• Title/Summary/Keyword: Negotiation process

Search Result 212, Processing Time 0.025 seconds

A Study on the Utilization and Development of Online Dispute Resolution System (온라인분쟁해결제도의 활용과 발전방향에 관한 연구)

  • Choi, Seok-Beom;Jung, Jae-Woo
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.23-41
    • /
    • 2004
  • Rapid development of computer and telecommunication technology brought out the expansion of electronic commerce which is the new type of business transaction. Offline transaction can lead to problems and disputes the same is for cyberspace transactions. However ADR is not meet for the online transaction for speed, cost and open network system, ODR methods to resolve electronic commerce conflicts is crucial for building confidence and permitting access to justice in an online business environment. And ADR refers to processes other than judicial determination in which an impartial person assists those in a dispute to resolve the issues between them. ODR refers to ADR processes assisted by information technology, particularly the internet. ODR has been available since 1996. Its development can be as passing through three broad stages : hobbyist, experimental, entrepreneurial, institutional phrase. Also, ODR has adapted a range of traditional ADR for use online, including arbitration. mediation. facilitated negotiation and case appraisal. Mediation and arbitration have been the most prevalent forms of ODR. ODR is the burgeoning field and has created a new issues. All such issues which have been debated in the ADR are composed with ODR. But these are not limited. Some of issues are further complicated by the nature of the online environment such as confidentiality and principle of parties. Finally electronic commerce now takes place on the Internet, it is inevitable that the commercial world wants access to dispute resolution process that best suits the new commercial environment. ODR methods are processing for development and legal issues are considered by both national and international authorities.

  • PDF

Adaptation Experiences of Male Students in Nursing Education Programs: A Meta-synthesis Study (간호학과 남학생의 학과 적응에 관한 질적 메타합성 연구)

  • Son, Haeng-Mi;Oh, Seieun;Jang, Hye-Young
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.4
    • /
    • pp.391-405
    • /
    • 2018
  • Purpose: The purpose of this study was to integrate and synthesize findings from qualitative studies exploring male students' experiences of adapting to nursing education programs so as to obtain further understanding of the phenomenon. Methods: The meta-synthesis process was primarily guided by Noblit and Hare's approach, which consists of four stages including searching, appraisal of an individual study's quality, data extraction for analysis, and meta-synthesizing the results. Results: Findings from the literature reviewed were synthesized into six themes: 1) extraordinary choice based on job stability and gender scarcity; 2) unexpected feeling of marginalization as minority far apart from the mainstream; 3) assimilation and negotiation for relational adaptation through perspective shift; 4) fortifying the vision and identity as nursing students by meaning making for adapting to the nursing major; 5) mutual support among colleague male students; and 6) serving in the military as way of hiding out and achieving maturation. Conclusion: The findings illustrate that nursing education programs need practical changes promoting male students' adaptation to the program itself as well as preparation to be a professional nurse in the future.

A Case Study on the e-SCM Web-service Design for Auto-parts Industry of a Commercial Vehicle (상용차 부품 조달 기업을 위한 e-SCM 웹서비스 설계 및 구현 사례 연구)

  • Oh, Myung-Hyun;Yang, Jae-Kyung
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.1
    • /
    • pp.129-136
    • /
    • 2012
  • This study proposes a collaboration system framework on the web service in a supply chain to implement an efficient virtual supply chain and improve an ability to fulfill received orders over a supply chain. The system based on the framework proposed in this paper plays an important role for automatic order negotiation and placing/receiving an order noticed in web service by the main system. Furthermore, it can evaluate the fulfillment of received orders over a supply chain by using the transaction results from hierarchically related vendors and establish efficient manufacturing plans. In a word, this system is the automated system for creating manufacturing plans, placing and receiving orders. A little more important main function of this system is that it has a dynamic evaluation capability about fulfillment with received orders over a supply chain, and improves the evaluation method of fulfillment ability with received orders with related to direct dealing vendors, which is a main problem in existing system. As a result, this system is able to reduce the work load of the sales and purchasing materials, production control division, to manage accurate inventory promptly, to maintain the optimal inventory level by analyzing the information of fulfillment ability with received orders, and to enhance the level of service for customers.

Injunctions and Hold-up under Weak Patent Protection

  • SIM, KYOUNGBO
    • KDI Journal of Economic Policy
    • /
    • v.42 no.2
    • /
    • pp.1-30
    • /
    • 2020
  • This paper analyzes how injunctions relate to patent hold-up problems. To this end, we present a simple model of licensing negotiations between a patent holder and a downstream firm in the shadow of litigation. More specifically, we consider the situation in which an injunction is granted as a matter of course if a patent is found valid and infringed upon in litigation, but the patent holder may be under-compensated due to aspects of the patent remedy system other than injunctions. We show that if the downstream user is unaware of the patent before any investment in initially designing its product, the patent hold-up problems created by injunction threats are worrisome when (i) the redesign process is costly, (ii) the degree of patent protection (by aspects of the patent remedy system other than injunctions) is sufficiently strong and (iii) the injunction is requested not to practice the patented technology exclusively but to collect excessive patent royalties. Even if the downstream user is aware of the patent before the initial investment, the patent hold-up problems do not disappear. The findings here imply that a discretionary approach is required towards denying injunctions against patent infringement. If the degree of patent protection is not sufficiently strong, denying injunctions can exacerbate the under-compensation problem. However, once patent protection improves enough (not necessarily perfectly), we may see a surge of patent hold-up problems, and it would be better to apply alternative patent remedies in place of injunctions when necessary. Lastly, we discuss several possible alternatives to injunctions and their pros and cons.

Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol

  • Wei, Guiyi;Yang, Xianbo;Shao, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3352-3365
    • /
    • 2012
  • Group key agreement (GKA) is a cryptographic primitive allowing two or more users to negotiate a shared session key over public networks. Wu et al. recently introduced the concept of asymmetric GKA that allows a group of users to negotiate a common public key, while each user only needs to hold his/her respective private key. However, Wu et al.'s protocol can not resist active attacks, such as fabrication. To solve this problem, Zhang et al. proposed an authenticated asymmetric GKA protocol, where each user is authenticated during the negotiation process, so it can resist active attacks. Whereas, Zhang et al.'s protocol needs a partially trusted certificate authority to issue certificates, which brings a heavy certificate management burden. To eliminate such cost, Zhang et al. constructed another protocol in identity-based setting. Unfortunately, it suffers from the so-called key escrow problem. In this paper, we propose the certificateless authenticated asymmetric group key agreement protocol which does not have certificate management burden and key escrow problem. Besides, our protocol achieves known-key security, unknown key-share security, key-compromise impersonation security, and key control security. Our simulation based on the pairing-based cryptography (PBC) library shows that this protocol is efficient and practical.

Empirical Study on Determinants of T/T Payment Risk in International Trade (무역거래에서 송금(T/T)방식의 결제 위험성에 영향을 미치는 요인분석)

  • Han, Woo-Jung;Cho, Hyuk-Soo
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.87-103
    • /
    • 2019
  • L/C(Letter of Credit) is a common payment term designed to prevent credit risk in international trade. However, most companies prefer T/T (Telegraphic Transfer) payment due to its time and cost efficiency. According to related statistics, more than 70% of international trade contracts are based on T/T rather than other payment terms. The time required from the export negotiation to the completion of the export transaction and collection in international trade is very long. In this process, disputes related to settlement are continuous, so caution should be exercised. Therefore, whether or not the export payment is recovered in a timely manner is the core issue of trade transactions for exporters. The purpose of this study is to identify problems that cause delayed payments during settlement by the remittance (T/T) method, which can lead to settlement risk, in order to investigate those factors which can lead to delays in payments and increased risk as well as to determine ways to prevent such factors in advance. According to empirical findings, trading experience, transaction duration, and contract contents can be important determinants in terms of payment delays. Industry uniqueness and market uncertainty were found to be in opposition to the hypothesized relationships. The results of this study will be useful for trading companies to reduce their payment risk.

Decolonization and Survival Strategies in Sherman Alexie's Reservation Blues (셔먼 알렉시의 『레저베이션 블루스』에 나타난 탈식민화와 생존전략)

  • Kang, Jamo
    • Journal of English Language & Literature
    • /
    • v.59 no.4
    • /
    • pp.569-592
    • /
    • 2013
  • In Reservation Blues, Sherman Alexie examines how Indians can survive successfully in contemporary America, overcoming the tragic history of colonialists' violence and the resultant traumata. For Alexie, both reassembling the parts of the colonialist history through remembrance and testifying its unjustness play important roles not only in the decolonization process which probes the remnants and the negative effects of the colonialism deeply rooted in the lives of Indians but in the procedure of healing the political, cultural, and religious traumata. However, it should be noted that the ultimate aim of Alexie's decolonization does not lie in erasing every trace of the colonialism but in transforming its legacy into a story of survivance. The recovery of the tribal voices and the preservation of Indian traditions, blood, and cultures are essential in the survivance of Indians. Yet, Alexie's tribalism should not be viewed as an exclusive one. He knows well that it is neither possible nor desirable to maintain an exclusive tribalism based on blind adherence to a mythic or "pure" past. Exclusive tribalism is a cause for alarm in the contemporary world, a dynamic place where diverse cultures consistently change through collision, exchange, and negotiation. In Reservation Blues, Alexie stresses a spiritual and cultural flexibility that makes the cultural interpenetration possible as a key element of the meaningful survivance of contemporary American Indians.

An Implementation and Performance Evaluation of IPsec System engaged IKEv2 Protocol Engine (IPsec System에서 IKEv2 프로토콜 엔진의 구현 및 성능 평가)

  • Kim, Sung-Chan;Chun, Jun-Ho;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.35-46
    • /
    • 2006
  • The current Internet Key Exchange protocol(IKE) which has been used for key exchange of security system was pointed out the faults of scalability, speed, efficiency and stability. In this research, we tried to resolve those faults, and implemented the newly designed IKEv2 protocol in the IPsec test bed system. In the trend of network expansion, the current Internet Key Exchange protocol has a limitation of network scalability, so we implemented the new Internet Key Exchange protocol as a recommendation of RFC proposal, so as to resolve the fault of the key exchange complexity and the speed of authentication process. We improved the key exchange speed as a result of simplification of complex key exchange phase, and increased efficiency with using the preexistence state value in negotiation phase.

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

The Payment Term Choice on E-marketplace: Focusing on Status Quo Bias and Anchoring Effect (무역거래알선사이트에서의 결제조건 선택: 현상유지편향과 정박효과를 중심으로)

  • Yoon Lee;Hong-joo Jung
    • Korea Trade Review
    • /
    • v.46 no.1
    • /
    • pp.23-38
    • /
    • 2021
  • This paper investigated the preference change of payment terms in international trade along with counteroffer or first offer conditions of the other parties. Studies on trade payment terms have mainly focused on payment term determination factors such as firm size, product price level, country credit rate, etc. We tried to find other factors affecting payment terms choice, during the negotiation process. We applied behavioral economics theories such as 'Status Quo Bias' and 'Anchoring effect' to build our research model. To prove the existence of the above effects, we proceeded with field experiments to the exporting companies in Alibaba.com. Both 'Status Quo Bias' and 'Anchoring effect' were found in the field experiment. Most of the exporting companies preferred traditional payment methods to new payment methods. And an initial request for a low advance payment ratio led to a lower advance payment ratio. Also, the experience of using new payment methods could diminish status quo bias. This paper applied behavioral economics theories and field experiment methodology to the payment term studies in international trades. These attempts could contribute to expanding the diversity of methodology and scope of international trade studies.