• Title/Summary/Keyword: Negotiation technique

Search Result 25, Processing Time 0.027 seconds

Korea-China Conflicts in Business: A Search after their Solutions (한·중 비즈니스 관계의 갈등과 그 해결방안에 대한 모색)

  • KIM, Ju-Won;KIM, Yong-June
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.66
    • /
    • pp.191-218
    • /
    • 2015
  • This research is, first of all, a theoretical study concerning 'conflict.' Only then, we could obtain ways in which we manage and resolve various problems arising from conflicts in business between Korean and Chinese companies. In doing this, we also tried to grasp cultural characteristics, or factors, in Chinese ways of carrying out negotiations that lead to conflicts with us. On the basis of these preliminary considerations, we developed practical techniques of conflict management and types of negotiation strategy. We thereby could suggest broader strategic implications for better performance in international business. Concretely, this research investigates techniques of conflict management and types of negotiation strategy. For such techniques and types, we suggest, (1) Sharing technique or reconciliatory compromising negotiation and its compromise strategy, (2) collaborative technique or cooperative negotiation and its win-win strategy, (3) competitive technique or competitive negotiation and its profit-seeking attack strategy, (4) accommodative technique or receptive negotiation and its relation-maintaining yield strategy, (5) avoidant technique or evasive negotiation and its indifference-showing avoidance strategy. This research contributes to promote understanding on negotiation culture of chinese corporate. and we provide the guideline of the conflict management and the insight for the efficiency strategy of chinese business negotiation. But, empirical data and statistical examinations should be added to our present research for the future prospective ones.

  • PDF

Canal preparation with nickel-titanium or stainless steel instruments without the risk of instrument fracture: preliminary observations

  • Yared, Ghassan
    • Restorative Dentistry and Endodontics
    • /
    • v.40 no.1
    • /
    • pp.85-90
    • /
    • 2015
  • This report introduces a novel technique that allows a safe and predictable canal negotiation, creation of a glide path and canal preparation with reciprocating nickeltitanium or stainless steel engine-driven instruments in canals where the use of rotary and the newly developed reciprocating instruments is contraindicated. In this novel technique, the instruments are used in reciprocating motion with very small angles. Hand files are not used regardless of the complexity of the canal anatomy. It also allows achieving predictable results in canal negotiation and glide path creation in challenging canals without the risk of instrument fracture.

A Technique for Classifying Requirement/Stakeholder and Generating Information for Negotiation Using Kano Model and Statistical Method (Kano 모델과 통계 기법을 이용한 요구사항 분류 및 협상을 위한 정보 생성 기법)

  • Byun, Jung-Won;Kim, Ji-Hyeok;Rhew, Sung-Yul;Hwang, Man-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.3
    • /
    • pp.161-169
    • /
    • 2010
  • The requirement elicitation is the task of eliciting requirements from needs of stakeholders, and preparing for information for negotiation. However, there are methods for gathering needs, but there is no specific method for classifying them, generating information for negotiation. Therefore, To solve the problems, this paper proposes a method to classify requirement and to generate information for negotiation. The proposed methods use Kano model, statistical technique, and identifying relationship between requirements and problems within scope. Finally, we validate the proposed method on simulations, Rough Set Theory, and case study of model.

A Study on the Comparative Pattern of Trade Negotiation between Korea and Japan (한국인(韓國人)의 무역협상방식(貿易協商方式)에 관한 연구(硏究) - 일본인의 협상방식비교 -)

  • Kang, Jin-Seok
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.291-321
    • /
    • 2000
  • This study investigates the different pattern of trade negotiation between Korea and Japan. For the Korea, it is inevitable to enhance nation's competitiveness position amid the rapidly changed international environment. Especially, Korea's recent experience of IMF credit under economic crisis during 1997-1999 tells us the importance of international trade and trade negotiation. Our main interest is focused on the comparative pattern of both countries with the recognition that the role of the negotiation can not be overemphasized for the Korea. This is because Korea has continuously recorded the huge trade deficits with Japan for the long time. Although we consider the different degrees of products quality, industrial structure, productivity, and national competitiveness of both countries, it is necessarily required to pay special attention on different pattern of negotiation skills and tactics between two countries. In the paper, we suggest some important guidelines for Korea to improve its negotiation technique with Japan. First, valuing human relation between negotiators, rather than negotiating process. Second, preparing for negotiations: the negotiators should try to carve out enough time to prepare for the bargaining. Third, appreciating the power of patience: very essential to effective outputs. Fourth, being a specialist on both countries' culture and avoiding lawyers' intervention for conflict resolution.

  • PDF

A Study on Building a Negotiation Framework to Resolve Conflicts from Constructing New Roads or Expanding Existing Roads (도로신설 혹은 확장 과정에서 나타나는 갈등해결을 위한 협상체계 구축연구)

  • Hwang, Kyung-Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.34 no.3
    • /
    • pp.955-963
    • /
    • 2014
  • The objective of this study is to identify ways to resolve conflicts arising from building new roads or expanding existing roads by introducing negotiation techniques to the Jeju government. A case of city planning (Jungjeong-ro, Seogwipo City, Jeju Special Self-Governing Province) was analyzed in this study in an aspect of negotiation. In the case, the Committee for Promoting and Vitalizing Jungjeong-ro conducted negotiations from February, 2011 to December, 2011. This study proposes ways to establish systems which resolve problems during negotiation processes and frame concepts related to negotiation in the overall administrative systems. Firstly, setting up a negotiation management team within the provincial office and supporting it fully is needed. Secondly, there should be a process in which decisions made by the negotiation team become authoritative. Thirdly, for smooth negotiation processes, it is necessary to formulate ground rules and make negotiating parties obey them thoroughly. Fourthly, a negotiation clinic team should be established at the Jeju provincial government. Fifthly, there should be a negotiation school within the framework of human resources development. Sixthly, If officials do their negotiation jobs positively, a reward system should be established to give them adequate rewards. Lastly, concept of negotiation should take root in administration in general.

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

A Study on Preventing SA Re-negotiation for Mobility Support in Mobile IP VPN Environment (모바일 IP VPN 환경에서의 이동성 지원에 따른 SA 재협상 방지에 관한 연구)

  • 차정석;김태윤;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.891-898
    • /
    • 2003
  • In the remote access VPN architecture which is based on IPsec, if the VPN client wants to be served the VPN service continuously during VPN client's handoff, It needs the techniques to merge VPN with Mobile IP. In this case, if the VPN client roams to new subnet, it acquires new CoA. As a result of changing IP address, existing SA becomes useless and new SA is required. The SA renegotiation process results from handoff of the VPN client and does not result from security aspect. Hence, In the environment which includes many handoffs, overhead by SA re-negotiation deteriorates performance. In this paper, we propose the technique provides that it doesn't need to renegotiate SA and be able to get the security service continuously even though MN's handoff occurs in Mobile IP VPN environment.

A 3-Party Negotiation Protocol Design for the Security of Self-Organized Storage on Infra-Clouding Environment (인프라 클라우딩(Infra Clouding) 환경에서 자가조직 저장매체의 보안을 위한 3자간 협상 프로토콜 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1303-1310
    • /
    • 2011
  • This paper proposes the design of 3-party negotiation protocol for the security of self_organized storage which consists of the owner node possessing data, the holder node holding the owner's data and the verification node verifying the data of the holder node on infra-cloud environment. The proposed security technique delegating the data verification of the holder node to the verification node increases the efficiency of the self-organized storage. In addition, the encrypt key and certification of the storage created by EC-DH algorithm enhances the security much more. Also, when the self-organized storage is composed, the security technique not only prevents external flooding attack by setting a certification key among three parties, but also prevents internal flooding attack by restricting the number of verification nodes. And The replay attack which can occur in the step of verification is automatically detected by using the created seed value whenever the verification is requested.

A petri-net based execution model of processing equipment for CSCW-based shop floor control in agile manufacturing

  • Hong, Soondo;Cho, Hyuenbo;Jung, Mooyoung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.193-200
    • /
    • 1995
  • A shop floor control system(SFCS), a central part of agile manufacturing, performs the production activities required to fill orders. In order to effectively control these activities, CSCW (computer supported cooperative work) is adopted where a supervisor does not exist. In this paper, we define functional perspective of CSCW-based shop floor control using planning, scheduling, and execution functions. In particular, we focus on an execution model that can coordinate the planning and scheduling functions. Execution can be defined informally as a function that downloads and performs a set of scheduled tasks. Execution is also responsible for identifying and resolving various errors whether they come from hardware or software. The purpose of this research is to identify all the execution activities and solving techniques under the assumptions of CSCW-based heterarchical control architecture. This paper also proposes a classification scheme for execution activities of CSCW-based heterarchical control architecture. Petri-nets are used as a unified framework for modeling and controlling execution activities. For solving the nonexistence of a supervisor, A negotiation-based solution technique is utilized.

  • PDF

Web-Based Negotiation Support Systems Approach to Inter-Departmental Conflicts Resolution (부서간 갈등을 해결하기 위한 웹 기반 협상지원시스템에 관한 연구)

  • Lee, Kun-Chang;Kim, Jin-Sung
    • Asia pacific journal of information systems
    • /
    • v.10 no.4
    • /
    • pp.153-180
    • /
    • 2000
  • The objective of this paper is to propose a Web-based Negotiation Support System(NSS) to facilitate conflict resolution between departments in a firm. As the management environment is recently becoming more complex and competitive, the need for harmonizing department functions in a firm is increasing much more than ever. In literature, most of conflict resolution approaches have been based on a sort of behavioral concepts including regular meeting or conference. However, as the department functions are wired through the Internet, a new approach to conflict resolution using the web-based technique is deemed necessary. For this purpose, we developed a Web NSS and illustrated a typical case in which conflicts between production and marketing functions are resolved using the Web NSS.

  • PDF