• Title/Summary/Keyword: Internet Commerce

Search Result 1,219, Processing Time 0.033 seconds

Factors that Influence the Sharing Intention of Vehicle and Sharing Behavior in China (중국에서의 자동차 공유의도 요인과 공유 행동에 관한 연구)

  • Zhang, Ji-Yun;Lee, Sang-Joon;Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.195-203
    • /
    • 2017
  • Sharing economy which is sharing and borrowing goods, space, and services as a social and economic activity based on the Internet and smart phones is a new research topic in convergence area. The most representative areas of shared economy are space sharing and vehicle sharing. This paper aims to explore the factors affecting sharing intention of vehicle. We have identified the independent variables which include economic benefit, social benefit, social influence, psychological benefit and perceived risk. We also have done how these variables affect on sharing intention. Unlike Korea, in China vehicle sharing is legally allowed and has a large scale economy. To prove the hypothesis, we performed questionnaire investigation in China and analyzed with SPSS program. The result of hypothesis is the followings: The economic benefit, psychological benefit, social influence and perceived risk are affects sharing intention, and social benefit is not affect sharing intention and sharing intention is affect sharing behavior.

Design of the Certificate-based Authorization Policy Module in a PKI Environment (PKI 환경에서 인증서 기반 권한 정책 모듈 설계)

  • Shin, Myeong-Sook;Song, Gi-Beom;Lee, Jeong-Gi;Lee, Cheol-Seung;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.898-901
    • /
    • 2005
  • In this paper, we design an authorization policy module which provides the safty and reliable authorization of the user to provide the resolution for authorization in distributed environments. PKI have been utilized much by an information security-based structure for Internet electronic commerce, it is developing X.509-based in various application field such as a network security. Especially, it provides good resolution for the authentication of the user in the situation not to meet each other, but it is not enough to provide the resolution of the authorization in distributed computing environments. In this paper, We provide AAS model, which can be used distributed resources by distributed users, and design AAS model which is an authorization policy module in the Linux-based Apache Web server.

  • PDF

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

Design and Implementation of a Improved Cipher Web Mail System using a Chaos Cipher (카오스 암호를 이용한 개선된 암호화 웹 메일 시스템의 설계와 구현)

  • Kim Dae-Young;Kim Tae-Sik
    • The KIPS Transactions:PartD
    • /
    • v.13D no.3 s.106
    • /
    • pp.437-444
    • /
    • 2006
  • A chaos cipher system that focuses on the stream cipher system has a demerit that the longer the text is, the slower the speed of the encryption and description and the transmission and reception. On this study, we designed the cipher web mail system showing much better capabilities than the existing web mail system as the text is longer. In the embodiment of the cipher web mail system, we developed the key stream, the encryption and description of the text and the inside and outside mail viewer and so on. After the efficiency test, it was valued high in the respect of the speed of the encryption and description and the transmission and reception. And it made up for the defect of the stream cipher system. We expect that we can use it through the persistent applied study in the server system security, the file security, the security of the internet information, the protection of the e-commerce system information and other fields based on the cipher technique as the wide use cipher system that can replace the block cipher system.

A Security Model of Mobile Agent Regarding Performance (성능을 고려한 이동 에이전트 보안 모델)

  • 유응구;이금석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.614-620
    • /
    • 2003
  • As the proliferation of Internet, mobile agent related technologies are examined for possible growth and evolution. In information retrieval, network and distributed system management, and electronic commerce, mobile agent is more flexible than the traditional communication paradigm. Despite the performance benefits, mobile agent is not used widely in the market because it is very vulnerable to a variety of attacks. In many studies related the security vulnerability for a mobile agent, the high security causes the performance to degrade. In this paper, we propose and evaluate the efficient security model for mobile agent using TDGM(Trusted Domain & Guide Manager), which provides three kinds of services : the trusted domain management, the security service and the travel plan guide. The result clearly shows that this model provides high security and minimizes the performance degradation.

Performance Evaluation of Personalized Textile Sensibility Design Recommendation System based on the Client-Server Model (클라이언트-서버 모델 기반의 개인화 텍스타일 감성 디자인 추천 시스템의 성능 평가)

  • Jung Kyung-Yong;Kim Jong-Hun;Na Young-Joo;Lee Jung-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.2
    • /
    • pp.112-123
    • /
    • 2005
  • The latest E-commerce sites provide personalized services to maximize user satisfaction for Internet user The collaborative filtering is an algorithm for personalized item real-time recommendation. Various supplementary methods are provided for improving the accuracy of prediction and performance. It is important to consider these two things simultaneously to implement a useful recommendation system. However, established studies on collaborative filtering technique deal only with the matter of accuracy improvement and overlook the matter of performance. This study considers representative attribute-neighborhood, recommendation textile set, and similarity grouping that are expected to improve performance to the recommendation agent system. Ultimately, this paper suggests empirical applications to verify the adequacy and the validity on this system with the development of Fashion Design Recommendation Agent System (FDRAS ).

Analytic Approach to e-Transformation of Intermediary (중개유통기업의 e-트랜스포메이션: 분석적 접근)

  • Han, Hyun-Soo
    • Information Systems Review
    • /
    • v.5 no.2
    • /
    • pp.1-21
    • /
    • 2003
  • In this paper, we investigate industrial product intermediary's transformation strategy by exploiting advantages afforded by web based information technologies. Our motivation for this research stems from exploring intermediary's responding strategy to cope with supplier's threatening to disintermediation. From transaction cost perspective, internet can induce both the vertical quasi-integration (electronic hierarchy) and outsourcing (electronic market). Our rationale on directing one of these bi-directional movements is specified on intermediary's value adding on the supply chain. As such, we investigated supply chain performance, IT effects on customer's requirement of channel functions, and channel power structure. Propositions to suggest contingent e-transforming strategic alternatives are logically derived from dyadic nature of supply chain characteristics such as efficiency versus customer services, and supplier dominant versus easy replaceability of suppliers. The contingent e-transformation framework developed from intermediary's perspective is reviewed through longitudinal industry case analysis. Implications from the industry case analysis give us insights for the effectiveness of the framework to combine supply chain characteristics with intermediary's e-transformation.

Rethinking of Self-Organizing Maps for Market Segmentation in Customer Relationship Management (고객관계관리의 시장 세분화를 위한 Self-Organizing Maps 재고찰)

  • Bang, Joung-Hae;Hamel, Lutz;Ioerger, Brian
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.17-34
    • /
    • 2007
  • Organizations have realized the importance of CRM. To obtain the maximum possible lifetime value from a customer base, it is critical that customer data is analyzed to understand patterns of customer response. As customer databases assume gigantic proportions due to Internet and e-commerce activity, data-mining-based market segmentation becomes crucial for understanding customers. Here we raise a question and some issues of using single SOM approach for clustering while proposing multiple self-organizing maps approach. This methodology exploits additional themes on the attributes that characterize customers in a typical CRM system. Since this additional theme is usually ignored by traditional market segmentation techniques we here suggest careful application of SOM for market segmentation.

  • PDF

Text Mining and Visualization of Unstructured Data Using Big Data Analytical Tool R (빅데이터 분석 도구 R을 이용한 비정형 데이터 텍스트 마이닝과 시각화)

  • Nam, Soo-Tai;Shin, Seong-Yoon;Jin, Chan-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.9
    • /
    • pp.1199-1205
    • /
    • 2021
  • In the era of big data, not only structured data well organized in databases, but also the Internet, social network services, it is very important to effectively analyze unstructured big data such as web documents, e-mails, and social data generated in real time in mobile environment. Big data analysis is the process of creating new value by discovering meaningful new correlations, patterns, and trends in big data stored in data storage. We intend to summarize and visualize the analysis results through frequency analysis of unstructured article data using R language, a big data analysis tool. The data used in this study was analyzed for total 104 papers in the Mon-May 2021 among the journals of the Korea Institute of Information and Communication Engineering. In the final analysis results, the most frequently mentioned keyword was "Data", which ranked first 1,538 times. Therefore, based on the results of the analysis, the limitations of the study and theoretical implications are suggested.

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF