• Title/Summary/Keyword: 전자상거래 융복합

Search Result 87, Processing Time 0.024 seconds

The Biometric Signature Delegation Method with Undeniable Property (부인봉쇄 성질을 갖는 바이오메트릭 서명 위임 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.389-395
    • /
    • 2014
  • In a biometric signature scheme, a user's biometric key is used to sign the document. It also requires the user be authenticated with biometric recognition method, prior to signing the document. Because the biometric recognition is launched every time the signature session started, it is not suitable for electronic commerce applications such as shopping malls where large number of documents to sign are required. Therefore, to commercialize biometric based signature schemes, the new proxy signature scheme is needed to ease the burden of the signer. In the proxy signature scheme, the signer can delegate signing activities to trustful third parties. In this study, the biometric based signature delegation method is proposed. The proposed scheme is suitable for applications where a lot of signing are required. It is consisted of biometric key generation, PKI based mutual authentication, signature generation and verification protocols.

The Effect of Baby Boom Generation' Leisure Activities on ICT Skills (베이비붐 세대의 여가활동이 ICT 이용 능력에 미치는 영향)

  • Oh, Joo Hyun
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.1-12
    • /
    • 2018
  • The objective of this study is to explore the way to improve baby boom generation's ICT skills in their daily life. This study explores the effect of leisure activities on ICT skills. The analysis used 2016 Korea Media Panel data. Results show that the more leisure activities baby-boomers participate, the higher ICT skills they could get. The result of 2SLS regression also supports the leisure activities' effect on the improvement of ICT skills. More specifically, watching performing art such as movies, musicals, affects the improvement of the integrated ICT skills, and creative hobbies such as cooking, painting, affect the ability to use video contents and e-commerce; shopping affects the improvement of communication and information searching with a digital device. These findings suggest that leisure activities could improve ICT skills for baby boom generation who are familiar with face to face communication.

The Effects of Perceived Justice of Service Recovery Efforts on the Customer Relationship Performance in Mobile Social Commerce (모바일 소셜 커머스에서 서비스 회복 노력의 공정성이 대고객 관계성과에 미치는 영향)

  • Yoon, In-Hwan;Lee, Hee-Sang
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.267-276
    • /
    • 2016
  • This paper aims to examine the effects of perceived justice of service recovery efforts on the customer relationship performance in mobile social commerce. To this end, we classified cognitive-affective trusts and post-recovery satisfaction into the customer relationship performance. This research employs a field survey of customers who experienced service failures in mobile social commerce and a covariance structural model analysis in order to test hypotheses of our research model. The findings present that all justices of service recovery efforts positively affect the cognitive trust, whereas the only procedural justice significantly influences the affective trust. In addition, the results show that cognitive-affective trusts have a positive effect on the post-recovery satisfaction. Our results suggest practical implications that are used to help managers maintain and improve relations with the customers who experienced service failures and to increase the post-recovery satisfaction.

A Study on Ring Marketing Strategy Digital Contents suitable for a class of Young Customer at Online Environment - focusing on marketing service strategies (온라인 환경에서 젊은 고객 수요층에 적합한 반지 마케팅 전략에 관한 연구 - 마케팅 서비스전략 중심으로)

  • Lee, Hyun-Chang;Shin, Seong-Yoon
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.169-173
    • /
    • 2016
  • With the rapid growth of IT technology and development of online shopping, e-commerce activity through online environment is going to grow in various forms. And then the intense competition also more deepen in the companies within the online market. The study on the various contents production and environment configuration for sale strategies has been made. Among online market products, it is needed to develop marketing strategies for online sales related to rings products. In this paper, through the analysis of online content and components of companies, it has obtained the appropriate components in the ring industry. In particular, aiming to young customers, we looked about components suitable for them and built site. As a result based on the above analysis, we anticipate that it will be able to see forward to a competitive ring marketing.

Development of a Customer Management Application and a Mobile Advertisement Model based on PUSH Technology (PUSH 기술 기반 모바일 광고 모델 및 고객관리 앱 개발)

  • Yang, Gi-Chul
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.193-199
    • /
    • 2015
  • PUSH technology is a technology that can transfer server information without user's request and it is very useful in various areas along with mobile applications. This paper suggest a suitable application model that can utilizes the PUSH technology and mobile devices by finding a useful area. For this, AdMan, a mobile application which can utilize the PUSH technology and mobile devices has been developed. AdMan is a mobile application that developed once and can be able to run on both Android and iOS based mobile devices, since it was developed by using a tool called m-Bizmaker. AdMan is a customer management and advertisement system that can bring big efficiency by utilizing the PUSH technology and mobile application under the today's mobile environment, and it is a good model of ICT technology application of modern society. As an application that can maximize the utilization of the PUSH technology and mobile devices, AdMan can realize better effectiveness if it run on a PUSH server.

Development of e-Commerce System Based on Social Network Service (SNS 기반 e커머스 시스템 개발)

  • Lee, Tong-Queue
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.153-158
    • /
    • 2018
  • Fundamental problems of e-commerce are exaggerated advertising of products, lack of trust in products or suppliers, and false reviews. As a solution, I have merged the concept of trust service embedded in social network service(SNS) with commercial domain to develop a new type of service called "Reliable SNS Commerce Service". The contents developed in this paper are as follows: first, online community functions for users to provide services; second, commerce functions; and third, functions for linking SNS and commerce. Through the reliability information presented in this paper, the seller provides more reliable and objective purchase information to the buyer about the sales items, thereby contributing to the sales by increasing the probability of the actual purchase. The buyer can purchase the higher-quality products with confidence. The service providers can gain the reputation as a reliable site for purchasing members. In conclusion, this paper provides a positive effect to all the participants, which will contribute to the development of a new commerce market and activation of electronic commerce.

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

The Effect of motives and benefits and loss factors of social commerce on the product purchase satisfaction (소셜커머스의 이용동기와 혜택 및 손실요인이 제품 구매만족도에 미치는 영향)

  • Lee, Sang-Min
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.149-158
    • /
    • 2016
  • Recently social commerce has become an issue in E-commerce. It was made in purpose to seek the satisfaction of consumers plan to shop attempts to boost use of social commerce. Social commerce motives and benefits and loss factors are examined the impact of purchase satisfaction. Statistical analysis was performed using the multiple regression analysis. The results were as follows. First, economic incentives and hedonic motivations and opportunistic motivation factor had a significant effect on purchase satisfaction. Second, the benefits are psychological factors and price benefits had a significant effect on purchase satisfaction. Third, the more it feels less sense when using social commerce and economic losses, as used to feel less discomfort were higher purchase satisfaction. Finally, it was confirmed that the greater the relative benefit factors influence than the loss factor. This study is significant in that it provided meaningful data from the viewpoint of a consumer who uses social commerce sites.

Evolution of Internet Trademark Infringement in the U.S. (미국 인터넷상표권 침해관련 법률의 변화에 관한 연구)

  • Kang, Joon Mo
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.61-71
    • /
    • 2014
  • Global commerce is apparently here to bind Korean firms as well as Koreans. The advertising, buying and selling of goods and services recognizes no borders. As a result, enforcing territorially based trademark rights has become ever more challenging. Remote trademark owners who peacefully coexisted in a time before the internet and increasing globalism are now bumping heads. The internet also has made it easier for unscrupulous operators to deceive consumers and divert customers from established businesses by misappropriating trademarks on web-sites and in domain names. U.S. federal courts have been willing to help American businesses halt trademark infringements that reaches outside the United States. This is particularly true for e-business, via the internet, and the trend toward enforcement seems to be in favor of the trademark owner. This article discusses this trend as well as the extraterritorial enforcement of trademark rights by U.S. courts under the Lanham Act. It also offers suggestions for protecting valuable trademark rights worldwide. This paper will contribute to global Korean firms and Koreans who carefully read arguments in this valuable literature.

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.