• Title/Summary/Keyword: Credit Access

Search Result 67, Processing Time 0.022 seconds

Financial Inclusion - An Impetus to the Digitalization of Payment Services (UPI) in India

  • SHARMA, Arpita;BHIMAVARAPU, Venkata Mrudula;KANOUJIYA, Jagjeevan;BARGE, Prashant;RASTOGI, Shailesh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.191-203
    • /
    • 2022
  • The ecosystem for digital payments in India has expanded quickly during the last decade. A synthesis of technical advancements and progressive governmental laws and regulations has fuelled this expansion. Particularly, the UPI system has assisted India in transitioning from a nation heavily reliant on cash for daily transactions to one with fewer cash transactions. The study attempted to determine how Financial Inclusion (FI) through a socio-techno-ecosystem impacts digital payment systems. FI involves ensuring financial services, products, and an adequate amount of credit without discrimination against the weaker section of society. The study has established that FI impacts the UPI. The finance infrastructure thus helps to develop an ecosystem where financial access and the awareness level help people to transit to new channels of payment. We have used secondary data of 27 banks for sixteen quarters and four years, i.e., for the financial years 2016-17 to 2019-20. It is observed from the current study that the offsite_ATM plays a significant role in the value creation of the UPI. Our study implies that it will help retailers, individuals, and business houses to use UPI platforms for swift payments without hassle. Also helpful for industries that are still not digitally disrupted and industry-specific UPI transactions.

Volume Holographic Optical Fingerprint Identification for Secure Entry System (안전 출입 시스템을 위한 체적 홀로그래픽 광지문인식)

  • Lee, S.H.;Park, M.S.;Shim, W.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.204-210
    • /
    • 1999
  • We propose an optical fingerprint identification system using volume hologram for database of matched filter. Matched filters in VanderLugt correlator are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference fingerprint photographs of database are prerecorded in a photorefractive material in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database is achieved by controlling the reference directions with a step motor. Experimental results show that the proposed system can be used for secure entry systems to identify individuals for access to a restricted area, security verification of credit cards, passports, and other IDs.

  • PDF

A Mobility Management Scheme based on the Mobility Pattern of Mobile Networks (이동 네트워크의 이동 패턴에 기반을 둔 이동성 관리 기법)

  • Yang, Sun-Ok;Kim, Sung-Suk
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.345-354
    • /
    • 2008
  • Recently, small-scale mobile network which is composed of many mobile devices in a man becomes popular. Also, Examples of large-scale mobile network can be thought access networks deployed on public transportation such as ships, trains and buses. To provide seamless mobility for mobile nodes in this mobile network, binding update messages must be exchanged frequently. However, it incurs network overhead increasingly and decreases energy efficiency of mobile router. If we try to reduce the number of the messages to cope with the problem, it may happen the security -related problems conversely Thus, mobile router needs a effective algorithm to update location information with low cost and to cover security problems. In this paper, mobility management scheme based on mobile router's mobility pattern is proposed. Whenever each mobile router leaves a visiting network, it records related information as moving log. And then it periodically computes mean resident time for all visited network, and saves them in the profile. If each mobile router moves into the visited network hereafter, the number of binding update messages can be reduced since current resident time may be expected based on the profile. At this time, of course, security problems can happen. The problems, however, are solved using key credit, which just sends some keys once. Through extensive experiments, bandwidth usages are measured to compare binding update messages in proposed scheme with that in existing scheme. From the results, we can reduce about 65% of mobility-management-related messages especially when mobile router stays more than 50 minutes in a network. Namely, the proposed scheme improves network usage and energy usage of mobile router by decreasing the number of messages and authorization procedure.

A Study on the Support Policy for Digital Transformation of Small Businesses (소상인 디지털 전환 지원 정책에 관한 연구)

  • Lee, Chul-Sung;Kim, Young-Ki;Kim, Seung-Hee
    • Journal of Distribution Science
    • /
    • v.16 no.2
    • /
    • pp.89-99
    • /
    • 2018
  • Purpose - In this study, we discuss the current status and barriers of digital transformation focused on small businesses. More specifically, this study consists of two studies. The purpose of study 1 is to investigate the effect of digitization of small businesses on the sales of stores and the number of visiting customers. The purpose of Study 2 is to examine the status and obstacles of online channels use by small businesses. Research design, data, and methodology - In Study 1, we will examine the changes in sales and visitor numbers of stores that are rapidly adapting to digital transformation among small business. For this, we utilize the actual situation of store management survey conducted by the Small Enterprise and Market Service. Specifically, multiple regression equations were used to determine whether blogs and online shopping malls were operating, and the proportion of credit cards to sales as independent variables and sales and number of visiting customers as dependent variables. Next, in Study 2, we surveyed the 15 small business owners in the latest survey on the actual situation of store management survey conducted in 2015, and conducted an in-depth interview to examine the barriers to the use of online channels by small business. Results - As a result of study 1, it is found that the small business who run the blogs have higher sales and visits than the small business who do not. However, there is no difference in the sales and the number of visiting customers between the stores that operate the online shopping malls and those that do not. Second, the higher the proportion of credit cards, the higher the sales and the number of visiting customers. In study 2, we analyzed the barriers to the expansion of online channels by in-depth interviews. Interviews show that barriers to access to online channels are limited by search neutrality, high commission burden, and low bargaining power. These problems are caused by the insufficiency of small business compared to online and mobile portal and O2O platform vendors. Conclusions - This study suggests that small business who have difficulty in establishing direct online channels need digital transformation of small business. In addition, when using such an external platform, we have identified the problems that small business face.

The Behavioral Attitude of Financial Firms' Employees on the Customer Information Security in Korea (금융회사의 고객정보보호에 대한 내부직원의 태도 연구)

  • Jung, Woo-Jin;Shin, Yu-Hyung;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.53-77
    • /
    • 2012
  • Financial firms, especially large scaled firms such as KB bank, NH bank, Samsung Card, Hana SK Card, Hyundai Capital, Shinhan Card, etc. should be securely dealing with the personal financial information. Indeed, people have tended to believe that those big financial companies are relatively safer in terms of information security than typical small and medium sized firms in other industries. However, the recent incidents of personal information privacy invasion showed that this may not be true. Financial firms have increased the investment of information protection and security, and they are trying to prevent the information privacy invasion accidents by doing all the necessary efforts. This paper studies how effectively a financial firm will be able to avoid personal financial information privacy invasion that may be deliberately caused by internal staffs. Although there are several literatures relating to information security, to our knowledge, this is the first study to focus on the behavior of internal staffs. The big financial firms are doing variety of information security activities to protect personal information. This study is to confirm what types of such activities actually work well. The primary research model of this paper is based on Theory of Planned Behavior (TPB) that describes the rational choice of human behavior. Also, a variety of activities to protect the personal information of financial firms, especially credit card companies with the most customer information, were modeled by the four-step process Security Action Cycle (SAC) that Straub and Welke (1998) claimed. Through this proposed conceptual research model, we study whether information security activities of each step could suppress personal information abuse. Also, by measuring the morality of internal staffs, we checked whether the act of information privacy invasion caused by internal staff is in fact a serious criminal behavior or just a kind of unethical behavior. In addition, we also checked whether there was the cognition difference of the moral level between internal staffs and the customers. Research subjects were customer call center operators in one of the big credit card company. We have used multiple regression analysis. Our results showed that the punishment of the remedy activities, among the firm's information security activities, had the most obvious effects of preventing the information abuse (or privacy invasion) by internal staff. Somewhat effective tools were the prevention activities that limited the physical accessibility of non-authorities to the system of customers' personal information database. Some examples of the prevention activities are to make the procedure of access rights complex and to enhance security instrument. We also found that 'the unnecessary information searches out of work' as the behavior of information abuse occurred frequently by internal staffs. They perceived these behaviors somewhat minor criminal or just unethical action rather than a serious criminal behavior. Also, there existed the big cognition difference of the moral level between internal staffs and the public (customers). Based on the findings of our research, we should expect that this paper help practically to prevent privacy invasion and to protect personal information properly by raising the effectiveness of information security activities of finance firms. Also, we expect that our suggestions can be utilized to effectively improve personnel management and to cope with internal security threats in the overall information security management system.

  • PDF

A Study on the Investment Determinants for Residential Real Estate Development by Investor Perspectives (주거용 부동산 개발을 위한 투자자 관점에 따른 의사결정 요인에 관한 연구)

  • Kwon, Jaehong;Lee, Jaewon;Lee, Sangyoub
    • Korean Journal of Construction Engineering and Management
    • /
    • v.21 no.5
    • /
    • pp.29-37
    • /
    • 2020
  • This study analyzed the importance of factors according to the investor's perspective through a survey of residential real estate experts using AHP and fuzzy theory. Analysis results showed that rent, profitability, traffic accessibility, commercial and infrastructure, and financial regulation are important in common. By expert group, financial and credit groups cited profitability, rent, traffic accessibility, supply and tax benefits, construction and development groups cited traffic accessibility, rent, direct access, profitability, commercial area and infrastructure, and appraisal and evaluation groups cited rent, profitability, transportation accessibility, financial regulation and supply as the most important factors. This showed that it had a preference characteristic that was associated with work. In other words, it focuses most on the financial perspective in investment characteristics, and it values convenience such as accessibility to transportation and commercial districts and infrastructure as its location characteristics. In addition, it was found that easing financial regulations in the market is important to expand investment in real estate. This study aims to help the business feasibility analysis of residential property developers and rational decision-making of general investors who are consumers, taking into account the various perspectives of the expert group.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Reforming the Rural Health Insurance Programs in Korea (농촌의료보험의 당면과제와 개선방향)

  • Moon, Ok-Ryun
    • Journal of agricultural medicine and community health
    • /
    • v.16 no.2
    • /
    • pp.179-194
    • /
    • 1991
  • Despite its universal coverage of health insurance, the rural health insurance program(RHIP) stands at the crossroads in Korea. The RHIP has weaknesses in stability of financing, problems of inequities in the provision of health services and has suffered from high cost of running the program. The author has analyzed these problems from the perspective of health insurance policy and presented several options for improvement. First of all, this study urged the importance of a firm Governmental commitment of RHIP with the 50% subsidization of contributions as the Government had promised, instead of the current 40%. This can be justified from the 20% subsidization by the Government for the contributions of private school teachers and their dependents, who belong to richer segments of the population. Second, various cost containment measures ought to be sought curbing the rising demand for medical through strengthening health education and increasing individual responsibility, and tightening the claim review process. Third, this study requires the Government to run a demonstration project on the introduction of case payment system for primary health care. Fourth introducing an income-related cost sharing scheme is another possibility. Reforming the cost sharing formula for large medical expenditures is recommendable for a beginning. This measure can take the form of tax credit for medical expenditures of the poor. Fifth, the degree of financial adjustment among health insurance plans should be levelled up for enhancing stability of RHIP and social solidarity. Sixth, health policy should be redirected toward development of rural health resources and higher priority should be put on relieving difficulties in access to care. Seventh. the insurance plan owned-hospital needs to be developed or provision of health services in the medically underserved areas, and the need of such facilities is particularly acute for geriatric care, rehabilitation and renal dialysis, etc. Eighth, more generous insurance benefits are required of the elderly who are suffering the most : elimination of the maximum 180 days of benefit period and provision of glasses and artificial dentures, etc. Ninth. the economies of scale principle is working for the operating expenses of regional self-employed insurance plan. Thus, measures should be instituted to pursue an optimum size of health insurance plans. Lastly, excessive dependence on exclusion items is an evil so that some radical remedies are urgently required to cut them.

  • PDF

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.