• Title/Summary/Keyword: Transaction characteristics

Search Result 382, Processing Time 0.028 seconds

How User-Generated Content Characteristics Influence the Impulsive Consumption: Moderating Effect of Tie Strength (사용자 제작 콘텐츠 특성이 충동구매에 미치는 영향: 유대강도의 조절효과를 중심으로)

  • Weiyi Luo;Young-Chan Lee
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.275-294
    • /
    • 2022
  • In recent years, with the continuous integrative development of e-commerce and social media, social commerce, as a trust-centered social transaction mode, has become an important performance form of e-commerce. The good experience of online community and abundant user-generated content (UGC) attract more and more users and businesses to participate in the community contribution. In this context, the cost of accessing information is continuously decreasing, which not only makes the purchase process more concise and efficient, but also greatly increases the possibility of consumers' impulsive consumption. However, there are very few empirical studies on the internal influencing mechanism of consumers' impulsive consumption based on the characteristics of UGC for social commerce. In view of this, based on S-O-R model, this study constructs a model of consumers' impulsive consumption in the context of social commerce from the characteristics of UGC, with perceived risk as the mediating variable and tie strength as the moderating variable. The results show that content authenticity, content usefulness, and content valence of UGC have significant negative impacts on consumers' risk perception in the process of purchase decision-making, and consumers' perceived risk has a significant negative impact on consumers' impulsive consumption. Meanwhile, the tie strength between UGC producer and UGC receiver plays a moderating role between content usefulness and perceived risk, as well as between perceived risk and impulsive consumption. Finally, combined with the above findings, this study provides effective suggestions for relevant participants in social commerce in terms of business management.

The Influence of Perceived Value, Perceived Risk, Innovativeness on Trust in Mobile Shopping (모바일 쇼핑에서 지각된 가치, 지각된 위험, 혁신성이 신뢰에 미치는 영향)

  • Pyun, Hae-soo
    • Journal of Venture Innovation
    • /
    • v.5 no.2
    • /
    • pp.1-14
    • /
    • 2022
  • Mobile shopping goes beyond the level of a tool that simply supports consumers' shopping in-store and creates a new level of experience for consumers through offline connection. It is important to acquire new customers in order to gain a competitive advantage through mobile shopping, but it is more important to maintain a continuous transaction relationship with the secured customers. Existing mobile shopping-related studies can be largely classified into three categories such as a study on the characteristics of mobile consumers, a study on the characteristics of a mobile shopping mall, and a study on the characteristics of mobile shopping itself. Therefore, this study aimed to analyze the impact of perceived value, perceived risk, and innovativeness on trust in mobile shopping. In order to investigate the impact of perceived value, perceived risk, consumer innovativeness on the trust in mobile shopping, consumers who have experience in purchasing products through mobile were investigated. The data collected in this study were verified the reliability and validity of the measurement items based on the measurement validation process. In this study, regression analysis was performed by selecting perceived value, perceived risk, innovativeness as independent variables, and trust as dependent variables. As a result of the analysis, perceived value, innovativeness had a positive impact on trust and perceived risk had a negative impact on trust. As a result of analysis, three hypotheses were supported. Finally, implications of the research are presented, and limitations and directions for future research are described.

Drive Circuit of 4-Level Inverter for 42V Power System

  • Park, Yong-Won;Sul, Seung-Ki
    • KIEE International Transaction on Electrical Machinery and Energy Conversion Systems
    • /
    • v.11B no.3
    • /
    • pp.112-118
    • /
    • 2001
  • In the near future, the voltage of power system for passenger vehicle will be changed to 42V from existing 14V./ Because of increasing power and voltage ratings used in the vehicle the motor drive system has high switching dv/dt and it generates electromagnetic interference (EMI) To solve these problems multi-level inverter system may be used The feature of multi-level inverter is the output voltage to be synthesized from several levels of voltage Because of this feature high switching dv/dt and EMI can be reduced in the multi-level inverter system But as the number of level is increased manufacturing cost is getting expensive and system size is getting large. Because of these disadvantages the application of multi-level inverter has been restricted only to high power drives. The method to reduce manufacturing cost and system size is to integrate circuit of multi-level inverter into a few chips But isolated power supply and signal isolation circuit using transformer or opto-coupler for drive circuit are obstacles to implement the integrated circuit (IC) In this paper a drive circuit of 4-level inverter suitable for integration to hybrid or one chip is proposed In the proposed drive circuit DC link voltage is used directly as the power source of each gate drive circuit NPN transistors and PNP transistors are used to isolate to transfer the control signals. So the proposed drive circuit needs no transformers and opto-couplers for electrical isolation of drive circuit and is constructed only using components to be implemented on a silicon wafer With th e proposed drive circuit 4- level inverter system will be possible to be implemented through integrated circuit technology Using the proposed drive circuit 4- level inverter system is constructed and the validity and characteristics of the proposed drive circuit are proved through the experiments.

Dynamic Copy Security Protocol In Real-Time Database Systems (실시간 데이터베이스 시스템에서의 동적 복사 보안 프로토콜)

  • Park, Su-Yeon;Lee, Seung-Ryong;Jeong, Byeong-Su;Seung, Hyeon-U
    • Journal of KIISE:Software and Applications
    • /
    • v.26 no.8
    • /
    • pp.955-963
    • /
    • 1999
  • 다단계 보안 실시간 데이타베이스 시스템은 데이타베이스의 일관성 유지와 실시간 요구인 마감시간의 만족, 그리고 기밀성을 띤 데이타가 노출될 수 있는 비밀채널(covert-channel)의 방지라는 요구사항을 모두 만족해야 한다. 기존의 SRT-2PL(Secure Real-Time 2 Phase Locking)은 원본과 복사본으로 데이타 객체를 분리시켜 다른 등급간에 불간섭(non-interference)을 유지하여 비밀채널의 방지를 가능하게 하였으나, 복사본이 모든 데이타 객체에 대해 항상 존재하므로 메모리의 낭비가 있을 수 있고, 복사본의 갱신을 위한 갱신 큐의 관리에 따르는 오버헤드와 그에 따른 예측성 결여라는 문제점을 갖고 있다. 이를 개선하기 위하여 본 논문에서는 다단계 보안 실시간 데이타베이스 시스템의 요구사항을 모두 만족하는 동적 복사 프로토콜을 제안한다. 동적 복사 프로토콜은 로킹 기법을 기초로 동작하고, 트랜잭션의 작업에 따라 동적으로 복사본을 생성하고 삭제한다. 모의 실험 결과 제안한 동적 복사 프로토콜은 비밀채널을 방지하고 동적인 복사본의 생성으로 SRT-2PL의 단점인 메모리 낭비를 줄일 수 있으며, 예측성을 높여 마감시간 오류율을 감소시켰다.Abstract Concurrency control of real-time secure database system must satisfy not only logical data consistency but also timing constraints and security requirements associated with transactions. These conflicting natures between timing constraints and security requirements are often resolved by maintaining several versions(or secondary copies) on the same data items. In this paper, we propose a new lock-based concurrency control protocol, Dynamic Copy Security Protocol, ensuring both two conflicting requirements. Our protocol aims for reducing the storage overhead of maintaining secondary copies and minimizing the processing overhead of update history. Main idea of our protocol is to keep a secondary copy only when it is needed to resolve the conflicting read/write operations in real time secure database systems. For doing this, a secondary copy is dynamically created and removed during a transaction's read/write operations according to our protocol. We have also examined the performance characteristics of our protocol through simulation under different workloads while comparing the existing real time security protocol. The results show that our protocol consumed less storage and decreased the missing deadline transactions.

A Study on Improvement of Used-goods Market Platform Using Blockchain (블록체인을 이용한 중고거래 플랫폼 개선방안 연구)

  • Lee, Kyoung-Nam;Jeon, Gyeahyung
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.133-145
    • /
    • 2018
  • This study was investigated the necessity and possibility of using block-chain technology in online used-goods trading platform. Current online used-goods trading platforms operate a safety trading system, but it is difficult to utilize due to relatively high commission rate. As a result, people mainly use the method of meeting and purchasing in person, which is a relatively costly method. This study discusses how to build a platform to solve or mitigate problems such as privacy, information distortion and omission, fraud, etc. In the platform proposed in this study, it is possible to solve the major fraud and personal information protection problems that may occur in the transaction proceeding by appropriately reflecting the types and characteristics of the block-chain technology. In future work, we will discuss legal framework and technology development plan to apply the proposed platform in this study.

The Geographies of Foreign Aid by Korea: The Production and Practices of Geopolitical Discourse (한국 공적개발원조의 지정학적 담론)

  • Lee, Jin-Soo;Chi, Sang-Hyun
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.143-160
    • /
    • 2016
  • The official development assistance (ODA) accompanies an interstate financial transaction, such as trade, foreign direct investment, and money transfer. ODA policy has designated several purposes. Among them, political purposes have been considered to be the key factors in the regional distribution of foreign aid. If we agree the traditional approach that recognizes ODA as a 'political one', the practice of ODA can be a kind of state geopolitics. This study investigates the construction and characteristics of geopolitical discourses. More specifically, this study pays special attention to the 'practical geopolitics' that is crucial to the policy-making. By analyzing the minutes of the National Assembly Standing Committee, four geopolitical discourses were identified: 'practicing humanities as a developed country', 'providing a role model to developing countries', 'developing new foreign markets' and 'coping with global geopolitics'. These geopolitical discourses have been constructed through the process of justifying the ODA policy to the domestic and international audiences. Constructing discourses on ODA shows the representation of a dichotomous and typical image of developed/developing.

  • PDF

The Present state and tasks of Fishermen Credit Scoring Model (어업인 신용평가모형 개발현황 및 과제)

  • Hong, Jae-Bum;Kim, Jung-Uk
    • The Journal of Fisheries Business Administration
    • /
    • v.39 no.1
    • /
    • pp.43-61
    • /
    • 2008
  • Excessive public loan with low interest and other tax benefits have been provided for fishermen, but much of them turned out to be little performed. There were the moral hazards of Suhyup in the process of executing the public loans. As the government gave the reimbursement on the financial loss of Suhyup resulting from the public loans, Suhyup had no responsibility of the bad debt loss. Therefore, Suhyup gave little efforts to reduce the non-performing. The government perceived this problem and tried to reduce the under-performing loans. Thus, the government decided to take limited responsibilities. Suhyup made the progress to reduce the under-performing public loans. Suhyup dealt with these situation and made the credit evaluation model of the fisherman's public loan. This paper is for the credit evaluation model in the fisherman's public loan, which explains the model development methodology and the model characteristics in detail. This evaluation model is composed of two sub-component model. the one is the quantitative model and the other is the qualitative model. The quantitative sub-model is for the identification of fishermen financial status and is based on the financial transaction information. Its development methodology is the CSS modeling for the consumer market. The qualitative sub-model is for the evaluation the business prospect and is based on the business information such as fisherman's management skills, technology, equipment. Its development methodology is the AHP. It provides the detailed information in the model development methodology, which is the ideal example such as the public loan. In addition it gives the information to the interest parties such as policy makers, suhyup and fishermen.

  • PDF

Electrical Degradation Pattern Analysis according to XLPE Cable (XLPE 케이블의 전기적 열화 패턴 분석)

  • Min, Chi-Hyun;Gwak, Dong-Sun;Chun, Hyun-Kwon;Choi, Jin-Wook;Kim, Young-Suk;Kim, Sun-Gu;Kim, Sang-Hyun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.22 no.4
    • /
    • pp.114-120
    • /
    • 2008
  • XLPE cable is using insulator for Cross Linked Polyethylene(XLPE), because insulation Performance is superior and easy comparatively. Need systematization of accident transaction for electrical equipment accident, It is no disposal standard for defect of manufacture and second to accidents. in this paper deals with the change of XLPE cable insulation. To understand the electrical properties of XLPE insulation. Made of XLPE block sample, Penetration fracture Sample and flashover sample. Ogura needles having tip radius of $10[{\mu}m]$ were inserted into each sample. AC voltage of 1[kV/sec] increased at 60[Hz] were apple to breakdown sample and flashover sample. AC voltages of 12[kV], 17[kV] at 60[Hz] were a lied to XLPE block sample. The electrical properties of specimens were measured were measured from initiation of tree and breakdown to their characteristics were analyzed.

Performance Enhancement Architecture including Location Information Secrecy for HLR System (위치 정보의 보안성이 고려된 가입자 위치등록기 시스템의 새로운 구조)

  • 김자환
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.103-108
    • /
    • 2004
  • A Home Location Register(HLR) database system manages each subscriber's location information, which continuously changes in a cellular network. For this purpose, the HLR database system provides table management, index management, and backup management facilities. In this thesis, I propose using a two-level index method for the mobile directory number(MDN) as a suitable method and a chained bucket hashing method for the electronic serial number(ESN). Both the MDN and the ESN are used as keys in the HLR database system. I also propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. The insertion and deletion overhead of the chained bucket hashing method is less than that of the modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solvethe performance degradation problem caused by frequent registration-location operations. I also propose using additional attributes in the HLR database scheme for location information secrecy as a suitable security method.

  • PDF

Improvement of regulations to strengthen the safety and protect users of domestic Open Banking (국내 오픈뱅킹 안정성 강화 및 이용자 보호를 위한 규제 개선 방안)

  • Kwon, Nam Hoon;Kim, In Seok
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.37-52
    • /
    • 2020
  • The EU, the United Kingdom and South Korea are actively pursuing open banking to open financial information to fintech companies for financial structure reform and convenience of financial consumers. As open banking is gradually activated, the importance of stability and protecting users of open banking will increase. In particular, Korea has an electronic financial transaction law that has been in effect since 2007 to secure the stability and reliability of electronic financial transactions, but it is difficult to apply to participating organizations in open banking, so there is a risk of preventing security accidents and weakening user protection in open banking. Therefore, this paper examines the foreign legal system of open banking and analyzes the structure and characteristics of domestic open banking and suggests the ways to improve regulations necessary to strengthen open banking stability and user protection.