• Title/Summary/Keyword: International Information Order

Search Result 1,780, Processing Time 0.025 seconds

A Study on the Improvement of Export Risk Management in the Changing of Export Payment Methods (무역결제방식의 변화에 따른 수출보험제도의 개선방안에 관한 연구)

  • Kim, Byung-Hak;Gil-Jong, Hong
    • International Commerce and Information Review
    • /
    • v.8 no.3
    • /
    • pp.99-119
    • /
    • 2006
  • The recent trend in the payment terms of international trade shows the gradual shift toward more diversified payment methods (from L/C to not L/C) in order to cope with the increasingly dynamic international transactions in a more flexible manner. The reasons behind this recent shift are as follows : first, the global trade market is breaking away from the traditional L/C methods based on letters of credit toward a not L/C methods. nother reason for the changing trade payment methods is the increasing volume of intra transactions between headquarters and their foreign subsidiaries based on collection payment methods. Having mentioned the above problems that impede the Korean export insurance system, some suggestions can be put forward through a comparative analysis with foreign export insurance system. First, inducing private investments is one way of strengthening financial health of the KEIC. The KEIC also needs to diversify its insurance coverage adapting to the changing international trade environments.

  • PDF

A Study on a Program for Activation of e-Trade of the Traders in Kangwon Do (강원도 무역업체 e-Trade 활성화방안에 관한 연구)

  • Eom, Kwang-Yeol
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.147-168
    • /
    • 2004
  • Owing to the digital revolution, Internet Commerce and Electronic Commerce is having a profound influence on the global trade and internal commerce, revolutionizing the way of doing business. e-Trade have adopted in order to the reshape of the International Trade enterprise's competitiveness, and it is now being utilized as a major export marketing instrument to develop new customers, save export transaction costs ad facilitate new work processes. The purpose of this study is to provide a program for activation in e-Trade of the International Trade enterprise in Kangwon Do. However, at present, the environment of e-trade Infrastructure in Kangwon Do is very poor. Therefore, this study points out the problems of e-trade of the International Trade enterprise in Kangwon Do and provides many considerations for a program for activation of e-Trade.

  • PDF

A Comparative Study on bank's responsibilities in the Electronic Payment System -comparison between Korea and U.S.A- (국제 전자결제시스템에서 금융기관의 책임 및 정책적 시사점 -한국과 미국의 전자금융제도 비교-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.12 no.1
    • /
    • pp.35-54
    • /
    • 2010
  • This article explored the bank's responsibilities in electronic payment system between Korea and U.S.A. In order to complete my research object, I used Article 4A of the U.C.C. and EFTA of 1978 and by Electronic Financial Transaction Act of Korea as a analytic instruments. I also adapted America's various regulations to regulate concerned parties(banks). The system of this article is going to display as fellows; First, I presented recent trend and legal stabilities of electronic payment in this article. Second, I focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. I also did analyze the solution procession of error occurring in course of send of payment order. Third, In any action which involves a customers's liability for an unauthorized electronic fund transfer, the burden of proof is upon the financial institution to show that the electronic fund transfer was authorized. Forth, Customers have to report the error and unauthorized electronic fund transfer after awaring of it. Then bank will be liable for such a unauthorized electronic fund transfer. But If customer's failure to report, the bank has exemptions. Lastly, In order to prevent or detect the unauthorized electronic fund transfer, bank will agree with custom to establish a commercially reasonable security procedure, while bank has duties to notify in order to decrease the loss resulted from unauthorized payment order in korea law.

  • PDF

The Industrial Security along with the International Transfer of Technology (국제기술이전계약에서의 산업보안에 관한 연구)

  • SEO, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

A Analysis on EC Satisfaction for Foreign Shopping Mall (해외 쇼핑몰을 이용한 전자상거래 만족도의 실증분석)

  • Lee, Je-Hong
    • International Commerce and Information Review
    • /
    • v.3 no.2
    • /
    • pp.71-92
    • /
    • 2001
  • The number of internet electronic commerce users has increased steadily and EC is now considered not only as the communication tools, but also as the economic activity. But in spite of these global trends, current studies limited to managerial approach are insufficient in the evaluation of EC policies and situations. The purpose of this study are to present satisfaction of customers who will operate foreign internet shopping mall, and to analysis after-purchase behavior on EC satisfaction. As a result of making regression analysis, for its satisfaction. the hypotheses on "Shopping Mall Contents", "Information supply", "Convenience of order process", "Economy", "The reliability", "Customer Service" were accepted at the p<.0.05 level of significance, for its after purchase behavior, the hypotheses on "Shopping Mall structure", "Convenience of order process", "Economy", "The reliability", etc factors were accepted at the p<0.05 level of significant in 4 factors. In order words, electronic commerce satisfaction became greater when better convenience and economy were provided, the ethics were observed better, more diverse information was supplied and better system support was given, and those who had a higher educational background or better perception of electronic commerce felt more satisfaction. Finally, more usefulness of electronic commerce led to bigger satisfaction after purchase.

  • PDF

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

A Study on the Effects of Entry of Mobile Business Company to On-line Contents Market (이동통신사의 콘텐츠 시장 진입에 따른 영향과 정책과제)

  • Kim, Yong-Hwan
    • International Commerce and Information Review
    • /
    • v.7 no.4
    • /
    • pp.287-303
    • /
    • 2005
  • Mobile Business Companies open its music service and enters into the contents market. The entry of mobile business companies will be able to give diverse benefits to consumer. But, M&A between mobile business companies and contents companies may bring decreasing effect of number of creative industries. For the protection of small company producing cultural contents in contents market, fair transection competition order should be improved as soon as possible.

  • PDF

A Study on the Factors Affecting e-Trade Export Performance in SMEs (중소기업의 전자무역 수출성과 요인분석)

  • Kwon, Won-Soon;Oh, Jeong-Suk
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.131-149
    • /
    • 2007
  • E-tade has the potential to accelerate existing trends and introduce new ways of conducting traditional trade. The primary purpose of this research is to investigate performance factor and analyzes influence between performance of e-Trade and implementation of company. This research will be used as a basis for examining the actual results of e-Trade usage and export productivity. In order to facilitate the process, analysis began after a research prototype was created and research thesis established.

  • PDF

Personal Data Security in Recruitment Platforms

  • Bajoudah, Alya'a;AlSuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.310-318
    • /
    • 2022
  • Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.