• Title/Summary/Keyword: Automated Transaction

Search Result 48, Processing Time 0.025 seconds

A Study on the Utilization and Problems of Online Dispute Resolution : Focusing on the Online Arbitration (온라인분쟁해결의 활용과 문제점에 관한 연구 - 온라인중재를 중심으로 -)

  • Yu, Byoung-Yook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.191-223
    • /
    • 2003
  • Electronic commerce and the Internet offer unprecedented opportunities. The explosive expansion of the use of the Internet makes it possible for businesses to expand their markets and render services. Global transaction costs are easy to cut off using Internet and transaction speed is faster than before. Where cyberspace is not free from claims, Offline transaction can lead to problems and disputes the same is for cyberspace transactions. However ADR is not meet for the online transaction for speed, cost and open network system, ODR methods to resolve electronic commerce conflicts is crucial for building confidence and permitting access to justice in an online business environment. The use of the Internet and the network in dispute resolution has an impact on the types of communication implied in the relevant processes such as automated negotiation, online mediation and online arbitration and involves new technological issues such as the integrity and confidentiality of data and communication used to transmit and store data. Among the ODR systems Online Arbitration is currently binding both parties disputed and can achieve the aim of dispute award the same as the traditional arbitration. Arbitration is based on the New York Convention 1958, Arbitration Model law 1985 and national Arbitration Act that are founded on territorial area and rested on arbitration agreement, constitution of the arbitral tribunal, due process, final and binding award and enforcement of the arbitration award. To compare with this issues Online arbitration has unnecessarily legal unstability and risk. ODR is the burgeoning field and has created a new issues. All such issues which have been debated in the ADR are composed with ODR. But these are not limited Some of issues are further complicated by the nature of the online environment such as confidentiality and principle of parties. It is true that online arbitration should comply with legal provisions, but which is impossible to adhere of the law. Flexible translation and functional equivalence of legal provisions are needed for acceptance of electronic commerce disputes. Finally electronic commerce now takes place on the Internet, it is inevitable that the commercial world wants access to dispute resolution process that best suits the new commercial environment. ODR methods are processing for development and legal issues are considered by both national and international authorities. Introduction of new Conventions or amend Convention and Model law of ODR comes near.

  • PDF

Recent Developments in Law of International Electronic Information Transactions (국제전자정보거래(國際電子情報去來)에 관한 입법동향(立法動向))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.23
    • /
    • pp.155-219
    • /
    • 2004
  • This paper focuses on two recent legislative developments in electronic commerce: the "Uniform Computer Information Transactions Act" ("UCITA") of USA and the "preliminary draft convention on the use of data message in [international trade] [the context of international contracts]" ("preliminary draft Convention") of UNCITRAL. UCITA provides rules contracts for computer information transactions. UCITA supplies modified contract formation rules adapted to permit and to facilitate electronic contracting. UCITA also adjusts commonly recognized warranties as appropriate for computer information transactions; for example, to recognize the international context in connection with protection against infringement and misappropriation, and First Amendment considerations involved with informational content. Furthermore, UCITA adapts traditional rules as to what is acceptable performance to the context of computer information transactions, including providing rules for the protection of the parties concerning the electronic regulation of performance to clarify that the appropriate general rule is one of material breach with respect to cancellation (rather than so-called perfect tender). UCITA also supplies guidance in the case of certain specialized types of contracts, e.g., access contracts and for termination of contracts. While for the most part carrying over the familiar rules of Article 2 concerning breach when appropriate in the context of the tangible medium on which the information is fixed, but also adapting common law rules and rules from Article 2 on waiver, cure, assurance and anticipatory breach to the context of computer information transactions, UCITA provides a remedy structure somewhat modeled on that of Article 2 but adapted in significant respects to the different context of a computer information transaction. For example, UCITA contains very important limitations on the generally recognized common law right of self-help as applicable in the electronic context. The UNCITRAL's preliminary draft Convention applies to the use of data messages in connection with an existing or contemplated contract between parties whose places of business are in different States. Nothing in the Convention affects the application of any rule of law that may require the parties to disclose their identities, places of business or other information, or relieves a party from the legal consequences of making inaccurate or false statements in that regard. Likewise, nothing in the Convention requires a contract or any other communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract to be made or evidenced in any particular form. Under the Convention, a communication, declaration, demand, notice or request that the parties are required to make or choose to make in connection with an existing or contemplated contract, including an offer and the acceptance of an offer, is conveyed by means of data messages. Also, the Convention provides for use of automated information systems for contract formation: a contract formed by the interaction of an automated information system and a person, or by the interaction of automated information systems, shall not be denied on the sole ground that no person reviewed each of the individual actions carried out by such systems or the resulting agreement. Further, the Convention provides that, unless otherwise agreed by the parties, a contract concluded by a person that accesses an automated information system of another party has no legal effect and is not enforceable if the person made an error in a data message and (a) the automated information system did not provide the person with an opportunity to prevent or correct the error; (b) the person notifies the other party of the error as soon as practicable when the person making the error learns of it and indicates that he or she made an error in the data message; (c) The person takes reasonable steps, including steps that conform to the other party's instructions, to return the goods or services received, if any, as a result of the error or, if instructed to do so, to destroy such goods or services.

  • PDF

A Case Study of the CR based e-Marketplace Implementation in Nuclear Parts Company (CR 기반의 원전부품제조업체 e-Marketplace 구현)

  • Jung, Lee-Sang;Ha, Chang-Seung;Lee, Seok-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.8
    • /
    • pp.145-152
    • /
    • 2009
  • Manufacturer's competitiveness in the MRO industry, which is to stimulate the growth of the business-to-business e-commerce market, has recently become more important. A nuclear parts manufacturer was supplying products based on irregular demand from clients which differs from ordinary MRO business practices. The reason for this is the Nuclear Parts Manufacturer has fallen behind the e-commerce performance of other industries, and they lack global competitiveness due to the low efficiency of the individual companies within it. In this study, we developed an MRO based a-Marketplace system to minimize repetitive ordering of raw materials, lack of reusability and inefficiency of transaction processing which was a result of the former legacy business practice, In order to accomplish the purpose of this study, we implemented a web based automated CR system which considered the characteristics of the nuclear parts manufacturing: the system has sub modules such as ordering, product management, transaction management, warehousing and raw material handling. As a consequence of the system implementation, H corporate successfully automated ordering of raw materials, quotation processing and inventory management compared to the legacy business process, achieving increased efficiency by reducing wasteful resources.

User's preferences on Bank Channels (은행 채널 별 주 이용고객의 특성 분석)

  • MooGeon Kim;Sohui Kim;Min Ho Ryu
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.5
    • /
    • pp.55-66
    • /
    • 2023
  • This study analyzes the characteristics of customer's preferences on banking channels (branches, automated machines, telebanking, internet banking, and mobile banking) and examines the factors influencing channel usage. To accomplish this, ANOVA and multiple regression analysis are performed using customer data from Bank A. The analysis reveals that customers primarily utilizing branch counter transactions have a significant impact on the profitability of 1st and 2nd grade banks, particularly among the age group of 50 years and above. Additionally, it is observed that as customers' loan, deposit, and financial product holdings increase, branch counter transactions also increase. On the other hand, it is found that as the usage of mobile banking decreases in terms of loans and deposits, transaction volume increases.

Business Process Monitoring under Extended-GMA Environment with Complex Event Handling (확장된 GMA 환경 하에서 복합 이벤트 처리를 통한 비즈니스 프로세스의 모니터링)

  • Kim, Min-Soo;Ock, Young-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.6
    • /
    • pp.2256-2262
    • /
    • 2010
  • The requirements for automated handing of business process and its monitoring usually have a proprietary form for each enterprise. Unlike the conventional database transaction, business process takes long time for its completion and incorporates very complex handling logics along with business situations. Since those handling logics are frequently changing in accordance with the business policies or environment, enterprises want to integrally capture the whole business semantics while monitoring those process instances. In this paper, we adopted GMA(Grid Monitoring Architecture) for the integrated monitoring of business processes. The GMA(Grid Monitoring Architecture) is a very scalable architecture to effectively monitor and manage monitoring information under the heterogeneous environment. By introducing complex event handling features into GMA to support various processing logics, we could implement a system that enables automated execution and high-level monitoring of business processes.

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

A Study on the Operational Process of SURF under Bolero System (볼레로시스템 상 SURF(전자결제시스템)의 운용프로세스에 관한 연구)

  • 채진익
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.187-206
    • /
    • 2002
  • The purpose of this study is to review the process for the trade settlement system between all parties involved in the commercial transaction under SURF System. SURF application is the latest value added service from bolero.net and a fully automated documentary settlement system. It extends bolero.net's capability to enable trade transactions by providing a delivery versus payment system. It has been designed as a standard, shared, infrastructure component for handling trade settlement within an electronic environment to keep step with the operation of electronic Bolero bill of Lading. It exploits the services provided by the Bolero Core Messaging Platform - secure, guaranteed transactions based on boleroXML standards to provide document compliance services with optional bank guarantees. So, SURF system can automatically check all commonly used trade documents such as commercial invoices, bills of lading and certificates of weight and analysis, etc and supports a full range of settlement options including Open Account, Documentary Collections, Documentary Credit. 58 have key features as follows, ① automatic document compliance checking, ② integrated with the Title Registry, ③ supports various forms of vender financing, ④ governed by a set of legally binding rules, ⑤ fully prepared for Straight-Through-Processing, ⑥ Enabled compliance with UCP 500.

  • PDF

System Analysis for the Automated Circulation (대출업무 자동화를 위한 시스팀설계에 관한 연구)

  • Kim, Kwang-Yeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.4 no.1
    • /
    • pp.85-102
    • /
    • 1980
  • Accepting the necessity for maintaining the objectives of the existing circulation system, the computer-based system could be designed by the system analyst and librarians to gain a variety of improvements in the maintenance, accessibility of circulation records and more meaningful statistical records. If the terminal can be operated on-line, then this circulation data is transmitted directly to the computer, where it may update to the circulation file immediately or alternatively be kept in direct access file for updating in batch mode. on-line system in the circulation operations is "data-collection system" and "Bar-coded label system" Bar-coded label system is simple, quick, and error-free input of data. Attached to CRT terminal is a "light pen" which is hand held and will read a bar-coded label as the pen is passed over the labels (one affixed to the book itself, other carried on the borrower cards). Instantaneously the data concerning transaction is stored in the central mini-computer. It is useful, economical for us to co-operate many libraries in Korea and design borrower's ID code, book no., classification code in the Bar-coded label system by the members of the computer center and the library staff at every stage. As for book loan, the borrowers ID code, book number and classification code are scanned by the bar-code scanner or light pen and the computer decides whether to loan and store the data. The visual display unit shows the present status of a borrowers borrowing and decides whether borrower can borrow.

  • PDF

A Case Study on the e-SCM Web-service Design for Auto-parts Industry of a Commercial Vehicle (상용차 부품 조달 기업을 위한 e-SCM 웹서비스 설계 및 구현 사례 연구)

  • Oh, Myung-Hyun;Yang, Jae-Kyung
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.1
    • /
    • pp.129-136
    • /
    • 2012
  • This study proposes a collaboration system framework on the web service in a supply chain to implement an efficient virtual supply chain and improve an ability to fulfill received orders over a supply chain. The system based on the framework proposed in this paper plays an important role for automatic order negotiation and placing/receiving an order noticed in web service by the main system. Furthermore, it can evaluate the fulfillment of received orders over a supply chain by using the transaction results from hierarchically related vendors and establish efficient manufacturing plans. In a word, this system is the automated system for creating manufacturing plans, placing and receiving orders. A little more important main function of this system is that it has a dynamic evaluation capability about fulfillment with received orders over a supply chain, and improves the evaluation method of fulfillment ability with received orders with related to direct dealing vendors, which is a main problem in existing system. As a result, this system is able to reduce the work load of the sales and purchasing materials, production control division, to manage accurate inventory promptly, to maintain the optimal inventory level by analyzing the information of fulfillment ability with received orders, and to enhance the level of service for customers.

Social Network Analysis for the Effective Adoption of Recommender Systems (추천시스템의 효과적 도입을 위한 소셜네트워크 분석)

  • Park, Jong-Hak;Cho, Yoon-Ho
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.305-316
    • /
    • 2011
  • Recommender system is the system which, by using automated information filtering technology, recommends products or services to the customers who are likely to be interested in. Those systems are widely used in many different Web retailers such as Amazon.com, Netfix.com, and CDNow.com. Various recommender systems have been developed. Among them, Collaborative Filtering (CF) has been known as the most successful and commonly used approach. CF identifies customers whose tastes are similar to those of a given customer, and recommends items those customers have liked in the past. Numerous CF algorithms have been developed to increase the performance of recommender systems. However, the relative performances of CF algorithms are known to be domain and data dependent. It is very time-consuming and expensive to implement and launce a CF recommender system, and also the system unsuited for the given domain provides customers with poor quality recommendations that make them easily annoyed. Therefore, predicting in advance whether the performance of CF recommender system is acceptable or not is practically important and needed. In this study, we propose a decision making guideline which helps decide whether CF is adoptable for a given application with certain transaction data characteristics. Several previous studies reported that sparsity, gray sheep, cold-start, coverage, and serendipity could affect the performance of CF, but the theoretical and empirical justification of such factors is lacking. Recently there are many studies paying attention to Social Network Analysis (SNA) as a method to analyze social relationships among people. SNA is a method to measure and visualize the linkage structure and status focusing on interaction among objects within communication group. CF analyzes the similarity among previous ratings or purchases of each customer, finds the relationships among the customers who have similarities, and then uses the relationships for recommendations. Thus CF can be modeled as a social network in which customers are nodes and purchase relationships between customers are links. Under the assumption that SNA could facilitate an exploration of the topological properties of the network structure that are implicit in transaction data for CF recommendations, we focus on density, clustering coefficient, and centralization which are ones of the most commonly used measures to capture topological properties of the social network structure. While network density, expressed as a proportion of the maximum possible number of links, captures the density of the whole network, the clustering coefficient captures the degree to which the overall network contains localized pockets of dense connectivity. Centralization reflects the extent to which connections are concentrated in a small number of nodes rather than distributed equally among all nodes. We explore how these SNA measures affect the performance of CF performance and how they interact to each other. Our experiments used sales transaction data from H department store, one of the well?known department stores in Korea. Total 396 data set were sampled to construct various types of social networks. The dependant variable measuring process consists of three steps; analysis of customer similarities, construction of a social network, and analysis of social network patterns. We used UCINET 6.0 for SNA. The experiments conducted the 3-way ANOVA which employs three SNA measures as dependant variables, and the recommendation accuracy measured by F1-measure as an independent variable. The experiments report that 1) each of three SNA measures affects the recommendation accuracy, 2) the density's effect to the performance overrides those of clustering coefficient and centralization (i.e., CF adoption is not a good decision if the density is low), and 3) however though the density is low, the performance of CF is comparatively good when the clustering coefficient is low. We expect that these experiment results help firms decide whether CF recommender system is adoptable for their business domain with certain transaction data characteristics.