• Title/Summary/Keyword: Financial Situations

Search Result 155, Processing Time 0.023 seconds

The Effect of Financial Condition in Saving Banks on Loan Portfolio (저축은행 재무상황이 대출포트폴리오에 미치는 영향)

  • Bae, Soo Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.379-384
    • /
    • 2020
  • The purpose of this study is to analyze the impact of individual savings banks' financial conditions on their loan portfolio after savings bank restructuring. The analysis results are as follows. First, it was estimated that the relationship between the rate of change in the NPL Ratio and the ratio of household loans has a significant positive value. Second, it was estimated that the interaction effect between the rate of change in the ratio of fixed and below loans and the spread of the deposit-to-deposit rate has a significant negative (-) value with the household loan weight. Third, the relationship between the asset size and the proportion of household loans was estimated to have a significant positive (+) value. In other words, it was analyzed that the financial situation of the savings bank affects the loan portfolio, and it should provide important implications for establishing policies for each financial situation of the savings bank. Depending on the financial situation in the future, there is a need to avoid excessive asset expansion of specific loans and preemptive soundness management.

Comparison Study on the Performances of NLL and GMM for Estimating Diffusion Processes (NLL과 GMM을 중심으로 한 확산모형 추정법 비교)

  • Kim, Dae-Gyun;Lee, Yoon-Dong
    • The Korean Journal of Applied Statistics
    • /
    • v.24 no.6
    • /
    • pp.1007-1020
    • /
    • 2011
  • Since the research of Black and Scholes (1973), modeling methods using diffusion processes have performed principal roles in financial engineering. In modern financial theories, various types of diffusion processes were suggested and applied in real situations. An estimation of the model parameters is an indispensible step to analyze financial data using diffusion process models. Many estimation methods were suggested and their properties were investigated. This paper reviews the statistical properties of the, Euler approximation method, New Local Linearization(NLL) method, and Generalized Methods of Moment(GMM) that are known as the most practical methods. From the simulation study, we found the NLL and Euler methods performed better than GMM. GMM is frequently used to estimate the parameters because of its simplicity; however this paper shows the performance of GMM is poorer than the Euler approximation method or the NLL method that are even simpler than GMM. This paper shows the performance of the GMM is extremely poor especially when the parameters in diffusion coefficient are to be estimated.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

A Study of Online User Identification Based on One-Time Password with Guaranteeing Unlinkability (OTP에 기반한 비연결성을 보장하는 온라인 본인확인에 대한 연구)

  • Kim, Jung-Dong;Cho, Kwan-Tae;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.129-139
    • /
    • 2011
  • Recently by the privacy & data security law, when a user registers the online membership, we need to take action to check a progress of identification without resident registration number. On the most of websites, I-PIN is used by identification instead of the resident registration number. However, I-PIN causes dangerous situations if someone steals the ID and a password, the personal data can be easy to exposure. In this paper, we propose the OTP, which can solve all these problems by guaranteeing the identification of unlinkability. This type of method would help the process of membership registration without fixed data like ID and a password in online so it would be very useful to security of private data.

Southern Cone Liberalization: Experiences and Lessons (남미(南美)의 경제자유화(經濟自由化) : 경험(經驗)과 교훈(敎訓))

  • Park, Won-am
    • KDI Journal of Economic Policy
    • /
    • v.12 no.3
    • /
    • pp.125-151
    • /
    • 1990
  • This paper reviews the economic liberalization experiences of the Southern Cone countries and draws some lessons from their experiences. The Southern Cone countries-Chile, Argentina and Uruguay-followed the different sequences in liberalization. Chile implemented the fiscal reform and the following comprehensive trade reform in the beginning of liberalization, but capital controls were maintained until 1979. Argentina and Uruguay placed more emphasis on the financial reform with the goods market reformed afterwards, but the fiscal sector was never reformed in Argentina. Since the serious inflation plagued the Southern Cone countries, they combined the economic liberalization scheme with the economic stabilization programmes which are based on the monetarist model. Although economic situations in the Southern Cone countries are quite different from those of Korea, we can learn many lessons from their experiences. First, the monetary and fiscal policies should consist of strict financial discipline to bring in the stable domestic inflation. Without the domestic stabilization, the financial liberalization could disturb the domestic economy as the capital inflows in particular generate a real exchange rate appreciation. Second, the monetary approach which is based on the full purchasing power parity and perfect capital mobility make stabilization as simple as a matter of the appropriate exchange rate policy and the proper rate of domestic credit creation. The unsuccessful experiences with monetarist stabilization in the Southern Cone countries suggest that the monetarist model cannot make real exchange rate and real interest rate stable with the trade and financial reform. Third, both the theory and practice have not yet provided a precise solution on the optimal sequencing and speed of the goods and financial market. Nonetheless, it seems desirable to keep the real exchange rate and the real interest rate stable by gradually opening up the current account and then the capital account.

  • PDF

Benefits of Using Imperfect Information in Controlling an M/M/1 Queueing System

  • Nam, Ick-Hyun
    • Management Science and Financial Engineering
    • /
    • v.1 no.1
    • /
    • pp.1-19
    • /
    • 1995
  • In this paper, we analyze an M / M / 1 queueing system where there are incentive conflicts among customers. Self-interested customers' decisions whether to join the system or not may not necessarily induce a socially optimal congestion level. As a way to alleviate the over-congestion, toll imposition was used in Naor's paper [3]. Instead of using a toll mechanism, we study the usefulness of imperfect information on system state (queue size, for example) as a way to reduce the over-congestion by self-interested customers. The main conclusion of this paper is that by purposefully giving fuzzy or imperfect information on the current queue size we can improve the congestion in the system. This result might look contradictory to rough intuition since perfect information should give better performance than imperfect information. We show how this idea is verified. In deriving this result, we use the concept of Nash equilibrium (pure and mixed strategy) as introduced in game theory. In some real situations, using imperfect information is easier to apply than imposing a toll, and thus the result of this paper has practical implications.

  • PDF

Users Participation in IMT-2000 Standardization upon Phased Standards Strategy

  • Myung, Jong-Wook
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 1998.05a
    • /
    • pp.22-22
    • /
    • 1998
  • This paper reviews the benefits of users participation in IMT-2000 standardization by the creation of users coalitions, focusing in particular on phased standards strategy necessary for the evolutionary approach from second generation to third generation systems. It first presents in detail the current status of IMT-2000 standardization progress occurring at each regional standard body including TIA of US, ETSI of Europe, TTA of Korea and ARIB of Japan. With this clear understanding of standardization situations worldwide, we may be able to come up with our standards strategies related to IPR issues and efficient standard-setting mechanism between manufacturers and service providers. In addition, this paper addresses the necessity for phased licensing of IMT-2000 service in order to avoid the high cost of new infrastructures and ensure an acceptable financial investment returns for existing cellular and PCS service providers. An author hopes that this paper can provide the adequate standardization directions of IMT-2000 to satisfy the varying regional and global market requirements.

  • PDF

A HEURISTIC ALGORITHM FOR VEHICLE ROUTING PROBLEM WITH BACKHAULS

  • NAE-HEON KIM;SUK-CHUL RIM;BYUNG-DO MIN
    • Management Science and Financial Engineering
    • /
    • v.3 no.1
    • /
    • pp.1-14
    • /
    • 1997
  • We address the problem of determining the sequence of a vehicle with fixed capacity to visit n nodes at which a predetermined amount is picked up and/or delivered. The objective is to minimize the total travel distance of the vehicle, while satisfying the pick-up/delivery requirements and feasibility at all nodes. Existing methods for the problem allows the vehicle to visit a node twice, which is impractical in many real situations. We propose a heuristic algorithm, in which every node is visited exactly once. Computational results using random problems indicate that the proposed heuristic outperforms existing methods for practical range of the number of nodes in reasonable computation time.

  • PDF

A Design and Case Study of a K-Stage BLU Inspection System for Achieving a Target Defective Rate

  • Yang, Moon-Hee
    • Management Science and Financial Engineering
    • /
    • v.13 no.2
    • /
    • pp.141-157
    • /
    • 2007
  • In this paper, we address a design problem and a case study of a K-stage back-light-unit(BLU) inspection system, which is composed of K stages, each of which includes an inspection process and a rework process. Assuming the type I, II errors and the inspection-free policy for items classified as good, we determine the smallest integer of K which can achieve a given target defective rate. If K does not exist, holding the current values of the type I, II errors, we search reversely the defective rate of an assembly line and the defective rate of a rework process, to meet the target defective rate. Our formulae and methodology based on a K-stage inspection system could be applied and extended to similar situations with slight modification.

A Comparison of the Effect of Service Recovery Efforts based on Service Failure Types (외식 서비스 실패 유형에 따른 서비스 회복 노력의 효과 비교)

  • Lee, Seul-Gi;Kim, Dong-Jin
    • Culinary science and hospitality research
    • /
    • v.22 no.8
    • /
    • pp.204-218
    • /
    • 2016
  • The purpose of this study is to identify the differences in the effect of service recovery efforts on consumers satisfaction, word of mouth intentions, and revisit intentions when exposed to service failure situations. The service failure situation was classified into outcome-related and process-related failures. The service recovery effort was divided into financial and emotional efforts. Using a scenario technique, this study collected data from diners in Daegu and Gyoungbuk province. The results of the empirical analysis show that the effect of service recovery efforts varies depending on types of service failures and recovery efforts. Also, the interaction between service failure types and service recovery efforts was confirmed.