• Title/Summary/Keyword: Pc-Commerce

Search Result 72, Processing Time 0.027 seconds

A Study on Consumer Purchase Intention Using a Flow (Flow를 이용한 소비자 구매의도에 관한 연구)

  • Park, Jong-Won;Yoon, Sung-Jun;Choi, Dong-Choon
    • Journal of Global Scholars of Marketing Science
    • /
    • v.12
    • /
    • pp.59-75
    • /
    • 2003
  • In order for electronic commerce to be successful, it must have a theoretical framework that considers the characteristics of the internet user who are consumers in the cyber space and impacts their purchase intentions. We were able to obtain participation of 350 people from across the country using 316 responses(34 responses removed), we derived statistics by means of SPSS/PC version 10.0 and AMOS 4.0 statistics package. We found that, the higher the degree of skill and the sense of challenge, the level of involvement and perceived service quality increased. And the degree of skill has a negative influence on awareness of perceived risk than the sense of challenge. Perceived service quality, perceived risk and involvement has a influence on purchase intentions.

  • PDF

A Study on the Utilization of the SaaS Model UPnP Network in e-Trade (전자무역의 SaaS모형 UPnP 네트워크 활용방안에 관한 연구)

  • Jeong, Boon-Do;Yun, Bong-Ju
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.563-582
    • /
    • 2012
  • In this paper, UPnP Network SaaS model has been studied. Currently, this model of UPnP Network and the trade mission is being used by outsourcing. From now on, the introduction of new trading systems and existing systems and the commercialization of this model as a UPnP network service connection should work. The future of UPnP network SaaS model will become commercially available software, commercial software can be accessed remotely via the Internet should be. Customer site activities must be managed from a central location. Application software architecture, pricing, partnerships, management should not include the character models. N should be the model. When used in small and medium enterprises have a very high value.

  • PDF

The Effects of the Perceived Qualities of Systems, Information, and Service on Individual Performance in a Smartphone Application Context (지각된 시스템과, 정보, 서비스 품질이 사용자별 스마트폰 애플리케이션 이용성과에 미치는 영향)

  • Jung, Wonjin;Kim, Taehwan
    • International Commerce and Information Review
    • /
    • v.18 no.1
    • /
    • pp.209-233
    • /
    • 2016
  • Today's mobile devices including smartphones are gradually taking a prominent position in many areas as portable multimedia computers and establishing a new computing paradigm. Nevertheless, it would not be easy for smartphone applications to provide users with a high level of usability under the current environment due to the physical hardware characteristics of each smartphone, which are expected to have a negative impact on the qualities of system, information, and service that smartphone applications provide. Thus, this study examined: 1) the effects of the perceived qualities of system, information, and service of smartphone applications on the perceived usability of the applications, and 2) the effect of the usability on users' individual performance with the given application. A survey was conducted and structural equation modeling (SEM) was used to analyze the data. This study found that there are significant effects of the perceived qualities of system, information, and service of smartphone applications on the perceived usability of the applications. In addition, this study also found a significant effect of the usability of samrtphone applications on the individual performance with the application.

  • PDF

An Analysis of Information Security Curriculum in Elementary School practical arts, Secondary School Informatics Teaching and Suggestions for Improvement

  • Kim, Choungbae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.69-75
    • /
    • 2020
  • Although various information and communication technologies occupy a place in daily life in the face of the fourth industrial revolution, the contents related to information security in elementary and secondary education courses are mainly related to personal information protection, and the contents and countermeasures of rapidly changing security threats are low in textbooks, and they are far behind the changes. To improve this, this paper suggests that education contents related to information security are included in elementary school real and middle school information textbooks, educational contents related to wireless network and PC security are included to cope with rapidly changing security threats that may arise from the age of the Internet of Things, non-face-to-face classes, and case-based information ethics education can be organized to eradicate curiosity about hacking. Through this paper, we will help prevent information security accidents by establishing basic security measures on our own and strengthening security awareness in the information age.

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

A Instructional Contents Creator using Wavelet for Lossless Image Compression (웨이브렛 기반 무손실 압축 방법을 사용한 동영상 강의 콘텐츠 제작기 구현)

  • Lee, Sang-Yeob;Park, Seong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.71-81
    • /
    • 2011
  • In order to easily create video tutorials, the algorithm is needed that video camera recording, white board images, video attachments, and document data are combined in real-time. In this study, we implemented the video lecture content creation system using wavelet-based lossless compression to composite multimedia objects in real-time and reproduce the images. Using commercially available PC can be useful when lecturers want to make video institutional contents, it can be operated easily and fastly. Therefore, it can be very efficient system for e-Learning and m-Learning. In addition, the proposed system including multimedia synthesis technology and real-time lossless compression technology can be applied to various fields, different kinds of multimedia creation, remote conferencing, and e-commerce so there are highly significant.

A Study on the e-Business Utilization Schemes in Small and Medium Companies (국내 중소기업 전자상거래 현황 및 활성화 방안에 관한 연구)

  • Lee, Jong-Min
    • Korean Business Review
    • /
    • v.18 no.1
    • /
    • pp.1-17
    • /
    • 2005
  • This study attempts to investigate the IT utilization and e-business level of the small and medium companies in order to facilitate their e-commerce efforts. Results show that they have basic IT infrastructures such as internet and PC, but they use their IT resources mainly for office automations. Major problems with such low level of IT utilization are in their lack of manpower, skill, and fund. Considering above issues, web hosting service is believed as a good measure to alleviate their problems. Hence, this paper suggests that utilization of the web-based ASP can be a viable solution for the currently revealed issues. Also, development of creative IT application(business) cases and their advertizement can lead small and medium finns to more productive IT investments, which requires more diverse IT performance measurements such as BSC(balanced scorecard), other than traditional ROI.

  • PDF

Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.517-520
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking stork dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Real-time Optimized Composition and Broadcasting of Multimedia Information (다중 미디어 정보의 실시간 최적화 합성 및 방송)

  • Lee, Sang-Yeob;Park, Seong-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.177-185
    • /
    • 2012
  • In this paper, we developed the composition system that it can efficiently edit camera recording data, images, office document such as powerpoint data, MS word data etc in real-time and broadcasting system that the file is made by the composition system. In this Study, we developed two kinds of algorithm; Approximate Composition for Optimization (ACFO) and Sequence Composition using Memory Que (SCUMQ). Especially, the system is inexpensive and useful because the system is based on mobile devices and PCs when lectures hope to make video institutional contents. Therefore, it can be contributed for e-learning and m-learning. In addition, the system can be applied to various fields, different kinds of multimedia creation, remote conferencing, and e-commerce.

A Credit Card Sensing System based on Shared Key for Promoting Electronic Commerce (전자상거래 촉진을 위한 공유키 기반 신용카드 조회 시스템)

  • Jang, Si-Woong;Shin, Byoung-Chul;Kim, Yang-Kok
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1059-1066
    • /
    • 2003
  • In this paper, the magnetic sensing system is designed and implemented for the safe security in internet commerce system. When the payment is required inthe internet commerce system, the magnetic sensing system will get the information from a credit card without keyboard input and then encrypt and transmit the information to server. The credit card sensing system, which is proposed in this paper, is safe from keyboard hacking because it encrypts card information immediately in its internal chip and sends the information to host system. For the protection of information, the magnetic sensing system is basically based on a synchronous stream cipher cryptosystem which is related to a group of matrices. The size of matrices and the bits of keys for the best performances are determined for various cases. It is shown that for credit card payments. matrices of size 2 have good performance even at most 128bits keys with the consideration of inverse matrices. For authentication of general-purpose data, the magnetic sensing system needs more than 1.5KB data and in this case, the optimum size of matrices is 2 or 3 at more 256bits keys with consideration of inverse matrices.