• Title/Summary/Keyword: transaction

Search Result 2,927, Processing Time 0.03 seconds

Outlier Detection Method for Mobile Banking with User Input Pattern and E-finance Transaction Pattern (사용자 입력 패턴 및 전자 금융 거래 패턴을 이용한 모바일 뱅킹 이상치 탐지 방법)

  • Min, Hee Yeon;Park, Jin Hyung;Lee, Dong Hoon;Kim, In Seok
    • Journal of Internet Computing and Services
    • /
    • v.15 no.1
    • /
    • pp.157-170
    • /
    • 2014
  • As the increase of transaction using mobile banking continues, threat to the mobile financial security is also increasing. Mobile banking service performs the financial transaction using the dedicate application which is made by financial corporation. It provides the same services as the internet banking service. Personal information such as credit card number, which is stored in the mobile banking application can be used to the additional attack caused by a malicious attack or the loss of the mobile devices. Therefore, in this paper, to cope with the mobile financial accident caused by personal information exposure, we suggest outlier detection method which can judge whether the transaction is conducted by the appropriate user or not. This detection method utilizes the user's input patterns and transaction patterns when a user uses the banking service on the mobile devices. User's input and transaction pattern data involves the information which can be used to discern a certain user. Thus, if these data are utilized appropriately, they can be the information to distinguish abnormal transaction from the transaction done by the appropriate user. In this paper, we collect the data of user's input patterns on a smart phone for the experiment. And we use the experiment data which domestic financial corporation uses to detect outlier as the data of transaction pattern. We verify that our proposal can detect the abnormal transaction efficiently, as a result of detection experiment based on the collected input and transaction pattern data.

Estimating the Determinants for Transaction Value of B2B (Business-to-Business): A Panel Data Model Approach (패널 데이터모형을 이용한 기업간전자상거래 거래액 결정요인 추정에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Dae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.225-231
    • /
    • 2010
  • Transaction value of business-to-business(B2B) is composed of various factors for groups and time series. In this paper, we use the panel data for finding various variables and using this we analyse the factors that is major influence to transaction value of business-to-business. For analysis we looked at transaction value of business-to-business of 7 groups such as manufacturing industry, electric, gas and piped water industry, construction industry, retail & wholesale trade, traffic industry, publish, image; broad-casting & telecommunication and information service industry, etc. In our analysis we looked at the transaction value of business-to-business during the period from 2005.01 to 2009.12. We examined the data in relation to the transaction value of cyber shopping mall, company bond, composite stock price index, transaction value of credit card, loaned rate of interest in deposit bank, rate of exchange looking at the factors which determine the transaction value of business-to-business, evidence was produced supporting the hypothesis that there is a significant positive relationship between the transaction value of cyber shopping mall, composite stock price index and loaned rate of interest in deposit bank, rate of exchange. The company bond is negative relationship, transaction value of credit card is positive relationship and they are not significant variables in terms of the transaction value of business-to-business.

An Extensible Transaction Model for Real-Time Data Processing (실시간 데이타 처리를 위한 확장 가능한 트랜잭션 모델에 관한 연구)

  • 문승진
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.11-18
    • /
    • 2000
  • In this paper we present a new extensible model based upon the concept of subtransactions in real-time transaction systems. The nested transaction model originally proposed by J. Moss is extended for real-time uniprocessor transaction systems by adding explicit timing constraints. Based upon the model, an integrated concurrency control and scheduling algorithm is developed, that not only guarantees timing constraints of a set of real-time transactions but also maintains consistency of the database. The algorithm is based on the priority ceiling protocol of Sha et al. We prove that the Real-Time Nested Priority Ceiling Protocol prevents unbounded blocking and deadlock, and maintains the serializability of a set of real-time transactions. We use the upper bound on the duration that a transaction can be blocked to show that it is possible to analyze the schedulability of a transaction set using rate-monotonic priority assignment. This work is viewed as a step toward multiprocessor and distributed real-time nested transaction systems. Also, it is possible to be extended to include the real-time multimedia transactions in the emerging web-based database application areas.

  • PDF

Software Effort Estimation based on Use Case Transaction (유스케이스 트랜잭션 기반의 소프트웨어 공수 예측 기법)

  • Lee, Sun-Kyung;Kang, Dong-Won;Bae, Doo-Hwan
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.5
    • /
    • pp.566-570
    • /
    • 2010
  • Use Case Point(UCP) is a measure of a software project size for software effort estimation based on use case. UCP measures the size of the software project based on the use case model. Because UCP is based on the use case model, it is intuitive and easy to obtain. Also, it does not require extra artifacts. On the other hand, UCP has some problems. UCP assumes every transaction has the same complexity. But, the number of operations and complexity of operations may affect complexity of transaction. In addition, UCP uses simple rating scale of complexity, but it may be inadequate for detailed estimates. To solve these problems, we suggest "Transaction Point(TP)", a size measure based on use case transaction. TP considers actors and operations in transaction. Complexity of transaction is based on the number of operations and complexity of operation, so it can support detailed estimation.

A Transaction Analysis Model for OpenADR 2.0b Payload (OpenADR 2.0b 페이로드 트랜잭션 분석 모델 연구)

  • Choi, Min-Young;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.23-30
    • /
    • 2017
  • OpenADR is a national standard communication protocol of demand response service. OpenADR uses XML message, called a payload, to support logical transaction of demand response service. For this purpose, OpenADR defines a XML element as transaction identifier which is called requestID. Unfortunately, OpenADR 2.0b profile specification describes some information about requestID but, it is not enough for understanding properly. Ambiguous definition of payload transaction makes vulnerabilities of implementing VEN & VTN and confuses mapping OpenADR 2.0b protocol into other smart grid protocols. Therefore, this paper redefines payload transaction to solve an ambiguous information of OpenADR 2.0b profile specification, proposes a model of analyzing payload transaction, and shows how to detect a payload transaction vulnerability in real-world.

Mobile Payment System Design with Transaction Certificate Mode (거래 인증 모드를 사용한 이동 결제 시스템 설계)

  • Sung, Soon-Hwa;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.931-939
    • /
    • 2014
  • The Web or Mobile channel of previous Web access authentication system for a payment only provides the authentication of remote users, and does not provide the authentication between a user and a bank/financial institution. Therefore, this paper proposes the Transaction Certificate Mode(TCM) for a payment which can preserve the mutual authentication between a user and a bank/financial institution for Web-based payment systems. The proposed system has designed for wireless network instead of Secure Electronic Transaction (SET) designed for wired electronic transaction. In addition, this system with TCM is able to support an account-based transaction for wireless networks instead of a disadvantage of SET such as a card-based transaction for wired networks. Therefore, customers can check their balances without logging on their bank's web site again due to mutual authentication between a customer and his bank/financial institution.

Transaction Model Suggestion by using Two Enforcements with a Blockchain based on a Service Platform (서비스 플랫폼 기반 이중강화적용 블록체인 응용 거래모델 제안)

  • Lee, Kwan Mok;Kim, Yong Hwan;Bae, Ki Tae
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.91-96
    • /
    • 2020
  • A blockchain is a technology in which all nodes participating in a distributed network manage each transaction's contents without a central server managing the transaction, which is a record of the transaction. The block containing the transaction record of a specific period is connected to the blockchain by referring to the hash value for the previous block, and the chain with the new block added is shared with all nodes again. Transactions using existing certificates will pass through FinTech, and in the near future, applications using blockchains are expected to emerge. In this study, we analyze the problems of the existing model, and propose a transaction model that applies the blockchain to come. Among various applications, this study develops a trading model targeting the energy sales market among the topics that will lead the fourth industrial revolution. As a result of analyzing the proposed model, it was possible to be sure of the possibility of a safer energy sales transaction than the existing method.

OPTIMAL PORTFOLIO SELECTION WITH TRANSACTION COSTS WHEN AN ILLIQUID ASSET PAYS CASH DIVIDENDS

  • Jang, Bong-Gyu
    • Journal of the Korean Mathematical Society
    • /
    • v.44 no.1
    • /
    • pp.139-150
    • /
    • 2007
  • We investigate an optimal portfolio selection problem with transaction costs when an illiquid asset pays cash dividends and there are constraints on the illiquid asset holding. We provide closed form solutions for the problem, and by using these solutions we illustrate interesting features of optimal policies.

Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users (프라이버시 염려 영향요인이 인터넷 이용자의 신뢰와 온라인 거래의도에 미치는 영향)

  • Ryu, II;Shin, Jeong-Shin;Lee, Kyung-Geun;Choi, Hyuk-Ra
    • Journal of Information Technology Applications and Management
    • /
    • v.15 no.4
    • /
    • pp.37-59
    • /
    • 2008
  • This study focuses on the antecedents to the privacy concerns and their influence on trust and online transaction intention. Based on previous exploratory works and the literature review of privacy concerns, four antecedents are identified-Internet literacy, social awareness, perceived vulnerability, and perceived ability to information control. Incorporating these antecedents, privacy concerns, trust and online transaction intention, a conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that Internet literacy, social awareness, and perceived vulnerability have statistically significant effect on the privacy concerns of users and the privacy concerns has a positive influence on the trust. Finally, the trust has a positive effect on the online transaction intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

  • PDF

A Comparative Study on ACH and Fedwire as a Cross-Border Payment System (국제전자결제시스템으로서 ACH와 Fedwire의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.139-154
    • /
    • 2008
  • This research want to discuss some issues about payment system of America. This research focuses on comparing ACH with Fedwire. Firstly Fedwire is the payment system for only large-dollar transfer(Large-Value Transfer System; LVTS), while ACH(Automated Clearing House)payment mainly applies a consumer account. Secondly ACH transaction is either credit or debit transfer, while Fedwire is only credit transfer. Thirdly the communication system of Fedwire has twoway method, telephonelike communication network, but ACH is oneway store and forward electronic mail. At present LVTS divides into RTGS(Real-Time Gross Settlement) and DNS(Deferred Net Settlement). However Fedwire uses either RTGS(instantaneous for every transaction) or DNS(net net transaction) but ACH uses only DNS(net net transaction). Fourthly ACH is substantially cheaper than the Fedwire payment. lastly security is important in both Fedwire and ACH, it is even more crucial in Fedwire In addition, for each transaction, Fedwire may entail individual instantaneous confirmation to the originator and notification to the receiver, whereas ACH do not.

  • PDF