• Title/Summary/Keyword: Cyber Money

Search Result 44, Processing Time 0.021 seconds

A Study on the Relationships between Cyber Money Quality and Usage Intention: Focus on the Moderating Effect of Usage Frequency and Amount of Cyber Money

  • Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.179-186
    • /
    • 2019
  • While there have been a lots of studies on the use of cyber money, few researches proposed the results on relationships among quality factors, usage intention, and usage characteristics of cyber money in online business environment. Therefore, this study investigates the relationships between cyber money quality and usage intention of cyber money, and examines whether the usage characteristics(frequency, amount) of cyber money has moderating effect on the relationship between cyber money quality and usage intention of cyber money. Firstly, multiple regression analysis tells significant causal relationship between functional and emotional factors of cyber money quality and usage intention of cyber money. Secondly, dummy regression analysis shows usage characteristics of cyber money has the moderating effect on the relationship between cyber money quality and usage intention of cyber money. This paper concludes with some implications for both theory development and cyber money practice.

A Study on the Perception of Cyber Money Quality by Individual Characteristics

  • Yoon, Jongsoo;Kim, Gimun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.175-182
    • /
    • 2019
  • While there have been lots of researches on the use of cyber money in online business area, few studies suggested the results on relationship between individual characteristics, including demographic and cyber money usage characteristics, and quality factors of cyber money. Therefore, this study investigates which quality factors of cyber money are perceived to be important, and examines whether the perception of cyber money quality will vary by individual characteristics such as gender, age, cyber money usage frequency, and cyber money usage volume. The results show, based on the statistical analyses using survey questionnaire for cyber money users living in the Seoul metropolitan area, that there are differences in perception of required quality factors of cyber money among the respondents grouped by gender, age, and usage frequency of cyber money. This study could propose a variety of implications for future researches on the use of cyber money in online business areas of home and abroad.

An Ethnographic Study on Cyber-Delinquency among Adolescents (게임방 청소년의 사이버일탈 과정에 관한 문화기술적 연구)

  • Sung, Yun Sook;Lee, So Hee
    • Korean Journal of Child Studies
    • /
    • v.24 no.3
    • /
    • pp.109-134
    • /
    • 2003
  • Playing online games is popular among adolescents and may contribute to such social issues as game addiction and cyber-delinquency. The present study conducted an ethnographic analysis that addressed basic descriptive questions around the social significance of online games. The main findings were that peer pressure plays an important role; that is, adolescents play the games to fulfill their need to occupy higher levels of cyber-status among game players and build special relationships. They like to make money and buy what they want with money earned from game item deals. Game scenarios and mechanisms play an important role in game addiction. Adolescents sometimes exhibit social delinquency in cyberspace or the real world. Thus, adolescents' needs, game addiction and cyber-delinquency are intertwined.

  • PDF

Problem and Policy of e-Commerce Payment System (전자상거래 결제시스템의 현황과 과제 -전자화폐를 중심으로-)

  • 박근수
    • The Journal of Information Technology
    • /
    • v.3 no.3
    • /
    • pp.77-88
    • /
    • 2000
  • Electronic Commerce increased rapidly according to the growing popularity of Internet. but payment system are not changed. Now main payment system of electronic commerce are credit card and cyber banking system. Then credit card has some problems safety, privacy etc, and cyber banking system has some problem also. We need new payment system to Electronic Commerce. The merit of electronic money are more capacity, more secure, more reliable, quick and easy to update, secure off-line processing, enabling technology etc than credit card and cyber banking system. And so many countries began using experiment of electronic money and our country began July KOEX building. But it has some problems (standardization, safety of payment, etc). Therefor we must make nile about electronic money in order to standardization and safety of payment. After then electronic money are used widely in electronic commerce.

  • PDF

Problem Analysis to Secure Stability of Bitcoin (비트코인에 대한 안정성 확보를 위한 문제점 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, Bitcoin which is digital currency and cryptocurrency is getting worldwide attention since Bitcoin has an ability to replace legal tender unlike other existing cyber currency. Especially, most Bitcoin trading is done between two traders such as P2P method and it does not require a third-party to make sure reliability and it records every transaction details, so it is more transparent then traditional financial trade, so the number of users is increasing. However, Bitcoin, which has been recognized for transparency, confidentiality and stability among traders has recently been threatened by illegal transactions such as money laundering and the attack on the exchange. These threats to Bitcoin are becoming social problems. At first, it seems that most of the digital currency is difficult to get hacked due to the Blockchain technology. However, threats such as digital money leaks by user account hacking and paralyzing the servers are increasing. In this paper, it will examine the features of the Bitcoin and the threatening elements to secure marketability of digital currency such as Bitcoin and receive more interest from public in domestic. The paper will examine the problems of Blockchain technology on speculative transactions and fraudulent behavior by analyzing the problems of Bitcoin transaction. Lastly, it will propose ways to make transparent and secure digital currency transactions.

A Study on the Electronic Money's present situation & after development direction at Electronic Commerce's times (EC시대(時代) 전자화폐(電子貨幣)의 현황(現況)과 향후(向後) 개발방향(開發方向)에 관한 소고(小考))

  • Park, Young-Tae
    • International Commerce and Information Review
    • /
    • v.1 no.1
    • /
    • pp.227-251
    • /
    • 1999
  • The realization of the Internet and Electronic Commerce through the progress development of the information & communication has changed the transition of the financial settlement system all of the world. And Electronic Commerce has becoming the most important tools to decide the value from the real money, existing bills, coins to the Electronic Money. Electronic Money is very useful materials with Electronic Wallet at cyber times in the future. So that reason, I studied Electronic Money's present situation & after development direction in Korea. And the purpose of this paper is to introduce Electronic Money's modem definition and to analysis the common use situation, operation at home and abroad at Electronic Commerce times. In add to investigated advanced countries Electronic Money utilization and drawed out current events point. So I suggest to this like point, in honour of Electronic Money's common use in Korea. First to establish universality. Second, to make various terminals and the powerful networking structure. Third, to establish stability. Fourth, renovating the system goes side by side. Futhermore, to develop Electronic Money's, it is necessary to make skilled labour and to learn foreign advanced technology.

  • PDF

A Study on Diffusion of the Utilization of Electronic Money (전자화폐의 확산에 따른 주요 쟁점에 관한 일고(一考))

  • Song, Keyong-Seog;Kim, Young-Hoon
    • International Commerce and Information Review
    • /
    • v.5 no.2
    • /
    • pp.19-45
    • /
    • 2003
  • The main issues addressed in this paper are as follows : First, this paper makes a distinction among types of e-money, IC card type versus Network type, open-loop type versus closed-loop type, online type versus offline type and accountable type versus unaccountable type, and analysis the clear and accurate criterion. Second, generally speaking, e-money is a claim on originator of e-money and not legal tender, so, delivery of e-money by itself does not relieve of monetary obligation. Between it is not easy to define e-money, by now there are many definitions of e-money, there is a legal uncertainty accordingly and then it is not easy to find proper law applicable to resolve a particular issue. As a result. many problems relating to e-money would be solved through analogical application of the moot proper law among the laws that apply to the cash, check, credit card, or fund transfer after analyzing type of e-money at issue. This paper studies the methods on diffusion of the utilization of electronic money. To diffuse the usage of electronic money, it need; prerequisitely as a basic conditions independence of electronic money, non-reusability, and anonymity. And also as a additional conditions it need; usability in the offline commerce, transferability, divisibility. And now electronic money is used very actively, but still has many Jaw problems such as protections of consumer, law enforcement, supervisory, etc. So electronic money has called as money, but it is sure that electronic money is not a legal tender. So to facilitate the economic function of the electronic monel it is need to supplement the electronic money in the legal sides.

  • PDF

North Korea's Cyber Attack Patterns and Behaviors : An Analysis Based on Cyber Power and Coercion Theory (북한의 대남 사이버공격 양상과 행태 : 사이버파워와 강압이론을 통한 분석)

  • Yoon, Taeyoung;Woo, Jeongmin
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.117-128
    • /
    • 2018
  • The purpose of this paper is to analyze the behavior of North Korea's cyber attack against South Korea since 2009 based on major international security theories and suggest South Korea's policy option. For this purpose, this paper applied the behavioral domain and characteristics of 'cyber power' and 'coercion dynamics' model, which are attracting attention in international security studies. The types of cyber attacks from North Korea are classified into the following categories: power-based incarceration, leadership attacks and intrusions, military operations interference, and social anxiety and confusion. In terms of types and means of cyber power, North Korean GPS disturbance, the Ministry of Defense server hacking and EMP are hard power with high retaliation and threat and cyber money cashing and ransomware are analyzed by force in the act of persuasion and incentive in the point of robbing or asking for a large amount of money with software pawns. North Korea 's cyber attack has the character of escape from realistic sanctions based on the second nuclear test. It is important for South Korea to clearly recognize that the aggressive cyberpower of North Korea is changing in its methods and capabilities, and to ensure that North Korea's actions result in far greater losses than can be achieved. To do this, it is necessary to strengthen the cyber security and competence to simultaneously attack and defend through institutional supplement and new establishment such as cyber psychological warfare, EMP attack preparation, and enhancement of security expertise against hacking.

  • PDF

A Study on the Vulnerability and Countermeasures of Bitcoin (비트코인의 취약점 및 대응방안에 대한 연구)

  • Kang, Seo-Gu;Bae, Hyung-Joon;Lim, Seong-Hyeon;Lee, Young-Sook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.123-126
    • /
    • 2017
  • 비트코인은 각국의 중앙은행이 화폐 발행을 독점하고 자의적인 통화 정책을 펴는 것에 대한 반발로 만들어진 암호화 된 디지털 화폐이며, 2008년 10월에 처음 등장하였다. 새로운 전자화폐로 성장한 비트코인은 현재 여러 나라에서 서비스되고 있으나 보안상의 취약점들이 발견되면서 이를 보완해야 할 필요성이 대두되고 있다. 본 논문에서는 비트코인의 특징과 서비스현황을 알아보고 비트코인의 취약점 중 지나친 익명성, 이기적인 채굴 그리고 51% Attack의 취약점들을 대상으로 분석하고, 대응 방안에 대한 한계를 제시한다.

  • PDF

A Study on Analysis of Cyber Security Companies Superiority-securing strategy in Competition and Problem-solving Strategy (국내 사이버 증권사의 경쟁우위 전략요인 및 문제점 분석에 관한 연구)

  • 양경훈;김도일;이태호;송병희
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.2
    • /
    • pp.1-25
    • /
    • 2000
  • The utilization of Internet, which started only at the level of advertisement, has been gradually expanding its application areas as the trial commercial transaction becomes successful, the password-coding technology which removes the risks on the cyber transaction develops, the electronic money appears and other various related technologies progress. Following this trend the securities industry has been experiencing changes along with efforts to use it commercially. This study is to analyze the work of cyber securities companies on the basis of the theoretical background through preceding studies and literature and also analyze the common and different reasons for superiority-securing strategy in competition along with problems and their reasons. And also the objective of this study is to offer new superiority-securing strategy in competition and problem-solving strategy.

  • PDF