• Title/Summary/Keyword: Electronic Companies

Search Result 629, Processing Time 0.027 seconds

A Study on the ODR Dispute Settlement System of Consumer Protection in EU (EU의 소비자보호 ODR 분쟁해결제도에 관한 연구)

  • Park, Jong-Sam
    • Journal of Arbitration Studies
    • /
    • v.28 no.4
    • /
    • pp.89-110
    • /
    • 2018
  • The purposes of this study are as follows: First, this study reviews the Online Dispute Resolution (ODR) regulations of the EU to resolve disputes which can arise in international e-commerce in the future. Second, this study tries to seek out alternative solutions to dispute resolutions based on these regulations. Third, this study increases the efficiency of the transactions by proposing effective and satisfactory dispute resolution methods for international e-commerce. First, this study reviews the concept of cross-border e-commerce, generally explores ODR, and creates comparisons with Alternative Dispute Resolution (ADR). Subsequently, this study looks into domestic ODR system and analyzes the regulations of EU ODR. This study suggests the implications of the European ODR regulations in the conclusion. The EU ODR platform is considered greatly significant in that it has increased the possibility of settlements in small disputes by enhancing consumers' accessibility to ADR procedures. Therefore, this thesis proposes a method for Korean companies to resolve disputes that may arise in e-commerce with EU by using the ODR platform. As a result, it is expected to increase the competitiveness of Korean companies in the EU market. Both legislative trends related to the ODR of the EU and establishment of the EU ODR platform have significant implications for Korean businesses in Europe. This study is expected to be useful for our businesses in the EU in reviewing the applicability of the EU ODR regulations and the dispute settlement procedures through the EU ODR platform. In addition, this study is expected to prove useful in relation to consumer protection by enhancing consumers' accessibility to dispute settlement institutions in domestic electronic commerce.

The Role of Accounting Professionals and Stock Price Delay

  • RYU, Haeyoung;CHAE, Soo-Joon
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.12
    • /
    • pp.39-45
    • /
    • 2020
  • Purpose: The stock price delay phenomenon refers to a phenomenon in which stock prices do not immediately reflect corporate information and the reflection is delayed. A prior study reported that the stock price delay phenomenon appears strongly when the quality of corporate information is low (Callen, Khan, & Lu, 2013). The purpose of the internal accounting control system is to improve the reliability of accounting information. Specifically, the more professionals such as certified public accountants are placed in the internal accounting control system, the more information is prevented from being distorted, so the occurrence of stock price delay will decrease. Research design, data and methodology: In this study, companies listed on the securities market from 2012 to 2016 were selected as a sample to analyze whether the stock price delay phenomenon is alleviated as accounting experts are assigned to the internal accounting control system. The internal control personnel data were collected in the "Internal Accounting Control System Operation Report" attached to the business report of each company of the Financial Supervisory Service's Electronic Disclosure System(DART). The measurement method of the stock price delay phenomenon was referred to the study of Hou and Moskowitz (2005). The final sample used in the study is 2,641 firm-years. Results: It was found that companies with certified accountants in the internal accounting control system alleviate the stock price delay phenomenon. This result can be interpreted as increasing the speed at which corporate information is reflected in the stock price by improving the reliability of information disclosed in the market by the placement of experts in the system. Conclusions: The results of this study suggest that accounting professionals assigned to the internal accounting control system are playing a positive role in providing high-quality information to the market. In this study, focusing on the fact that the speed at which corporate information is reflected in the stock price is very important for the stakeholders in the capital market, we find that having a certified public accountant in the internal accounting control system alleviates the stock price delay phenomenon.

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • The purpose of this study is to analyze and interpret the current situation of private security companies·guards for the past three years, security companies by size, general·special (new education), and qualification system provided by the Police Agency, Security Association, etc. It provides a theoretical foundation for private security and provides a new perspective for interpreting private security. As a result, through the current situation, this private security has a concentration of metropolitan area and facility security, an abnormal personal protection company contrast, the number of personal protection institutes, there is a special security shift to regular jobs, and the current continuous education On the other hand, the education of special security guards has been shown to be limited. In the qualification system, the utilization of security instructor qualifications and the utilization and public relations of personal probation officer qualifications will appear. The current state of typical private security is as follows. The first is the balanced development of private security and the clarity of business divisions. Second, the quality of private security education and educational institutions must be high. Third is the recognition of the qualification system and active public relations.

A Study on Data Compliance Measures of Digital Healthcare Service - Focusing on Personal Information Lifecycle (디지털 헬스케어 서비스의 데이터 컴플라이언스 방안에 관한 연구 - 개인정보 라이프사이클을 중심으로)

  • Jung, Jaeeun;Yang, Jinhong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.2
    • /
    • pp.134-143
    • /
    • 2022
  • 'Data' is the key component that leads Digital Healthcare. Most of the Healthcare Data is personal information of data subject and includes Sensitive Information. It is very important for companies to use data lawfully and safely during the lifecycle of data collection, use, provision, and destruction. However, small and medium-sized enterprises(SMEs), ventures, and startups, which account for 78% of the Healthcare Services Industry, have had difficulties in performing tasks related to personal information protection. The personal Information Protection Act's requirements depending on the purpose of using Personal Information are different. Also, the requirements for each personal information lifecycle are varied. Therefore, this study suggests six purposes for companies to use healthcare data. It examines the considerations during the lifecycle in which personal information is collected to be destroyed.

The Effect of Corporate Social Responsibility on Brand Loyalty-The Mediating Effect of Brand Trust and e-WOM (기업의 사회적 책임이(CSR) 브랜드 충성도에 미치는 영향 - 브랜드 신뢰와 e-WOM의 매개효과를 중심으로)

  • Chen, Si-Si;Li, Yan-Nan
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.11
    • /
    • pp.294-306
    • /
    • 2021
  • In the era of brand economy, companies fulfill their social responsibilities to enhance consumers' brand trust, thereby enhancing brand loyalty. On the other hand, the current Covid-19 epidemic has accelerated the pace of digital transformation of enterprises and has also made consumers pay more attention to the online reputation of enterprises. Based on the Chinese consumer market, this paper studies the corporate social responsibility, Internet word-of-mouth, brand trust, and brand loyalty of electronic product companies. To verify the impact of corporate social responsibility on brand loyalty through Internet word-of-mouth and brand trust, this paper issued a questionnaire survey to Chinese consumers. A total of 469 questionnaires were used for empirical analysis, and SPSS21.0 was used to analyze the collected data. The results are summarized as follows: (1) CSR has a positive impact on brand trust. (2) CSR has a positive impact on brand loyalty. (3) Brand trust has a positive impact on brand loyalty. (4) Brand trust and e-WOM play an intermediary role in CSR and brand loyalty.

Human Resource Nurturing Algorithm Leading the Energy and Electric Element Technology of Electric Vehicles (전기자동차의 에너지 및 전기 요소기술을 선도하는 인력양성 알고리즘)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.181-186
    • /
    • 2022
  • The world's electric automobile sector has shifted beyond technological environmental changes to a stage that has an impact on the market environment. And automakers are shifting from the existing strategy of "technological advantage → brand enhancement → sales expansion of existing internal combustion engine vehicles" to the expansion of the electric automobile market itself, which is to enhance market competitiveness. In addition, competition in the electric automotive parts market is expected to intensify due to the expansion of the business areas of existing parts makers and the entry of new companies, and development cooperation is expected to actively proceed to improve the efficiency of major eco-friendly parts. Along with this prospect, electric vehicles are expected to change the overall structure of the automobile industry, the overall growth of the electric vehicle value chain such as batteries, power trains (motors, power management and control systems), electric vehicle production, and charging infrastructure Is expected. Therefore, in this thesis, in order to cultivate a variety of high-quality human resources that companies want to keep pace with the changing automobile industry, we study a professional manpower training program that leads the growth engine of the electric automobile industry.

A Study On Operation for DevOps Using Zero Trust in Network Separation Environment (망분리 환경에서 제로 트러스트를 활용한 DevOps 운영에 관한 연구)

  • Bong-Yong Han;Young-Kun Choi;Ga-Yeon So;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.27-34
    • /
    • 2024
  • Network separation is an important policy that Cyber Incident prevent cyber and protect data. Recently, the IT environment is changing in software development, such as remote work, using the cloud, and using open sources. Due to these changes, fintech companies' development productivity and efficiency are lowering due to network separation regulations, and the demand for easing network separation continued. The government revised the regulations electronic financial supervision(hereafter EFS) in response to needs for mitigation of network separation in the IT environment and fintech companies. Some amendments to the EFS, which took effect on 01/01/2023, mitigate network separation only for research and development purposes in cloud environments. If software developed in a cloud development environment is applied to an operating system through a distribution system the existing perimeter-based security model will not satisfaction the network separation conditions. In this Study, we would like to propose a way to maintain the DevOps system in a network separation environment by Using the zero trust security system.

How to use attack cases and intelligence of Korean-based APT groups (한국어 기반 APT 그룹의 공격사례 및 인텔리전스 활용 방안)

  • Lee Jung Hun;Choi Youn Sung
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.153-163
    • /
    • 2024
  • Despite the increasing hacking threats and security threats as IT technology advances and many companies adopt security solutions, cyberattacks and threats still persist for years. APT attack is a technique of selecting a specific target and continuing to attack. The threat of an APT attack uses all possible means through the electronic network to perform APT for years. Zero-day attacks, malicious code distribution, and social engineering techniques are performed, and some of them directly invade companies. These techniques have been in effect since 2000, and are similarly used in voice phishing, especially for social engineering techniques. Therefore, it is necessary to study countermeasures against APT attacks. This study analyzes the attack cases of Korean-based APT groups in Korea and suggests the correct method of using intelligence to analyze APT attack groups.

A Study on the Extremely Low Frequency Magnetic Fields Exposure Characteristics of Workers in LCD Manufacturing Process (LCD 제조공정 종사근로자의 극저주파자기장 노출특성 연구)

  • Kim, JoonBeom;Kang, Joon Hyuk;Chung, Eun-Kyo;Jung, Kihyo
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.32 no.1
    • /
    • pp.10-20
    • /
    • 2022
  • Objectives: The aim of this study is to evaluate exposure levels of the extremely low frequency magnetic fields(ELF-MF) radiated from various electric facilities in Liquid Crystal Display(LCD) manufacturing processes. Methods: This study measured the exposure levels of personal and local ELF-MF for the electronic facilities installed in two LCD manufacturing companies. Samplers were installed around workers' waist during working hours to identify personal exposure levels, and direct reading equipment were located at 3 cm, 10 cm, and 30 cm away from the surface of the electronic facilities to measure local exposure levels. Average and maximum(ceiling) values were calculated for personal and local exposure levels. Results: Average and maximum of personal exposure levels for each worker were 0.56(mean) ± 0.02(SE) µT and 6.31 ± 0.75 µT, respectively. Statistical analyses of the study found that maximum of the personal exposure levels for engineers was significantly higher than that for operators since engineers spend more time near the electronic facilities for repairing. The range of maximum personal exposure levels was 0.50 ~ 43.50 µT and its highest level was equivalent to 4.35 % of ACGIH(American Conference of Governmental Industrial Hygienists) exposure limit value(1 mT). Maximum of local exposure levels was 8.18 ± 0.52 µT and the electronic facilities with higher exposure levels were roof rail and electric panel, which were not related to direct manufacturing. The range of maximum local exposure levels was 0.60 ~ 287.20 µT and its highest level was equivalent to 28.7 % of the ACGIH exposure limit value. Lastly, the local exposure levels significantly decreased as the measurement distance from the electronic facilities increased. Conclusions: Maximum of personal and local exposure levels did not exceed the exposure limit value of ACGIH. However, it is recommended to keep the workers as far as possible from the sources of ELF-MF.

Classification Analysis on Private Security (민간경비에 대한 분류 분석)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.103-124
    • /
    • 2017
  • The purpose of this study is to analyze regional clusters and discrimination on size and sector of private security in national 16 areas in 2015. The results of the study using hierarchical cluster analysis and discriminant analysis are as follows. First, we can classify national 16 areas into 3 clusters, such as Large Area(1), Medium Area(2), and Small Area(3) according to the size of private security. The discriminant functions D for each cluster is as follows: (1) Large Area(1) = -383.981 + (.108 ${\times}$ number of security companies) + (.016 ${\times}$ number of guards), (2) Medium Area(2) = -35.570 + (.029 ${\times}$ number of security companies) + (.005 ${\times}$ number of guards), and (3) Small Area(3) = -5.381 + (.012 ${\times}$ number of security companies) + (.002 ${\times}$ number of guards). Second, we can classify national 16 areas into 3 clusters, such as Large Area(1), Medium Area(2), and Small Area(3) according to the sector of private security. The discriminant function D for each cluster is as follows: (1) Large Area(1) = -2224.402 + (-.562 ${\times}$ facilities security) + (1.245 ${\times}$ protection security) + (171.142 ${\times}$ convoy security) + (-2.722 ${\times}$ electronic security) + (2.020 ${\times}$ special security), (2) Medium Area(2) = -4.762 + (.052 ${\times}$ facilities security) + (.063 ${\times}$ protection security) + (-3.819 ${\times}$ convoy security) + (.110 ${\times}$ electronic security) + (-.165 ${\times}$ special security), and (3) Small Area(3) = -125.742 + (-.009 ${\times}$ facilities security) + (.432 ${\times}$ protection security) + (5.748 ${\times}$ convoy security) + (5.530 ${\times}$ electronic security) + (-.901 ${\times}$ special security).

  • PDF