• Title/Summary/Keyword: technology transaction

Search Result 691, Processing Time 0.027 seconds

A Study on Web Based Inventory and Customer Management System Development (웹 기반 재고관리 및 고객관리 시스템 개발)

  • 조용욱;박명규
    • Journal of the Korea Safety Management & Science
    • /
    • v.3 no.3
    • /
    • pp.131-141
    • /
    • 2001
  • Since 1990's, the Information Technology(IT) of combination between PC and Internet has progressed rapidly. As a fast development of Information Communication Technology and spreading of network, the previous economic state, the method of dealing, transaction object and a scope of transaction is changing. Like this, as raising of IT, the existing off-line commercial transaction is moving to electronic commercial one which based on the web. These days, a electronic distribution system of enterprise and the electronic commercial transaction between small company and customer is being operated, but there is no full developed proper system between small retailor and mid distribution center. So on this paper, the system which manage a simple marketing as well as Inventory Management & customer management will be presented.

  • PDF

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.2
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

A Review of Transaction-Based Energy Management Technology for Energy Prosumers (에너지 프로슈머를 위한 거래기반 에너지 관리기술 동향분석)

  • Koh, Seak Bai;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.45-53
    • /
    • 2018
  • The proliferation of distributed power sources such as renewable energy sources drives the changes of consumers to prosumers who actively want to deal with energy. The prosumer is a new type of consumer that can sell surplus energy or additionally generated energy to electric power companies, other energy service providers, or other consumers. To implement such a concept, a new technology and platform that can support the transaction of the prosumers are required. However, the study in the area is limited since it is in the early stage. This work examines the state-of-the-art transaction-based energy management technology through comparative analysis of representative technologies to show the future trends. Although, technologies and standards for transaction based energy are not much matured yet. related new research will be continued via competitions.

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users (프라이버시 염려 영향요인이 인터넷 이용자의 신뢰와 온라인 거래의도에 미치는 영향)

  • Ryu, II;Shin, Jeong-Shin;Lee, Kyung-Geun;Choi, Hyuk-Ra
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.4
    • /
    • pp.37-59
    • /
    • 2008
  • This study focuses on the antecedents to the privacy concerns and their influence on trust and online transaction intention. Based on previous exploratory works and the literature review of privacy concerns, four antecedents are identified-Internet literacy, social awareness, perceived vulnerability, and perceived ability to information control. Incorporating these antecedents, privacy concerns, trust and online transaction intention, a conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that Internet literacy, social awareness, and perceived vulnerability have statistically significant effect on the privacy concerns of users and the privacy concerns has a positive influence on the trust. Finally, the trust has a positive effect on the online transaction intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

  • PDF

Accurate Transmission Loss Allocation Algorithm Based on the Virtual Transaction Strategy: Comparison of Path-integral with Discrete Integral Methods

  • Min, Kyung-Il;Moon, Young-Hyun
    • Journal of Electrical Engineering and Technology
    • /
    • v.5 no.4
    • /
    • pp.511-521
    • /
    • 2010
  • This paper presents a new algorithm to determine accurate bus-wise transmission loss allocation utilizing path-integrals dictated by the transaction strategy. For any transaction strategy, the total sum of the allocated transmission losses of all buses is equal to the actual loss given by the AC power-flow calculation considering the distributed slack. In this paper, the bus-wise allocation of the transmission loss is calculated by integrating the differential loss along a path determined by the transaction strategy. The proposed algorithm is also compared with Galiana's method, which is the well-known transmission loss allocation algorithm based on integration. The performance of the proposed algorithm is evaluated by case studies carried out on the WSCC 9-bus, IEEE 14-bus, New England 39-bus, and IEEE 118-bus systems. The simulation results show that the proposed algorithm is fast and accurate with a large step size.

A Study on the Risk Management in International Transaction of Digital Goods (디지털물(物) 국제법래(國際去來)의 리스크관리방안(管理方案)에 관한 연구(硏究))

  • Ahn, Byung-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.29
    • /
    • pp.143-172
    • /
    • 2006
  • This study focuses on the risk management of "Digital Goods" appeared with the progress of information technology(IT) in international transaction. As a result of that digital goods have a lot of uncertainty between the general goods or service which have been deal with object of international transaction broadly because digital goods hold uniqueness. In this study, the author give a definition of "Digital Goods" and make an examination of uniqueness of that in international transaction. Next, six risks are defined base on risk theory and risk analysis matrix applying risk mapping model is made. Conclusionally, risk transfer as insurance is adequate to manage business risk, security risk, credit risk and legal risk. Meanwhile, risk avoidance is adequate to manage reputation risk and market risk. But, this study have following three limits. Firstly, concerning definition of the risk, real case is not applied owing to lack of transaction data. Secondly, measuring of the risk is not based on absolute data but relative data. Lastly, suggesting way of risk management is not concrete and practical to international trader of digital goods.

  • PDF

A Study of Characteristics and Structure of Negotiation Message using Electronic Commerce Market Classification (전자상거래 시장 유형에 따른 거래협상 문서의 특성 및 구조에 관한 연구)

  • Hong, June-S.
    • Journal of Information Technology Services
    • /
    • v.4 no.2
    • /
    • pp.79-97
    • /
    • 2005
  • With the proliferation of EC, many customers have been participating into online auction or group-buying market over searching internet shopping-malls to purchase goods. To support the customer's convenient transaction, lots of agent systems are developed to facilitate the customer's product brokering, merchant brokering, and negotiation of transaction. However, many of these systems have focused upon supporting transaction at only one type of marketplace. Since these marketplaces have different transaction settlement mechanism, it is necessary to develop the system that utilizes the customer's transaction including the selection of the type of marketplace to buy. Then we classify the kinds of B2C electronic marketplace according to the protocol by which the market operated. The structure of negotiation message is developed using XML schema and RDFS under the characteristics and message example of each marketplace in this research.

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

The Effect of Perception of Transaction Fairness and Transaction Integrity on Reputation, Trust, and Transaction Cost Reduction in Business-to-Business Transactions (기업 간 거래에서 거래공정성과 거래진정성 지각이 평판, 신뢰, 거래비용감소에 미치는 영향)

  • Seo, Yeong-Bok;Park, Chan-Kwon
    • Korean small business review
    • /
    • v.42 no.3
    • /
    • pp.145-172
    • /
    • 2020
  • This study shows that it is favorable for Korean companies to maintain fairness and authenticity trading relationship with trading companies. It suggests that a positive reputation can be secured, trust relationships can be built, and transaction costs can be reduced. For this purpose, research hypothesis was established, questionnaires were collected for domestic companies, and a hypothesis test was conducted. As a result of the research hypothesis test, the perception of transaction fairness and the perception of transaction authenticity have a positive effect on reputation, and the reputation has a positive effect on trust. Trust has a positive effect on the reduction of transaction costs, and reputation and trust play a role in the perception of transaction fairness and transaction authenticity and the reduction of transaction cost, and trust is a parameter between reputation and reduction in transaction cost. Do it. In order for sustainable management activities to be carried out for Korean companies, it is necessary to improve fairness and authenticity in business relations. It is important to have a positive reputation. It has been demonstrated that securing a positive reputation can develop into a trust relationship and ultimately lead to a decrease in transaction costs.