• Title/Summary/Keyword: The Third Party

Search Result 871, Processing Time 0.021 seconds

Determination of Product and Certification Specification (제품 및 인증규격의 결정방법)

  • Choi, Sung-Woon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2007.04a
    • /
    • pp.457-465
    • /
    • 2007
  • This paper introduces determination rules for specifications of quality characteristics and dependability requirements. This study also presents guidelines for various inclusions in standards such as environmental aspects, safety aspects, third-party certification systems, medical devices, and the needs of older persons and persons with disabilities.

  • PDF

International Traders' Measures against Contract Disputes in International Transactions - Focusing on the Matter of Governing Law (국제무역계약상 분쟁에 대비한 무역실무자의 대응 - 준거법문제를 중심으로 -)

  • Heo, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.45
    • /
    • pp.51-82
    • /
    • 2010
  • The "rules of private international law" or "conflict of law rules" work to determine the governing law, the law applicable to international contracts. These rules permit parties' autonomy to choose the law applicable to their contracts in cases of both litigations and arbitrations. In this regards, the present article examines parties' five options for the choice of the law governing their contracts, which the parties should consider when negotiating and drafting an international agreement. This means that parties in international contracting should check the contents of the law that they are to choose as the governing law before doing so. The first option is to submit the contract to its own law, which can be the safest and simplest solution generally. However this option is subject to the consent of the other party, and is not appropriate when the domestic law chosen contains mandatory rules strongly protecting the other party. Secondly, the option of choosing the other party's law is not preferable in general. Even though the other party is strong enough to succeed in insisting on applying its own law, the other party is advised to counter-offer a neutral solution by suggesting the application of a transnational set of rules and principles of international contract, such as Unidroit Principles. The third option to choose the law of a third country should be taken with the caution that it should be harmonized with either, in case of litigations, the international jurisdiction clause which makes the country chosen have the jurisdiction over the dispute arising under the contract, or, in case of arbitrations, the way of selection of the arbitrator who has good knowledge of the law chosen. The fourth option of submitting the contract to the lex mercatoria or the general principles of law including the Unidroit Principles can be a advisable solution when a dispute is designed to be submitted to experienced arbitrators. The final and fifth is to be silent on the choice of the governing law in contracting. This option can be usefully available by experienced negotiators who are well familiar with the conflict of laws rules and enables the parties to avoid the difficulties to agree on the governing law issue and leave it open until a dispute arises.

  • PDF

Scheme for Verification Between Mobile Devices in a Service with Expiration Time by Using Zero-knowledge Proof (영지식 증명을 이용한 가입기간이 정해진 서비스에서 이동 통신 기기간 인증 기법)

  • Park, Young-Hoon;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.23-32
    • /
    • 2013
  • As the mobile communication technology is developed, the services for communication between the mobile devices are provided, and the amount of usage is increasing tremendously. For the device-to-device communication, the device should be verified if it is a service member. The existing verification schemes include interactions with the third party, while this may cause the problems that the bandwidth is dissipated and the devices which are out of the communication range of the base station cannot communicate with other devices. To solve such problems, we propose a new scheme for verification between mobile devices without interaction of third party. For the proposed scheme, we develop and employ a new zero-knowledge proof protocol, which verifies the device's membership and its expiration time. Furthermore, the scheme guarantees privacy of the mobile device since it checks the encrypted verification message without decrypting, and protects replaying attack since it uses challenge-response method.

A Study on the Protecting of Personal Information in Offline Transactions : Focused on the Housing Lease Agreements (오프라인 거래에서 개인정보 보호방안 : 주택임대차계약을 중심으로)

  • Kim, HyoSeok;Park, Soon-Tai;Kim, Yong-Min
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.243-252
    • /
    • 2020
  • Recently, the proportion of housing lease has been increasing to an overwhelming level in line with the increase of single-person households and the change in the form of housing. In the normal case, the use of rental-type housing is subject to a housing lease agreement through a licensed real estate agent. In the event of a transaction conclusion, licensed real estate agent shall issue a contract containing the personal information of the lessee, the renter, and the licensed real estate agent to the transaction party. In this case, it is necessary for the lessee to provide the contract to a third party. This paper analyzes relevant laws and regulations and the status of housing transactions, focusing on personal information processed between offline housing lease agreements. And when issuing a contract through IRTS, we propose a way to protect personal information by providing a third party in three forms: information Data Subject-based, Purpose of usage-based De-identification, and Certificate of Contract.

Effects of the Fair Value of Biological Assets on the Cost of Debt: An International Study

  • ERFAN, Neven;ALI, Ijaz;KHAN, Soha;KHAN, Imran Ahmad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.8
    • /
    • pp.71-80
    • /
    • 2022
  • This study aims to investigate the effects of fair value valuation of biological assets and bearer plants measured at historical cost on the cost of third-party capital. The study contributes to the agricultural sector and the International Accounting Standard - IAS 41, which has been modified to remove the requirement to apply fair value for bearer plants, one of the primary biological assets with no active market. For this, 182 companies from 39 countries were studied in the years 2020 and 2021, with information taken from the Thomson Reuters Eikon platform. The methodology involves regression by the ordinary least squares method based on the model of Daly and Skaife (2016). The results show that the biological asset at fair value does not influence the cost of debt and that the measurement of bearer plants at historical cost has no effect on the cost of debt. Fair value did not change the perceived cost of debt of the analyzed companies in the studied period, contrary to Daly and Skaife (2016). Finally, the cost of third-party capital can be influenced by other aspects related to profit quality, which were not examined in this paper, such as profit management.

A Study on the Some Problems in Relation to the Issuance of Letters of Credit (신용장의 개설 관련 제 문제에 관한 연구)

  • Lee, Bang-Sik;Park, Suk-Jae
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.46
    • /
    • pp.159-177
    • /
    • 2010
  • This work intends to study some problems in relation to the issuance of letters of credit. Those problems are the delay of issuing letters of credit, the reissuing letters of credit, and the issuing letters of credit in the third party's name. Sellers and buyers must keep in mind that the supply of letter of credit by buyer is the condition precedent for a seller's shipment obligation. A seller has no obligation to ship the goods until he receives the letter of credit by buyer's bank, issuing bank. An issuing bank can have the risk that an original letter of credit and a reissued letter of credit can be used double in the exporting country. The most safe method for issuing bank is to cancel the original letter of credit and to reissue a new letter of credit. When an issuing bank issues a letter of credit in the third party's name, the bank should investigate the background of the transaction and give the buyer a proper line of credit.

  • PDF

Connecting Value and Costs

  • Eddy David M.
    • 대한예방의학회:학술대회논문집
    • /
    • 1994.02b
    • /
    • pp.84-86
    • /
    • 1994
  • AS A SOCIETY, we are in conflict with ourselves about the cost of health care. 1 On one hand, we want the best care possible, regardless of cost. On the other hand, we are not willing to pay the cost of the care we want. Our conflict parallels a flaw in the medical marketplace. An essential condition for achieving an equilibrium between cost and value is that the two must be connected through decisions. When people decide what products and services (goods) they want, they must not only see the value they will receive, but they mast also be responsible for the costs. Because of a variety of features of the medical marketplace-most notably third-party coverage, third-party advice, and uncertainty about outcomes-the required connection between value and cost is severed. The result is what we see. One side of our collective mind demands more services while the other side cries that costs are too high. Resolving our conflict will require connecting value to cost. An essential step in accomplishing this will be to incorporate costs in practice policies. 1 As controversial as that thought might seem (the great majority of practice policies currently do not take costs into account except in the most rudimentary way), arriving at the conclusion is the easy part. A more difficult issue is how to implement the goal of connecting value to cost. Suppose we agree that, in principle, costs should be considered when practice policies are designed, and that an activity should be recommended and covered only if its health outcomes (benefits minus hanns) are deemed to be worth its costs. The next questions are, Who should do the deeming? What should the deemers be asked?

  • PDF

Looking Back over a Decade "Final Decision Call after the Accidents of the Fukushima Nuclear Power Plant"

  • Nakajima, Isao;Kurokawa, Kiyoshi
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.147-156
    • /
    • 2020
  • The author Nakajima was involved in the field of disaster communications and emergency medical care as guest research scientist at the Fukushima Nuclear Accident Independent Investigation Commission established by the National Diet of Japan and reviewer of the Commission's report, and Kurokawa was the chairman of this Commission. Looking back over a decade, we are on the liability issue of bureaucrats and telecom operators, so it's becoming clear what was hidden at the time. The battery of NTT DoCoMo's mobile phone repeaters had a capacity of only about 24 hours, and communication failures increased after one day. The Government also failed to issue an announcement of "Vent from reactor" under the Telecommunications Act Article No. 129. This mistake lost the opportunity to use the third-party telecommunications (e.g. taxi radios). Furthermore, as a result of LASCOM (telecommunications satellite network for local governments via GEO) and a variety of unexpected communication failures, the evacuation order "Escape!" could not be notified to the general public well. As a result, the general public was exposed to unnecessary radiation exposure. Such bureaucratic slow action in emergencies is common in the response to the 2020 coronavirus.

A Study on Assessor's Competence and Efficiency of Software Process Assessment (SPA 심사원 능력과 효율성에 관한 연구)

  • Lee, Jong-Moo;Park, Cheol-Soo;Kim, Mahn-Sul
    • The Journal of Information Systems
    • /
    • v.20 no.2
    • /
    • pp.1-20
    • /
    • 2011
  • In this study, we verify the relationship, which is presented by ISO/IEC 15504, between the assessor's competence and the efficiency of assessment. The ISO standard has been developed by many formal trial experiences for the software process assessment. The software process assessment determines the process capability, and makes the software process improvement possible in the development cycle. In the field assessment, third-party and team-based assessments are generally recommended. Therefore assessors' competences are essential to achieve the effectiveness and the efficiency of assessment. Survey data are collected from the third-party process assessment of a real IT industry, and the analysis is done by a causal modelling technique - PLS. Some findings are as follows. Depending on assessors' SE experiences, effects of the assessor's competence are existed, and their standard knowledge and assessment skill are effected each other. And the efficiency of assessment depends on the assessor's competence. In addition, the power analysis is presented and future research is suggested, because of many limitations of this study.

Zero-Knowledge Nominative Signatures (영지식 수신자 지정 서명방식)

  • 김승주
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.1
    • /
    • pp.15-24
    • /
    • 1996
  • In this paper, we propose a new kind of signature scheme, called 'nominative signatures&, which is the dual scheme of undeniable signatures. Also we construct a zero-knowledge protocol that implements it. The new technique called 'nominative signatures' achieves these objectives: only nominee can verity the nominator(signer)'s signature and if necessary, only nominee can prove to the third party that the signature is issued to him(her) and is valid. Contraty to the undeniable signature scheme, nominative signatures are confirmed via a protocol between the nominee and the third party, so the cooperation of the nominee is necessary. That is, not a signer(nominator) but a verifier(nominee) can control the abuse of signatures - undeniable signature cannot be verified without the cooperation of the signer, so the signer controls the abuse of signatures. Our nominative signatures are very valuable for the case in which the content of signature is concerned with the verifier's privacy.