• Title/Summary/Keyword: C-Commerce

Search Result 445, Processing Time 0.026 seconds

Chinese Online Circulation Market and Market Approaching Strategy (중국 온라인 유통시장의 발전과 시장진출 전략)

  • Song, Jae-Do;Lee, Chan-Woo
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.477-487
    • /
    • 2017
  • This paper releases strategies for firms that wish to enter into online circulation business in China. SWOT based on a Korean manufacturing company teaches us better way to approach Chinese online market. Chinese online market is under oligopoly, where Alibaba and Jingdong account for about 80% of the total market. Game theory is used as a measure of threat and opportunity between Korean manufacturer and Chinese online market retailer. Game shows that they are easy to accept opportunity and sales uplift rather than low risk. Analysis shows that Korean companies should improve its products and brand competitiveness in the offline market before entering into the Chinese online retail market. They need to prepare a localization model.

Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks (네트워크 대역폭 고갈 공격에 대한 정책 기반 재구성 가능 대역폭제어기)

  • Park Sang-kil;Oh Jin-tae;Kim Ki-young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.951-958
    • /
    • 2004
  • Nowadays NGN is developed for supporting the e-Commerce, Internet trading, e-Government, e-mail, virtual-life and multimedia. Internet gives us the benefit of remote access to the information but causes the attacks that can break server and modify information. Since 2000 Nimda, Code Red Virus and DSoS attacks are spreaded in Internet. This attack programs make tremendous traffic packets on the Internet. In this paper, we designed and developed the Bandwidth Controller in the gateway systems against the bandwidth saturation attacks. This Bandwidth con-troller is implemented in hardware chipset(FPGA) Virtex II Pro which is produced by Xilinx and acts as a policing function. We reference the TBF(Token Bucket Filter) in Linux Kernel 2.4 and implemented this function in HDL(Hardware Description Language) Verilog. This HDL code is synthesized in hardware chipset and performs the gigabit traffic in real time. This policing function can throttle the traffic at the rate of band width controlling policy in bps speed.

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

A Divided Scope Web Cache Replacement Technique Based on Object Reference Characteristics (객체 참조 특성 기반의 분할된 영역 웹 캐시 대체 기법)

  • Ko, Il-Seok;Leem, Chun-Seong;Na, Yun-Ji;Cho, Dong-Wook
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.879-884
    • /
    • 2003
  • Generally we use web cache in order to increase performance of web base system, and a replacement technique has a great influence on performance of web cache. A web cache replacement technique is different from a replacement technique of memory scope, and a unit substituted for is web object Also, as for the web object, a variation of user reference characteristics is very great. Therefore, a web cache replacement technique can reflect enough characteristics of this web object. But the existing web caching techniques were not able to reflect enough these object reference characteristics. A principal viewpoint of this study is reference characteristic analysis, an elevation of an object hit rate, an improvement of response time. First of all we analyzed a reference characteristics of an web object by log analysis. And we divide web cache storage scope using the result of reference characteristics analysis. In the experiment result, we can confirm that performance of an object-hit ratio and a response speed was improved than a conventional technique about a proposal technique.

A Study on Comparison of Software Development Productivity with EJB 3.0 and EJB 3.1 (EJB 3.0과 EJB 3.1의 소프트웨어 개발 생산성 비교 연구)

  • Lee, Myeong-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.263-268
    • /
    • 2014
  • The purpose of this study is to provide a quantitative evaluation index of object-oriented software development productivity for EJB 3.0 and EJB 3.1. A lightweight container architecture is a newly-developed architecture in order to solve demerits that N-Tiers enterprise architecture has and to support merits therein. A lightweight container architecture is not as heavy as EJB(Enterprise JavaBeans) architecture is, whereas it provides all the functionality of the EJB container. However, there have been insufficient studies on a performance evaluation of EJB 3.0 and EJB 3.1 on an identical platform. Since a quantitative analysis has been performed only with respect to a partial LoC(Line of Code) analysis, there have been insufficient objective evaluation indeces and guidelines for a new specification released. Accordingly, there has been limited evaluation of software development productivity and on new innovations in a project. Therefore, this study designed and implemented a movie reservation system in EJB 3.0 and EJB 3.1, which was based on the same development platform environment. This study then intends to provide evaluation guidelines for an objective software development productivity cl LoC(Lineand standardization thereof by development platform environment.

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

The Applicant's Liability of Examination of Document and Notification of the Discrepancies in Credit Transaction (신용장거래에 있어서 개설의뢰인의 서류심사 및 통지의무)

  • Park, Kyu-Young
    • International Commerce and Information Review
    • /
    • v.8 no.4
    • /
    • pp.105-121
    • /
    • 2006
  • This study is related with the judgements of our country's supremcourt against the transaction of Letter of Credit which is beneficiary's fraudulent trade deal. In this case I think to analyse the judgements and to present the basic grounds on which the judgements were established. In Letter of Credit transaction, there are the major parties, such as, beneficiary, issuing bank, or confirming bank and the other parties such as applicant, negotiating bank, advising bank and paying bank. Therefore, in this cases, the beneficiary, the French Weapons' Supplier who did not shipped the commodities, created the false Bill of Lading, let his dealing bank make payment against the documents presented by him and received the proceeds from the negotiating bank or collecting bank, thereafter was bankrupted and escaped. For the first time, even though the issuing bank conceived that the presented documents were inconsistent with the terms of L/C. it did not received the payment approval from the applicant against all the discrepancies, made the negotiating bank pay the proceeds to exporter and thereafter, delivered the documents to the applicant long after the time of the issuing bank's examination of documents. The applicant who received the documents from the issuing bank, instantly did not examine the documents and inform to the issuing bank whether he accepted the documents or not. Long time after, applicant tried to clear the goods through custom when he knew the bill of ladings were false and founded out the documents had the other discrepancies which he did not approved. As the results, the applicant, Korea Army Transportation Command claimed, that the issuing bank must refund his paid amount because issuing bank examined the documents unreasonably according to u.c.p 500 Act 13th, 14th. In spite of the applicant's claim, the issuing bank argued that it paid the proceeds of L/C reasonably after receiving the applicant's approval of an discrepancy of document, the delayed shipment, but for concerning the other discrepancies, the trivial ones, the applicant did not examined the document and noticed the discrepancies in reasonable time. Therefore the applicant sued the issuing bank for refunding it's paid proceeds of L/C. Originally, this cases were risen between Korea Exchange Bank and Korea Army Transportation Command. As result of analysing the case, the contents of the case case have had same procedure actually, but the lower courts, the district and high courts all judged the issuing bank was reasonable and did not make an error. As analysing these supreme court's judgements, the problem is that whether there are the applicant's liability of examining the documents and informing its discrepancies to the issuing bank or not, and if the applicant broke such a liabilities, it lost the right of claiming the repayment from issuing bank. Finally to say, such applicant's liabilities only must be existed in case the documents arrived to the issuing bank was delivered to the applicant within the time of the documents examination according to u.c.p 500 Act 14, d. i. But if any the documents were delivered to applicant after time of the documents examination, the applicant had not such liabilities because eventhough after those time the applicant would have informed to the issuing bank the discrepancies of documents, the issuing bank couldn't receive repayment of its paid proceeds of document from the negotiating bank. In the result after time of issuing bank's examination of documents, it is considered that there's no actual benefit to ask the applicant practice it's liability. Therefore finally to say. I concluded that the Suprem Court's judgement was much more reasonable. In the following, the judgements of the supreme court would be analysed more concretely, the basic reasons of the results be explained and the way of protecting such L/C transaction would be presented.

  • PDF

Recent Developments in Law of International Electronic Information Transactions (국제전자정보거래(國際電子情報去來)에 관한 입법동향(立法動向))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.155-219
    • /
    • 2004
  • This paper focuses on two recent legislative developments in electronic commerce: the "Uniform Computer Information Transactions Act" ("UCITA") of USA and the "preliminary draft convention on the use of data message in [international trade] [the context of international contracts]" ("preliminary draft Convention") of UNCITRAL. UCITA provides rules contracts for computer information transactions. UCITA supplies modified contract formation rules adapted to permit and to facilitate electronic contracting. UCITA also adjusts commonly recognized warranties as appropriate for computer information transactions; for example, to recognize the international context in connection with protection against infringement and misappropriation, and First Amendment considerations involved with informational content. Furthermore, UCITA adapts traditional rules as to what is acceptable performance to the context of computer information transactions, including providing rules for the protection of the parties concerning the electronic regulation of performance to clarify that the appropriate general rule is one of material breach with respect to cancellation (rather than so-called perfect tender). UCITA also supplies guidance in the case of certain specialized types of contracts, e.g., access contracts and for termination of contracts. While for the most part carrying over the familiar rules of Article 2 concerning breach when appropriate in the context of the tangible medium on which the information is fixed, but also adapting common law rules and rules from Article 2 on waiver, cure, assurance and anticipatory breach to the context of computer information transactions, UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, UCITA contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context. The UNCITRAL's preliminary draft Convention applies to the use of data messages in connection with an existing or contemplated contract between parties whose places of business are in different States. Nothing in the Convention affects the application of any rule of law that may require the parties to disclose their identities, places of business or other information, or relieves a party from the legal consequences of making inaccurate or false statements in that regard. Likewise, nothing in the Convention requires a contract or any other communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract to be made or evidenced in any particular form. Under the Convention, a communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract, including an offer and the acceptance of an offer, is conveyed by means of data messages. Also, the Convention provides for use of automated information systems for contract formation: a contract formed by the interaction of an automated information system and a person, or by the interaction of automated information systems, shall not be denied on the sole ground that no person reviewed each of the individual actions carried out by such systems or the resulting agreement. Further, the Convention provides that, unless otherwise agreed by the parties, a contract concluded by a person that accesses an automated information system of another party has no legal effect and is not enforceable if the person made an error in a data message and (a) the automated information system did not provide the person with an opportunity to prevent or correct the error; (b) the person notifies the other party of the error as soon as practicable when the person making the error learns of it and indicates that he or she made an error in the data message; (c) The person takes reasonable steps, including steps that conform to the other party's instructions, to return the goods or services received, if any, as a result of the error or, if instructed to do so, to destroy such goods or services.

  • PDF

A newly isolated Klebsiella pneumoniae producing a thermostable stereo-selective esterase for production of D-β-acetylthioisobutyric acid (D-β-Acetylthioisobutyric acid 생산을 위한 내열성 광학선택적 esterase 활성 Klebsiella pneumoniae의 분리)

  • Chung, Yong-Joon
    • Korean Journal of Microbiology
    • /
    • v.55 no.2
    • /
    • pp.143-148
    • /
    • 2019
  • The synthesis of captopril as an important chiral drug in commerce needs expensive resolution process of racemic mixture. Microorganisms, producing a thermostable esterase that catalyzes the stereo-selective hydrolysis of methyl DL-${\beta}$-acetylthioisobutyrate (DL-ester) to D-${\beta}$-acetylthioisobutyric acid (DAT) were screened from soils. Among the strains tested, strain No CJ-317 and strain No CJ-187 with highest activity were selected as the best DAT producer. The newly isolated microorganisms were identified respectively, as Klebsiella pneumoniae and Pseudomonas putida. The cell activity of esterase from K. pneumoniae CJ-317 and P. putida CJ-187 were showed an optimal reaction activity at $75^{\circ}C$ and $60^{\circ}C$, respectively. Also the cell activity of K. pneumoniae CJ-317 was stable up to $80^{\circ}C$ for 1 h, while that of P. putida CJ-187 was not over $60^{\circ}C$. By varying the concentration of DAT in the reaction mixture, the cell activity of P. putida CJ-187 showed about 55% and 80% of product inhibition in the presence of 2.5% (w/v) and 5.0% of DAT respectively. K. pneumoniae CJ-317 had less product inhibition than P. putida CJ-187 by about 35% and 44% at the same concentrations respectively. The esterase of newly isolated K. pneumoniae CJ-317 could be useful for the stereo-selective hydrolysis of DL-ester to DAT.

The Influence of Using Intention by G4C Smart Application Service Characteristics: Comparing Korea and China (G4C 스마트 앱 서비스 특성이 사용의도에 미치는 영향: 한·중 비교 분석을 중심으로)

  • Chang, Hui-Qiang;Kim, Hwa-Kyung;Lee, Jong-Ho
    • Journal of Distribution Science
    • /
    • v.12 no.11
    • /
    • pp.85-100
    • /
    • 2014
  • Purpose - Recently, the prevalence of high-speed mobile communication technology (4G) and mobile devices (smart phones, tablet PC, etc.) is leading innovative changes across all fields in society as well as business environments. Furthermore, a diversified mobile application service has spread rapidly through mobile devices such as smart phones and tablet PCs. Accordingly, the traditional E-government services paradigm has rapidly changed into mobile intelligence. To identify the influencing factors on the using intention of G4C smart app services, based on previous studies, the variables that influence using G4C smart app services are defined; these are user cognitive factors (perceived usefulness, perceived easiness), user characteristics factors (user innovativeness, self-efficiency, social influence), service quality factors (convenience, interactivity, accessibility), and system quality factors (instant connectivity, safety). Research design, data, and methodology - This is designed not only to collect data with a questionnaire survey (9/22/13~10/23/13) but also to test hypotheses with SEM by SPSS 21.0 and AMOS 21.0 in both Korea and China. All items are used with Likert 5 scales. A total of 643 questionnaires (Korea 318, China 325) are used. Results - The perceived usefulness and perceived easiness in user cognitive factors have positive influence on using intention. The user innovativeness, self-efficiency, and social factors in user characteristics factors have positive influences on using intention. The convenience, interactivity, and accessibility in service quality factors have positive influences on both reliability and using intention. Safety in system quality has positive influence on both reliability and using intention. Reliability has positive influence on using intention. The control variables (Korea and China) affect its control hypothesis. Strategies and implications are suggested to assist the public using the intention of smartphone's e-government services based on the results of the empirical analysis. The mobile application service can be considered a new emergence of the paradigm just like the government's on-line portal websites appeared in the past. Under this prevailing situation of mobile smart devices, to promote the success of e-government mobile APP services, accurate analysis and understanding of users should precede anything, to provide services to grasp and satisfy users' desire properly. Conclusions - This study proposes implications to help E-governmental officers and companies make strategies. First, this is expected to give some information on the understanding and knowledge regarding the process of G4C smart APP service based on the empirical study. Second, this helps to make future policies and ways about E-government G4C smart APP service. Third, it is proved that super speed mobile communication technology and devices including phones will be crucial to change the structure of E-government services in 2-3 years. Fourth, it is necessary to increase the trust and using intention of users. Fifth, considering what type of environment users are placed in, to present proper public information matching their inclination, is important. Finally, various ways of experiencing service to explore potential users and ceaseless public relations are required.