• Title/Summary/Keyword: electronic trade

Search Result 480, Processing Time 0.023 seconds

The Comparative Study between Korean and Indian Students regarding Relationship among Self-leadership Types, Performance and Class Attendance Attitudes (학습태도를 매개변수로 한 셀프리더십 유형과 학업성과간 관계: 한국과 인도간 비교연구)

  • Park, Ki-Ho;Park, Sang-Hyeok
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.253-265
    • /
    • 2011
  • A number of organizations have had big interests in studies concerning leadership and not only academia but also psychological areas do also. Until now, leadership has been accentuated by managers or team leaders especially. Recently, however, the concept of self-leadership directing one's own activities through self-control or self-management is being focused on in practices and in academia. This study is to investigate the influence between self-leadership strategies as predictors and learning performance in IT classes as dependents variables mediated by attitude of attendance focused on the social science students in two universities (Korea(116 samples) and India(36 samples)). And this research tried to compare difference between two university students. As a result of empirical analysis, Korean learners making an effort by themselves show a tendency to think constructively. Namely, even though the level of difficulty may be high, by positive self-talk, respondents usually make an effort to get high academic performance. In case of Indian respondents, students who are in behavior-oriented show higher academic performance. Research results can give us direction of task-taking attitudes in firms or learning attitudes in teaching organizations and implications to human resource managers who are in charge of improving learning performance or productivity.

Assessing the Impacts of EU's Carbon Border Adjustment Mechanisms and Its Policy Implications: An Environmentally Extended Input-Output Analysis (환경산업연관분석을 활용한 탄소국경조정 메커니즘 도입에 따른 국내 산업계 영향 분석과 대응전략)

  • Yeo, Yeongjun;Cho, Hae-in;Jeong, Hoon
    • Environmental and Resource Economics Review
    • /
    • v.31 no.3
    • /
    • pp.419-449
    • /
    • 2022
  • This paper aims to quantify the potential economic burdens of EU's carbon border adjustment mechanisms faced by Korean domestic industries. In addition, this study tries to compare and analyzes changes in the burden of each industry resulted from the implementation of the domestic low-carbon policy. Based on the quantitative findings, we intend to suggest policy implications for establishing mid- to long-term strategies in response to climate change risks. Based on the environmentally extended input-output analysis, the total economic burdens of the domestic industries due to the EU's carbon border adjustment mechanisms are estimated to be approximately KRW 8,245.6 billion in 2030. Looking at the impacts by industry, it is found that major industries such as petrochemicals, petroleum refining, transportation equipment, steel, automobiles, and electric/electronic equipment industries are expected to account for 84.3% of the total potential burdens. In addition, in multiple policy scenarios assuming technological developments and energy transition following the implementation of domestic low-carbon policies, the total economic burden of carbon border adjustment is expected to decrease by about 11.7% to 15.0%. The main result of this study suggests that we should not view EU EU's carbon border adjustment mechanism as a trade regulation, but to use it as a momentum for more effective implementation of the low-carbon and energy transition strategies in the global carbon neural era.

Development of Industrial Embedded System Platform (산업용 임베디드 시스템 플랫폼 개발)

  • Kim, Dae-Nam;Kim, Kyo-Sun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.50-60
    • /
    • 2010
  • For the last half a century, the personal computer and software industries have been prosperous due to the incessant evolution of computer systems. In the 21st century, the embedded system market has greatly increased as the market shifted to the mobile gadget field. While a lot of multimedia gadgets such as mobile phone, navigation system, PMP, etc. are pouring into the market, most industrial control systems still rely on 8-bit micro-controllers and simple application software techniques. Unfortunately, the technological barrier which requires additional investment and higher quality manpower to overcome, and the business risks which come from the uncertainty of the market growth and the competitiveness of the resulting products have prevented the companies in the industry from taking advantage of such fancy technologies. However, high performance, low-power and low-cost hardware and software platforms will enable their high-technology products to be developed and recognized by potential clients in the future. This paper presents such a platform for industrial embedded systems. The platform was designed based on Telechips TCC8300 multimedia processor which embedded a variety of parallel hardware for the implementation of multimedia functions. And open-source Embedded Linux, TinyX and GTK+ are used for implementation of GUI to minimize technology costs. In order to estimate the expected performance and power consumption, the performance improvement and the power consumption due to each of enabled hardware sub-systems including YUV2RGB frame converter are measured. An analytic model was devised to check the feasibility of a new application and trade off its performance and power consumption. The validity of the model has been confirmed by implementing a real target system. The cost can be further mitigated by using the hardware parts which are being used for mass production products mostly in the cell-phone market.

Factors Affecting International Transfer Pricing of Multinational Enterprises in Korea (외국인투자기업의 국제이전가격 결정에 영향을 미치는 환경 및 기업요인)

  • Jun, Tae-Young;Byun, Yong-Hwan
    • Korean small business review
    • /
    • v.31 no.2
    • /
    • pp.85-102
    • /
    • 2009
  • With the continued globalization of world markets, transfer pricing has become one of the dominant sources of controversy in international taxation. Transfer pricing is the process by which a multinational corporation calculates a price for goods and services that are transferred to affiliated entities. Consider a Korean electronic enterprise that buys supplies from its own subsidiary located in China. How much the Korean parent company pays its subsidiary will determine how much profit the Chinese unit reports in local taxes. If the parent company pays above normal market prices, it may appear to have a poor profit, even if the group as a whole shows a respectable profit margin. In this way, transfer prices impact the taxable income reported in each country in which the multinational enterprise operates. It's importance lies in that around 60% of international trade involves transactions between two related parts of multinationals, according to the OECD. Multinational enterprises (hereafter MEs) exert much effort into utilizing organizational advantages to make global investments. MEs wish to minimize their tax burden. So MEs spend a fortune on economists and accountants to justify transfer prices that suit their tax needs. On the contrary, local governments are not prepared to cope with MEs' powerful financial instruments. Tax authorities in each country wish to ensure that the tax base of any ME is divided fairly. Thus, both tax authorities and MEs have a vested interest in the way in which a transfer price is determined, and this is why MEs' international transfer prices are at the center of disputes concerned with taxation. Transfer pricing issues and practices are sometimes difficult to control for regulators because the tax administration does not have enough staffs with the knowledge and resources necessary to understand them. The authors examine transfer pricing practices to provide relevant resources useful in designing tax incentives and regulation schemes for policy makers. This study focuses on identifying the relevant business and environmental factors that could influence the international transfer pricing of MEs. In this perspective, we empirically investigate how the management perception of related variables influences their choice of international transfer pricing methods. We believe that this research is particularly useful in the design of tax policy. Because it can concentrate on a few selected factors in consideration of the limited budget of the tax administration with assistance of this research. Data is composed of questionnaire responses from foreign firms in Korea with investment balances exceeding one million dollars in the end of 2004. We mailed questionnaires to 861 managers in charge of the accounting departments of each company, resulting in 121 valid responses. Seventy six percent of the sample firms are classified as small and medium sized enterprises with assets below 100 billion Korean won. Reviewing transfer pricing methods, cost-based transfer pricing is most popular showing that 60 firms have adopted it. The market-based method is used by 31 firms, and 13 firms have reported the resale-pricing method. Regarding the nationalities of foreign investors, the Japanese and the Americans constitute most of the sample. Logistic regressions have been performed for statistical analysis. The dependent variable is binary in that whether the method of international transfer pricing is a market-based method or a cost-based method. This type of binary classification is founded on the belief that the market-based method is evaluated as the relatively objective way of pricing compared with the cost-based methods. Cost-based pricing is assumed to give mangers flexibility in transfer pricing decisions. Therefore, local regulatory agencies are thought to prefer market-based pricing over cost-based pricing. Independent variables are composed of eight factors such as corporate tax rate, tariffs, relations with local tax authorities, tax audit, equity ratios of local investors, volume of internal trade, sales volume, and product life cycle. The first four variables are included in the model because taxation lies in the center of transfer pricing disputes. So identifying the impact of these variables in Korean business environments is much needed. Equity ratio is included to represent the interest of local partners. Volume of internal trade was sometimes employed in previous research to check the pricing behavior of managers, so we have followed these footsteps in this paper. Product life cycle is used as a surrogate of competition in local markets. Control variables are firm size and nationality of foreign investors. Firm size is controlled using dummy variables in that whether or not the specific firm is small and medium sized. This is because some researchers report that big firms show different behaviors compared with small and medium sized firms in transfer pricing. The other control variable is also expressed in dummy variable showing if the entrepreneur is the American or not. That's because some prior studies conclude that the American management style is different in that they limit branch manger's freedom of decision. Reviewing the statistical results, we have found that managers prefer the cost-based method over the market-based method as the importance of corporate taxes and tariffs increase. This result means that managers need flexibility to lessen the tax burden when they feel taxes are important. They also prefer the cost-based method as the product life cycle matures, which means that they support subsidiaries in local market competition using cost-based transfer pricing. On the contrary, as the relationship with local tax authorities becomes more important, managers prefer the market-based method. That is because market-based pricing is a better way to maintain good relations with the tax officials. Other variables like tax audit, volume of internal transactions, sales volume, and local equity ratio have shown only insignificant influence. Additionally, we have replaced two tax variables(corporate taxes and tariffs) with the data showing top marginal tax rate and mean tariff rates of each country, and have performed another regression to find if we could get different results compared with the former one. As a consequence, we have found something different on the part of mean tariffs, that shows only an insignificant influence on the dependent variable. We guess that each company in the sample pays tariffs with a specific rate applied only for one's own company, which could be located far from mean tariff rates. Therefore we have concluded we need a more detailed data that shows the tariffs of each company if we want to check the role of this variable. Considering that the present paper has heavily relied on questionnaires, an effort to build a reliable data base is needed for enhancing the research reliability.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness (스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과)

  • Han, Joonhyoung;Kang, Sungbae;Moon, Taesoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.

Standardization of Identification-number for Processed Food in Food-traceability-system (가공식품에 대한 이력추적관리번호 부여체계의 표준화 방안)

  • Choi, Joon-Ho
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.2
    • /
    • pp.194-201
    • /
    • 2012
  • Facing a number of global food-related accidents, the concept and system for food traceability have been designed and introduced in many countries to manage the food-safety risks. To connect and harmonize the various food traceability-information in food traceability system according to the food supply chain, the coding system of identification-number for food-traceability has to be standardized. The GTIN (Global Trade Item Number) barcode system which has been globally standardized and implemented, is reviewed with the mandatory food-labeling regulation in expiration date of processed foods. The integration of GTIN-13 bar-code system for food-traceability is a crucial factor to expand its function in the food-related industrial areas. In this literature, the standard coding system of identification-number for food-traceability is proposed with 20 digit coding number which is combined with GTIN-13 bar-code (13 digit), expiration date (6 digit), and additional classification code (1 digit). This proposed standard coding system for identification-number has a several advantages in application for prohibiting the sale of hazard goods, food-recall, and inquiring food traceability-information. And also, this proposed coding system could enhance the food traceability system by communicating and harmonizing the information with the national network such as UNI-PASS and electronic Tax-invoice system. For the global application, the identification-number for food-traceability needs to be cooperated with the upcoming global standards such as GTIN-128 bar-code and GS1 DataBar.

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

Denied Boarding and Compensation for Passengers in the EU Air Transport Legal Framework and Cases (항공여객운송에서의 탑승거부와 여객보상기준)

  • Sur, Ji-Min
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.34 no.1
    • /
    • pp.203-234
    • /
    • 2019
  • The concept of denied boarding is defined in Article 2(j) of Regulation 261/2004 thus: "denied boarding means a refusal to carry passengers on a flight, although they have presented themselves for boarding under the conditions laid down in Article 3(2), except where there are reasonable grounds to deny them boarding, such as reasons of health, safety or security, or inadequate travel documentation." So far as relevant to this case, to be entitled to compensation, if denied boarding, Article 3(2) provides a passenger must first come within the scope of the protection of the Regulation, which applies under the following conditions: "${\cdots}$.that passengers (a) have a confirmed reservation on the flight concerned and, except in the case of cancellation referred to in Article 5, present themselves for check-in, as stipulated and at the time indicated in advance and in writing (including by electronic means) by the air carrier, the tour operator or an authorised travel agent, or, if no time is indicated, not later than 45 minutes before the published departure time." This paper reviews the EU Cases such as Rodríguez Cachafeiro v. Iberia [2012] Case C-321/11; Finnair Oyj v. Timy Lassooy [2012] Case C-22/11; Caldwell v. easyJet Airline Co. Ltd. [2015] ScotSC 64. ECJ and Sheriff court of Scotland held that the concept of denied boarding, within the meaning of Articles 2(j) and 4 of Regulation No 261/2004 establishing common rules on compensation and assistance to passengers in the event of denied boarding and of cancellation or long delay of flights, and repealing Regulation No 295/91, must be interpreted as relating not only to cases where boarding is denied because of overbooking but also to those where boarding is denied on other grounds, such as operational reasons. Also, ECJ ruled that Articles 2(j) and 4(3) must be interpreted as meaning that the occurrence of extraordinary circumstances resulting in an air carrier rescheduling flights after those circumstances arose cannot give grounds for denying boarding on those later flights or for exempting that carrier from its obligation, under Article 4(3) of that regulation, to compensate a passenger to whom it denies boarding on such a flight.