• Title/Summary/Keyword: Transaction structure

Search Result 244, Processing Time 0.027 seconds

A Business Ecosystem Approach for E-commerce Service Innovation (온라인 커머스 서비스 혁신을 위한 비즈니스 생태계적 접근)

  • Kwon, Hyeog In;Park, Ju Yeon;Kim, Ju Ho
    • Journal of Information Technology Services
    • /
    • v.20 no.4
    • /
    • pp.1-21
    • /
    • 2021
  • At a time when the e-commerce market is experiencing accelerated growth, with advancements in information and communications technology (ICT), the problems of distribution of counterfeit products and consumer confusion caused by non-face-to-face purchases have increased. Hence, amid intensifying competition, it has become important for e-commerce companies deliver product information more efficiently, provide differentiated services, and secure credibility for consumers by reducing consumer damage from buying counterfeit products. However, even though consumer confusion and the inadvertent purchase of counterfeit products are intensifying in such a market scenario, there are no services that aim to solve such problems. This study examines the conventional e-commerce industry in South Korea through a political, economic, social, and technological (PEST) analysis, based on in-depth interviews with consumers, to derive the pain and gain points of the industry. As a result, the inherent problems of the e-commerce industry were revealed. Through a service value network perspective, services aimed at resolving such issues were derived, and the e-commerce business ecosystem needed to solve this problem was deduced. The findings revealed that the artificial intelligence-based service support platform has become a major driving force within the e-commerce innovation ecosystem by enabling a new way to create and secure value using ICT. This entails a new exchange mechanism and transaction architecture and a new organizational structure that breaks the barriers between industries.

Privacy Information Protection Applying Digital Holography to Blockchain

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.6 no.5
    • /
    • pp.453-462
    • /
    • 2022
  • Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true authentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker's tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal application is a secure anonymity system guaranteeing privacy information protection for handling of large information.

An Empirical Study on Manufacturing Process Mining of Smart Factory (스마트 팩토리의 제조 프로세스 마이닝에 관한 실증 연구)

  • Taesung, Kim
    • Journal of the Korea Safety Management & Science
    • /
    • v.24 no.4
    • /
    • pp.149-156
    • /
    • 2022
  • Manufacturing process mining performs various data analyzes of performance on event logs that record production. That is, it analyzes the event log data accumulated in the information system and extracts useful information necessary for business execution. Process data analysis by process mining analyzes actual data extracted from manufacturing execution systems (MES) to enable accurate manufacturing process analysis. In order to continuously manage and improve manufacturing and manufacturing processes, there is a need to structure, monitor and analyze the processes, but there is a lack of suitable technology to use. The purpose of this research is to propose a manufacturing process analysis method using process mining and to establish a manufacturing process mining system by analyzing empirical data. In this research, the manufacturing process was analyzed by process mining technology using transaction data extracted from MES. A relationship model of the manufacturing process and equipment was derived, and various performance analyzes were performed on the derived process model from the viewpoint of work, equipment, and time. The results of this analysis are highly effective in shortening process lead times (bottleneck analysis, time analysis), improving productivity (throughput analysis), and reducing costs (equipment analysis).

Study of Application of Block Chain for Vehicle-To-Grid System (Vehicle-To-Grid 시스템에서 블록체인 활용에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.759-764
    • /
    • 2021
  • Because sensitive and private information should be exchanged between electric vehicles and a V2G service provider, reliable communication channel is essential to operate Vehicle-to-Grid (V2G) system which considers battery of electric vehicles as a factor of smart grid. The block chain is a platform for cryptocurrency transaction and fully distributed database system running by only equivalent node in the network without help of any central management or 3rd party. In this paper, the structure and operation method of the blockchain are investigated, and the application of the blockchain for the V2G system was also explained and analyzed.

Analysis of Graph Mining based on Free-Tree (자유트리 기반의 그래프마이닝 기법 분석)

  • YoungSang No;Unil Yun;Keun Ho Ryu;Myung Jun Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.275-278
    • /
    • 2008
  • Recently, there are many research of datamining. On the transaction dataset, association rules is made by finding of interesting patterns. A part of mining, sub-structure mining is increased in interest of and applied to many high technology. But graph mining has more computing time then itemset mining. Therefore, that need efficient way for avoid duplication. GASTON is best algorithm of duplication free. This paper analyze GASTON and expect the future work.

The study on fairness issues in mobile telecommunication service charges (이동통신서비스요금의 적정성에 관한 연구)

  • Shin, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.1975-1985
    • /
    • 2013
  • Telecommunication costs have been increasing successively in Korean households. Even though there are a lot of issues related to the high charges of mobile telecommunication services, plausible solutions have not been provided yet. 99% of Koreans use mobile phones and it is the highest in the world, but charges are relatively high. This situation may be brought by the government policy that supports 'three companies system.' Even the least efficient company might sustain by a tacit bottom price policy and the government did not introduce MVNO into the market. The government can make mobile phone charge system consider cost only in a proper manner and constrain marketing costs to the rational level. And it can reduce mobile charges and rights of consumers must be respected by restraining too much complicated rates system. Fairness of mobile phone charges could be achieved by mobile phone market structure improvement through active introduction of MVNOs and reduction of excessive marketing costs. If proper market structure and policy management are secured, 30% cut of charges could be achieved. And mobile service bills may be made more acceptable if charge is based on a measured rate system according to the amount of data usage.

The Impact of User Interface Types Characteristics on the Information Media Usage Behavior (사용자 인터페이스 유형별 특성이 정보매체 이용의도에 미치는 영향에 관한 연구)

  • Yoon, Jung-Hyeon
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.3
    • /
    • pp.53-66
    • /
    • 2010
  • Whereas traditional user interface are well accepted modes of information exchange, the new digital conversion type's of information media is relatively complex and provides new means of transaction with user interface. User interface can be decomposed into two component: the physical structure through which information media is controlled, and the presentation of the content. This research explores the two user interface element have different effect on the adoption of information media and, as such, can influence perceived usefulness, perceived easy of use, and intention of use. The hypotheses have been tested with the survey of 148 end-users examines two interface characteristics factors such as efficiency, error, design, entertainment, accuracy, and vividness, and so on. The research summarized in this paper decomposes the influence of interface elements of physical structure interface and content presentation interface to gain a better understanding of how interface stimulates user's perceived usefulness to adopt the information media.

Improvement of regulations to strengthen the safety and protect users of domestic Open Banking (국내 오픈뱅킹 안정성 강화 및 이용자 보호를 위한 규제 개선 방안)

  • Kwon, Nam Hoon;Kim, In Seok
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.37-52
    • /
    • 2020
  • The EU, the United Kingdom and South Korea are actively pursuing open banking to open financial information to fintech companies for financial structure reform and convenience of financial consumers. As open banking is gradually activated, the importance of stability and protecting users of open banking will increase. In particular, Korea has an electronic financial transaction law that has been in effect since 2007 to secure the stability and reliability of electronic financial transactions, but it is difficult to apply to participating organizations in open banking, so there is a risk of preventing security accidents and weakening user protection in open banking. Therefore, this paper examines the foreign legal system of open banking and analyzes the structure and characteristics of domestic open banking and suggests the ways to improve regulations necessary to strengthen open banking stability and user protection.

Design of Automatic Database Schema Generator Based on XML Schema (XML 스키마 기반의 데이터베이스 스키마 생성기 설계)

  • Lim, Jong-Seon;Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.79-86
    • /
    • 2007
  • B2B e-business is an economic transaction formed between companies through various networks including internet. At present, e-business between companies partly applies information distribution between companies, but many enterprises expect that a corporate basic system will be gradually changed into XML basis if web service is earnestly materialized, so they are competing with each other in developing XML DBMS. Existing XML DBMS studies used XML DTD in order to represent the structure of XML document. Such XML DTD defines the expression of a simple type, so there are many difficulties in defining the structure of XML document. To cope with this, in this paper, the author will develop database schema generator utilizing relational database generally used in storing contents of data, on the basis of XML schema selected as a standard of W3C. Also, to store XML data, the author proposed the automatic conversion method of relational database schema that used XML schema.

  • PDF

Design and Implementation of 10 Giga VPN Acceleration Board (10 Giga급 VPN 가속보드 설계 및 구현)

  • 김기현;한종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.661-664
    • /
    • 2003
  • Trade-off of sorority and speed always exists in the latest network environment. Recently, developed security processors is improved very performance, and sorority connection algorithms of a lot of part were embodied by hardware. This high speed security processor is essential ingredient in string network security solution equipment development that require very big band width. In this paper, we wish to describe about design and implementation of 10 Giga VPN equipments. In this system, embodied 10 Giga to use Cavium company's Nitrox-II processor, and supports two SP14-2 interface and PCI interface. All of the password algorithm that password algorithm that support is used in common use VPN equipment for compatibility with common use VPN equipment are supported and support SEED algorithm developed in domestic. Designed to support IPsec and SSL protocol, and supports all of In-Line structure that is profitable in high speed transaction and the Look-Aside structure that is profitable in practical use degree of NPU(Network Processor Unit).

  • PDF