• Title/Summary/Keyword: 유비쿼터스 전자거래

Search Result 38, Processing Time 0.018 seconds

A Threshold Ring Group Signature for Ubiquitous Electronic Commerce (유비쿼터스 전자거래를 위한 쓰레시홀드 링 그룹 서명)

  • Sung, Soon-Hwa
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.373-380
    • /
    • 2007
  • Ubiquitous electronic commerce can offer anytime, anywhere access to network and exchange convenient informations between individual and group, or between group and group. To use secure ubiquitous electronic commerce, it is essential for users to have digital signature with the properties of integrity and authentication. The digital signature for ubiquitous networks is required neither a trusted group manager, nor a setup procedure, nor a revocation procedure etc. because ubiquitous networks can construct or deconstruct groups anytime, anwhere as occasion demands. Therefore, this paper proposes a threshold ring signature as digital signature for secure ubiquitous electronic commerce using the ring signature without forgery (integrity) and the (n,t) ring signature solving the problem cannot prove the fact which a message is signed by other signer. Thus the proposed threshold ring signature is ubiquitous group signature for the next generation.

유비쿼터스 컴퓨팅과 실버산업 비즈니스모델들

  • Go, Il-Sang;Jang, Cheol
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.47-52
    • /
    • 2005
  • 유비쿼터스 컴퓨팅을 연구하는 연구자나 기업들은 유비쿼터스 컴퓨팅을 기반으로 기존 제품이나 서비스의 추가적인 부가가치를 창출하려는 비즈니스 모델의 개발 및 활용에 큰 관심을 가지고 있다. 최근 고령화에 따른 의료수요의 증가와, 노인의 생활욕구가 다양화되면서 실버산업이 크게 성장할 것으로 예측되고 있다. 정보기술의 발전에 따라 유비쿼터스 컴퓨팅 환경을 구현하려는 연구가 활발히 진행되고 있는 상황에서 실버산업의 발전과 노인복지향상에 적용되고 있는 유비쿼터스 컴퓨팅의 분야와 사례, 그리고 추가적인 적용 가능성을 살펴본다. 이 연구에서는 실버산업 각 분야별 기존 제품 및 서비스의 부가가치를 확대하거나 새로운 시장개척을 통해 부가가치를 생성할 수 있는 유비쿼터스 실버산업의 비즈니스 모델들의 현황을 소개하고 발전가능성을 중심으로 비교하며, 미래에 개발 가능한 비즈니스 모델들을 제안하여 본다.

  • PDF

편재형 컴퓨팅 환경에서의 e-비즈니스 현안

  • 김영국
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.255-260
    • /
    • 2003
  • 연구배경 □ 어떠한 시간과 장소에서도 사용 가능한(유비쿼터스, 편재형)통신 환경의 실현 O IPv6의 보급 O무선 네트워크의 보편화 O이동단말의 소형화 및 성능향상 O다양한 서비스와 어플리케이션 등 □유비쿼터스 통신 환경을 기반으로 한 전자상거래(M-, U-Commerce) O온, 오프 연동 및 유,무선 연동의 비즈니스 모델 O실물공간과 가상공간의 상거래를 연결, 통합하는 모델 O기술적으로는 위치기반, 지능화, 개인화된 고객서비스 가능(중략)

  • PDF

A Classification of Human Resources and Survey on the Status of Training Programs Related to Ubiquitous Technology and Service (유비쿼터스 기술 및 서비스 관련 인력 분류 및 대학 교육 실태 조사)

  • Hong, Jung-Wan;Seo, Jeong-Yeoul;Leem, Choon-Seong
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.3
    • /
    • pp.89-108
    • /
    • 2006
  • This study is to survey on the status of human resource training programs related to ubiquitous technologies and services of domestic universities. So, this study develop a classification system about human resource related to ubiquitous technologies and services. We propose the implications and plans which are based on the status of human resource training programs related to ubiquitous technologies and services. Human resources related to ubiquitous technology are classified by the flow of information in ubiquitous environment. And human resources related to ubiquitous service are classified by ubiquitous user view. This study can be used to find collaboration alternatives for breeding up ubiquitous human resources and referred to analyzing on the supply and demand of ubiquotous human resources.

  • PDF

OTP 기술현황 및 국내 금융권 OTP도입사례

  • Seo, Seung-Hyun;Kang, Woo-Jin
    • Review of KIISC
    • /
    • v.17 no.3
    • /
    • pp.18-25
    • /
    • 2007
  • 지난해 말 전자금융 서비스 가입자 수가 6500만 명을 넘어섰으며, 올해로 도입 10년째를 맞이하고 있는 인터넷 뱅킹 서비스는 유비쿼터스 시대와 맞물려 우리 생활 깊숙이 자리 잡았다. 은행을 방문하지 않아도 일상생활에서 쉽게 접할 수 있는 전자매체를 통해 금융거래를 할 수 있다는 편리함으로 전자금융서비스를 이용한 거래가 창구거래보다 높은 상황이며, 전자금융거래 이용도는 계속 증가할 전망이다. 그러나 이러한 편리함 이면에는, 전자금융의 보안 허점을 노린 해킹시도가 끊이지 않고 있으며, 2005년 5월 인터넷 뱅킹 사고를 시작으로, 2007년 1월 대형 은행 고객정보 대량 유출 피싱 사건, 2007년 2월 공인인증서 유출로 인한 은행 불법 인출 사건 등 금전적인 이득을 노린 금융보안 사고들이 발생하고 있다. 최근 정부에서는 이러한 보안위협으로부터 사용자의 금융정보를 보호하고, 안전한 전자금융서비스를 제공하고자 "전자금융거래 안전성강화 종합대책"을 발표하였고, 이의 일환으로 기존 보안카드보다 보안성이 높은 OTP 기기를 개인고객에게도 도입하도록 하는 방안을 추진하고 있다. 본 논문에서는 일반 전자금융 서비스 고객에게도 확대되어 사용될 것으로 기대되는 OTP 기기의 기술 현황 및 국내 금융권 OTP 도입사례를 살펴보도록 한다.

A Case Study of Feasibility Analysis Based On Black-Sholes Model for Ubiquitous Computing Technology Development (블랙-숄즈 모형을 활용한 유비쿼터스 기술 개발 타당성 분석 사례 연구)

  • Kwon, Oh-Byung;Kim, Ji-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.4
    • /
    • pp.49-69
    • /
    • 2008
  • Recently, ubiquitous computing technology becomes available to develop advanced electronic commerce:u-commerce. Hence, it is the very time to perform feasibility analysis in applying ubiquitous computing technology, especially estimating economical value of the on-going technology. Hence, the purpose of this paper is to propose a financial value estimating methodology in performing feasibility test on ubiquitous computing technology. To do so, Black and Scholes model is basically adopted. To show the feasibility if the idea proposed in this paper, actual case study through focused group interview with those who are actually performing on-going ubiquitous computing projects. As the result, we validated the possibility of applying Black-Sholes model to assessing feasibility analysis for ubiquitous technology development with the price of call option, volatility, and the comparison with other similar technologies.

  • PDF

Pattern-based Analysis of Ubiquitous Process Design Based on Active Rules (능동형 규칙 기반 유비쿼터스 프로세스 설계의 워크플로우 패턴 분석)

  • Jung, Jae-Yoon;Park, Jong-Hun
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.1
    • /
    • pp.35-56
    • /
    • 2009
  • Many process modeling techniques, such as Petri-net, UML Activity Diagram, and EPC, are used to design process models. In this paper, we analyze ubiquitous process design based on workflow patterns. In particular, we focus on process design using active rules that have the form of Event-Condition-Action, and deal with the WS-ECA language, which was devised for ubiquitous web services coordination. We first check whether workflow patterns can be designed with ECA rules, and we then provide WS-ECA representations for ECA rules of the patterns. The contribution of this paper is that ECA rule-based process models were presented based on workflow patterns and they can be a guideline for ubiquitous process modeling.

  • PDF

A Study on the Business Service Design in Ubiquitous Computing:the Case Study in Bookstore (유비쿼터스 비즈니스 서비스 설계 사례연구 : 대형 도서매장을 중심으로)

  • Kim, Kyung-Kyu;Chang, Hang-Bae;Kim, Heung-Gook;Kwon, Hyuk-Jun
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.165-179
    • /
    • 2008
  • In this study we designed the killer services for the scene of bookstore in ubiquitous computing. To achieve this study, we have explored the unmet needs of employees and users in bookstores and examined whether the unmet needs could be served by the resources and capabilities of ubiquitous computing. Then we have extracted detailed killer services that includes value propositions and resource map by using statistical methodology. Finally, the killer services were designed to serve employees and users in bookstores with the service architecture. The result of this study will be applied to develop new business model in ubiquitous computing as the basic research.

  • PDF

Developing a User-Perceived Value Framework for Ubiquitous Computing (유비쿼터스 컴퓨팅에 관한 사용자 가치구조 연구)

  • Lee, Jung-Woo;Lee, Bong-Gyou;Park, Jae-Sung
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • In this study, a value framework for ubiquitous computing is developed and presented. Using 'value focused thinking' approach suggested by Keeney, twenty-two potential users of ubiquitous computing were interviewed and 435 statements were obtained from these interviews. Subsequent purification and redundancy removal process reduces these 435 statements into 166 objectives users have in their mind when thinking about ubiquitous computing. These 166 objectives were again simplified into 37 objectives by clustering. Through a focus group interview, these objectives were again classified into a means-ends network diagram by analyzing reciprocal relationships among them. Resulting means-ends network reveals the value framework inherent within the perception of users. This framework will be useful as a reference in developing new business models in ubiquitous computing as well as developing technologies themselves.

  • PDF

A Study of Factors Influencing Ubiquitous Computing Service Acceptance (유비쿼터스 컴퓨팅 서비스 수용에 영향을 미치는 요인 연구)

  • Yoo, Ho-Sun;Kim, Min-Yong;Kwon, Oh-Byung
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.2
    • /
    • pp.117-147
    • /
    • 2008
  • Developing various ubiquitous computing services (U-services) is being propelled throughout the industry. As U-services are being penetrated into our daily life, research on the factors influencing the acceptance of U-services is highly needed. In this line of study, we examined previous literatures about information technology acceptance and UTAUT model, and applied UTAUT model to U-service acceptance. To characterize the U-services into our research model, we newly introduced 'context based personalization' factor. Since the respondents could not directly experience the U-services yet, we adopted scenario-based questionnaire. For this, we deliberately developed U-service scenario. And then this U-service scenario is verified using capability-based assessment method. Using data collected from 251 respondents, this study found that 'context based personalization' factor was positively and significantly related to the acceptance of U-service as well as UTAUT model's 4 factors such as performance expectancy, effort expectancy, social influence and facilitating conditions.

  • PDF