The document proposes a new U-PR (Ubiquitous Payment and Receipt) business model for making transactions seamless, secure, and privacy protected in a U-commerce environment. The model involves four main entities: 1) a payer who purchases products and shares digital receipts, 2) a store that provides products/services and issues digital receipts, 3) a potential customer who receives a digital coupon from the payer, and 4) a U-Receipt company that manages digital receipts and coupons. The model aims to incentivize users by allowing payers to earn miles when potential customers use their coupons at stores. Information is designed to be distributed minimally among entities to maximize privacy
Introduction to e-commerce
11/10/2012 at ITS Volterra Elia (Ancona)
Comenius Project New Ideas Factory
http://www.istitutovolterraelia.it/index.php?option=com_content&view=article&id=373&Itemid=342
Digital Payment Services - Intercultural Differences and Trust as Key Determi...eye square
The acceptance of digital payment systems depends on cultural preferences. This presentation highlights the factors which determine success or failure of a digital payment system. eye square UX Researcher Lisa Wiese held this talk at World Usability Day 2012 in Berlin
AXSionics Internet Passport: a smartcard which holds your biometry and enables you to authenticate yourself and to validate a transaction on Internet. No risk of identity theft, all your information is kept on your card.
Introduction to e-commerce
11/10/2012 at ITS Volterra Elia (Ancona)
Comenius Project New Ideas Factory
http://www.istitutovolterraelia.it/index.php?option=com_content&view=article&id=373&Itemid=342
Digital Payment Services - Intercultural Differences and Trust as Key Determi...eye square
The acceptance of digital payment systems depends on cultural preferences. This presentation highlights the factors which determine success or failure of a digital payment system. eye square UX Researcher Lisa Wiese held this talk at World Usability Day 2012 in Berlin
AXSionics Internet Passport: a smartcard which holds your biometry and enables you to authenticate yourself and to validate a transaction on Internet. No risk of identity theft, all your information is kept on your card.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that
most of business activities need payment system. As E-commerce requires an efficient payment system
which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET,
SSL protocols for encrypting e-payment information. It also presented several methods to take under
consideration to avoid fraud and keep our site safe.
First-ever consumer driven fraud mitigation technology
Innovative technological solution to fraud prevention
UPK is a solution that allows an individual to lock and unlock their personal accounts, deployable across a broad range of industries:
Credit cards, debit cards, on-line bank accounts, prepaid, gift cards
On-line commerce accounts (i.e. PayPal)
Meal vouchers, fleet cards, gas cards
On-line, interactive gaming accounts (i.e. PlayStation)
On-line Gambling accounts (i.e. BetWin, Party Gaming)
Airline/hotel mileage/loyalty – online/card accounts
Individuals can lock and unlock their accounts in real-time or set an automatic schedule in the future through any Smart-phone, desktop computer or other mobile device.
Our solution works with all Smart-phone and tablet operating systems (Android, Apple, Windows and Blackberry) as well as with feature phones. The technology seamlessly interfaces with a host’s operating platform (both legacy and state-of-the-art systems) to provide secure, seamless functionality without having any private customer data pass outside their secure, self-contained environment.
Top 5 Digital Wallet app:
In today's fast-paced digital world, managing your finances has become more convenient than ever, thanks to the evolution of digital wallet apps. These apps have revolutionized the way we handle transactions, making payments, transfers, and managing funds effortlessly accessible at our fingertips. If you're looking to streamline your financial activities while ensuring the utmost security, look no further than these top five digital wallet apps. From seamless transactions to enhanced security features, these apps have it all.
PayPal, digital wallet app, online payments, secure transactions, mobile payments
PayPal is a household name in the realm of digital wallets. With its user-friendly interface and extensive global reach, it enables users to send and receive money, make online purchases, and manage their finances with ease. From splitting bills to making cross-border transactions, PayPal offers a range of features that cater to individual users and businesses alike. The app's advanced security measures, such as two-factor authentication and purchase protection, ensure peace of mind during every transaction.
Apple Wallet, iOS app, mobile payments, digital passes, contactless payments For iOS users, Apple Wallet is the ultimate digital companion. Not only does it store your credit and debit cards for seamless mobile payments, but it also acts as a hub for boarding passes, event tickets, loyalty cards, and more. The app's integration with Apple Pay allows users to make secure and private transactions using Touch ID or Face ID authentication. Its convenience extends to public transportation systems and participating merchants, making it a versatile app for everyday transactions.
Google Pay, digital wallet app, NFC payments, mobile banking, money transfers With Google Pay, Android users have a powerful tool that combines convenience and security. This app supports NFC payments, allowing users to make contactless transactions at compatible terminals. Beyond that, Google Pay facilitates money transfers between friends and family, and even allows for payments directly from the app through participating merchants. The app's integration with your Google account ensures that your payment information is safeguarded, and its transaction encryption adds an extra layer of security.
Samsung Pay, mobile wallet app, MST technology, loyalty cards, gift cards Samsung Pay stands out for its unique MST (Magnetic Secure Transmission) technology, which enables users to make payments at both NFC and traditional magnetic stripe terminals. This feature gives Samsung Pay an edge in terms of compatibility. The app also offers storage for loyalty cards, gift cards, and membership cards, effectively decluttering your physical wallet.
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. In this paper, we will discuss an important e-payment protocol namely Kim and Lee scheme examine its advantages and delimitations, which encourages the author to develop more efficient scheme that keeping all characteristics intact without concession of the security robustness of the protocol. The suggest protocol employs the idea of public key encryption scheme using the thought of hash chain. We will compare the proposed protocol with Kim and Lee protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyIDES Editor
The way people do the business and transactions
are changing drastically with the advent of Information
Technology. The customer wants to access information, goods
and services any time and in any place on his mobile device.
Receiving financial data, trade on stock exchanges, accessing
balances, paying bills and transfer funds using SMS are done
through mobile phones. Due to involvement of valuable
financial and personal information, the mobile phones are
vulnerable to numerous security threats. Most common activity
in M-Commerce is the payment to the merchant using a mobile
phone. In this paper we present a secure account–based
payment protocol which is suitable for M-commerce to transfer
the payment from wireless networks based on public key
cryptography. Based on author knowledge, this is a first kind
of protocol which applies public key cryptography to mobile
network and satisfies all the security requirements of the
properties provided by standard protocols for wired networks
such as SET and iKP.
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
ENMG 602 Homework Assignment 1
Problem 1:
Observations of the demand for a spare part stocked at a parts supply depot during the
calendar year 2012 were
Month Demand Month Demand
January 95 July 234
February 62 August 284
March 135 September 221
April 211 October 281
May 199 November 192
June 276 December 302
a. Determine the one-step-ahead forecasts for the demand for January 2013 using 3-,
6-, and 12-month moving averages.
b. Using a four-month moving average, determine the one-step-ahead forecasts for
July through December 2012.
c. Compute MAD, MSE, MAPE for the forecasts obtained in b.
Problem 2:
Observed weekly sales of ball peen hammers at the town hardware store over a ten-week
period have been 13, 11, 26, 21, 32, 13, 21, 22, 30, and 26.
a. Suppose that five-week moving averages are used to forecast sales. Determine the
one-step-ahead forecasts for weeks 6 through 10.
b. Suppose that exponential smoothing is used with a smoothing constant of α =
0.15. Find the exponential smoothing forecasts for weeks 6 through 10 (start the
forecasting process from week 1).
c. Based on the MAD, which forecast method is better?
Problem 3:
The sales of a tablet computer in a popular electronic store during the calendar year 2012
were
Month Demand Month Demand
January 103 July 199
February 119 August 208
March 131 September 221
April 149 October 237
May 172 November 252
June 184 December 268
a. Using 3-month simple moving average and exponential smoothing (with α = 0.10
and 0.20), determine the one-step-ahead forecasts for July 2012 through January
2013.
ENMG 602 Homework Assignment 1
b. Using 3-month double moving average (using base level and trend), determine the
one-step-ahead forecasts for July 2012 through January 2013.
c. Compute MAD, MSE, and MAPE for the above forecasts.
d. Based on the MAPE, which forecast method is the best?
Problem 4:
Compile a list of major system life-cycle activities. For each activity on the list, try to
find the related supply chain activities. Present your finding in a table with the system
life-cycle stage in the first column, system life-cycle activities in the second column and
the related supply chain activities in the third column.
CYBER SECURITY IN E-BUSINESS
1
CYBER SECURITY IN E-BUSINESS
2
Cyber Security in E-Business
Abstract
Technological advancement has resulted in the significant simplicity of carrying out activities and processes in many areas. The business world has attained a significant benefit from this advancement. Through it, e-businesses have emerged, where individuals and organizations can electronically carry out business activities, thus without the need to be physically present at the point and time of transacting. According to Furnell (2004), e-business refers to a model of doing business or a segment of a larger model that allows commercial transactions to be undertaken througho.
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONJournal For Research
Security is the one of most important feature of banking sector. E-commerce safety is the one of the uppermost visible security that controls the end user during their day to day life and payment interaction with their business. Sharing of account related data in insecure medium raises security and privacy issues. Personal sensitive data can be theft by hackers. So it is need of today’s E – commerce world for providing the solution of that problem and helps to increase the confidence of customer for making the use of digitalization. This proposed system provides secure payment system which helps for move toward for the result of economic business deal transaction. It is helpful for reducing scam by providing only that information which is necessary for the fund transfer and provides the security against various security threats.
Presentation given by Dr K Subramanian, Director and Professor, Advance Centre for Informatic and Innovative Learning IGNOU on August 3rd, 2011 at eWorld Forum (www.eworldforum.net) in the session Information Management and Security
It's not about beacons
It's about creating an interactive world,
It's about amusing with different services
It's about promoting your value
It's about location relations
It's about profiling behaviors
It's about capturing shoppers
It's about pushing sales staff
It's about performance marketing
It's really not about beacons.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that
most of business activities need payment system. As E-commerce requires an efficient payment system
which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET,
SSL protocols for encrypting e-payment information. It also presented several methods to take under
consideration to avoid fraud and keep our site safe.
First-ever consumer driven fraud mitigation technology
Innovative technological solution to fraud prevention
UPK is a solution that allows an individual to lock and unlock their personal accounts, deployable across a broad range of industries:
Credit cards, debit cards, on-line bank accounts, prepaid, gift cards
On-line commerce accounts (i.e. PayPal)
Meal vouchers, fleet cards, gas cards
On-line, interactive gaming accounts (i.e. PlayStation)
On-line Gambling accounts (i.e. BetWin, Party Gaming)
Airline/hotel mileage/loyalty – online/card accounts
Individuals can lock and unlock their accounts in real-time or set an automatic schedule in the future through any Smart-phone, desktop computer or other mobile device.
Our solution works with all Smart-phone and tablet operating systems (Android, Apple, Windows and Blackberry) as well as with feature phones. The technology seamlessly interfaces with a host’s operating platform (both legacy and state-of-the-art systems) to provide secure, seamless functionality without having any private customer data pass outside their secure, self-contained environment.
Top 5 Digital Wallet app:
In today's fast-paced digital world, managing your finances has become more convenient than ever, thanks to the evolution of digital wallet apps. These apps have revolutionized the way we handle transactions, making payments, transfers, and managing funds effortlessly accessible at our fingertips. If you're looking to streamline your financial activities while ensuring the utmost security, look no further than these top five digital wallet apps. From seamless transactions to enhanced security features, these apps have it all.
PayPal, digital wallet app, online payments, secure transactions, mobile payments
PayPal is a household name in the realm of digital wallets. With its user-friendly interface and extensive global reach, it enables users to send and receive money, make online purchases, and manage their finances with ease. From splitting bills to making cross-border transactions, PayPal offers a range of features that cater to individual users and businesses alike. The app's advanced security measures, such as two-factor authentication and purchase protection, ensure peace of mind during every transaction.
Apple Wallet, iOS app, mobile payments, digital passes, contactless payments For iOS users, Apple Wallet is the ultimate digital companion. Not only does it store your credit and debit cards for seamless mobile payments, but it also acts as a hub for boarding passes, event tickets, loyalty cards, and more. The app's integration with Apple Pay allows users to make secure and private transactions using Touch ID or Face ID authentication. Its convenience extends to public transportation systems and participating merchants, making it a versatile app for everyday transactions.
Google Pay, digital wallet app, NFC payments, mobile banking, money transfers With Google Pay, Android users have a powerful tool that combines convenience and security. This app supports NFC payments, allowing users to make contactless transactions at compatible terminals. Beyond that, Google Pay facilitates money transfers between friends and family, and even allows for payments directly from the app through participating merchants. The app's integration with your Google account ensures that your payment information is safeguarded, and its transaction encryption adds an extra layer of security.
Samsung Pay, mobile wallet app, MST technology, loyalty cards, gift cards Samsung Pay stands out for its unique MST (Magnetic Secure Transmission) technology, which enables users to make payments at both NFC and traditional magnetic stripe terminals. This feature gives Samsung Pay an edge in terms of compatibility. The app also offers storage for loyalty cards, gift cards, and membership cards, effectively decluttering your physical wallet.
The vast spreading of information in the last decade has led to great development in e-commerce. For instance, e-trade and e-bank are two main Internet services that implement e-transaction from anyplace in the world. This helps merchant and bank to ease the financial transaction process and to give user friendly services at any time. However, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. In this paper, we will discuss an important e-payment protocol namely Kim and Lee scheme examine its advantages and delimitations, which encourages the author to develop more efficient scheme that keeping all characteristics intact without concession of the security robustness of the protocol. The suggest protocol employs the idea of public key encryption scheme using the thought of hash chain. We will compare the proposed protocol with Kim and Lee protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.
The Internet of Things: the 4 security dimensions of smart devicesWavestone
Like all major technological revolutions, digital transformation is spreading over many areas. The Internet of Things plays an important role in this trend, trough the emergence of numerous devices.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
A Secure Account-Based Mobile Payment Protocol with Public Key CryptographyIDES Editor
The way people do the business and transactions
are changing drastically with the advent of Information
Technology. The customer wants to access information, goods
and services any time and in any place on his mobile device.
Receiving financial data, trade on stock exchanges, accessing
balances, paying bills and transfer funds using SMS are done
through mobile phones. Due to involvement of valuable
financial and personal information, the mobile phones are
vulnerable to numerous security threats. Most common activity
in M-Commerce is the payment to the merchant using a mobile
phone. In this paper we present a secure account–based
payment protocol which is suitable for M-commerce to transfer
the payment from wireless networks based on public key
cryptography. Based on author knowledge, this is a first kind
of protocol which applies public key cryptography to mobile
network and satisfies all the security requirements of the
properties provided by standard protocols for wired networks
such as SET and iKP.
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
ENMG 602 Homework Assignment 1
Problem 1:
Observations of the demand for a spare part stocked at a parts supply depot during the
calendar year 2012 were
Month Demand Month Demand
January 95 July 234
February 62 August 284
March 135 September 221
April 211 October 281
May 199 November 192
June 276 December 302
a. Determine the one-step-ahead forecasts for the demand for January 2013 using 3-,
6-, and 12-month moving averages.
b. Using a four-month moving average, determine the one-step-ahead forecasts for
July through December 2012.
c. Compute MAD, MSE, MAPE for the forecasts obtained in b.
Problem 2:
Observed weekly sales of ball peen hammers at the town hardware store over a ten-week
period have been 13, 11, 26, 21, 32, 13, 21, 22, 30, and 26.
a. Suppose that five-week moving averages are used to forecast sales. Determine the
one-step-ahead forecasts for weeks 6 through 10.
b. Suppose that exponential smoothing is used with a smoothing constant of α =
0.15. Find the exponential smoothing forecasts for weeks 6 through 10 (start the
forecasting process from week 1).
c. Based on the MAD, which forecast method is better?
Problem 3:
The sales of a tablet computer in a popular electronic store during the calendar year 2012
were
Month Demand Month Demand
January 103 July 199
February 119 August 208
March 131 September 221
April 149 October 237
May 172 November 252
June 184 December 268
a. Using 3-month simple moving average and exponential smoothing (with α = 0.10
and 0.20), determine the one-step-ahead forecasts for July 2012 through January
2013.
ENMG 602 Homework Assignment 1
b. Using 3-month double moving average (using base level and trend), determine the
one-step-ahead forecasts for July 2012 through January 2013.
c. Compute MAD, MSE, and MAPE for the above forecasts.
d. Based on the MAPE, which forecast method is the best?
Problem 4:
Compile a list of major system life-cycle activities. For each activity on the list, try to
find the related supply chain activities. Present your finding in a table with the system
life-cycle stage in the first column, system life-cycle activities in the second column and
the related supply chain activities in the third column.
CYBER SECURITY IN E-BUSINESS
1
CYBER SECURITY IN E-BUSINESS
2
Cyber Security in E-Business
Abstract
Technological advancement has resulted in the significant simplicity of carrying out activities and processes in many areas. The business world has attained a significant benefit from this advancement. Through it, e-businesses have emerged, where individuals and organizations can electronically carry out business activities, thus without the need to be physically present at the point and time of transacting. According to Furnell (2004), e-business refers to a model of doing business or a segment of a larger model that allows commercial transactions to be undertaken througho.
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTIONJournal For Research
Security is the one of most important feature of banking sector. E-commerce safety is the one of the uppermost visible security that controls the end user during their day to day life and payment interaction with their business. Sharing of account related data in insecure medium raises security and privacy issues. Personal sensitive data can be theft by hackers. So it is need of today’s E – commerce world for providing the solution of that problem and helps to increase the confidence of customer for making the use of digitalization. This proposed system provides secure payment system which helps for move toward for the result of economic business deal transaction. It is helpful for reducing scam by providing only that information which is necessary for the fund transfer and provides the security against various security threats.
Presentation given by Dr K Subramanian, Director and Professor, Advance Centre for Informatic and Innovative Learning IGNOU on August 3rd, 2011 at eWorld Forum (www.eworldforum.net) in the session Information Management and Security
Similar to a payment & receipt business model in u-commerce (20)
It's not about beacons
It's about creating an interactive world,
It's about amusing with different services
It's about promoting your value
It's about location relations
It's about profiling behaviors
It's about capturing shoppers
It's about pushing sales staff
It's about performance marketing
It's really not about beacons.
What price will pi network be listed on exchangesDOT TECH
The rate at which pi will be listed is practically unknown. But due to speculations surrounding it the predicted rate is tends to be from 30$ — 50$.
So if you are interested in selling your pi network coins at a high rate tho. Or you can't wait till the mainnet launch in 2026. You can easily trade your pi coins with a merchant.
A merchant is someone who buys pi coins from miners and resell them to Investors looking forward to hold massive quantities till mainnet launch.
I will leave the telegram contact of my personal pi vendor to trade with.
@Pi_vendor_247
This presentation poster infographic delves into the multifaceted impacts of globalization through the lens of Nike, a prominent global brand. It explores how globalization has reshaped Nike's supply chain, marketing strategies, and cultural influence worldwide, examining both the benefits and challenges associated with its global expansion.
PPrreesseenntteedd bbyy:: GGrroouupp 66
GGlloobbaalliizzaattiioonn
o f
PP
oo
ll
yy
ee
ss
tt
ee
rr
RR
uu
bb
bb
ee
rr
EE
tt
hh
yy
ll
ee
nn
ee
VV
ii
nn
yy
ll
AA
cc
ee
tt
aa
tt
ee
GG
ee
nn
uu
ii
nn
ee
LL
ee
aa
tt
hh
ee
rr
SS
yy
nn
tt
hh
ee
tt
ii
cc
LL
ee
aa
tt
hh
ee
rr
CC
oo
tt
tt
oo
nn
C
o
u
n
t
r
i
e
s
I
n
v
o
l
v
e
d
Ni
k
e
h
a
s
m
o
r
e
t
h
a
n
7
0
0
s
h
o
p
s
i
n
c
o
n
t
r
a
c
t
w
i
t
h
w
o
r
l
d
w
i
d
e,
w
h
e
r
e
i
n
t
h
e
i
r
offi
c
e
s
a
n
d
i
n
d
e
p
e
n
d
e
n
t
fa
c
t
o
r
y
o
u
t
l
e
t
s
a
r
e
fo
u
n
d
w
i
t
h
i
n
t
h
e
p
r
e
m
i
s
e
s
of
ap
p
r
o
x
i
m
a
t
e
l
y
4
5
c
o
u
n
t
r
i
e
s.
AAuussttrraalliiaa
China
India
IInnddoonneessiiaa
TThhaaiillaanndd
TTuurrkkeeyy
USA
VViieettnnaamm
NNiikkee SSuuppppllyy CChhaaiinn
RRuubbbbeerr,, FFaabbrriicc
aanndd ootthheerr rraaww
mmaatteerriiaallss
Shoe
MMaannuuffaaccttuurriinngg
aanndd AAsssseemmbbllyy
MMaarrkkeettiinngg
SSppoorrttiinngg ggooooddss,,
ddeevveellooppmmeenntt
aanndd SShhooee ssttoorreess
OOnnlliinnee,, CCaattaalloogg
aanndd ootthheerr rreettaaiill
NNiikkee bbrraannddeedd
shoes
PPrroodduucctt
ddeevveellooppmmeenntt
CCuussttoommeerr nneeeeddss//wwaannttss ffeeeeddbbaacckk
NNiikk
Nike Supply Chain
Globalization of Nike
Nike Manufacturing Process
Rubber Materials Nike
Ethylene Vinyl Acetate Nike
Genuine Leather Nike
Synthetic Leather Nike
Cotton in Nike Apparel
Nike Shops Worldwide
Nike Manufacturing Countries
Cold Cement Assembly Nike
3D Printing Nike Shoes
Nike Product Development
Nike Marketing Strategies
Nike Customer Feedback
Nike Distribution Centers
Automation in Nike Manufacturing
Nike Consumer Direct Acceleration
Nike Logistics and Transport
5 Tips for Creating Standard Financial ReportsEasyReports
Well-crafted financial reports serve as vital tools for decision-making and transparency within an organization. By following the undermentioned tips, you can create standardized financial reports that effectively communicate your company's financial health and performance to stakeholders.
BYD SWOT Analysis and In-Depth Insights 2024.pptxmikemetalprod
Indepth analysis of the BYD 2024
BYD (Build Your Dreams) is a Chinese automaker and battery manufacturer that has snowballed over the past two decades to become a significant player in electric vehicles and global clean energy technology.
This SWOT analysis examines BYD's strengths, weaknesses, opportunities, and threats as it competes in the fast-changing automotive and energy storage industries.
Founded in 1995 and headquartered in Shenzhen, BYD started as a battery company before expanding into automobiles in the early 2000s.
Initially manufacturing gasoline-powered vehicles, BYD focused on plug-in hybrid and fully electric vehicles, leveraging its expertise in battery technology.
Today, BYD is the world’s largest electric vehicle manufacturer, delivering over 1.2 million electric cars globally. The company also produces electric buses, trucks, forklifts, and rail transit.
On the energy side, BYD is a major supplier of rechargeable batteries for cell phones, laptops, electric vehicles, and energy storage systems.
Lecture slide titled Fraud Risk Mitigation, Webinar Lecture Delivered at the Society for West African Internal Audit Practitioners (SWAIAP) on Wednesday, November 8, 2023.
What website can I sell pi coins securely.DOT TECH
Currently there are no website or exchange that allow buying or selling of pi coins..
But you can still easily sell pi coins, by reselling it to exchanges/crypto whales interested in holding thousands of pi coins before the mainnet launch.
Who is a pi merchant?
A pi merchant is someone who buys pi coins from miners and resell to these crypto whales and holders of pi..
This is because pi network is not doing any pre-sale. The only way exchanges can get pi is by buying from miners and pi merchants stands in between the miners and the exchanges.
How can I sell my pi coins?
Selling pi coins is really easy, but first you need to migrate to mainnet wallet before you can do that. I will leave the telegram contact of my personal pi merchant to trade with.
Tele-gram.
@Pi_vendor_247
how to sell pi coins effectively (from 50 - 100k pi)DOT TECH
Anywhere in the world, including Africa, America, and Europe, you can sell Pi Network Coins online and receive cash through online payment options.
Pi has not yet been launched on any exchange because we are currently using the confined Mainnet. The planned launch date for Pi is June 28, 2026.
Reselling to investors who want to hold until the mainnet launch in 2026 is currently the sole way to sell.
Consequently, right now. All you need to do is select the right pi network provider.
Who is a pi merchant?
An individual who buys coins from miners on the pi network and resells them to investors hoping to hang onto them until the mainnet is launched is known as a pi merchant.
debuts.
I'll provide you the Telegram username
@Pi_vendor_247
how to sell pi coins in South Korea profitably.DOT TECH
Yes. You can sell your pi network coins in South Korea or any other country, by finding a verified pi merchant
What is a verified pi merchant?
Since pi network is not launched yet on any exchange, the only way you can sell pi coins is by selling to a verified pi merchant, and this is because pi network is not launched yet on any exchange and no pre-sale or ico offerings Is done on pi.
Since there is no pre-sale, the only way exchanges can get pi is by buying from miners. So a pi merchant facilitates these transactions by acting as a bridge for both transactions.
How can i find a pi vendor/merchant?
Well for those who haven't traded with a pi merchant or who don't already have one. I will leave the telegram id of my personal pi merchant who i trade pi with.
Tele gram: @Pi_vendor_247
#pi #sell #nigeria #pinetwork #picoins #sellpi #Nigerian #tradepi #pinetworkcoins #sellmypi
BONKMILLON Unleashes Its Bonkers Potential on Solana.pdfcoingabbar
Introducing BONKMILLON - The Most Bonkers Meme Coin Yet
Let's be real for a second – the world of meme coins can feel like a bit of a circus at times. Every other day, there's a new token promising to take you "to the moon" or offering some groundbreaking utility that'll change the game forever. But how many of them actually deliver on that hype?
how to swap pi coins to foreign currency withdrawable.DOT TECH
As of my last update, Pi is still in the testing phase and is not tradable on any exchanges.
However, Pi Network has announced plans to launch its Testnet and Mainnet in the future, which may include listing Pi on exchanges.
The current method for selling pi coins involves exchanging them with a pi vendor who purchases pi coins for investment reasons.
If you want to sell your pi coins, reach out to a pi vendor and sell them to anyone looking to sell pi coins from any country around the globe.
Below is the contact information for my personal pi vendor.
Telegram: @Pi_vendor_247
1. Elemental Economics - Introduction to mining.pdfNeal Brewster
After this first you should: Understand the nature of mining; have an awareness of the industry’s boundaries, corporate structure and size; appreciation the complex motivations and objectives of the industries’ various participants; know how mineral reserves are defined and estimated, and how they evolve over time.
Analyzing the instability of equilibrium in thr harrod domar model
a payment & receipt business model in u-commerce
1. A Payment & Receipt Business Model in U-Commerce
Environment
Kyoung Jun Lee Jeong-In Ju Jeong Mu Jeong
Kyung Hee University of Business Kyung Hee University of Business Design House
Administration Administration Taigwang Bldg., 162-1,
#1 Hoegi-dong Dongdaemun-Ku, #1 Hoegi-dong Dongdaemun-Ku, Jangchung-dong 2-ga ,Jung-gu,
Seoul 130-701, Korea Seoul 130-701, Korea Seoul 100-855, Korea
+82-2-961-0490 +82-2-961-0490 +82-2-2262-7164
klee@khu.ac.kr jji99@khu.ac.kr coolcoom@design.co.kr
ABSTRACT should have control over their personal information through user
focus group interview about MyGrocer and expressed a grave
The key to U-payment is convenience and security in the transfer concern about exposing private information to outsiders,
of financial information. The purpose of this paper is to find a especially to a profit-oriented company. Acquisti(2002) explained
desirable U-payment scheme promoting seamlessness and privacy the economic efficacy of privacy protection technologies and
with a consumer device and peer-based information transactions. Langheinrich (2001) proposed to set principles of privacy
We also propose a new business model through digital receipt protection and impose responsibility for invisible services as a
which is evidence of commercial decision making and transaction. way to protect privacy in the ubiquitous computing environments.
We propose U-PR (Ubiquitous Payment and Receipt) business Zugenmaier & Hohl (2003) emphasized the importance of
model and method as a way to make transactions seamless, secure keeping anonymity in the ubiquitous computing environments in
and privacy protected. order to protect user ID from being exposed to personal
information collection. However, payment, more than any other
areas, is susceptible to privacy concerns and thus merits special
Categories and Subject Descriptors attention.
J.1 [Computer Applications]: Administrative Data Processing –
Business; H.4.2 [Information Systems Applications]: Types of In general, for the protection of privacy, a user could make
Systems---decision support commercial transactions using false ID in some way when (s)he
finds it necessary or wants it to be so. In the process of searching
and comparing goods or haggling price, a buyer could make the
deal done without revealing his or her identity at his or her will.
Keywords Despite such efforts, however, in the final stage of a purchase, the
U-Commerce, Payment, Seamlessness, Privacy, U-Receipt, U- purchasing information is to be stored somewhere out there,
Coupon, Wireless Ad Hoc Peer to Peer Networking, Incentive resulting in infringement of privacy. For this reason, it turns out
Mechanism 1 that the buyer used false ID for nothing. There is a threat to
maintain privacy in a U-Commerce environment because of the
1. Introduction seamlessness caused by an increase in computing power device
U-Commerce is defined as the commercial interaction among resulting in a systematical management of the information. So, we
providers, consumers, products, and services, enabled and have to equip a way which is enhanced privacy protection
supported especially by (the real-world) seamless communication payment method.
of each entity's (digital) information (Lee & Ju 2005). The most
unique characteristic of the U-commerce is the seamlessness of In this paper, we will suggest new business model with privacy
the information between heterogeneous devices or network forms. and enforced seamlessness of the information called U-Payment
But, seamlessness of digital information has a privacy protocol and Payment which is using a receipt, an official
infringement especially payment. Floerkemeier et al. (2004) document of the payment.
proposed a RFID Protocol using “Watchdog Tag” as a way to
prevent infringement of privacy. Roussos & Moussouri (2004) 2. Suggestions of U-PR Business Model
suggested that users in the ubiquitous computing environments Privacy protection, a thorny issue of the ubiquitous computing
environments, is a critical element in the architecture of U-
1
Permission to make digital or hard copies of all or part of this work Payment method from the initial stage. Reflecting these factors,
for personal or classroom use is granted without fee provided that we propose U-PR business model.
copies are not made or distributed for profit or commercial
advantage and that copies bear this notice and the full citation on 2.1 Scenario
the first page. To copy otherwise, to republish, to post on servers Leon finishes a dinner at a restaurant called ‘Arirang’ on weekend
or to redistribute to lists, requires prior specific permission and/or with his girlfriend. Quite satisfied with the wonderful mood, Leon
a fee.
steps toward the cashier. The service name and price shows up on
ICEC’06, August 14–16, 2006, Fredericton, Canada. the monitor of the cashier and Leon has his UDA(Ubiquitous
Copyright 2006 ACM 1-59593-392-1. Digital Assistant) read the payment information on the cashier.
319
2. The payment application runs on Leon’ device and Leon confirms 1) Payer (Referrer): Purchases products from the stores or uses
the payment through an authentication process. After a few services. Stores digital receipts on his/her device and sends those
seconds, the confirmation message mentioning money sent from to potential customers in a form of U-Coupon.
Leon’s account appears on Leon’s device and the clerk also 2) Store: Product or service provider to customers. Payee devices
checks payee device showing transaction records. are installed at each store and it confirms payment information,
After the payment, the payee device at the restaurant sends digital issues digital receipt and checks coupon information.
receipt to Leon’s device. On the receipt Leon received, there was 3) Potential Customer: Receives coupon form the referrer, which
a list of dishes, prices, restaurant, map, etc and basic financial is generated from the digital receipt of the referrer.
information. Then, Leon sees digital receipt (called U-Receipt)
membership sign-up agreement page on the device. The owner of 4) U-Receipt Company: U-Receipt Company is a business leader
the store told Leon that if he signed up for the U-Receipt, he can of the business model and manages servers that stores digital
deliver digital coupon to other acquaintances and also can gather coupon and digital receipt which is a payment information
mileages. Leon thinks that is not harm so agreed and the Leon’s The Figure 1 shows the system architecture of the U-PR business
personal information for the membership is sent to payee device. model and the detail procedure is summarized in Figure 2.
On Monday morning at work, Leon is chatting with his colleague
Celline. While talking about the place called ‘Arirang’ that Leon
went on last weekend, Leon recommends the place to Celline.
Celline asked for the location. Leon sends the digital receipt by
converting into digital coupon to Celline through Bluetooth
networking and there are the location of the restaurant and 10
percent discount coupon in a form of U-Coupon. When Celline
goes to ‘Arirang’, she could get 10 percent discount because of
the U-Coupon. Leon receives 3 percent of Celline’s dinner as an
incentive by mileage.
2.2 Elements, Entities, and Architecture
There are three kinds of elements related to the U-PR(Ubiquitous
Payment and Receipt) business model as follows.
1) The payer device for gathering, processing, and storing the
payment-related Information: In U-PR, the payment-related Figure 1. U-Payment and Receipt System Architecture
information is read in from the payee device to the payer-device. (0. Receiving a service or buying a product)
A part of the transaction ID(payer_TID) is generated by the payer
Phase 1. Payment
device and it is integrated with another partial transaction ID
generated by the payee device. The integrated transaction 1-1) Payer device recognizes information such as product/service
ID(TID) became an equal, mutual and unique Transaction ID. The ID, price, encrypted payee ID, encrypted payee account number,
user authentication and payment are also processed by an and Payee_TID
application which runs on the payer device. Therefore, the payer 1-2) Transaction approval of the payer through an authentication
device is the main element among the U-PR business model and process embedded on the device.
possesses the largest amount of payment-related Information.
1-3) Payer device delivers the integrated transaction ID(TID) to
2) Payee device for generating the initial payment-related the Payee Device and simultaneously requests payment and the
information through the input of the service ID or the product tag TID to the payer bank
and generating a partial Transaction ID of the Payee(payee_TID):
After payment, a receipt information is generated to be 1-4) The price amount is transferred from the payer’s account to
transported to the payer device through the approval process of payee’s account.
the Transaction ID. 1-5) Payer bank notifies the transfer to payee device(TID and
transfer result)
3) Payer account and Payee account: The actual payment process
is carried out between the two accounts. The accounts exchange 1-6) Payee bank confirms the receipt of money to Payee device,
the minimal amount of transaction information and do not 1-7) Payee device transmits digital receipt and generate digital
monopolize payment-related information such as banks and credit receipt TID to Payer.
card companies.
1-8) Payee device uploads the receipt ID and payer information to
The payment process creates a new business opportunity by U-Receipt server.
generating and exchanging a digital coupon(U-Coupon) from the
1-9) U-Receipt server checks whether the payer is a member or
digital receipt(U-Receipt) that the payer keeps. From the new
not and if not, asks the payer to sign up.
business perspective, there are four kinds of economic entities as
follows. 1-10) Payer signs up for the membership.
320
3. Phase 2. Recommendation: Digital coupon Transmission 5. Payee ID: Information required when confirming the
payment of the payer in financial transactions between
The Payer (referrer) sends U-Coupon transformed from U-
financial institutions.
Receipt to potential customer’s device
Phase 3. Potential customer: Repeat the Phase 1 6. Transaction ID: The unique Transaction ID of each
transaction enables a payment and refund process to be
(This phase is almost the same as phase 1.) executed using an ID for the relevant transaction without the
Phase 4. Provide Incentives Payer and Payee having to possess each other’s ID. Such
Transaction ID combines the information that is
The potential customer uses the coupon that the referrer sent then
independently generated by the Payer and Payee.
the referrer receives incentive from the store.
7. Membership Information: The basic information of
Figure 2. Ubiquitous Payment and Receipt Procedure
membership in U-Receipt Business (e.g. Name, Cell Phone
Number, Address, etc.)
2.3 Information Possession of Each Entity 8. U-Receipt ID: The unique digital receipt number
Another feature of the U-PR business model is that it has an 9. U-Coupon ID: The unique digital coupon number
information possession structure in which the relevant entities
possess the minimal payment information thus maximizing the 10. Store Information: Business name, telephone number,
protection of privacy. Payer device or payee device does not address, map, owner and more.
posses the other party’s ID information and the payer account and The important feature of the Figure 3 is that the payer account and
payee account should not possess product list information as in payee account do not possess a product list and the payer and
Figure 3. payee also do not possess each other’s ID. A financial institution
possesses the other party’s ID for the transaction of financial
information but since it is a third party in the payment process it
does not possess information of the product list that might
infringe on the privacy of the payer. In the case of buyer and
seller, each financial institution that is involved in the payment
and payment confirmation process may use a Transaction ID
instead of exposing the IDs of the Payer and Payee to outside and
prevent the leakage of privacy information such as the IDs of
those participating in the transaction.
Also, potential customers only possess U-Coupon information
(e.g. Business Name, telephone number, discount rate, etc)
without the financial information of the referrer so the privacy of
them is protected and U-Receipt company does not own financial
information of referrer and potential customers.
Figure 3. Structure of Payment Information Possession
Eventually, for the value of ‘seamlessness’ and protection of
privacy to be provided by each payment, each entity should exist
The essential payment information for the payment process is as in a form in which the minimum payment information essential
follows. for payment is categorized. The overall U-Payment architecture
should be designed so that the payer account and payee account
1. Payment Amount: Refers to the price information of a do not possess the product list and the payer and payee do not
product or service. Refers to the total amount when there are posses the other party’s ID. Furthermore, for this to be possible,
a number of products and service. Transaction ID orientation is recommended rather than a Payer ID
oriented payment.
2. (Encrypted) Payee Account number: The account number of
the payee is the most important payment-related information
required in the seamless payment process. This is encrypted
3. Analysis of the Business Model
The scenario in the section 2 is on the customer’s perspective and
and transported to protect the privacy of the payee.
described in the focus of customer experience only to be
3. Product List: When possessed by a party who is not the understood by customers (Carroll & Rosson 1995). What is more,
payer the individual product name can be a serious threat to we could find out from the system perspective about information
privacy. Therefore, this information should be directly moving back and forth between servers, payee devices and user’s
possessed by those who are involved in the payment. devices. Now, we will talk about business model from perspective
of business entity in detail.
4. Payer ID: Information required when confirming the
payment of the payees in financial transactions between In terms of proposing the business model, we will use
financial institutions. representative researches from Timmers (1998), Mahadvan (1999),
and Rayport & Jawosky (2001). Timmers recognizes business
model from role and benefit of ‘business actors’, Mahadvan
thinks of three ‘flows’ and Rayport & Jaworski emphasizes
321
4. ‘customer’ among the actors. We will try to understand U-PR 20s or younger who do not have difficulties using digital receipt.
business model in detail from various perspectives based on these The value proposition that U-Receipt Company will suggest is
three definitions. that revenue increase through viral marketing, from stores to
referrer as an incentive, and discount to potential customer. The
Timmers (1998) defines business model as 1) An architecture for
marketspace offerings to realize the proposed value include
the product, service and information flows, including a
service that promotes the exchange of the digital information such
description of the various business actors and their roles, 2) A
as applications that support issuing the digital receipt. The unique
description of the potential benefits for the various business actors,
and defendable resource system can be structured by network
3) A description of the sources of revenues. Applying the
effect and that is obtaining the first mover advantage in the
definition business actors can be classified into four entities; U-
market with U-Receipt business item. Finally, financial model can
Receipt Company, stores, referrer, and potential customers. Each
be analyzed by advertisement costs.
role is as follows. U-Receipt company manages digital receipt and
coupon. Stores issue digital receipt and recollect coupons.
Referrer recommends to potential customers through viral 4. Evaluation
marketing and issue digital coupon. Potential customers create In this chapter, we will evaluate U-PR business model. First of all,
new purchase and convert themselves into referrer. we will compare our payment model to other payment methods,
and then our receipt model to existing receipt/coupon model.
The latent benefit that business actors will gain is as follows. U-
Receipt company gains advertisement fee. Stores may get 4.1 Comparison with Other Payment Method
increase in revenue, referrer gets reward from incentives and U-PR was designed to enhance seamlessness and protection of
potential customers may get a discount form the coupon. The privacy in Ubiquitous commerce environment. The comparison
Table 1 shows the relationship between business entities, roles of U-PR with other payment methods such as cash payment,
and potential benefit the each entity would obtain. credit card, and mobile payment will show how much the U-PR
Table 1. Who-What Table enhances the protection of privacy while improving seamlessness.
Providing
The dimension of evaluation includes seamlessness, privacy,
Entity Roles Incentives architecture, and PIB (Personal Information Base). We refine the
Value
seamlessness dimension into the two elements: transmission of
U-Receipt Gather stores, Manage Provide payment information and generation of hyperlink. In addition, we
Company digital receipt/coupon, advantages
Ads profit refine the privacy dimension to five elements: information
(Business adjust ad cost, manage of viral
leader) incentives marketing centralization, buyer identification, seller identification, product
(service) information, and privacy protection mechanism.
Economic
Appropriate ad cost,
benefit to Increased Firstly, U-PR is in the higher level of seamlessness than cash
Stores Issue U-Receipt,
business revenue
Recollect U-Coupon payment, credit card, and mobile payment because U-PR assumes
actors
the mobile device can read information about product or service
Possibility
Attribute to from the product itself or environment.
of
Referrer Issue U-Coupon commerce
economic
activation Secondly, in terms of information centralization, cash is very low
incentives
as it does not save any information on the payer. Information
Attribute to
Potential Purchase by
commerce
Coupon centralization in mobile payment is high because the credit card
customer recommendation, discount company and the mobile Telco may save all of the payment
activation
information for later bill. There can be also information revelation
in factors such as buyer identification, seller identification as the
Mahadevan(1999) defined business model: unique blend of three same reason. Meanwhile, U-PR saves minimum information of
streams critical to business. In the U-PR business model, value payer, payee, and bank.
stream is about delivering U-Coupon that was U-Receipt to
potential customer. A referrer sends potential customer to U- Cash payment does include neither buyer identification nor seller
coupon and then the potential customer gets the discount by the identification. Cash payment does not involve saving product or
coupon. Finally the referrer obtains the incentive. Revenue stream service information and uses the receipt that the payer holds,
is about sponsor paying the advertisement cost to the U-Receipt which may create anonymities. In the case of mobile payments,
Company, Referrer paying the store, potential customer paying the company keeps records of such transactions. U-PR does not
the store, and U-Receipt Company paying the incentives to the hold any records of product/service information. In addition,
referrer. Last of all, logistical stream is about providing privacy protection mechanism does not exist within cash or
product/service to the referrer or potential customers. mobile payments, while U-PR’s TID (Transaction ID) and PIB
have the mechanism, making it much more dependable for
Rayport & Jaworski(2001) defined business model as 1) Value privacy. So comparing with the other payment methods, U-PR
proposition or cluster for targeted customers, 2) Marketspace maintains high seamless and guarantees enhanced privacy.
offering (product, service & information), 3) Unique, defendable
resource system, 4) Financial model. Applying Rayport & Thirdly, cash payment and U-PR have a peer-to-peer payment
Jaworski’s definition, the target customers of U-Receipt Company mechanism while credit card and m-payment have a client/server
are stores that are willing to advertise. Mainly, for example, architecture saving a large part of commerce and payment
restaurant, hair shop, clothes shop are advantageous for viral information.
marketing. The specification of the target is that people in their
322
5. Table 2. Comparison with Other Payment Method supports systemized information restoration resulting in cutting
Credit Mobile down the commerce information management costs.
Cash U-PR
Card Payment
Seamlessness
Non- Non-
Transmission Low High
existing existing Paper Coupon & Electronic Coupon
Hyperlink
Non- Non-
Low High
Coupons also can be distinguished from the paper one to the
existing existing
electronic one. The reason that issuing a coupon is to promote
Information
Low High High Low more purchase using discount strategy and more and more people
Centralization
are using it. Most of the people use paper coupon, struggling from
Buyer Non-
Revealed Revealed
Protected from collecting and storing. Electronic coupon is provided in a form of
Identification existing Seller
event at an e-commerce site, valid during the certain time limit
Seller Non- Protected from suggested by the membership level or a downloadable from the
Revealed Revealed
Identification existing Buyer
Privacy
mobile.
Product Protected from
High
(Service) Revealed Revealed financial In the case of U-Receipt, it is more information-controllable and
Protected
Information institution
convenient to the users compared to paper coupon and the
Transaction ID, functions of recommending and protecting privacy is enforced
Privacy
Non- Non- and Personal
Protection Inherent compared to electronic coupon. The figure below is a comparison
existing existing Information
Mechanism
Base value curve of U-Receipt with paper receipt, electronic receipt,
P2P Client Client paper coupon, and electronic coupon.
Architect /Server /Server P2P Architecture
Architecture
ure Architectur Architectur Possible
Possible e e
PIB (Personal Non- Non- Non-
Applicable
Information Base) existing existing existing
The Table 2 shows the differences between U-PR and other
payment methods.
Specially, m-Payment need more analysis compared with U-PR
because, at a first glance, the two methods look similar. m-
Payment is the type of transaction that uses device embedded with
credit card chip so the payment method is almost the same as the
credit card’s. In addition, the payment method of m-Payment and
Figure 4. U-Receipt Value Curve
credit card is server-based payment method which stores much
private information. Therefore, the most outstanding difference Comparing paper receipt, electronic receipt, paper coupon, and
between the credit card and U-PR is the perspective of privacy electronic coupon with U-Receipt, paper/electronic receipt does
protection and the possible design of new receipt business model. not support recommendation or advertisement and
paper/electronic coupon does not aid commerce information
U-PR also enables the so called peer-to-peer payment where both management function. Paper receipt and coupon are volatile so
the payment systems of payer and payee are integrated within an personal information is easy to access however, it is difficult to
individual device. It suggests a way of safe transactions between a store and manage. Considering every aspect mentioned above, U-
seller and a buyer whose IDs are not exposed through the use of Receipt business model proposes relatively overwhelming value.
Transaction ID in the flow process of payment information.
5. Related Works
4.2 Comparison with Electronic Receipt Nokia NFC is equipped with smart card chip inside the cellular
In this section, we will evaluate the relative value of the U- phone and it is designed to contactlessly transact using 13.56MHz.
Receipt through comparison with paper and electronic receipt. Representative functions are payment and ticketing (e.g. Parking,
Canteen, Bus tickets, Movie tickets, Ski Lift) and designed with
Java language application. The similarity between Nokia NFC
Paper and Electronic Receipt
and U-PR is that both are designed to pay by mobile device and
The receipt that most widely common in use is a paper receipt. the difference is that Nokia NFC embeds smart card ship in the
Paper receipt is for the use of change or refund and if not, device that follows the method of credit card type.
discarded. On the other hand, electronic receipt is to cover the
inefficiency of the paper receipt and gaining its popularity. For Felica, a wallet cellular phone from NTT DoCoMo, is a financial
example, it is used as a proof of purchase from the internet E- cellular phone service which is quipped with Felica from Sony
commerce. Electronic receipt is automatically saved on the server and provides management of transportation, distribution, and
so there is no need to keep the receipt but it is not easy to inspect finance related personal information. Moreover, a service that
all the integrated commerce information. Also, as all of the integrates cellular phone and Suica, digital season ticket of JR is
information is restored at the server, there is a possibility for performed. The fact that type of transaction is not a type designed
privacy to be infringed. However, U-Receipt can bring the effect for users’ privacy protection can be regarded as a difference with
of reducing the cost of paper receipt to business entities and U-Payment.
323
6. Kourouthanasis et al. (2002), Boddupalli et al. (2003), Seigneur & 10( 2), pp. 181-212.
Jensen (2004) and more studied about payment system. The
differences between the existing payment system and the one this Floerkemeier, C., Schneider, R. and Langheinrich M.
study proposes are that the device of user’s payment system is (2004) “Scanning with a Purpose – Supporting the Fair
always reinforced, that those participants in payment own and Information Principles in RFID Protocols,” Institute for
control all information and that privacy protection is to a great Pervasive Computing.
extent strengthened by the use of Transaction ID and prevention
of the exposure of ID. Kourouthanasis, P., Spinellis, D., Roussos, G. and Giaglis,
G. (2002). “Intelligent cokes and diapers: MyGrocer
On the other hand, research of Shojima (2003) is about the ubiquitous computing environment,” In First International
process sending the electronic coupon in a P2P type. The
similarity with this research is that utilizing P2P networking as a
Mobile Business Conference, pp. 150–172.
mean to deliver electronic coupon and providing incentives. Langheinrich, M. (2001). “Privacy by Design - Principles
Nevertheless, the research of Shojima (2003) was concentrated on of Privacy-Aware Ubiquitous Systems,” Ubicomp, pp. 273-
protecting the records or information about the coupon during the 291.
delivery process and suggested to solve the problems related to
user’s moral hazard (changing the discount rate of the coupon or Lee, K. J. and Ju, J. I. (2005), “The design of U-Commerce
deleting the valid date) by technological perspective such as using enhanced seamlessness and privacy protection,” 2005
an encryption. The difference with this research is that Shojima Proceedings of the KIISS (Korea Intelligent Information
only demonstrated coupon delivery method while this paper Systems Society).
illustrates the new concept of creating a coupon and also delicate
business model. Lee, K.J., Jeong, M.J., and Ju, J.I. (2006), Seamlessness &
Privacy Enhanced Ubiquitous Payment, To be presented at
6. Conclusions the 7th International Conference on Electronic Commerce
This paper explains U-Payment and U-Receipt business model and Web Technologies(EC-Web 2006), Krakow, Poland.
designed to improve privacy protection while promoting the
seamlessness between economic entities. Even more, the U- Mahadevan, B. (2000), “Business Models for Internet-
Payment environment opens a new business opportunity. Through Based e-Commerce,” California Management Review,
the augmented seamlessness. 42(4), pp. 55-69, Summer.
To intensify the understanding of this business model, we show Rayport, J. and Jaworski, B. (2001), e-Commerce,
scenario, system architecture, business process and models, and
McGraw-Hill.
the discussion about the evaluation. This business model is an
experimental model of U-commerce which is possible in a Roussos, G. and Moussouri, T. (2004) “Consumer
seamlessness environment and increase of the computing power perceptions of privacy, security and trust in ubiquitous
and this will work as a great medium to connect transaction commerce,” Personal and Ubiquitous Computing, Vol. 8,
business model and marketing model.
No. 6, pp.416-429.
7. Acknowledgments Seigneur, J. and Jensen, C.D. (2004). "Trust Enhanced
This research is supported by the Ubiquitous Autonomic Ubiquitous Payment without Too Much Privacy Loss," In
Computing and Network Project, the Ministry of Information and Proceedings of the 19th Annual ACM Symposium on
Communication (MIC) 21st Century Frontier R&D Program in Applied Computing, Vol. 03, pp.1593-1599.
Korea.
Shojima T., Takada Y., Komoda N., Oiso H. and
Hiramatsu A. (2003), “An Incentive Attached Peer to Peer
8. References Electronical Coupon System,” Communications, Internet,
Acquisti, A. (2002). “Protecting Privacy with Economics: and Information Technology.
Economic Incentives for Preventive Technologies in
Ubiquitous Computing Environments,” Workshop on Timmers P. (1998), “Business Model for Electronic
Socially-informed Design of Privacy-enhancing Solutions, Markets,” Electronic Markets, 8(2), pp. 3-8.
4th International Conference on Ubiquitous Computing Zugenmaier, A. and Hohl, A. (2003) “Anonymity for
(UBICOMP 02). Users of Ubiquitous Computing,” Security-Workshop at
Boddupalli, P., Al-Bin-Ali, F., Davies, N., Friday, A., Storz, UbiComp..
O. and Wu, M. (2003) “Payment Support in Ubiquitous
Computing Environments,” IEEE Workshop on Mobile
Computing Systems and Applications, pp. 110-121.
Carroll, J.M. and Rosson, M.B. (1992), “Getting around
the task-artefact cycle: How to make claims and design by
scenario,” ACM Transactions on Information Systems,
324