• 제목/요약/키워드: Used Transaction

검색결과 684건 처리시간 0.026초

무역계약에서 인지된 위험과 신뢰가 지속가능한 거래관계에 미치는 영향에 관한 연구 (The Influences of Perceived Risk and Trust on the Business Relationship in the Contract of International Transaction)

  • 김성국
    • 무역학회지
    • /
    • 제44권3호
    • /
    • pp.155-170
    • /
    • 2019
  • This study examines the model of perceived risk, trust, and continuous transaction intentions presented in a study of the buying behavior in International Transaction. Although most of the trade transactions have been studied as a legal supplement, trade transactions are also purchasing behavior aimed at maintaining continuous transaction intentions between the parties. The study results confirmed that perceived risk could be separated into risk neutrality, risk - taking and risk aversion, and perceived risk had an effect on trust. In addition, the trust affected by perceived risk in the trade transaction model has a statistically significant effect on continuous transaction intentions. The study results confirm that the theoretical background used in previous studies of purchase behavior models is also effective in trade transaction.

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권1호
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

The Effects of Authenticity Perception on Used Trading App Service Satisfaction

  • Sangyeon Song;Jeonghoon Lee
    • Journal of Information Technology Applications and Management
    • /
    • 제29권6호
    • /
    • pp.43-62
    • /
    • 2022
  • As the used trading market grows centered on online platforms, it is evolving from practical consumption to pursuing various forms of consumption value. Consumers purchase rare products, enjoy the transaction itself with consumers with the same preference, and investment or eco-friendly value consumption is also increasing. In this regard, the transaction of the second-hand transaction app service must have sincerity in order to respond to various consumption values. In addition, it is necessary to study what components the second-hand trading app service should aim for to secure authenticity and how the usefulness and ease of second-hand trading apps affect the relationship. The research used a questionnaire method to test hypotheses and surveyed 215 consumers in their 20s, 30s, and 40s who had purchased used clothing online within a year. Among them, 200 responses, excluding outliers, were statistically analyzed using SPSS 21.0 and AMOS 22.0 as confirmatory factor analysis and structural equation models. This study aims to determine the effect of the authenticity of the online used trading app service on the satisfaction of the used trading app service. To this end, based on the previous research results, the following research hypotheses were established and verified statistically. First, the authenticity of the online used trading app service will significantly impact the satisfaction of the used trading app service. Second, the usefulness of the used trading app service will have a moderating effect on the effect of the authenticity of the used trading app service on the satisfaction of the used trading app service. Third, the ease of the used trading app service will have a moderating effect on the authenticity of the used trading app service on the satisfaction of the used trading app service. As a result of the study, the authenticity of the used trading app service significantly affected the satisfaction of the used trading app service. Appeared to be The results of this study will help understand used transaction app services where consumption of used products occurs from the viewpoint of product circular use behavior and can be used as a strategic plan to promote the use of used transaction apps in the future.

주택매매 및 전세지수와 CD금리, 가산금리 간의 인과관계 분석 (An Analysis on the Casual Relationship among Housing Transaction Index, Jeonse Rental Index, CD Interest Rate and Spread)

  • 김은성;이상효;김재준
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2009년도 추계 학술논문 발표대회
    • /
    • pp.265-268
    • /
    • 2009
  • The purpose of this study is to analyze the casual relationship among Housing Transaction Index, Jeonse Rental Index and Interest Rate. To analyze the influence of interest rate in more detail, CD Interest rate and Spread are used as variables. Granger Casualty Test is used as a analysis tool, As a result, Spread is the cause variable of the Housing Transaction Index and the Housing Transaction Index is the cause variable of the CD Interest Rate. And also, CD Interest rate influences the Jeonse Rental Index and the Jeonse Rental Index has influence on the other variables.

  • PDF

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

전자 상거래에서 거래 인증 모델 연구 (A study of the transaction certification model in the e-commerce)

  • 이창열
    • 정보보호학회논문지
    • /
    • 제17권1호
    • /
    • pp.81-88
    • /
    • 2007
  • 온라인 거래에서, 투명성은 전자상거래에 대한 과세나 고객의 권리를 위한 주요 요소이다. 오프라인에서 거래에 대한 신뢰성은 금전등록기 개념을 사용해서 이루어지고 있는 것처럼, 우리는 거래의 투명성을 위한 온라인 개념의 거래 등록기 모델을 연구하였다. 비록 온라인 거래 등록기가 전자상거래법과 관련되어서 사용될 수 있지만, 여기서는 등록기의 메카니즘에 대한 연구만을 고려하였다. 거래 등록기는 디지털 영수증을 발행하며, 영수증은 본 논문에서 개발한 모델로 진위가 판별될 수 있다.

이동 데이터베이스 시스템을 위한 효율적인 이타적 잠금기법 (An Efficient Altruistic Looking Protocol for the Mobile Transaction Management System)

  • 권혁신;김세윤;김응모
    • Journal of Information Technology Applications and Management
    • /
    • 제11권1호
    • /
    • pp.53-67
    • /
    • 2004
  • We propose an advanced transaction scheduling protocol to improve the concurrency and to guarantee the mobility for the mobile database management systems. Mobility, portability, and wireless link In mobile computing environment can cause certain drawbacks, and thus it is more difficult to solve the concurrency control problems. However, a locking scheme should be used to guarantee the data consistency and to prevent the data conflicts. It is well known that data consistency is guaranteed by standard transaction scheduling schemes like two-phase locking (2PL). It has two of operation, lock and unlock. But 2PL does not give solution for mobile system. Altruistic Locking (AL) and classifying transactions, we adapt, can give solution for the previous problems. AL, as an advanced protocol, has attempted to reduce delay effects associated with lock release moment by the use of donation. In this paper, we extend those approaches and classify the transactions to reduce delay effects of short-lived transaction caused by long-lived transaction. In addition, we show efficient solution for the case of disconnection occurrence. Our protocol, namely, Mobile Altruistic Locking (MAL) is shown to be efficiently used in order to reduce delay effects and to guarantee database consistency in a state of the slippery connection in mobile database systems.

  • PDF

SOC Bus Transaction Verification Using AMBA Protocol Checker

  • Lee, Kab-Joo;Kim, Si-Hyun;Hwang, Hyo-Seon
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제2권2호
    • /
    • pp.132-140
    • /
    • 2002
  • This paper presents an ARM-based SOC bus transaction verification IP and the usage experiences in SOC designs. The verification IP is an AMBA AHB protocol checker, which captures legal AHB transactions in FSM-style signal sequence checking routines. This checker can be considered as a reusable verification IP since it does not change unless the bus protocol changes. Our AHB protocol checker is designed to be scalable to any number of AHB masters and reusable for various AMBA-based SOC designs. The keys to the scalability and the reusability are Object-Oriented Programming (OOP), virtual port, and bind operation. This paper describes how OOP, virtual port, and bind features are used to implement AHB protocol checker. Using the AHB protocol checker, an AHB simulation monitor is constructed. The monitor checks the legal bus arbitration and detects the first cycle of an AHB transaction. Then it calls AHB protocol checker to check the expected AHB signal sequences. We integrate the AHB bus monitor into Verilog simulation environment to replace time-consuming visual waveform inspection, and it allows us to find design bugs quickly. This paper also discusses AMBA AHB bus transaction coverage metrics and AHB transaction coverage analysis. Test programs for five AHB masters of an SOC, four channel DMAs and a host interface unit are executed and transaction coverage for DMA verification is collected during simulation. These coverage results can be used to determine the weak point of test programs in terms of the number of bus transactions occurred and guide to improve the quality of the test programs. Also, the coverage results can be used to obtain bus utilization statistics since the bus cycles occupied by each AHB master can be obtained.

가상 트랜잭션을 이용한 시계열 데이터의 데이터 마이닝 (Data Mining Time Series Data With Virtual Transaction)

  • 김민수;김철환;김응모
    • 정보처리학회논문지D
    • /
    • 제9D권2호
    • /
    • pp.251-258
    • /
    • 2002
  • 대용량의 데이터들로부터 사용자가 인하는 데이터를 찾기 위하여 많은 데이터 마이닝 기술들이 연구되어 실제 응용프로그램에서 많이 적용되고 있다. 이러한 데이터 마이닝 기술들은 시계열 데이터를 이용하는 경우보다 트랜잭션 데이터를 이용하여 유용한 정보를 찾는 경우에 초점이 맞춰져 있다. 본 논문에서는 시계열 데이터를 트랜잭션 데이터로 변환하는 접근방법을 소개한다. 가상 트랜잭션은 서로 상대적으로 근접한 시간에 발생하는 이벤트의 집합이라고 정의하며, 가상 트랜잭션 생성기는 가상 트랜잭션을 생성시 시간윈도우와 이벤트 윈도우 방법을 사용한다. 본 논문의 접근 방법을 사용하여 기존의 트랜잭션 데이터를 이용하는 많은 데이터 마이닝 알고리즘들을 수정 없이 시계열 데이터에 적용하여 유용한 정보를 찾을 수 있다.

A Solution towards Eliminating Transaction Malleability in Bitcoin

  • Rajput, Ubaidullah;Abbas, Fizza;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • 제14권4호
    • /
    • pp.837-850
    • /
    • 2018
  • Bitcoin is a decentralized crypto-currency, which is based on the peer-to-peer network, and was introduced by Satoshi Nakamoto in 2008. Bitcoin transactions are written by using a scripting language. The hash value of a transaction's script is used to identify the transaction over the network. In February 2014, a Bitcoin exchange company, Mt. Gox, claimed that they had lost hundreds of millions US dollars worth of Bitcoins in an attack known as transaction malleability. Although known about since 2011, this was the first known attack that resulted in a company loosing multi-millions of US dollars in Bitcoins. Our reason for writing this paper is to understand Bitcoin transaction malleability and to propose an efficient solution. Our solution is a softfork (i.e., it can be gradually implemented). Towards the end of the paper we present a detailed analysis of our scheme with respect to various transaction malleability-based attack scenarios to show that our simple solution can prevent future incidents involving transaction malleability from occurring. We compare our scheme with existing approaches and present an analysis regarding the computational cost and storage requirements of our proposed solution, which shows the feasibility of our proposed scheme.