• Title/Summary/Keyword: Receipt Data

Search Result 72, Processing Time 0.028 seconds

A Study on the Contract Formation in the Electronic Commerce (전자상거래(電子商去來)의 계약성립(契約成立)에 관한 고찰(考察))

  • Jung, Koae-Young
    • Management & Information Systems Review
    • /
    • v.6
    • /
    • pp.21-43
    • /
    • 2001
  • Contract requires, on principle, a meeting of minds. The basic elements of that contact are an offer by one party and an acceptance of the terms of the offer by the other party. In the electronic commerce an offer and the acceptance of an offer may be expressed by dispach or receipt of data messages. The contract which a data messages is used in the formation may be called electronic contract. The formation of the electronic contract is regulated by the Civil Code or the Commerce Code. The time of the contract formation is regulated by the Civil Code and the Commerce Code. But the time of dispach and receipt of the data message is stated in Article 9 of the Fundamental Law on Electronic Commerce. In this article the dispatch of a data message occurs when it enters an information system outside the control of the originator or of the person who sent the date message on behalf of the originator. The time of receipt of a data message, if the adressee has designated an information system for the purpose of receiving data message, is at the time when the data message enters the designated information system; or if the data message is sent to an information system of the adressee that is not the designated information system, at the time when the data message is retrieved by the addressee; if the addressee has not designated an information system, receipt occurs when the data message enters an information system of the addressee. The time of the electronic contract formation depends on the Civil Code or the Commerce Code and this Article 9 of the Fundamental Law on Electronic Commerce. An electronic contract may be formed by an offer and the acceptance of an offer by dispach or receipt of data message. An offer can not be withdrawn after it is accepted. But in mail-order sales and installment dealing an offer can be revoked after the goods were delivered. In this case the contract is lapsed.

  • PDF

A System Implementation for Issuing and Verifying the Electronic Receipt for M-Commerce (무선 전자상거래를 위 한 전자영수증 발급 및 검증 기법 구현)

  • Park, Keun-Hong;Cho, Seong-Je
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.559-566
    • /
    • 2003
  • As cell phone and PDA have been in common use recently, there is a growing tendency to utilize the mobile terminals for M-Commerce. The information security and the receipt of e-trade are very important to support reliable digital transactions in wireless environment as in wired environment. Even though some work such as WML digital signature and WPKI has been studied for M-Commerce, there are several problems on the aspects of the functional limitation of the mobile terminals and the unsecure data transformation of WAP gateway. In this study we have designed and implemented a prototype system of issuing and verifying the electronic receipt that guarantees authentication, data integrity and non-repudiation for secure mobile e-commerce. Moreover, we have enhanced the system performance by letting the trusted independent server verify and manage the electronic receipt.

Mobile Payment Based on Transaction Certificate Using Cloud Self-Proxy Server

  • Sung, Soonhwa;Kong, Eunbae;Youn, Cheong
    • ETRI Journal
    • /
    • v.39 no.1
    • /
    • pp.135-144
    • /
    • 2017
  • Recently, mobile phones have been recognized as the most convenient type of mobile payment device. However, they have some security problems; therefore, mobile devices cannot be used for unauthorized transactions using anonymous data by unauthenticated users in a cloud environment. This paper suggests a mobile payment system that uses a certificate mode in which a user receives a paperless receipt of a product purchase in a cloud environment. To address mobile payment system security, we propose the transaction certificate mode (TCM), which supports mutual authentication and key management for transaction parties. TCM provides a software token, the transaction certificate token (TCT), which interacts with a cloud self-proxy server (CSPS). The CSPS shares key management with the TCT and provides simple data authentication without complex encryption. The proposed self-creating protocol supports TCM, which can interactively communicate with the transaction parties without accessing a user's personal information. Therefore, the system can support verification for anonymous data and transaction parties and provides user-based mobile payments with a paperless receipt.

Implementation of Recipe Recommendation System Using Ingredients Combination Analysis based on Recipe Data (레시피 데이터 기반의 식재료 궁합 분석을 이용한 레시피 추천 시스템 구현)

  • Min, Seonghee;Oh, Yoosoo
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1114-1121
    • /
    • 2021
  • In this paper, we implement a recipe recommendation system using ingredient harmonization analysis based on recipe data. The proposed system receives an image of a food ingredient purchase receipt to recommend ingredients and recipes to the user. Moreover, it performs preprocessing of the receipt images and text extraction using the OCR algorithm. The proposed system can recommend recipes based on the combined data of ingredients. It collects recipe data to calculate the combination for each food ingredient and extracts the food ingredients of the collected recipe as training data. And then, it acquires vector data by learning with a natural language processing algorithm. Moreover, it can recommend recipes based on ingredients with high similarity. Also, the proposed system can recommend recipes using replaceable ingredients to improve the accuracy of the result through preprocessing and postprocessing. For our evaluation, we created a random input dataset to evaluate the proposed recipe recommendation system's performance and calculated the accuracy for each algorithm. As a result of performance evaluation, the accuracy of the Word2Vec algorithm was the highest.

Reservation based Multichannel CSMA Protocol for Improvement of Energy Consumption and QoS in Wireless Sensor Networks (무선 센서 네트워크 환경에서 에너지 소비 및 QoS를 고려한 예약기반 Multichannel CSMA 프로토콜)

  • Han, Jung-Ahn;Kim, Yun-Hyung;Lee, Moon-Ho;Kim, Byung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2A
    • /
    • pp.143-151
    • /
    • 2007
  • One of the consideration things to design protocol in wireless sensor networks is to maximize lifetime of sensor node as reducing energy consumption. In this paper propose reserve based multichannel CSMA mac protocol for minimizing energy consumption which arise from collision and waiting retransmission at channel access process in mac layer Each sensor node which constitute sensor networks has data channel and control channel. And as sensor node reserve channel for data transmission by using control channel and receipt node allow reservation node to use data channel, sending node can abbreviate try of retransmission after random interval time. Also, When sending node delivers selects option channel in available channels to receipt node, the receipt node decide whether the channel is available to oneself and through the result select transmission channel ultimately. Performance evaluation compare with previous simple multichannel CSMA.

One-Time Overlay Multicast Techniques Considering Receipt Quality for m-to-n Comunication over Large Internet (다자간의 통신환경에서 다양한 수신품질을 고려한 One-Time 오버레이 멀티캐스트 기법에 관한 연구)

  • Yoon Mi-youn;Kim Ki-Young;Kim Dae-Won;Shin Yong-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1B
    • /
    • pp.27-38
    • /
    • 2005
  • IP Multicast has not been deployed because of hardware problems. So a new scheme that is called Overlay Multicast for group communication has been emerged. It supports IP Multicast functions, which is located on application level. For developing it, we have been focused on efficient overlay tree construction among group members with low stretch and stress. However, we should consider a variety of transmission or receipt condition since a real internet environment has users with various transmission/receipt rates. Thus, we make one-time source specific tree depending on required bandwidth informationof group members when a member requests data transmission. Our mechanism provides satisfied data quality limited maximum transmission rate of the source to each group members. Furthermore, we manage a large group enough as distributing control information to cores that are designated membersfor maintaining host member information. Lastly, we prove that our tree guarantees data quality to each group members, and show low tree consruction time is required. In addition, for evaluating group scalability, we analyze control information increasing rate via group size, and validate its scalability.

A Study on u-paperless and secure credit card delivery system development

  • Song, Yeongsim;Jang, Jinwook;jeong, Jongsik;Ahn, Taejoon;Joh, Joowan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.83-90
    • /
    • 2017
  • In the past, when the credit card was delivered to the customer, the postal agreement and receipt were signed by customer. The repossessed documents were sent back to the card company through the reorganization process. The card company checks the error by scanning and keeps it in the document storage room. This process is inefficient in cost and personnel due to delivery time, document print out, document sorting, image scanning, inspection work, and storage. Also, the risk of personal data spill is very high in the process of providing personal information. The proposed system is a service that receives a postal agreement and a receipt to a recipient when signing a credit card, signing the mobile image instead of paper, and automatically sending it to the card company server. We have designed a system that can protect the cost of paper documents, complicated work procedures, delivery times and personal information. In this study, we developed 'u-paperless' and secure credit card delivery system applying electronic document and security system.

A Study on the Allowance Management and Buying Behaviors of Child Consumers (아동소비자의 용돈관리행동과 구매행동에 관한 연구)

  • 김효정
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.8
    • /
    • pp.77-93
    • /
    • 2004
  • This study examined the factors affecting allowance management and buying behaviors and their interrelationship. The data were collected from fourth, fifth and sixth grade students of elementary students in Kimhae-city by a self-administered questionnaire. Frequency distributions, Cronbach's Alpha, Pearson's correlation analysis, regression analyses, and path analysis were analyzed by SPSS Windows. According to the regression model for the allowance management behaviors, the significant variables were the child's sex, term of receiving allowances, recognition of the allowance amount before receipt, parents' guidance before using allowances, parent-child communication about consumption, and parents' mediation of mass media. On the other hand, in the regression model for the buying behaviors, the satisfaction of the allowance amount, parents' guidance before using allowances, the amount of watching TV, parent-child communication about consumption, and allowance management behaviors were significant. The path model showed the child's sex, term of receiving allowances, recognition of the allowance amount before receipt, and parents' mediation of mass media indirectly affected the buying behaviors. In addition, the satisfaction of the allowance amount and the amount of watching 1V directly affected the buying behaviors. Moreover, parents' guidance before using allowances and parent-child communication about consumption had a direct effect and an indirect effect through the allowance management behaviors on the buying behaviors. Finally, the allowance management behaviors showed a strong positive effect on the buying behaviors.

Design of a Secure Payment Mechanism based on S/MIME (S/MIME을 적용한 안전한 지불 메커니즘 설계)

  • Chun, Cheul-Woo;Lee, Jong-Hu;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.482-494
    • /
    • 2002
  • In E-mail based accounting system, the remitter does not have need to find collector's account number. To transfer money to a collector's account, what remitter need is just a collector's E-mail address. But the current E-mail based accounting systems are built on SSL technology. Basically SSL provides some security services - confidentiality, user authentication and data integrity, but does not provide non-repudiation. So, in the current E-mail based accounting system, it is possible to deny transaction. And there is no receipt of transaction. In this paper, we design and implementation of a S/MIME applied Secure Payment Mechanism. In our system, every account information - account number, receiver name, amount of money, etc. - is included in a 'check' message. And this message is protected under the Secure Web-mail using S/MIME. In a view point of the convenience, users using our system do not have need to find collector's account number. And in a view point of the security, our system provides confidentiality, user authentication, data integrity and non-repudiation. Moreover our system provides a receipt.

A Scheme of Data-driven Procurement and Inventory Management through Synchronizing Production Planning in Aircraft Manufacturing Industry (항공기 제조업에서 생산계획 동기화를 통한 데이터기반 구매조달 및 재고관리 방안 연구)

  • Yu, Kyoung Yul;Choi, Hong Suk;Jeong, Dae Yul
    • The Journal of Information Systems
    • /
    • v.30 no.1
    • /
    • pp.151-177
    • /
    • 2021
  • Purpose This paper aims to improve management performance by effectively responding to production needs and reducing inventory through synchronizing production planning and procurement in the aviation industry. In this study, the differences in production planning and execution were first analyzed in terms of demand, supply, inventory, and process using the big data collected from a domestic aircraft manufacturers. This paper analyzed the problems in procurement and inventory management using legacy big data from ERP system in the company. Based on the analysis, we performed a simulation to derive an efficient procurement and inventory management plan. Through analysis and simulation of operational data, we were able to discover procurement and inventory policies to effectively respond to production needs. Design/methodology/approach This is an empirical study to analyze the cause of decrease in inventory turnover and increase in inventory cost due to dis-synchronize between production requirements and procurement. The actual operation data, a total of 21,306,611 transaction data which are 18 months data from January 2019 to June 2020, were extracted from the ERP system. All them are such as basic information on materials, material consumption and movement history, inventory/receipt/shipment status, and production orders. To perform data analysis, it went through three steps. At first, we identified the current states and problems of production process to grasp the situation of what happened, and secondly, analyzed the data to identify expected problems through cross-link analysis between transactions, and finally, defined what to do. Many analysis techniques such as correlation analysis, moving average analysis, and linear regression analysis were applied to predict the status of inventory. A simulation was performed to analyze the appropriate inventory level according to the control of fluctuations in the production planing. In the simulation, we tested four alternatives how to coordinate the synchronization between the procurement plan and the production plan. All the alternatives give us more plausible results than actual operation in the past. Findings Based on the big data extracted from the ERP system, the relationship between the level of delivery and the distribution of fluctuations was analyzed in terms of demand, supply, inventory, and process. As a result of analyzing the inventory turnover rate, the root cause of the inventory increase were identified. In addition, based on the data on delivery and receipt performance, it was possible to accurately analyze how much gap occurs between supply and demand, and to figure out how much this affects the inventory level. Moreover, we were able to obtain the more predictable and insightful results through simulation that organizational performance such as inventory cost and lead time can be improved by synchronizing the production planning and purchase procurement with supply and demand information. The results of big data analysis and simulation gave us more insights in production planning, procurement, and inventory management for smart manufacturing and performance improvement.