• Title/Summary/Keyword: transaction data

Search Result 1,073, Processing Time 0.028 seconds

A Study on construction of extranet using wireless data communication of mobile device (모빌 디바이스의 무선데이터통신을 활용한 엑스트라넷 구축연구)

  • 유우식
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.51
    • /
    • pp.139-149
    • /
    • 1999
  • Developed in this paper is a prototype extranet using mobile device such as Personal Digital Assistance(PDA) or Handheld PC(HPC). Especially an adjustment transaction system for auto insurance using wireless data communications is described. Using infrastructures such as PCS, Cellular, Private Radio, wireless communications offers tremendous applications in Korea. A survey of such applications is presented in this paper. Also an analysis of currently available infrastructures of wireless communications is described in this paper. The scheme of an adjustment transaction consists of seven steps: (1) get list of adjustment, (2) obtain insurance information, (3) check police record, (4) get an accident record, (5) get bluebook value, (6) examine the car, (7) file report. Comparing with the previous on-line method that spends much time on gathering data, the proposed system guarantees more rapid transaction using wireless communications.

  • PDF

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

Study on Modernized Real Estate Transaction System based on Spatial Information (공간정보기반 부동산거래선진화시스템 구축방안)

  • Cho, Chun Man;Chung, Moon Sub
    • Spatial Information Research
    • /
    • v.21 no.6
    • /
    • pp.69-80
    • /
    • 2013
  • Our country has made every efforts to develop Real Estate Transaction culture with emphasis on Licensed Realtors by introducing Real Estate Transaction Law in 1983. Also, MOLIT(Ministry of Land, Infrastructure and Transport) designated several organizations including KAR(Korea Association of Realtors) as Real Estate Transaction Information Network Licensees for data credibility enhancement and transaction transparency. Nevertheless, the level of law abiding spirit and transaction culture are still similar to those of the old 'Bokdeokbang' era. The under-developed transaction behaviors prevent the social capital of people's credibility on Licensed Realtors from advancing, and results in the outcomes of unnecessary social cost. That is, very low credibility on the data on Sales Items in the market and the fear of speculative real estate price uprise and market distortions are continuing on. In this context, the purpose of this study is to propose the model of GIS-based Modernized Real Estate Transaction System and its execution policies to support credible Real Estate Information to the general public for efficient transactions in the market. Accordingly, the study aims at contributing to the modernization of Real Estate Transactions, fostering competitiveness of Realtors in the Real Estate Market.

Design and Implementation of a Reprocessing Transaction Model for Mobile Computing Environments (모바일 컴퓨팅 환경을 위한 재수행 트랜잭션 모델의 설계 및 구현)

  • 김동현;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.184-196
    • /
    • 2003
  • Mobile transactions updating spatial objects are long transactions that can update independently local objects of mobile clients during disconnection. Validation based protocols that are well known to be appropriate for mobile transactions are required to abort a conflicted transaction in order to keep data consistent. Since abortion leads to cancel of all of tile updates, it is not desirable to use the abortion for resolving conflicts of mobile transactions. In this paper, we propose a reprocessing transaction model to resolve the update conflicts between mobile transactions without aborting them. We also design a mobile transaction server to support the reprocessing transaction and build a prototype of a mobile field system. The reprocessing transaction is a subtransaction of a newly committed mobile transaction and re-executes only conflicted objects with foreign conflicted objects. We also introduce a progressive reprocessing scheme to expose non-conflicted objects of the mobile transaction to other transactions in order to reduce starvation of reprocessing transactions.

An Efficient Security Protocol for Transaction in Mobile Data Network (모바일 데이터 망에서의 거래를 위한 효율적인 보안 프로토콜)

  • Kim, Jang-Hwan;Rhee, Chung-Sei
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.43-51
    • /
    • 2006
  • The existing electronic transaction protocol uses a cryptography algorithm that is not suitable for mobile environment because of limited memory and process ability. In this paper, we propose an efficient transaction protocol suitable for mobile embedded system. The proposed protocol reduces computation and process time by using ID-based cryptography algorithm and ECC (elliptic curve cryptosystem). It uses vendor authentication only in the first transaction, and from the second transaction, it requires transaction after authentication with session created by applying ECC technique. Therefore, the creation number of authentication for the vendor can be reduced from n to one. And it reduces process time because it provides the same security with 160 bits as with 1024 bits of RSA.

  • PDF

Scheduling Method of Real-Time Mobile Transaction Manager considering Value of Transactions and Validity of Real-Time Data (트랜잭션의 중요도와 데이터의 유효성을 고려한 실시간 이동 트랜잭션 관리자의 스케줄링 기법)

  • Jo, Suk-Gyeong;Kim, Gyeong-Bae;Lee, Sun-Jo;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.533-542
    • /
    • 2001
  • In this paper, we present a scheduling method for real-time mobile transaction manager in mobile computing environment. The proposed method checks whether a transaction is executable or not. It is able to by considering not only the deadline of real-time data in mobile hosts. And then, it schedules the real-time mobile transactions by making optimal execution window based on the priority queue, while considering transaction value and deadline. Disconnection with mobile hosts is monitored in selecting the transaction for execution. Using the proposed method reduces the number of restarting times after transaction aborts which is caused by the violation of the validity constraints of real-time data. And in has merits of maximizing the sum of values of real-time mobile transactions which meet the deadline. The performance evaluation demonstrates that the number of committed real-time transactions within the deadline is improved by 20%. This method can be used in real-time mobile transaction manager is such environments as cellular communications, emergency medicine information system and so on.

  • PDF

Read-only Transaction Processing in Wireless Data Broadcast Environments (무선 데이타 방송 환경에서 읽기-전용 트랜잭션 처리 기법)

  • Lee, Sang-Geun;Kim, Seong-Seok;Hwang, Jong-Seon
    • Journal of KIISE:Databases
    • /
    • v.29 no.5
    • /
    • pp.404-415
    • /
    • 2002
  • In this paper, we address the issue of ensuring consistency of multiple data items requested in a certain order by read-only transactions in a wireless data broadcast environment. To handle the inherent property in a data broadcast environment that data can only be accessed strictly sequential by users, we explore a predeclaration-based query optimization and devise two practical transaction processing methods in the context of local caching. We also evaluate the performance of the proposed methods by an analytical study Evaluation results show that the predeclaration technique we introduce reduces response time significantly and adapts to dynamic changes in workload.

Determinants of Opportunism between Franchisor and Franchisee: Focusing on the Moderating Effect of Startup Experience

  • LEE, Jibaek;LEE, Hee Tae;BAE, Jungho
    • The Korean Journal of Franchise Management
    • /
    • v.12 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • Purpose: This study examines the opportunism moderating effect by the startup experience in the relationship between franchisor and franchisees. In the case of a franchise system that has a continuous relational exchange transaction, relationship management is a very important activity because the relationship management between franchisor and franchisees improves the quality of the relationship. Nevertheless, there is insufficient of research on opportunism, which is a negative factor in managing the relationship between franchisor and franchisees in continuous relationship. Research design, data and methodology: This study, we explore the cause of opportunism based on transaction cost theory through prior research and establish a research model based by goal incongruity, uncertainty, information asymmetry, transaction specific assets, the relevance to determinant of opportunism and the startup experienced which is a moderating variable. To verify several hypotheses, the data were collected from 300 out of 1,760 domestic franchisees and analyzed using multiple regression analysis with SPSS program. Results: The findings are as follows. Goal incongruity did not affect opportunism. Opportunism increased as uncertainty increased, and as information asymmetry increased, opportunism increased. An opportunism decreased as transaction specific assets increased. Moreover, the findings show that startup experience only plays a moderating role in the relationship between information asymmetry and opportunism. Therefore, 4 out of 8 hypotheses were supported. Conclusions: The findings show that uncertainty, information asymmetry, and transaction specific assets are the determinants of opportunism. In addition, the results of the analysis of the moderating role of startup experience show that the less entrepreneurial experience, the greater the influence of information asymmetry on opportunism. Our findings mean that maintaining a successful relationship between franchisors and franchisees is possible when franchisors provide knowledge sharing, goal sharing, environmental sharing, and management information sharing to franchisees. In addition, the findings of this study shows that the contract content and management should be changed according to the entrepreneurial experience. In other words, the franchisors must share and integrate the accumulated franchisees' and franchisors' experience with the franchisees to create a synergy that can lead to successful bilateral relationship maintenance, which in turn reduces opportunism.

Timestamp based Concurrency Control for Read-Only Transaction in Broadcast Disks Environment (방송 디스크 환경에서 읽기 전용 트랜잭션을 위한 타임스탬프 기반 동시성 제어)

  • Lim Sungjun;Cho Haengrae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.317-323
    • /
    • 2005
  • Broadcast disks are suited for disseminating information to a large number of clients in mobile computing environments. In broadcast disks, the server continuously and repeatedly broadcasts all data items in the database to clients without specific requests. The clients monitor the broadcast channel and retrieve data items as they arrive on the broadcast channel. The broadcast channel then becomes a disk from which clients can retrieve data items. This paper proposes a Timestamp based Concurrency Control (TCC) scheme to preserve the consistency of read-only client transactions, when the values of broadcast data items are updated at the server. Previous schemes tried to reduce transaction aborts by consuming considerable amount of downlink communication from the server to clients for transferring control information. On the other hand, the TCC uses a timestamp field of each data item to describe execution order of server transactions. Clients can allow more transaction executions by checking consistency of their read-only transactions with timestamps of data items. As a result, the TCC can reduce the abort ratio of client transactions with minimal control information to be broadcast from the server.

A Study on the Usefulness of the BPO System - Focusing on Comparison with L/C System - (BPO 제도의 유용성에 관한 연구 -L/C 제도와의 비교를 중심으로-)

  • JANG, Eun-Hee;JEONG, Hee-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.73
    • /
    • pp.21-42
    • /
    • 2017
  • A BPO is an irrevocable undertaking given by an Obligor Bank acting on behalf of the buyer to a Recipient Bank acting on behalf of the seller to pay on satisfaction of certain specified conditions. There have been a Trade Service Utility(TSU), a Transaction Matching Application(TMA) and ISO 20022 TSMT messages that core electronic technical systems linked to the BPO. As a key usefulness of the BPO, it brings to market an alternative means of satisfying the risk mitigation, financing and information management needs of banks and businesses engaged in trade. That is, corporates can spread the risk among multiple Obligor Banks by requesting multiple BPOs for the same trade transaction not to exceed the value of the initial transaction. Since the BPO replaces the manual document checking process with the electronic matching of data, buyers and sellers will benefit from significantly increased accuracy and objectivity. By using BPO, buyers and sellers can become trusted counterparties by demonstrating reliability and giving sellers the assurance of being paid on time as per the payment terms and conditions agreed. When compared to L/C, the BPO requires submission of data only. This requires a change of practice of those accustomed to dealing with physical documentation. The beneficiary of a BPO is the Recipient Bank which is always the Seller's Bank. In the meantime, banks will need to agree between themselves that the URBPO 750 will be applied, modified or excluded. However, customers of banks will face low transactional costs due to a fully automated process and standardized data formats used in international trade documentation. There is no amendment and cancellation rules in the URBPO 750s, but only have Assignment of Proceeds rules. As a result, the BPO is likely to enable new business opportunities, lower costs, fast transaction process and strengthen key customer relationships.

  • PDF