• Title/Summary/Keyword: digital payments

Search Result 35, Processing Time 0.02 seconds

Legal Bases for the Termination of a Contract under Common European Contract Law (유럽공통매매법(CESL)상 계약의 종료단계에서의 법적 기준 - CISG와의 비교를 중심으로 -)

  • SHIM, Chong-Seok
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.67
    • /
    • pp.23-47
    • /
    • 2015
  • European Commission drafted and proposed the Common European Sales Law(CESL) to the European Parliament for the realization of a uniform set of international private law rules within the EU internal market. Since its purpose is for free international commercial activities for the sale of goods, for the supply of digital content and for related services, it was proposed to enable EU Member States to adopt or supplement as their substantive law according to their options. This study is relate to the legal bases on termination of a contract under CESL, they are composed of three parts: damages and interest, restitution and prescription. Damages and interest are divided into damages, general provisions on interest on late payments, and late payment by traders. Damages are explained by dividing into right to damages, general measure of damages, foreseeability of loss, loss attributable to creditor, reduction of loss, substitute transaction, and current price. Restitution is described by dividing into restitution on revocation, payment for monetary value, payment for use and interest on money received, compensation for expenditure and equitable modification. Prescription is explained by dividing into general provisions, periods of prescription and their commencement and extension of periods of prescription. General provisions explain right subject to prescription into a right to enforce performance of an obligation and any right ancillary to such a right. Regarding period of prescription, the short one is two years and the long one is ten years. However, in the case of a right to damages for personal injuries, period of prescription for such right is thirty years. Regarding commencement, the short one begins to run from the time when the creditor has become, or could be expected to have become, aware of the facts as a result of which the right can be exercised, while the long one begins to run from the time when the debtor has to perform. However, in the case of a right to damages, the CESL clarifies that it begins to run from the time of the act which gives rise the right.

  • PDF

A Study on Space Utilization according to Changes in Non-face-to-Face Consumer Use : Focused on bank offices

  • Hwang, Sungi;Ryu, Gihwan;Yun, Daiyeol;Kim, Heeyoung
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.271-278
    • /
    • 2020
  • Modern financial services go beyond the stage of internet banking, and new concepts of financial transactions such as Internet of Things, mobile banking, electronic payments, and fintech have emerged. As a result, banks are less influential in financial transactions, and changes are being demanded. In the present era, the basic business of banks has decreased, and it is transforming into a space where both consumer finance work and reside. The bank office stands for the brand image of the bank, and it is represented by trust with customers in the basic business of financial transactions, and the rise in real estate value is a natural social phenomenon due to the nature of the location and location of real estate owned by the bank. The business method and space of the bank office that meets the new paradigm of the modern society is an inefficient space only for the convenience and rest of consumers, but it must be used as a variety of spaces suitable for the region to increase the functional value of the bank office. Through this study, as a convenience space for consumers, various service facilities should be introduced to understand the characteristics of the region as a convenience space for consumers, and various service facilities should be introduced to meet the needs of consumers, and the bank office should be improved as a complex service space for local residents.

Designing Mobile Application for Korean Traditional Markets Based on O2O Service Platform (O2O 서비스 기반 전통시장 주문 모바일 어플리케이션의 설계 및 개발)

  • Bang, young sun;Yang, Seung Mok;Jeon, Hye Rin;Lee, Danielle
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1689-1697
    • /
    • 2018
  • This paper explored how to design amobile application for Korea's traditional markets based on O2O service and data science technologies. In order to cover a broader scope of customers, diversify the ways to sell products, and increase the profits of Korea's traditional markets, the application bridges online customers with offline stores at traditional markets and augments both convenience and accessibility. Beyond the typical face-to-face interactions between customers and sellers at traditional markets, this application offers mobile payments and personalized recommendations of nearby stores and preferable products using Beacon and datascience technologies. Moreover, it offers multi-language support for foreign customers who are not familiar with Korea's traditional markets and the products sold there. In conclusion, using O2O service, which is a rising trend among prevalent platform technologies, this study proposed a new e-commerce model for Korea's traditional markets to promote market expansion.

Dutch Touch : Mobile Application with Easy Dutch Pay (더치 터치: 더치페이를 쉽게 해주는 모바일 어플리케이션 구현)

  • Song, Yoojeong;Moon, Yeeun;Eom, Jiyeon;Lee, Jongwoo
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.11-18
    • /
    • 2018
  • The Dutch treat culture, which pays for the cost of having meetings with a large number of people, is located in the daily life of many modern people. In particular, the execution of Kim Young-ran is a more active Dutch treat. However, when going dutch, there is a case where the amount of money to be paid per person is not divided equitably and there is an ambiguous situation about who should pay more. Also if one person have to pay all of the payments because of the different payment method such as a cash or card, there is inconvenience to keep a record of the financial relationship each time. In this paper, we introduce an application that allows several people to easily calculate the amount of money to pay per person when eating together or calculating something. From our service, you can easily access with web-based service, manage the user's debts more conveniently through forming the group. In addition, we focused on convenient calculation of cost by setting remaining unit and reserve function which is a function to overcome the disadvantages of existing application. Also, we maintain fairness through games in situations where the users need to make a choice.

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.