• Title/Summary/Keyword: Knowledge payment

Search Result 63, Processing Time 0.025 seconds

Shopping Orientation and Knitwear Purchasing Behavior of Female College Students in the U.S. (미국 여대생의 쇼핑 성향과 니트웨어 구매행동에 관한 연구)

  • Lee, Ok-Hee;Rucker, Margaret
    • The Research Journal of the Costume Culture
    • /
    • v.13 no.1
    • /
    • pp.161-173
    • /
    • 2005
  • The Main objective of this study was to investigate the relationship between shopping orientations and Knit wear Buying Behavior of female college students in the U.S. age 18 to 33. The questionnaires for this survey were developed to measure knitwear purchasing behavior, including sources of information about knitwear, evaluative criteria of knit wear product, attributes f store preference for knitwear, and shopping orientation. The questionnaire was administered to 119 female college students in the University of California. The data was analyzed by percentage, frequency, mean, factor analysis, Cluster Analysis and ANOVA, Duncan Multiple Range test. The female college students were classified into five subdivisions by cluster analysis; cautious shopping group, recreational shopping group, self-confident shopping group, shopping indifferent group, price conscious shopping group. In the case of fashion information sources of knit wear, significant differences were found according to shopping orientation subdivision in observation of others' and famous people's clothing, fashion shows, fashion articles in magazines, newspapers, and on the Internet, and shop displays. The evaluation criteria of knit wear product were significantly different depending on shopping orientation subdivision in fashionable, brand and store name, appropriate for different occasion, prestige. The store attributes of knitwear were significantly different depending on shopping orientation subdivision in product knowledge of sales personnel, store atmosphere, display of merchandise, layaway payment plan, price level, ease of parking and access, and new fashion.

  • PDF

A Study on the Problems in the Application of UCP 600 in the International Trade Transactions with China (중국과의 무역거래에서 UCP 600 적용상의 문제점에 관한 연구)

  • Park, Suk Jae
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.61
    • /
    • pp.191-211
    • /
    • 2014
  • This paper intends to study some problems in the application of UCP 600 in the international trade transactions with China. Generally speaking, China complies with UCP 600 well. Nevertheless, there are some problems in the application of UCP 600 in China owing to the difference in law and practices. There are some problems in the application of UCP 600 in China owing to the difference of practices under Bills of Exchange Act and The Provisions of the Supreme People's Court on Some Issues Concerning the Trial of Cases of Disputes over Letter of Credit. The Act insists on the formal requirements, the consistency between a letter amount and a figure amount, the unconditional payment character of bills of exchange. The Provisions include the recognition of revocable credits, the difference of standard in examining documents, the difference in the treatment of issuing banks in relation to discrepant documents. These aforesaid matters of the Act and the Provisions are inconsistent with the practices under the UCP 600. There are two main problems in the operation of letters of credit in China. One is the lack of concerned parties' practice knowledge in relation to letters of credit in China. The other is the inactive stance of nominated banks in China. There are two main problems in relation to judiciary institutions in China. First, judges in China tend to abuse the injunctions owing to the lack of understanding in relation to letters of credit. Secondly, there are inconsistency in the court ruling in China.

  • PDF

Design the b-Cart based Agent System in B2B EC: AgentB (B2B EC에서의 b-Cart기반 에이전트시스템의 설계:AgentB)

  • 임규건;이재규
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2003.05a
    • /
    • pp.377-384
    • /
    • 2003
  • B2B EC에서 지능형 에이전트에 대한 요구의 증가와 함께 기업구매자가 직접 전자시장으로부터 구매하는 데스크탑 구매의 요구도 증가하고 있는 추세이다. 본 논문에서는 B2B 상에서 전자시장으로부터의 효율적인 구매를 지원하는 b-Cart 기반 에이전트 시스템의 설계 사례에 대해서 기술한다. b-Cart는 구매자가 소유하고 사용되는 구매자 사이트에 위치한 쇼핑카트로서, 본 논문에서는 B2B EC에서의 b-Cart 기반 에이전트 시스템의 요구 기능을 사용자식별(Identification), 사용자 다이알로그(User Dialog), 상품정보수집(Collection), 물품정보제거(Trashing), 개별 구매의사결정지원(Individual Purchase Decision Support), 조직 구매의사결정지원(Organizational Purchase Decision Support), 협상(Negotiation), 주문처리(Ordering), 지불처리(Payment), 진행사항 추적(Tracking), 구매기록(Recording), 전자구매시스템에 구매기록 전송(Record Transmission), 지식베이스에 새로운 지식 유지(Knowledge Maintenance)으로 정의하고, b-Cart 기반 에이전트 시스템의 메시지 인터페이스를 설계하고 시스템의 구조를 설계하여 프로토타입 시스템인 AgentB의 설계 사례를 소개한다. b-Cart 기반 에이전트시스템은 기업구매자의 전자시장으로부터 구매자 증가함에 따라 분산된 정보를 관리 해주고 통합적으로 구매처리를 해줄수 있는 효과적인 시스템이다. 향 후 B2B EC의 에이전트 시스템은 b-Cart를 기반으로 할 것으로 예측할 수 있다.

  • PDF

A Study on the Factors Influencing the Performance of FinTech Platform (핀테크 플랫폼의 성과에 영향을 미치는 요인 연구)

  • Xian, Feng Si;Um, Hyemi
    • Journal of Information Technology Applications and Management
    • /
    • v.28 no.2
    • /
    • pp.1-16
    • /
    • 2021
  • In recent years, as IT technologies such as cloud computing and mobile payment have evolved and Internet users have increased, the Internet financial market has become intelligent, mobile, and platformed. This study considers the impact of the psychological characteristics of platform systems and users on the performance of fintech platforms. The results of this study are as follows. Information quality affected trust and commitment, service quality affected commitment only, and system quality affected trust and commitment. The perceived risk affected trust and commitment, and the perceived benefit only affected trust and was shown to have an insignificant relationship with immersion. Trust has been shown to have a significant relationship with commitment, and both trust and commitment affected performance. In the validation of mediation effects, trust has shown a partially mediated effect between information quality, system quality, perceived risks, and perceived benefits and performance. There was no mediation effect between service quality and performance. Immersion has been shown to have a partial mediating effect between information quality, service quality, system quality, perceived risk and performance, and there is no mediating effect between perceived benefits and performance. This study showed what are the main factors that affect the performance of the fintech platform and will be used as a useful foundation for increasing the performance of the platform in the future.

A research on the selection of subject and its legal and institutional guarantee concerning protection of the intellectual property of traditional medicine (전통의약분야의 지적 재산권 보호를 위한 대상 발굴 및 법적.제도적 보장 방안 연구)

  • Kim, Hong-Jun;Lee, Sang-Jung;Ju, Young-Sung
    • Korean Journal of Oriental Medicine
    • /
    • v.8 no.2 s.9
    • /
    • pp.47-65
    • /
    • 2002
  • This project is planned to grasp the present situation of traditional medicine part in our country and to study protection method about this by the intellectual property which is the international concerning point recently. Through this, we will be able to devise means to deal with protection method of traditional medicine being developed by WIPO now. Traditional medicine field In our country Is organized with specific condition separated into the part of institution and the part of non-institution. So, because of the closed peculiarity, we have experienced the difficulties to understand the real facts about traditional medicine. We cannot be indifferent to the matter anymore. Because the expectation of object people is high, we could expect the realization of research content. In 1 detail project, we investigated the situation of traditional medicine in our country through various collecting methods for excavation of oriental treatment technique and herb medicine which is worth protecting. With it, we sorted again into 56 kinds of 11 parts through analysis of validity in the way of oriental medicine. And we tried to link this up 2 detail project which is about legal and institutional guarantee concerning protection. furthermore, we tried to find approach ways for security of objectivity into 4 steps with the example of model disease. we could complete practical classification of traditional medicine in our country. In 2 detail project, we studied the protection method by the intellectual property through research result in 1 detail project. For this, we observed an outline of the intellectual property including a patent application analysis in folk traditional medicine part, and problems of traditional medicine protection and world trend by traditional knowledge protection tendency and the patent law In domestic traditional medicines, the aspects unprotectable with the patent law now were remained. So, we suggested supplementary plan. And we also suggested the freedom of utilization between traditional medicine possession countries (in-situ utilization) and the demand compensation payment for a third country (ex-situ utilization) in connection with international movement.

  • PDF

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

Implemention of Refrigerator Application using NFC (NFC를 이용한 냉장고 Application 구현)

  • Ham, Ji-Hun;Yun, Min-Gyu;Han, Jung-Woo;Kim, Tae Yong;Jang, Won-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.570-572
    • /
    • 2015
  • NFC (Near Field Communication) is an area of the RFID technology is a kind of short-range wireless communication. NFC technology is to utilize the data transfer, the access control system is usefully employed in many fields, such as mobile payment. Recently smartphone application development using NFC is activated, recognition of the convenience of the current NFC tag is insignificant state. In this paper, it is the content of the Application that was created in order to provide the knowledge of convenience food to the customer to visit the mart. Users with Mart, using smartphones, at a NFC tag that is attached to the food display stand food information, purchasing tips, keeping method, data such efficacy is provided over the screen of the smartphone. If you purchased the food is placed in the refrigerator "moves to the food list of application to click the button, through the food list screen their food list in the refrigerator, and by providing information such as expiration date, the user There is help me to be able to buy the more convenient food.

  • PDF

Moderating Role of Customer-Firm Relationship Characteristics In Service Failures and Customer Defection Link (서비스실패와 고객이탈간 연결에서 고객-기업 관계특성의 조정적 역할 - 가구단위의 연속적 서비스를 중심으로 -)

  • Joo, Young-Hyuck;Ok, Sung-Park
    • Journal of Global Scholars of Marketing Science
    • /
    • v.16 no.2
    • /
    • pp.27-54
    • /
    • 2006
  • As maintaining customer long term relationship is critical factor for improving to firm value as well as customer lifetime value, the academicians and practitioners have paid attention to customer defection. It is said that service failures are key factors to customer defection or customer switching(Keaveney 1995 etc.). This study examines that the effect on customer defection of service failures is differential according to the various customer-firms relationship characteristics. We consider relationship duration, usage level, decision making influence, industry knowledge and switching cost as customer-firm relationship characteristics based on marketing literature. Predictions are developed and tested using Internet service provider(ISP) user survey data(n=212). Results show that the customer-firms relationship characteristics/above variables) play a moderating roles in the service failures and customer defection links.

  • PDF

Design and Implement of Anti-Smishing System based-on Android (안드로이드 기반 스미싱 방지 시스템 설계 및 구현)

  • Jang, Rae-Young;Bae, Jung-Min;Jung, Sung-Jae;Sung, Kyung;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.790-793
    • /
    • 2013
  • Lastest Smishing is one of the hacking techniques target on the Android smartphone. Smishing using the SMS message is a new hacking techniques. smishing sends a message to the user included trojan address. It collects personal information and to control smartphones. In particular, without the user's knowledge of the retail payment service provider uses the service. It caused damage worth up to 300,000 won. It damage to users through different types of text messages. This paper Smishing typical methods and types are described in damages. This paper are described in damages and type by Smishing. This paper propose preventive and fundamental solution. We designed and implemented a anti-smishing system for android.

  • PDF

Prospects For The Development Of Distance Educational Learning Technologies During The Training Of Students Of Higher Education

  • Rohach, Oksana;Pryhalinska, Tetiana;Kvasnytsya, Iryna;Pohorielov, Mykhailo;Rudnichenko, Mykola;Lastochkina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.353-357
    • /
    • 2022
  • This article identifies the problems and substantiates the directions for the development of distance learning technologies in the training of personnel. An example of using digital media to create a remote access laboratory is given. The article is devoted to the definition of the main aspects of the organization of distance education. Rapid digitization, economic, political and social changes taking place in Ukraine necessitate the reform of the education system. First of all, it concerns meeting the educational needs of citizens throughout their lives, providing access to educational and professional training for all who have the necessary abilities and adequate training. The most effective solution to the above-mentioned problems is facilitated by distance learning. The article analyzes the essence and methods of distance learning organization, reveals the features of the use of electronic platforms for the organization of this form of education in different countries of the world. The positive characteristics of distance learning are identified, namely: extraterritoriality; savings on transport costs; the interest of modern youth in the use of information tools in everyday life; increase in the number of students; simplicity and accessibility of training; convenient consultation system; democratic relations between the student and the teacher; convenience for organizations in training their employees without interrupting their regular work; low level of payment for distance education compared to traditional education; individual learning pace; new teacher status. Among the negative features of online education, the author refers to the following problems: authentication of users during knowledge verification, calculation of the teacher's methodological load and copyright of educational materials; the high labor intensity of developing high-quality educational content and the high cost of distance learning equipment; the need to provide users with a personal computer and access to the Internet; the need to find and use effective motivation mechanisms for education seekers.