• Title/Summary/Keyword: Method of Payment

Search Result 475, Processing Time 0.033 seconds

The Impact of Coin Changers on the Business Development of Chinese Commercial Banks (동전교환기가 중국 상업은행의 업무발전에 미치는 영향)

  • Yongjie, Zhu
    • Journal of Digital Policy
    • /
    • v.1 no.2
    • /
    • pp.17-24
    • /
    • 2022
  • In China, the continuous promotion and coverage of scanning code payment has caused an imbalance in the coin market. Coin changers can not only alleviate this problem, but also affect the business development of commercial banks. Therefore, it is meaningful to study the coin changer. The purpose of this paper is to study the impact of coin changers on the business of commercial banks in China. Through on-the-spot visits and based on the manually collected customer data of Chinese commercial banks as the object, combined with the calculation method of financial indicators to conduct case analysis. The results of the study show that the coin changer has a positive impact on the business development of Chinese commercial banks. This paper provides feasible suggestions and new ideas for business development to Chinese commercial banks. At present, there are few related studies on coin exchange machines. This study combines the calculation of financial indicators to verify the policy results, which is the innovation of this study.

The Research Methodology of Korean Commercial Arbitration in the Discipline-Fusion Perspective (한국 상사중재의 연구방법론 : 학문융합적 관점을 중심으로)

  • Chung, Yong-Kyun
    • International Commerce and Information Review
    • /
    • v.13 no.2
    • /
    • pp.151-176
    • /
    • 2011
  • The main objective of this study is twofold. The first is to investigate the main currents of Korean commercial arbitration. The second is to investigate the research methodology of Korean commercial arbitration in the perspective of disciplinary fusion perspective. The main findings of Korean commercial arbitration are as follows: first, the incidence of commercial arbitration increased in the Korean Commercial Arbitration Board during the period of 2006-2010, second, the primary causes of trade claims are disputes related with payment and those related with sales contracts, third and finally, the number of countries seeking to resolve disputes through arbitration has increased, including European countries. In this setting, it is necessary to investigate commercial arbitration through the inter-disciplinary perspectives. This study suggests that there are five research methodologies of commercial arbitration. They are legal theory related methodology, institutional methodology, cultural methodology, causal methodology and empirical methodology. Traditionally, the legal profession leads the field of commercial arbitration. However, it is necessary to introduce other elements to the field of commercial arbitration. This study highlights the disciplinary fusion approach among five research methodologies of commercial arbitration.

  • PDF

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Credit Card Bad Debt Prediction Model based on Support Vector Machine (신용카드 대손회원 예측을 위한 SVM 모형)

  • Kim, Jin Woo;Jhee, Won Chul
    • Journal of Information Technology Services
    • /
    • v.11 no.4
    • /
    • pp.233-250
    • /
    • 2012
  • In this paper, credit card delinquency means the possibility of occurring bad debt within the certain near future from the normal accounts that have no debt and the problem is to predict, on the monthly basis, the occurrence of delinquency 3 months in advance. This prediction is typical binary classification problem but suffers from the issue of data imbalance that means the instances of target class is very few. For the effective prediction of bad debt occurrence, Support Vector Machine (SVM) with kernel trick is adopted using credit card usage and payment patterns as its inputs. SVM is widely accepted in the data mining society because of its prediction accuracy and no fear of overfitting. However, it is known that SVM has the limitation in its ability to processing the large-scale data. To resolve the difficulties in applying SVM to bad debt occurrence prediction, two stage clustering is suggested as an effective data reduction method and ensembles of SVM models are also adopted to mitigate the difficulty due to data imbalance intrinsic to the target problem of this paper. In the experiments with the real world data from one of the major domestic credit card companies, the suggested approach reveals the superior prediction accuracy to the traditional data mining approaches that use neural networks, decision trees or logistics regressions. SVM ensemble model learned from T2 training set shows the best prediction results among the alternatives considered and it is noteworthy that the performance of neural networks with T2 is better than that of SVM with T1. These results prove that the suggested approach is very effective for both SVM training and the classification problem of data imbalance.

An Analysis the Role between the Buyer and Seller in the Field of e-Trade (전자무역에서 구매자와 판매자의 역할분석)

  • Lee, Joo-Won
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.195-212
    • /
    • 2005
  • International trade has been changed from traditional trade to e-trade due to the fast expanding of information technology like e-marketplace, EDI (Electronic data interchange) using Internet since mid of 1990's. e-Trade, as a new trade method, could handle every trade procedure such as market research, contract, customs clearance, logistics and payment using IT like internet without restriction of time and space. The evolution of transaction-based business model is upon us. The business models of many e-Marketplace in their early stages have typically been based on transaction fees. Many e-Marketplaces have even called out transaction revenues as a core element of their business plans. The transaction business represents the most simple of business models, but it does not provide a long-term sustain able advantage. For buyer's convenience, wide selection and test price hold appeal. For suppliers, the extended global market reach and direct access to customers and consortiums of customers is powerful. To maximize leverage of these new e-marketplace, you must from both a buyer perspective as well as a supplier perspective. Also required is a strategy that takes in account all of the various e-Marketplace transaction standards and one that allows the easy accomodation to new e-marketplace as the market change. These new e-marketplace will need to be factored into the sales channel strategies. To be successful, integration with these e-marketplaces should occur at a complete business process level. This study would suggest on the role of buyers and sellers for e-trade which could maximize effect of e-trade in order to cope with rapid changing IT environment and global trade environment. Therefore, this study suggests top priority tasks for implementing on the specialization strategy of e-trade process.

  • PDF

A Study on Open API Security Protocol based on Multi-Channel (다중 채널 기반 오픈 API 보안 프로토콜에 관한 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.40-46
    • /
    • 2020
  • Safe security technology is required for the startup ecosystem according to the construction and service of a joint open platform in the financial sector. Financial industry standard open API recommends that payment-related fintech companies develop/apply additional security technologies to protect core API authentication keys in the mutual authentication process. This study proposes an enhanced API security protocol using multiple channels. It was designed in consideration of the compatibility of heterogeneous platforms by further analyzing the problems and weaknesses of existing open API related research. I applied the method of concealment to remove the additional security channels into a single channel of the existing security protocols. As a result of the performance analysis, the two-way safety of the communication session of the multi-channel and the security of the man-in-the-middle attack of the enhanced authentication key were confirmed, and the computational performance of the delay time (less than 1 second) in the multi-session was confirmed.

A Study on the Analysis of the Provisions of the Library Steering Committee Included in the Ordinance of Public Libraries in Chungcheong Province (충청지역 공공도서관 조례에 포함된 도서관운영위원회 조항 분석에 관한 연구)

  • Sim, Hyojung;Noh, Younghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.3
    • /
    • pp.93-117
    • /
    • 2022
  • This study attempted to analyze the contents of the public library steering committee-related ordinances, derive problems and implications, and based on this, suggest the contents and supplementations necessary for the construction of the library steering committee ordinance. To this end, first, we looked at the theoretical background such as the significance and role of the public library steering committee, and the nature of the ordinance. Second, it was analyzed by dividing it into five areas: the status of enactment of ordinances related to library steering committee, whether provisions related to library steering committee are included, composition content, composition method, function, conference and regulation enactment, and allowance payment. Based on this analysis, it was mentioned that it is necessary to establish a department in charge of ordinances, a library steering committee, guarantee the participation of library directors and library experts, hold regular meetings, disclose minutes, and reflect the results of committee deliberation. In addition, when enacting a standard ordinance items containing the name, nature and role, composition, meeting, sub-organization, rule of the library steering committee.

Development of Safety Activity Application and Usability Evaluation to Improve Risk Perception for Industrial Accident Prevention (산업재해 예방을 위한 위험 지각 증진 안전 활동 어플리케이션 개발 및 사용성 평가)

  • Jong Hyun Lee;Sieun Kim;Eunsol Cho;Kwangsu Moon
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.241-253
    • /
    • 2023
  • Purpose: The purpose of this study is to introduce the structure and functions of an application developed for enhancing risk knowledge/perception, called KNOWRISK, and to identify and determine problems and requirements based on the usability evaluation results of the application. Method: The evaluation was conducted using the Mobile App Rating Scale (MARS) with a sample of 43 application users and related experts. Result: The application received a satisfactory evaluation score with an overall average of 4.074 points, and there was no significant difference in evaluation scores between experts and users. The highest score was for ease of use at 4.47, while the lowest score was for cost payment usage at 2.88. Conclusion: The results of this study suggest that efforts to increase risk knowledge and promote safe behavior using a mobile application can be an effective and efficient strategy for preventing industrial accidents and enhancing safety management.

Development of a Competency-Based Master Gardener Coordinator Curriculum: Focusing on Public Service Rural Extension Workers

  • Kim, Ji-Sung;Han, Seung-Won
    • Journal of People, Plants, and Environment
    • /
    • v.23 no.2
    • /
    • pp.149-158
    • /
    • 2020
  • The purpose of this study was to establish the role of master gardener coordinators and develop an education program to enhance their job competencies. To analyze and develop the new job of master gardener coordinator, we used the CBC method for curriculum development. The research findings can be summarized as follows. The analysis result of need and importance of education based on the performance level and demand level revealed 20 core competencies, which were classified into organizational education, learning by experience, individual learning, low-priority competencies for program development, with focus on the importance and need for education. The 17 courses are comprised of Eastern and Western Garden History, Understanding of Community Garden, Garden Aesthetics and Environmental Design, Master Gardener's Mission & Management, Garden Plants, and Garden Design and Practice etc. and the curriculum is 33 hours in total. The master gardener coordinator education program was conducted on 73 rural extension workers and the curriculum was evaluated by those who completed the program. The overall satisfaction was 4.29 and 97.1% of the trainees decided that the program would help them perform their duties. The analysis result discovered that all 20 core competencies increased after the program. As a result of conducting contingent valuation to determine the value of the program, willingness to pay (WTP) per hour was KRW 33,223 and the total WTP was KRW 1.096 million, which, when multiplied by 73 participants, is approximately KRW 80.008 million. This is relatively higher than the budget used (KRW 22.943 million), indicating that the program is worth it.

A Study on the Unfair Aspect of Specific Provisions in the Construction Contract : Counterplan and Institutional Reformation (건설공사 계약서상 불공정특약에 대한 대처방안 및 제도개선에 관한 연구)

  • Choi Jea-Won;Park Keun-Hyung;Kim Yong-Su
    • Korean Journal of Construction Engineering and Management
    • /
    • v.5 no.6 s.22
    • /
    • pp.146-153
    • /
    • 2004
  • The purposes of this study are to survey unfair aspects of specific provisions in the construction contract, and to suggest counterplans and institutional reformations. The research method of this study includes judicial precedent analysis and a questionnaire survey, The results of this study are as follows: 1) the main problems of unfair specific provisions are payment condition, shifting of the responsibility and adjustment in the contract sum. 2) counterplans ate suggested according to the construction phase : bid, construction and completion phase. 3) institutional reformations include firming up regulations, supervision, invigoration of claim, development of variation guideline, and so on.