• Title/Summary/Keyword: security funds

Search Result 54, Processing Time 0.02 seconds

PRICING STEP-UP OPTIONS USING LAPLACE TRANSFORM

  • KIM, JERIM;KIM, EYUNGHEE;KIM, CHANGKI
    • Journal of applied mathematics & informatics
    • /
    • v.38 no.5_6
    • /
    • pp.439-461
    • /
    • 2020
  • A step-up option is a newly developed financial instrument that simultaneously provides higher security and profitability. This paper introduces two step-up options: step-up type1 and step-up type2 options, and derives the option pricing formulas using the Laplace transform. We assume that the underlying equity price follows a regime-switching model that reflects the long-term maturity of these options. The option prices are calculated for the two types of funds, a pure stock fund composed of risky assets only and a mixed fund composed of stocks and bonds, to reflect possible variety in the fund underlying asset mix. The impact of changes in the model parameters on the option prices is analyzed. This paper provides information crucial to product developments.

A Comparative Study on ACH and Fedwire as a Cross-Border Payment System (국제전자결제시스템으로서 ACH와 Fedwire의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.10 no.1
    • /
    • pp.139-154
    • /
    • 2008
  • This research want to discuss some issues about payment system of America. This research focuses on comparing ACH with Fedwire. Firstly Fedwire is the payment system for only large-dollar transfer(Large-Value Transfer System; LVTS), while ACH(Automated Clearing House)payment mainly applies a consumer account. Secondly ACH transaction is either credit or debit transfer, while Fedwire is only credit transfer. Thirdly the communication system of Fedwire has twoway method, telephonelike communication network, but ACH is oneway store and forward electronic mail. At present LVTS divides into RTGS(Real-Time Gross Settlement) and DNS(Deferred Net Settlement). However Fedwire uses either RTGS(instantaneous for every transaction) or DNS(net net transaction) but ACH uses only DNS(net net transaction). Fourthly ACH is substantially cheaper than the Fedwire payment. lastly security is important in both Fedwire and ACH, it is even more crucial in Fedwire In addition, for each transaction, Fedwire may entail individual instantaneous confirmation to the originator and notification to the receiver, whereas ACH do not.

  • PDF

Internet Banking Service Vulnerability Analysis and Security Solution (인터넷 뱅킹 서비스 취약점 분석 및 보안대책)

  • Lee, Sang-Jin;Hwang, So-Yeon;Kim, Kyung-Kon;Ryeo, Sung-Koo
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.119-128
    • /
    • 2007
  • Since the internet banking service was introduced to Korea in 1999, the service has placed itself as an indispensable service to most users. The internet banking, which provides convenience for internet users as well as efficiency for banks, is expected to increase its importance more and to play a bigger role as a passage of funds. Meanwhile, numerous accounts as to the misusage of the internet banking service have been reported and the types and size of damages, especially making illegal money transfers and embezzling user information through computer hacking, tend to increase continuously. This paper points out fundamental problems of the current internet banking service by analyzing the all components of the internet banking service and fitting the results of structural analysis of hacking threats in accordance with service flow. This paper also attempts to propose the means to minimize the hacking threats of the internet banking service.

  • PDF

International Legal Measures of Protection of Critical Infrastructure Facilities in Banking Sphere

  • Oleg, Batiuk;Oleg, Novikov;Oleksandr, Komisarov;Natalia, Benkovska;Nina, Anishchuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.145-154
    • /
    • 2022
  • Based on the obtained results of the study, the most problematic issues and legal conflicts are identified, which are related to the ratio of norms of domestic and foreign legislation, taking into account the requirements of the Constitution of Ukraine and the provisions of the Law of Ukraine "On international agreements". Along with this, it is stated in this scientific article that there are a number of provisions and examples of positive practice on the specified topic abroad and in international legal acts today, which should be used by Ukraine both in improving legislation on the issues of banking activity and in increasing the level of criminal legal protection of relevant critical infrastructure facilities, especially those that are substantively related to prevention and counteraction of activity, with regard to the legalization (laundering) of criminally obtained funds, financing of terrorism and the financing of the proliferation of weapons of mass destruction, which is quite relevant for our state, given the military conflict that is taking place on its territory in the Donbass. Again, in the same context, the need for more active cooperation between Ukraine and the FATF (international body developing a policy to combat money laundering) has been proven.

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

A Determination of the Factors Contributing to Internet Banking (인터넷뱅킹 요인 결정에 대한 연구)

  • John, Yongjean
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.137-144
    • /
    • 2012
  • Seventeen domestic banks, Hongkong & Shanghai Banking Corporation Ltd. and Korea Post provide their subscribers with banking services such as statement service, funds transfer, and application for loans through Internet banking sites, which have become ever-increasing banking services for individual and corporation and government subscribers. First, this study aimed at presenting a process of determining factors to measure customers' perception while using Internet banking for doing transactions. Secondly, this paper attempted to unveil a list of major factors that Internet banking customers perceive while accessing the web sites to do their business with their banks. This study also suggested the features of those factors, which would help improve our understanding of Web usage for Internet banking. This result of the paper will lead further understanding of factors associated with Internet uses in other economic activities, which enable practitioners such as web designers and security specialists to provide Internet banking subscribers with better services in a safe and convenient web pages.

A study on Secure Payment Method & Security Technology of Electronic Commerce (전자상거래의 보안기술과 지불방법에 관한 연구)

  • 조원길
    • The Journal of Information Technology
    • /
    • v.2 no.1
    • /
    • pp.35-52
    • /
    • 1999
  • This study introduced the new technologies that are expanding the realm of electronic commerce to the Internet and small business. Each of the key components of electronic commerce(contracts, signatures, notaries, payment systems and adult trails)are supported in the new electronic commerce. Electronic commerce is more than just handling purchase transactions and funds transfers over the internet. Despite Electronic commerce's past roots in transactions between large corporations, banks, and other financial institutions, the use of the internet as a way to bring Electronic commerce to the individual consumer has led to shift in viewpoint. Over the past few years, both the press and the business community have increased their focus on Electronic commerce involving the consumer Effective payment system should be established for the internet commerce. In this study, we examined the current development and application of Electronic payment system. Two different payment systems are used and under application. One is IC-card type of payment system which has gained popularity in England, Hong-Kong, and many other countries as a substitution of cash. The other type of payment system is e-cash, which is used more conveniently for the payment through internet. The question of which method is better fitted for the internet commerce should be evaluated in the view of cost and benefit since the associated technology is still under evolution. This study conducted a study on Secure Payment Method & Security Technology of Electronic Commerce

  • PDF

THE ACTIVITIES OF AMALGAMATED TERRITORIAL COMMUNITIES IN THE CONTEXT OF SUSTAINABLE DEVELOPMENT OF THE ENVIRONMENT: THE EXPERIENCE OF UKRAINE AND THE EU STATES

  • Ridei, Nataliia;Bakhmat, Oleh;Plahtiy, Danylo;Polova, Olena;Holovnia, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.323-331
    • /
    • 2021
  • The relevance of the study implies the need to explain the main determinants of environmental policy, allowing countries to converge on a common working basis. The purpose of the research is to explore ways in which the environmental aspects of EU regions and territories can be shaped to apply to domestic environmental policy. A total of 997 representatives from the Ukrainian UTCs, who are involved in local environmental policy, participated in the survey. Results of the research. A hierarchy of regional environmental policy objectives has been identified. Three key principles of eco-policy development have been distinguished. The means of the innovative approach strategy implementation have been outlined (formation of the regional market of environmental services; organization of interaction between environmental agencies and market structures; establishment of environmental funds which finance environmental activities; implementation of the "collateral return" system; formation of a system of benefits and loans to enterprises that successfully implement the environmental policy). The means of the prognostic approach implementation strategy to the development of the region's environmental policy have been determined (the use of an orderly and successful long-term strategy of economic development of the region; obligatory consideration in the mechanisms strategy aimed at improvement of environmental management system of the region, interbranch impact of the projects implemented on the region's ecological situation; taking into consideration the economic and geographical peculiarities of the region, the necessary infrastructure, issues of the territorial location of the large enterprises in the region and their impact on the environment). The means of the traditional approach strategy implementation have been outlined (activity programs focused on solution of specific problems, rather than on the implementation of measures for environmental restoration and enhancement; nature conservation problems have interbranch, interdepartmental character due to unity of the region's ecosystem; tracking complexity of changing conditions (water basins, woodlands, air-mass transport), regional boundaries generally do not coincide with natural ecosystems boundaries). The practical significance of the study lies in providing recommendations for the implementation of certain aspects of Ukrainian UTC's environmental policy.

A Study on the Effectiveness of Blockchain and Legal System and Policy Tasks for SMEs (중소기업의 블록체인 적용효과와 법제도 및 정책적 과제에 대한 융합적 연구)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.14-24
    • /
    • 2019
  • It is necessary to look into multiple subjects, such as effectiveness, laws and polices of blockchain in order to easily accept blockchain technology in small and mid-sized enterprises(SME). This study analyzes the positive effects of applying the block chain to SMEs, examines the laws and policies required to apply them, and identifies the tasks. As a result, we confirmed that it can create positive effects such as optimizing supply chain management, simplifying import and export process documents, improving product quality, facilitating flow of funds, and improving transaction reliability. Also, we confirmed that it is necessary to improve the basic law of electronic transaction, electronic commerce law, electronic financial transaction law, personal information protection legislation, and needs policy supplement for platform development, education system for SMEs, transaction standardization guidelines, tax reduction policy, and block chain research and development. More extensive practical research and specific individual legal studies are needed in the future.

Social Engineering Attack Characteristics and Countermeasure Strategies of Major Threat Countries (주요 위협국의 사회공학 공격특징과 대응전략)

  • Jeewon Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.165-172
    • /
    • 2023
  • Nation-state social engineering attacks are steadily being carried out as they are highly effective attacks, primarily to gain an advantage over secret information, diplomatic negotiations or future policy changes. As The Ukraine-Russia war prolongs, the activities of global hacking organizations are steadily increasing, and large-scale cyberattack attempts against major infrastructure or global companies continue, so a countermeasure strategy is needed. To this end, we determined that the social engineering attack cycle excluding physical contact among various social engineering models is the most suitable model, and analyzed the preferred social engineering attack method by comparing it with geopolitical tactics through case analysis. AS a result China favors phishing attacks, which prefer quantity over quality, such as man-made tactics, Russia prefers covert and complex spear phishing reminiscent of espionage warfare, and North Korea uses geopolitical tactics such as spear phishing and watering holes for attacks on the US and South Korea Most of the other countries aimed to secure funds with ransomware. Accordingly, a Clean Pass policy for China, periodic compulsory education in Russia, and international sanctions against North Korea were presented as countermeasure strategies.