• Title/Summary/Keyword: Internet Stock Trading

Search Result 22, Processing Time 0.03 seconds

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF

Comparative Study of Automatic Trading and Buy-and-Hold in the S&P 500 Index Using a Volatility Breakout Strategy (변동성 돌파 전략을 사용한 S&P 500 지수의 자동 거래와 매수 및 보유 비교 연구)

  • Sunghyuck Hong
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.6
    • /
    • pp.57-62
    • /
    • 2023
  • This research is a comparative analysis of the U.S. S&P 500 index using the volatility breakout strategy against the Buy and Hold approach. The volatility breakout strategy is a trading method that exploits price movements after periods of relative market stability or concentration. Specifically, it is observed that large price movements tend to occur more frequently after periods of low volatility. When a stock moves within a narrow price range for a while and then suddenly rises or falls, it is expected to continue moving in that direction. To capitalize on these movements, traders adopt the volatility breakout strategy. The 'k' value is used as a multiplier applied to a measure of recent market volatility. One method of measuring volatility is the Average True Range (ATR), which represents the difference between the highest and lowest prices of recent trading days. The 'k' value plays a crucial role for traders in setting their trade threshold. This study calculated the 'k' value at a general level and compared its returns with the Buy and Hold strategy, finding that algorithmic trading using the volatility breakout strategy achieved slightly higher returns. In the future, we plan to present simulation results for maximizing returns by determining the optimal 'k' value for automated trading of the S&P 500 index using artificial intelligence deep learning techniques.

Analyzing Online Fake Business News Communication and the Influence on Stock Price: A Real Case in Taiwan

  • Wang, Chih-Chien;Chiang, Cheng-Yu
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.6
    • /
    • pp.1-12
    • /
    • 2019
  • On the Internet age, the news is generated and distributed not only by traditional news media, but also by a variety of online news media, news platforms, content websites/content farms, and social media. Since it is an easy task to create and distribute news, some of these news reports may contain fake or false facts. In the end, the cyberspace is full of fake or false messages. People may wonder if these fake news actually influence our decision making. In this paper, we discussed a real case of fake news. In this case, a Taiwanese company used some fake news, advertorial news, and news placement to manipulate or influence its stock price and trade volume. We collected all news for the case company during a period of four years and five months (from January 2013 to May 2017). We analyzed the relationship between published news and stock price. Based on the analysis results, we conclude that we should not ignore the influence of news placement and fake business news on the stock price.

The Effects of ESG on Returns : Focusing on Chinese IT Companies

  • Jun-Chen Lin;Ji-Young Kwak
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.193-200
    • /
    • 2023
  • This paper selects 100 IT companies listed on the Shenzhen Stock Exchange from 2016 to 2020, and the public announcement in Hwajung collects ESG integrated ratings and grades for each sector and empirically verifies the relationship between ESG ratings and stock returns. Huazheng ESG level data and QIANZHAN database Using corporate financial data, a total of 500 samples were selected through correlation analysis and linear regression analysis with SPSS23 to analyze the effect of ESG on Return. As a result of the analysis, first, the impact on stock returns was found to be a significant positive (+) value for ESG integrated ratings and ratings by E (environment), S (social), and G (governance) sectors, confirming that ESG ratings have a positive mold of corporate stock returns. Currently, the world's major economies have proposed sustainable development strategies and "carbon neutral" goals. Development strategies are very consistent with ESG concepts, and companies that agree and execute ESG concepts may have higher ratings than other companies in the same industry, resulting in certain evaluation premiums. In addition, capital market performance in recent years shows that companies with ESG concepts or "carbon neutrality" concepts are generally considered to have higher growth potential and stronger anti-risk capabilities in the market. For listed companies, they should focus on ESG investment, improve ESG performance, and actively disclose related information to investors. Improving ESG performance should deliver positive information to society, enhance corporate image, increase market confidence in the future development of listed companies, and positively improve corporate value to actively increase financial, financial, trading, and other aspects of negotiation.

The Stocks Profit Rate Analysis which Uses Individual.Engine.foreigner.Knowledge Base HTS at The Bear Period.The Bear Wave Period.The Bull Period.The Bull Wave Period (하락기.하락조정기.상승기.상승조정기에 개인.기관.외국인.Knowledge Base HTS를 이용한 주식 수익률 분석)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.207-217
    • /
    • 2010
  • It is taken a violent fall of the international stocks market that was an American Subprime Mortgage Situation. The loss rate of individual investor judged than foreigner and institution by bigger thing. Therefore, further scientific and mechanical investment is needed at the stock investment using Internet HTS. This dissertation is stocks profit rate analysis which uses individual engine foreigner Knowledge Base HTS at the Bear Period the Bear Wave Period the Bull Period the Bull Wave Period. Knowledge Based e-friend HTS was Installed. HTS does composite stock exchange index in actuality stock trading and engine's fund earning rate, yield that is abroad comparative analysis using trend line that is HTS tool, MACD, Bollinger Bands, Stochastic slow's function. Usually, each subjects suppose that deal 5 stocks, and comparative study of the profit(loss)rate of the down to earth falling rate and rising rate, by comparing the earning rate of 5 Small capital stocks with 5 medium capital stocks and 5 Large capital stocks during the bear period, the bear wave period, the bull period, the bull wave period has meaning at the making research of the financial IT field.

A Study on the Value of Web Sites: With a Modified Technology Acceptance Model (정보기술수용모형(TAM) 관점에서 본 웹사이트 가치에 관한 연구)

  • Lee, Kyoung-A;Lee, John-Hearn
    • Information Systems Review
    • /
    • v.3 no.1
    • /
    • pp.19-30
    • /
    • 2001
  • With the e-business paradigm emerging, the website became a critical resource for most corporations. However, the amount of value creation through internet is still in question. This paper shows the result of an exploratory study on website assessment, following the tradition of Technology Acceptance Model (TAM). We viewed the intended usage as the value of the website and added such factors as playfulness, commitment, system quality, and information security as external variables of the model. Website types, visiting purposes, and the user system quality were included as moderators. The website value could differ depending on website types, purposes of the use and system quality. In the case of internet shopping malls, playfulness, compatibility, website quality were identified as key influencers, while for stock trading users, however, commitment and security factors are more important. In terms of user purposes, information search requires both the compatibility and the website quality. Also the website quality was strongly affected by the user system quality. In other words, any investment of upgrading the website system quality can be meaningless unless the user system quality is improved as well. For each variable considered, empirical results are discussed and practical implications are provided.

  • PDF

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

A Study of Short-term Won/Doller Exchange rate Prediction Model using Hidden Markov Model (은닉마아코프모델을 이용한 단기 원/달러 환율예측 모형 연구)

  • Jeon, Jin-Ho;Kim, Min-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.229-235
    • /
    • 2012
  • Forex trading participants, due to the intensified economic internationalization exchange risk avoidance measures are needed. In this research, Model suitable for estimation of time-series data, such as stock prices and exchange rates, through the concealment of HMM and estimate the short-term exchange rate forecasting model is applied to the prediction of the future. Estimated by applying the optimal model if the real exchange rate data for a certain period of the future will be able to predict the movement aspect of it. Alleged concealment of HMM. For the estimation of the model to accurately estimate the number of states of the model via Bayesian Information Criterion was confirmed as a model predictive aspect of physical exercise aspect and predict the movement of the two curves were similar.

A Study on the Performance Evaluation of Elliptic Curve Cryptography based on a Real Number Field (실수체 기반 타원곡선 암호의 성능 평가에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1439-1444
    • /
    • 2013
  • Recently, as the use of the applications like online banking and stock trading is increasing by the rapid development of the network, security of data content is becoming more and more important. Accordingly, public key or symmetric key encryption algorithm is widely used in open networks such as the internet for the protection of data. Generally, public key cryptographic systems is based on two famous number theoretic problems namely factoring or discrete logarithm problem. So, public key cryptographic systems is relatively slow compared to symmetric key cryptography systems. Among public key cryptographic systems, the advantage of ECC compared to RSA is that it offers equal security for a far smaller key. For this reason, ECC is faster than RSA. In this paper, we propose a efficient key generation method for elliptic curve cryptography system based on the real number field.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.