• Title/Summary/Keyword: 거래활동성

Search Result 219, Processing Time 0.024 seconds

Spatial analysis of financial activities in the Korean urban system (한국 금융의 공간적 특색에 관한 연구)

  • Choi, Jae Heon
    • Journal of the Korean Geographical Society
    • /
    • v.28 no.4
    • /
    • pp.321-355
    • /
    • 1993
  • This paper focuses on the geographical pattern of financial activities in the Korean urban system during 1975-1990, based on the assumption that financial activities can reveal control points in Korea's urban economy. In terms of spatial evolution of financial insitutions, different locational characteristics are revealed among different types of financial institutions, implying the role of urban hierarchy. Financial resources are highly concentrated in the capital region, Seoul and Kyonggi Province. Both centralization trends into the large metropolitan cities and relative declines of medium and small cities within the Korean urban system, have been experienced over the study period. Financial activities sustain relatively stable hierarchical structure in the urban hierarchy. Regarding the financial flows, dominant flow zones centered on major metropolitan cities are identified, clearly showing a prominant role of Seoul in financial flows in the entire urban system.

  • PDF

A Study of Definition of Security Requirements on Encryption and Audit Logging (암호화와 감사 로깅에서 보안 요건 정의 연구)

  • Shin, Seong-Yoon;Lee, Kang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.85-91
    • /
    • 2014
  • Encryption is a method to convert information to no-sense code in order to prevent data from being lost or altered by use of illegal means. Audit logging creates audit log of users' activities, exceptions, and information security events, and then conserves it for a certain period for investigation and access-control auditing. Our paper suggests that confidentiality and integrity of information should be guaranteed when transmitting and storing important information in encryption. Encryption should consider both one-way encryption and two-way one and that encryption key should assure security. Also, all history related to electronic financial transactions should be logged and kept. And, it should be considered to check the details of application access log and major information. In this paper, we take a real example of encryption and log audit for safe data transmission and periodic check.

A Study on Wireless PKI Technology Standard (무선 PKI 기술 표준에 관한 연구)

  • Sung, Yeon-Guk;Kim, Hyun-Chul;Jung, Jin-Wook;Kim, Soon-Chul;Ryu, Won
    • Convergence Security Journal
    • /
    • v.2 no.2
    • /
    • pp.29-38
    • /
    • 2002
  • Everyday demand of wireless internet is increasing. Security problem is certainly resolved for wireless internet activation. Especially problem is only wiretap in mobile communication with voice, but problems, user authentication, data integrity guarantee etc., are resolved in data-services that have commercial transaction over simple data information service such bill, banking. Necessity of wireless PKI that can offer security service likely in wired environment is requested for offering security service in wireless environment. For offering security services, confidentiality, integrity, non-repudiation etc, that of offered in wired environment in wireless environment, first it must construct wireless PKI infrastructure and do service activity. This paper analyze various wireless internet technology for offering safe wireless internet service and wireless PH standards. Performance Result of this paper expect activity of safe wireless PH service and activity of electronic commercial transaction used wireless internet such banking service, bill transaction, online shopping.

  • PDF

Pre- and Post-Tax Audit Differences of The Firm Value (세무조사전후의 기업가치의 차이)

  • Park, Sang-Seob;Lee, Hyun-Joo
    • Management & Information Systems Review
    • /
    • v.34 no.2
    • /
    • pp.207-227
    • /
    • 2015
  • This study addresses and examines differences in firm value after tax audits by the Korean Internal Revenue Service. Tax audits can potentially depreciate a firm's value due to the mass cash outflow that often results from the additional tax charges involved. However, tax audits that reveal negative aspects of a business, such as excessive entertainment expenses, fraudulent accounting, or inappropriate business practices, may have positive effects on a firm's value, as the monitoring involved can improve accounting transparency and reduce agency costs. This study shows that there is typically an increase in a firm's value in the year after a tax audit has been conducted, in comparison with the previous year. This result suggests that firm value can increase after a tax audit is conducted, despite the possible value depreciation resulting from a mass cash outflow.

  • PDF

Logistic Regression Model on the copyright licence diversification through interindividual Digital Contents distribution (개인간 디지털콘텐츠 유통상의 라이선스 다양화에 대한 로지스틱 회귀모형)

  • Suh, Hye-Sun
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.27-33
    • /
    • 2016
  • I would like to analyze the customers accommodation availability of the provisional 'smart board,' having specific mode and style, as a circulation platform of digital contents with using a statistic model in order to find a way and means to activate legal circulation of convergence individual products. The smart board means a circulation platform for both users' convenience and copyright protection, by being conveniently able to upload personal convergence digital contents or apply various licence to the uploaded contents according to the purpose of use. Under these premises of the smart board, this paper is going to focus on verifying to find out which factors, such as users' profile attributes, contents using behaviors, awareness of licence and etc, influence on the intention of using the smart board of general users by using a logistic regression model.

Development of Career Management System with Rewarding Policy Considering the Ethereum Blockchain Performance (이더리움 블록체인의 성능을 고려한 보상정책을 갖는 이력관리 시스템 개발)

  • Jung-Min Hong;Ye-Jin Kim;Yu-Jeong Kim;Hye-Jeong Park;Eun-Seong Kang;Hyung-Jong Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.59-67
    • /
    • 2023
  • Private blockchains can apply enhanced security policies that allow only authorized users to participate in the blockchain network. In addition, when used in a career management system where the validity of an individual's career is important, it has the suitable characteristics in terms of information integrity. However, due to the excessive performance requirements of blockchain technology, identifying performance characteristics through simulation can be helpful in stable operation of the system. This paper presents research results that utilized performance evaluation results while constructing a career management system based on the Ethereum blockchain. The service not only serves as a portfolio that records personal career development activities, certification acquisition, and award results, but also provides a community function for career planning to strengthen employment competitiveness. In addition, we present how a compensation policy can be executed to encourage users to participate in career development through community activities. In particular, an appropriate compensation policy was derived by reviewing changes in performance characteristics in accordance with the transaction volume on Geth nodes.

The Influence of Self-discrepancy in Virtual and Cross Worlds on Individuals' Activities in Online Communities (가상세계 및 공간간의 자기차이가 온라인 커뮤니티 활동에 미치는 영향에 관한 연구)

  • Lee, Ju-Min;Shin, Kyung-Shik;Suh, A-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.3
    • /
    • pp.23-45
    • /
    • 2011
  • People could possess different self-identity under virtual world from physical world because of anonymity of the virtual world and this difference could influence their behavior in the virtual world. Based on self-discrepancy theory, this research proposes that continuous use model in self-expression goal. We defined the difference bet ween actual self~identity and ideal self~identity in the virtual world as "self-discrepancy in virtual world", and the difference between actual self-identity in the physical world and actual self-identity in the virtual world as "cross-world self-discrepancy". Before testing hypothesis, we compare the actual self-identity in the online community with the actual self-identity in the physical world, and with ideal self-identity in the virtual world. We derived an index for two different types of self-identity in terms of Personal Self-identity and Social Self-identity through factor analysis. Our results show that online community members have a higher level of ideal self-identity than actual self-identity in online community, and they have better personal self-identity in online community than physical world while a lower level of social self-identity in online community than physical world. The results of the hypothesis testing analysis based on 300 respondents showed that "self-discrepancy in virtual world" negatively influenced perceived usefulness for self-expression while "cross-world self-discrepancy" positively influenced perceived usefulness for self-expression. The perceived usefulness for self-expression and ease of use positively influence both continuous use and knowledge contribution. Specially, the effect of perceived usefulness for self-expression on knowledge contribution is much bigger than the effect of ease of use. This study extends self-discrepancy theory to virtual worlds by suggesting various types of self-discrepancy and by applying the effect of self-discrepancies in online community. Also, this study extends technology acceptance model in the personal goal in terms of self-expression. This study hopes to offer practical insights by suggesting positive effect of self-discrepancy on behavior in the online community.

A study on antecedents of relationship strength in a B2B environment: Focusing on export manufacturing corporations (B2B 관계강화에 영향을 미치는 선행요인에 관한 연구: 수출 제조기업을 중심으로)

  • Choi, Jong-Hwa;Lee, Hyun Ju;Kang, Gi-Du
    • International Commerce and Information Review
    • /
    • v.16 no.4
    • /
    • pp.3-34
    • /
    • 2014
  • Nowadays to thrive on the intensively competitive environments based on drastic and rapid technical evolutions, exporting manufacturing companies need to keep very stable relationship with suppliers. Thus, analyzing key factors of strengthening relationship with suppliers in a B2B environment is important. In this regard, this study develops a research model to deeply understand key antecedents of relationship strength between B2B companies. Relationship quality was considered as the key factor affecting to the relationship strength. This study considers relationship satisfaction, trust, and relationship commitment as the factors of relationship quality. Moreover, technical service quality and relational service quality were considered to be the antecedents of relationship satisfaction, while communication and information exchange, relationship policies and practices, and opportunistic behavior were regarded as the antecedents of trust. The PLS method was applied for the empirical analysis of 107 companies data. The results indicated that the relationship commitment has a significant impact on relationship strength. Moreover, relationship satisfaction and trust had indirectly impact on relationship strength through relationship commitment. Although the quality of technical service quality had a significant impact on relationship satisfaction, relational service quality did not have a significant impact. While communication and information exchange, relationship policies, and practices had positively significant impacts, opportunistic behavior had a negative impact.

  • PDF

The Effect of Anonymity on Virtual Team Performance in Online Communities (온라인 커뮤니티 내 익명성이 가상 팀 성과에 미치는 영향)

  • Lee, Un-Kon;Lee, Aeri;Kim, Kyong Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.217-241
    • /
    • 2015
  • One of the challenges in online community management is what level of perceived anonymity can be granted to encourage active participation from members while discouraging unhealthy activities. Few studies developed a scheme of anonymity and investigated how different levels of anonymity influence community activities. This study develops a classification scheme of anonymity encompassing the following three different levels : (1) real name(no anonymity), (2) nickname (partial anonymity), and (3) random assignment of a temporal ID (complete anonymity). Then, it examines how different levels of anonymity influence trust and perceived risk, which in turn affect virtual team performance. A series of laboratory experiments were performed, manipulating the levels of anonymity, in the context of well-structured communities that allow prior interactions among community members. The data was collected from 364 laboratory participants and analyzed using ANOVA and PLS. The results indicate that the difference of anonymity between (2) and (3) had not be significant and the only (1) could not guarantee the anonymity. The impact of anonymity on trust and perceived risk could not be significant in this situation. These findings could contribute to make more beneficial member identification strategies in online community practice.

CALS환경에서 기업간 정보공유의 범위에 관한 연구

  • 고일상
    • Proceedings of the CALSEC Conference
    • /
    • 1999.07a
    • /
    • pp.41-50
    • /
    • 1999
  • 최근의 CALS 시스템 구축 가속화 및 전자상거래 활성화 분위기는 정보기술의 전략적 활용의 초점을 개별기업 위주에서 기업간 협력체제 구축과 이를 바탕으로 하는 기업간 전자적 결합(Electronic Integration)으로 옮기고 있다. 우리는 정보기술의 공유를 기반으로 새로운 기업간의 관계를 구축할 수 있으며, 이러한 관계를 전략적으로 활용함으로써 기존 사업에서의 경쟁우위 뿐만 아니라, 새로운 사업기회를 창출할 수 있다. 관련기업간의 데이터 표준화를 통한 정보의 공유는 CALS 시스템 구축의 바탕이 된다고 할 수 있는데, 정보공유의 범위는 산업별 특성과 제품별 특성에 따라 달라질 수밖에 없으며, 관련기업간의 교섭력(Bargaining Power)에 의해서도 영향을 받게된다. CALS 환경에서는 개별기업의 정보전략에 따라 수직적 협력관계에 있는 기업들간의 정보공유 정도와 수평적 협력관계에 있는 기업들간의 정보공유 정도가 결정된다고 할 수 있다. 정보공유의 범위를 설정하는 데에는 기업간에 이루어지는 업무의 성격, 공급-제조-유통으로 연결되는 관련기업간의 구조 등도 크게 영향을 미치는 것으로 파악되고 있다. 이 연구에서는 CALS 시스템 구축과정에서 우리가 고려할 수 있는 정보공유의 범위를 관련업무공유, 시스템공유, 부품 설비공유, 시설공유 등의 관점에서 분석하여 봄으로써, 각 산업별로 진행되고 있는 시범사업들의 시스템 영역의 범위를 재조명해보고자 한다. 이 연구에서 집중적으로 다루게 될 정보공유의 범위에 대한 내용은 CALS 시스템을 개발하려는 기업들의 응용서비스 개발 및 정보전략 구축에 중요한 공헌을 할 수 있을 것으로 기대된다.진" 사업에 대한 표준 설정을 위하여 노스캐롤라이나주 지방보건소의 "보건교육/건강증진" 표준체제를 예로 들었다. 다음으로, 경제적인 효율면에서 볼 때 "보건교육/건강증진" 사업에는 단기 혹은 장기 투자가치가 있는가 하는 것이다. 새로 태어나는 미국 지방 보건소의 "보건교육/건강증진" 활동은 지역 시민 및 그 단체가 광범위하고도 자연 다발적으로 참여할 때만 성공할 수 있다고 결론 지울 수 있다.한 분야별 전문가시스템 개발을 지양하고 MCRDR이론을 기반으로 한 범용성 있는 전문가시스템 개발 툴의 개발에 관한 연구를 소개한다. 후 새로운 지식을 얻는 반복적인 Explanation-based Data Mining Architecture를 제시하였다. 본 연구의 의의로는 데이타 마이닝을 통한 귀납적 지식생성에 있어 귀납적 오류의 발생을 고메인 지식을 통해 설명가능 함을 보임으로 검증하고 아울러 이러한 설명을 통해 연역적으로 새로운 가설지식을 생성시켜 이를 가설검증방식으로 검증함으로써 귀납적 접근과 연역적 접근의 통합 데이타 마이닝 접근을 제시하였다는데 있다.gical learning to give information necessary to improve the making. program and policy decision making, The objectives of the study are to develop the methodology of modeling the socioeconomic evaluation, and build up the practical socioeconomic evaluation model of the HAN projec

  • PDF