题名

具便捷性與安全性之行動消費者主導交易協定

并列篇名

A Convenient and Secure Buyer-driven Transaction Protocol over the Mobile Internet

DOI

10.6382/JIM.200610.0013

作者

薛夙珍(Sue-Chen Hsueh);陳星百(Hsing-Bai Chen)

关键词

行動商務 ; 消費者主導 ; 資訊安全 ; 個人化 ; mobile commerce ; buyer-driven commerce model ; undeniable transactions ; personalization

期刊名称

資訊管理學報

卷期/出版年月

13卷4期(2006 / 10 / 01)

页次

103 - 132

内容语文

繁體中文

中文摘要

隨著無線網路基礎建設的日趨成熟與手持設備的普及,促進了行動商務的發展,使得行動網路上所呈現的商品與服務種類日益豐富。然而,受制於行動設備有限資源之行動用戶在運用以商家主導之商業模式,經常需花費大量的資訊蒐集時間與連線成本,此外,繁複的行動交易程序更將降低其參與之意願。本文提出兼具便捷性與安全性之全球化行動消費者主導交易協定,應用條件採購單交易模式於資源珍貴之行動商務環境,減少所需耗費的搜尋與交易成本,並降低對行動設備之輸出入與通訊等資源需求。協定的設計藉由採購條件之提出,賦予行動消費者主導商品樣式與價格之權利,與符合其消費需求的潛在商家進行交易,以提供消費者一個兼具個人化與最高購物效益的交易模式。此外,協定採用具效率之密碼技術,以適應於低運算資源的行動環境下運作,並建立安全與公平之全球化行動交易環境,進而保障買賣雙方之交易權益。

英文摘要

Wireless technology is boosting the accessibility of Internet services to mobile users. Having the easy-to-carry mobile devices, mobile users now may conduct transactions anytime and anywhere, but they also suffer from the restrictions like limited computing power, small storage space, poor input/output interfaces, etc. Using such resource-limited devices to search services/products in the traditional seller-driven commercial model is more time-consuming than ever. To reduce the search time and the connection costs of mobile users, this paper presents a secure and convenient buyer-driven commerce model. We adopt and improve the conditional-purchase ordering mechanism, which allows users to specify their unique requirements and filter the intended merchants on public servers. We also provide light-weight security mechanisms for confidential and undeniable transactions without demanding high-end mobile devices. Therefore, both buyers and sellers will benefit from the personalized mobile commerce model.

主题分类 基礎與應用科學 > 資訊科學
社會科學 > 管理學
参考文献
  1. Asokan, N.,Janson, P.A.,Steiner, M.,Waidner, M.(1997).The State of the Art in Electronic Payment Systems.IEEE Computer,30(9),28-35.
  2. Barnes, S.J.(2002).The Mobile Commerce Value Chain: Analysis and Future Developments.International Journal of Information Management,22(2),91-108.
  3. Bird, R.,Gopal, I.,Herzberg, A.,Janson, P.,Kutten, S.,Molva, R.,Yung, M.(1995).The KryptoKnight Family of Light-Weight Protocols for Authentication and Key Distribution.IEEE/ACM Transactions on Networking,3(1),31-41.
  4. Boman, K.,Horn, G.,Howard, P.,Niemi, V.(2002).UMTS Security.Electronics & Communication Engineering Journal,14(5),191-204.
  5. Chen, H.B.,Hsueh, S. C.(2003).Light-weight Authentication and Billing in Mobile Communications.Proceedings of the 37th IEEE International Carnahan Conference on Security Technology,Taipei, Taiwan:
  6. Dai, Y.,Zhang, L.(2003).A Security Payment Scheme of Mobile E-Commerce.Proceedings of the International Conference on Communication Technology,2,949-952.
  7. Mobile Payment Systems
  8. Diffie, W.,Hellman, M.(1976).New Directions in Cryptography.IEEE Transactions on Information Theory,22(6),644-654.
  9. Mobile Commerce Report
  10. ElGamal, T.(1985).A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.IEEE Transactions on Information Theory,31(4),469-472.
  11. Foo, E.,C. Boyd(1998).Passive Entities: A Strategy for Electronic Payment Design.Proceedings of the 5th Australasian Conference on Information Security and Privacy, LNCS 1841
  12. Foo, E.,C. Boyd(1998).A Payment Scheme using Vouchers.Proceedings of the Financial Cryptology Conference, LNCS 1465
  13. Ginzboorg, P.(2000).Seven Comments on Charging and Billing.Communications of the ACM,43(11),89-92.
  14. Grecas, C.F.,Maniatis, S. I.,Venieris, I. S.(2003).Introduction of the Asymmetric Cryptography in GSM, GPRS, UMTS, and Its Public Key Infrastructure Integration.Mobile Networks and Applications,8(2),145-150.
  15. Herzberg, A.(2003).Payments and Banking with Mobile Personal Devices.Communications of the ACM,46(5),53-58.
  16. Horn, G.,Preneel, B.(2000).Authentication and Payment in Future Mobile Systems.Journal of Computer Security,8,183-207.
  17. Jin, L.,Ren, S.,Feng, L.,Hua, G. Z.(2002).Research on WAP Client Supports SET Payment Protocol.IEEE Wireless Communications,9(1),90-95.
  18. Kalakota, R.,Robinson, M.(2001).M-Business: the Race to Mobility.McGraw-Hill.
  19. Kelsey, J.,Schneier, B.(1997).Conditional Purchase Orders.Proceedings of the 4th ACM Conference on Computer and Communications Security
  20. Kim, M.A.,Lee, H. K.,Kim, S.W.,Lee, W. H.,Kang, E. K.(2002).Implementation of Anonymity-Based E-Payment System for M-Commerce.Proceedings of the IEEE 2002 International Conference on Communications, Circuits and Systems and West Sino Expositions,1,363-366.
  21. Lin, C. H.,Dow, C.R.(2001).Efficient Checkpoint-based Failure Recovery Techniques in Mobile Computing Systems.Journal of Information Science and Engineering,17,549-573.
  22. Lin, T. H.,Shin, K. G.(1998).Damage Assessment for Optimal Rollback Recovery.IEEE Transactions on Computers,47(5),603-613.
  23. Naruse, K.(2002).Findings of the Mobile-Users Survey.ECOM Journal,4,52-57.
  24. Subscriber growth
  25. Pagliusi, P.S.(2000).A Contemporary Foreword on GSM Security.Proceedings of International Conference on Infrastructure Security, LNCS 2437
  26. Park, T.,Woo, N.,Yeom, H. Y.(2002).An Efficient Optimistic Message Logging Scheme for Recoverable Mobile Computing Systems.IEEE Transactions on Mobile Computing,1(4),265-277.
  27. Park, T.,Woo, N.,Yeom, H. Y.(2003).An Efficient Recovery Scheme for Fault-Tolerant Mobile Computing Systems.Future Generation Computer Systems,19(1),37-53.
  28. Samfat, D.,Molva, R.,Tsudik, G.(1994).Authentication of Mobile Users.IEEE Network, Special Issue on Mobile Communications Technologies,8(2),26-34.
  29. Schneier, B.(1996).Applied Cryptography.New York:John Wiley and Sons.
  30. Senn, J. A.(2000).The Emergence of M-Commerce.IEEE Computer,33(12),148-150.
  31. Shelfer, K. M.,Procaccino, J. D.(2002).Smart Card Evolution.Communications of the ACM,45(7),83-88.
  32. Sirbu, M.A.(1997).Credits and Debits on the Internet.IEEE Spectrum,34(2),23-29.
  33. Stach, J. F.,Park, E. K.,Makki, K.(1999).Performance of An Enhanced GSM Protocol Supporting Non-Repudiation of Service.Computer Communications,22(7),675-680.
  34. Tsalgatidou, A.,Pitoura, E.(2001).Business Models and Transactions in Mobile Electronic Commerce: Requirements and Properties.Computer Networks,37,221-236.
  35. Varshney, U.(2002).Mobile Payments.IEEE Computer,35(12),120-121.
  36. Varshney, U. R.,Vetter, J.,Kalakota, R.(2000).Mobile Commerce: A New Frontier.IEEE Computer,33(10),32-38.
  37. Zheng, X.,Chen, D.(2003).Study of Mobile Payments System.Proceedings of the IEEE International Conference on E-Commerce
被引用次数
  1. 廖俊威,葉昌國,陳貴琬,陳星百(2013)。結合網路口碑通訊與具隱私保護之適地性服務。修平學報,26,103-121。
  2. (2011)。採用障礙與抵制型態對創新抵制影響模式之研究。朝陽商管評論,10(1),21-51。