• Title/Summary/Keyword: Price and Security

Search Result 250, Processing Time 0.032 seconds

A Study of Real Estate Price Change from Real Estate Policy. - An Apartment Price Center - (부동산 정책으로 인한 부동산 가격 변동에 관한 연구 - 아파트 가격 중심으로-)

  • Kim, Young-Sun
    • Management & Information Systems Review
    • /
    • v.20
    • /
    • pp.17-32
    • /
    • 2007
  • We try to study the plan to deliver the message of the hope and common peoples are diligent and we can buy the real estate in work if we make efforts hard that relieve an real estate price and analyze a timex situation. If prepared the countermeasure in the government with many real estate policy with due to a short though countermeasure which is seen at one's face. The error to the people of the policy which does not do the staring gaze to tie. This paper to pursue the stability of an real estate price and analyze the price according to an real estate policy and lead an real estate policy for a residing stability of the common people. There are we even though we grope the method to actualize and protect a lease security according to a house lease law of protection.

  • PDF

Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance (조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성)

  • Oh, Ha-Kyeong;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.

An Empirical Study on Individual and Social Commerce Factors Impacting Shopping Value and Intention to Repurchase in Social Commerce and Moderating Effects of Perceived Security (소셜커머스의 쇼핑 가치와 재구매의도에 영향을 미치는 개인 및 소셜커머스 특성과 지각된 보안의 조절효과에 대한 연구)

  • Kim, Sanghyun;Park, HyunSun
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.31-53
    • /
    • 2013
  • Web 2.0 has affected existing e-commerce and created a new business model of e-commerce, known as social commerce. Social commerce is a subset of e-commerce using social network services and is emerging as an important platform due to increased popularity of social networking services. This study focuses on analyzing the factors that influence the shopping value and intention to repurchase of social commerce users. Based on prior researches, we develop a research model, including individual characteristics of social commerce users (Collectivism, Price Sensitivity, Impulse Buying) and social commerce characteristics (Cost saving, Product Variety, Shopping Convenience). Furthermore, this study proposed the moderating effect of Perceived Security and the relationship between shopping value and intention to repurchase. To empirically validate, the data were collected from 220 social commerce users. The results indicated that individual characteristics (collectivism, price sensitivity, impulse buying) were positively related to hedonic shopping value. In addition, social commerce characteristics (cost saving, shopping convenience) were positively related to utilitarian value. The shopping value(hedonic and utilitarian) had a significant influence on intention to repurchase. The moderating effects of perceived security also was significant. Lastly, the implications for theory and practice are discussed.

Research on Realtime Mornitoring System for Construction Equipment Price (건설기계가격 상시관리시스템 도입방안에 관한 연구)

  • Ahn, Bang-Ryul;Tae, Yong-Ho
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2014.05a
    • /
    • pp.50-51
    • /
    • 2014
  • Although price of construction equipment affects overall cost of a construction projects, the cycle of updating them presented in the Poom-Saem in Korea is more than six years. Recently there is a demand of using the 'Standard Market Price of Construction Equipment', published by the ministry of Security and Public Administration, for estimating equipment operating and ownership cost. It is urgent to introduce an advanced system for updating the prices which can timely reflect market changes.

  • PDF

Legal liability of the management firm on hacked Robo-Advisor's stock price manipulation (해킹에 따른 로보어드바이저의 시세조종 행위와 운용사의 법적 책임)

  • Kim, Dong Ju;Kwon, Hun Yeong;Lim, Jong In
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.41-47
    • /
    • 2017
  • This study is a preceding research designed to deduct an institutional supplementary measure that minimizes any inevitable side effects from the improvement of artificial intelligence (AI) technology, which is the core element of the Fourth Industrial Revolution. In this specific case in which the Robo-Advisor, the representative type of AI-applied technology, was hacked by a third party and ended up manipulating prices, the study was intended to examine the responsibility relationship of the current legal framework. Although the current legal framework strictly prohibits acts such as hacking and manipulation, it was confirmed that if the Robo-Advisor management firm acts in compliance with protection measures regarding hacking, the firm is free from any legal liabilities and there is insufficient legal protection available for ordinary investors with grand-scale damage from price manipulation Based on this study, further studies are needed to derive more institutional supplementary measures on overcoming these problems.

A Study on Essential Concepts, Tools, Techniques and Methods of Stock Market Trading: A Guide to Traders and Investors (주식 거래의 필수 개념, 도구, 기법 및 방법에 관한 연구: 거래자와 투자자를 위한 안내서)

  • Sukhendu Mohan Patnaik;Debahuti Mishra
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.21-38
    • /
    • 2023
  • An attempt has been made in this article to discuss the fundamentals of technical analysis of the stock market. A retail investor or trader may not have the wherewithal to source that kind of information. Technical analysis requires a candlestick chart only. Most of the brokers in India provide charting solutions as well. Studying the price action of a security or commodity or Forex generally indicates a price pattern. Prices react at certain levels and widely known as support and resistance levels. Since whatever is happening with the price of the security is considered to be a part of a pattern or cycle which has already played out sometime in the past, these studies help a keen technical analyst to identify with certain probability, the future movement of the price. Study of the candlestick patterns, price action, volumes and indicators offer the opportunities to identify a high probability trade with probable target and a stop loss. A trader or investor can take high probability trade or position and control only her losses.

A Study on the Social Benefit Maximizing Reserve Pricing (예약요금제에서 사회적 이익을 고려한 예비력 요금에 관한 연구)

  • Kim, Sung-Soo;Jeong, Hae-Seong;Park, Jong-Keun;Choi, Joon-Young;Hong, Jun-Hee
    • Proceedings of the KIEE Conference
    • /
    • 1995.07b
    • /
    • pp.581-583
    • /
    • 1995
  • This paper presents a theory on the pricing and allocation of spinning reserve. It is shown in this paper, that it is possible to maintain system security with many participants each attempting to optimize their own benefit, through pricing incentive. Participant offers power consumption/generation and reserve contribution according to its price. And Price setter only distribute pricing signal to acquire system security. Participants induce disturbance on power system and they pay the penalty according to the size of disturbance. And they also offers some reserve capacity to earn reserve cost. In this scheme, the amount of data communication is very small.

  • PDF

THE IMPACT OF EARNINGS AND DIVIDEND INFORMATION ON THE VALUATION CONSEQUENCES OF EXTERNAL FINANCING ANNOUNCEMENTS (손익 및 배당정보가 외부자금조달의 공시효과에 미치는 영향)

  • Choi, Do-Soung;Lee, Seong-Hyo
    • The Korean Journal of Financial Management
    • /
    • v.11 no.2
    • /
    • pp.175-193
    • /
    • 1994
  • This paper relates the valuation consequences of common-stock, convertible-debt and straight-debt offering announcements to the issuing firms' stock price performance in periods before the announcements. Similar to previous studies on equity offerings, we find that the announcement effects of security offerings, regardless of offering types, are negatively correlated with the short-term pre-offering stock returns. We show that the informational impact of the preceding earnings and dividend(E/D) announcements account for the previous findings of the negative correlation. We further report that security issues following 'good-news' E/D announcements result in larger stock price declines than issues following 'bad-news' E/D announcements. The finding is consistent with the hypothesis that the E/D information affects the investors' assessments of the firm's cash flow expectations and of the probability of external financing.

  • PDF

A Secure Protocol for High-Performance RFID Tag using Dynamic ID Allocating (동적 ID 할당을 이용한 고기능 RFID 태그용 보안 프로토콜)

  • Park Jin-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.642-648
    • /
    • 2006
  • In this paper, I have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

  • PDF

How to Use Standard Market Prices for Ordinary Management System of Construction Equipment Prices in Poom-Saem (시가표준액을 활용한 건설공사표준품셈 건설기계가격 상시관리 방안)

  • Ahn, Bang-Ryul;Huh, Youngki;Kim, Dae Young;Tae, Yong-Ho
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2014.11a
    • /
    • pp.98-99
    • /
    • 2014
  • Construction equipment cost is critical to estimate the total construction costs, particularly in large and complicated projects. Despite its importance, the construction equipment cost may not reflect the current market value since the equipment database is being updated every 6 years at most. To keep construction equipment cost up to date, it is highly recommended to use the standard market price that is reported each year by the Ministry of Security and Public Administration (MOSPA). However, there is still a gap to adopt the standard market price system for the construction equipment cost computing system. Therefore, this paper suggests an effective way to develop a construction equipment cost estimation system.

  • PDF