• Title/Summary/Keyword: mobile transaction

Search Result 226, Processing Time 0.024 seconds

Game Theoretic Analysis of the Mobile Discount Service of the Offline Retailers (오프라인 소매점의 모바일 할인 서비스에 대한 전략적 분석)

  • Cho, Hyung-Rae;Rhee, Minho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.3
    • /
    • pp.47-55
    • /
    • 2016
  • The proliferation of the Internet and related technologies has led to a new form of distribution channels, namely online retailers. The conventional offline and the new online retailers have different transaction costs perceived by the consumers in the following perspectives: the accessibility to the product information, the traffic cost and the opportunity cost for the time to visit the store, the delivery time and the possibility of 'touch and feel' to test the quality of the product. In particular, the online retailers have lower distribution cost structure in that they do not have physical stores, which results in lower selling price. Thus they continuously offer price competition against offline retailers using the lower selling cost as competitive weapon. Moreover the emergence of the social commerce is likely to intensify the competition between the online and offline retailers. To survive in this fierce competition, the offline retailers are trying to defend their business interests by sticking to offline transaction in anticipation of increased customer loyalty, customer's preference for 'touch and feel' style shopping, and others. Despite of these efforts, customers who touch and feel a product in an offline store but purchase the product through an online retailer are increasing. To protect such customers, recently, some of the offline retailers began to provide the mobile discount service (MDS) which enables the offline customers to purchase a product at a discounted price through the mobile applications. In business competitions, the price discount strategy is usually considered to secure more market share at the cost of lower profit. In this study, however, we analyze the effect of MDS as a weapon for securing more profit. To do this, we set up a game model between the online and offline retailers which incorporates the effect of the MDS. By numerically analyzing the Nash equilibrium of the game, some managerial implications for using the MDS for more profit are discussed.

A Study of Factors Influencing on Customer's Trust in Mobile Commerce Site (M-커머스 사이트의 신뢰도 형성요인에 관한 실증연구)

  • Han Dae-Mun;Kim Yeong-Real
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.10 no.3
    • /
    • pp.1-6
    • /
    • 2005
  • This study tried to identify factors influencing on customer's trust in Mobile Commerce Sites. Four factors were found ; transaction security, site image, navigation usability, payment convenience. These factors showed strong correlations with customer's trust. Implications of the study and further research issues are discussed.

  • PDF

The Role of Application Rank in the Extended Mobile Application Download

  • Bang, Youngsok;Lee, Dong-Joo
    • Asia pacific journal of information systems
    • /
    • v.25 no.3
    • /
    • pp.548-562
    • /
    • 2015
  • The growing popularity of mobile application has led to researchers and practitioners needing to understand users' mobile application download behaviors. Using large-scale transaction data obtained from a leading Korean telecommunications company, we empirically explore how application download rank, which appears to users when they decide to download a new application, affects their extended mobile application download. This terminology refers to downloading an additional application in the same category as those that they have already downloaded. We also consider IT characteristics, user characteristics, and application type that might be associated with the extended application download. The analysis generates the following result. Overall, a higher rank of a new application encourages the extended application download, but the linear relationship between the rank and the extended application download disappears when critical rank points are incorporated into the model. Further, no quadratic effect of rank is found in the extended application download. Based on the results, we suggest theoretical and managerial implications.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

On a Enhanced Mobile OTP generator design using Transaction (이체정보를 활용한 강화된 모바일 OTP 생성기 설계)

  • Park, Beum-Su;Cho, Sang-Il;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.227-228
    • /
    • 2010
  • Generated One-Time Password (OTP) is used only once. This attributes is to safety than to repeated use the same password. Recently, Park's proposed on "Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction" use challenge-response based one-time password generator. However, Challenge exchange problem and currently OTP the same security level. In this paper, Park's proposed OTP generator design for us analysis. And then presents a resolution to the problem and new system logic. New system strong to Man-In-Middle attack and replay attack. In addition, OTP security level is higher.

  • PDF

Enhanced Mutual Authentication Scheme based on Chaotic Map for PCM in NFC Service Environment

  • Park, Sung-Wook;Lee, Im-Yeong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.1180-1200
    • /
    • 2017
  • Currently, automated payment services provide intuitive user interfaces by adapting various wireless communication devices with mobile services. For example, companies like Samsung, Google, and Apple have selected the NFC payment method to service payments of existing credit cards. An electronic payment standard has been released for NFC activation within Korea and will strengthen the safety of payment service communications. However, there are various security risks regarding the NFC-based electronic payment method. In particular, the NFC payment service using the recently released lightweight devices cannot provide the cryptographic strength that is supported by many financial transaction services. This is largely due to its computational complexity and large storage resource requirements. The chaotic map introduced in this study can generate a highly complicated code as it is sensitive to the initial conditions. As the lightweight study using the chaotic map has been actively carried out in recent years, associated authentication techniques of the lightweight environment have been released. If applied with a chaotic map, a high level of cryptographic strength can be achieved that can provide more functions than simple XOR operations or HASH functions. Further, this technique can be used by financial transaction services. This study proposes a mutual authentication technique for NFC-PCM to support an NFC payment service environment based on the chaotic map.

A Framework of User Authentication for Financial Transaction based Multi-Biometrics in Mobile Environments (모바일 환경에서 다중 바이오인식 기반의 금융 거래를 위한 사용자 인증 프레임워크)

  • Han, Seung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.143-151
    • /
    • 2015
  • Biometric technology has been proposed as a new means to replace conventional PIN or password because it is hard to be lost and has the low possibility of illegal use. However, unlike a PIN, password, and personal information there is no way to modify the exposure if it is exposed and used illegally. Therefore, the existing single modality with single biometrics is critical when it expose. However in this paper, we use a multi-modality and multi-biometrics to authenticate between users and TTP or between users and financial institutions. Thereby, we propose a more reliable method and compared this paper with existed methods about security and performance in this paper.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

The Influence of Mobile Office Systems on Users' Job Stress and Work Overload (모바일 오피스 시스템이 사용자의 업무과부하 및 직무 스트레스에 미치는 영향)

  • Yun, Hae-Jung;Choi, Gui-Young;Lee, Choong-C.
    • The Journal of Information Systems
    • /
    • v.20 no.2
    • /
    • pp.155-176
    • /
    • 2011
  • The use of mobile office systems has been expanded due to the smartphones' rapid diffusion in Korea, and it has brought a new work environment that is different from traditional working patterns. In this study, the unique attributes of mobile office systems, such as ubiquity, usefulness, complexity, and insecurity, are examined along with the impact of these attributes on work overload and job stress. Based on transaction-based model of job stress, organizational support was applied as a stress inhibitor and also the moderator between work overload and job stress. The findings of this study show that ubiquity increases usefulness of mobile office systems; complexity increases both work overload and job stress; and insecurity increases job stress. Surprisingly, usefulness increases job stress, which means employees who perceive the efficiency of mobile office systems higher may feel more job stress. Organizational support for mobile office systems significantly shows the moderating effect, but no direct mitigating effect on job stress. The theoretical and practical implications in order to mitigate the side effects of mobile office systems based on the research findings are thoroughly discussed.