• Title/Summary/Keyword: security goods

Search Result 153, Processing Time 0.022 seconds

A Study on the Estimation of Required Seaborne Trade Volume and Carrier Volume of Each Vessel Type in Case of Emergency (우리나라 비상사태시 소요물동량 및 선종별 소요선대 추정 연구)

  • Young-Gyun Ahn
    • Korea Trade Review
    • /
    • v.45 no.1
    • /
    • pp.1-11
    • /
    • 2020
  • The maritime industry is important for Korean international trade, as more than 99 percent of its imports and exports are moved by maritime transportation. However, if maritime transportation is stopped in the event of an emergency, such as war or natural disaster, there is a danger that imports and exports may cease abruptly. Coping with this risk is why the Ministry of Oceans and Fisheries, manages the 'National Necessary Shipping System.' This system requires that the government estimates the size of ships necessary in the case of an emergency, and the ships designated as National Necessary Vessels should transport goods in the case of actual emergencies. This study seeks to estimate the appropriate size of ships required in an emergency using the latest data and applying a quantitative methodology. This study provides useful reference materials for policy authorities. In particular, it is meaningful that this study estimates the required number of ships of each vessel type, reflecting the recent trend of large-scale ships and expanding global trade.

A Design and Analysis of Micro-payment System for Internet Commerce (인터넷 상거래를 위한 소액대금결제 시스템의 설계 및 성능평가)

  • Sung, Won;Kim, Eui-Jung;Park, Jong-Won
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.533-546
    • /
    • 2003
  • for the low information goods which will be traded through Internet is impossible to manage with previously existed payment system. The reason is that it's not economic because the management cost is bigger than the benefit of the information goods trade. Therefore, recently, there have been micropaymentresearches such as "Milicent", "PayWord", "MicroMint", and "iKP", etc. Though these methods don't have any problem with the low cost of the mechanism and the satisfaction of adequate security, they have big problem with the use of the unnecessary account and the aggregation of payment bill. The PayHash system which has been developed in this study simplifies the system's mechanism with "one-way hash function" which is used in generation, payment, and verification of the bill. And the system removed the generation and use of unnecessary account by making one customer have one account. The system solve the problem of the payment aggregation by using the last payment hash value and its index. And the system improves its performance by reducing the use of "digital signature" drastically, as well. As the result of this study, the PayHash system made it possible for the participants of the Internet Commerce to trade the lowest cost goods through efficient maintenance.o trade the lowest cost goods through efficient maintenance.

  • PDF

A Study on Valuation of Security Property in Electronic Commerce (전자상거래에 있어서 보안성의 가치추정에 관한 연구)

  • Kim, Min-Cheol;Noh, Kyoo-Sung
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.615-620
    • /
    • 2001
  • This paper is a study on the model that measures economic values for the non-market properties of Electronic Commerce(EC). For development of this model, first of all, we reviewed the properties of EC service, and looked around the relation between customer satisfaction and/or payment value and EC properties. In addition, we checked the method to measure economic values of these properties. This measurement method is the contingent valuation method which is a method of measuring the value of the environmental product. We modified it to adapt to the EC. Finally, in this paper, we proposed an economic value model which measures the value of willingness to pay(WTP) to our objectives. However, there could be some restrictions at the time when surveying empirically. Therefore, the succeeding study should be done in order to improve these restrictions some day.

  • PDF

Implementation of Data Integrity Module in Wireless Internet Terminal for Mobile Customer Relationship Management(m-CRM) (m-CRM을 위한 무선인터넷단말기의 데이터무결성 모듈의 구현)

  • Park, Hyun-Cheol;Kim, Dong-Gyu
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.485-494
    • /
    • 2004
  • Recently, the wireless internet terminals like mobile phones or PDAs prevail in the management of customers. With such terminals, businessmen can get business data and information of customers in real time, in connection with mobile group wares. By the wireless terminals, customers can conveniently get information of goods, search purchase sites, and give orders and do settlement. This paper aims to present the safe data integrity modules of the wireless internet terminal, for service providing correct real-time promotion information, by using users' disposition, situation, Purchase information. This study aims to suggest an implementation methodology of security module for data integrity of mobile internet terminal. This is based on the WTLS of WAP Protocol. This security module is expected to achieve central role in conversion of wireless internet environment and emphasis of encryption technology and safe and calculable wireless communication environment construction

Refunds Reusable Online Electronic Check System (거스름의 재사용이 가능한 온라인 전자수표시스템)

  • 김상진;최이화;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.73-85
    • /
    • 2001
  • Electronic check schemes are more efficient than electronic coin scheme with respect to computational costs and the amount of information exchanged. In spite of these, difficulties in making a refund reusable and in representing the face value of a check have discouraged its development. In this paper, a new online electronic check system is presented, which solves the above problems. This system uses the partially blind signature to provide user anonymity and to represent the face value of a check. The partially blind signature enables us to make the format of refunds and initially withdrawn checks identical. Thus, it allows refunds to be reused to buy goods without any limitatiosn. Both initially withdrawn checks and refunds in our system guarantee untraceability as well as unlinkability. We also use a one-time secret key as the serial number of a check to increase the efficiency of payments. The presented check system also provides multiple offline shopping sessions to minimize the number of online messages handled by a bank. During the multiple offline shopping session, we use a one-way accumulator to provide non-repudiation service. We also analyze our new systems our new system\`s security, efficiency, and atomicity.

Estimating Compensation for Personal Information Infringement in Korea Using Contingent Valuation Methods (CVM을 이용한 국내 개인정보 침해사고의 위자료 산정)

  • Kwon, Hong;Lee, Eun-Ju;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.367-377
    • /
    • 2012
  • (Estimating Compensation for Personal Information Infringement) As the value of personal information increases, personal information infringements is more likely to happen. The compensation for personal information infringements needs to be calculated in the process of infringement remedy. However, as personal information is regarded as non-market goods with no exchange price and calculating the remedy for mental sufferings from infringements has no guideline, it is not easy to determine the compensation amount. In this study, we adopt Contingent Valuation Methods (CVM) to analyze Willingness to Accept (WTA) of each type of personal information. Also, this study attempts to examine a standard model for calculating compensation by applying JNSA JO Model of Japan, which is not prepared in Korea. This study does not simply present a plan of estimating compensation. By measuring the value of personal information, it could awaken companies and organizations to the importance of personal information security.

Game-bot Detection based on Analysis of Harvest Coordinate

  • Choi, Jae Woong;Kang, Ah Reum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.157-163
    • /
    • 2022
  • As the online game market grows, the use of game bots is causing the most serious problem for game services. We propose a harvest coordinate analysis model to detect harvesting bots among game bots of the Massively Multiplayer Online Role-Playing Games(MMORPGs) genre. The proposed model analyzes the player's harvesting behavior using the coordinate data. Game bots can obtain in-game goods and items more easily than normal players and are not affected by realistic restrictions such as sleep time and character manipulation fatigue. As a result, there is a difference in harvesting coordinates between normal players and game bots. We divided the coordinate zones and used these coordinate zone differences to distinguish between game bot players and normal players. We created a dataset with NCSoft's AION log and applied it to a random forest model to detect game bots, and as a result, we derived performance with a recall of 0.72 and a precision of 0.92.

Some Problems on the Guidebook to Incoterms(R) 2010 published by ICC (국제상업회의소 발간 "ICC Guide to Incoterms(R) 2010" 상의 문제점에 관한 연구)

  • Lee, Shie-Hwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.54
    • /
    • pp.81-98
    • /
    • 2012
  • The Incoterms(R) 2010 rules take account of the continued spread of customs-free zones, the increased use of electronic communications in business transactions, heightened concern about security in the movement of goods and changes in transport practices. And the Guide to Incoterms(R) 2010 is the authoritative companion work to Incoterms(R) 2010, the ICC rules on the use of domestic and international trade terms. The guide responds to business needs for a better understanding of these ICC rules that are used in countless commercial transactions every day. But, contrary to the previous guidebook, there is many errors and mistake in the Guide to Incoterms(R) 2010 which should be amended. The purpose of this paper is to point out the problems and amend the errors and unify the expression in guidebook.

  • PDF

A Study on Effects of Characteristics of Insurance's Service on Customer Satisfaction, Customer Commitment (보험상품의 특성이 고객만족에 미치는 영향에 관한 연구)

  • Choi, Seung-Il
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.118-121
    • /
    • 2006
  • Insurance's service have been studied for purchase behavior, life style. And Insurance's service is more and more important. Steady necessity of study was on the rise for insurance's service. This study is based on existing study. We classified insurance's service factors into insurance business's characteristic factors(image, information, security), insurance agent's characteristic factors(expert knowledge, care) and insurance product's characteristic factors(multiplicity, a made-to-order goods) And then we investigated how these classified characteristic factors could influence on customer satisfaction.

  • PDF

A study on the problems of transport document as a proof of delivery on INCOTERMS 2000 (매도인(賣渡人)이 제공하는 인도증빙서류(引渡證憑書類)의 문제점(問題點)에 관한 연구(硏究) (INCOTERMS 2000을 중심(中心)으로))

  • Oh, Won-Suk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.7-35
    • /
    • 2000
  • The purpose of this paper is to examine the meanings of delivery of each trade term in INCOTERMS 2000, to investigate various kinds of transport document as a proof of delivery, and finally to find their problems. As a result of examination, following problems are considered to happen practically. First, a multimodal transport document referred in FOB term seems to be unappropriate because FOB term can be used in sea or inland waterway transport. Second, Assuming resale in transit in CFR or CIF term, non-negotiable Sea Waybill seems to be inappropriate. Third, As Sea Waybill is not a document of title, it can not be a security when the bank negotiate seller's draft. Fourth, INCOTERMS 2000 deleted the reference to charter party in CFR or CIF term. This deletion may raise any legal problems for the liabilities of carrier when the contradictions happen between the charter party B/L and charter party. Finally, if CFR or CIF means symbolic delivery, other documents besides B/L can not be a symbols of goods.

  • PDF