• Title/Summary/Keyword: Delivery Document

Search Result 137, Processing Time 0.019 seconds

Implementation of OSI Application Protocols in Library Networks (도서관 네트워크에서의 OSI프로토콜 응용에 관한 연구)

  • 정영미
    • Journal of the Korean Society for information Management
    • /
    • v.14 no.1
    • /
    • pp.47-76
    • /
    • 1997
  • This study explores the importance of OSI standards in library environment and specifically of Z39.50/SR information retrival protocols and ILL protocol. Libraries and other information systems need to implement these ap lication protocols in order to facilitate the sharing of library information resources through information networks. The foreign systems which have implemented the standard protocols are reviewed in this paper, and it is suggested that search results of OPACs and other bibliographic databases be directly used for electronic document request for fast document delivery, first by implementing Z39.50 OPACs and standard interlibrary loan systems and next by integrating the two systems in Korean electronic libraries.

  • PDF

A Study on the Operational Process of SURF under Bolero System (볼레로시스템 상 SURF(전자결제시스템)의 운용프로세스에 관한 연구)

  • 채진익
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.187-206
    • /
    • 2002
  • The purpose of this study is to review the process for the trade settlement system between all parties involved in the commercial transaction under SURF System. SURF application is the latest value added service from bolero.net and a fully automated documentary settlement system. It extends bolero.net's capability to enable trade transactions by providing a delivery versus payment system. It has been designed as a standard, shared, infrastructure component for handling trade settlement within an electronic environment to keep step with the operation of electronic Bolero bill of Lading. It exploits the services provided by the Bolero Core Messaging Platform - secure, guaranteed transactions based on boleroXML standards to provide document compliance services with optional bank guarantees. So, SURF system can automatically check all commonly used trade documents such as commercial invoices, bills of lading and certificates of weight and analysis, etc and supports a full range of settlement options including Open Account, Documentary Collections, Documentary Credit. 58 have key features as follows, ① automatic document compliance checking, ② integrated with the Title Registry, ③ supports various forms of vender financing, ④ governed by a set of legally binding rules, ⑤ fully prepared for Straight-Through-Processing, ⑥ Enabled compliance with UCP 500.

  • PDF

A Study on the Seller's Obligation of the Delivery of Goods and Handing over the Documents in International Contracts for Sale of Goods - Focusing CISG and Incoterms 2010 - (국제물품매매계약상의 물품인도 및 서류교부에 관한 매도인의 의무에 관한 연구 - CISG와 Incoterms 2010을 중심으로 -)

  • Park, Nam Kyu
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.3-26
    • /
    • 2013
  • Seller's obligation on the Delivery of Goods and Handing over the Documents are key elements in Contracts for the International Sale of Goods. The United Nations Convention on Contracts for the International Sale of Goods(CISG) has been entered into force on 1 January 1988 to create international certainty and uniformity in the law and to govern issues that arise in an international sale of goods transaction. The Incoterms were first published by the ICC in 1936 and were most recently revised in 2010. Incoterms 2010 are entering into force on 1 January 2011. The Incoterms focus on the seller's delivery obligations and reflect the principle that the risk of loss or damage to the goods passes from the seller to the buyer when the seller has fulfilled its obligations to deliver the goods. This study highlights basic rules covering seller's obligation of delivery of goods and handing over the documents under the Incoterms 2010 and the United Nations Convention and Contracts for the International Sale of Goods. In the second chapter, this study will provide analyses and compare these two legal systems in relation to the basic rules governing delivery of goods and passing of risks in contract of sale. This chapter evaluates the meaning of Article 31 and Article 67(1) and FOB, CFR, CIF & FCA, CPT, CIP terms of Incoterms 2010. Chapter Three will focus on handing over the documents. Article 30 CISG imposes the seller's primary obligations to deliver the goods and to hand over documents relating to them. Article 34 CISG supplements the seller's obligation in relation to documents by providing that the seller must hand over documents relating to the goods. In contrast, Article 58(1) CISG imposes on the buyer the obligation to pay only when it has received the goods or documents controlling their disposition. I reviewed only some of the documents relating to the goods are documents controlling their disposition. This chapter considers the meaning of the phrase "documents that control the disposition of the goods and do not control disposition of the goods." Finally, the fourth chapter will assess the meaning of rules of CISG and Incoterms 2010.

  • PDF

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

A Study on EDH Methods of Major Standardization Bodies and Architecture of Advanced Standards Information System (주요 표준화기구의 EDH (Electronic Document Handling) 방법 분석 및 차세대 표준정보유통망의 운용구조에 관한 연구)

  • Koo, Kyoung-Cheol;Sohn, Hong;Park, Ki-Shik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.67-73
    • /
    • 2000
  • In an era of very rapid technological change, standardization organizations have been confronted with the problem that they should develop more new and more complex standards as strategic tools for enforcement of competitive power in shorter time according to the reduction of Life Cycle of products and the increase in the number of standards and their complexity. To cope with this challenge, worldwide Standardization Bodies now implement and operate their own EDH (Electronic Document Handling) system which is electronic means applied to development and delivery of standards based on their standardization workflow. In this paper, we analyze the EDH guidelines and methods of major Standardization Bodies, International bodies such as ITU-T, ISO/IEC JTC1, Regional bodies such as ETSI, Committee T1 of USA and TTA (Telecommunications Technology Association) of Korea. Finally, we discuss future EDH policy and suggest architecture of Advanced Standards Information System.

  • PDF

A Study on the Design of Interlibrary Loan System Linked with IRS (정보검색시스템과 연계된 상호대차시스템 설계에 관한 연구: 의학도서관을 중심으로)

  • 최흥식
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.165-186
    • /
    • 2001
  • The purpose of this study is to explore practical methods of interlibrary loan system, linked with information retrieval system. The process and current status of interlibrary loan was investigated and analyzed at medical libraries in this study. In order to find the way of utilizing data from information retrieval and document request at the same time, the author tries to develop a way of linking PubMed, Union Catalog and ILL system. This study shows that hit record of information retrieval was saved in type of MEDLINE, XMLJSGML and reused for document delivery services. It seems to be efficient that the maintenance of Union Catalog was managed by all of member libraries, and data were retrieved at server and client side at once. In addition, it was found that user information can be checked by the IP and ILL system can be used for requested document by the saved result.

  • PDF

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

Water Mist Fire Suppression for Raised Subfloor Spaces

  • Kim, Woon-Hyung;Kim, James A. Milke
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 1997.11a
    • /
    • pp.617-624
    • /
    • 1997
  • Over 100 experiments have been conducted at the University of Maryland to evaluate the performance of a water mist fire suppression system for protection of an interstitial space below a raised subfloor. Experiments are conducted as part of an ongoing research effort to compare the fire suppression capabilities of various water mist system designs in a raised subfloor space. Water mist system design parameters considered in the investigation include means of actuation, concentration of water mist required for extinguishment of fires, and delivery mechanisms of water mist within close proximity to the fire. Delivery of the required concentration of water mist within close proximity to the fire is a principal factor governing the adequacy of water mist systems. Two sets of experiments have been conducted to document the performance of water mist system designs. One set is involved in documenting the concentration of water mist as a function of position within the space. The second set of experiments is concerned with the ability of water mist system designs to control fires in the space. One result of the research is the assessment of the ability of a water mist system to control fires at particular locations as a function of water mist density at that location.

  • PDF

The Long Tail Effect in the Online Food Ordering and Delivery Industry (음식 주문 배달 산업의 긴꼬리 효과에 관한 실증 연구)

  • Yongkil Ahn;Chul-Sung Lee
    • Asia-Pacific Journal of Business
    • /
    • v.15 no.1
    • /
    • pp.99-111
    • /
    • 2024
  • Purpose - This study aims to quantify the long tail effect in the digital economy. It also investigates the role of digital platform before and after the COVID-19 pandemic. Design/methodology/approach - We take advantage of a granular data set from one of the biggest digital platforms in Korea. Rather than computing the absolute number of products sold or the Gini coefficient, we estimate the slope of the log-linear relationship of the non-parametric sales distribution. Findings - We find that the use of online food order and delivery services is positively associated with individual restaurant's sales growth. We also document that the long tail effect is increasing over time. Long tail effects are clustered in the cross-section where average revenue per order is high or the restaurant belongs to the top 50% of the sales distribution. Research implications or Originality - The findings may indicate that digital platforms are contributing to the development of the digital economy in Korea. Also, we confirm that digital platforms make it possible for small and sole proprietors to go through the difficulties induced by the COVID-19 pandemic.

A Study on the e-Document Development of Parcel Service for Reliable Delivery (택배 물류 안전 배송을 위한 전자문서 개발 연구)

  • Ahn, Kyeong Rim;Park, Chan Kwon
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.47-59
    • /
    • 2016
  • Parcel service is to deliver goods from one place to the designated destination requested according to user request. Parcel operations such as sorting, distributing, etc. or the managed information are heterogeneous by the companies. Additionally, it is impossible to support interoperability between companies with unformatted data of manual processing. Most parcel package boxes attached to paper typed waybill is attached is delivered to consignee. So, security problems such as personal information leaking are occurred, or extra processing time and logistics costs are needed due to wrong or the damaged information. Business environment of parcel service is rapidly changed as introducing unmanned delivery or the advanced technology such as Internet of Things. User want to know the accurate status or steps from parcel service request to delivery. To provide these requirements, the unified and integrated waybill information for reliable transportation of parcel service is needed. This information will provide to pickup or delivery carrier, warehouse or terminal, and parcel service user per pickup, transport, and delivery stage of parcel delivery service. Therefore, this paper defines the simplified and unified information model for parcel service waybill by analyzing information systems used for logistics unit processes that is occurred to parcel service, and manual work processes, and developing the relevant information of work flows occurred between business processes or transactions with the collected or processed information by from parcel service's stages. It is possible to share these standard model between business entities, and replacing paper typed waybill will improve national life safety as preventing security threats by paper typed waybill. As a result, it will promote the public interest from the stakeholder's perspective.