• Title/Summary/Keyword: Digital Transaction

Search Result 288, Processing Time 0.02 seconds

A Study on Strategy for Promoting Mobile Application Market (모바일 애플리케이션 마켓 촉진 전략에 관한 연구)

  • Go, Nak Hyun;Jeon, Joong Yang;Bae, Soon Han
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.143-156
    • /
    • 2011
  • Mobile & Telecommunication industry have been improved in recent years, many different and different shape devices have been introduced and relative services also consistently have been developed as well. Mobile users also demand new service and diverse contents different from vice oriented services and its quality improvement. Recently Smartphone has shown up and changed Mobile & Telecommunication industry and lead activating the industry. Particularly Smartphone users enjoy many different functions and service provided by Application Market. Actually this Application Market would lead improving Mobile& Telecommunication industry. This fact is worthy of notice. Therefore This study focus on Application Market and analyse what determinants affect user's intention to use Application Market. Mainly e-Servqual and TAM model are applied and research model was established and empirically tested. As a result information, transaction and design quality significantly effect on user's intention and perceived usefulness and easy of use also significantly more effect on user's intention. There will be several implications to establish strategy for application market based on this results.

A Study on the Performance Evaluation of Application Transaction in the Main Memory DBMS (메모리 상주 DBMS에서의 응용 트랜잭션 성능평가에 관한 연구)

  • Kim, Hee Wan;Rhee, Hae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.19-26
    • /
    • 2009
  • Recently, the Main Memory DBMS is gradually being expanded by the appearance of a large capacity of a Main Memory System, the increase in business area where it requires a real time process, and the rise of the users' required level. The Main Memory DBMS, which is able to go through a large capacity data process of the disk-based DBMS and guarantees a high efficiency, has domestically developed and has been put to a practical use. This paper presents an examination of the applied technologies and the limits of Altibase system, which is Main Memory DBMS. Moreover, it evaluated and performed a comparative analysis on the performance level of the Main Memory DBMS and the disk-based DBMS based on the same application. After five trials of the experiment based on the operating application, it was confirmed that the performance level of the Main Memory DBMS is enhanced and is higher by 4.13 to 7.89 times than the disk-based DBMS.

Nonlinear Moving Picture Editor for Multiple Watermarking (다중 워터마킹을 지원하는 비선형 동영상 편집기)

  • 윤석민;한경섭;정순기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.124-129
    • /
    • 2002
  • Currently, image processing are used widely and have various types of characteristics with the applications of VOD(Video on demand), the web casting services, the video conference systems and virtual realities. Using the scene change, at every time of video image transitions, an editor can classify the video context and also require a function of in(Boxing insertion. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. The Purpose of this thesis is to implement of nonlinear moving picture editor for the multiple watermarking. For the effective watermarking performance, this thesis considers the protection of image quality reduction and robustness for hiding information concurrently.

  • PDF

Legal Relation of Parties on Transactions in UCITA (UCITA상의 전자정보거래 당사자 간의 법률관계)

  • Oh, Byoung-Cheol
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.29
    • /
    • pp.197-223
    • /
    • 2006
  • Uniform Computer Information Transactions Act (UCITA) is the first legislative attempt in the world that deals with transaction of digital information. This however gave rise to endless controversies and as of February 10, 2003, its life as the uniform law has expired. There are four kinds of relationships that UCITA regulates for the entities involved in information trading namely, 1) Relationship between licenser and licensee 2) The triangle relationship between dealers, end-user and publisher 3) Relationship between information right transferor and transferee 4) Relationship between financier, licenser and licensee. Amongst these, the most significant one is the triangle relationship amongst the publisher, commonly known as the licenser in the mass market, end-user and dealer. At the essence of the relationship is that the dealers is liable to refund the payment for the information regarding the end user if he/she does not agree with the publisher on the license of the common market. Looking at the relationship between license transferor and transferee, the transfer of license may be prohibited but the special contract must be conspicuously carried out. The relationship financier, licenser and licensee is unique to the United States and is rather unfamiliar to us. UCITA has been criticized for preferentially protecting the benefits of licensers especially when it comes to the specific regulations for the relationship. Therefore, it is not advisable to blindly accept UCITA regulations. However, UCITA does have components that we can utilize in formulating our own digital information trade regulations, save its proprietary nature as an American law and its preferential treatment for licensers.

  • PDF

A study on the Shrinkwrap License Contracts on Computer - Information Transaction in USA (컴퓨터정보거래에서 쉬링크랩라이센스 계약에 관한 고찰 -미국의 경우를 중심으로-)

  • Song, Keyong-Seog
    • Journal of Digital Convergence
    • /
    • v.2 no.1
    • /
    • pp.93-112
    • /
    • 2004
  • A license under UCITA(Uniform Computer Information Transactions Act) which represents the first comprehensive uniform computer information licensing law is not fundamentally rooted in intellectual property law such as patent or copyright law. A license under UCITA is simply a commercial contract, dependent wholly on the parties' ability to enter into a normal, commercial contract, just as a contract of sale or lease is simply and wholly a commercial contract. However, intellectual property rights may be licensed in a contract subject to UCITA. UCITA may not be used to vary or extend informational rights that are intellectual property rights, and expressly recognizes preemption by copyright, patent, or other federal intellectual property law in Section 105(b). Like the law of sales and leases, in general, the right to contract is constrained by principles of unconscionability, good faith and fair dealing, UCITA has an additional restraint, an express power for a court to deny enforcement of a provision in a licensing contract that violates fundamental public policy. This public policy defense is unique in UCITA. An essential purpose of this defense is to give courts some latitude in reconciling commercial licensing law with the principles of intellectual property law. Most intellectual property law is federal, and UCITA expressly recognizes the preemptive effect of that federal law. But the public policy defense gives courts an additional power to consider intellectual property principles purely within the context commercial law.

  • PDF

A Study on Patent Right Valuation Using Discounted Cash Flow (DCF를 이용한 특허가치평가에 관한 연구)

  • Kim, Heung-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.11-22
    • /
    • 2012
  • Intangible assets are the important tool which decides upon economic wealth and development of knowledge-information economy. We have to make effective use of intangible assets in order to assure surplus earnings, competitive superiority. The importance of intangible assets, especially patent right, may be properly understood only when their values are assessed adequately. It is very significant to appraise rationally patent right value from finance support, technology transaction, investment decision, M&A, legal proceedings, strategy and etc. Thus the purpose of this study is to evaluate the economic value of a patent right using DCF(Discounted-Cash Flow Method). This paper presents the basic model, related principles and standards of valuation, and then, case analysis of patent right valuation using DCF.

The Risk Factors of IT Outsourcing Decision in the Korean Firms (기업의 IT 아웃소싱 수행의사에 영향을 미치는 위험요인 분석)

  • Moon, Song-Chul;Ahn, Yeon-S.
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.341-348
    • /
    • 2009
  • This paper analyzes the outcomes surveying 79 firms in Korea to investigate how Information Technology(IT) Outsourcing risk factors affects IT Outsourcing intention. Based on our literature reviews based on number of key articles, journals, and the focus group interviews, IT Outsourcing risk factor s are proposed into three different domains: Transaction, Client, Vendor perspectives. As the statistic al analysis, it found that the risk factors related on the client, vendor perspectives, is closely related to the IT Outsourcing intention of the Korean firms. So It will be desirable to prepare and resist the risk factors of clients of themselves and IT service vendor's for the adopting and enlarging the IT outsourcing implementation.

  • PDF

Examination of Transaction Secure Safety of Block Chain (블록체인 안전성 확보를 위한 거래 검토)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.77-86
    • /
    • 2019
  • Comparative analysis to secure safety of Blockchain Many investors have invested in virtual currency such as bit coins as a new investment due to increased popularity of virtual currency around the world. Also, virtual currency such as bit coin has a security technology and it has been relatively proved. popularity of virtual currency is rising as a new investment alternative because of this reason. This paper focused on the block chain's transparency and security of distributed ledger technology, which is relatively safe without third party's intervention. Many governments and companies around the world are developing and working on block chain technological development to introduce due to these reasons However, there are some suggestion that block chain has minor risks to its security. In this paper, it will examine security vulnerabilities from importance of security of Blockchain which relates to transactions of Bitcoin which stored by governments and companies around the world. This paper will propose measure which will improve safety and efficiency of Blockchain technology such as the existing Blockchain method, Blockchain proposal, traceability and awareness about hacking.

Corporate Financial Fraud and Countermeasures in the Internet Era (인터넷 시대 기업의 재무부정과 대책)

  • Huang, Weidong;Jin, Shanyue
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.35-40
    • /
    • 2022
  • With the advent of the internet age and the outbreak of COVID-19, many companies have embraced online trade. However, due to the way the cyber economy works, the number of companies engaged in financial fraud by falsifying their transaction amounts and customer numbers has been gradually increasing. The purpose of this study is to analyze financial fraud of companies in the Internet era and to present solutions. Therefore, this study analyzed the financial fraud behavior of Luckin Coffee in China as an example and studied the causes and countermeasures of financial fraud. As a result, it was found that the cause of financial fraud lies in the opacity of cash flows from online transactions. The recommendations proposed by this study is to improve internal control systems in companies, develop risk management system, and establish comprehensive external supervision system

A study on User experience of Fintech Application Service -Focused on Toss and Kakaobank- (핀테크 애플리케이션의 사용자 경험 연구 -토스와 카카오뱅크를 중심으로-)

  • Kim, Hyun-Woo;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.287-293
    • /
    • 2020
  • This study is about comparing and analyzing the representative fintech application service, Toss, and Kakaobank from the user's point of view and suggest development according to the main factors of user experience. The experimental group who have used both mobile application was recruited to do a task about deposit and withdrawal service. After the task, an in-depth interview was conducted by reorganizing the "Creating Pleasurable Interface model" by Stephen P. Anderson. Interview questionnaire is based on propensity and feature of generation 2030. As a result of the experiment, the user showed satisfaction with usability and showed different application usage experience depend on financial transaction propensity and money management. Therefore, the application needs features that could grasp the propensity and also service to manage money in everyday life. Based on this study, it is expected to develop be user-based fintech application service in related fields.