• Title/Summary/Keyword: Used Transaction

Search Result 679, Processing Time 0.023 seconds

The Influences of Perceived Risk and Trust on the Business Relationship in the Contract of International Transaction (무역계약에서 인지된 위험과 신뢰가 지속가능한 거래관계에 미치는 영향에 관한 연구)

  • Kim, Sungkuk
    • Korea Trade Review
    • /
    • v.44 no.3
    • /
    • pp.155-170
    • /
    • 2019
  • This study examines the model of perceived risk, trust, and continuous transaction intentions presented in a study of the buying behavior in International Transaction. Although most of the trade transactions have been studied as a legal supplement, trade transactions are also purchasing behavior aimed at maintaining continuous transaction intentions between the parties. The study results confirmed that perceived risk could be separated into risk neutrality, risk - taking and risk aversion, and perceived risk had an effect on trust. In addition, the trust affected by perceived risk in the trade transaction model has a statistically significant effect on continuous transaction intentions. The study results confirm that the theoretical background used in previous studies of purchase behavior models is also effective in trade transaction.

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

The Effects of Authenticity Perception on Used Trading App Service Satisfaction

  • Sangyeon Song;Jeonghoon Lee
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.6
    • /
    • pp.43-62
    • /
    • 2022
  • As the used trading market grows centered on online platforms, it is evolving from practical consumption to pursuing various forms of consumption value. Consumers purchase rare products, enjoy the transaction itself with consumers with the same preference, and investment or eco-friendly value consumption is also increasing. In this regard, the transaction of the second-hand transaction app service must have sincerity in order to respond to various consumption values. In addition, it is necessary to study what components the second-hand trading app service should aim for to secure authenticity and how the usefulness and ease of second-hand trading apps affect the relationship. The research used a questionnaire method to test hypotheses and surveyed 215 consumers in their 20s, 30s, and 40s who had purchased used clothing online within a year. Among them, 200 responses, excluding outliers, were statistically analyzed using SPSS 21.0 and AMOS 22.0 as confirmatory factor analysis and structural equation models. This study aims to determine the effect of the authenticity of the online used trading app service on the satisfaction of the used trading app service. To this end, based on the previous research results, the following research hypotheses were established and verified statistically. First, the authenticity of the online used trading app service will significantly impact the satisfaction of the used trading app service. Second, the usefulness of the used trading app service will have a moderating effect on the effect of the authenticity of the used trading app service on the satisfaction of the used trading app service. Third, the ease of the used trading app service will have a moderating effect on the authenticity of the used trading app service on the satisfaction of the used trading app service. As a result of the study, the authenticity of the used trading app service significantly affected the satisfaction of the used trading app service. Appeared to be The results of this study will help understand used transaction app services where consumption of used products occurs from the viewpoint of product circular use behavior and can be used as a strategic plan to promote the use of used transaction apps in the future.

An Analysis on the Casual Relationship among Housing Transaction Index, Jeonse Rental Index, CD Interest Rate and Spread (주택매매 및 전세지수와 CD금리, 가산금리 간의 인과관계 분석)

  • Kim, Eun-Sung;Lee, Sang-Hyo;Kim, Jae-Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.11a
    • /
    • pp.265-268
    • /
    • 2009
  • The purpose of this study is to analyze the casual relationship among Housing Transaction Index, Jeonse Rental Index and Interest Rate. To analyze the influence of interest rate in more detail, CD Interest rate and Spread are used as variables. Granger Casualty Test is used as a analysis tool, As a result, Spread is the cause variable of the Housing Transaction Index and the Housing Transaction Index is the cause variable of the CD Interest Rate. And also, CD Interest rate influences the Jeonse Rental Index and the Jeonse Rental Index has influence on the other variables.

  • PDF

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

A study of the transaction certification model in the e-commerce (전자 상거래에서 거래 인증 모델 연구)

  • Lee, Chang-Yeol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.81-88
    • /
    • 2007
  • In on-line transaction, the transparency is the key factor for the taxation and customer's rights. Using the cash register concept of the off-line transaction, we studied on-line transaction register model for the e-commerce transparency. Although on-line transaction register may be used under the related e-commerce laws, in this paper, we only considered the mechanism of the register. The register issues the digital receipt, and then the receipt can be verified the validation by the models developed in this paper.

An Efficient Altruistic Looking Protocol for the Mobile Transaction Management System (이동 데이터베이스 시스템을 위한 효율적인 이타적 잠금기법)

  • 권혁신;김세윤;김응모
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • We propose an advanced transaction scheduling protocol to improve the concurrency and to guarantee the mobility for the mobile database management systems. Mobility, portability, and wireless link In mobile computing environment can cause certain drawbacks, and thus it is more difficult to solve the concurrency control problems. However, a locking scheme should be used to guarantee the data consistency and to prevent the data conflicts. It is well known that data consistency is guaranteed by standard transaction scheduling schemes like two-phase locking (2PL). It has two of operation, lock and unlock. But 2PL does not give solution for mobile system. Altruistic Locking (AL) and classifying transactions, we adapt, can give solution for the previous problems. AL, as an advanced protocol, has attempted to reduce delay effects associated with lock release moment by the use of donation. In this paper, we extend those approaches and classify the transactions to reduce delay effects of short-lived transaction caused by long-lived transaction. In addition, we show efficient solution for the case of disconnection occurrence. Our protocol, namely, Mobile Altruistic Locking (MAL) is shown to be efficiently used in order to reduce delay effects and to guarantee database consistency in a state of the slippery connection in mobile database systems.

  • PDF

SOC Bus Transaction Verification Using AMBA Protocol Checker

  • Lee, Kab-Joo;Kim, Si-Hyun;Hwang, Hyo-Seon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.2
    • /
    • pp.132-140
    • /
    • 2002
  • This paper presents an ARM-based SOC bus transaction verification IP and the usage experiences in SOC designs. The verification IP is an AMBA AHB protocol checker, which captures legal AHB transactions in FSM-style signal sequence checking routines. This checker can be considered as a reusable verification IP since it does not change unless the bus protocol changes. Our AHB protocol checker is designed to be scalable to any number of AHB masters and reusable for various AMBA-based SOC designs. The keys to the scalability and the reusability are Object-Oriented Programming (OOP), virtual port, and bind operation. This paper describes how OOP, virtual port, and bind features are used to implement AHB protocol checker. Using the AHB protocol checker, an AHB simulation monitor is constructed. The monitor checks the legal bus arbitration and detects the first cycle of an AHB transaction. Then it calls AHB protocol checker to check the expected AHB signal sequences. We integrate the AHB bus monitor into Verilog simulation environment to replace time-consuming visual waveform inspection, and it allows us to find design bugs quickly. This paper also discusses AMBA AHB bus transaction coverage metrics and AHB transaction coverage analysis. Test programs for five AHB masters of an SOC, four channel DMAs and a host interface unit are executed and transaction coverage for DMA verification is collected during simulation. These coverage results can be used to determine the weak point of test programs in terms of the number of bus transactions occurred and guide to improve the quality of the test programs. Also, the coverage results can be used to obtain bus utilization statistics since the bus cycles occupied by each AHB master can be obtained.

Data Mining Time Series Data With Virtual Transaction (가상 트랜잭션을 이용한 시계열 데이터의 데이터 마이닝)

  • Kim, Min-Su;Kim, Cheol-Hwan;Kim, Eung-Mo
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.251-258
    • /
    • 2002
  • There has been much research on data mining techniques for applying more advanced applications. However, most of those techniques has focused on transaction data rather than time series data. In this paper, we introduce a approach to convert time series data into virtual transaction data for more useful data mining applications. A virtual transaction is defined to be a collection of events that occur relatively close to each other. A virtual transaction generator uses time window or event window methods. Our approach based on time series data can be used with most conventional transaction algorithms without further modification.

A Solution towards Eliminating Transaction Malleability in Bitcoin

  • Rajput, Ubaidullah;Abbas, Fizza;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.837-850
    • /
    • 2018
  • Bitcoin is a decentralized crypto-currency, which is based on the peer-to-peer network, and was introduced by Satoshi Nakamoto in 2008. Bitcoin transactions are written by using a scripting language. The hash value of a transaction's script is used to identify the transaction over the network. In February 2014, a Bitcoin exchange company, Mt. Gox, claimed that they had lost hundreds of millions US dollars worth of Bitcoins in an attack known as transaction malleability. Although known about since 2011, this was the first known attack that resulted in a company loosing multi-millions of US dollars in Bitcoins. Our reason for writing this paper is to understand Bitcoin transaction malleability and to propose an efficient solution. Our solution is a softfork (i.e., it can be gradually implemented). Towards the end of the paper we present a detailed analysis of our scheme with respect to various transaction malleability-based attack scenarios to show that our simple solution can prevent future incidents involving transaction malleability from occurring. We compare our scheme with existing approaches and present an analysis regarding the computational cost and storage requirements of our proposed solution, which shows the feasibility of our proposed scheme.