• Title/Summary/Keyword: International E-Commerce

Search Result 565, Processing Time 0.027 seconds

A Study on the Payment Mechanism of Independent Guarantee -focusing on matters that the relevant parties involved should know- (청구보증상 지급메커니즘에 따른 실무상 유의점)

  • Oh, Won-Suk;Kim, Pil-Joon;Lee, Woon-Chang
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.46
    • /
    • pp.133-158
    • /
    • 2010
  • Independent guarantee is a creation of the need from the both sides, i.e. the applicant (principal debtor) and the beneficiary (creditor). The former used to have to deposit cash in favor of the beneficiary in case of his default, which laid a burden on his liquidity while the latter still wanted to have the equivalent to cash. Independent guarantee satisfied the both parties by freeing the applicant of a deposit and maintaining the beneficiary's right at the same time. The fact that independent guarantee has three payment mechanisms is not widely known to the public. They are (i) payment on first demand, (ii) payment upon submission of third-party documents, (iii) payment upon submission of an arbitral or court decision. From the applicant's point of view, the order in his favor is (iii), followed by (ii) and (i). As there shouldn't be a case where one party is at a disadvantage against the other, useful insight is being sought for the benefit of the applicant. First, the applicant can offer his intention to provide a payment mechanism (ii) or (iii) rather than (i) if he must deliver it. Second, if the beneficiary still wants to have (i) and the applicant is in a position not to reject it, the latter should thoroughly check any provisions that may work against him later. Third, the applicant could use counterbalancing provisions in underlying contract to cope with protective clauses in the guarantees. Forth, the applicant should review the beneficiary's sincerity to prevent unfair calling risks. The applicant may use an ECA(Export Credit Agency) in his country to which he can transfer not only unfair calling risks, but also political risks. On the other hand, a bank needs to keep the following advice in mind. The foremost important thing for the bank not to forget is that it provides a guarantee as a service provider, not as a responsible party for the feasibility of the project, etc. Credit risk of the applicant should require the greatest attention when issuing a guarantee: the bank should look into the possibility that it can procure immediate reimbursement from its customers after payment to the beneficiary. Second, the applicant's ability to complete the project should be reviewed by checking its track records, techniques and reputation, etc. Third, the bank may also use an ECA to cover the beneficiary's unfair calling risks as well as political risks. In the case of Korea, as Korea Export Insurance Corporation(KEIC) can cover all the risks mentioned above, the bank could use its service called 'Export Bond Insurance.' What's better for the bank is that ECA cover can enhance the bank's asset quality by putting it zero on its risk weighted asset.

  • PDF

A Study on Methodology of Self-determination of HS Commodity Classification for Utilizing FTA Preferential Tariff of SMEs (중소기업의 FTA 특혜활용을 위한 HS 품목분류 자가결정 방법에 대한 연구)

  • Kim, Young-Chun;Ryu, Geun-Woo;Lee, Ju-Young
    • International Commerce and Information Review
    • /
    • v.16 no.1
    • /
    • pp.91-116
    • /
    • 2014
  • This study reviews the methodology for utilizing information technology by which even non-professionalists in FTAs and commodity classification area can perform the determination of commodity classification, with ease and by themselves, by means of easy utilization of the information on commodity classification and FTAs, of importing and exporting goods. This article examines the technological elements and logics, etc. which simulate the commodity classification for utilizing FTAs. To achieve this, the author has developed the technology to support the determination of commodity classification numbers by accumulating the database of examples for classification after analyzing the classification factors by each commodity item. Utilizing this Commodity Classification Determination Supporting System, users can enjoy effects of education as well as consulting. In this regards, the advantages of this system can be enumerated as followings : Firstly, self-checking on commodity classification can be performed. Secondly, time and cost for classification can be saved. Thirdly, comprehensive competitiveness will be enhanced by allowing traders to achieve the benefit of FTA preferential tariff, for they will be able to issue the Certificate of Origins on a more accurate and precise basis of commodity classification.

  • PDF

An Empirical Study on the Contingent Analyses on the Relationship Between the Characteristics of e-Trade and User Acceptance (전자무역의 특성과 사용자 수용간의 상황적 관계분석)

  • Song, Sun-Yok
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.155-175
    • /
    • 2002
  • 본 연구는 전자무역을 혁신수용의 관점에서 기술하고 있다. 관련 문헌의 고찰을 통해 천자무역 특성요인과 수용자(무역업체) 특성요인을 도출하고, 이를 바탕으로 연구모형의 개발 및 연구가설을 설정하였다. 연구가설은 인터넷리서치를 통해 수집된 자료를 다중회귀분석기법을 이용하여 검정하였다. 그 결과를 요약하면 다음과 같다. 첫째, 전자무역의 특성변수들(지각된 유용성/편의성/위험성)이 전자무역 수용도에 미치는 영향관계를 검증한 결과, 지각된 유용성과 지각된 편의성이 높을수록 전자무역 수용도가 높은 것으로 나타났다. 둘째, 혁신 수용자로서 무역업체의 특성변수들(혁신성향, 정보인프라 성숙도)이 전자무역 수용도에 미치는 영향관계를 검증한 결과, 혁신성향과 정보인프라 성축도 모두 전자무역 수용도에 긍정적인 영향을 미치는 것으로 나타났다. 이는 혁신성향이 높을수록 그리고 정보인프라가 성숙된 업체일수록 전자무역 수용도가 높게 나타난다는 일반적인 견해와 일치되는 결과이다. 셋째, 두 특성변수들(전자무역 특성, 무역업체 특성)간의 상황적 관계에서는 혁신성향이 낮은 무역업체일수록 전자무역의 정보위험성을 높게 인식하여 천자무역 수용(현재 활용정도와 지속적 이용의도)을 거부할 가능성이 높게 나타났다. 또한 정보인프라 성숙도가 낮은 무역업체일수록 정보위험성을 높게 인식하여 전자무역 수용을 거부할 가능성이 높게 나타났다. 넷째, 전자무역을 통한 수출입 경험여부에 따른 전자무역의 향후 이용의도와의 관계를 분석한 결과 무경험업체의 경우는, 혁신성향이 높고 정보인프라가 성숙된 무역업체일수록 향후 이용의도가 높은 것으로 나타났다. 또한 정보인프라 성숙도가 낮은 무역업체일수록 전자무역의 편의성을 낮게 인식하여 전자무역 수용을 거부할 가능성이 높게 나타났다. 유경험업체의 경우는 전자무역에 대한 향후 이용의도가 높은 무역업체일수록 전자무역의 편의성을 오히려 부정적으로 평가하는 경향이 드러났는데, 이러한 현상은 유경험업체가 인식하는 편의성에 대한 기대수준이 무경험업체에 비해 높기 때문인 것으로 나타났다. 또한 혁신성향이 높은 무역 업체가 향후 전자무역을 지속적으로 이용하기 위해서는 전자무역의 편의성을 더 높게 요구하는 것으로 나타냈다. 전자무역의 수용도를 높이기 위해서는 전자무역의 특성요인들에 대한 잠재적 수용자의 태도변화를 파악하는 것도 중요하지만, 수용자 집단의 특성에 맞는 상황적 전략수립이 동시에 필요하다. 그러한 의미에서 본 논문은 전자무역 수용 촉진 전략을 수용자 집단의 특성별로 그리고 상황적으로 수립할 수 있는 기초자료를 제공할 수 있을 것으로 기대된다.

  • PDF

Effects of Using External Knowledge Services on Management Performance (기업 외부의 지식서비스 활용이 경영성과에 미치는 영향)

  • Song, Keo-Young;Roh, Jae-Whak;You, Yen-Yoo
    • International Commerce and Information Review
    • /
    • v.16 no.2
    • /
    • pp.113-129
    • /
    • 2014
  • The present study attempted to test the effects of using external knowledge services on corporate management performance among SMEs. A survey of SMEs that had used external knowledge services was conducted for the analysis. The findings are as follows. First, regarding government-supported knowledge services for SMEs, knowledge service expert groups' competencies and government's support policies had positive effects on the quality of knowledge services. In particular, the knowledge service expert groups' competencies had more significant effects on the quality of knowledge services than the government's support policies. Second, the quality of knowledge services had significantly positive effects on management performance, whilst confidence-related knowledge service quality factors exerted significant effects on enhancing the relationship with customers and the informationization of knowledge. These findings have the following implication and meaning. The present findings indicate that the government's policy to foster and lay the foundation for knowledge service industry should be furthered, e. g. knowledge service supports for individual companies including knowledge service support projects and systems for SMEs and institutional supports for knowledge service companies and expert groups. In sum, this study is meaningful in that it suggests an effective and efficient policy direction for government's knowledge service provision projects.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Ensuring Data Confidentiality and Privacy in the Cloud using Non-Deterministic Cryptographic Scheme

  • John Kwao Dawson;Frimpong Twum;James Benjamin Hayfron Acquah;Yaw Missah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.49-60
    • /
    • 2023
  • The amount of data generated by electronic systems through e-commerce, social networks, and data computation has risen. However, the security of data has always been a challenge. The problem is not with the quantity of data but how to secure the data by ensuring its confidentiality and privacy. Though there are several research on cloud data security, this study proposes a security scheme with the lowest execution time. The approach employs a non-linear time complexity to achieve data confidentiality and privacy. A symmetric algorithm dubbed the Non-Deterministic Cryptographic Scheme (NCS) is proposed to address the increased execution time of existing cryptographic schemes. NCS has linear time complexity with a low and unpredicted trend of execution times. It achieves confidentiality and privacy of data on the cloud by converting the plaintext into Ciphertext with a small number of iterations thereby decreasing the execution time but with high security. The algorithm is based on Good Prime Numbers, Linear Congruential Generator (LGC), Sliding Window Algorithm (SWA), and XOR gate. For the implementation in C, thirty different execution times were performed and their average was taken. A comparative analysis of the NCS was performed against AES, DES, and RSA algorithms based on key sizes of 128kb, 256kb, and 512kb using the dataset from Kaggle. The results showed the proposed NCS execution times were lower in comparison to AES, which had better execution time than DES with RSA having the longest. Contrary, to existing knowledge that execution time is relative to data size, the results obtained from the experiment indicated otherwise for the proposed NCS algorithm. With data sizes of 128kb, 256kb, and 512kb, the execution times in milliseconds were 38, 711, and 378 respectively. This validates the NCS as a Non-Deterministic Cryptographic Algorithm. The study findings hence are in support of the argument that data size does not determine the execution.

Simplified Clearance Formalities of Northeast Asia port (동북아 항만의 입출항 수속 간소화 방안)

  • Choi Hyung-Rim;Park Nam-Kyu;Park Young-Jae;Cho Jae-Hyung
    • Journal of Navigation and Port Research
    • /
    • v.29 no.5 s.101
    • /
    • pp.439-445
    • /
    • 2005
  • Recently, owing to the increasing demand on the simplification of arrival and departure procedures, IMO's (International Maritime Organization) Facilitation Committee (FAL) is carrying out the standardization project of arrival and departure formalities and clearance form. Also, many port authorities of developed countries are making active researches for the smooth flow and efficiency of the information inbound and outbound ships by way of simplifying their formalities or through electronic means. However, this standardization project cannot be done by one country but by mutual cooperation among related nations. And to carry out this task, the first thing to be done is to standardize the formalities and document form, and to integrate information. To this end, this study has reviewed the model cases of advanced ports of developed countries with regard to their simplification and standardization efforts. And also we have analyzed the formalities and clearance form of the three countries Korea, China, and Japan. And then for the solution of common problems of three countries, this paper has suggested an ebXML-based Global Port B2B framework. Through this framework, we can reuse and automate the necessary information on the arrival and departure of ships, consequently realizing simplification, and laying a foundation for the introduction of e-commerce to the port industry.

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

A study on the send and receive of the message in the TEDI system (TEDI 시스템상의 메시지 송수신에 관한 고찰)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.43-56
    • /
    • 2004
  • The purpose of this paper is to study the send and receive of the message in the TEDI System. The TEDI System replaces a series of trade documents with electronic date, and it realizes secure and reliable transactions of data among parties by means of open networks, such as the Internet. The TEDI system is composed of Web browsers, TC Serves, a RSP Server, and Certification Servers. TEDI has development the system and legal frame work. Exporters, importers, carriers, banks insurance and companies those who engage in the trade releated business have tested TEDI system and evaluated the legal frame work from the practical point of view. TEDI is now refining the system and preparing for the service. A fundamental feature of the TEDI System is the attribution to participants of data messages through public key certificates issued by certification authorities that allow for verification of digital signatures. Access to servers maintained by such certification authorities also takes place through the internet. In principle, certificates used by any reputable certification authority may be employed as long as they are compatible with X.509 V3.

  • PDF

A Study on the International Discussion of Digital Trade Norms (디지털 무역규범의 국제적 논의에 관한 연구)

  • Hwang, Ji-Hyeon;Kim, Yong-Il
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.93-100
    • /
    • 2021
  • With the spread of digital trade, the share of digital trade under the global trade environment is increasing. However, since there is no international digital trade standard, the discussion to establish a new trade rule has important significance. Countries around the world are implementing digital trade policies in consideration of their own interests, but different regulatory policies are causing trade conflicts. In order to provide safeguards against personal information infringement due to the free movement of data across borders, major countries around the world have taken measures to localize data, and the EU has enacted GDPR. And the United States regards the imposition of the digital tax as a trade barrier, and some countries oppose the implementation of the digital tax for fear of negative impact on their countries. However, discussions on the global digital tax, centered on the OECD and the G20 are making progress. As it is highly likely that a digital tax agreement will be drawn up within this year, countermeasures must also be prepared. Therefore, this study presents implications for the future direction of Korea's trade policy by examining recent trends in digital trade norms and analyzing major issues in digital trade.