• Title/Summary/Keyword: genuine guarantee system

Search Result 6, Processing Time 0.017 seconds

A Study on the Factors Affecting Genuine Guarantee System's Acceptance (진품확인시스템의 수용도에 영향을 미치는 요인에 관한 연구)

  • Ryu Gui-Jin;Kwon Hyeog-In
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.1-25
    • /
    • 2005
  • Recently genuine products and good commerce have been threatened by distributing forgery in home and abroad markets. It is because most customers cannot distinguish whether genuine or forgery, so establishing of strict distribution system is needed. Therefore recently Genuine Guarantee System which can confirm genuine products has been developed using the Internet. The object of this system is protecting to purchase forgery by confirming distribution system. This system can provide a reliable environment of consumption. But to be diffused at distribution structure and applied, We require the understanding about not only technical side but behavior side. That is, we need to research the cause and process of using this new information system. in this research, we understand the cause of affection on the system's acceptance and define the suitability about the model according to Technology Acceptance Model by Davis. The above can build the suitable operating strategy and understand the criterion as a new business model.

  • PDF

Genuine guarantee system for true korean ginseng (전자상거래기술을 기반으로 한 고려인삼 진품확인시스템)

  • Kwon, Hyuk-In;Yoon, Sim
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.2
    • /
    • pp.1-19
    • /
    • 2002
  • Lately, the Korean ginseng was confronted with the sale crisis in world markets from the various circumstance. One of important difficulties is overspreading of Korean ginseng imitative in foreign markets. In Korean markets also, chinese ginseng was imported illegally and manufactured as Korean ginseng, which was resulted in the damage of Korean ginseng brand. The most essential problem is misunderstanding of Korean ginseng's information in the foreigner. In this paper, we developed a genuine guarantee system to identify the true Korean ginseng through internet and geographic cording system of Korean ginseng products. This system can be applied to the enforcement of Korean ginseng sale to international markets.

  • PDF

Strategies for Channel Innovation of True Korea Ginseng Distribution Using Genuine Guarantee System (진품확인시스템을 활용한 고려인삼 유통혁신전략)

  • 권혁인
    • Journal of Ginseng Research
    • /
    • v.25 no.4
    • /
    • pp.171-177
    • /
    • 2001
  • Lately, the Korean ginseng was confronted with the sale crisis in world markets from the various circumstance. One of important difficulties is overspreading of Korean ginseng imitative in foreign markets. In Korean markets also, chinese ginseng was imported illegally and manufactured as Korean ginseng, which was resulted inthe damage of Korean ginseng brand. The most essential problem is misunderstanding of Korean ginseng 。 s information in the foreigner. In this paper, we developed a genuine guarantee system to identify the true Korean ginseng through internet and geographic cording system of Korean ginseng products. This system can be applied to the enforcement of Korean ginseng sale to international markets.

  • PDF

Charging and Revenue Estimation for the WiMAX System

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.288-303
    • /
    • 2009
  • In the near future it is foreseen that a genuine multimedia service over the WiMAX system is provided in a worldwide manner by exploiting the QoS technologies introduced in the wireless and wired broadband network. In this work we propose a pricing scheme for the multimedia service over the generic WiMAX system that supports a full QoS functionality. We assume real-time services such as the voice and video as well as the nonreal-time service such as the conventional high-speed data, and we propose a pricing and charging scheme for those services by investigating the inherent characteristics of those services and the multiple-class of QoS-service provided to them. After that we propose a method to compute expected revenue that is obtained from the WiMAX system by using an analytic method to estimate the usage of the bandwidth resources for the different class of services. Via numerical experiment, we verify the implication of the work.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

A Study on Institutional Reliability of Open Record Information in the Information Disclosure System (정보공개제도에서 공개 기록정보의 제도적 신뢰성에 관한 연구)

  • Lee, Bo-ram;Lee, Young-hak
    • The Korean Journal of Archival Studies
    • /
    • no.35
    • /
    • pp.41-91
    • /
    • 2013
  • There have been numerous steps of growth in policy system since the legal systemization through the enactment of Information Disclosure of public institution Act in 1996 and Records Management of public institution Act in 1999 as well as infrastructure advancement led by government bodies, but it still shows insufficiency in some aspects of information disclosure system and records management. In particular, the issue of reliability on record information disclosed through information disclosure system is raised, and institutional base through the legal and technical devices to ensure the reliability are not well prepared. Government has attempted to enact laws and regulations to guarantee the public right to know through information disclosure and records management at government level, and establish the national system in a way that advances the infrastructure for encouraging the participation in state affairs and utilization of national record information resources. There are limitations that it lacks internal stability and overlooks the impact and significance of record information itself by focusing upon system expansion and disclosing information quantatively. Numerous record information disclosed tends to be falsified, forged, extracted or manufactured by information disclosure staffs, or provided in a form other than official document or draft. In addition, the disclosure or non-disclosure decisions without consistency and criteria due to lack of information disclosure staff or titular supervising authority, which is likely to lead to societal confusion. There are also frequent cases where the reliability is damaged due to voluntary decision, false response or non response depending upon request agents for information disclosure. In other cases, vague request by information disclosure applicant or civil complaint form request are likely to hinder the reliability of record information. Thus it is essential to ensure the reliability of record information by establishing and amending relevant laws and regulations, systemic improvement through organizational and staff expertise advancement, supplementing the information disclosure system and process, and changing the social perception on information disclosure. That is, reliable record information is expected to contribute to genuine governance form administration as well as accountability of government bodies and public organizations. In conclusion, there are needed numerous attempts to ensure the reliability of record information to be disclosure in the future beyond previous trials of perceiving record information as records systematically and focusing upon disclosing more information and external development of system.