• Title/Summary/Keyword: Mobile commerce

Search Result 502, Processing Time 0.023 seconds

A Study on the Wireless Battery Charger of Purchase to Intention for Smartphone (스마트폰 무선 충전기 구매에 관한 연구)

  • Nam, Soo-Tai;Kim, Do-Goan;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.207-209
    • /
    • 2015
  • Recently, with the economy and the information communication technology developed, the smartphone market grows continuously. The market outlook on the wireless rechargeable technology grows rapidly so that the market size is increased about six times bigger than that of the last year, and it will grow about 18 billion dollars in 2014. Because of that, as the interest on this area out focused, many kinds of technology and new product are being exploited in this field. Participants of this study were 76 mobile users in Gyeongnam and Jeonbuk province in accordance with convenience sampling. Most of the respondents about 88 percent, the wireless charger may be answered to be able to explain what it is. Also, about 70 percent of the respondents, is time to replace the future of smart phone, answered by selecting a product in consideration of the wireless charging. Based on these findings, several theoretical and practical implications were suggested.

  • PDF

Data Mixing Augmentation Method for Improving Fake Fingerprint Detection Rate (위조지문 판별률 향상을 위한 학습데이터 혼합 증강 방법)

  • Kim, Weonjin;Jin, Cheng-Bin;Liu, Jinsong;Kim, Hakil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.305-314
    • /
    • 2017
  • Recently, user authentication through biometric traits such as fingerprint and iris raise more and more attention especially in mobile commerce and fin-tech fields. In particular, commercialized authentication methods using fingerprint recognition are widely utilized mainly because customers are more adopted and used to fingerprint recognition applications. In the meantime, the security issues caused by fingerprint falsification bring lots of attention. In this paper, we propose a new method to improve the performance of fake fingerprint detection using CNN(Convolutional Neural Network). It is common practice to increase the amount of learning data by using affine transformation or horizontal reflection to improve the detection rate in CNN characteristics that are influenced by learning data. However, in this paper we propose an effective data augmentation method based on the database difficulty level. The experimental results confirm the validity of proposed method.

Exploring the Effect of Online Time-Deals on Actual Purchase in China : An Empirical Study on JD.com (중국 온라인 타임 세일이 실제 구매에 미치는 효과 : 징동닷컴에 대한 실증 연구)

  • Wang, Mengmeng;Min, Daihwan
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.11-21
    • /
    • 2020
  • This study explores the effect of time-deals, i.e., online promotions with time limit. Recently many online/mobile shopping sites in China utilize so called hot deal marketing technique for a short duration at a specific time. The purpose of "time-deals" is to attract online shoppers with deep discounted price and induce consumers to purchase items. This paper examines the effect of time-deals on sales volume, firstly by comparing the sales volume of time-deal days with that of no time-deal days and secondly by comparing the sales volume of days before and after two types of time deals, usual time-deals and special time-deals, Although some prior research studied the role of time-deals in promoting consumers' purchase behavior, most used the experimental approach by building mock-up shopping sites and asking participants purchase intention. However, purchase intention does not always result in purchase behavior. This study extracted actual purchase data for four items on time-deals from an online shopping site in China. A comparison of sales volumes on time-deal days with no time-deal days has shown the significant difference in the sales volumes. This finding confirms the positive effect of time-deals on purchase behavior. This study has also found that special time-deals soak up near-future demands in advance and lower the sales after the special time-deal event, although there is no significant difference in sales before and after usual time-deals.

A Design of Protocol Based on Smartcard for Financial Information to Protect in E-payment System (온라인 소액결제 시스템에서 금융정보 보호를 위한 스마트카드 기반의 프로토콜 설계)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5872-5878
    • /
    • 2013
  • This study provides two channel structure and two factor authentication. First, a purchasing request by Internet and then user certification and a settlement approval process by mobile communication. Second, it support that proposal protocol utilize a partial factor value of stored in users smartcard, smart phone and password of certificate. Third, storage stability is improved because certificate store in smartcard. Finally, proposal protocol satisfy confidentiality, integrity, authentication, and non- repudiation on required E-commerce guideline. In comparative analysis, Efficiency of the proposal protocol with the existing system was not significantly different. But, In terms of safety for a variety of threats to prove more secure than the existing system was confirmed.

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

Image Encryption using the chaos function and elementary matrix operations (혼돈함수와 기본 행렬 연산을 이용한 영상의 암호화)

  • Kim Tae-Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.1
    • /
    • pp.29-37
    • /
    • 2006
  • Due to the spread of mobile communication with the development of computer network, nowadays various types of multimedia data play an important role in many areas such as entertainments, culture contents, e-commerce or medical science. But for the real application of these data, the security in the course of saving or transferring them through the public network should be assured. In this sense, many encryption algorithm have been developed and utilized. Nonetheless, most of them have focused on the text data. So they may not be suitable to the multimedia application because of their large size and real time constraint. In this paper, a chaotic map has been employed to create a symmetric stream type of encryption scheme which may be applied to the digital images with a large amounts of data. Then an efficient algebraic encryption algorithm based on the elementary operations of the Boolean matrix and image data characteristics.

  • PDF

Movie Popularity Classification Based on Support Vector Machine Combined with Social Network Analysis

  • Dorjmaa, Tserendulam;Shin, Taeksoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.167-183
    • /
    • 2017
  • The rapid growth of information technology and mobile service platforms, i.e., internet, google, and facebook, etc. has led the abundance of data. Due to this environment, the world is now facing a revolution in the process that data is searched, collected, stored, and shared. Abundance of data gives us several opportunities to knowledge discovery and data mining techniques. In recent years, data mining methods as a solution to discovery and extraction of available knowledge in database has been more popular in e-commerce service fields such as, in particular, movie recommendation. However, most of the classification approaches for predicting the movie popularity have used only several types of information of the movie such as actor, director, rating score, language and countries etc. In this study, we propose a classification-based support vector machine (SVM) model for predicting the movie popularity based on movie's genre data and social network data. Social network analysis (SNA) is used for improving the classification accuracy. This study builds the movies' network (one mode network) based on initial data which is a two mode network as user-to-movie network. For the proposed method we computed degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality as centrality measures in movie's network. Those four centrality values and movies' genre data were used to classify the movie popularity in this study. The logistic regression, neural network, $na{\ddot{i}}ve$ Bayes classifier, and decision tree as benchmarking models for movie popularity classification were also used for comparison with the performance of our proposed model. To assess the classifier's performance accuracy this study used MovieLens data as an open database. Our empirical results indicate that our proposed model with movie's genre and centrality data has by approximately 0% higher accuracy than other classification models with only movie's genre data. The implications of our results show that our proposed model can be used for improving movie popularity classification accuracy.

Finding Industries for Big Data Usage on the Basis of AHP (AHP 기반의 빅데이터 활용을 위한 산업 탐색)

  • Lee, Sang-Won;Kim, Sung-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.21-27
    • /
    • 2016
  • Big Data is gathering all the attention from every business community. Pervasive use of machine-to-machine (M2M) applications and mobile devices bring an explosion of data. By analyzing this data, the private and public sectors can benefit in the areas of cost reduction and productivity. The Korean government is actively pursuing Big Data initiatives to promote its usage. This paper aims to select industries which fit for the development of Big Data with a verification of the experts. The analytic hierarchy process (AHP) is applied to systematically derive the opinion of more than 50 professionals. Medical / welfare, transportation / warehousing, information and communications / information security, energy, the financial sector have been identified as promising industries. The results can be utilized in developing Big Data best practices thus contributing industrial development.

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.

Real-time Optimized Composition and Broadcasting of Multimedia Information (다중 미디어 정보의 실시간 최적화 합성 및 방송)

  • Lee, Sang-Yeob;Park, Seong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.177-185
    • /
    • 2012
  • In this paper, we developed the composition system that it can efficiently edit camera recording data, images, office document such as powerpoint data, MS word data etc in real-time and broadcasting system that the file is made by the composition system. In this Study, we developed two kinds of algorithm; Approximate Composition for Optimization (ACFO) and Sequence Composition using Memory Que (SCUMQ). Especially, the system is inexpensive and useful because the system is based on mobile devices and PCs when lectures hope to make video institutional contents. Therefore, it can be contributed for e-learning and m-learning. In addition, the system can be applied to various fields, different kinds of multimedia creation, remote conferencing, and e-commerce.