• Title/Summary/Keyword: 신용통제

Search Result 62, Processing Time 0.022 seconds

A Study on Effects of Corporate Governance Information on Credit Financial Ratings (기업지배구조정보가 신용재무평점에 미치는 영향)

  • Kim, Dong-Young;Kim, Dong-Il;Seo, Byoung-Woo
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.105-113
    • /
    • 2015
  • If the watchdog role of good corporate governance, corporate executives and reduce agency costs and information asymmetries. Corporate governance score higher because enterprise internal control systems and financial reporting system is well equipped with the company management is enabled and corporate performance is higher because the high financial credit rating. Under these assumptions and hypotheses set up this study corporate governance (CGI) has been studied demonstrated how the financial impact on the credit rating (CFR). Findings,

    relevant corporate governance (CGI) and financial credit rating was found to significantly affect the positive (+), Regression coefficient code is expected code of positive (+), the value

    indicated by the value of all positive. The results of corporate governance (CGI) has showed excellent results, such as the more predictable will increase the credit score financial rating. The results of this study will have more CGI-credit financial rating the greater good. This study might be expected to provide a useful guide that corporate social responsibility, the company with a good governance and oversight systems enable to to get a higher credit rating in practice and research.

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

An RFID Multi-Reader System Development for TCP/IP Based Security Control (TCP/IP 기반 보안통제 RFID 멀티리더 시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1587-1592
    • /
    • 2009
  • RFID is Playing a central role in ubiquitous technology according with the advent of the ubiquitous era, and the development of an RFID reader is also emerging as an important technical development field. In this paper, we developed a hardware system which is able to make use of the 13.56MHz RFID infrastructure being used as a transportation card, a credit card, and so on as well as the 125KHz RFID infrastructure being used in security company, and which is applicable to a location identification, an entrance and exit control, and security control over the TCP/IP communication. The existing local RFID methods have some problems which bottlenecks such as administrative problems, technical problems, and so force frequently occur because a casual server is placed and operated in a company. Hence, in this paper we developed an RFID multi reader which is connected to a central administrable server over the TCP/IP in order to solve these problems, and we make it be possible to keep an security control and be easy to install, transfer and administrate RFID infrastructures.

The Effect of Accounts Receivable Management on Business Performance & Organizational Satisfaction: Focused on Micro Manufacturing Industries (매출채권관리가 재무적 경영성과와 조직만족에 미치는 영향: 도시형소공인을 중심으로)

  • Lee, Jong Gab;Ha, Kyu Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.6
    • /
    • pp.13-24
    • /
    • 2017
  • The purpose of this study is to examine the effect of the management of receivables on the management performance of micro manufacturing industries. The results of the survey are as follows. First, among the factors of management of pre- and post-trade receivables in the micro manufacturing industries, management organization and regulations, contract execution management, bad debt control, which are the subordinate factors of credit control, are positive (+) significant effect on stability. In terms of profitability, management organizations and regulations, which are subordinate factors of credit control management, have a positive (+) significant effect on profitability. The recovery management, which is a factor of management of post - receivable receivables, did not have a significant effect on the stability and profitability of financial management performance. Second, the effect of financial performance on organizational satisfaction is positively related to stability, while profitability has no significant effect on organizational satisfaction. The implication of this study is that pre - trade receivables management is more important than post - trade receivables management in the management of accounts receivables of micro manufacturing industries. Proactive credit management refers to the procedure of establishing and managing personal guarantees and physical guarantees in order to smooth the execution of the obligations at the same time as the contract is concluded through processes such as credit investigation, analysis and evaluation, and sales decision before the contract is concluded. Post receivables management based on the assumption of default is a receivables management procedure from receipt of receivables that are already defaulted to bad debts to bad debt processing. If the collection of receivables is delayed or bad debt is increased, Furthermore, a corporation may be subject to bankruptcy risk (insolvency by paper profits). Therefore, it is meaningful that this study suggests direction to induce change of contract type in advance by understanding the possibility of settlement of accounts receivable and recovery of bad debts within the day of transition in case of contract of micro manufacturing industries.

  • PDF

한국주식시장(韓國株式市場)에서 가격제한폭제도(價格制限幅制度)가 주가변동성(株價變動性)에 미치는 효과에 관한 실증적(實證的) 연구(硏究)

  • Lee, Sang-Bin;Kim, Kwang-Jeong
    • The Korean Journal of Financial Management
    • /
    • v.10 no.1
    • /
    • pp.231-248
    • /
    • 1993
  • 1987년의 블랙 먼데이 이후 많은 연구는 내재적(內在的) 가치(價値)와 상관없는 주가변동성(株價變動性), 즉 '노이즈'거래와 투기적 거래에 의한 주가변동성을 감소시킬 수 있는 방안을 강구하기 위하여 주식시장의 미시적 구조문제에 관심을 가져왔다. 정부기관이나 증권거래소에서 행해진 연구에 의하면 신용규제(信用規制)와 더불어 거래제동시스템을 하나의 해결책으로서 제시하였다. 그러나, 신용규제에 대해서는 많은 실증적 연구가 이루어진 반면, 거래제동시스템의 효과에 대해서는 주식시장에서의 실무적인 경험부족으로 상대적으로 극히 미미한 실정이다. 또한 거래제동시스템의 도입이 주식시장의 주가변동성을 감소시키는 효과가 있는 지에 대한 이론적 분석도 학자간에 의견이 분분하다. 본 연구는 한국증권시장에서 가격제한폭제도(價格制限幅制度)가 주가의 변동성을 감소시키는 효과가 있는 지에 대한 보다 신뢰성있는 실증적 증거를 제시하고 있다. 한국증권시장에서의 가격제한폭제도는 주가수준에 따라 개별주식별로 가격제한폭비율이 다르기 때문에, 가격제한폭제도가 주가변동성에 미치는 효과를 분석하는데 있어 가격제한폭 이외의 다른 요인을 통제하는 것이 가능하다 본 연구에서는 가격제한폭비율이 높은 포오트폴리오와 가격제한폭비율이 낮은 포오트폴리오를 구성하여 두 포오트폴리오 간에 주가변동성의 차이가 있는지를 비교하였다. 본 연구의 결과는 가격제한폭제도가 주가변동성을 줄여주는 긍정적인 효과가 있다는 것을 강하게 보여주고 있다.

  • PDF

The implementation of Biometric System using RF-ID (RF(RF-ID)을 이용한 Biometric System 구현에 관한 연구)

  • 김광환;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.626-629
    • /
    • 2003
  • In this paper, a system that implementation of Biometric System Using RF-ID. We organize a certification system which the security is strengthened, the information is flowed out and the presentation will do the possibility not to be abused. The loss of the credit card and problems which there is many of forgery back are happening. To solve such problems, We organized the system to use after we stored a fingerprint data at RF Card and going through certification necessary formalities. Various research to be related uses this system and is predicted. The development to common use goods will be possible through a certification procedure.

  • PDF

An Empirical Study of Loan Commitment Fees: Evidence from Japanese Borrowers (대출 약정수수료에 관한 실증연구: 일본 차입자를 중심으로)

  • Lee, Sang Whi;Lee, Sa Young
    • International Area Studies Review
    • /
    • v.13 no.3
    • /
    • pp.29-49
    • /
    • 2009
  • We examine the effects of information transparency, lender identity, and credit rating on the commitment fees of syndicated loans originated in Japan, employing a sample of 331 facilities. A syndicated loan is a financing instrument offered to a single borrower by multiple lenders, and Japanese syndicated loan volume increased 36% to a record-high of $283 billion in 2008 compared to 2007. We find that the more informational opaque the borrower, the higher the commitment fees the lender charges to the Japanese borrowers. There is evidence that a syndicate involving a Japanese lead agent is able to extract rents through higher commitment fees. We document that there is a significant relation between the credit rating of the borrower and the commitment fee cost of syndicated loans originated in Japan. Most importantly, our results provide evidence that banks in Japan extract higher returns on syndicated loans through the commitment fees in addition to higher loan spreads. Using a micro-level of Japanese borrowers, we contribute to existing literature by providing our empirical evidence after controlling for borrowing spread.

Measuring method of personal information leaking risk factor to prevent leak of personal information in SNS (SNS에서 개인정보유출방지를 위한 개인정보 유출위험도 측정 방법)

  • Cheon, Myung-Ho;Choi, Jong-Seok;Shin, Yong-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1199-1206
    • /
    • 2013
  • SNS is relationship based service and its users are increasing rapidly because it can be used in variety forms as penetration rate of Smartphone increased. Accordingly personal information can be exposed easily and spread rapidly in SNS so self-control on information management, right to control open and distribution of own personal information is necessary. This research suggest way of measuring personal information leaking risk factor through personal information leaking possible territory's, based on property value and relationship of personal information in SNS, personal information exposure frequency and access rate. Suggested method expects to used in strengthening self-control on information management right by arousing attention of personal information exposure to SNS users.

Coerced Debt Victimization and Interventions: Focusing on Domestic Violence Research in the United States (강요된 빚 피해 및 개입방안: 미국의 가정폭력 연구를 중심으로)

  • Park, Eonju
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.596-605
    • /
    • 2022
  • This study aimed to introduce research on coerced debt victimization and interventions in the context of domestic violence. To achieve the aim, this study reviewed existing studies on coerced debt conducted in the US. This study discussed the followings: First, coerced debt was theorized by coerced control theory of domestic violence and control mechanisms of economic abuse and conceptualized as fraud and force. Second, the effects of coerced debt included credit damage, economic dependence, and barriers to housing, employment, and safety. Third, to intervene the victimization, service providers should endure uncertainty and its time consuming process of recovering, provide an intense and personalized advocacy, and overcome the problems of absence of policies to support the victims. Finally, service providers should have educations and training programs on the assessment and intervention skills of coerced debt acknowledging empowerment and safety of the victims as the most important.

A Study on ISMS-P Controls for Hyper Scale Cloud (하이퍼 스케일 클라우드에 적합한 정보보호 및 개인정보보호 관리체계 인증 통제항목 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.19-26
    • /
    • 2023
  • Critical information infrastructure designations for cloud service providers continue to spread around the world as energy, financial services, health, telecommunications, and transportation sectors move to the cloud. In addition, in the case of Ukraine, the removal of restrictions on the use of cloud for national critical facilities and the rapid transition of critical data to the cloud enabled the country to effectively respond to cyberattacks targeting Russian infrastructure. In Korea, the ISMS-P is operated to implement a systematic and comprehensive information protection management system and to improve the level of information protection and personal information protection management in organizations. Control items considering the cloud environment have been modified and added to the audit of companies. However, due to the different technical levels of clouds between domestic and global, it is not easy to obtain information on the findings of cloud providers such as Microsoft for the training of domestic certification auditors on hyperscale scale. Therefore, this paper analyzes findings in hyperscale clouds and suggests ways to improve cloud-specific control items by considering the compatibility of hyperscale environments with ISO/IEC 27001 and SOC(System and Organization Control) security international standards.