• 제목/요약/키워드: Mobile Transaction

검색결과 226건 처리시간 0.025초

오프라인 소매점의 모바일 할인 서비스에 대한 전략적 분석 (Game Theoretic Analysis of the Mobile Discount Service of the Offline Retailers)

  • 조형래;이민호
    • 산업경영시스템학회지
    • /
    • 제39권3호
    • /
    • pp.47-55
    • /
    • 2016
  • The proliferation of the Internet and related technologies has led to a new form of distribution channels, namely online retailers. The conventional offline and the new online retailers have different transaction costs perceived by the consumers in the following perspectives: the accessibility to the product information, the traffic cost and the opportunity cost for the time to visit the store, the delivery time and the possibility of 'touch and feel' to test the quality of the product. In particular, the online retailers have lower distribution cost structure in that they do not have physical stores, which results in lower selling price. Thus they continuously offer price competition against offline retailers using the lower selling cost as competitive weapon. Moreover the emergence of the social commerce is likely to intensify the competition between the online and offline retailers. To survive in this fierce competition, the offline retailers are trying to defend their business interests by sticking to offline transaction in anticipation of increased customer loyalty, customer's preference for 'touch and feel' style shopping, and others. Despite of these efforts, customers who touch and feel a product in an offline store but purchase the product through an online retailer are increasing. To protect such customers, recently, some of the offline retailers began to provide the mobile discount service (MDS) which enables the offline customers to purchase a product at a discounted price through the mobile applications. In business competitions, the price discount strategy is usually considered to secure more market share at the cost of lower profit. In this study, however, we analyze the effect of MDS as a weapon for securing more profit. To do this, we set up a game model between the online and offline retailers which incorporates the effect of the MDS. By numerically analyzing the Nash equilibrium of the game, some managerial implications for using the MDS for more profit are discussed.

M-커머스 사이트의 신뢰도 형성요인에 관한 실증연구 (A Study of Factors Influencing on Customer's Trust in Mobile Commerce Site)

  • 한대문;김영렬
    • 한국산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.1-6
    • /
    • 2005
  • 본 연구에서는 Mobile Commerce(M-커머스) 사이트의 신뢰도에 영향을 미치는 요인들을 거래안전성, 사이트 이미지, 검색기능성 그리고 결제편의성으로 분류하여 관련 연구들을 통해 검증된 요인들을 추출하였다. 그리고 M-커머스 사이트의 현재 또는 잠재 고객들을 대상으로 직접 설문조사를 통해 M-커머스 사이트의 신뢰도에 영향을 미치는 요인을 식별해냄으로써 고객과의 신뢰형성을 위해 최우선적으로 고려해야 할 방향을 제시하고 M-커머스의 활성화에 기여하고자 한다

  • PDF

The Role of Application Rank in the Extended Mobile Application Download

  • Bang, Youngsok;Lee, Dong-Joo
    • Asia pacific journal of information systems
    • /
    • 제25권3호
    • /
    • pp.548-562
    • /
    • 2015
  • The growing popularity of mobile application has led to researchers and practitioners needing to understand users' mobile application download behaviors. Using large-scale transaction data obtained from a leading Korean telecommunications company, we empirically explore how application download rank, which appears to users when they decide to download a new application, affects their extended mobile application download. This terminology refers to downloading an additional application in the same category as those that they have already downloaded. We also consider IT characteristics, user characteristics, and application type that might be associated with the extended application download. The analysis generates the following result. Overall, a higher rank of a new application encourages the extended application download, but the linear relationship between the rank and the extended application download disappears when critical rank points are incorporated into the model. Further, no quadratic effect of rank is found in the extended application download. Based on the results, we suggest theoretical and managerial implications.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

이체정보를 활용한 강화된 모바일 OTP 생성기 설계 (On a Enhanced Mobile OTP generator design using Transaction)

  • 박범수;조상일;김태용;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 추계학술대회
    • /
    • pp.227-228
    • /
    • 2010
  • 일회용 암호는 동일한 암호를 반복해서 사용하는 방법에 비해 생성된 암호를 한번만 사용하는 특성을 가져 보다 안전하다. "휴대폰 상에서 특정 트랜잭션용 추가 인증을 제공하는 일회용 암호 생성기 설계 방안"에서는 챌린지 교환방식을 활용한 일회용 생성기를 제안하였다. 하지만 챌린지값 교환의 문제점과 기존과 동일한 암호비도 수준을 보인다. 본 논문에서는 제시된 일회용 암호 생성기 설계 방안에 대해 분석하고 해결방안과 새로운 방안을 제시하여 중간자 공격과 재사용 공격에 강화되면서 보다 높은 수준의 암호비도수준을 보여주는 방법을 제안한다.

  • PDF

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권2호
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.

모바일 환경에서 다중 바이오인식 기반의 금융 거래를 위한 사용자 인증 프레임워크 (A Framework of User Authentication for Financial Transaction based Multi-Biometrics in Mobile Environments)

  • 한승진
    • 한국컴퓨터정보학회논문지
    • /
    • 제20권1호
    • /
    • pp.143-151
    • /
    • 2015
  • 바이오인식 기술은 기존의 PIN이나 패스워드와 달리 분실하거나 도용될 가능성이 적기 때문에 새로운 인증 수단으로 대체되고 있다. 그러나 바이오인식 정보는 PIN이나 패스워드 혹은 개인정보와 달리 노출되어 도용이 된다면 수정할 방법이 없다. 따라서, 기존의 단일 모달리티에 단일 바이오인식 정보처럼 노출이 되면 치명적인 방법이 아닌 다중 모달리티와 다중 바이오인식 정보를 사용하여 사용자와 TTP 혹은 금융기관 간 인증하도록 함으로써 본 논문은 보다 신뢰성있는 방법을 제안하고 기존의 방법과 보안 및 성능을 비교한다.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • 인터넷정보학회논문지
    • /
    • 제17권5호
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

모바일 오피스 시스템이 사용자의 업무과부하 및 직무 스트레스에 미치는 영향 (The Influence of Mobile Office Systems on Users' Job Stress and Work Overload)

  • 윤혜정;최귀영;이중정
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제20권2호
    • /
    • pp.155-176
    • /
    • 2011
  • The use of mobile office systems has been expanded due to the smartphones' rapid diffusion in Korea, and it has brought a new work environment that is different from traditional working patterns. In this study, the unique attributes of mobile office systems, such as ubiquity, usefulness, complexity, and insecurity, are examined along with the impact of these attributes on work overload and job stress. Based on transaction-based model of job stress, organizational support was applied as a stress inhibitor and also the moderator between work overload and job stress. The findings of this study show that ubiquity increases usefulness of mobile office systems; complexity increases both work overload and job stress; and insecurity increases job stress. Surprisingly, usefulness increases job stress, which means employees who perceive the efficiency of mobile office systems higher may feel more job stress. Organizational support for mobile office systems significantly shows the moderating effect, but no direct mitigating effect on job stress. The theoretical and practical implications in order to mitigate the side effects of mobile office systems based on the research findings are thoroughly discussed.