• Title/Summary/Keyword: electronic financial services

Search Result 89, Processing Time 0.023 seconds

Building Customer Loyalty In Digital Transaction Using QR Code: Quick Response Code Indonesian Standard (QRIS)

  • CHOHAN, Fulshah;ARAS, Muhamad;INDRA, Ricardo;WICAKSONO, Andhika;WINARDI, Freddy
    • Journal of Distribution Science
    • /
    • v.20 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Purpose: Increasing advancements in the technology industry are forcing people to become more accustomed to digital financial transaction activities. The need for fast and secure payment mechanisms has birthing new idea to digital financial transaction services. Along with increasing access to technology in digital payments, new service is developed in the form of digital wallets as the successor for electronic money. Research design, data and methodology: This research aims to find out whether using QR code as digital payment tool can build customer loyalty in consumers, especially to measure the factors of satisfaction, trust and commitment of customers to do payments with QR Codes. The QR code in this study is refer to the Quick Response Code Indonesian Standard (QRIS) which was officially implemented by Bank Indonesia starting on January 1, 2020 as a means of payment for digital transactions nationally. The research method uses a quantitative approach by way of surveying questionnaires using Likert scale of 100 samples. Results: The hypothesis analysis proved that the variables of satisfaction, trust and commitment together have positive and significant influences on customer loyalty. Conclusion: This research found that there are high interest in Millennials to do transaction using QRIS because it is deemed to be more easy, quick and safe. If a customer achieves a level of loyalty in the usage of digital transaction using QRIS then cashless society lifestyle can be considered successful and can be used in the future.

A Study focused on how Korean IT Service Firms were financially impacted since the restrictions on participation of large firms

  • Choi, Hyun-Taek;Ryu, Gab-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.4
    • /
    • pp.395-405
    • /
    • 2019
  • The government has strengthened the system of restricting participation of large corporations to limit participation in national information system construction projects and to increase participation of SME software companies. This study analyzes the financial performances of small and medium sized IT firms in Korea three years prior and 3 years after the restrictions on participation of large firm. A sample of 121 small and medium-sized IT services firms were classified into 3 groups and statistical techniques (T-test and one-way ANOVA) were used for the purpose of the analysis. In the three years after the restriction of participation of large corporations, the total assets and sales of the medium and small IT service firms were positive, but the operating profit and net profit were negative. There were many worries about the introduction of the restriction on the participation of large corporations, but many were stabilized. However, the negative impact was more pronounced for SMEs. Therefore, the reduction effect of SME IT service companies is different from the first legislative purpose of enforcing the restriction system of large enterprises, so we propose to revise the policy.

E-commerce adoption within SME's in Ghana, a Tool for Growth?

  • Agyapong, Christian Sarfo
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2018.11a
    • /
    • pp.269-275
    • /
    • 2018
  • Electronic commerce, the act of trading online, with its myriad of potential has been seldom looked at within the context of developing countries. E-commerce presents SMEs in developing economies the opportunity to adequately compete on a global stage. The exponential growth of e-commerce in developed economies further widens the financial gap between developed and developing economies. This study looks at a practical e-commerce adoption framework for Ghanaian SMEs and by extension, developing economies and looks at the net benefits that are available to current adopters. The study uses structural equation modeling, using Partial least squares (PLS) regression to analyze the data in the research. Using PLS algorithms as well as bootstrapping calculations. It combines the use of surveys (154) and interviews (38) as means of data collection. The findings of the research indicate that there is a need for legislation on e-commerce trading to regulate the trade in Ghana, with policies such as e-contracting and e-signature laws among others. Also, a current call for an expansion of the mobile payment methods within the country. For the private investor, a ripe market for logistics services. The study also proposes a simple guideline for SMEs looking to adopt or expand their e-commerce usage, that considers technological, organizational and environmental factors that come to play within e-commerce adoption.

  • PDF

The Development Scheme of Domestic Third Party Logistics for Revitalization of Electronic Trade (전자무역의 활성화를 위한 국내 제3자물류 발전방안)

  • Cha, Soon-Kwean;Jang, Heung-Hoon
    • Journal of Korea Port Economic Association
    • /
    • v.24 no.2
    • /
    • pp.155-174
    • /
    • 2008
  • This paper proposed several activation strategies at both the government and company parts for the development of domestic third party logistics(TPL) to pull electronic trade era much earlier. In the government side, it must need to arrange and integrate complex regulation rules on the Logistics for more smooth access and use the TPL market. Also, it has to provide multiple support policies such as tax reduction, technical and financial service providing, and logistics information system to TPL. Finally, it should construct the government levels education system to train and forster a competent man who is well qualified as a electronic and logiscic expert. The TPL company must build up a total logistics information system concerned with an innovative operation system such as SCM, JIT etc. which can provide logistic services on demand to the electronic trade customers to maximize consumer satisfaction. In the shipper company level, it try to join a long-term strategic alliance with TPL to reduce logistic cost and increase logistic service to its electronic trade consumers.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A Study on Corporate Blockchain Business Conditions and Financial Platform Promotion Plans (블록체인 기업실태 및 금융플랫폼 촉진 방안 연구)

  • Sangho Lee;Kwangmoon Cho
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.3
    • /
    • pp.99-111
    • /
    • 2023
  • The purpose of this study is to identify the difficulties in business implementation that blockchain suppliers are experiencing, and to suggest ways to promote blockchain technology by solving them. First, industrial surveys of blockchain supply companies were collected. Next, a survey was conducted to confirm whether financial service users intend to use blockchain technology. The research results are as follows. First, in user characteristics, usefulness and innovation were found to have an effect on intention to use. In the technical characteristics, suitability and reliability were found to affect the intention to use. Second, in user characteristics, usefulness and innovativeness were found to affect the intention to use by mediating promotion conditions. In the technical characteristics, suitability and reliability were found to affect the intention to use by mediating the promotion conditions. Third, it was found that the new technology environment modulates the effect of ubiquity and innovativeness on the intention to use. The new technology environment was found to moderate the impact of security on intention to use. Fourth, it was found that the organizational environment moderates the effect of security and suitability on the intention to use. A plan to solve the difficulties of these blockchain suppliers and a plan to promote blockchain-based financial services are presented.

A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad (스마트 보안패드를 이용한 안전한 인터넷 서비스 제공 모델에 관한 연구)

  • Lee, Jae-Sik;Kim, Hyung-Joo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1428-1438
    • /
    • 2013
  • Services take place in Internet environment, a formation of the trust relationship between user and service provider for services. Different authentication schemes such as using Certificate of Public Key Infrastructure authentication and using ID/PW for a simple user authentication have been proposed for trust relationship. In addition, in the case of electronic financial transactions, transaction integrity and non-repudiation features are provided. These services are provided in Internet environment, use various measures to ensure service safety. However, it was difficult to prevent attacks using existing security technology because of emergence of MITB attack that manipulate the memory area of the Web browser and social engineering attacks such as phishing/pharming, requires application of new security technologies became. In this paper, we propose a concept of smart secure-pad, and utilize it safely formed a trust relationship between user and service provider, a model has been proposed to ensure safety of data transmission. Proposed model's security evaluation results show security against to MITB attack and phishing/pharming that can't be prevent attack using existing security technology. In addition, service provider can easily apply the model in safe environment can provide Internet service using provided representative services applying the proposed model.

Factors that Affect the Intention of Password Security Behavior (패스워드 보안행위의도에 영향을 미치는 요인)

  • Lee, Dong-Hee;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.187-198
    • /
    • 2018
  • Recently, financial transactions and electronic commerce in cyberspace are being performed more quickly and conveniently, with the development in diverse types of fintech and biometric authentication. But user authentication using passwords still occupies a big proportion even in these new services. therefore, safe creation and management of passwords is fundamental and indispensable to protect personal information and asset. This study examined the patterns of password usage by conducting a survey and analyzed factors influencing password security behavior intentions using the heath belief model. As a result, perceived susceptibility, perceived severity, perceived benefits, and perceived barriers significantly affected security behavior intentions, and especially, perceived severity had a moderating effect in other factors.

Design and Implementation of Facial Biometric Data based User Authentication System using One-Time Password Generation Mechanism (얼굴 정보 기반 일회용 패스워드 생성 메커니즘을 이용한 사용자 인증 시스템 설계 및 구현)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1911-1918
    • /
    • 2011
  • Internet banking, electronic financial services and internet telephony service can be available on smart phone recently. In this case, more robust authentication mechanisms should be provided for enhancing security on it. In this study, a facial biometric ID based one-time password generation mechanism is designed and implemented for enhancing user authentication on smart phone. After capturing a facial biometric data using camera module on smart phone, it is sent to server to generate one-time biometric ID. Finally one-time password will be generated by client module after receiving the one time biometric ID based challenge token from the server. Using proposed biometric ID based one-time password mechanism, it is possible for us to provide more secure user authentication service on smart phone for SIP protocol.

The Efficiency Analysis of Firms Having Established a Business Intelligence System Using DEA/Time-Window Analysis (DEA를 이용한 기업의 Business Intelligence 시스템 도입 효율성에 대한 비교 평가 연구)

  • Baek, Seong-Hyun;Park, Kwang-Ho;Kim, Tai-Young
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.113-133
    • /
    • 2015
  • In this paper, DEA analysis is employed to compare and evaluate the relative efficiency of a business intelligence (BI) system among five industrial groups such as IT and financial services, electricity and electronics, energy and chemistry, automotive and heavy machinery, and food and apparel. Especially, this study has analyzed the improving tendency of relative efficiency of the industrial groups since they adopted the BI System using Time-Window Analysis. The research findings show that the energy and chemical industry group tends to be remarkably more efficient than the other groups and the electrical and electronic industry turns out to gradually improve their efficiency since the adoption of the BI system.