• Title/Summary/Keyword: Internet and e-Business Technology

Search Result 333, Processing Time 0.023 seconds

Advantages and Disadvantages of a Cashless System in Thailand during the COVID-19 Pandemic

  • YAKEAN, Somkid
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.385-388
    • /
    • 2020
  • At present, the payment system in Thailand changes from a paper-based system to a cashless payment system. A coin has its two sides, so the cashless payment has its advantages and disadvantages. This article describes the general advantages and disadvantages of a cashless society in Thailand in the COVID-19 situation. The cashless payment in Thailand consists of credit cards, automated teller machines, direct debit, mobile/Internet banking, e-Wallet, PromptPay, and QR code. The cashless payment is able to assist the government for tax collection accuracy and facilitates users to make financial transactions more transparent and efficient. In addition, the cashless system provides benefits to businesses in which they are able to increase sales and expand business by providing convenient, safe and faster services to customers in making payment for goods/services. It assists businesses to save time and cost of cash management and reduce the paperwork. The cashless payment made the life of students, housewives, and elderly people very easy to carry out financial transactions and there is no need to meet the financial institution staff. This payment system needs advanced technology system skills, a smartphone, and a technology facility. Finally, the cashless payment can reduce the spreading of COVID-19.

The Technology of Device-to-Device Integration using Web Services (웹서비스를 이용한 서비스 기반 디바이스 연동 기술)

  • Lee, Won-Suk;Lee, Kang-Chan;Jeon, Jong-Hong;Lee, Seung-Yun
    • Journal of Information Technology Services
    • /
    • v.4 no.2
    • /
    • pp.71-78
    • /
    • 2005
  • The beginning of Web Services was understood as efficient technology for application integration in the internet, thus it was used to integrating the distributed enterprise applications or the e-business applications between partners. But, recently the usage trend of Web Services is largely spreaded out wireless network applications beyond the internet applications. The main reasons are that Web Services is the international standard of W3C, and Web Services is based on XML that is independent of the specific internal implementations such as platform, programming languages, communications networks etc. Currently Major company of Web Services such as MS, IBM, etc. focus on the research about technology for integrating various devices. In this paper, we define and explain technical issues for adapting web services to ubiquitous Environment.

A XML Based Conversion System for Secure Message Exchange (안전한 메시지교환을 위한 XML 기반의 변환시스템)

  • 오대균;홍창범;송정길
    • Journal of Internet Computing and Services
    • /
    • v.3 no.4
    • /
    • pp.1-9
    • /
    • 2002
  • As a XML Schema has been settled to W3C as standard at May. 2001 and technologies like as XML. Xpath and NameSpace related with XML has been developing. XML is becoming the standard of the new document exchanging. Due to the ability expressing various types of documentstructure through XML, ebXML, RosettaNet, and BizTalk are using XML as a core technology in the part of e-Business, To make the task automatically in the B2B EC now, a standard XML document is needed. Internal documents in each company should be transformed differently without any loss to work with other companies. In this paper, transforming XML document based on JAVA servlet is considered as realization of a XML system to exchange documents safely.

  • PDF

Efficient Certificateless Signature Scheme on NTRU Lattice

  • Xie, Jia;Hu, Yupu;Gao, Juntao;Gao, Wen;Jiang, Mingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5190-5208
    • /
    • 2016
  • Because of the advantages of certificateless and no escrow feature over the regular signature and identity-based signature, certificateless signature has been widely applied in e-business, e-government and software security since it was proposed in 2003. Although a number of certificateless signature schemes have been proposed, there is only one lattice-based certificateless signature scheme which is still secure in the quantum era. But its efficiency is not very satisfactory. In this paper, the first certificateless signature scheme on NTRU lattice is proposed, which is proven to be secure in random oracle model. Moreover, the efficiency of the new scheme is higher than that of the only one lattice-based certificateless signature.

A Study on Priorities of the Components of Big Data Information Security Service by AHP (AHP 기법을 활용한 Big Data 보안관리 요소들의 우선순위 분석에 관한 연구)

  • Biswas, Subrata;Yoo, Jin Ho;Jung, Chul Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.301-314
    • /
    • 2013
  • The existing computer environment, numerous mobile environments and the internet environment make human life easier through the development of IT technology. With the emergence of the mobile and internet environment, data is getting bigger rapidly. From this environment, we can take advantage of using those data as economic assets for organizations which make dreams come true for the emerging Big Data environment and Big Data security services. Nowadays, Big Data services are increasing. However, these Big Data services about Big Data security is insufficient at present. In terms of Big Data security the number of security by Big Data studies are increasing which creates value for Security by Big Data not Security for Big Data. Accordingly in this paper our research will show how security for Big Data can vitalize Big Data service for organizations. In details, this paper derives the priorities of the components of Big Data Information Security Service by AHP.

The Development and Present State of the Trade e-Marketplace in Korea (무역 e-마켓플레이스에 대한 현황 및 발전방향)

  • Lee, Yong-Keun;Kim, Sun-Chul
    • International Commerce and Information Review
    • /
    • v.5 no.2
    • /
    • pp.113-132
    • /
    • 2003
  • The recent advancement of information technology bas impacted immensely on international trade. Particularly, the Internet revolution bas been the driving force behind the expansion of electronic commerce (e-commerce: EC), of which Trade e-Marketplace has been playing very important role in doing international trade. This study analyses its concept, features, types and present state, and also bas an outlook of it in the future based on a precedent and literature study on this subject in order that the trade business and small corporations understand more deeply and use it effectively.

  • PDF

Operation Strategy for Electronic Commerce Promotion Base on Common Mechanic Industry (ASP기반으로 한 기계산업체간의 성공적 전자상거래 구축을 위한 전략연구)

  • Jeong, Sei-Hyun
    • Journal of Information Technology Services
    • /
    • v.1 no.1
    • /
    • pp.81-117
    • /
    • 2002
  • The generalization of Internet use has been spreaded all over the world and impacted company to introduce intranet and extranet for their operation which dealt with electronic commerce. For these reason, endeavor of implementation of web site system is promotioned and enhanced the possibility of adaptation range for the view of company. Dramatic competition which company faced with the use of internet and request from all over the world made company brought company to various and different type of level. It is necessary to develop website system with experty knowledge to satisfy customer needs. To deal with this situation, works from the level of government should proposed to spread whole country business which propelled through kyungnam mechanic industry information promotion center. With strategic proposal concerning district characteristics to adapt electronic commerce successfully, information promotion should performed. Support of government is needed continuously to realize infra of ASP composed of 4,877 mechanic industry company. It might be possible to deal with international rapid change with cooperation of company and government related department.

A Study on Trace-Back Method of Financial Network Using IP Marking Server (IP 마킹 서버를 활용한 금융 전산망 공격자 역추적 기술 연구)

  • Park, Keunho;Choi, Ken;Shon, TaeShik
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.129-139
    • /
    • 2017
  • With the advent of FinTech, many financial services have become available in the mobile Internet environment and recently, there is an internet bank that provides all bank services online. As the proportion of financial services over the Internet increases, it offers convenience to users, but at the same time, the threat of financial network is increasing. Financial institutions are investing heavily in security systems in case of an intrusion. However attacks by hackers are getting more sophisticated and difficult to cope with. However, applying an IP Trace-back method that can detect the actual location of an attacker to a financial network can prepare for an attacker's arrest and additional attacks. In this paper, we investigate IP Trace-back technology that can detect the actual location of attacker and analyze it to apply it to financial network. And we propose a new IP Trace-back method through Infra-structure construction through simulation experiments.

Development and Evaluation of Key Recovery System for Secure Recovery of Cryptographic Files in PC (PC상의 암호파일의 안전한 복구를 위한 키복구 시스템의 개발 및 평가)

  • 장수진;고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.167-186
    • /
    • 2002
  • The encryption of a file on a PC before saving can maintain security of the file. However, if the key for the encrypted file is lost or damaged, the encrypted file can not be decrypted, resulting in serious economical loss to the user or the user group. In order to minimize the economical loss a secure and reliable key recovery technology is required. Presented in this paper is the development and evaluation of PKRS (PC based Key Recovery System) which supports encryption and decryption of file and recovery of the encrypted file in emergency. The encapsulating method, which attaches key recovery information to encrypted file, is applied to the PKRS. In addition, the PKRS is developed and evaluated according to the requirements of Requirements for Key Recovery Products proposed by NIST and requirements of Common Criteria 2.0 to prove the safety and reliability of the information security system. This system is applicable to a PC and can be further extended to internet or intranet environment information system where in encryption and recovery of file is possible.

  • PDF

A Study on Analysis of Cyber Security Companies Superiority-securing strategy in Competition and Problem-solving Strategy (국내 사이버 증권사의 경쟁우위 전략요인 및 문제점 분석에 관한 연구)

  • 양경훈;김도일;이태호;송병희
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.2
    • /
    • pp.1-25
    • /
    • 2000
  • The utilization of Internet, which started only at the level of advertisement, has been gradually expanding its application areas as the trial commercial transaction becomes successful, the password-coding technology which removes the risks on the cyber transaction develops, the electronic money appears and other various related technologies progress. Following this trend the securities industry has been experiencing changes along with efforts to use it commercially. This study is to analyze the work of cyber securities companies on the basis of the theoretical background through preceding studies and literature and also analyze the common and different reasons for superiority-securing strategy in competition along with problems and their reasons. And also the objective of this study is to offer new superiority-securing strategy in competition and problem-solving strategy.

  • PDF