• Title/Summary/Keyword: electronic financial services

Search Result 89, Processing Time 0.033 seconds

The Effects of Characteristics of User and System on the Perceived Cognition and the Continuous Use Intention of Fintech (핀테크(fintech) 사용자와 시스템 특성이 지각된 인식과 지속사용의도에 미치는 영향)

  • Lee, Jun-Sang;Park, Jun-Hong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.291-301
    • /
    • 2018
  • The purpose of this study is to investigate the factors that affect the perceived awareness and the intention of continuous use by FinTech users and system characteristics. Data collection was carried out by targeting and surveying 600 people living in Gwangju, and office workers using smartphones. As a result, first, self-efficacy, innovation, and fitness for Fin-Tech services were found to influence the degree of perceptual awareness and intent to use of Fin-tech service users. Second, the system characteristics have a positive effect on perceived awareness and intention of using FinTech service. Third, the hypothesis about the dangers in the user attributes and system properties were dismissed. It seems that the priority concern was regarding the leakage of personal information and security as privacy and the increasing damage cases of financial fraud by electronic financial transactions spill. Therefore, in order to spread FinTech services, it would be effective if a Fin-Tech service strategy could eliminate inconveniences such as the risk of hindering convenience and intention to use by the marketing strategy established by the company.

A Study on User Authentication Model Using Device Fingerprint Based on Web Standard (표준 웹 환경 디바이스 핑거프린트를 활용한 이용자 인증모델 연구)

  • Park, Sohee;Jang, Jinhyeok;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.631-646
    • /
    • 2020
  • The government is pursuing a policy to remove plug-ins for public and private websites to create a convenient Internet environment for users. In general, financial institution websites that provide financial services, such as banks and credit card companies, operate fraud detection system(FDS) to enhance the stability of electronic financial transactions. At this time, the installation software is used to collect and analyze the user's information. Therefore, there is a need for an alternative technology and policy that can collect user's information without installing software according to the no-plug-in policy. This paper introduces the device fingerprinting that can be used in the standard web environment and suggests a guideline to select from various techniques. We also propose a user authentication model using device fingerprints based on machine learning. In addition, we actually collected device fingerprints from Chrome and Explorer users to create a machine learning algorithm based Multi-class authentication model. As a result, the Chrome-based Authentication model showed about 85%~89% perfotmance, the Explorer-based Authentication model showed about 93%~97% performance.

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung;Kim, Hyoungshick;Gkelias, Athanasios
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.865-875
    • /
    • 2014
  • Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.

대학도서관 문헌제공봉사의 현황분석과 강화방안

  • 윤희윤
    • Journal of Korean Library and Information Science Society
    • /
    • v.29
    • /
    • pp.27-63
    • /
    • 1998
  • The purpose of this study is to analyze the document delivery service(DDS) of the academic libraries and suggest its improvement model in Korea. DDS means providing copies of information requests in any format and from any source. And DDS is gaining in importance as libraries turn to 'just-in-time' access rather than 'just-in-case' collection to meet user information needs. By good fortune, rising journal subscription prices, declining financial resources, canceling some of journal subscriptions, electronic transmission technologies, and the rise of commercial document delivery services have allowed libraries to begin to deliver articles to users in a much more rapid and acceptable time frame. Therefore, the library paradigm for the 2000s must be the creation of new document delivery structures which capitalize on the access tolls and structures created by librarians during the past generations. First of all, library-based document service requires a close review of existing library-to-library delivery mechanisms, application of technology to transfer of facsimiles of materials and facilitated use of existing fee-based document sources. The ideal document delivery system would feature a transparent, seamless electronic service incorporating searching and browsing identification and marking of desired items, and transmission and fulfillment of requests. And requested items would be supplied from library collection, commercial suppliers, or other sources. But the future of DDS will succeed when physical resources, policies, personnel, and practices are organized to provide timely information delivery to users.

  • PDF

SWOT Analysis and Expert Assessment of the Effectiveness of the Introduction of Healthcare Information Systems in Polyclinics in Aktobe, Kazakhstan

  • Lyudmila, Yermukhanova;Zhanar, Buribayeva;Indira, Abdikadirova;Anar, Tursynbekova;Meruyert, Kurganbekova
    • Journal of Preventive Medicine and Public Health
    • /
    • v.55 no.6
    • /
    • pp.539-548
    • /
    • 2022
  • Objectives: The purpose of this study was to assess the organizational effectiveness of the introduction of a healthcare information system (electronic medical records and databases) in healthcare in Kazakhstan. Methods: The authors used a combination of 2 methods: expert assessment and strengths, weaknesses, opportunities, and threats (SWOT) analysis. SWOT analysis is a necessary element of research, constituting a mandatory preliminary stage both when drawing up strategic plans and for taking corrective measures in the future. The expert survey was conducted using 2 questionnaires. Results: The study involved 40 experts drawn from specialists in primary healthcare in Aktobe: 15 representatives of administrative and managerial personnel (chief doctors and their deputies, heads of medical statistics offices, organizational and methodological offices, and internal audit services) and 25 general practitioners. Conclusions: The following functional indicators of the medical and organizational effectiveness of the introduction of information systems in polyclinics were highlighted: first, improvement of administrative control, followed in descending order by registration and movement of medical documentation, statistical reporting and process results, and the cost of employees' working time. There has been no reduction in financial costs, namely in terms of the costs of copying, delivery of information in paper form, technical equipment, and paper.

A History Check System of Public Electronic Certificate using OCSP Service (OCSP 서비스를 이용한 공인인증서 사용이력 확인 시스템)

  • Kim, Nam-Gon;Cho, Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.543-548
    • /
    • 2016
  • Public electronic certificates, as an important means for identification, have been used as the main economic transactions, including banking, e-government, e-commerce. identification. However, damage cases of certificates have been increased by Illegally issued and by hacking practices. Also the users have a difficult in ensuring that their certificates when and where to use. Therefore, the proposed system gives the organization code for the Institutions using OCSP services in advance, the organization code embedded in extensions of OCSP request message structure when institutions ask the validation of certificate to CA(Certificate Authority). Also, OCSP server can extract the organization code from OCSP request message, confirm the institution, and record it in certificate history management table of DB. In this paper, we presented a system that could determine the certificate history check using OCSP service, public electronic certificate validation service, and implemented to prevent and cope immediately with financial incidents.

The Adoption of New Service-Deliverly Channel under the Multi-channel Usage (다채널 이용 상황에서 신규 서비스채널의 수용에 관한 연구)

  • Kim, Hyun-Cheol;Han, Jang-Hui;Choi, Ji-Ho
    • Journal of Distribution Research
    • /
    • v.12 no.2
    • /
    • pp.23-49
    • /
    • 2007
  • Recently, mobile marketing is becoming one of the major topics of interest to the marketing discipline. Emerging from rapid developments in mobile technology, it has created opportunities for new and innovative mobile services. Also, it is enabling to conduct always-on connections that consumers can interact anytime and anywhere. Especially, mobile devices place themselves to the core means of mobile-commerce which to execute a function as a distribution channel in mobile environments. Although the adoption researches about innovative services or technologies had executed in marketing areas over the past decades, most researches just expanded or modified existing theories and explanation models. There has been little study on the comprehensive and systematic review of adoption process. Therefore, it deserves to be considered prior usage experiences of the existing channels(CL) and attractiveness of the new channel(CLalt) based on social exchange theory. In order to address this void, this study unifies components of perceived attributes in the each dimensions (ie. benefit, cost, and risk dimensions) and explores prior usage experiences of the existing channels on adoption intention in electronic financial service channels through developing comprehensive model and employing empirical test for the hierarchy of effects model. Based on these empirical results, this study suggests managerial implications for new channel management in electronic financial service areas by focusing on the prior usage experiences of the existing objects on adoption intention and perceived attributes of ubiquitous-based mobile service channel.

  • PDF

The Impact of Block Chain Characteristics on the Intention to Use Hotel Reservation System in China (중국에서의 호텔예약 시스템의 블록체인 특성이 사용의도에 미치는 영향)

  • JIN, Peng-Ru;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.8
    • /
    • pp.33-44
    • /
    • 2019
  • Purpose - As the scope of existing digital transformation expanded to various degrees, the Fourth Industrial Revolution came into being. In 2016, Klaus Schwab, Chairman of the World Economic Forum (WEF), said that the new technologies that lead the fourth industrial revolution are AI, Block chain, IoT, Big Data, Augmented Reality, and Virtual Reality. This technology is expected to be a full-fledged fusion of digital, biological and physical boundaries. Everything in the world is connected to the online network, and the trend of 'block chain' technology is getting attention because it is a core technology for realizing a super connective society. If the block chain is commercialized at the World Knowledge Forum (WKF), it will be a platform that can be applied to the entire industry. The block chain is rapidly evolving around the financial sector, and the impact of block chains on logistics, medical services, and public services has increased beyond the financial sector. Research design, data, and methodology - Figure analysis of data and social science analytical software of IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used for all the data researched. Data were collected from hotel employees in China from 25th March to 10th May. Results - The purpose of this study is to investigate the effect of the block chain characteristics of the existing hotel reservation system on the intention to use and to examine the influence of the block chain characteristics of the hotel reservation system on the intention to use, We rearranged the variables having the same or similar meaning and analyzed the effect of these factors on the intention to use the block chain characteristic of the hotel reservation system. 339 questionnaires were used for analysis. Conclusions - There are only sample hotel workers in this study, and their ages are in their 20s and 30s. In future studies, samples should be constructed in various layers and studied. In this study, the block chain characteristics are set as five variables as security, reliability, economical efficiency, availability, and diversity. Among them, Security and reliability made positive effects on the perceived usefulness. Also, security and economics did on the perceived ease. Availability and diversity did on both perceived usefulness and perceived ease. Perceived ease did on perceived usefulness. And perceived ease and perceived usefulness did on user intent. But security and economics did not on the perceived usefulness

A Study of an effective centralization of medical supply system. In Y University Medical Center (Y의료원의 물류 공급체계 중앙화 관리에 대한 연구)

  • Kwon, Soon-Chang;Kim, Young-Soo
    • Korea Journal of Hospital Management
    • /
    • v.4 no.1
    • /
    • pp.1-20
    • /
    • 1999
  • Since the late 1980s, there have been radical changes in the managerial environment of Y University Medical Center(YUMC). Externally, the competition among hospitals has intensified due to the establishment of universal health insurance in 1939 and the entrance of large enterprises into the health care industry in the early 1990s. In addition, government regulation of medical institution is becoming stricter. Also, consumer groups have continued to demand the respect for patient rights and improvement of the quality of medical services. Internally, the financial condition of YUMC has worsened, not only because weak control and poor mediation in its large-scale structure have made its operation inefficient, but also because the rates of increase in the prices of goods and labor have grown faster than any increases in revenues. This study on materials management at YUMC presents a way for YUMC to reduce costs and increase its productivity, thereby overcoming its financial difficulties and dealing with external pressures. This study utilized the case studies of the materials purchasing and medical supply management in the United States and the comparative analysis of management to suggest short-term and long-term alternatives for innovation in YUMC. The goals of the short-term alternatives for innovation are to centralize the purchasing and supply departments and to simplify the decision-making processes. Through these attempts, it is estimated that YUMC's costs could be reduced by $600,000 per year. In the long-term, it is necessary to consider introducing a Supply Processing Distribution(SPD) system and setting up a centralized electronic system for supply and inventory management, although it is difficult to estimate the effect of cost-cutting because of the lack of analysis data. Thus, YUMC should thoroughly analyze initial investment costs and economical efficiency generated from long-term alternatives.

  • PDF

A Study on the Two-channel Authentication Method which Provides Two-way Authentication using Mobile Certificate in the Internet Banking Environment (인터넷 뱅킹 환경에서 사용자 인증 보안을 위한 Two-Channel 인증 방식)

  • You, Han-Na;Lee, Jae-Sik;Kim, Jung-Jae;Park, Jae-Pio;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.939-946
    • /
    • 2011
  • The Internet banking service provides convenience than the traditional offline services. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking have continuously occurred. Especially, various weak points have been suggested for the authentication methods in regard to such types of hacking as the memory hacking or the MITM attack. So I needed was a new authentication method. In this study, the two-channel authentication method which provide two-way authentication on the user's PC and mobile device when executing the electronic financial transactions in the Internet banking environment is suggested. Also, by analyzing it in comparison with other existing methods, it is possible to check that the prospects of safety and credibility are strengthened.