• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.024 seconds

Secure Electronic Trading System for Online Game-Items (온라인 게임 아이템의 안전한 전자 거래 시스템)

  • 정윤경;기준백;천정희
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.91-99
    • /
    • 2003
  • In this paper, we analyze the current trading systems and suggest two secure electronic trading systems that make a fair exchange for online game items. The system is made up for the weak points in the current item trading system. In the proposed system, a game server issues a certificate each item on the user's request. On the one hand, this certificate is used to recover the item when the system error is occured. On the other hand, the user may exchange it with another item or cyber money. The proposed system supports private and reliable trading. Further, the trading can be completed only by online processing.

Computer Literacy Skills as a Determinant of Electronic Reference Sources Utilization among Selected Secondary School Students in Ado-Odo Ota Local Government, Ogun State, Nigeria

  • Elizabeth Bukunola Lateef;Opene Sunday Ozonuwe;Adesanmi Mathew Farukuoye
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.2
    • /
    • pp.81-97
    • /
    • 2024
  • The study investigated computer literacy skills as a determinant of electronic reference sources utilization among selected secondary school students in Ado-Odo Ota Local Government, Ogun State, Nigeria. Four specific objectives with conforming research questions guided the study. Descriptive survey research design was adopted for the study. The population of the study comprises of SSS3 students of the three selected Community Secondary Schools in Ado Odo Ota. A sample size of 150 was used for the study. The instrument for data collection was a self-developed structured questionnaire. Data collected was analyzed using frequency and percentages. Findings of the study revealed that majority of secondary school students were not aware of the availability of electronic reference sources. It also revealed that the level of their computer literacy skills was below average. Majority of them have never used computer before and the few of them that have used computer before used it in their homes, their friend's homes or in the cyber café. It was found that lack of formal training on the use of electronic reference sources, lack of access to computer, lack of awareness of availability of electronic reference sources, lack of funds for internet subscriptions, over dependency on printed reference sources and lack of motivation to use electronic reference sources were the major hindrances to the use of electronic reference sources among secondary school students. It was recommended that the school librarians and teachers should play a role in creating awareness among secondary school students about the availability of online/ electronic reference sources among others.

A Study on the Effects of Flow on Customer Purchase Intention in Internet Shopping Malls (인터넷쇼핑몰에서 Flow가 소비자 구매의도에 미치는 영향에 관한 연구)

  • 안운석;박종원
    • Journal of Korean Society for Quality Management
    • /
    • v.32 no.2
    • /
    • pp.24-36
    • /
    • 2004
  • In order for electronic commerce to be successful, it must have a theoretical framework that considers the characteristics of the internet user who are consumers in the cyber space and impacts their purchase intentions. We were able to obtain participations of 316 people, and derived statistics by means of SPSS/PC version 10.0 and Amos 4.0 statistics package. We found that, the higher the degree of skill and the sense of challenge, the level of involvement and perceived service quality increased. And the degree of skill has a negative influence on awareness of perceived risk than the sense of challenge. Perceived service quality, perceived risk and involvement has a influence on purchase intentions.

Fish Schooling Animation System for Constructing Contents of Cyber Aquarium

  • Kim, Jong-Chan;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.3
    • /
    • pp.157-162
    • /
    • 2007
  • The goal of researching a proper crowd animation is to design system that is satisfied with the reality of scenes, performance of system, and interaction with users to show the crowd vividly and effectively in virtual underwater world. In this paper, we smartly expressed the behavior patterns for flocks of fish in virtual underwater and we made up for the weak points in spending time and cost to produce crowd animation. We compared with the number of mesh, the number of fish, the number of frame, elapsed time, and resolution and analyzes them with the fish behavior simulating system. We developed a virtual underwater simulator using this system.

  • PDF

A Study on the Cost Down in Internet of International Trade Firms (인터넷 활용도가 무역업체의 비용 절감에 미치는 영향에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.4 no.4
    • /
    • pp.73-87
    • /
    • 2001
  • This research is to study the frequency of internet use in domestic trading companies and to analyze how to appear the effect of internet use in accordance with the frequency of internet use. To subdivide the analysis, the effect of internet use is classified into the curtailment effect of transaction & Time. Prior to examining the effect of internet use, I survey the concepts, trends, and prospect of cyber trade in electronic commerce through the research of documents. Before the positive analysis, I synthetically evaluated the characteristics of existing researches regarding electronic commerce and internet trade.

  • PDF

A Practical and Secure Electronic Election System

  • Lee, Yun-Ho;Won, Dong-Ho
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.55-65
    • /
    • 2012
  • E-voting is expected to offer prominent advantages over traditional voting methods. Advantages include faster tallying, greater accuracy, prevention of void ballots, and lower cost. However, many experts express concerns about the potential for large-scale fraud. Recently, many paper based end-to-end (E2E) voter verifiable systems providing individual verifiability and universal verifiability have been proposed. These systems, unlike previous voting systems, are used in polling booths and without access to trusted computing devices at the time of voting. In this paper, we propose a practical and secure E2E voter verifiable system using a paper receipt based on cryptographic technologies.

A Study on the Utilization of the Internet Based Electronic Commerce (인터넷을 이용한 전자상거래 활용에 관한 연구)

  • 정기호;손종호;오지환
    • The Journal of Information Systems
    • /
    • v.7 no.1
    • /
    • pp.209-224
    • /
    • 1998
  • The Internet is one of the most noticeable things in the information wave, which is spreading in the whole society. At first, the Internet was mainly used to exchange the information between organizations like universities, institutions and companies, but recently it is widely used as the method for the commerce. Therefore the Internet is recognized as a new strategic tool for the business and electronic commerce(EC) supported by the Internet has become a new type of business in the cyber space. This study is to know the current situation of EC by investigating the effect of the Internet compared with the cost. For this purpose we surveyed 162 Korean companies and analyzed the questionaries collected from them. As a result of the analysis it is shown that the Internet is useful for improving the efficiency of business and advertising the company.

  • PDF

Method of Forewarning Display for Hacking Risk in the Open Wi-Fi (개방형 무료 Wi-Fi의 해킹위험 사전경고 표시)

  • Jeong, Byung-Moon;Lee, Tae-Hee;Lee, Young-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • In this paper, we proposed a method to display a hazard warning of hacking in the UX(: User Experience) concept level for non experts in the open Wi-Fi access area. According to the dangers of the AP raised by capture, we developed an application that provides a warning pop-up on the danger of hacking before using for APs that are distinguished by color and selected.

Hybrid e-Payment Systems for Shopping-Mall (쇼핑몰을 위한 혼합형 전자지불 시스템)

  • 김은영;조동섭
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.245-247
    • /
    • 2000
  • 산업 혁명에 뒤이은 디지털 혁명 시대에 가장 큰 변화는 경제 활동의 변화를 들 수 있을 것이다. 기존에 존재하던 많은 실물 시장(Real Market)은 가상 공간(Cyber Space)상으로 이전하게 되고 이 속에서 디지털 데이터를 근간으로 각종 구입, 판매 그리고 대금 지불이 이루어지고 있다. 이러한 환경에서 가장 중요한 것은 지불 방법에 관한 문제로 기존의 지불 방법으로는 한계가 발생하게 된다. 인터넷 환경에 적합한 새로운 지불 방법이 요구되고 있으며 그 해결책으로서 전자화폐(Electronic Cash)가 등장하게 되었다. 전자화폐는 기존의 화폐를 대신하여 인터넷상의 전자상거래(Electronic Commerce)에서 사용되고 있으며, 실물 화폐와 더불어 중요한 지불 수단으로 등장하고 있다. 본 연구에서는 기존의 전자지불 수단을 비교, 분석하여 새로운 지불시스템인 혼합형 전자지불 시스템을 제시하고 구체적 활용에 대해 살펴보고자 한다.

  • PDF

A Study on Constructing of Security Monitoring Schema based on Darknet Traffic (다크넷 트래픽을 활용한 보안관제 체계 구축에 관한 연구)

  • Park, Si-Jang;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1841-1848
    • /
    • 2013
  • In this paper, the plans for improvement of real-time security monitoring accuracy and expansion of control region were investigated through comprehensive and systematic collection and analysis of the anomalous activities that inflow and outflow in the network on a large scale in order to overcome the existing security monitoring system based on stylized detection patterns which could correspond to only very limited cyber attacks. This study established an anomaly observation system to collect, store and analyze a diverse infringement threat information flowing into the darknet network, and presented the information classification system of cyber threats, unknown anomalies and high-risk anomalous activities through the statistics based trend analysis of hacking. If this security monitoring system utilizing darknet traffic as presented in the study is applied, it was indicated that detection of all infringement threats was increased by 12.6 percent compared with conventional case and 120 kinds of new type and varietal attacks that could not be detected in the past were detected.