• Title/Summary/Keyword: member information

Search Result 1,037, Processing Time 0.026 seconds

Protection of Consumer Privacy in Electronic Commerce -Focused on On-line Monitoring Survey of Electronic Commerce Firms- (전자상거래에 있어서 소비자 프라이버시 보호에 관한 연구 -인터넷 전자상거래업체의 온라인모니터링조사를 중심으로-)

  • Kim, Hea-Seon;Seo, Min-Kyo;Chun, Cheong-Ghi
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.219-242
    • /
    • 2004
  • This study is conducted to find out whether companies which use electronic commerce for their business are collecting the least personal information. of consumers that are necessary for providing electronic commerce services to consumers. Investigators visited website of 799 electronic commerce companies, and checked out the personal informations of consumers that were asked when they join the site as a member. The collected data were analyzed with frequency, percentage, and cross-tab analysis using SPSS program. Generally most electronic commerces required more personal information of consumers than necessary for providing their services to consumers. These phenomena are partly due to the fact that regulations regarding consumer privacy in electronic commerce are advisory rather than mandatory at present. Therefore, it is suggested that mandatory regulation which makes companies poot their identification within a certain area of their web page has to enforced for the protection of consumer privacy in electronic commerce. And it would be more efficient if consumers are consistently educated about self protection guideline regarding personal information in using electronic commerce in addition to a mandatory regulation.

  • PDF

Impact of Information Sharing Regarding Customer Returns Ratio on Optimal Sales Strategy under E-commerce

  • Saito, Yuta;Kusukawa, Etsuko
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.2
    • /
    • pp.111-121
    • /
    • 2015
  • A correct information of customer returns ratio under e-commerce is not always shared between supply chain (SC) members. Also, it is important issue for SC members to handle the unsold products in a market. This paper discusses the impact of information sharing of customer returns ratio on an optimal sales strategy including resale of customer returns and buyback policy for a SC under e-commerce with a manufacturer and a retailer. A retailer sells a single product and resells the resalable customer returns in the same market. A manufacturer produces the products and buys back the unsold products as to their quality from the retailer. The integrated SC (ISC) determines the optimal product order quantity to maximize the expected profit of the whole SC. The decentralized SC (DSC) makes the optimal decisions for order quantity and the wholesale price of products to maximize the expected profit of each SC member. The effect of information sharing is discussed between SC members under ISC and DSC. The analysis numerically investigates how information sharing of the returns ratio affects the optimal decision and the expected profits under ISC and DSC. Besides, effect of SC coordination to encourage the shift to ISC is discussed.

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

A method of Multi-Layer Visualizations for XTM (XTM을 위한 다층적 시각화 방법)

  • 박영조;박호병;조용윤;유재우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.529-531
    • /
    • 2004
  • 웹 상에는 많은 자원들과 정보들이 존재한다. XML은 이러한 자원들과 정보들을 구조화하기 위해서 개발되었다. XTM(XML Topic Maps)은 XML의 형태로 자원들과 정보들에 의미를 부여할 수 있는 언어이다. XTM은 Topic과 Association을 이용해서 자원들과 정보들이 가진 의미를 표현한다 XTM상에서 나타나는 Topic과 Association은 매우 거대하고 다양하기 때문에 모든 Topic과 Association을 한꺼번에 표현하기 어렵다 또한, 사용자가 수백만개의 Topic과 Association에서 원하는 Topic과 Association을 찾기 어렵다. 따라서 이러한 문제점을 해결하기 위해서 다양한 시각화 방법이 연구되었다. 현재 Topic Maps을 표현할 때 트리, 그래프, 맵 등 하나의 구조를 이용해서 표현한다. 하지만 추상화정도에 따라 시각화 방법은 장ㆍ단점을 지닌다. 본 논문에서는 웹 상의 자원, 정보들과 의미 사이에 여러 계층이 존재하는 다층적 시각화를 제안한다. 각 계층은 독립적인 표현구조로 나타내어 추상화정도에 따라 최적화된 구조를 사용한다. 사용자는 자신이 원하는 Topic과 Association을 점진적 접근을 통해서 원하는 Topic과 Association을 검색할 수 있다. 또한 Topic이 Association의 member처럼 사용되는 경우, 시각적으로 Topic이 표현되면 Topic은 연결된 Association과 직접적인 연결을 갖는다.

  • PDF

Delay-Constrained Bottleneck Location Estimator and Its Application to Scalable Multicasting

  • Kim, Sang-Bum;Youn, Chan-Hyun
    • ETRI Journal
    • /
    • v.22 no.4
    • /
    • pp.1-12
    • /
    • 2000
  • Designing a reliable multicast-based network that scales to the size of a multicast group member is difficult because of the diversity of user demands. The loss inferences of internal nodes by end-to-end measurements do not require the use of complete statistics because of the use of maximum likelihood estimation. These schemes are very efficient and the inferred value converges fast to its true value. In the theoretical analysis, internal delay estimation is possible but the analysis is very complex due to the continuity property of the delay. In this paper, we propose the use of a bottleneck location estimator. This can overcome the analytical difficulty of the delay estimation using the power spectrum of the packet interarrival time as the performance metric. Both theoretical analysis and simulation results show that the proposed scheme can be used for bottleneck location inference of internal links in scalable multicasting.

  • PDF

Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions

  • Sekar, Gautham;Bhattacharya, Soumyadeep
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.310-321
    • /
    • 2016
  • TCS_SHA-3 is a family of four cryptographic hash functions that are covered by a United States patent (US 2009/0262925). The digest sizes are 224, 256, 384 and 512 bits. The hash functions use bijective functions in place of the standard compression functions. In this paper we describe first and second preimage attacks on the full hash functions. The second preimage attack requires negligible time and the first preimage attack requires $O(2^{36})$ time. In addition to these attacks, we also present a negligible time second preimage attack on a strengthened variant of the TCS_SHA-3. All the attacks have negligible memory requirements. To the best of our knowledge, there is no prior cryptanalysis of any member of the TCS_SHA-3 family in the literature.

A Study on the Liability Risk of Air Cargo Carrier (항공화물운송인의 책임부담위험에 관한 연구)

  • Kwak, Bong-Hwan;Kang, Dong-Yoon;Ham, Young-Jin
    • International Commerce and Information Review
    • /
    • v.12 no.2
    • /
    • pp.385-405
    • /
    • 2010
  • The purpose of this study is to investigate liability risk of air cargo carrier and suggests ideas for solving problems which could be happen to air transporters on the future. because of Air transport remains one of the world's fastest growing and most important industries. And important treaties and contracts specifying transporters' responsibility regarding big scale aircraft accidents are such as Warsaw Convention in 1929, Hague Protocol in 1955, Montreal Convention in 1999. The Montreal Convention, formally the Convention for the Unification of Certain Rules for International Carriage, is a treaty adopted by Diplomatic meeting of ICAO member states in 1999. It amended important provisions of the Warsaw Convention's concerning compensation for the victims of air disasters. In conclusion, suggests to the method of air cargo security and cargo legal liability insurance which is for air cargo carrier's risk management.

  • PDF

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Networks

  • Huh, Eui-Nam;Nahar Sultana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.1 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • This paper proposes and analyzes a scalable and an efficient cluster based group key management protocol by introducing identity based infrastructure for secure communication in mobile wireless sensor networks. To ensure scalability and dynamic re-configurability, the system employs a cluster based approach by which group members are separated into clusters and the leaders of clusters securely communicate with each other to agree on a group key in response to changes in membership and member movements. Through analysis we have demonstrated that our protocol has a high probability of being resilient for secure communication among mobile nodes. Finally, it is established that the proposed scheme is efficient for secure positioning in wireless sensor networks.

Cloning of Epidermis-specific cDNAS Encoding a Lipid Transfer Protein and an Aldehyde Decarbonylase from Senecio odorus

  • Pyee, Jaeho
    • Journal of Plant Biology
    • /
    • v.39 no.3
    • /
    • pp.189-195
    • /
    • 1996
  • The major cuticular components have been shown to be synthesized in the epidermis. Therefore, cloning of epidermis-specific genes could yield information to be used to isolate and characterize the enzymes involved in the cuticle biosynthesis. A subtractive cDNA library was prepared from Senecio odorus in which epidermis-specific cDNAs were enriched. Differential screening of the library using epidermal and non-epidermal probes revealed two cDNAs. One of them designated epi425 was identified, based on the sequence homology, as a member of a new class in the LTP gene family and the other clone designated epi23 as a gene encoding an aldehyde decarbonylase. Northern blot analyses showed that epi425 and epi23 cDNAs hybridized with a transcript of about 600 and 2, 100 nucleotides, respectively, from the epidermis but not from the non-epidermal tissues. Further characterization of these clones will provide more information on the mechanism of the cuticle biosynthesis.

  • PDF

A Statistical Analysis of Professional Baseball Team Data: The Case of the Lotte Giants

  • Cho, Young-Seuk;Han, Jun-Tae;Park, Chan-Keun;Heo, Tae-Young
    • The Korean Journal of Applied Statistics
    • /
    • v.23 no.6
    • /
    • pp.1191-1199
    • /
    • 2010
  • Knowing what factors into a player's ability to affect the outcome of a sports game is crucial. This knowledge helps determine the relative degree of contribution by each team member as well as sets appropriate annual salaries. This study uses statistical analysis to investigate how much the outcome of a professional baseball game is influenced by the records of individual players. We used the Lotte Giants' data on 252 games played between 2007 and 2008 that included environmental data(home or away games and opponents) as well as pitchers' and batters' data. Using a SAS Enterprise Miner, we performed a logistic regression analysis and decision tree analysis on the data. The results obtained through the two analytic methods are compared and discussed.