• Title/Summary/Keyword: technology transaction

Search Result 692, Processing Time 0.025 seconds

An Exploratory Study on the Factors of Difference in Trust Levels for Internet-Only Banks by Age Groups (인터넷전문은행의 신뢰 결정요인의 연령대별 차이에 관한 탐색 연구)

  • Nam, Sang-Wook
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.3
    • /
    • pp.58-66
    • /
    • 2020
  • This paper aims to empirically analyze the factors of difference in trust level for Internet-only bank by age groups. The purpose of this study is to provide clues and a research data in developing differentiation strategies that can increase consumer's trust by age group. In this study, above all, the financial consumer group was divided into the 2030s and 4050s based on age. The study explored the trust determinants of the two groups and compared the differences between the two groups using a multi-group analysis method. As results, in all age groups, financial consumer's trust was seen as a determinant of convenience, security and benefit of financial transaction costs. The difference of the determinant of trust between 2030s and 4050s occurred in the factor of benefit. Moreover, it reconfirmed that consumer's trust is later strongly extended to relationship commitment. These findings suggest that trust is of paramount importance to the Internet-only bank, whose market competition will intensify in the future.

Problem and Improvement of the Computerization Practice Real - estate Registration

  • Youn, Sung-Ho;Kim, Moon-sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.161-168
    • /
    • 2016
  • It has become the information medium that mediate between individuals of marketing with the new information media that use of the Internet in accordance with the progress of the IT industry- real estate marketing, real estate leasing, real estate auctions, etc. The real estate registration services should be disclosed to outside that include a schedule details the public book-register and problems caused by it should be reasonably resolved by handling a large amount of real estate registration work quickly, accurately handling to utilize Information Technology(IT) through the information system construction as the feature to process the information of register entries. Computerization of real estate registration will raise the efficiency of the registration as well as people can see the information related to real estate on the basis of published content without limitation the time and place and will pursue the ideal and reliability of the registration -web accessibility improving of the Internet Registry and permanent storage of preserving documents by electronic means. It is very large that impact on the real estate transaction if the accuracy of legal registration choosing formalism in the processing of real estate registration business through the Internet than written application is highly probable to occur incorrect registration. Also, It is necessary to manage it effectively -if you do not quickly and exactly respond to it, there is problems such as delays or poor registration service because real estate business activated and real estate registration services also increased sharply. In this paper, we will identify the problems of the real estate registration work and suggest improvements about it.

A Study on Hierarchical Structure and Blockchain-based Node Authentication Mechanism in MANET (MANET에서 계층적 구조와 블록체인 기반 노드 인증 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.13-19
    • /
    • 2019
  • MANET has many security vulnerabilities because it consists of only mobile nodes using wireless. In particular, it is a very important factor determining network performance that excludes the participation of malicious nodes through accurate reliability measurements and authentication of nodes participating in the network. In this paper, we proposed a technique applied with blockchain technology in order to prevent forgery of authentication information for nodes participating in the network. And, an area-based hierarchical structure was applied to increase the efficiency of authentication for nodes and apply the optimal technique of block generation and exchange protocol. In addition, four data payloads were added to the block header in order to add authentication information for nodes in block. To improve the reliability by applying the blockchain technique to the hop-by-hop data transfer method between mobile nodes, blockchain exchange protocol through transaction creation, block packaging and verification processes were implemented. We performed the comparative experiment with the existing methods to evaluate the performance of the proposed method and confirmed the excellent performance by the experiment results.

Time-Based MDA Architecture Modeling for Safety-Critical Systems (안전필수 시스템을 위한 시간기반 MDA 아키텍처 모델링)

  • Lim, Yoojin;Choi, Eunmi
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.443-453
    • /
    • 2012
  • In order to minimize the damage from system failures, systems over various fields are requested to contain the safety-critical features. In this paper, we deliver the considerable issues, especially, in the cyber physical systems that is recently used as a safety-critical system, as well as we propose the model driven architecture based on time as its the important factor. Based on meta-modeling approach, we introduce the time-based architecture which is associated with deadline, transition state, and threshold, and also we work out a design for this by using model driven architecture. We propose a realizable safety-critical architecture by means of showing failure handling components with safety transaction model from the meta-model. In the detailed models and the example, we design a basic safety processing state, a multiple safety processing state, and a compound safety processing state for completing the safety-critical system architecture.

Anomaly Intrusion Detection based on Association Rule Mining in a Database System (데이터베이스 시스템에서 연관 규칙 탐사 기법을 이용한 비정상 행위 탐지)

  • Park, Jeong-Ho;Oh, Sang-Hyun;Lee, Won-Suk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.831-840
    • /
    • 2002
  • Due to the advance of computer and communication technology, intrusions or crimes using a computer have been increased rapidly while tremendous information has been provided to users conveniently Specially, for the security of a database which stores important information such as the private information of a customer or the secret information of a company, several basic suity methods of a database management system itself or conventional misuse detection methods have been used. However, a problem caused by abusing the authority of an internal user such as the drain of secret information is more serious than the breakdown of a system by an external intruder. Therefore, in order to maintain the sorority of a database effectively, an anomaly defection technique is necessary. This paper proposes a method that generates the normal behavior profile of a user from the database log of the user based on an association mining method. For this purpose, the Information of a database log is structured by a semantically organized pattern tree. Consequently, an online transaction of a user is compared with the profile of the user, so that any anomaly can be effectively detected.

Smarter Classification for Imbalanced Data Set and Its Application to Patent Evaluation (불균형 데이터 집합에 대한 스마트 분류방법과 특허 평가에의 응용)

  • Kwon, Ohbyung;Lee, Jonathan Sangyun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.15-34
    • /
    • 2014
  • Overall, accuracy as a performance measure does not fully consider modular accuracy: the accuracy of classifying 1 (or true) as 1 is not same as classifying 0 (or false) as 0. A smarter classification algorithm would optimize the classification rules to match the modular accuracies' goals according to the nature of problem. Correspondingly, smarter algorithms must be both more generalized with respect to the nature of problems, and free from decretization, which may cause distortion of the real performance. Hence, in this paper, we propose a novel vertical boosting algorithm that improves modular accuracies. Rather than decretizing items, we use simple classifiers such as a regression model that accepts continuous data types. To improve the generalization, and to select a classification model that is well-suited to the nature of the problem domain, we developed a model selection algorithm with smartness. To show the soundness of the proposed method, we performed an experiment with a real-world application: predicting the intellectual properties of e-transaction technology, which had a 47,000+ record data set.

A Web-based CBR System for e-Mail Response

  • Yoon, Young-Suk;Lee, Jae-Kwang;Han, Chang-Hee
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.185-190
    • /
    • 2003
  • Due to the rapid growth of Internet, means of communication with customers in a traditional customer support environment such as telephone calls are being replaced by mainly e-mail in a Web-based customer support system. Although such a Web-based support is efficient and promises potential benefits for firms, including reduced transaction costs, reduced time, and high quality of support, there are some difficulties associated with responding to many types of customer’s inbound e-mails appropriately .As many types of e-mail are received, considerable attention is being paid to methods for increasing the efficiency of managing and responding e-mails. This research proposes an intelligent system for managing customer’s inbound e-mails in organizations by applying case based reasoning technique for responding to various customers' inbound e-mails more effectively. In this approach, a case is represented as a frame-typed data structure corresponding to an inbound e-mail, keywords, and its reply e-mail. In the retrieval procedure, keywords and affinity set is developed to index a case, and then the case is represented as a vector, a case vector. Also, cosines value is calculated to measure the similarity between a new inbound e-mail and the cases in the case base. In the adaptation procedure, we provide several adaptation strategies to adapt and modify the retrieved case. The strategies guide to make an outbound e-mail using product databases, databases for customer support, etc. Additionally, the Web-based system architecture is proposed to implement our methodology. The proposed methodology and system will be helpful for developing more efficient Web-based customer support.

  • PDF

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Determining Personal Credit Rating through Voice Analysis: Case of P2P loan borrowers

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3627-3641
    • /
    • 2021
  • Fintech, which stands for financial technology, is growing fast globally since the economic crisis hit the United States in 2008. Fintech companies are striving to secure a competitive advantage over existing financial services by providing efficient financial services utilizing the latest technologies. Fintech companies can be classified into several areas according to their business solutions. Among the Fintech sector, peer-to-peer (P2P) lending companies are leading the domestic Fintech industry. P2P lending is a method of lending funds directly to individuals or businesses without an official financial institution participating as an intermediary in the transaction. The rapid growth of P2P lending companies has now reached a level that threatens secondary financial markets. However, as the growth rate increases, so does the potential risk factor. In addition to government laws to protect and regulate P2P lending, further measures to reduce the risk of P2P lending accidents have yet to keep up with the pace of market growth. Since most P2P lenders do not implement their own credit rating system, they rely on personal credit scores provided by credit rating agencies such as the NICE credit information service in Korea. However, it is hard for P2P lending companies to figure out the intentional loan default of the borrower since most borrowers' credit scores are not excellent. This study analyzed the voices of telephone conversation between the loan consultant and the borrower in order to verify if it is applicable to determine the personal credit score. Experimental results show that the change in pitch frequency and change in voice pitch frequency can be reliably identified, and this difference can be used to predict the loan defaults or use it to determine the underlying default risk. It has also been shown that parameters extracted from sample voice data can be used as a determinant for classifying the level of personal credit ratings.

Big Data Analysis of Financial Product Transaction Trends Using Associated Analysis (연관분석을 이용한 금융 상품 거래 동향의 빅데이터 분석)

  • Ryu, Jae Pil;Shin, Hyun-Joon
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.49-57
    • /
    • 2021
  • With the advent of the era of the fourth industry, more and more scientific techniques are being used to solve decision-making problems. In particular, big data analysis technology is developing as it becomes easier to collect numerical data. Therefore, in this study, in order to overcome the limitations of qualitatively analyzing investment trends, the association of various products was analyzed using associated analysis techniques. For the experiment, two experimental periods were divided based on the COVID-19 economic crisis, and sales information from individuals, institutions, and foreign investors was collected, and related analysis algorithms were implemented through r software. As a result of the experiment, institutions and foreigners recently invested in the KOSPI and KOSDAQ markets and bought futures and products such as ETF. Individuals purchased ETN and ETF products together, which is presumed to be the result of the recent great interest in sector investment. In addition, after COVID-19, all investors tended to be passive in investing in high-risk products of futures and options. This paper is thought to be a useful reference for product sales and product design in the financial field.