• Title/Summary/Keyword: Electronic Banking

Search Result 110, Processing Time 0.023 seconds

How Do Advisors Influence Mergers and Acquisitions?: An Analysis of Acquisitions in Japan

  • KOO, Ja Seung
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.7
    • /
    • pp.123-129
    • /
    • 2020
  • The objective of this study is to examine the differentiated influence of sell-side advisors and buy-side advisors on mergers and acquisitions (M&A). Unlike prior studies on M&A advisors, the study addresses different roles of target and acquirer advisors, and explores their influences on the cumulative abnormal returns (CAR) and acquisition premiums with an empirical analysis of longitudinal data of M&As conducted by Japanese listed firms except financial companies from 1995 to 2012. M&A data were obtained from the Securities Data Corporation's (SDC) database, and the individual firm data were collected from the Nikkei Economic Electronic Databank System (NEEDS), which provides a wide range of corporate information including financial status, operational performance, and strategy. Using a sample of 452 cases for the CAR and 498 cases for the analysis of acquisition premiums, the empirical results support the hypotheses of the target advisor's positive association with CAR and acquirer advisor's positive association with acquisition premiums. The findings of this study indicate the target advisor's positive contribution to the success of acquisition process and performance, and acquirer advisor's negative influence on the deal progress. The study provides theoretical implications on M&A research and practical insights into the investment banking industry.

Cooperate Performance Analysis Using Portfolio Approaches (포트폴리오 방식을 이용한 기업의 경영성과 분석)

  • Kim, Jeong In;Park, Dae Soon
    • Environmental and Resource Economics Review
    • /
    • v.17 no.1
    • /
    • pp.51-81
    • /
    • 2008
  • In this paper, economic performance was measured through portfolio analysis for environmentally friendly companies from September 2004 to September 2005. By using portfolio analysis, rate of revenue for environmentally friendly company is twelve to seven teen percent higher than the KOSPI, and KOSPI200 based companies. Except medical and pharmatical industry, environmentally friendly companies had shown low risk and high returns of revenue for banking and financing, chemical and electronic industry. As SRI fund is emerging as a important guideline in recent years, valuation of a cooperate will be very important tool for the financing business area in the future.

  • PDF

Financial Ratio Analysis of the Textile and Apparel Industries

  • Jung, Hyun-Ju;Hwang, Choon-Sup
    • Journal of Fashion Business
    • /
    • v.15 no.3
    • /
    • pp.125-141
    • /
    • 2011
  • This paper is to focus the financial ratio analysis of the Korean textile and apparel companies due to fast changing domestic industry. Financial ratios are playing a pivotal role in management analysis to assess the present conditions to predict the future. Subjects are belonging to textile and apparel manufacturers based on Firm Classification Standard while registered as securities listed-firms or Kosdaq-listed firms under the Electronic Notification System of Korean Banking Supervisory Authority. 41 companies' data have been analyzed including 17 apparel companies and 24 textile companies. 14 representative financial ratios are analyzed. In this paper, financial ratios can be classified into four categories as follows: stability ratios, profitability ratios, growth ratios and activity ratios. The independent t-test was performed using SPSS 18 for a 10 year simple arithmetic average. The following conclusion has reached regarding aspects of management conditions and performances. When compared the ratios indicating stability, textile and apparel companies did not show much difference in debt ratio and the ratio of earning to interests. However, when compared the profitability ratios measuring the ability to produce incomes, apparel companies showed higher ratios than textile companies. Thus it is important to recognize financial characteristics of each industry.

A Construction Design and Simulation Model Analysis of Electronic Banking Account Ledger Calibration System (금융계정계 원장보정시스템 설계구축에 관한 연구 및 시뮬레이션 분석)

  • Song, Jai-Moon;Jung, Byeong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.563-572
    • /
    • 2013
  • Based on this paper, in case of the on-line account system in finance industry temporarily stops working because of the on-line data change from 00:00 to 00:30, it conducts in extra placement server and the director update is carried out via center cut or on-line server to make the service possible through customer director reproduction revision. So, from the simulation result in financial operating system, We retain the batch director & backup director securely about the important time data in each account classes on-line director without even one second interruption.

Integrated Platform for Korea Post Information System (우정사업 정보시스템 고도화를 위한 통합 플랫폼 모형 개발)

  • Sun Ji Ung;Yee Soung Ryong;Choe Kyungil
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.835-840
    • /
    • 2002
  • The information systems of the Korea Postal Service are developed not for integration based on strategic purposes but for improvement of low-level business processes within each functional unit. Hence. the as-is level of the information systems is very insufficient for information integrity, and also shows substantial gaps. when compared to recent advances in information envconment such as internet, electronic govemment and so on in this study we suggest the design of the integrated platform to achieve integrity of postal service and banking servive. After briefly addressing the issues on information systems of the Korea Postal Service. we provide the framework of the integrated platform and action plan. We believe when this framework is put into use. It can contribute to competitive performance by giving the integrity and consistency in implementing infomation systems of the Korea Postal Service.

  • PDF

A Study on the Performance Evaluation based on Modular Face Recognition System (모듈화된 얼굴인식 시스템을 이용한 성능 시험에 관한 연구)

  • Hong Tae-Hwa;Moon Hyeon-Joon;Shin Yong-Nyuo;Lee Dong-Geun;Kim Jae-Sung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.35-44
    • /
    • 2005
  • Face recognition out of biometrics is considerable interesting due to high performance and accessibility in applications to security such as access control and banking service. Therefore, a study on the protocol of the performance test is an important issue to understand the art-of state and to show a direction in future works, in addtion to developing algorithms. We present a design criterion for the performance test protocol of face recognition system and show the result of experiment executed on identification and verification scenario based on PCA algorithm and XM2VTS DB

Hacking Aattack Trends Analysis of Mobile Smishing and Security Measures (Mobile Smishing 해킹 공격 동향 분석 및 보안대책)

  • Park, Dea-Woo;Yang, Sung-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.283-284
    • /
    • 2015
  • Smartphone, tablet PC, notebook, such as the Internet banking and electronic commerce using a mobile device, as well as process and to their work. While going to high availability and convenience of mobile devices castle, SNS, letters, using an email Smishing financial fraud and leakage of personal information such as crime has occurred many. Smishing smartphone accidents increased sharply from 2013, MERS infection cases, landmine provocative events, such as the delivery of Thanksgiving has occurred cleverly using social engineering techniques. In this paper, i analyze the trends in Smishing hacking attacks on mobile devices since 2014. With regard to social issues, it analyzes the process of hacking attacks Smishing leading to financial fraud to mobile users.

  • PDF

A Study on the Feature of Dwelling Space to Ubiquitous Environment (유비쿼터스 환경에서의 주거공간 특성에 관한 연구)

  • Lee, Sang-Won;Han, Young-Ho
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2005.05a
    • /
    • pp.88-92
    • /
    • 2005
  • The Ubiquitous life is not a life style that exists in a science fiction or in a far distance future anymore. The Combination of electronic and physical space, this new type of space was created by the ubiquitous network system, and this system will offer us new life style. Also the pattern of our living will be changed by the information that has obtained from this ubiquitous network system. By offering a new way of communication from the ubiquitous surrounding, our life style such as shopping, medical treatment, banking, and working conditions and a notion such as the preference in a job title would have shifted. This study have arrived at the development of the high technology, in other words Ubiquitous age , I have considered the notion of home-network that have observed by the preceding investigators as well as the theoretical consideration of residential space in ubiquitous surrounding. After I look into the usages and examples of residential space in ubiquitous surrounding of today's society, I hope that this would be helpful for the design that strives for the comfortable living in this ubiquitous age.

  • PDF

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

A study on Iris Recognition using Wavelet Transformation and Nonlinear Function

  • Hur, Jung-Youn;Truong, Le Xuan
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.553-559
    • /
    • 2004
  • In todays security industry, personal identification is also based on biometric. Biometric identification is performed basing on the measurement and comparison of physiological and behavioral characteristics, Biometric for recognition includes voice dynamics, signature dynamics, hand geometry, fingerprint, iris, etc. Iris can serve as a kind of living passport or living password. Iris recognition system is the one of the most reliable biometrics recognition system. This is applied to client/server system such as the electronic commerce and electronic banking from stand-alone system or networks, ATMs, etc. A new algorithm using nonlinear function in recognition process is proposed in this paper. An algorithm is proposed to determine the localized iris from the iris image received from iris input camera in client. For the first step, the algorithm determines the center of pupil. For the second step, the algorithm determines the outer boundary of the iris and the pupillary boundary. The localized iris area is transform into polar coordinates. After performing three times Wavelet transformation, normalization was done using sigmoid function. The converting binary process performs normalized value of pixel from 0 to 255 to be binary value, and then the converting binary process is compare pairs of two adjacent pixels. The binary code of the iris is transmitted to the by server. the network. In the server, the comparing process compares the binary value of presented iris to the reference value in the University database. Process of recognition or rejection is dependent on the value of Hamming Distance. After matching the binary value of presented iris with the database stored in the server, the result is transmitted to the client.

  • PDF