• Title/Summary/Keyword: internet electronic commerce

Search Result 598, Processing Time 0.024 seconds

The effect of electronic commerce on the economy - logistics industry perspective - (전자상거래가 경제에 미치는 효과 - 물류 정보화를 중심으로 -)

  • 김범환
    • Proceedings of the Technology Innovation Conference
    • /
    • 1999.12a
    • /
    • pp.281-295
    • /
    • 1999
  • This paper analyses the effects of the increase of logistics outsourcing on the economy which are largely classified into three parts. The firm level and industry level are two among them which will be summarized below. The another is consumers level. On the fm level, the logistics outsourcing of a manufacturing firm not only helps to increase the efficiency of itself and but also confront the competitive environments by weakening the entry barriers, i.e., the emergence of contestable market. The reasons why the efficiency of the firm enhances are also largely divided into two parts. One is due to the reduction of inventory cost by replacing it by the information cost resulting from internet use. The other is owing to reducing the life cycle of production process by the emergence of virtual enterprises which are located in one point in De process of supply chain management. The weakening of entry barriers is directly affected by the drastic increase of internet users in twofold reasons: one is based on the restricted competitive characteristics due to the long-term transaction relationship between logistics providers and the companies who offer logistics services and the other, due to the weakening of the restriction of space and time. The effect of industry level is due to the transition of traditional to virtual vertical integration system The firms corresponding to a connection point in the process of supply chain management would try to realize both the scale of economy and the scope of economy for strengthening the competitiveness. We indicated above the emergence of contestable market however, it is a short-term phenomenon and result in the oligopoly market due to the entry barriers in the long-run sense.

  • PDF

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

Comparison & Analysis of Drones in Major Countries based on Self-Driving in IoT Environment (사물인터넷 환경에서 자율주행 기반의 주요국 드론 특성 비교/분석)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.31-36
    • /
    • 2020
  • The remarkable change in the automobile industry, which is a traditional industrial field, is now evolving into a form of moving toward autonomous functions rather than humans due to various convenience functions and automatic driving or autonomous driving technologies if the person was central when driving the car. This situation is expanding to various industries such as the aviation industry and the drone market, as well as the robot market. The drone market in the aviation industry is being used in various fields due to the unmanned nature of drone operation. Among them, military drones are secret and due to the specificity of technology, details are not disclosed, but as a collection of advanced technologies, they have played a key role in drone development. In this study, the current status of China and the European Union, including the United States, which are major competitors in the drone field, was investigated, and the technologies of major countries were compared and analyzed through the characteristics and operational specifications of the drones currently in operation.

Automatic Product Feature Extraction for Efficient Analysis of Product Reviews Using Term Statistics (효율적인 상품평 분석을 위한 어휘 통계 정보 기반 평가 항목 추출 시스템)

  • Lee, Woo-Chul;Lee, Hyun-Ah;Lee, Kong-Joo
    • The KIPS Transactions:PartB
    • /
    • v.16B no.6
    • /
    • pp.497-502
    • /
    • 2009
  • In this paper, we introduce an automatic product feature extracting system that improves the efficiency of product review analysis. Our system consists of 2 parts: a review collection and correction part and a product feature extraction part. The former part collects reviews from internet shopping malls and revises spoken style or ungrammatical sentences. In the latter part, product features that mean items that can be used as evaluation criteria like 'size' and 'style' for a skirt are automatically extracted by utilizing term statistics in reviews and web documents on the Internet. We choose nouns in reviews as candidates for product features, and calculate degree of association between candidate nouns and products by combining inner association degree and outer association degree. Inner association degree is calculated from noun frequency in reviews and outer association degree is calculated from co-occurrence frequency of a candidate noun and a product name in web documents. In evaluation results, our extraction method showed an average recall of 90%, which is better than the results of previous approaches.

A Study on the On-Line Senior Mall's Quality Factor and Customer Satisfaction (온라인 고령친화용품점 품질 요인 및 고객 만족에 관한 연구 - 고령친화용품을 중심으로 -)

  • Jeong, Han-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.215-223
    • /
    • 2007
  • On-Line Shopping mall is becoming important strategic environment that decide corporation's competitive advantages because of that can achieve quality of customer service and offer speed elevation through both-way communication effectively. Accordingly, as interest about electronic commerce rises, various research had been gone. But, most researches are applying off-line market's quality of service measurement tool just as it is doing not consider special quality of internet. Consider and prescribe by system quality, and saw that thing with grasp relation with customer satisfaction along with qualify of service is important for factor that environmental element influences in customer satisfaction as existing commercial transaction in this research hereupon. That is, wished to present quality strategy necessary to examine whether some quality factor of system quality and quality of service affects more customer satisfaction, and satisfy various customer's needs accordingly after ermine whether it are switching and some relation that search purchase alteration availability of market that is different from loyalty which recommend internet shopping mall to another person who is system quality factor and quality of service factor and customer satisfaction factor actively.

  • PDF

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

Research on Efficient Smart Factory Promotion System in IoT Environment (사물인터넷 환경에서의 효율적인 스마트 공장 추진 체계 연구)

  • Lee, Dong-Woo;Cho, Kwangmoon;Lee, Seong-Hoon
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.59-64
    • /
    • 2020
  • Recently, many difficulties have been faced in all parts of the world due to the impact of COVID-19. Personally, household income is decreasing sharply as many jobs disappear, and economically, many SMEs are increasingly going bankrupt. It is known that this phenomenon is highly likely to continue for the time being. In such a situation, the smart factory support project provides opportunities for difficult SMEs to improve productivity and change the corporate structure. In this study, the current status of smart factory promotion was examined, and problems occurring in the process of promoting smart factory support projects were identified. The improvement plans were derived so that more efficient projects could be promoted in the future.

A Proposal for Mobile Gallery Auction Method Using NFC-based FIDO and 2 Factor Technology and Permission-type Distributed Director Block-chain (NFC 기반 FIDO(Fast IDentity Online) 및 2 Factor 기술과 허가형 분산원장 블록체인을 이용한 모바일 갤러리 경매 방안 제안)

  • Noh, Sun-Kuk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.129-135
    • /
    • 2019
  • Recently, studies have been conducted to improve the m-commerce process in the NFC-based mobile environment and the increase of the number of smart phones built in NFC. Since authentication is important in mobile electronic payment, FIDO(Fast IDentity Online) and 2 Factor electronic payment system are applied. In addition, block-chains using distributed raw materials have emerged as a representative technology of the fourth industry. In this study, for the mobile gallery auction of the traders using NFC embedded terminal (smartphone) in a small gallery auction in which an unspecified minority participates, password-based authentication and biometric authentication technology (fingerprint) were applied to record transaction details and ownership transfer of the auction participants in electronic payment. And, for the cost reduction and data integrity related to gallery auction, the private distributed director block chain was constructed and used. In addition, domestic and foreign cases applying block chain in the auction field were investigated and compared. In the future, the study will also study the implementation of block chain networks and smart contract and the integration of block chain and artificial intelligence to apply the proposed method.

A Study on the Protecting of Personal Information in Offline Transactions : Focused on the Housing Lease Agreements (오프라인 거래에서 개인정보 보호방안 : 주택임대차계약을 중심으로)

  • Kim, HyoSeok;Park, Soon-Tai;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.243-252
    • /
    • 2020
  • Recently, the proportion of housing lease has been increasing to an overwhelming level in line with the increase of single-person households and the change in the form of housing. In the normal case, the use of rental-type housing is subject to a housing lease agreement through a licensed real estate agent. In the event of a transaction conclusion, licensed real estate agent shall issue a contract containing the personal information of the lessee, the renter, and the licensed real estate agent to the transaction party. In this case, it is necessary for the lessee to provide the contract to a third party. This paper analyzes relevant laws and regulations and the status of housing transactions, focusing on personal information processed between offline housing lease agreements. And when issuing a contract through IRTS, we propose a way to protect personal information by providing a third party in three forms: information Data Subject-based, Purpose of usage-based De-identification, and Certificate of Contract.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.