively influence consumer loyalty to mobile payments and shopping mall websites. The results of the study suggests that e-commerce's user interface design, particularly the transaction system, should receive greater attention as a basic web element of e-commerce building rather than a set of plug-ins or so.

A Study on the Intention to Use Biometric Authentication When Using Mobile Easy Payment Service: Focusing on the Comparison of Experienced and Non-Experienced Persons (모바일 간편결제 서비스 이용 시 생체인증 사용의도에 관한 연구: 경험자와 비경험자 비교를 중심으로)

  • Jae-Seung Ju;Won-Boo Lee
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.1-22
    • /
    • 2021
  • In the newly encountered economy caused by the Corona virus Disease-19, remote transaction becomes a new normal that disrupt traditional economic order. In the middle of the disruption, mobile tech is placed and remote finance on mobile is highly noticed and considered as an infra-tech to support the new ecology, In mobile finance. remote payment is becoming the most common service and personal identification on it is critical to operate the new service. There are various means of remotely identifying a person. Recently the use of biometric information is increasing. In this study, a correlation analysis was conducted on factors that effects to biometrics usage and the intention to use in remote personal identification. Variables for critical factor in the remote identification were classified into 4 groups such as Performance expectancy, Effort expectancy, Social influence, and Security. The empirical analysis based on the Unified Theory of Acceptance and Use of Technology (UTAUT) was conducted. The relationship between variables and the intention to use is also analyzed. In the study, stepwise regression analysis was conducted four times in which variables were adjusted in individual stage. As a result, the analysis suggests that performance expectancy, effort expectancy, social influence, security have positive effects for intention to use. Additionally, effort expectancy and security have moderating effects to intention to use depends on biometric authentication experience. The analysis has shown positive effect of variables grouped on the intention to use them. It also suggests that the intention to use biometric authentication will quickly grow. This study is expected to make a contribution to utilize and improve the use of biometric information in mobile payment.

Core Competency of Content Intermediary and Improvement in Content Distribution Channel: Focused on Broadcasting Content Download Market (온라인 방송콘텐츠 유통 중개업자의 핵심 역량과 유통구조 개선효과에 관한 사례 (방송콘텐츠 다운로드 시장을 중심으로))

  • Kim, Yoo-Jung;Kim, Kwan-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.254-266
    • /
    • 2011
  • Wired and mobile Internet has led to increase in online broadcasting content market size. In particular, the fast-growing smart devices like smart phone and tablet PC in mobile Internet market has accelerated the growth of online broadcasting content service market. Meanwhile, the illegal distribution of online broadcasting content has been widespread in this market. There are also significant transaction costs, search costs, contracting and coordination costs in online broadcasting content market. MCP(Master content provider) which is a content distributor has been playing a critical role in preventing illegal content distribution, reducing costs and removing inefficiencies of online broadcasting content market. Thus, the purpose of this study is to investigate the competency of MCP to streamline the online broadcasting contents market from the resource- based view. And this study conducted a case study to explain the status of online broadcasting content market and define what kinds of problems and issues are there in the market in a systematic way. The case study also showed how MCP competency plays an important role in reducing administrative and transaction costs and in solving illegal content distribution and other inefficiencies of the online broadcasting contents market.

A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain (NFC 기반 FIDO(Fast IDentity Online) 및 2 Factor 기술과 허가형 분산원장 블록체인을 이용한 모바일 갤러리 경매 방안 제안)

  • Noh, Sun-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, studies have been conducted to improve the m-commerce process in the NFC-based mobile environment and the increase of the number of smart phones built in NFC. Since authentication is important in mobile electronic payment, FIDO(Fast IDentity Online) and 2 Factor electronic payment system are applied. In addition, block-chains using distributed raw materials have emerged as a representative technology of the fourth industry. In this study, for the mobile gallery auction of the traders using NFC embedded terminal (smartphone) in a small gallery auction in which an unspecified minority participates, password-based authentication and biometric authentication technology (fingerprint) were applied to record transaction details and ownership transfer of the auction participants in electronic payment. And, for the cost reduction and data integrity related to gallery auction, the private distributed director block chain was constructed and used. In addition, domestic and foreign cases applying block chain in the auction field were investigated and compared. In the future, the study will also study the implementation of block chain networks and smart contract and the integration of block chain and artificial intelligence to apply the proposed method.

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

XML Document Encrypt Implementation using Elliptic Curve Cryptosystem (타원곡선 알고리즘을 이용한 XML 문서 암호 구현)

  • Ko, Hoon
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2007
  • As the use of the computer and networks generalized, the various tasks which are requested secrets can be processed such os the banking transaction. And because of increasing of data exchange, Internet, and mobile networks, the method which is not connected only but also used with many users has been changed. Especially because of the structural problem of the Internet, a lot of information is leaked out when we use the Internet banking. If we check the Internet banking by using an existing cypher method which is either simple of slow, a credit card number, an account number or password will be leaked out. Because the security of information doesn't meet our expectation, we need more powerful cryptography. But, the wasted space-time which is required shouldn,t be ignored when the whole transferred data are encrypted. So, by using both the Elliptic Curve algorithm which is based on mobile networks and the partial encryption of the DTD of XML in this essay, we will implement more faster cypher method of the partial XML.

  • PDF

A Design of Mobile Web Server Framework for SOAP Transaction and Performance Enhancement in Web2.0 (웹2.0에서 SOAP 처리와 성능 향상을 위한 모바일 웹 서버 프레임워크의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1866-1874
    • /
    • 2008
  • Existing web server lowers the whole capacity of system because of the problem on the processing load of server by closing connection increasing code handshake operation, and remarkable decrease of server capacity if it is the state of overload. Also, there occurs disadvantages of increasing connection tine about client's request and response time because handling of client's multi-requests is not smooth because of thread block and it requests a lot of time and resources for revitalization of thread. Therefore, this paper proposes the extended web server which provides the technique for delay handling and improves the overload of server for better system capacity, communication support, and the unification which is the advantage of web service. And it evaluates the existing system(implemented at Tomcat 5.5) and the proposed mobile web server architecture. The extended server architecture provides excellent exchange condition for system capacity and evaluates improved web server architecture which combines multi-thread with thread pool. The proposed web service architecture in this paper got the better result of improved capacity benefit than the evaluation result of original Tomcat 5.5.

A Comparative Study on User Experience of Secondhand Marketplace Platform -Focusing on Bungae Jangter and Danggeun Market- (중고거래 플랫폼의 사용자 경험 비교 연구 -번개장터와 당근마켓을 중심으로-)

  • Lee, Gyeong-Mi;Ryu, Jin-ju;Kim, Min-jung;Jung, Da-Young
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.423-429
    • /
    • 2022
  • The survey was conducted on the Bungae Jangter and Danggeun Market, which provide mobile used market services. The goal is to investigate factors that affect the user experience of used market platforms and to compare usability. Based on Peter Morville's Honeycomb Model, a survey and In-depth interviews were conducted to users with experience in secondhand transactions. And we qualitatively analyze the factors that affect the user experience. As a result, there were differences in usability depending on the age of the user. (reliability, how to find things, purpose of using used trading services, etc.) This study focused on actual user experience, so it will help you find a way to develop to user-centered secondhand marketplace services.

A Two-Way Ranging WPAN Location System with Clock Offset Estimation (클락 오프셋 추정 방식을 이용한 TWR WPAN 측위 시스템)

  • Park, Jiwon;Lim, Jeongmin;Lee, Kyujin;Sung, Tae-Kyung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.2
    • /
    • pp.125-130
    • /
    • 2013
  • Compared to OWR (One-Way Ranging) method that requires precise network time synchronization, TWR (Two-Way Ranging) method has advantages in building an indoor WPAN (Wireless Personal Area Network) location system with lower cost. However, clock offsets of nodes in WPAN system should be eliminated or compensated to improve location accuracy of the TWR method. Because conventional clock offset elimination methods requires multiple TWR transactions to reduce clock offset, they produce network traffic burden instead. This paper presents a clock offset estimation method that can reduce clock offset error with a single TWR transaction. After relative clock offsets of sensor nodes are estimated, clock offsets of mobile tags are estimated using a single TWR communication. Simulation results show that location accuracy of the proposed method is almost similar to the conventional clock offset elimination method, while its network traffic is about a half of the conventional method.