• Title/Summary/Keyword: securities

Search Result 438, Processing Time 0.025 seconds

XA and Non-XA Interface Methodology of an X/Open DTP-based Trading System in Finance Industry (X/Open DTP 기반 증권사 트레이딩 시스템에서의 XA/Non-XA 인터페이스 방법)

  • Kim, Yong-Tae;Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.498-508
    • /
    • 2003
  • In the field of finance, Trading System of Securities is a very vulnerable application when it faces any small problems just for one minute. Since Trading System changes its environment from mainframes to client/server, its safety becomes the most important factor. Even though most If systems are configured by general guidelines currently, Trading System is an exception that it is configured by specific and rather ad hoc guidelines in order to ensure its safe management. In this thesis, I will prove the validity of specific and ad hoc configuration in the environment of Trading Systems where I use both XA interface system and Non-XA interface to configure its system based on 3-Tier Client/server computing environment through middleware, TP-Monitor, in the X/Open DTP Model. In order to validate the Trading System, I will compare and analyze the error of data of an order and ability to restore using both XA and Non-XA interfaces while testing take-over scenario on the assumption of the system's failure.

An empirical study of evaluating the Korean firm's technological knowledge assets (한국 기업의 기술지식자산 평가에 대한 실증연구)

  • 윤찬병;하형철;박용태
    • Proceedings of the Technology Innovation Conference
    • /
    • 1999.06a
    • /
    • pp.85-97
    • /
    • 1999
  • Being the new paradigm of "knowledge based economy", knowledge asset get to be the key to evaluate the firm's value. For a instance, Scandia firstly informed the intellectual capital report with its own financial statements in 1994. Some financial institutions have emphasized the roles of knowledge assets in the evaluating firm's value, too. But the concept of knowledge asset is so extensively defined that the result of evaluation is not as much reliable as financial statements. As previous studies examined the firm-specific cases, the sectoral pattern of knowledge asset has been ignored and it cause the difficulty in the empirical study. Moreover, the objectivity of study is ambiguous. Therefore, we regards knowledge asset as a technological knowledge asset. Which is related to R&D(research & development) and technology. Because this definition is more measurable than others and can play a frontier role in evaluating the knowledge asset. We extract the criteria related to the technological knowledge asset through the survey of 'Scandia' and other previous studies and add other criteria, which explain the Korean-specific environments. We gather data from "Technological Innovation"(STEPI, 1997, 1999) and "The bibliography of Korean R&D institutes"(KITA,1998) and "the survey of listed company"(Daewoo Securities, 1998. 1999). As the results of empirical study, the variables which explain the financial value of firms do not reflect the 'technological knowledge asset' well. It results from the factors as followings. Firstly, instead of stock price the proxy measurement related to 'knowledge asset' is needed. Secondly, the sample is biased to the large scale firms so we'll collect samples more broadly. Finally, the concept of 'technological knowledge asset' is too narrow to explain the value of firm. We expect the result of this empirical study gives contribution to the evaluation of firms' value more exactly.

  • PDF

Land Price in Korea: Land Speculation and Market Failure (한국의 지가: 토지투기와 시장실패)

  • 이진순
    • Journal of the Korean Regional Science Association
    • /
    • v.8 no.1
    • /
    • pp.1-29
    • /
    • 1992
  • The major purpose of this paper is to examine two closely related issues. An attempt is made here to examine internationally high land price in Korea from the perspectives of market fundamentals (MF) and bubble theory, respectively. Another theoretical issue, whether land speculation can result in market failure, is also examined. It has been concluded that the primary causes for the rapid increases in land prices in Korea, could be found in the perspective of MF. (1) The financial intermediaries has been controlled by the government since 1960s. Real Interest rates in the commercial banks has been controlled at the level of zero or sometimes negative; scarce financial resources has been rationed by the government. The governmental control of the bands has also resirained the development of securities market. Money, which can not find the appropri opportunity for saving in financial market, moves to land market. (2) Socially created land value, based on rapid economic gorwth and big public investment, has been appropriated mainly by the private: The effective tax rate of land holding tax has been under 0.02 percent; Real Estate Capital Galns Tax has, in fact, affected few persons, mainly because examptions and preferential taxation have been widely permitted. (3) The government has ploaced severe limitations on rural-to-urban land conversion, although the demand for urban uses has repidly grown. All factors above caused the cyclical land speculation. This, in turn, created the myth that land prices will inevitably continue to rise. Based on the myth, the growing bubble in land price has been created. This is the secondary reason for high land price relative to income in Korea. It is also shown that it is possible that speculation in land results in market failure because land is fixed in quantity and can be used for production and speculation purposes simultaneously.

  • PDF

A Study on the Oriental Medical Insurance and the Industrial Accident Compensation in the Social Security System (사회보장제도(社會保障制度)로서의 한방의료보험(韓方醫療保險)과 산재보상(産災補償))

  • Yoon Young-Soo
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.1 no.1
    • /
    • pp.137-148
    • /
    • 1997
  • The Serial Securities and the Social Welfare, as the national policy aimed at securing generals' lives, are the policies or systems for the stabilization in lift; especially of law-incomers and workers, for which the povernment has to establish the Social Security System. No wonder the Social Insurance System is a part of the Social Security System and the most important. The Social Insurance System, along with Public Assistance, is underlying the Social Security System. Social Security System includes medical insurance, industrial accident Compensation insurance, national pention insurance and employment insurance. The study is on 'The Oriental Medical Insurance and the Industrial Accident Compensation in the Social Security System' . The rate of industrial accident in Korea marks the highest rank in the world. for laborer, industrial accident do not merely mean the loss of health but the question of the right to live in terms of their loss of opportunity of life. The industrial accident compensation system should be established as the es post facto remedy system to guarantee the injured worker and his/her family's life. The oriental medical insurance system which began to operate in 1987 in Korea is based on unionism and divided into 3 parts; one part for the worker, a second part for the community inhabitants, and a third part for the public service personnel and private school personnel. Today the medical problem must be the most important social assignment to be considered. The medical system of contemporary industrial society has began greatly stood out in relief as a part of social welfare not emphasized on gainings of physicians. Accordingly systematization of the oriental medical insurance was strongly Pursued and it was developed to to the extent of entire nation insurance. Though the history of it is very short, most of the people are getting benefit from the insurance system by the social security system method. This study develops the Oriental Medical Insurance, the Workmen's Accident Compensation Insurance, the Pension System in relation to the industrial accident compensation of Employees, along with the ideas and principles of social insurance.

  • PDF

Analysis the job-ability demanded in the security and secretary (경호비서에게 요구되는 업무능력 분석)

  • Park, Ok-cheol
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.2
    • /
    • pp.40-50
    • /
    • 2008
  • The purpose of this study is to analyze the job of the security and secretary, to offer useful basic data throughout human resources management by withdrawing the ability required from the security and secretary based on the analyzed results. In this regard, this study intended to look into the job of the security and secretary, the necessary ability for the job of the security and secretary. To achieve the research goals, the study selected the research participants, composed of 5 secretaries for security with more than 5-year careers after graduating from a security and secretarial service department in a college and conducted an in-depth interview with them concerning their jobs. The in-depth interview data from the 5 participants was applied with a classification analysis used by Spradley (1980). In order to enhance the dependability and validity of the research, the study held an expert meeting composed of 2 persons with a doctoral degree in securities service studies and 1 person with a master's degree in secretarial information studies, twice. Also, the study drew results concerning the job of the security and secretary and the necessary ability of the job. Though the above process, the following conclusions were drawn; the job of the security and secretary includes the areas of job safety, a housing residence job, a health care job, an interpersonal relationships job, an assistant' s job, document and office works, general affairs, and an education job. The necessary ability for the job of the security and secretary involves martial arts abilities, risk management ability, the strict keeping of secrets, decision-making ability, information processing ability, foreign language proficiency, understanding other cultures, communications skills and office work ability.

  • PDF

A Study on the Current Status and the Results of the Equity Crowdfunding Film Project (증권형 크라우드펀딩 영화 프로젝트 현황 및 결과에 관한 연구)

  • Jung, Joo-Young
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.3
    • /
    • pp.179-189
    • /
    • 2020
  • This study analyzes the status and results of equity crowdfunding film projects from 2016 to 2018. The film project is conducted in the form of general corporate bonds and participating bonds, and 41.5% of the total bonds were issued, 9.5 billion won. In addition, a t-test analysis of the movie's the breakeven point and audience numbers showed that statistically significant and the average number of audience members was low. Therefore, this study suggests the following for the sustainable growth of the equity crowdfunding film project. Equity crowdfunding brokers should reinforce the review of the possibility of achieving the breakeven point of the film and the factors affecting the box office in the investment manual, and should also actively attract projects on the big films that are likely to be successful. This study is meaningful in that it analyzes the equity crowdfunding film project, which has not yet been widely studied in Korea, and is expected to provide implications in the subsequent research and system improvement process.

Privacy-Preserving Self-Certified Public Auditing for Secure Cloud Storage (안전한 클라우드 스토리지를 위한 프라이버시 보장 자체 인증 공공 감사)

  • Baek, Mokryeon;Kim, Dongmin;Jeong, Ik Rae
    • Journal of KIISE
    • /
    • v.43 no.4
    • /
    • pp.497-508
    • /
    • 2016
  • With a cloud storage service, data owners can easily access their outsourced data in cloud storage on different devices and at different locations, and can share their data with others. However, as the users no longer physically have possession of their outsourced data and the cloud still facing the existence of internal/external threats, the task of checking the data integrity is formidable. Over recent years, numerous schemes have been proposed to ensure data integrity in an untrusted cloud. However, the existing public auditing schemes use a third-party auditor(TPA) to execute high computation to check data integrity and may still face many security threats. In this paper, we first demonstrate that the scheme proposed by Zhang et al. is not secure against our two threat models, and then we propose a self-certified public auditing scheme to eliminate the security threats and guarantee a constant communication cost. Moreover, we prove the securities of our public auditing scheme under three security models.

Business Growth Strategy with Asset Backed Short Term Bond for Overseas IPP Opportunities (자산담보부 단기사채를 활용한 해외발전사업 수주확대방안)

  • Kim, Joon-Ho;Moon, Yoon-Jae;Lee, Jae-Heon
    • Plant Journal
    • /
    • v.11 no.1
    • /
    • pp.30-38
    • /
    • 2015
  • This study is about whether the new Project Finance scheme called "Asset Backed Short Term Bond(ABSTB)" with Project Finance Guarantee Cover provided by Korean Exim Bank(KEXIM) is an appropriate and valid financing structure, through close examinations on domestic and overseas IPP case studies. This study clearly indicates that (i) the interest rate of ABSTB with KEXIM's Project Finance Guarantee is relatively more competitive than the interest rate of other ABSTB guaranteed by EPC Companies (ii) the lower credit rated EPC companies make higher ROE(Return on Equity) through this financing structure. Lastly, Korean EPC Companies can secure profitability through this innovative financing scheme which will also lead to winning more power plant Contracts and become globally competitive.

  • PDF

A study on the occupational fraud symptoms and detection methods for managing human element vulnerability in financial industry security (금융산업보안상 인적보안 취약요소인 업무부정의 발생징후와 적발방법에 관한 연구)

  • Suh, Joon-Bae;Shim, Hee-Sub
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.37-59
    • /
    • 2017
  • This study aims to contribute to the early detection of occupational fraud in the Korean financial industry by analyzing fraud symptoms. Firstly, the definition, cause of occupational fraud, and fraud symptoms were discussed through literature review. Secondly, survey data were collected from the employees of the financial industry such as bank, insurance, and securities companies to conduct statistical analysis. The result of analysis showed that the symptoms of 'excessive stock investment' and 'unsettled life style' were statistically significant predictors of fraud detection experience. Plus, 'tips and complaints' were the most frequent method for detecting occupational fraud in the Korean financial industry. The financial institutions can minimize the loss of occupational fraud by early detection through educating their employees and vendors on these important symptoms of occupational fraud.

  • PDF

OTP-Based Transaction Verification Protocol Using PUFs (PUF를 이용한 OTP 기반 거래 검증 프로토콜)

  • Lee, Jonghoon;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.492-500
    • /
    • 2013
  • The One-Time Password(OTP) Generator is used as a multi-factor authentication method to ensure secure transaction during e-Financial transaction in the bank and securities company. The OTP based e-Financial Transaction Verification Protocol ensures secure e-financial transaction through confirming the user's identity using OTP authentication information and counters not only Man-in-the-Browser(MITB) attacks but also memory hacking attacks. However, it is possible to generate correct OTPs due to potential of stealing sensitive information of the OTP generator through intelligent phishing, pharming, social engineering attacks. Therefore, it needs another scheme to prevent from above threats, and this paper proposes advanced scheme using Physical Unclonable Functions(PUFs) to solve these problems. First, it is impossible to generate the same OTP values because of the hysically unclonable features of PUFs. In addition, it is impossible to clone OTP generator with hardware techniques. Consequently, the proposed protocol provides stronger and more robust authentication protocol than existing one by adding PUFs in the OTP generator.