• Title/Summary/Keyword: Transaction of Information

Search Result 1,739, Processing Time 0.031 seconds

Determinants of Opportunism between Franchisor and Franchisee: Focusing on the Moderating Effect of Startup Experience

  • LEE, Jibaek;LEE, Hee Tae;BAE, Jungho
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • Purpose: This study examines the opportunism moderating effect by the startup experience in the relationship between franchisor and franchisees. In the case of a franchise system that has a continuous relational exchange transaction, relationship management is a very important activity because the relationship management between franchisor and franchisees improves the quality of the relationship. Nevertheless, there is insufficient of research on opportunism, which is a negative factor in managing the relationship between franchisor and franchisees in continuous relationship. Research design, data and methodology: This study, we explore the cause of opportunism based on transaction cost theory through prior research and establish a research model based by goal incongruity, uncertainty, information asymmetry, transaction specific assets, the relevance to determinant of opportunism and the startup experienced which is a moderating variable. To verify several hypotheses, the data were collected from 300 out of 1,760 domestic franchisees and analyzed using multiple regression analysis with SPSS program. Results: The findings are as follows. Goal incongruity did not affect opportunism. Opportunism increased as uncertainty increased, and as information asymmetry increased, opportunism increased. An opportunism decreased as transaction specific assets increased. Moreover, the findings show that startup experience only plays a moderating role in the relationship between information asymmetry and opportunism. Therefore, 4 out of 8 hypotheses were supported. Conclusions: The findings show that uncertainty, information asymmetry, and transaction specific assets are the determinants of opportunism. In addition, the results of the analysis of the moderating role of startup experience show that the less entrepreneurial experience, the greater the influence of information asymmetry on opportunism. Our findings mean that maintaining a successful relationship between franchisors and franchisees is possible when franchisors provide knowledge sharing, goal sharing, environmental sharing, and management information sharing to franchisees. In addition, the findings of this study shows that the contract content and management should be changed according to the entrepreneurial experience. In other words, the franchisors must share and integrate the accumulated franchisees' and franchisors' experience with the franchisees to create a synergy that can lead to successful bilateral relationship maintenance, which in turn reduces opportunism.

Performance Evaluation of Deferred Locking With Shadow Transaction (그림자 트랜잭션을 이용한 지연 로킹 기법의 성능 평가)

  • 권혁민
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.117-134
    • /
    • 2000
  • Client-server DBMS based on a data-skipping model can exploit client resources effectively by allowing inter-transaction caching. However, inter-transaction caching raises the need of transactional cache consistency maintenance(TCCM) protocol, since each client is able to cache a portion of the database dynamically. Detection-based TCCM schemes can reduce the message overhead required for cache consistency if they validate clients replica asynchronously, and thus they cm show high throughput rates. However, they tend to show high ratios of transaction abort since transactions can access invalid replica. For coping with this drawback, this paper develops a new notion of shadow transaction, which is a backup-purpose one that is kept ready to replace an aborted transaction. This paper proposes a new detection-based TCCM scheme named DL-ST on the basis of the notion of shadow transaction. Using a simulation model, this paper evaluates the effect of shadow transaction in terms of transaction through rate and abort ratio.

  • PDF

An Empirical Study on e-Logistics of Port & Logistics industry (항만물류산업의 e-Logistics 실증연구)

  • 조소희;허윤수;남기찬
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.365-370
    • /
    • 2004
  • At the present, e-commerce takes the place of existing transaction form in structure in the world trade by advancement of Information Technology and diffusion of Internet. There is no exceptions of this tendency even in industry of maritime and logistics. So, global shipping lines and logistics companies try to construct the e-Business network system for increasing their competitiveness in an are of cyber. However, in Korea, most of companies prefer "final handshake" as the traditional way of transaction to "e-commerce", because they bear a distrust in mind about the outflow of transaction information and security of settlement. So, number of companies using e-commerce is very small, and this situation causes the limited factor for activating the transaction structure of it. The rate of using e-commerce in logistics industry is lower than other industries, even more higher effectiveness is expected when they use it. Especially, it is very necessary not only e-commerce but also e-Logistics which can serve information of freight cost on cargo flow, operation cost and schedule, and tracing information of cargo. Increasing the necessity of e-Logistics, this study research the rate rf using e-Logistics focused on maritime and logistics companies, and analyze the transaction form among members of these industries for improving them. In detail, this paper examine the drivers for activating e-Logistics, and present the effective factors for a successful development of these industries.

  • PDF

Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users (프라이버시 염려 영향요인이 인터넷 이용자의 신뢰와 온라인 거래의도에 미치는 영향)

  • Ryu, II;Shin, Jeong-Shin;Lee, Kyung-Geun;Choi, Hyuk-Ra
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.4
    • /
    • pp.37-59
    • /
    • 2008
  • This study focuses on the antecedents to the privacy concerns and their influence on trust and online transaction intention. Based on previous exploratory works and the literature review of privacy concerns, four antecedents are identified-Internet literacy, social awareness, perceived vulnerability, and perceived ability to information control. Incorporating these antecedents, privacy concerns, trust and online transaction intention, a conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that Internet literacy, social awareness, and perceived vulnerability have statistically significant effect on the privacy concerns of users and the privacy concerns has a positive influence on the trust. Finally, the trust has a positive effect on the online transaction intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

  • PDF

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

The Generation of Transaction Monitor Modules from a Transaction-Oriented Interface Protocol Description (트랜잭션 중심의 인터페이스 프로토콜 기술로부터 트랜잭션 모니터 모듈의 생성)

  • 윤창렬;장경선;조한진
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.6
    • /
    • pp.756-764
    • /
    • 2002
  • The verification portion of SoC design consumes about 70% of total design effort. To reduce the verification effort and time, it is necessary and desirable to raise the level of SoC design verifications level from the signal or cycle level to the transaction. This paper describes a generation method of transaction monitor modules that monitor interface signals, logging the transaction executions, and report transaction errors. The input of the generation method is a transaction-oriented interface protocol description.

A Comparative Study on ACH and Fedwire as a Cross-Border Payment System (국제전자결제시스템으로서 ACH와 Fedwire의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.139-154
    • /
    • 2008
  • This research want to discuss some issues about payment system of America. This research focuses on comparing ACH with Fedwire. Firstly Fedwire is the payment system for only large-dollar transfer(Large-Value Transfer System; LVTS), while ACH(Automated Clearing House)payment mainly applies a consumer account. Secondly ACH transaction is either credit or debit transfer, while Fedwire is only credit transfer. Thirdly the communication system of Fedwire has twoway method, telephonelike communication network, but ACH is oneway store and forward electronic mail. At present LVTS divides into RTGS(Real-Time Gross Settlement) and DNS(Deferred Net Settlement). However Fedwire uses either RTGS(instantaneous for every transaction) or DNS(net net transaction) but ACH uses only DNS(net net transaction). Fourthly ACH is substantially cheaper than the Fedwire payment. lastly security is important in both Fedwire and ACH, it is even more crucial in Fedwire In addition, for each transaction, Fedwire may entail individual instantaneous confirmation to the originator and notification to the receiver, whereas ACH do not.

  • PDF

Enhancing the Security of Credit Card Transaction based on Visual DSC

  • Wei, Kuo-Jui;Lee, Jung-San;Chen, Shin-Jen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1231-1245
    • /
    • 2015
  • People have transferred their business model from traditional commerce to e-commerce in recent decades. Both shopping and payment can be completed through the Internet and bring convenience to consumers and business opportunities to industry. These trade techniques are mostly set up based on the Secure Sockets Layer (SSL). SSL provides the security for transaction information and is easy to set up, which makes it is widely accepted by individuals. Although attackers cannot obtain the real content even when the transferred information is intercepted, still there is risk for online trade. For example, it is impossible to prevent credit card information from being stolen by virtual merchant. Therefore, we propose a new mechanism to solve such security problem. We make use of the disposable dynamic security code (DSC) to replace traditional card security code. So even attackers get DSC for that round of transaction, they cannot use it for the next time. Besides, we apply visual secret sharing techniques to transfer the DSC, so that interceptors cannot retrieve the real DSC even for one round of trade. This way, we can improve security of credit card transaction and reliability of online business. The experiments results validate the applicability and efficiency of the proposed mechanism.

Information Security and Organizational Performance: Empirical Study of Korean Securities Industry

  • Kong, Heekyung;Jung, Suhyun;Lee, Insung;Yeon, Seung-Jun
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.428-437
    • /
    • 2015
  • This study was conducted to analyze the effect of information security activities on organizational performance. With this in mind and with the aim of resolving transaction stability in the securities industry, using an organization's security activities as a tool for carrying out information security activities, the effect of security activities on organizational performance was analyzed. Under the assumption that the effectiveness of information security activities can be bolstered to enhance organizational performance, such effects were analyzed based on Herzberg's motivation theory, which is one of the motivation theories that may influence information protection activities. To measure the actual attributes of the theoretical model, an empirical survey of the securities industry was conducted. In this explorative study, the proposed model was verified using partial least squares as a structural equation model consisting of IT service, information security, information sharing, transaction stability, and organizational performance.

A Recovery Scheme of Mobile Transaction Based on Updates Propagation for Updating Spatial Data (공간데이터를 변경하는 모바일 트랜잭션의 변경 전파 회복 기법)

  • Kim, Dong-Hyun;Kang, Ju-Ho;Hong, Bong-Hee
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.2 s.10
    • /
    • pp.69-82
    • /
    • 2003
  • Mobile transactions updating spatial objects are long transactions that update local objects of mobile clients during disconnection. Since a recovered transaction cannot read the write sets of other transactions committed before the recovery due to disconnection, the recovered transaction may conflicts with them. However, aborting of the recovered long transaction leads to the cancellation of all updates including the recovered updates. It is definitely unsuitable to cancel the recovered updates due to the conflicts. In this paper, we propose the recovery scheme to retrieve foreign conflictive objects from the write sets of other transactions for reducing aborting of a recovered transaction. The foreign conflictive objects are part of the data committed by other transactions and may conflict with the objects updated by the recovered transaction. In the scheme, since the recovered transaction can read both the foreign conflictive objects and the recently checkpoint read set, it is possible to reupdate properly the potentially conflicted objects.

  • PDF