• Title/Summary/Keyword: Business Rule

Search Result 426, Processing Time 0.023 seconds

Article 61bis of the Aviation Business Act and the Legal Principles for the Aviation Consumers Protection - Comparison with the U.S. "Tarmac Delay Rule" - (항공사업법 제61조의2 신설과 항공소비자 보호 법리 -미국의 "Tarmac delay rule"과 비교를 중심으로-)

  • Baek, Kyeong-Won;Hwang, Ho-Won
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.35 no.2
    • /
    • pp.169-195
    • /
    • 2020
  • With the increase in air transportation, air delays are inevitable, and the damage of air consumers is also increasing. In Korea, the Ministry of Land, Infrastructure and Transport announced 「the Criteria for Protection of Users of Air Transportation」, but the Criteria does not include aviation delays except Tarmac delay, but this criteria is a only public notice, not an Act. Lately, a clause about Tarmac delay was newly established as Article 61bis of the Aviation Business Act, and was enacted from May 27, 2020. The Air carriers' Tarmac delay are subject to mandatory regulations. This research showed how lawsuits were implemented for the protection of aviation consumers related to aviation delays prior to the imposition of this article. In addition, the study examined at the public law level, whether the protection rights of aviation consumers is the fundamental right under the Constitution and whether the government should be the main subjects of consumer protection. And then we studied the effect of enforcement about the Tarmac Delay Rule of the United States. This rule acts as a federal regulation. Subsequently, the Biscone case presented that it was not easy for the US court to accept a lawsuit against the passengers for tarmac delay. There are limitations in remedying the damages of airline consumers due to delays either in Korea trial or the U.S. trial. Finally it needs strengthening the penalty to secure the effectiveness of the Tarmac delay clause regulations. In order to protect airline consumers, it was proposed that the protection of aviation consumer law should be established through the revision as the Enforcement Rules of the Airline Business Act.

A Rule-based JMS Message Routing System for Dynamic Message Communication in based Distributed Systems (분산환경에서 동적 메시지 교환을 위한 룰 기반 JMS 메시지 라우팅 시스템)

  • Cho, Poong-Youn;Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.3
    • /
    • pp.1-20
    • /
    • 2008
  • Today's computing environment which is getting distributed to communicate with various systems needs dynamic inter-connectivity of the systems. MOM(Message Oriented Middleware) is popularly used for transmitting XML messages among the distributed systems for the inter-connectivity. But, they do not support event-based message routing functionalities with XML transformation for processing effective message routing, which is essential to inter-connectivity, and there is no integrated platform to cope with these requirements. Although event-based message routing and XML transformation have been studied in a wide range of computer science areas, development of message routing systems is considered as a tough job due to the technological difficulties. In order to address these requirements, we proposed a novel system, named RMRS(Rule-based Message Routing System), which supports event-based message routing as well as XML message transformation. To make the proposed system easy to use, we also redesigned ECA(Event- Condition-Action) rule to fit in our system and developed a tool to map source XML structure into target XML structure.

  • PDF

Analysis of the Impact of Initial Carbon Emission Permits Allocation on Economic Growth (초기 탄소배출권 배분이 경제성장에 미치는 영향 분석)

  • Park, Sunyoung;Kim, Dong Koo
    • Environmental and Resource Economics Review
    • /
    • v.20 no.2
    • /
    • pp.167-198
    • /
    • 2011
  • The Korean government recently announced greenhouse gases (GHG) emissions reduction target as 30% of 2020 business as usual (BAU) emission projection. As carbon emissions trading is widely used to achieve reductions in the emissions of pollutants, this study deals with the sectoral allocation of initial carbon emission permits in Korea. This research tests the effectiveness of a variety of allocation rules based on the bankruptcy problem in cooperative game theory and hybrid input-output tables which combines environmental statistics with input-output tables. The impact of initial emission permits allocation on economic growth is also analyzed through green growth accounting. According to the analysis result, annual GDP growth rate of Korea is expected to be 4.03%, 4.23%, and 3.67% under Proportional, Constrained Equal Awards, and Constrained Equal Losses rules, respectively. These rates are approximately from 0.69% points to 0.13% points lower than the growth rate of 4.36% without compulsory $CO_2$ reduction. Thus, CEA rule is the most favorable in terms of GDP growth. This study confirms the importance of industry level study on the carbon reduction plan and initial carbon emission permits should reflect the characteristic of each industry.

  • PDF

Fault-Free Process for IT System with TRM(Technical Reference Model) based Fault Check Point and Event Rule Engine (기술분류체계 기반의 장애 점검포인트와 이벤트 룰엔진을 적용한 무장애체계 구현)

  • Hyun, Byeong-Tag;Kim, Tae-Woo;Um, Chang-Sup;Seo, Jong-Hyen
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.1-17
    • /
    • 2010
  • IT Systems based on Global Single Instance (GSI) can manage a corporation's internal information, resources and assets effectively and raise business efficiency through consolidation of their business process and productivity. But, It has also dangerous factor that IT system fault failure can cause a state of paralysis of a business itself, followed by huge loss of money. Many of studies have been conducted about fault-tolerance based on using redundant component. The concept of fault tolerance is rather simple but, designing and adopting fault-tolerance system is not easy due to uncertainty of a type and frequency of faults. So, Operational fault management that working after developed IT system is important more and more along with technical fault management. This study proposes the fault management process that including a pre-estimation method using TRM (Technical Reference Model) check point and event rule engine. And also proposes a effect of fault-free process through built fault management system to representative company of Hi-tech industry. After adopting fault-free process, a number of failure decreased by 46%, a failure time decreased by 56% and the Opportunity loss costs decreased by 77%.

Strengthening the Legal Basis for Security Rule to Protect Technology and Trade Secrets for Small Businesses (중소기업의 기술 및 영업비밀 보호에 대한 보안규정의 법적 근거 강화방안)

  • Ahn, Sang Soo;Lee, Jung hun;Son, Seung Woo
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.57-77
    • /
    • 2020
  • In Korea, various schemes have been implemented to prevent the outflow of technology, but they do not bring practical effects. In general, we focus on follow-up measures such as strong punishment in case of violation of the law. In terms of proactive prevention, it is not shown to have any real preventive effect, even though it includes such matters as imposing security measures on companies or conducting a survey. this paper examines the need to strengthen the protection of business secrets by reviewing the employment rules between companies and workers presented in the Labor Relations Act and the Labor Standards Act as a realistic alternative. In most companies, even though the employment rule is the highest standard of private regulations, the employment rule has no matters on the prevention and protection of technology leakage. The employment rules require all employees working for companies to agree and notify in the Labor Standards Act, so it is necessary to reflect them as standards in the standard employment rules because it shows that all employees of the company can have a common sense of security and present legal compliance with security-related documents, such as security pledges and security-related guidelines and procedures.

A Study on the Principle of Business Enterprises Accounting (우리나라 기업회계원칙에 관한 고찰)

  • 최달수
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.2 no.2
    • /
    • pp.93-103
    • /
    • 1979
  • As principles of our country's Business Enterprises Account are being developed, Customs of Business Enterprises Account are in the state of change and then Principles of that are in revision. According to systematizing contents of such a principle of Business Enterprises Account, having made an analysis and Investigation from versatile situation, I can deprive of the following conclusions from above facts. 1. The prelude of a general principle involves compulosory character like a forced law rather than a theoretical teaching of original character. 2. Because of making much of supply of account information, To make mistakes, emphasis on function of an information, on the other side, being apt to disregard control function of original account. 3. There is no such a mutual relation as theoretical systematic form among general rule, a profit-and-loss account, balance sheet and drawing principle. These rules which don't form gradual structure are prescribed respectively according to business like necessity. 4. An overall contents of account principle are regarded as principle near financial account rather than the Pivot of administration account. In the future, The whole academic world of account and business practice should become the idealistic account principle with lots of study and effort.

  • PDF

A Study of Smartphone Sustainable Business in the Chinese Market through Conjoint Analysis

  • Junyan YANG;Jun ZHANG
    • The Journal of Industrial Distribution & Business
    • /
    • v.15 no.3
    • /
    • pp.11-20
    • /
    • 2024
  • Purpose: This study focuses on the Chinese smartphone market to estimate product attributes influencing Chinese customers' preference for developing new smartphones through conjoint analysis. Research design, data and methodology: The online questionnaire survey is processed among Chinese potential smartphone customers. Conjoint analysis including traditional conjoint analysis (TCA) and choice-based conjoint analysis (CBCA), is used to analyze the useful data of 500. Results: Results indicate that price is the most important predictor while screen size is the least for Chinese customers' preference whether the method is TCA or CBCA. However, the importance of brand, capacity, CPU, and screen design is different. Moreover, based on each smartphone attribute level's utility, the new products with the best combinations are different compared with both methods. Finally, the predicted market shares of the top 3 products are the same with maximum utility rule model between TCA and CBCA. However, when considering with the new best combined product, they are significantly different. Conclusions: Managers should recognize the differences between TCA and CBCA and select the best method to develop new smartphones for sustainable business in the Chinese competitive market based on the important attributes of price, brand, capacity, CPU, screen design, and size.

A GA-based Rule Extraction for Bankruptcy Prediction Modeling (유전자 알고리즘을 활용한 부실예측모형의 구축)

  • Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.83-93
    • /
    • 2001
  • Prediction of corporate failure using past financial data is well-documented topic. Early studies of bankruptcy prediction used statistical techniques such as multiple discriminant analysis, logit and probit. Recently, however, numerous studies have demonstrated that artificial intelligence such as neural networks (NNs) can be an alternative methodology for classification problems to which traditional statistical methods have long been applied. Although numerous theoretical and experimental studies reported the usefulness or neural networks in classification studies, there exists a major drawback in building and using the model. That is, the user can not readily comprehend the final rules that the neural network models acquire. We propose a genetic algorithms (GAs) approach in this study and illustrate how GAs can be applied to corporate failure prediction modeling. An advantage of GAs approach offers is that it is capable of extracting rules that are easy to understand for users like expert systems. The preliminary results show that rule extraction approach using GAs for bankruptcy prediction modeling is promising.

  • PDF

A Study on the Operation and Personal Information Management of Public and Private Kindergarten Homepages (공·사립 유치원 홈페이지의 운영 및 개인정보 관리 실태 연구)

  • Kim, Jong Min;Chun, Hui Young;Choi, Eun A
    • Korean Journal of Child Studies
    • /
    • v.37 no.6
    • /
    • pp.119-132
    • /
    • 2016
  • Objective: The purpose of this study was to analyze the operation and personal information management of public and private kindergarten homepages. Methods: A total of 2,846 kindergartens were selected from the I-Sarang portal service for analyzing operation, and 217 self-operating homepages were selected for evaluating management. Seven evaluation items from three domains (information gathering procedures and scope, information security, and management of file exposure protection) were used. Wireshark and Google were used for analyzing some evaluation items. Results: The operating ratio of kindergarten homepages was low and most of the kindergartens self-operated their homepages. The evaluation of the information gathering procedures and scope showed that the rule of consent process was not rigidly followed but that the rule of legality for information gathering was followed. Items related to information security were followed at very low levels. As for the management of file exposure protection, the evaluation of items related to the prevention of attachment disclosure showed that the rule of protecting personal information included in an attached file was followed but that the notice regarding information protection was not. Across all evaluation items, the level of personal information management was higher in public (vs. private) kindergartens. Conclusion: These results indicate methods to more securely and effectively manage personal information on kindergarten homepages.

Case Studies on Application of Injunction to the stand-by Credit Transactions (보증신용장거래에세 지급금지명령의 적용에 관한 분쟁사례연구)

  • Kang Won-Jin;Lee Sang-Hun
    • Journal of Arbitration Studies
    • /
    • v.14 no.1
    • /
    • pp.29-60
    • /
    • 2004
  • Recently stand-by credits are using as surety devices in various global business transactions including sale of goods. Stand-by credits have lots of merits but simultaneously have high possibility of improper demand by the beneficiary due to the characteristics of the documents required. So so-called fraud rule has developed as a solution to the improper demand in letter of credit transactions. And the actual way of the fraud rule is the injunction by the competent court. The purpose of this article is to examine the applicability of the injunction in stand-by credit transactions by means of case studies. For this purpose, the author examined the concept of the injunction, necessity of the injunction in stand-by credit transactions and the cases of injunction granted and injunction denied. Firstly, the courts have legal standard of the application of injunction due to the legislation of the relative articles in the United Nations Convention on Independent Guarantees and Stand-by Letters of Credit and the Uniform Commercial Code. Secondly, the courts have taken a negative attitude granting injunction in order to observe the independence principle. Thirdly, the courts have a tendency to grant injunction when the demand has no conceivable basis and the applicant will suffer irreparable injury without injunction. Finally, like the saying 'prevention is the best cure', the applicant always pays attention with reasonable care before improper demand by the beneficiary.

  • PDF