• Title/Summary/Keyword: Third party

Search Result 872, Processing Time 0.025 seconds

The Effects of Earnings Management, Related Party Transactions and ESG Management of Chaebol Firms on Corporate Performance in Korea (재벌기업의 이익조정, 관계회사 간 거래와 ESG 경영이 경영성과에 미치는 영향)

  • Narantugs, Namuun;Liu, Yue;Kim, Sung-Hwan
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.1
    • /
    • pp.103-123
    • /
    • 2022
  • Purpose - This study investigates the effects of earnings management, related party transactions between chaebol affiliates on earnings management and ESG score on their profitability using return on assets (ROA). Design/Methodology/Approach - We use data including ESG (Environmental, Social, and Corporate Governance) score of the Korea Corporate Governance Service(KCGS), and financial data of 10,145 firm-year observations from the Total Solution 2000 (TS 2000) and Korea Companies-Information Service (KOKOInfo), and apply the finite lagged models to investigate the long-term effects of related party transactions between chaebol affiliates of earnings management on ESG scores and corporate performance. Furthermore, to take into consideration the simultaneous mutual effects on each other of main variables, we introduce finite distributed lags of five years. Findings - First, ESG-rated firms have a higher total asset return than non-ESG-rated firms. Second, chaebol firms have a higher profitability than non-chaebol firms. Third, profit management of related party transactions between affiliates within a chaebol has a positive effect on the short-term profitability and a negative effect on the long-term profitability. Fourth, chaebol ESG firms have a lower impact on profitability due to rating up (down) than non-chaebol ESG firms. Research Implications or Originality - Based on the above results, it can be concluded that firms used related party transactions for earnings management, the effects of related party transactions change over time, and chaebol firms manipulate earnings through related party transactions and ESG scores.

A study on the problems of transport document as a proof of delivery on INCOTERMS 2000 (매도인(賣渡人)이 제공하는 인도증빙서류(引渡證憑書類)의 문제점(問題點)에 관한 연구(硏究) (INCOTERMS 2000을 중심(中心)으로))

  • Oh, Won-Suk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.7-35
    • /
    • 2000
  • The purpose of this paper is to examine the meanings of delivery of each trade term in INCOTERMS 2000, to investigate various kinds of transport document as a proof of delivery, and finally to find their problems. As a result of examination, following problems are considered to happen practically. First, a multimodal transport document referred in FOB term seems to be unappropriate because FOB term can be used in sea or inland waterway transport. Second, Assuming resale in transit in CFR or CIF term, non-negotiable Sea Waybill seems to be inappropriate. Third, As Sea Waybill is not a document of title, it can not be a security when the bank negotiate seller's draft. Fourth, INCOTERMS 2000 deleted the reference to charter party in CFR or CIF term. This deletion may raise any legal problems for the liabilities of carrier when the contradictions happen between the charter party B/L and charter party. Finally, if CFR or CIF means symbolic delivery, other documents besides B/L can not be a symbols of goods.

  • PDF

User Privacy Security Scheme using Double Replication Key in the Cloud Environment (클라우드 환경에서 이중 복제 키를 사용한 사용자 프라이버시 보호 기법)

  • Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.9-14
    • /
    • 2018
  • Recently, as the internet speed is getting faster, in the cloud environment, the service receiving device is changing from a general PC to a compact device such as a mobile phone or a tablet PC. Since handheld devices such as mobile phones or tablet PCs are often used in wireless rather than wired, there are many problems that personal information may be exposed maliciously from a third party. In this paper, we propose a user privacy protection scheme through a duplicate duplicate key generation process which can safely protect user 's privacy from third party among cloud services being served through various wireless media. The proposed scheme is used to synchronize the duplicated key between the server and the intermediary device, and aims at shortening the time of the authentication process protecting the user 's privacy. In this case, the proposed scheme uses Interleave() function and random number to synchronize the server and the intermediary device, so it can safely prevent the malicious attack of the third party.

Unification of Community Policing (지역사회 경찰활동의 통합적 정립)

  • Park, Jae-Poong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.284-293
    • /
    • 2011
  • Today's policing is toward to the Community Policing. Despite its widespread popularity, there exists a lack of common understanding among academics and practitioners alike regarding the scope of the community policing philosophy and of its ability to integrate these complementary ideas within it. These are Problem-oriented policing, broken windows, Compstat, third-party policing, and hot spots. We will present a definition of community policing and demonstrate how these other policing approaches can be incorporated into the overarching community policing philosophy. We will also discuss the potential benefits of taking such a unified approach with the hope of encouraging further integration among policing innovations.

A Study on the Exclusion of the Seller's Liability for Defects in Title (국제물품매매계약에서 매도인의 권리적합의무 면제에 관한 연구)

  • MIN, Joo-Hee
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.69
    • /
    • pp.23-43
    • /
    • 2016
  • This study describes the exclusion of the seller's liability for defects in title under CISG and UCC. Through comparing two provisions, this article provides contracting parties with guidance regarding choosing governing laws and practical advice. CISG and UCC states not only the seller's liability for defects in title but also the exclusion respectively. Under two provisions, contracting parties who wish to avoid this liability may agree that the liability will not apply. Under UCC ${\S}$2-213(2), the seller's warranty can be disclaimed by specific language in the contract or by the circumstances surrounding the transaction. Although there is no express exclusion provision under CISG Article 41 and 42, Article 6 allows contracting parties to agree that they may exclude the application of the seller's liability. Both Article 42 under CISG and ${\S}$2-213(3) under UCC provide where the buyer furnishes specification to the seller. Under UCC ${\S}$2-213(3), it is the buyer's warranty to hold the seller harmless from any claims which arise from the seller complying with specification furnished by the buyer. But, under CISG Article 42, the seller's duty is excluded if the third party right or claim result from the fact that the seller has complied with specifications provided by the buyer. Therefore Article 42 does not charge the buyer with the duty, but rather limits the circumstances under which he could cause claims under Article 42. Interestingly, CISG has provisions which are absent from UCC. First, under Article 41, the seller escapes the liability if the buyer agree to take the goods subject to the third party right or claim. Second, under Article 42(2)(a), the seller is not liable if the buyer knew or could not have been unaware of the third party right or claim at the time of the conclusion of the contract.

  • PDF

A new watermark for copyright protection of digital images (디지철 영상의 저작권 보호를 위한 새로운 서명 문양)

  • 서정일;우석훈;원치선
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1814-1822
    • /
    • 1997
  • In this paper, we present a new digital signature for copyright protection of digital images. The proposed algorithm is designed to be more robust to both the compression (quantization) errors and the illegal signature attack by a third party. More specifically, to maximize the watermaking effect, we embed the watermark by randomly adding or subtracking a fixed number instead of executing the XORs. Also, to improve the reliability of the watermark detection, we extact the watermark only on some image blocks, which are less sensitive to the compression error. Futhermore, the unrecovered compression errors are further detected by the Hypothesis testing. The illegal signalture attack of a third party is also protected by using some probabilistic decisions of the MSE between the orignal image and the signed image. Experimental results show that the peroposed algorithm is more robust to the quantization errors and illegal signature attack by a third party.

  • PDF

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

An Empirical Study on the Impact of Permission Smell in Android Applications

  • Wu, Zhiqiang;Lee, Hakjin;Lee, Scott Uk-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we proposed a sniffer to detect permission smells from developer and third-party libraries' code. Moreover, we conducted an empirical study to investigate unnecessary permissions on large real-world Android apps. Our analysis indicates that permission smell extensively exists in Android apps. According to the results, permission smells exist in most Android apps. In particular, third-party libraries request permission for functionalities that are not used by developers, which cause more smells. Moreover, most developers do not properly disable unnecessary permissions that are declared for third-party libraries. We discussed the impacts of permission smells on user experiences. As a result, the existence of permission smell does not impact the number of downloads. However, apps that have more unnecessary permissions have received lower ratings from users.

Investigation of the Effect of Blockchain-based Cryptocurrencies on Tourism Industry

  • Rashideh, Waleed;Alkhathami, Mohammed;Obidallah, Waeal J.;Alduraywish, Yousef;Alshammari, Abdulaziz;Alsahli, Abdulaziz
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.234-244
    • /
    • 2022
  • Tourism products involve the transfer of money that is flowing to countries with partners or borders, which do not possess any relations surrounding their business environment. Suitable platforms must be generated by the tourism industry, which are beneficial to users when their demands are satisfied based on financial, technology, knowledge, and industry matters. Intermediaries are applied to alleviate different problems that are related to the non-fulfilment of contracts of existing users and service providers who are offering their services and represent a reliable third party. However, it is significant that intermediaries must be reliable when charges are incurred for any possible commission. Cryptocurrencies rely on blockchain technology to provide smoothness in money interchange without the need for reliable third parties. This interchange allows an increasing number of different new forms, which are related to different customer-to-customer transactions. The study attempts to provide an appropriate answer to the main research question, which is: 'Will the widespread adoption of cryptocurrencies bring new types of customer-to-customer markets from a technological, organizational, and environmental perspective?'.