• Title/Summary/Keyword: 기술적 거래 규칙

Search Result 38, Processing Time 0.021 seconds

A Study on the Effective Formation in Contract for the International Sale of Goods based on Revision UCC (정보화시대의 국제물품매매계약의 성립요건 - Revised UCC Draft 1996을 중심으로-)

  • 한상현
    • The Journal of Information Technology
    • /
    • v.1 no.2
    • /
    • pp.103-118
    • /
    • 1998
  • The contract for the International Sale of Goods is a contract of sale of goods between parties of business in different countries beyond tariff line. In principle, the formation of contracts for the international sale of goods is conventional made through offer and acceptance. Though this principle outwatdly looks simple, They turn out complicated problems as to what is offer or acceptance, especially as to the exact time that contracts go into effect. For that reason, the parties who conclude an international Sales contracts effectively are must understand perfectly in the legal commercial aspects offer or acceptance that become basic elements in the formation contracts for the International Sale of Goods. So, In the thesis I tried to explain principles on the Effective Formation in Contract for the International Sale of Goods based on Revision UCC.

  • PDF

A Study on the Application of Outlier Analysis for Fraud Detection: Focused on Transactions of Auction Exception Agricultural Products (부정 탐지를 위한 이상치 분석 활용방안 연구 : 농수산 상장예외품목 거래를 대상으로)

  • Kim, Dongsung;Kim, Kitae;Kim, Jongwoo;Park, Steve
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.3
    • /
    • pp.93-108
    • /
    • 2014
  • To support business decision making, interests and efforts to analyze and use transaction data in different perspectives are increasing. Such efforts are not only limited to customer management or marketing, but also used for monitoring and detecting fraud transactions. Fraud transactions are evolving into various patterns by taking advantage of information technology. To reflect the evolution of fraud transactions, there are many efforts on fraud detection methods and advanced application systems in order to improve the accuracy and ease of fraud detection. As a case of fraud detection, this study aims to provide effective fraud detection methods for auction exception agricultural products in the largest Korean agricultural wholesale market. Auction exception products policy exists to complement auction-based trades in agricultural wholesale market. That is, most trades on agricultural products are performed by auction; however, specific products are assigned as auction exception products when total volumes of products are relatively small, the number of wholesalers is small, or there are difficulties for wholesalers to purchase the products. However, auction exception products policy makes several problems on fairness and transparency of transaction, which requires help of fraud detection. In this study, to generate fraud detection rules, real huge agricultural products trade transaction data from 2008 to 2010 in the market are analyzed, which increase more than 1 million transactions and 1 billion US dollar in transaction volume. Agricultural transaction data has unique characteristics such as frequent changes in supply volumes and turbulent time-dependent changes in price. Since this was the first trial to identify fraud transactions in this domain, there was no training data set for supervised learning. So, fraud detection rules are generated using outlier detection approach. We assume that outlier transactions have more possibility of fraud transactions than normal transactions. The outlier transactions are identified to compare daily average unit price, weekly average unit price, and quarterly average unit price of product items. Also quarterly averages unit price of product items of the specific wholesalers are used to identify outlier transactions. The reliability of generated fraud detection rules are confirmed by domain experts. To determine whether a transaction is fraudulent or not, normal distribution and normalized Z-value concept are applied. That is, a unit price of a transaction is transformed to Z-value to calculate the occurrence probability when we approximate the distribution of unit prices to normal distribution. The modified Z-value of the unit price in the transaction is used rather than using the original Z-value of it. The reason is that in the case of auction exception agricultural products, Z-values are influenced by outlier fraud transactions themselves because the number of wholesalers is small. The modified Z-values are called Self-Eliminated Z-scores because they are calculated excluding the unit price of the specific transaction which is subject to check whether it is fraud transaction or not. To show the usefulness of the proposed approach, a prototype of fraud transaction detection system is developed using Delphi. The system consists of five main menus and related submenus. First functionalities of the system is to import transaction databases. Next important functions are to set up fraud detection parameters. By changing fraud detection parameters, system users can control the number of potential fraud transactions. Execution functions provide fraud detection results which are found based on fraud detection parameters. The potential fraud transactions can be viewed on screen or exported as files. The study is an initial trial to identify fraud transactions in Auction Exception Agricultural Products. There are still many remained research topics of the issue. First, the scope of analysis data was limited due to the availability of data. It is necessary to include more data on transactions, wholesalers, and producers to detect fraud transactions more accurately. Next, we need to extend the scope of fraud transaction detection to fishery products. Also there are many possibilities to apply different data mining techniques for fraud detection. For example, time series approach is a potential technique to apply the problem. Even though outlier transactions are detected based on unit prices of transactions, however it is possible to derive fraud detection rules based on transaction volumes.

Design of /Automated configuration System in EC (전자 상거래에서의 자동화된 Configuration 시스템 설계)

  • 김세영;조근식
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2000.04a
    • /
    • pp.217-224
    • /
    • 2000
  • Configuration은 도메인 지식을 이용해서 주어진 모든 요구를 충족시키는 컴포넌트를 갖는 시스템을 구성하기 위한 기술이다. 최근 전자 상거래는 역경매, 공동구매, 사용자 프로파일에 의한 제품의 추천 등 다양한 방식으로 구매자 중심의 사거래 행위를 하고 있다. 하지만 아직도 전문 지식이 필요한 제품의 구입시에 구매자는 많은 어려움을 겪고 있다. 이러한 구매자의 행위를 보조하기 위한 수단으로써 전문가 시스템에서 수년간 연구되어 온 Configuration 기술을 확장 도입하였다. 본 논문에서는 도메인에 대한 규칙(Rules)에 기반해서 Classification Problem Solving 방법과 Constructive Problem Solving 방법을 적용하였다. 구매자와의 능동적인 질의 수행을 하여 제품에 대한 요구를 정확히 한 뒤, 얻어진 사실(Facts)을 Classification Problem solving에 이용이 되어 제품 모델이 결정된다. 이 제품 모델은 구매자를 위해 특성화 되어 있기 않기 때문에, Constructive Problem Solving을 이용한다. 이런 내용을 기반으로 컴퓨터 조립을 위한 Configurator를 디자인하고 구현했다.

  • PDF

Payment Refusal against Discrepancy in Transport Document under L/C Transaction (신용장거래에서 운송서류 불일치에 대한 지급거절)

  • Lee, Jung-Sun
    • Korea Trade Review
    • /
    • v.42 no.2
    • /
    • pp.205-225
    • /
    • 2017
  • The study attempts to verify the case related to the notice of payment refusal by issuing bank regarding discrepancy in transport document under L/C(Letter of Credit) transaction. Considering the high portion of trade between Korea and China, Korean companies and banks in L/C transaction should be careful about many unpredictable situations. The case of this study is that Chinese seller(beneficiary) initiated a civil suit against Industrial Bank of Korea to Chinese court and Chinese courts in the first and second trials judged that the notice of payment refusal by Industrial bank of Korea doesn't satisfy Article 16, (c) (ii) (iii) in UCP 600. However, Industrial Bank of Korea implements the judgement even though the judgement is highly biased to Chinese seller. Considering the judgement by Chinese courts, the study suggests some countermeasures to Korean companies and banks which opened L/C. First, the issuing bank should describe the contents of discrepancy specifically based on Article 16, (c) in UCP 600. Second, it is necessary to insert a clause regarding governing law in the L/C contract like sales contract. Third, considering the biased judgement by Chinese court and difficulty in execution of foreign judgement in China, it is recommended to using arbitration as a method of dispute resolution such as ICLOCA and DOCDEX Rules which are international system operated by international instruments because it has legal effects to parties in L/C contracts if the issuing bank inserts arbitration clause in L/C.

  • PDF

Design of Automatic Trader Agent for Comparison (비교쇼핑을 위한 자동 거래 에이전트의 모델링)

  • 김민선;김수동
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.373-375
    • /
    • 2000
  • B2B, B2C, B2G, C2C로 구체화된 전자 상거래는 관련 국제 컨소시엄이 구축되고 그 유형에 있어서도 경매, 교환, 직구매, 입찰 등으로 다양해지는 등 이미 차세대 기업 비즈니스 모델로서의 위치를 확고히 하고 있고, 나아가 차별화 된 솔루션으로서 점원이 있는 시장, 실시간 인터넷 대금 납부 등의 서비스들이 국내외적으로 많이 모색되고 있는 실정이다. 본 논문에서는 비교쇼핑 에이전트를 지원하는 B2C 솔루션(ISPA:mIn Seon comparison Agent)을 제안하고 있는데, 비교 쇼핑 에이전트 역시 그러한 노력의 일례로서 이는 동종의 상품을 취급하는 여러 몰 간에도 그 제시 가격이 서로 다른 것에 착안하여 최저가격을 제시하는 사이트를 안내하는 기능을 한다. ISPA는 현 업계에서 웹 기반 시스템의 솔루션으로서 각광 받고 있는 EJB를 플랫폼으로 하며, 각 정보소스에 대한 정보 추출 규칙을 활용해서 온라인으로 비교 정보를 제공하는 종래의 인공지능의 접근과는 달리 J2EE 웹 개발 기술을 이용하여 오프라인으로 비교 정보를 구축하는 웹 기반 시스템으로써 에이전트를 지원한다. 나아가 핵심 클래스인 상품 클래스를 메타 데이터의 부분집합으로써 정의하는 기법을 적용하였는데 이는 개체 지향 패러다임의 시스템 구축 시에 전략적으로 응용될 수 있다.

  • PDF

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.

The Genealogical Study on SWIFTNet Trade Service Utility and Bank Payment Obligation (SWIFTNet TSU BPO의 계보학적 연구)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.18 no.3
    • /
    • pp.3-21
    • /
    • 2016
  • The thesis examines genealogical study of various aspects to overcome lots of problems which come by when we execute SWIFTNet TSU BPO. Practical implications regarding the innovation of electronic trade infrastructure are as follows. First, the shipping documents in the SWIFTNet TSU BPO are directly sent to an importer by an exporter after the baseline is confirmed. With this process itself, therefore, the bank cannot secure the account receivable. When initiating the SWIFTNet TSU BPO deal, it is needed to set regulations on the bank's account receivable security in the contract. Second, the SWIFTNet TSU BPO should also have an institutionally unified sharing platform with security, stability and convenience. It other words, it is needed to develop services which meet e-payment paradigm and international environments through continued analysis on market changes and flow. Third, the SWIFTNet TSU is useful in terms of promptness, reduction of risk in foreign exchange payment, cost reduction. Therefore, the SWIFT should be perfectly united and linked among the banks, importer and exporter to make the SWIFTNet TSU more convenient in countries around the world. Fourth, the SWIFT should be approached from the aspect of expansion of network and creation of a new business model through analysis on these problems with a worldwide perspective. At the same time, it is necessary to build a cooperative system to share information and promote comprehensive management for efficient operation.

  • PDF

The Legal Problems and Policy Suggestions for Vitalizing Cyber Trade Transactions (사이버무역거래에 관한 법적 문제와 활성화방안)

  • 이신규
    • The Journal of Information Technology
    • /
    • v.4 no.3
    • /
    • pp.1-17
    • /
    • 2001
  • This study is to examine some legal problems of cyber trade transactions and to suggest some policy implications to vitalize cyber trade by internet accomplishes electronic business from all process integration of production, marketing and customer service. However, there are some legal problems for the electronic commerce to be used in international trade activities such as trade contract transport documents and payment systems by internet. First international trade rules have to be legislated so that electronic documents has same legal function like traditional documents. Also electronic signature must has authenticity, integrity, non-repudiation, writing and confidentiality. Second, traditionally international payment systems such as letters of credits, remittance, documentary collections and open account have been operated as an important and popular method of payment. In the modern world of electronic commerce, information technology has made it possible to pay for the sale of goods and services over the internet. The payment methods such as Credit Card, Debit Card, Electronic Cash, Electronic Fund Transfers enable partly sellers, buyers and service providers to settle payment electronically through the internet. To settle the problems of payment systems, the security requirements for safe electronic Payments such as authenticity, integrity, non-repudiation have to be guaranteed. Also, electronic data interchange in transport documents has to be adopted and negotiability of electronic bills of lading has to be guaranteed. Electronic payment systems through SWIFT enable the sellers and the buyers to conduct and settle international business-to-business electronic commerce in case of solving the above problems and harmonizing the Bolero project.

  • PDF

Development of Security Anomaly Detection Algorithms using Machine Learning (기계 학습을 활용한 보안 이상징후 식별 알고리즘 개발)

  • Hwangbo, Hyunwoo;Kim, Jae Kyung
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2022
  • With the development of network technologies, the security to protect organizational resources from internal and external intrusions and threats becomes more important. Therefore in recent years, the anomaly detection algorithm that detects and prevents security threats with respect to various security log events has been actively studied. Security anomaly detection algorithms that have been developed based on rule-based or statistical learning in the past are gradually evolving into modeling based on machine learning and deep learning. In this study, we propose a deep-autoencoder model that transforms LSTM-autoencoder as an optimal algorithm to detect insider threats in advance using various machine learning analysis methodologies. This study has academic significance in that it improved the possibility of adaptive security through the development of an anomaly detection algorithm based on unsupervised learning, and reduced the false positive rate compared to the existing algorithm through supervised true positive labeling.

A Threats Statement Generation Method for Security Environment of Protection Profile (PP의 보안환경을 위한 위협문장 생성방법)

  • 고정호;이강수
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.3
    • /
    • pp.69-86
    • /
    • 2003
  • A Protection Profile(PP) is a common security and assurance requirements for a specific class of Information Technology security products such as firewall and smart card. A PP should be included "TOE(Target of Evaluation) Security Environment", which is consisted of subsections: assumptions, treat, organizational security policies. This paper presents a new threats statement generation method for developing TOE security environment section of PP. Our survey guides the statement of threats in CC(Common Criteria) scheme through collected and analysed hundred of threat statements from certified and published real PPs and CC Tool Box/PKB that is included a class of pre-defined threat and attack statements. From the result of the survey, we present a new asset classification method and propose a threats statement generation model. The former is a new asset classification method, and the later is a production rule for a well formed statement of threats.

  • PDF