• 제목/요약/키워드: technology transaction

검색결과 698건 처리시간 0.026초

웹 기반 재고관리 및 고객관리 시스템 개발 (A Study on Web Based Inventory and Customer Management System Development)

  • 조용욱;박명규
    • 대한안전경영과학회지
    • /
    • 제3권3호
    • /
    • pp.131-141
    • /
    • 2001
  • Since 1990's, the Information Technology(IT) of combination between PC and Internet has progressed rapidly. As a fast development of Information Communication Technology and spreading of network, the previous economic state, the method of dealing, transaction object and a scope of transaction is changing. Like this, as raising of IT, the existing off-line commercial transaction is moving to electronic commercial one which based on the web. These days, a electronic distribution system of enterprise and the electronic commercial transaction between small company and customer is being operated, but there is no full developed proper system between small retailor and mid distribution center. So on this paper, the system which manage a simple marketing as well as Inventory Management & customer management will be presented.

  • PDF

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • 제9권2호
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

에너지 프로슈머를 위한 거래기반 에너지 관리기술 동향분석 (A Review of Transaction-Based Energy Management Technology for Energy Prosumers)

  • 고석배;손성용
    • 한국정보전자통신기술학회논문지
    • /
    • 제11권1호
    • /
    • pp.45-53
    • /
    • 2018
  • 신재생 에너지원 등 분산전원의 확산에 따라 단순한 소비자에서 적극적으로 에너지 거래를 원하는 프로슈머에 대한 논의가 확산되고 있다. 프로슈머는 잉여 에너지 혹은 분산자원을 이용하여 생산한 에너지를 전력회사, 다른 에너지 사업자 및 타 수용가에 판매할 수 있는 새로운 형태의 소비자이다. 이러한 개념을 지원하기 위해서는 프로슈머의 거래를 지원할 수 있는 기술과 플랫폼이 필요하나 이에 대한 연구는 시작 단계에 있다. 본 논문은 거래기반 에너지 관리를 위한 대표적인 기술의 비교분석을 통하여 향후 거래기반 에너지 관리 기술의 진화 방향에 대하여 검토하였다. 아직 거래기반 에너지를 충실하게 지원할 수 있는 기술이나 표준은 정립되지 않은 단계로 기술간 경쟁을 통해 지속적으로 발전해 나갈 것으로 예상된다.

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

프라이버시 염려 영향요인이 인터넷 이용자의 신뢰와 온라인 거래의도에 미치는 영향 (Antecedents to Internet Privacy Concerns and Their Effect on the Trust and the Online Transaction Intention of Internet Users)

  • 유일;신정신;이경근;최혁라
    • Journal of Information Technology Applications and Management
    • /
    • 제15권4호
    • /
    • pp.37-59
    • /
    • 2008
  • This study focuses on the antecedents to the privacy concerns and their influence on trust and online transaction intention. Based on previous exploratory works and the literature review of privacy concerns, four antecedents are identified-Internet literacy, social awareness, perceived vulnerability, and perceived ability to information control. Incorporating these antecedents, privacy concerns, trust and online transaction intention, a conceptual model is developed and seven research hypotheses are proposed for empirical testing. The proposed model is examined through structural equation analysis. The results show that Internet literacy, social awareness, and perceived vulnerability have statistically significant effect on the privacy concerns of users and the privacy concerns has a positive influence on the trust. Finally, the trust has a positive effect on the online transaction intention. Implications of these findings are discussed for both researchers and practitioners and future research issues are raised as well.

  • PDF

Accurate Transmission Loss Allocation Algorithm Based on the Virtual Transaction Strategy: Comparison of Path-integral with Discrete Integral Methods

  • Min, Kyung-Il;Moon, Young-Hyun
    • Journal of Electrical Engineering and Technology
    • /
    • 제5권4호
    • /
    • pp.511-521
    • /
    • 2010
  • This paper presents a new algorithm to determine accurate bus-wise transmission loss allocation utilizing path-integrals dictated by the transaction strategy. For any transaction strategy, the total sum of the allocated transmission losses of all buses is equal to the actual loss given by the AC power-flow calculation considering the distributed slack. In this paper, the bus-wise allocation of the transmission loss is calculated by integrating the differential loss along a path determined by the transaction strategy. The proposed algorithm is also compared with Galiana's method, which is the well-known transmission loss allocation algorithm based on integration. The performance of the proposed algorithm is evaluated by case studies carried out on the WSCC 9-bus, IEEE 14-bus, New England 39-bus, and IEEE 118-bus systems. The simulation results show that the proposed algorithm is fast and accurate with a large step size.

디지털물(物) 국제법래(國際去來)의 리스크관리방안(管理方案)에 관한 연구(硏究) (A Study on the Risk Management in International Transaction of Digital Goods)

  • 안병수
    • 무역상무연구
    • /
    • 제29권
    • /
    • pp.143-172
    • /
    • 2006
  • This study focuses on the risk management of "Digital Goods" appeared with the progress of information technology(IT) in international transaction. As a result of that digital goods have a lot of uncertainty between the general goods or service which have been deal with object of international transaction broadly because digital goods hold uniqueness. In this study, the author give a definition of "Digital Goods" and make an examination of uniqueness of that in international transaction. Next, six risks are defined base on risk theory and risk analysis matrix applying risk mapping model is made. Conclusionally, risk transfer as insurance is adequate to manage business risk, security risk, credit risk and legal risk. Meanwhile, risk avoidance is adequate to manage reputation risk and market risk. But, this study have following three limits. Firstly, concerning definition of the risk, real case is not applied owing to lack of transaction data. Secondly, measuring of the risk is not based on absolute data but relative data. Lastly, suggesting way of risk management is not concrete and practical to international trader of digital goods.

  • PDF

전자상거래 시장 유형에 따른 거래협상 문서의 특성 및 구조에 관한 연구 (A Study of Characteristics and Structure of Negotiation Message using Electronic Commerce Market Classification)

  • 홍준석
    • 한국IT서비스학회지
    • /
    • 제4권2호
    • /
    • pp.79-97
    • /
    • 2005
  • With the proliferation of EC, many customers have been participating into online auction or group-buying market over searching internet shopping-malls to purchase goods. To support the customer's convenient transaction, lots of agent systems are developed to facilitate the customer's product brokering, merchant brokering, and negotiation of transaction. However, many of these systems have focused upon supporting transaction at only one type of marketplace. Since these marketplaces have different transaction settlement mechanism, it is necessary to develop the system that utilizes the customer's transaction including the selection of the type of marketplace to buy. Then we classify the kinds of B2C electronic marketplace according to the protocol by which the market operated. The structure of negotiation message is developed using XML schema and RDFS under the characteristics and message example of each marketplace in this research.

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권4호
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

기업 간 거래에서 거래공정성과 거래진정성 지각이 평판, 신뢰, 거래비용감소에 미치는 영향 (The Effect of Perception of Transaction Fairness and Transaction Integrity on Reputation, Trust, and Transaction Cost Reduction in Business-to-Business Transactions)

  • 서영복;박찬권
    • 중소기업연구
    • /
    • 제42권3호
    • /
    • pp.145-172
    • /
    • 2020
  • 본 연구는 우리나라의 기업들에게 거래기업들과 공정하고 진정성 있는 거래관계를 유지하는 것은 우호적·긍정적인 평판의 확보와 함께, 신뢰관계를 구축할 수 있으며, 거래비용의 감소에도 영향을 미칠 수 있음을 제시하는 것이다. 이를 위하여 연구가설을 수립하고 국내기업들을 대상으로 설문자료를 수집하였으며, 이에 대한 가설의 검정을 시행하였다. 연구가설 검정결과 거래공정성 지각과 거래진정성 지각은 평판에 정(+)의 영향을 미치며, 평판은 신뢰에 정(+)의 영향을 미친다. 신뢰는 거래비용감소에 정(+)의 영향을 미치며, 또한 평판과 신뢰는 거래공정성 및 거래진정성 지각과 거래비용감소 사이에서 매개변수의 역할을 하며, 신뢰는 평판과 거래비용감소 사이에서 매개변수의 역할을 한다. 우리나라의 기업들에게 지속가능한 경영활동이 이루어지기 위해서는 거래관계에서 공정성 및 진정성의 지각 수준을 제고함으로써 호의적·긍정적 평판을 확보하는 것이 중요함을 제시하는 것이다. 호의적·긍정적인 평판의 확보는 신뢰관계로 발전할 수 있고, 궁극적으로는 거래비용의 감소로 나타날 수 있다는 것을 실증하였으며, 이를 제시하였다.