• Title/Summary/Keyword: financial transaction

Search Result 285, Processing Time 0.024 seconds

The Problems and Guidances of Digital Certification in EC (전자서명 인증제도의 문제점과 발전방향)

  • Kang Tea-Gyung;Hwang Sang-Gyu
    • Management & Information Systems Review
    • /
    • v.12
    • /
    • pp.1-15
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

A Study on Problems of Digital Certification System (전자인증제도(電子認證制度)의 문제점(問題點)에 관한 연구(硏究))

  • Hwang, Sang-Kyu
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.495-522
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

A Study on Digital Certification Based on the Electronic Commerce (전자상거래기반하의 전자인증에 관한 연구)

  • 황상규;이재달
    • Journal of Korea Port Economic Association
    • /
    • v.19 no.1
    • /
    • pp.223-245
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

Family Ownership's Predisposition to the Related Party Transaction and Its Influence on a Stock Price Crash: Evidence from Indonesia

  • SUMIYANA, Sumiyana;SETYOWATI, Servatia Mayang
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.103-115
    • /
    • 2021
  • This study investigates the relationship between family ownership and the stock price crash risk. It believes that this relationship would never be in direct connection. The authors design and then find that family ownership is predisposed, in the first place, to the related party transaction, then the related party transaction causes the future stock price crash. This study infers that employing the power of family ownership creates the Type I agency problem, although this is not relevant for the Type II problem. From the perspective of the hoarding theory, family ownerships produce opaque accounts by blurring financial information. The blurred information is probably hidden in the related party transactions. This study, therefore, splits these transactions into accounts receivable, other accounts receivable and other receivables. Finally, this research concludes that the family ownership affects related party transactions. These then are used as an instrument to influence the leaded related party transaction. The latest, leaded related party transactions influence the future stock price crash. This study infers that related party transactions are abusive practices, especially on the types of receivables. It implies corporate governance's revitalisation.

A Descriptive Study of IT Outsourcing Risk Factors in the Korean Financial Industry (국내 금융업 IT 아웃소싱 수행의사에 영향을 미치는 위험요인에 관한 연구)

  • Lee, Moo-Seok;Lee, Jung-Hoon;Park, Jong-Sung
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.151-166
    • /
    • 2008
  • The Outsourcing Industry has grown at a swift pace and evolved over time, and the Global IT Outsourcing market has shown signs of a steady growth. In the Korean financial industry, however, IT Outsourcing is not active as that of the advanced countries and there is lack of literature to understand the characteristics of IT Outsourcing in the financial industry. This paper, therefore, analyze the outcomes surveying 40 financial companies in Korea to investigate how IT Outsourcing risk factors affects IT Outsourcing intention. Based on our literature reviews based on number of key articles, journals, and the focus group interviews, IT Outsourcing risk factors are proposed into four different domains: Transaction, Client, Vendor and Environmental perspective. It found that two risk factors (Client and Environmental perspective) are closely related to the IT Outsourcing intention of the Korean financial industry. Finally, this paper concludes that concrete SLAs (Service Level Agreements) of the clients and support of government agencies are important to mitigate the IT Outsourcing risks.

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

A Study on Financial Sharing Economic Business Model by the Digital Technology Development (디지털기술의 발달에 따른 금융부문의 공유경제 비즈니스모델 탐색)

  • Song, Keyong Seog
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.4_spc
    • /
    • pp.485-499
    • /
    • 2014
  • Sharing Economy is the modern main item with ICT Development. Of course sharing economic item is the old and long run mainstream, but by the ICT technological development sharing economy is the fostering and affluent factors in the world economic growth. Though, in Korea, till now sharing economy is minimal, that will growth sharply. We can track various business models of sharing economy. Sharing economy is to buy use right not ownership. With the sharing economic business model wee can make also financial sharing model. In finance model we can divide two kind models. First, we can trace small size lending model with p2p type. And second, we can make financial information transaction model. But till now sharing economic system is not activated, because of many reasons. To activate, first we have to set law and various standards, and also government actively support many sharing economy firms and institutions. To catch up developed countries in the field of sharing economy we have to make aggressive and flexible rules and standards.

An Empirical Study on the Determinants of Information Systems Sourcing: Focus on Korean Financial Institutions (정보시스템의 소싱 결정에 영향을 미치는 주요 요인에 대한 실증 연구 - 국내 금융기관을 중심으로 -)

  • Won, Young-Nam;Lee, Moon-Bong;Suh, Kil-Soo
    • Asia pacific journal of information systems
    • /
    • v.10 no.3
    • /
    • pp.1-16
    • /
    • 2000
  • The purpose of this research is to validate the determinants of information systems(IS) sourcing strategy focusing on Korean financial institutions. Based on the factor analyses and discriminant analyses using data from 34 major Korean financial institutions, we observed that determinants of IS souring strategy are perceived risks, strategic expectations and organizational IS maturity. If the clients have clear objectives, can control the risks from IS sourcing, and have information systems in the less-matured stage, they frequently outsource their IS. In view of the IS maturity, previous studies suggest that more-matured IS are outsourced. But the results of this study show that more-matured IS are insourced. These phenomena can be explained by classifying IS by their functions. Transaction processing systems, which are mission-critical, are generally insourced, but decision support systems, which are in their mature state, are generally outsourced.

  • PDF