• Title/Summary/Keyword: C2C Transaction

Search Result 89, Processing Time 0.027 seconds

A Study of Integrated E-Catalog system based on Web Services (Web Services 기반의 통합형 전자 카탈로그 시스템에 관한 연구)

  • 김명진;김창수;김윤기;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.229-233
    • /
    • 2004
  • According as internet and Information-Communication technology develop with the fast speed, Electronic Catalog that is used B2B or B2C electronic commerce is important element middle who can express well special quality of corporation's goods and product most effectively from internet space. But, several problems that creation of Electronic Catalog and standard absence about application that can say as importance technology base in electronic commerce and market newcomers who is constructing each other dissimilar system and take part in electronic commercial transaction can not use Electronic Catalog information exchange and transaction are happening. So that this treatise can use Electronic Catalog document that user who define Electronic Catalog document structure that can process information of goods configurationally and takes part in transaction is defined in electronic commerce hereupon, integration style Electronic Catalog system design and embody. This system did useful information that can not get from various advantage and catalog document such as business all-in-one and interoperability in different environment that Web Services through interlock with Web Services has so that can get Web Services.

  • PDF

The Risks of Transport Documents under L/C Transaction (신용장거래에서 운송서류의 위험요인에 관한 연구)

  • Park, See-Woon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.45
    • /
    • pp.85-109
    • /
    • 2010
  • L/C provides the exporter and the importer with safe assurance in the exchange of goods for payment in international trade. It involves a number of parties. Although the parties may have confidence in their client, bad faith or ignorance of international banking practice by any of these parties could cause the failure of transaction, which makes international trade a risky business. Most of the risks are found in transport document, which can cause disputes. There are many factors in the risk of transport documents under L/C transaction. One most common risk factor for the beneficiary in all transport documents is even if there is no discrepancy in document, the issuing bank or the applicant refuses to pay or delay payment insisting there is a discrepancy. In some very rare cases, the beneficiary may not get paid due to unfair injunction of the local court of the applicant. For the applicant, most common risk factors are fake bill and fraud. Risks classified according to the sorts of transport documents are as follows. 1. In B/L, payment can be refused because it is regarded as charter party B/L, although there is no real charter party contract. And the applicant can bear the potential risk of the loss or deterioration of cargo through transhipment of the cargo loaded on board in container if transhipment is prohibited without excluding of UCP 600 article 20 (c). 2. In charter party B/L, the applicant may take delivery without paying when charter party B/L is signed by charterer, which can result in a big loss for the beneficiary and the negotiating bank. And risks may arise when cargo is seized because the charterer does not pay the hire. The applicant and the issuing bank are also vulnerable to a risk - Against whom should they file a suit when cargo gets damaged during transportation? 3. In multimodal transport document, which is subject to a conflict because there is a big difference in viewpoints between transport industry and banks, conflicts may also arise when L/C requires ocean B/L and accepts multimodal transport document at the same time, but does not specify the details. 4. In air waybill, where the consignee is not the issuing bank but the applicant, risks may take place to the beneficiary when the applicant takes delivery but refuses to pay asserting minor discrepancies in document. The applicant may also bear the risk when cargo may not be loaded because air waybill is a received bill. Another risk may arise when although the applicant prohibits transhipment without excluding UCP 600 article 23 (c), the cargo may be transhipped, provided that the entire carriage is covered by one and the same air waybill.

  • PDF

The Design of Third Order Process for B2B (대형할인매장을 위한 B2B 매출정보지원 프로세스 설계)

  • Chang Jin-Ick;Kim Won Joong
    • Proceedings of the Society of Korea Industrial and System Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.163-170
    • /
    • 2002
  • In the form of B2C transaction, making an on-line order by using the website increases rapidly. An off-line order at the whole sale outlets is geometrically increasing. However, it is so true that both types of market are showing a tendency to become computerization. As to apply this type of computerized B2B transaction to this kind of large scale wholesale outlets, the most important fact to be considered is that there must have no data error. In addition to this, an accurate counting of actual stock is a precondition to decide a suitable amount of production and a timely delivery of goods. In this study, reducing elements of the risk that may create a difference In between actual stock and that in the computer, the integrated B2B ordering system is designed by taking actual cases an example in order to manage the information for a sale, which is conducted by various system in the large scale wholesale outlets such as E-mart, Carefour or the same kinds.

  • PDF

A Real-Time Certificate Status Verification Method based on Reduction Signature (축약 서명 기반의 실시간 인증서 상태 검증 기법)

  • Kim Hyun Chul;Ahn Jae Myoung;Lee Yong Jun;Oh Hae Seok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.301-308
    • /
    • 2005
  • According to banking online transaction grows very rapidly, guarantee validity about business transaction has more meaning. To offer guarantee validity about banking online transaction efficiently, certificate status verification system is required that can an ieai-time offer identity certification, data integrity, guarantee confidentiality, non-repudiation. Existing real-time certificate status verification system is structural concentration problem generated that one node handling all transactions. And every time status verification is requested, network overload and communication bottleneck are occurred because ail useless informations are transmitted. it does not fit to banking transaction which make much account of real response time because of these problem. To improve problem by unnecessary information and structural concentration when existing real-time certificate status protocol requested , this paper handle status verification that break up inspection server by domain. This paper propose the method of real~time certificate status verification that solves network overload and communication bottleneck by requesting certification using really necessary Reduction information to certification status verification. And we confirm speed of certificate status verification $15\%$ faster than existing OCSP(Online Certificate Status Protocol) method by test.

A Study on the Fraud Detection in an Online Second-hand Market by Using Topic Modeling and Machine Learning (토픽 모델링과 머신 러닝 방법을 이용한 온라인 C2C 중고거래 시장에서의 사기 탐지 연구)

  • Dongwoo Lee;Jinyoung Min
    • Information Systems Review
    • /
    • v.23 no.4
    • /
    • pp.45-67
    • /
    • 2021
  • As the transaction volume of the C2C second-hand market is growing, the number of frauds, which intend to earn unfair gains by sending products different from specified ones or not sending them to buyers, is also increasing. This study explores the model that can identify frauds in the online C2C second-hand market by examining the postings for transactions. For this goal, this study collected 145,536 field data from actual C2C second-hand market. Then, the model is built with the characteristics from postings such as the topic and the linguistic characteristics of the product description, and the characteristics of products, postings, sellers, and transactions. The constructed model is then trained by the machine learning algorithm XGBoost. The final analysis results show that fraudulent postings have less information, which is also less specific, fewer nouns and images, a higher ratio of the number and white space, and a shorter length than genuine postings do. Also, while the genuine postings are focused on the product information for nouns, delivery information for verbs, and actions for adjectives, the fraudulent postings did not show those characteristics. This study shows that the various features can be extracted from postings written in C2C second-hand transactions and be used to construct an effective model for frauds. The proposed model can be also considered and applied for the other C2C platforms. Overall, the model proposed in this study can be expected to have positive effects on suppressing and preventing fraudulent behavior in online C2C markets.

2R++: Enhancing 2R FTL to Identify Warm Pages (2R++: Warm Page 식별을 통한 2R FTL 개선)

  • Hyojun, An;Sangwon, Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.12
    • /
    • pp.419-428
    • /
    • 2022
  • Since in-place updates for pages are not allowed in flash memory, all new page writes should be written in an out-of-place manner. The old overwritten pages are invalidated. Such invalidated pages eventually trigger the costly garbage collection process. Since the garbage collection causes numerous read and write operations, it is one of the flash memory's major performance issues. In 2R, it modified the garbage collection algorithm, which applies the I/O characteristics of the On-Line Transaction Process workload to improve the Write Amplification Factor. However, this algorithm has a region pollution problem. Therefore, in this paper, we developed 2R++ that additionally separates pages with long access intervals to solve the region pollution problem. 2R++ introduces an extra bit per block to separate warm pages based on a second chance mechanism. Prevents warm pages from being misidentified as cold pages to solve region pollution problem. We conducted the experiments on TPC-C and Linkbench to make the performance comparison. The experiment showed that 2R++ achieved a Write Amplification Factor improvement of 57.8% and 13.8% compared to 2R, respectively.

The Hybrid Bus arbitration policy (하이브리드 버스 중재 방식)

  • Lee, Kook-Pyo;Yoon, Yung-Sup
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.2
    • /
    • pp.50-56
    • /
    • 2009
  • SoC(System on a Chip) has several masters, slaves, arbiter and decoder in bus architecture. Master initiates the data transactions like CPU, DMA and DSP and slave responses the data transactions like SRAM SDRAM and register. Furthermore, as multiple masters can't use a bus concurrently, arbiter plays an role in bus arbitration. In compliance with the selection of arbitration method, SoC performance can be changed definitely. Fixed priority, round-robin, TDM arbitration are used in general arbitration method, In this study, we compose TLM algorithm and analyze general arbitration methods through TLM simulation. Consequently, we propose the hybrid bus arbitration policy and verify the performance, compared with the other arbitration methods.

Analysis on Validity of Discounting the Deferred Payment Undertaking under Documentary Credit Transactions - with a Special Reference to the Application of Fraud Rule - (신용장거래에서 연지급확약할인의 유효성에 관한 연구 -사가의 원칙 적용을 중심으로-)

  • Hahn, Jae-Phil
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.133-156
    • /
    • 2011
  • This paper is to analyze the legality in which the fraud rule allow the issuer of L/C or a court to disrupt the payment to the beneficiary under the deferred payment credit when the nominated bank for deferred payment undertaking made prepayment or negotiation before the maturity date and fraud is identified to be involved. Since the function of commercial L/C is to provide absolute assurance of payment to a beneficiary, the fraud rule based on fraud exception has been known as the negative factor which lead to the disruption of "principle of independence & abstraction" under the commercial L/C transactions. As a result, the fraud rule is necessary to limit the activities of fraudsters, but its scope must be carefully circumscribed so as not to deny commercial utility to an instrument that exists to serve as an assurance of payment. But the fraud itself has not been firmly established because it is inherently pliable in its concept. There are numerous contents to describe the application of fraud to the L/C transactions as a standard such as egregious fraud, intentional fraud, L/C fraud(omitted here), flexible fraud, and constructive fraud. And so the standard applicable to the commercial transaction as the fraud rule would be high or low depending upon the various standards of fraud.

  • PDF

A MAC System Design for High-speed UWB SoC (고속 UWB SoC의 MAC 시스템 설계)

  • Kim, Do-Hoon;Wee, Jeong-Wook;Lee, Chung-Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.4
    • /
    • pp.1-5
    • /
    • 2011
  • We present the implementation of MAC system for MBOA UWB SoC. The implemented MBOA MAC algorithm is not master control mechanism, but distributed network mechanism. Therefore, mesh network can be easily constructed because MAC consists of distributed network and administrates network. The ARM926EJ with cache is adopted for high performnace and AMBA bus is applied for system design and reuse. In addition, the system operating clock management algorithm is implemented for low power consumption. The dedicated DMA for MAC is designed between the system memory buffer and MAC hardware, and the dedicated DMA for USB 2.0 is also implemented between system memory buffer and host for high data transaction.

Attribute Utility-Based Negotiation Agent Methodology for Customer-To-Customer Electronic Commerce (소비자간 전자상거래를 위한 속성효용기반 자동협상 방법론의 개발)

  • Song Yong U.;Hong June S.;Kim Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.73-89
    • /
    • 2004
  • Since people have come to access more and more information about products with the proliferation of the Internet, more and more customer-to-customer e-marketplaces are being introduced with rapidly increasing transaction volumes. As the role of customer-to-customer electronic commerce has become increasingly regarded as vital to the economy, much research has delved into developing intelligent agent systems to efficiently support customer-to-customer electronic commerce. Most of this research, however, has focused only on supporting simple negotiation for the price of common goods along the time span. To expand the negotiation object to the differentiated goods, the customer must be allowed to negotiate over multi-at-tributes of the product besides the price, including the attributes related to the transaction activity itself, such as delivery time and payment method. To satisfy this requirement, we propose an agent marketplace for differentiated goods where the agent of a customer can negotiate not only the price but also the various attributes of the product and the transaction in order to achieve a better utility level for both buyer and seller. The formal protocol and the architecture issues to support the proposed e-marketplace and agents are also addressed.

  • PDF