• Title/Summary/Keyword: mobile commerce

Search Result 504, Processing Time 0.029 seconds

A Survey of Fraud Detection Research based on Transaction Analysis and Data Mining Technique (결제로그 분석 및 데이터 마이닝을 이용한 이상거래 탐지 연구 조사)

  • Jeong, Seong Hoon;Kim, Hana;Shin, Youngsang;Lee, Taejin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1525-1540
    • /
    • 2015
  • Due to a rapid advancement in the electronic commerce technology, the payment method varies from cash to electronic settlement such as credit card, mobile payment and mobile application card. Therefore, financial fraud is increasing notably for a purpose of personal gain. In response, financial companies are building the FDS (Fraud Detection System) to protect consumers from fraudulent transactions. The one of the goals of FDS is identifying the fraudulent transaction with high accuracy by analyzing transaction data and personal information in real-time. Data mining techniques are providing great aid in financial accounting fraud detection, so it have been applied most extensively to provide primary solutions to the problems. In this paper, we try to provide an overview of the research on data mining based fraud detection. Also, we classify researches under few criteria such as data set, data mining algorithm and viewpoint of research.

An Area-Efficient Design of Merged TEA Block Cipher for Mobile Security (모바일 보안용 병합 TEA 블록 암호의 면적 효율적인 설계)

  • Sonh, Seungil;Kang, Min-Goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.11-19
    • /
    • 2020
  • In this paper, a merged TEA block cipher processor which unifies Tiny Encryption Algorithm(TEA), extended Tiny Encryption Algorithm(XTEA) and corrected block TEA(XXTEA) is designed. After TEA cipher algorithm was first designed, XTEA and XXTEA cipher algorithms were designed to correct security weakness. Three types of cipher algorithm uses a 128-bit master key. The designed cipher processor can encrypt or decrypt 64-bit message block for TEA/XTEA and variable-length message blocks up to 256-bit for XXTEA. The maximum throughput for 64-bit message blocks is 137Mbps and that of 256-bit message blocks is 369Mbps. The merged TEA block cipher designed in this paper has a 16% gain on the area side compared to a lightweight LEA cipher. The cryptographic IP of this paper is applicable in security module of the mobile areas such as smart card, internet banking, and e-commerce.

On Indexing Method for Current Positions of Moving Objects (이동 객체의 현재 위치 색인 기법)

  • Park, Hyun-Kyoo;Kang, Sung-Tak;Kim, Myoung-Ho;Min, Kyoung-Wook
    • Journal of Korea Spatial Information System Society
    • /
    • v.5 no.1 s.9
    • /
    • pp.65-74
    • /
    • 2003
  • Location-based service is an important spatiotemporal database application area that provides the location-aware information of wireless terminals via positioning devices such as GPS. With the rapid advances of wireless communication systems, the requirement of mobile application areas including traffic, mobile commerce and supply chaining management became the center of attention for various research issues in spatiotemporal databases. In this paper we present the A-Quadtree, an efficient indexing method for answering location-based queries where the movement vector information (e.g., speed and velocity) is not presented. We implement the A-Quadtree with an index structure for object identifiers as a.Net component to apply the component to multiplatforms. We present our approach and describe the performance evaluation through various experiments. In our experiments, we compare the performance with previous approaches and show the enhanced efficiency of our method.

  • PDF

Off-Line Electronic Payment Scheme using Smart Cards (스마트 카드를 사용한 오프 -라인 전자 지불 기법)

  • Kim, Jeong-Eun;Lee, Hyeong-U;Kim, Tae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1363-1372
    • /
    • 1999
  • 에이전트 기반 이동 컴퓨팅 환경에서 전자 상거래를 구현하기 위해 가장 필요로 하는 것은 안전한 지불 구조를 제공하는 것이다. 본 연구에서는 불확정 전송 기법 1,2 을 사용한 비대화형 엔티티 인증 기법과 Horster 기법 4,5 을 기반으로 메시지 복원 기능을 제공하는 공정 은닉 서명 기법을 제시한다. 또한 이를 직접 Brands가 제시한 오프-라인 전자 지불 시스템 3,6 에 접목한다. 인증 단계가 비대화형으로 수행되므로 이동 엔티티 인증에 효율적이고, 메시지 복원 기능을 갖고 공개 검증 기능을 제공하는 은닉 서명을 적용하기 때문에 카운터 방식을 사용한 스마트 카드 기반 전자 지불 시스템 6 에 효과적으로 적용할 수 있었다. 전자 화폐에 대해서 신뢰 센터에 의한 공정성 검토 기능을 추가로 제공하므로 전자 지불 시스템의 신뢰성을 향상시킬 수 있다.Abstract The primary requirements for realizing the electronic commerce in agent based mobile computing environments are to implement the compatible secure payment framework. In this paper, we propose both the non-interactive entity authentication scheme that is combined with oblivious transfer protocol 1,2 and the message recovery fair blind signature based on Horster scheme 4,5 . And these techniques are directly applied to the Brand's off-line electronic payment system 3,6 . As the authentication processes are done by non-interactive manner, we can also get efficiency for mobile entity authentication. Additionally, as the used signature scheme provides a message recovery function with publicly verifiable properties, it is efficiently applicable to a counter based off-line electronic payment scheme 6 based on the additional device like smart card. Therefore, we can enhance the reliability of proposed electronic payment system based on the publicly verifiable fairness in its electronic cash by a trusted judge.

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Design and Evaluation of U-Publication: Tag-Embedded Publication System and Business Model (U-Publication 시스템과 비즈니스 모델의 설계와 분석)

  • Park, A-Rum;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.3
    • /
    • pp.41-57
    • /
    • 2008
  • U-Publication, the Tag-Embedded publication, is one of U-Media. U-Media is defined as a media where human creates and consumes content through not only human cognitive and perceptual processes but also through the interactions between surrounding digital systems. U-Media provides information by generating, collecting, and attaching the content itself and the related information based on the interaction of the bio-systems incorporating digital information and devices embedded in humans, and surrounding objects including external digital devices. Using U-Publication, readers consume its content not only in offline but also online through a mobile RFID reader which touches and connects the URLs embedded in the RFID tags attached to it. Readers can consume the additional content though the hyperlinks attached to U-Publication and perform commercial activity as well as consumer the printed content. This paper defines the RFID-Tagged publication, proposes its related business models, and evaluates the alternative business models through a simulation study.

  • PDF

Successful Business Model of Mobile Solution Company (모바일 솔루션 기업의 성공적 비즈니스 모형)

  • Jang Doc-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.275-286
    • /
    • 2005
  • Interest of Business Model has been increased continuously in the enterprise ever since IT(Information Technology) is introduced in the Business sector. Though lots of company's effort to build Business Model which expected to give profit to company, there are no guarantee of Business Model's success. In the situation of shortest lifecycle of new technology, it's hard to guarantee Business Model based new technology will return profit with the result of excellent evaluation of technology. After find Timmers model, Julta model, Rappa model, Electronic Commerce Profit model, B2E Model and Affliation, Affliated B2E Business Frame, will propose advantage and disadvantage of these models. Comraded B2E Business Model will be extracted for Mobile Solution Company to achieve success in the market through analysis of relationship between Technology appraisal and business model.

  • PDF

Collaborative Filtering Method Using Context of P2P Mobile Agents (P2P 모바일 에이전트의 컨텍스트 정보를 이용한 협력적 필터링 기법)

  • Lee Se-Il;Lee Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.5
    • /
    • pp.643-648
    • /
    • 2005
  • In order to supply services necessary for users intelligently in the ubiquitous computing, effective filtering of context information is necessary. But studies of context information filtering have not been made much yet. In order for filtering of context information, we can use collaborative filtering being used much at electric commerce, etc. In order to use such collaborative filtering method in the filtering of ubiquitous computing environment, we must solve such problems as first rater problem, sparsity problem, stored data problem and etc. In this study, in order to solve such problems, the researcher proposes the collaborative filtering method using types of context information. And as the result of applying this filtering method to MAUCA, the P2P mobile agent system, the researcher could confirm the average result of 7.7% in the aspect of service supporting function.

Design of Enterprise System Platform based on Spring Data JPA in Spring Framework Environment (스프링 프레임워크 환경에서 스프링 데이터 JPA기반의 엔터프라이즈 시스템 플랫폼의 설계)

  • Yoo, Jung-Sang;Lee, Myeong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.39-46
    • /
    • 2019
  • The competition for standardization in the enterprise environment starts with the data tier of the back-end and the standard enterprise middle tier is being stabilized by standardization as it is accepted as the Spring Framework. In addition, with the advent of new devices in an increasingly rapid cycle, securing compatibility with web and mobile services has become an important competitive advantage for web service companies. However, companies are unable to secure competent technical personnel appropriate for the rapidly changing environment of the information generation, and the curriculum of educational universities does not reflect the demand of new competency-oriented curriculum. Therefore, in this study, in order to acquire competency-oriented skills required for such an enterprise system platform environment and to develop a curriculum, the system using Spring Data JPA in the Spring Framework environment was implemented through documenting for each analysis and design step. It aims to provide a reference model for the full stack competency-based curriculum and capstone design curriculum that can be applied immediately in the enterprise environment.

Understanding the intention to use Multimedia messaging services (멀티미디어 메시지 서비스 사용의도에 미치는 영향에 관한 연구)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Kim, Beom-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.2
    • /
    • pp.91-101
    • /
    • 2009
  • MMS (Multimedia Messaging Services) is one of the most basic services of mobile communication as well as a promising m-commerce enabling service. In our study, we hypothesize that the personality-based and cognitive traits of TAM and social cognitive theory are antecedents to MMS acceptance asking: what are the key determinants of intention to use MMS? An empirical investigation of 1,016 mobile phone users in South Korea was conducted. PLS results provided support for the effects of self-efficacy, perceived ease of use, relative advantage, credibility on attitude toward MMS use and strong support for the effect of attitude toward intention to use MMS. Our results provided a detailed account of the key forces underlying users intention to use MMS including personal and cognitive trait measures. Theoretical and practical implications of these findings are discussed in the paper.