• Title/Summary/Keyword: Used Transaction

Search Result 684, Processing Time 0.023 seconds

The Study on the Factors Affecting Consumer's Buying Behavior Under The E-commerce Environment. (전자상거래의 소비자 구매행위에 영향을 미치는 요인에 관한 실증연구)

  • Han, Kyung-Il;Son, Won-Il
    • Journal of Global Scholars of Marketing Science
    • /
    • v.7
    • /
    • pp.321-337
    • /
    • 2001
  • The Purpose of this study is to empirically examine the factors that affect the consumer's buying behavior under the e-commerce environment. In order to achieve this goal, vendor characteristics, securities of transaction, concern for privacy, shopping orientation and perceived channel utilities were used as independent variables. Findings of study indicated that the concerns for abusing individual information, perceived securities of transaction, consumer's recreational orientation, consumer's convenience orientation, perceived distribution channel are the robust predictors of buying behavior of internet users.

  • PDF

A Distributed Precedence Queue Mechanism to Assign Efficient Bandwidth in CAN Networks (CAN 네트워크상의 효율적인 대역 할당을 위한 분산 선행대기 열 기법)

  • 최호식;이장명
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.11
    • /
    • pp.1058-1064
    • /
    • 2004
  • This paper presents a distributed precedence queue mechanism to resolve unexpected transmission delay of a lower priority transaction in a CAN based system, which keeps a fixed priority in data transaction. The mechanism is implemented in the upper sub-layer of the data link layer(DLL), which is fully compatible with the original medium access control layer protocol of CAN. Thus the mechanism can be implemented dynamically while the data transactions are going on without any hardware modification. The CAN protocol was originally developed to be used in the automotive industry, and it was recently applied for a broader class of automated factories. Even though CAN is able to satisfy most of real-time requirements found in automated environments, it is not to enforce either a fair subdivision of the network bandwidth among the stations or a satisfactory distribution of the access delays in message transmission. The proposed solution provides a superset of the CAN logical link layer control, which can coexist with the older CAN applications. Through the real experiments, effectiveness of the proposed mechanism is verified.

VIP-targeted CRM strategies in an open market

  • Lee, Hanjun;Shim, Beomsoo;Suh, Yongmoo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.1
    • /
    • pp.229-241
    • /
    • 2015
  • Nowadays, an open-market which provides sellers and consumers a cyber place for making a transaction over the Internet has emerged as a prevalent sales channel because of convenience and relatively low price it provides. However, there are few studies about CRM strategies based on VIP consumers for an open-market even though understanding VIP consumers' behaviors in open-markets is important to increase its revenue. Therefore, we propose CRM strategies targeted on VIP customers, obtained by analyzing the transaction data of VIP customers from an open-market using data mining techniques. To that end, we first defined the VIP customers in terms of recency, frequency and monetary (RFM) values. Then, we used data mining techniques to develop a model which best classifies and identifies infiluential factors customers into VIPs or non-VIPs. We also validate each of promotion types in the aspect of effectiveness and identify association rules among the types. Then, based on the findings from these experiments, we propose strategies from the perspectives of CRM dimensions for the open-market to thrive.

On a Enhanced Mobile OTP generator design using Transaction (이체정보를 활용한 강화된 모바일 OTP 생성기 설계)

  • Park, Beum-Su;Cho, Sang-Il;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.227-228
    • /
    • 2010
  • Generated One-Time Password (OTP) is used only once. This attributes is to safety than to repeated use the same password. Recently, Park's proposed on "Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction" use challenge-response based one-time password generator. However, Challenge exchange problem and currently OTP the same security level. In this paper, Park's proposed OTP generator design for us analysis. And then presents a resolution to the problem and new system logic. New system strong to Man-In-Middle attack and replay attack. In addition, OTP security level is higher.

  • PDF

Does Loss-Leader Pricing Work in Online Shopping Malls?

  • Yeum Dai-Sung;Chae Myungsin;Kim Ji-Young
    • Management Science and Financial Engineering
    • /
    • v.11 no.3
    • /
    • pp.95-107
    • /
    • 2005
  • As online shopping malls have emerged as a substantial shopping channel, they have used various sales promotion strategies to acquire new customers. Most of these strategies have been applied by offline malls for years. One, loss-leader pricing, is a type of promotional pricing in which stores sell well known products below their marginal cost, in order to attract customers and induce them to purchase more goods through impulse buying. This strategy is based on the expectation that customers will factor transaction costs into their purchasing decisions. However, its application to online malls fails to recognize that transaction costs are lower online, and that customers will behave differently as a result. Our study predicts that loss-leader pricing will not work online because online malls entail lower searching and moving costs than offline malls The study examines the effectiveness of loss-leader pricing with empirical data from a survey as well as log data from a Korean online shopping mall. The results show that while loss-leader pricing does attract customers to online shopping malls, it encourages cherry-picking rather than impulse purchases of regular-price goods.

A new security model in p2p network based on Rough set and Bayesian learner

  • Wang, Hai-Sheng;Gui, Xiao-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2370-2387
    • /
    • 2012
  • A new security management model based on Rough set and Bayesian learner is proposed in the paper. The model focuses on finding out malicious nodes and getting them under control. The degree of dissatisfaction (DoD) is defined as the probability that a node belongs to the malicious node set. Based on transaction history records local DoD (LDoD) is calculated. And recommended DoD (RDoD) is calculated based on feedbacks on recommendations (FBRs). According to the DoD, nodes are classified and controlled. In order to improve computation accuracy and efficiency of the probability, we employ Rough set combined with Bayesian learner. For the reason that in some cases, the corresponding probability result can be determined according to only one or two attribute values, the Rough set module is used; And in other cases, the probability is computed by Bayesian learner. Compared with the existing trust model, the simulation results demonstrate that the model can obtain higher examination rate of malicious nodes and achieve the higher transaction success rate.

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.

Trust Measurement Using Fuzzy Theory and Trade Protocol Recommendation Based on Trust Level in Trusted Auction System (신뢰 기반 경매 시스템에서의 퍼지를 이용한 신뢰도 측정과 신뢰도에 따른 거래 방식 추천)

  • 양근우;허순영
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.28 no.2
    • /
    • pp.17-33
    • /
    • 2003
  • The explosive growth of the internet-based transactions requires not only a secure payment system but also an appropriate trust measuring methodology and secure transaction protocols to guarantee the minimal risk for the transacting entities involved in specific transactions. Especially, in internet auction systems where either buyers or sellers or both can be more than one in one transaction, providing those systems that make sure no one transacting entity takes a major risk becomes critical. In this paper, an improved trust measuring method using a relationship-based internet community for an auction system is proposed. The proposed system incorporates fuzzy set and calculation concepts to help build trust matrices and models, which is used to measure the level of risk involved in a specific auction trade concerned. Also, to optimize the auction trade process in terms of cost and time, the proposed system recommends a differentiated trade protocol according to the risk level involved in each auction trade. To test the appropriateness of the proposed trusted auction system, a prototype system has been developed under a Windows-NT environment.

A Study on the Psychological anxiety on Private information leakage to likelihood of internet users (인터넷 이용자의 개인정보 유출 가능성에 대한심리적 불안에 관한 연구: 성별, 이용량, 이용 빈도를 중심으로)

  • Jin, Seong-Cheol;Kim, In-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.731-737
    • /
    • 2011
  • The purpose of this study is to examine Internet users' psychological anxiety about the possibility of personal information leakage. The investigator examined the difference of psychological anxiety focusing on the possibility of personal information leakage according to the use amount of Internet, the number of joined sites and the frequency of e-commerce transaction. Study findings show that women felt more psychological anxiety than men did. In addition, people who used Internet more frequently felt more psychological anxiety. However, the number of joined sites and the average frequency of e-commerce transaction in a month had no significant influence upon users' psychological anxiety about the possibility of personal information leakage.

A Study on the Application of Block Chain Ethereum Technology to Activate Digital Contents Trading as Sharing economy - data encryption and modify merkle tree-

  • Min, Youn-a;Baek, Yeong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.73-80
    • /
    • 2018
  • The shared economy began with the concept of sharing the physical and intellectual assets of individuals with others. Nowadays, the concept of shared economy is becoming one of the industries as an enterprise type. Especially, with the development of the Internet and smart devices, various forms of shared economy have been developed in accordance with the need of sharing of individual income. Digital content is also a shareable commodity and it is seeking to utilize it as an item of shared economy. Accordingly, when digital contents are used as a shared economy, there are various possible threats -security threats that may arise in the course of transactions, potential for theft, alteration and hacking of contents. In this paper, we propose transaction method and content protection method using block chain-ethereum technology to reduce security threats and transparent transactions that can occur in digital contents transactions. Through the proposed method, the trust of the consumer and the supplier can be measured and the encryption can be performed considering the characteristics of the data to be traded. Through this paper, it is possible to increase the transparency of smart transaction of digital contents and to reduce the risk of content distortion, hacking, etc.