• Title/Summary/Keyword: third party application

Search Result 107, Processing Time 0.021 seconds

Implementing RPA for Digital to Intelligent(D2I) (디지털에서 인텔리전트(D2I)달성을 위한 RPA의 구현)

  • Dong-Jin Choi
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.143-156
    • /
    • 2019
  • Types of innovation can be categorized into simplification, information, automation, and intelligence. Intelligence is the highest level of innovation, and RPA can be seen as one of intelligence. Robotic Process Automation(RPA), a software robot with artificial intelligence, is an example of intelligence that is suited for simple, repetitive, large-scale transaction processing tasks. The RPA, which is already in operation in many companies in Korea, shows what needs to be done to naturally focus on the core tasks in a situation where the need for a strong organizational culture is increasing and the emphasis is on voluntary leadership, strong teamwork and execution, and a professional working culture. The introduction was considered naturally according to the need to find. Robotic Process Automation, or RPA, is a technology that replaces human tasks with the goal of quickly and efficiently handling structural tasks. RPA is implemented through software robots that mimic humans using software such as ERP systems or productivity tools. RPA robots are software installed on a computer and are called robots by the principle of operation. RPA is integrated throughout the IT system through the front end, unlike traditional software that communicates with other IT systems through the back end. In practice, this means that software robots use IT systems in the same way as humans, repeat the correct steps, and respond to events on the computer screen instead of communicating with the system's application programming interface(API). Designing software that mimics humans to communicate with other software can be less intuitive, but there are many advantages to this approach. First, you can integrate RPA with virtually any software you use, regardless of your openness to third-party applications. Many enterprise IT systems are proprietary because they do not have many common APIs, and their ability to communicate with other systems is severely limited, but RPA solves this problem. Second, RPA can be implemented in a very short time. Traditional software development methods, such as enterprise software integration, are relatively time consuming, but RPAs can be implemented in a relatively short period of two to four weeks. Third, automated processes through software robots can be easily modified by system users. While traditional approaches require advanced coding techniques to drastically modify how they work, RPA can be instructed by modifying relatively simple logical statements, or by modifying screen captures or graphical process charts of human-run processes. This makes RPA very versatile and flexible. This RPA is a good example of the application of digital to intelligence(D2I).

A Study on Method for Damage Calculation Caused by Bid Rigging in Alternative Tenders for Construction Projects -Utilizing the Difference of the Design Score & Bidding Rate as Factor - (건설공사 대안입찰 담합으로 인한 손해액 산정모델 연구 - 설계점수 및 투찰률 차이 인자 활용 -)

  • Min, Byeong-Uk;Park, Hyung-Keun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.5
    • /
    • pp.741-749
    • /
    • 2018
  • The purpose of this study is to propose a rational and scientific damage calculation model in relation to damages caused by bid rigging in construction projects. Previous studies and precedents in relation to calculating damages from bid rigging suggest that the main issue was the lack of consideration in standards for deciding successful bids, selection of inadequate standard comparative markets, insufficiency in analyzing the appropriateness of competitive bid price influence factors, and absence of calculation model verification. In order to improve on these issues, a damage calculation method on alternative tenders for construction projects was proposed. For this calculation model, first, a standard market adequate to the successful bid selection standards was determined, second, an appropriate factor was selected by analyzing the correlation between competitive bid price influence factors, and third, a regression analysis was conducted on the selected factor. Lastly, this was demonstrated through verification of appropriateness, significance & normality of the proposed model and application of actual bid rigging cases. Through the proposed calculation model, this study seeks to serve as a base to prevent opportunity damages for parties involved in related court cases by early resolution of disputes and relief from issues of unfair damage burdens on a particular party.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

The Effect of Expert Reviews on Consumer Product Evaluations: A Text Mining Approach (전문가 제품 후기가 소비자 제품 평가에 미치는 영향: 텍스트마이닝 분석을 중심으로)

  • Kang, Taeyoung;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.63-82
    • /
    • 2016
  • Individuals gather information online to resolve problems in their daily lives and make various decisions about the purchase of products or services. With the revolutionary development of information technology, Web 2.0 has allowed more people to easily generate and use online reviews such that the volume of information is rapidly increasing, and the usefulness and significance of analyzing the unstructured data have also increased. This paper presents an analysis on the lexical features of expert product reviews to determine their influence on consumers' purchasing decisions. The focus was on how unstructured data can be organized and used in diverse contexts through text mining. In addition, diverse lexical features of expert reviews of contents provided by a third-party review site were extracted and defined. Expert reviews are defined as evaluations by people who have expert knowledge about specific products or services in newspapers or magazines; this type of review is also called a critic review. Consumers who purchased products before the widespread use of the Internet were able to access expert reviews through newspapers or magazines; thus, they were not able to access many of them. Recently, however, major media also now provide online services so that people can more easily and affordably access expert reviews compared to the past. The reason why diverse reviews from experts in several fields are important is that there is an information asymmetry where some information is not shared among consumers and sellers. The information asymmetry can be resolved with information provided by third parties with expertise to consumers. Then, consumers can read expert reviews and make purchasing decisions by considering the abundant information on products or services. Therefore, expert reviews play an important role in consumers' purchasing decisions and the performance of companies across diverse industries. If the influence of qualitative data such as reviews or assessment after the purchase of products can be separately identified from the quantitative data resources, such as the actual quality of products or price, it is possible to identify which aspects of product reviews hamper or promote product sales. Previous studies have focused on the characteristics of the experts themselves, such as the expertise and credibility of sources regarding expert reviews; however, these studies did not suggest the influence of the linguistic features of experts' product reviews on consumers' overall evaluation. However, this study focused on experts' recommendations and evaluations to reveal the lexical features of expert reviews and whether such features influence consumers' overall evaluations and purchasing decisions. Real expert product reviews were analyzed based on the suggested methodology, and five lexical features of expert reviews were ultimately determined. Specifically, the "review depth" (i.e., degree of detail of the expert's product analysis), and "lack of assurance" (i.e., degree of confidence that the expert has in the evaluation) have statistically significant effects on consumers' product evaluations. In contrast, the "positive polarity" (i.e., the degree of positivity of an expert's evaluations) has an insignificant effect, while the "negative polarity" (i.e., the degree of negativity of an expert's evaluations) has a significant negative effect on consumers' product evaluations. Finally, the "social orientation" (i.e., the degree of how many social expressions experts include in their reviews) does not have a significant effect on consumers' product evaluations. In summary, the lexical properties of the product reviews were defined according to each relevant factor. Then, the influence of each linguistic factor of expert reviews on the consumers' final evaluations was tested. In addition, a test was performed on whether each linguistic factor influencing consumers' product evaluations differs depending on the lexical features. The results of these analyses should provide guidelines on how individuals process massive volumes of unstructured data depending on lexical features in various contexts and how companies can use this mechanism from their perspective. This paper provides several theoretical and practical contributions, such as the proposal of a new methodology and its application to real data.

A Study on How to Cope with the Abusive Call on On-demand Bonds (독립적 보증과 그 부당한 청구에 대한 대응방안 연구)

  • KIM, Seung-Hyeon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.69
    • /
    • pp.261-301
    • /
    • 2016
  • Recently the abusive calls on on-demand bonds have been a critical issue among many engineering and construction companies in Korea. On-demand bond is referred to as an independent guarantee in the sense that the guarantee is independent from its underlying contract although it was issued based on such underlying contract. For this reason, the issuing bank is not required to and/or entitled to look into whether there really is a breach of underlying contract in relation to the call on demand-bonds. Due to this kind of principle of independence, the applicant has to run the risk of the on demand bond being called by the beneficiary without due grounds. Only where the call proves to be fraudulent or abusive in a very clear way, the issuing bank would not be obligated to pay the bond proceeds for the call on on-demand bonds. In order to prevent the issuing bank from paying the proceeds under the on-demand bond, the applicant usually files with its competent court an application for injunction prohibiting the beneficiary from calling against the issuing bank. However, it is in practice difficult for the applicant to prove the beneficiary's call on the bond to be fraudulent since the courts in almost all the jurisdictions of advanced countries require very strict and objective evidences such as the documents which were signed by the owner (beneficiary) or any other third party like the engineer. There is another way of preventing the beneficiary from calling on the bond, which is often utilized especially in the United Kingdom or Western European countries such as Germany. Based upon the underlying contract, the contractor which is at the same time the applicant of on-demand bond requests the court to order the owner (the beneficiary) not to call on the bond. In this case, there apparently seems to be no reason why the court should apply the strict fraud rule to determine whether to grant an injunction in that the underlying legal relationship was created based on a construction contract rather than a bond. However, in most jurisdictions except for United Kingdom and Singapore, the court also applies the strict fraud rule on the ground that the parties promised to make the on-demand bond issued under the construction contract. This kind of injunction is highly unlikely to be utilized on the international level because it is very difficult in normal situations to establish the international jurisdiction towards the beneficiary which will be usually located outside the jurisdiction of the relevant court. This kind of injunction ordering the owner not to call on the bond can be rendered by the arbitrator as well even though the arbitrator has no coercive power for the owner to follow it. Normally there would be no arbitral tribunal existing at the time of the bond being called. In this case, the emergency arbitrator which most of the international arbitration rules such as ICC, LCIA and SIAC, etc. adopt can be utilized. Finally, the contractor can block the issuing bank from paying the bond proceeds by way of a provisional attachment in case where it also has rights to claim some unpaid interim payments or damages. This is the preservative measure under civil law system, which the lawyers from common law system are not familiar with. As explained in this article, it is very difficult to block the issuing bank from paying in response to the bond call by the beneficiary even if the call has no valid ground under the underlying construction contract. Therefore, it is necessary for the applicants who are normally engineering and construction companies to be prudent to make on-demand bonds issued. They need to take into account the creditability of the project owner as well as trustworthiness of the judiciary system of the country where the owner is domiciled.

  • PDF

A Study on the Disclosure and Exemption of the Personal Data (개인정보의 공개와 보호에 관한 연구 - 영국 사례를 중심으로 -)

  • Kim, Jung Ae
    • The Korean Journal of Archival Studies
    • /
    • no.29
    • /
    • pp.225-268
    • /
    • 2011
  • The general public are interested in the politics and form public opinion and keep in check the government for true democracy. The general public have the right to be furnished information from the government. And the government should enact the Freedom of Information Act to provide the public's right to know. At the same time, the government should enact the Data Protection Act to provide the public's right to privacy. There is a friction between the Freedom of Information Act and the Data Protection Act. It's hard to maintain the proper balance between the Freedom of information Act and the Data Protection Act, but many countries try to do so. The UK enacted the Data Protection Act 1998(DPA), which entered into force on 2000, to comply with EU Directive 1995. The Freedom of Information Act 2000(FOI), which came fully into force on 2005, was passed in 2000. The FOI imposes significant duties and responsibilities on public authorities to give access to the information they hold. The purpose of this study is to consider the provisions of the personal data in FOI and DPA. Besides this, it identifies the complaint cases on public authorities about the disclosure and exemption of the personal data in comparison with the acts. If information is the personal data of the person making the request, it will disclose under the DPA. If information is the personal data of a third party, it will disclose under the FOI. These acts interact each other to make up for the weak points in the other to make a proper application of the act on public authorities. This study may have any limitation in making a comparative study of the disclosure and exemption of the personal data in Korea. But it is expected to provide a basis for understanding the disclosure and exemption of the personal data in the UK.