• Title/Summary/Keyword: Internet and e-Business Technology

Search Result 333, Processing Time 0.047 seconds

Research Trends Analysis of Domestic Carrier Billing Services using Meta-Analysis (메타분석을 활용한 국내 통신과금 서비스 연구동향 분석)

  • Yoo, Soonduck;Kim, Jungihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.71-85
    • /
    • 2016
  • The purpose of this research is to study technical and policy improvements of carrier billing services, which are a developing and growing industry, by adopting a meta-analysis method. Implications were derived from studying 15 years-worth of academic research papers (from 2001 to 2015), by analyzing the trends over a total of 109 such research papers on carrier billing services. First, looking at the characteristics of the main studies of the papers from 2008 to 2009, it papers appeared that dealt with preventing fraudulent transactions and preserving consumer protection. Privacy, policy proposals and studies for new systems were researched from 2010-2012. Service, success factors, damage prevention systems research, law, and institutions were discussed in 2013-2015 mainly. Second, the research showed that the number of carrier billing service studies increased due to social issues(telecommunications billing services deregulation, the emergence smartphones, fraud). Third, in sectorial research results, technology was the focus area of 47 papers (43.1%), the service sector was the focus of 39 pieces (35.8%) and law and policy improvement accounted for 23 pieces (21.1%). The study of technology and service areas was the most active and according to changes in the environment, law and policy improvement were second to most active. This study will contribute to improving relevant institutions and research directions about study trends in carrier billing services.

Trust Building of Buyers who perceive Quality Risk High in Online Used Car Transactions: A Dyadic Trust Relationship (온라인 중고차 거래에서 품질위험을 높게 지각한 구매자의 신뢰형성: 구매자와 대리인 양자간 신뢰)

  • Lee, Seung-chang
    • Journal of Distribution Science
    • /
    • v.7 no.3
    • /
    • pp.49-69
    • /
    • 2009
  • With the proliferation of electronic commerce, online transactions have become a norm. Its enormous potential, however, can be truly realized if consumers feel comfortable facing invisible sellers over the Internet, a virtual business channel. Trust has been identified as a key component in many e-Commerce studies. The purpose of this study is to find out which factors play a major role in building buyer trust and how the build-up trust affects buyer's purchase intention in online used car transactions. Based on the information asymmetry, TAM (Technology Acceptance Model), and the trust theory, our research model includes factors such as a buyer's propensity-to-trust, institutional characteristics (inspection and warranty policy), word-of-mouth referral, perceived size, and perceived benefits as independent variables. The model also includes trust as a mediate variable, purchase intention as a dependent variable, and perceived quality risk as a moderate variable. The research model is tested by analyzing 448 sample data gathered from used car websites. The result shows that the trust has significant effects on the online purchase intention, and institutional characteristics have been identified as one of the most significant factors for trust building in used car websites. For those who perceive quality risk high, actual purchasing behavior occurs only when they have trust on the used car websites, indicating that trust plays a vital role as a mediate variable. This study suggests that buyer trust on the used car websites is important to increase buyer's online purchase behavior.

  • PDF

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

NAMA: A Context-Aware Multi-Agent Based Web Service Approach to Proactive Need Identification for Personalized Reminder System (NAMA: 개인화된 상기 시스템 구축에서의 선응적인 욕구 파악을 위한 상황인지가 가능한 다중 에이전트 웹서비스 접근법)

  • Kwon, Oh-Byung;Kim, Min-Yong;Choi, Sung-Chul;Park, Gyu-Ro
    • Asia pacific journal of information systems
    • /
    • v.14 no.3
    • /
    • pp.121-144
    • /
    • 2004
  • Developing a personalized system on a user's behalf which is working around the Internet-based marketplace is one of the challenging issues in intelligent e-business, especially mobile commenrce. It has been highly recommended that such a mobile personalized system has to perceive the user's needs a priori by tracking user's current context such as location with activity and then to identify the current needs dynamically and proactively. Automatically and unobtrusively getting user's context is an inevitable feature for the development of autonomous mobile commenrce. However, personalization methodologies and their feasible architectures for context-aware mobile commerce have been so far very rare. Hence, this paper aims to propose a context-aware mobile commerce development methodology by applying agent and semantic web technologies for personalized reminder system, which is one of the mobile commerce support system. We revisited associationism to understand a buyer's need identification process and adopt the process as 'purchase based on association' to implement a personalized reminder system. Based on this approach, we have showed how the agent-based semantic web service system can be used to realize need-aware reminder system. NAMA(Need-Aware Multi-Agent), a prototype system, has been implemented to show the feasibility of the methodology and framework under mobile setting proposed in this paper. NAMA embeds bluetooth-based location tracking module and identify what a user is currently looking at through her/his mobile device such as PDA. Based on these capabilities, NAMA considers the context, user profile with preferences, and information about currently available services, to aware user's current needs and then link her/him to a set of services, which are implemented as web services.

A study on the detection of fake news - The Comparison of detection performance according to the use of social engagement networks (그래프 임베딩을 활용한 코로나19 가짜뉴스 탐지 연구 - 사회적 참여 네트워크의 이용 여부에 따른 탐지 성능 비교)

  • Jeong, Iitae;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.197-216
    • /
    • 2022
  • With the development of Internet and mobile technology and the spread of social media, a large amount of information is being generated and distributed online. Some of them are useful information for the public, but others are misleading information. The misleading information, so-called 'fake news', has been causing great harm to our society in recent years. Since the global spread of COVID-19 in 2020, much of fake news has been distributed online. Unlike other fake news, fake news related to COVID-19 can threaten people's health and even their lives. Therefore, intelligent technology that automatically detects and prevents fake news related to COVID-19 is a meaningful research topic to improve social health. Fake news related to COVID-19 has spread rapidly through social media, however, there have been few studies in Korea that proposed intelligent fake news detection using the information about how the fake news spreads through social media. Under this background, we propose a novel model that uses Graph2vec, one of the graph embedding methods, to effectively detect fake news related to COVID-19. The mainstream approaches of fake news detection have focused on news content, i.e., characteristics of the text, but the proposed model in this study can exploit information transmission relationships in social engagement networks when detecting fake news related to COVID-19. Experiments using a real-world data set have shown that our proposed model outperforms traditional models from the perspectives of prediction accuracy.

The Study of Web Services Adaptation in IPv6/IPv4 Coexistence Network (IPv6/IPv4 공존 환경에서의 웹서비스 적용에 관한 연구)

  • Lee, Won-Suk;In, Min-Kyo;Lee, Seung-Yun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.747-749
    • /
    • 2005
  • The popularity of web services within the IT industry continues to grow as the next generation web technologies. Web services are self-contained, self-describing, modular applications that can be published, located, and invoked across the Web. Web services will be core technology for e-business in the Web. IPv6 is sometimes also called the Next Generation Internet Protocol and is a new version of IP which is designed to be an evolutionary step from IPv4. In this paper, we define problems for adapting web services to IPv6 Environment. This paper survey and explain consideration issues that include standards, components, coexistence of IPv6 and IPv4, etc.

  • PDF

A Study on Transborder Data Flow of Personal Information: Policy Suggestion based on EU's Approach (국경간 개인정보 이전 규제에 대한 개선방안 연구: EU사례를 중심으로)

  • Lee, Sang-Hyuk;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1013-1023
    • /
    • 2016
  • Transborder data flow(TBDF) of personal information in Korea has been limited by current Privacy law which request data subject to give consent. As the IT industry is growing at an incredible rate, there is a need to review the existing law to cope with growing industrial demand and increasing numbers of international data transfer. The transfer of personal data overseas not only allow businesses providing IT services including finance, internet, e-commerce to thrive, but also impact every aspect of our lives which are increasingly depended on these technology. Transmitting personal data across borders raises serious questions of privacy protection and restriction of business operation. In ordrer to promote interoperability of personal data in international environment, a considerable amount of research and debate needs to be taken before implementing a sound policy. This paper presents a need for a sound TBDF policy in Korea by examine the main policy challenges associated with TBDF. Finally, the paper identify policy suggestions based on European Union's approach as they have successfully implemented TBDF policy that balanced data privacy and economic agenda.

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.

An alternative way of Animation Industry : Focusing on Avatar sevice's Lock-in Effect (애니메이션 산업의 대안적 연구 - 아바타 서비스의 소비자 고착화(lock-in) 전략을 중심으로)

  • Han, Chang-Wan
    • Cartoon and Animation Studies
    • /
    • s.6
    • /
    • pp.152-171
    • /
    • 2002
  • This study analyses the avatar service, which is recognized as an alternative strategy of animation industry. The research questions of this study are following: (1) How have the avatar services been developed and what are the present dominant types? (2) Which structural characteristics of e-business environment are needed for the success of avatar services? (3) What is the economic characteristics of avatar business model? To solve these research questions, the basic conditions and the structural characteristics of avatar services have been investigated. In the first place, two forms of avatar service are classified. One is the internet service site whole primary service is to provide chatting service based on avatar service. The other is the portal site in which many kinds of products and services are presented as bundles to meet the needs of internet users. So avatar service is one of bundles which those portal sites are providing with. In this study, the big five internet service sites are selected based on the profits they earned through the sales of avatar service. The result of analysis is that the pricing strategy of those big five sites is very different from those of traditional off-line markets. The pricing mechanism are based on the value which internet users endow with the avatar items, not based on the costs of making the products. Avatar is the representative informative goods. The informative goods have the original cost structures, constant fixed costs and zero marginal costs, so the providers of avatar services make much of the subjective values of consumers. The sayclub, which is the most successful avatar service site and earn the average sales of 3 billing won a month, takes the aggressive strategy of pricing avatar items at highest price in the industry. The avatar service providers which make lots of profits are planning of making differentiate the services, introducing well-known brand items and star-named items. Nevertheless, the fact that the members of the sayclub are not decreasing means that the network effect of the site is so strongly manifest. Moreover, the costs the members have paid for the avatar items are so big not as to switch from one site to the other site, it can be very costly. These switching costs are endemic in high-technology industries and digital contents industries. It can be so large that switching suppliers is virtually unthinkable, a situation known as 'lock-in'. When switching costs are substantial, competition can be intense to attract new customers, since, one they are locked in, they can be a substantial source of profit. The consumers of avatar items have switching costs if they subscribe for the new avatar service site. The switching costs can be subscription costs as well as the costs of giving up the items they already paid for. One common example of switching costs involves specialized supplies, as with inkjet printer cartridges. In this example, the switching cost is the purchase of a new printer. The market is competitive ex ante, but since cartridges are incompatible, it is monopolized dx post. So the providers of printer/cartridges set pricing printer so cheap and cartridges expensive. On the contrary, since the avatar service can be successful with the strong network effect, the providers of avatar services have to compete aggressively for new customers. So they allow the subscription at a low price(almost marginal cost) in the early market. The network effect can be maximized when the members are sufficiently growing. The providers which have the monopoly power with sufficient subscribers. begin to raise the prices over the lifetime of the product and make profits.

  • PDF

A Study for Strategy of On-line Shopping Mall: Based on Customer Purchasing and Re-purchasing Pattern (시스템 다이내믹스 기법을 활용한 온라인 쇼핑몰의 전략에 관한 연구 : 소비자의 구매 및 재구매 행동을 중심으로)

  • Lee, Sang-Gun;Min, Suk-Ki;Kang, Min-Cheol
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.91-121
    • /
    • 2008
  • Electronic commerce, commonly known as e-commerce or eCommerce, has become a major business trend in these days. The amount of trade conducted electronically has grown extraordinarily by developing the Internet technology. Most electronic commerce has being conducted between businesses to customers; therefore, the researches with respect to e-commerce are to find customer's needs, behaviors through statistical methods. However, the statistical researches, mostly based on a questionnaire, are the static researches, They can tell us the dynamic relationships between initial purchasing and repurchasing. Therefore, this study proposes dynamic research model for analyzing the cause of initial purchasing and repurchasing. This paper is based on the System-Dynamic theory, using the powerful simulation model with some restriction, The restrictions are based on the theory TAM(Technology Acceptance Model), PAM, and TPB(Theory of Planned Behavior). This article investigates not only the customer's purchasing and repurchasing behavior by passing of time but also the interactive effects to one another. This research model has six scenarios and three steps for analyzing customer behaviors. The first step is the research of purchasing situations. The second step is the research of repurchasing situations. Finally, the third step is to study the relationship between initial purchasing and repurchasing. The purpose of six scenarios is to find the customer's purchasing patterns according to the environmental changes. We set six variables in these scenarios by (1) changing the number of products; (2) changing the number of contents in on-line shopping malls; (3) having multimedia files or not in the shopping mall web sites; (4) grading on-line communities; (5) changing the qualities of products; (6) changing the customer's degree of confidence on products. First three variables are applied to study customer's purchasing behavior, and the other variables are applied to repurchasing behavior study. Through the simulation study, this paper presents some inter-relational result about customer purchasing behaviors, For example, Active community actions are not the increasing factor of purchasing but the increasing factor of word of mouth effect, Additionally. The higher products' quality, the more word of mouth effects increase. The number of products and contents on the web sites have same influence on people's buying behaviors. All simulation methods in this paper is not only display the result of each scenario but also find how to affect each other. Hence, electronic commerce firm can make more realistic marketing strategy about consumer behavior through this dynamic simulation research. Moreover, dynamic analysis method can predict the results which help the decision of marketing strategy by using the time-line graph. Consequently, this dynamic simulation analysis could be a useful research model to make firm's competitive advantage. However, this simulation model needs more further study. With respect to reality, this simulation model has some limitations. There are some missing factors which affect customer's buying behaviors in this model. The first missing factor is the customer's degree of recognition of brands. The second factor is the degree of customer satisfaction. The third factor is the power of word of mouth in the specific region. Generally, word of mouth affects significantly on a region's culture, even people's buying behaviors. The last missing factor is the user interface environment in the internet or other on-line shopping tools. In order to get more realistic result, these factors might be essential matters to make better research in the future studies.