• Title/Summary/Keyword: e-Payment

Search Result 328, Processing Time 0.025 seconds

A study on the send and receive of the message in the bolero and TEDI system (Bolero와 TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.105-121
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the both Bolero and TEDI System. Bolero System is the business processes and methods, together with the digital information system, which are provided by Bolero International for communicating Messages and Documents and facilitating business transactions, as well as the Bolero Rulebook and Operating Rules governing their use. On the other hand, The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Servers, a RSP Server, and Certification Servers.

  • PDF

Indirection Model and Application of Electronic Mail Control System Considering High Availability (고가용성을 고려한 전자메일통제시스템의 우회 모델 및 응용)

  • Kim Young Soo;Suh Jung Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.348-354
    • /
    • 2005
  • These days, Electronic mail is being used in everyday's life. And on the other hand, we are facing spam mails' problems. Spam mails are widely used by means of marketing in e-Commerce. To block these spam mails, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Electronic Mail Control System(IMEMCS) which controls an unsolicited electronic mail and prevents an useful electronic mail from discarding. We design and implement the IMEMCS to enhance the usefulness and the availability. Being tested the IMEMCS to verify the usability and the efficiency, it gave us a very successful result.

A Prediction Model for Internet Game Addiction in Adolescents: Using a Decision Tree Analysis (의사결정나무 분석기법을 이용한 청소년의 인터넷게임 중독 영향 요인 예측 모형 구축)

  • Kim, Ki-Sook;Kim, Kyung-Hee
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.3
    • /
    • pp.378-388
    • /
    • 2010
  • Purpose: This study was designed to build a theoretical frame to provide practical help to prevent and manage adolescent internet game addiction by developing a prediction model through a comprehensive analysis of related factors. Methods: The participants were 1,318 students studying in elementary, middle, and high schools in Seoul and Gyeonggi Province, Korea. Collected data were analyzed using the SPSS program. Decision Tree Analysis using the Clementine program was applied to build an optimum and significant prediction model to predict internet game addiction related to various factors, especially parent related factors. Results: From the data analyses, the prediction model for factors related to internet game addiction presented with 5 pathways. Causative factors included gender, type of school, siblings, economic status, religion, time spent alone, gaming place, payment to Internet cafe$\acute{e}$, frequency, duration, parent's ability to use internet, occupation (mother), trust (father), expectations regarding adolescent's study (mother), supervising (both parents), rearing attitude (both parents). Conclusion: The results suggest preventive and managerial nursing programs for specific groups by path. Use of this predictive model can expand the role of school nurses, not only in counseling addicted adolescents but also, in developing and carrying out programs with parents and approaching adolescents individually through databases and computer programming.

A Study on the Discrimination of Use Intention by Critical T-Commerce Factors (T-Commerce 요인에 따른 사용의도 판별에 관한 연구)

  • Kim, Ju-An
    • International Commerce and Information Review
    • /
    • v.8 no.3
    • /
    • pp.71-95
    • /
    • 2006
  • In recent, T-commerce is widely dispersed as alternative type of commerce. It is forecasted that t-commerce system is used more than e-commerce system. Therefore more and more t-commerce-related industries are also recognizing that t-commerce is a critical business model. It is needed to understand the concept of t-commerce and develop the t-commerce marketing strategy. CEO analyses consumer's behaviors according to the data about buyers and applies the advantage of t-commerce to the communication with customers. This t-commerce system plays an important role in maximizing customer satisfaction and affecting their intention to reuse it. Therefore this paper attempts to identify T-commerce critical success factors and divide between use-intention group and unuse-intention group by taking out a discriminant function by the discriminant analysis. This lays a foundation in developing T-commerce strategy. According to the discriminant function extracted, convenience factor, amusement factor, system quality factor, product perception factor are significant in the sequence of influential degree. However, usefulness factor and speedy connection factor are not significant. In result, the target hitting rate is 77.9% in the first unuse-intention group and it is 95.2% in the second use-intention group. The total discriminant target hitting rate is computed to higher value, 86.55%. The statistic package, SPSS 12.0, is used to survey and analyse data and test the hypothesis. The validity and reliability of variables are verified by both reliability analysis and factor analysis. The discriminant analysis is used to tell the difference between use-intention group and unuse-intention group.

  • PDF

Research on Construction of the Logistics Legal System in CJK FTA

  • Yi, Shan;Su, Shuai
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.3 no.4
    • /
    • pp.21-28
    • /
    • 2015
  • With CJK FTA as a starting point, this paper mainly studied the role of the logistics legal system in promoting marine industrial cooperation, facilitating investment trade, establishing international transport logistics, building marine economy international cooperation demonstration zone and deepening the economic and financial cooperation between China, Japan and Korea, and explored the way to establish an integrated logistics system between China, Japan and Korea to match the e-commerce certification system, online payment system and logistics distribution, thereby gradually promoting economic development and logistics integration in Northeast Asia, improving logistics efficiency, reducing logistics costs and establishing a unified logistics industry standardization system. This will accelerate logistics industry integration in Northeast Asia, build a unified logistics management center in Northeast Asia, and promote a new model of integrated logistics cooperation in Northeast Asia. Therefore, it has a practical and reference significance. In short, the improvement for the logistics legal system in CJK FTA is not the responsibility of a country or several countries. It concerns the development and prosperity for the logistics industry in the three countries and is an inevitable choice to promote the vigorous development of CJK FTA and economic take-off of each country.

An Effective Protection Mechanism for SSL Man-in-the-Middle Proxy Attacks (SSL MITM 프록시 공격에 대한 효과적 방어방법)

  • Lim, Cha-Sung;Lee, Woo-Key;Jo, Tae-Chang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.693-697
    • /
    • 2010
  • In current e-commerce system, it happens that client's confidential information such as credit card numbers, pin numbers, or digital certificate may pass through a web proxy server or an altered proxy server without client's awareness. Even though the confidential information is encrypted and sent through SSL(Secure Sockets Layer) or TLS(Transport Layer Security) protocol, it can be exposed to the risk of sniffing by the digital certificate forgery at the proxy server, which is called the SSL MITM(Man-In-The-Middle) Proxy attack. In this paper, current credit card web-payment systems, which is weak at proxy information alternation attack, are analyzed. A resolution with certificate proxy server is also proposed to prevent the MITM attack.

Applicability Evaluation of Agricultural Subsidies Inspection Using Unmanned Aerial Vehicle (무인항공기를 이용한 직불제 이행점검 적용성 평가)

  • Park, Jin Ki;Park, Jong Hwa
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.58 no.5
    • /
    • pp.29-37
    • /
    • 2016
  • Unmanned Aerial Vehicle (UAV) have several advantages over conventional remote sensing techniques. UAV can acquire high-resolution images quickly and repeatedly with a comparatively lower flight altitude i.e. 80~400 m nullifying the effect of extreme weather and cloud. This study discussed the use of low cost-effective UAV based remote sensing application in inspection of agricultural subsidy. The study area accrue $60.5km^2$ of Buljeong-myeon, Goesan-gun, Chungbuk in South Korea. UAV image acquired 25 times from July 25 to August 11, 2015 for 3 days. It is observed that almost 81.1 % (3,571 of 4,410 parcels) parcels are truthful whereas some parcels are incorrect or fraudulent. Surveying with UAV for agricultural subsidy instead of field stuff can reduce the required time as much as 64.8 % (19 of 54 days). Therefore, it can contribute significantly in speedy and more accurate processing of grant application and can end unfair receipt of the grant which in turn will improve customer satisfaction.

A Case Study on the Business Innovation for increasing National Science and Technology Competitiveness power - Simplification and Digitalization of R&D Expenses Performance procedure - (국가과학기술경쟁력 제고를 위한 과학기술부 업무혁신 사례 - 연구비 집행절차 간소화 및 디지털화 -)

  • Kim, Bong-Su;Lee, Eun-Yeong;Choe, Un-Baek;Jang, Bo-Hyeon
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.51-58
    • /
    • 2007
  • Considering innovation a key to raising living standards, the Ministry of Science and Technology has put in place various measures meeting the needs of the newly promoted Deputy Prime Minister of Science and Technology. Such measures include business process reengineering as streamlining the work process to achieve the improvement in quality and efficiency: building the integrated performance management system to promote performance-or tented environment; and running the 1ifelong learning system for better competitiveness of government officials. Further to the innovation efforts at work, the number of steps of the R&D budget execution is streamlined from eight to five and its payment period is considerably reduced to 15 days from 60 days. In addition, the digitalized R&D budget management systems such as e-Contract System, One-click Processing Monitoring System, and Information Service System through Short Message Service (SMS) will contribute to improving R&D performance. And these systems are efficiently integrated into a portal interface named "Yeon-gu-ma-ru." The Ministry of Science and Technology, spearheading nationwide innovation, will continue efforts to make viable achievements of innovation.

  • PDF

- A Study on the Reliability and Activation Plan for Internet Electronic Commerce of Crafts - - With Centering Around Artshop - (인터넷상 공예품 상거래의 신뢰성과 활성화 방안 연구 - 아트샵을 중심으로 -)

  • Lee Hyung Kyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.109-120
    • /
    • 2004
  • As an information-oriented era arrives, an environmental change of Internet marketing is going with high speed and such open door around the countries is providing worldwide companies with a new business opportunity. Now, Internet is a new communication tool for global network and is emerging as a new e-commerce market. Also, this trend is having an effect upon online site that sell crafts. Hence, this study aims to select artshop, which simultaneously operate off line and online while sell crafts, to research the present status, and analyze the problems to suggest the activation plans for effective Internet commerce. Accordingly, this study suggested six models for the settlement of these problem s and the activation plans as following: offer of the various works and the contents, security of price competition, reinforcement of marketing, establishment of brand recognition, management of customers and settlement of payment ways etc. The commerce of crafts in the artshop is only early stage today, but it is expected to grow into an universal connection way of information and buying which transcend space and to be briskly used for securing the competition of crafts in 21century.

A Study of PKI-Based E-commerce Security System Design under Java Code Environment (Java Code를 중심으로한 PKI기반 전자상거래 보안시스템 설계)

  • Bang, Kee-Chun;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.51-57
    • /
    • 2013
  • RSA is the most widely used public key algorithms. Payment via the SSL communications, and user authentication using RSA secure shopping mall that can protect the user's valuable information in the process of building. SSL-based electronic signature technology and encryption protocols for this technology are electronic documents are delivered to the other party through a separate encryption process, the information sender to enter information on a web browser (user) and the recipient (the Web server of the site Manager), except you will not be able to decrypt the contents. Therefore, the information is encrypted during the transfer of electronic documents even if hackers trying to Sniffing because its contents can never understand. Of internet shopping mall in the user authentication 'and' Communications' SSL secure shopping mall built with the goal of the methodology are presented.