• Title/Summary/Keyword: Bank protection

Search Result 135, Processing Time 0.023 seconds

Simulation-Based Operational Risk Assessment (시뮬레이션 기법을 이용한 운영리스크 평가)

  • Hwang, Myung-Soo;Lee, Young-Jai
    • Journal of Information Technology Services
    • /
    • v.4 no.1
    • /
    • pp.129-139
    • /
    • 2005
  • This paper proposes a framework of Operational Risk-based Business Continuity System(ORBCS), and develops protection system for operational risk through operational risk assessment and loss distribution approach based on risk management guideline announced in the basel II. In order to find out financial operational risk, business processes of domestic bank are assorted by seven event factors and eight business activities so that we can construct the system. After we find out KRI(Key Risk Indicator) index, tasks and risks, we calculated risk possibility and expected cost by analyzing quantitative data, questionnaire and qualitative approach for AHP model from the past events. Furthermore, we can assume unexpected cost loss by using loss distribution approach presented in the basel II. Each bank can also assume expected loss distributions of operational risk by seven event factors and eight business activities. In this research, we choose loss distribution approach so that we can calculate operational risk. In order to explain number of case happened, we choose poisson distribution, log-normal distribution for loss cost, and estimate model for Monte-Carlo simulation. Through this process which is measured by operational risk. of ABC bank, we find out that loss distribution approach explains closer unexpected cost directly compared than internal measurement approach, and makes less unexpected cost loss.

A Comparative Study on the Electronic Payment System between United States and Korea (한국과 미국의 전자결제제도 비교연구 -고객보호관련 주요쟁점을 중심으로-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.27-43
    • /
    • 2009
  • This article explored the customers protection regulations in electronic payment system by Article 4A of the UCC and EFTA of 1978 and by Electronic Financial Transaction Act of Korea. Both Korea and America have various regulations to protect concerned parties(customers). For examples, the errors of payment order, money-back guarantee, and unauthorized payment order etc. First, this Article focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. Second, most rights and obligations created by Article 4A of America can be varied with the agreement of affected parties. But there are some exceptions. The exceptions include the money-back guarantee. So Receiving bank have to pay to originator the ordered money included interest. However, Korea also has money-back guarantee but bank do not pay interest to sender. Lastly, Electronic Funds Transfer Act of 1978 and Regulation E has US$ 50 regulation in order to protect customers on the unauthorized payment order. Article 4A imposes duty to detect unauthorized payment orders to originator in relation to the establishment of commercially reasonable security procedure, while Korean law imposes the duty to notify the bank in order to decrease the loss resulted from unauthorized payment order.

  • PDF

A Study on the Problems and Instructions of Negotiation Before Maturity under Deferred Payment Letter of Credit - Focus on the Cases of Different Countries - (연지급신용장 만기전 매입의 문제점과 유의사항에 관한 연구 -각국의 판례를 중심으로-)

  • Kim Kyung-Bae
    • Journal of Arbitration Studies
    • /
    • v.16 no.2
    • /
    • pp.213-238
    • /
    • 2006
  • Deferred payment letter of credit is the L/C that makes the issuing bank to pay a beneficiary at maturity stipulated in the credit. In this deferred payment letter of credit transaction, is it possible that a confirming or nominating bank payor negotiate before maturity? and the confirming or nominating bank have legal protection when paid or negotiated before maturity? These problems are raised in argument. By the way, Korea, Switzerland, Germany, and Italy are positive on the above question, but France, United Kingdom, and Singapore are negative. Therefore, when using deferred payment letter of credit, it is required to keep in mind that the understanding of maturity stipulated in the credit is different among countries, legal principles of each nations, and researchers. And other problems are raised also as follows; the application of Fraud Rule and principle of independence and abstraction as nature of credit, when to pay credit amount to beneficiary, and refusal of payment due to poor quality. Finally, it is required to use deferred payment letter of credit, after full understanding of deferred payment letter of credit pointed out in this paper.

  • PDF

Characterization of Fusarium solani Causing Fusarium Root Rot of Lisianthus in Korea (꽃도라지 뿌리썩음병을 일으키는 Fusarium solani 의 특성)

  • Choi, Hyo-Won;Hong, Sung Kee;Lee, Young Kee;Kim, Jeomsoon;Lee, Jae Guem;Kim, Hyo Won;Kang, Eun Hye;Lee, Eun Hyeong
    • The Korean Journal of Mycology
    • /
    • v.45 no.1
    • /
    • pp.74-82
    • /
    • 2017
  • Lisianthus (Eustoma grandiflorum) is a flowering ornamental plant used widely in Korea. In 2015, wilting, damping-off, stunting, and root rot symptoms were observed in lisianthus plants of Yeoju and Gimhae, Korea. Affected seedlings appeared yellow and showed poor development of root systems in the field and in nursery boxes. Furthermore, affected plants were yellow, stunted, and died at approximately 2-3 months after transplanting. Fusarium species were consistently isolated from the basal stems of diseased plants. Nine isolates were identified as Fusarium solani based on morphological characteristics. Macroconidia of isolates were relatively wide, straight-to-slightly curved, and microconidia formed in false heads on long monophialides. Abundant chlamydospores were produced at the middle or tips of hyphae. To confirm this identification, a molecular analysis of the translation elongation factor 1 alpha (TEF) and RNA polymerase II subunit (RPB2) genes was conducted. The sequences of TEF and RPB2 showed 99.2-99.9% and 98.0-98.1% similarity, respectively, to those of reference F. solani strains in NCBI GenBank. Pathogenicity was tested using root dipping inoculation of healthy lisianthus seedlings. Symptoms were observed within 7 days of inoculation only in inoculated plants. This is the first report of F. solani causing Fusarium root rot on lisianthus in Korea.

Development of Strengthening Method and Safety Analysis of Ecological Block and Vegetation Bank Protection (식생블록옹벽의 구조적 안전성 해석과 보강설계기법 연구)

  • Oh, Byung-Hwan;Cho, In-Ho;Lee, Young-Saeng;Lee, Keun-Hee
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.7 no.1
    • /
    • pp.207-215
    • /
    • 2003
  • Developed is a new environment-friendly concrete-block retaining wall system. The conventional analysis methods are not directly applicable because the proposed concrete-block wall system is made of by interlocking the blocks with shear keys. Therefore, the shear analysis as well as stability analysis have been conducted to secure the safety of block-wall system. Overall slope stability analysis was also performed. An appropriate strengthening method was developed to ensure the safety when the block-wall system is relatively high. The method of analysis for strengthening the concrete-block wall system was also proposed. The proposed environment-friendly concrete block retaining wall system shows reasonable safety and can be a good construction method for retaining walls and river bank walls.

A Protection Algorithm of 23kV Shunt Capacitor Banks (23kV급 Capacitor Bank 보호 알고리즘)

  • Lim J.U;Kwon Y.J;Kang S.H.
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.443-445
    • /
    • 2004
  • 본 논문에서는 22.9kV급 Shunt Capacitor Bank 내부 고장으로 인한 불평형 요소를 검출하기 위하여 기존의 차동전압의 크기만을 이용한 보호 방식을 검토하고, 이 보호 방식에서 발생되는 여러 문제점들을 해결하기 위한 개선 방안을 제안한다. 기존의 차동전압의 크기를 이용한 보호 방식에서는 인입단 근처에서의 고저항 아크 고장이나 접지단 근처에서의 지락 고장 등에 의해 Capacitor 소자에 손상을 입을 수 있지만, 이에 대한 고장 판정이 용이하지 않다. 따라서 이를 해결하기 위하여 본 논문에서는 차동전압의 주파수 계전 방식 및 접지단 전압 등을 도입하였다. 특히, 주파수 계전 요소를 도입할 경우에 비선형 부하 둥으로부터 발생되는 고조파의 영향이 없다는 것을 입증하여 부하의 종류와는 무관하게 본 논문에서 제안한 방법이 적용될 수 있음을 보였다 본 논문에서 제안한 알고리즘은 사례 연구를 통하여 그 타당성이 입증되었다.

  • PDF

Occurrence of Root Rot caused by Fusarium fujikuroi on Adzuki Bean in Korea

  • Min Sun Ha;Hyunjoo Ryu;Sung Kee Hong;Ho Jong Ju;Hyo-Won Choi
    • The Korean Journal of Mycology
    • /
    • v.50 no.4
    • /
    • pp.319-329
    • /
    • 2022
  • In July 2020, wilting symptoms were observed among adzuki bean plants (Vigna angularis var. angularis L.) in the fields in Yeosu, Korea. Infected plants showed yellowing of leaves, browning inside the stems, splitting of stem bark, and wilting. When these plants were uprooted, their roots were found to be brown. The fungal pathogens NC20-737, NC20-738, and NC20-739 were isolated from symptomatic stem and root tissues. These pathogens were identified as a Fusarium fujikuroi species complex based on their morphological characteristics. Molecular identification was performed using the DNA sequence of translation elongation factor 1 alpha and the RNA polymerase II second largest subunit regions. The nucleotide sequences of all three isolates were similar to the F. fujikuroi reference isolates NRRL 13566 and NRRL 5538 of the National Centre for Biotechnology Information GenBank. A pathogenicity test was conducted by the soil inoculation method with cornmeal sand inoculum. Approximately 3 weeks after inoculation, symptoms were observed only in the inoculated adzuki bean seedlings. To the best of our knowledge, this is the first report of Fusarium root rot caused by F. fujikuroi in adzuki beans, both in Korea and worldwide.

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

A Comparative Study on Revetment Techniques in a Restoration Stream (하천복원구간에서 호안공법의 비교 연구)

  • Kim, Sung-Bum;Seo, Young-Min;Jang, Kwang-Jin;Jee, Hong-Kee
    • 한국방재학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.612-615
    • /
    • 2007
  • The environmental damage caused by river-improvement and slope of incision cliff can dest habitations of animate nature and it takes long time for restoration. River system constructed with stability of flood control, fine biotope, harmony with surroundings should be need to protect and restore nature. Therefore, in this study, conduct comparative experiment in various methods which are stable hydraulically and develop vegetation on revetment of bank, stream bed protection and disaster prevention aspect.

  • PDF

A New Online News Service Model, based on NewsML and UCI Systems (NewsML과 UCI를 적용한 뉴스 콘텐츠의 온라인 유통모델)

  • Park, Chang-Shin;Kil, Duke
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.641-645
    • /
    • 2007
  • News contents, produced for paper readers, are more and more being used online instead of offline. Internet sites, expecially portals(naver, daum, nate etc.) are dominant marketplaces, where news are exchanged and values are added. So, establishing a new online news service system, which can satisfy news provider(copyright owner) and internet service provider together, is a necessary task under current online-dominant news service environment. UCI(Universal & Ubiquitous Content Identifier) and IPTC NewsML(News Mark-up Language) are considered as useful standards to compromise protection of news-copyright and enhancement of online use of news contents. This study is based on a real case of 'NewsBank' in korea, We expect that this study can show an inspiration to obtain two contradictory goals of copyright protection and free online use of copyright.

  • PDF