• Title/Summary/Keyword: Credit control

Search Result 116, Processing Time 0.022 seconds

Improvement of the Systematic Control and Process on Account Receipt (수취계정에 대한 체계적 관리 및 프로세스 개선)

  • Choi, Chang-Hwan;Lee, Jong-Hwan;Kim, Tae-Sung;Yoon, Sang-Han;Park, Kwang-Hee;Lee, Hee-Chun;Seo, Yeong-Bok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.1
    • /
    • pp.60-66
    • /
    • 2011
  • This study looks at a company which introduced SAP program, one type of ERP systems, and how the firm copes with the problems which happen in business process. The research tried to solve the problem by IDEAL method of process software improvement methodology. As a result, receipt account program for credit sales could be developed; the program was applied to the actual business work and operated.

Improved Decision Tree Algorithms by Considering Variables Interaction (교호효과를 고려한 향상된 의사결정나무 알고리듬에 관한 연구)

  • Kwon, Keunseob;Choi, Gyunghyun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.30 no.4
    • /
    • pp.267-276
    • /
    • 2004
  • Much of previous attention on researches of the decision tree focuses on the splitting criteria and optimization of tree size. Nowadays the quantity of the data increase and relation of variables becomes very complex. And hence, this comes to have plenty number of unnecessary node and leaf. Consequently the confidence of the explanation and forecasting of the decision tree falls off. In this research report, we propose some decision tree algorithms considering the interaction of predictor variables. A generic algorithm, the k-1 Algorithm, dealing with the interaction with a combination of all predictor variable is presented. And then, the extended version k-k Algorithm which considers with the interaction every k-depth with a combination of some predictor variables. Also, we present an improved algorithm by introducing control parameter to the algorithms. The algorithms are tested by real field credit card data, census data, bank data, etc.

Development of Small Package Drop-Off System (PC 기반의 무인 소화물 접수장치 설계에 관한 연구)

  • Nam, Byong-Keun;Han, Kyong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2001.11c
    • /
    • pp.450-452
    • /
    • 2001
  • In this paper, we proposed the automatic postal drop-off system based on the microprocessor board or PC. The weight of the small postal package is transmitted from the electronic scale and user-entered addresses and delivery rate are processed by the controller to calculate the fee. For 24 hour out-door operation and maintenance, non-cash payment methods such as credit card payment is used. The post stamp and receipt are printed by the thermal printer. For the electronic processing of the parcel, serial code is also printed on the stamp and receipts in bar code format. The parcel information obtained by the automatic postal drop-off system is transferred to remote central system by dial-up modem shared by the on site office. The proposed system and its control software are built for prototype model operation and the result met the design requirements. For real time processing, data reception through three serial ports is handled by interrupt routine. The proposed system is expected to be applied for commercial logistics system and pc automation system.

  • PDF

Risk Assessment and Decision-Making of a Listed Enterprise's L/C Settlement Based on Fuzzy Probability and Bayesian Game Theory

  • Cheng, Zhang;Huang, Nanni
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.318-328
    • /
    • 2020
  • Letter of Credit (L/C) is currently a very popular international settlement method frequently used in international trade processes amongst countries around the globe. Compared with other international settlement methods, however, L/C has some obvious shortcomings. Firstly, it is not easy to use due to the sophisticated processes its usage involves. Secondly, it is sometimes accompanied by a few risks and some uncertainty. Thus, highly efficient methods need to be used to assess and control these risks. To begin with, FAHP and KMV methods are used to resolve the problem of incomplete information associated with L/C and then, on this basis, Bayesian game theory is used in order to make more scientific and reasonable decisions with respect to international trade.

The Assessment of the Monetary Market of Russia at the Present Stage of Development

  • Vyborova, Elena Nikolaevna
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.5 no.1
    • /
    • pp.33-49
    • /
    • 2017
  • This article can see the analysis of the monetary market of Russia at the present stage, its main segments. An assessment is given to the regulation of mechanism by liquidity, the transactions of the Bank of Russia on the provision of liquidity and on absorption of liquidity, the transaction of fixed action and the transaction in the public market are analyzed. To determine the tendency of development of the monetary market and its segments. In the work using the methods of multivariate statistics, the tools of financial mathematics. To be analyzed the amount of data from the 2015 -2016 year, the 2013 year. (daily data). Hypothesis 1. The dynamics of the money market of Russia at the present stage of development of domestic economy is rather stable. Hypothesis 2.The many transactions of regulation to decrease the liquidity of by monetary movement, the control function. Also in the article consider the contour of the financial transaction. This article reveals the theoretical bases of analysis of profitability of credit operations.

An RFID Multi-Reader System Development for TCP/IP Based Security Control (TCP/IP 기반 보안통제 RFID 멀티리더 시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.8
    • /
    • pp.1587-1592
    • /
    • 2009
  • RFID is Playing a central role in ubiquitous technology according with the advent of the ubiquitous era, and the development of an RFID reader is also emerging as an important technical development field. In this paper, we developed a hardware system which is able to make use of the 13.56MHz RFID infrastructure being used as a transportation card, a credit card, and so on as well as the 125KHz RFID infrastructure being used in security company, and which is applicable to a location identification, an entrance and exit control, and security control over the TCP/IP communication. The existing local RFID methods have some problems which bottlenecks such as administrative problems, technical problems, and so force frequently occur because a casual server is placed and operated in a company. Hence, in this paper we developed an RFID multi reader which is connected to a central administrable server over the TCP/IP in order to solve these problems, and we make it be possible to keep an security control and be easy to install, transfer and administrate RFID infrastructures.

Effects of MyData Service Attributes on Intention to Use (마이데이터 서비스 속성이 이용의도에 미치는 영향)

  • Kim, Soo-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.271-278
    • /
    • 2022
  • MyData service integrates and manages user's personal data such as finance, credit, etc, and is expected to provide useful information to the user as personal data in various fields are gradually integrated. Discovering factors that affect the intention to use of MyData service is a very important topic for understanding that service. To this end, in this study, the attributes of the MyData service were derived, and the derived service attributes were grouped together by using factor analysis. As a result, we found four factors such as "convenience", "usefulness", "security", and "control". After that, we established our research model to analyze the causal relationship between these four factors and the intention to use of MyData service. According to the analysis results, among the factors of the MyData service attribute, "convenience", "usefulness", and "control" had a significant effect, and "security" did not have a significant effect. In particular, it was confirmed that "control" had the greatest influence on the intention to use. This study suggests that MyData service provider need to make users recognize they are controlling their data and develop services that provide various benefits to users.

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF

An Improved Dynamic Buffer Allocation Scheme for Controlled Transfer Service in ATM Networks (ATM 망에서 CT 서비스를 위한 개선된 동적 버퍼 할당 방식)

  • Kim, Byung-Chul;Kim, Dong-Ho;Cho, You-Ze;Kwon, Yul
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.9
    • /
    • pp.36-48
    • /
    • 1999
  • Controlled transfer (CT) service has been recently proposed as a new ATM transfer capability for high-speed data applications, which used a credit-based flow control. This paper investigates buffer allocation schemes for CT service and proposes an improved dynamic bugger allocation scheme. In order to improve the responsiveness to a congestion, the proposed method is considered the load factor of a link when determining the amounts of virtual connection (VC)s buffer allocation. Also, in this paper we compare the performance of the proposed method with those of the existing buffer allocation methods such as flow controlled virtual channels (FCVC) and zero queueing flow control (ZQFC) through simulation. Simulation results show tat the proposed scheme exhibits a better performance than the existing schemes in terms of throughput, fairness, queue length and link utilization.

  • PDF

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.