• Title/Summary/Keyword: Transaction management

Search Result 871, Processing Time 0.026 seconds

A Study on Risk Management of Bill of Lading in International Trade Transaction (국제무역거래에서 선하증권의 위험관리에 관한연구)

  • Han, Nak-Hyun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.37
    • /
    • pp.187-216
    • /
    • 2008
  • Risk regarding the possibility of loss can be especially problematic. If a loss is certain to occur, it may be planned for in advance and treated as a definite, known expense. It is when there is uncertainty about the occurrence of a loss that risk becomes an important problem. The word risk is often used in connection with insurance. No one generally accepted definition of risk exists, however. Of the many definitions, two distinctive ones are commonly used. One defines risk as the variation in possible outcomes of an event based on chance. That is, the greater the number of different outcomes that may occur, the greater the risk. Another way of expressing this concept is to state: The greater the variation around an average expected loss, the greater the risk. The second definition of risk is the uncertainty concerning a possible loss. The definition of risk as a useful one because it focuses attention on the degree of risk in given situations. The degree of risk is a measure of the accuracy with which the outcome of an event based on chance can be predicted. For now, it will serve our purpose to note the more accurate the prediction of the outcome of an event based on chance, the lower the degree of risk. After sources of risks are identified and measured, a decision can be made as to how the risk should be handled. A pure risk that is not identified does not disappear, the business merely loses the opportunity to consciously decide on the best technique for dealing with that risk. The process used to systematically manage risk exposures is known as risk management. Some persons use the term risk management only in connection with businesses, and often the term refers only to the management of pure risks. In this sense, the traditional risk management goal has been to minimize the cost of pure risk to the company. But as firms broaden the ways that they view and manage many different types of risk, the need for new terminology has become apparent. The terms integrated risk management and enterprise risk management reflect the intent to manage all forms of risk, regardless of type. International trade transaction is called between countries has features of globalism, cultural gap, long distance and long terms for the transaction. It is riskier than domestic transaction has its specific risks, such as foreign exchange risk and political risk, and requires various active risk management skills. Risks in relation to the international trade transaction are the contract risk, transit risk and payment risk, etc. The risk management in relation to the international trade transaction is to identify and measure these risks. The purpose of this study is to analyse the practical problems and its solution plan by analyzing various cases related to the risk management of bill of lading in the international trade transaction.

  • PDF

Revenue Sharing Transaction Model of a Supply Chain with Two Competing Suppliers (복수의 공급업체가 경쟁하는 공급사슬의 수입공유 거래모형)

  • Park, Hae-Churl
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.1
    • /
    • pp.45-59
    • /
    • 2012
  • We analyze a transaction mechanism so-called the revenue sharing transaction model and its dynamics in a supply chain with two competing suppliers and a monopolistic retailer when the demand pattern is uncertain and the back-order is allowed in case. We assume that the products by the suppliers are substitutable each other with a certain degree even though their retail prices are different. It is proved that a supplier and the retailer in the supply chain have some room for enjoying the possibility of their increased profits comparing with the present ones by adopting the suggested revenue sharing scheme. Furthermore, such a transaction model is beneficial even to the customers by offering a lower retail price than before. On the contrary, we observe that another supplier which sticks to an existing transaction scheme is supposed to suffer some decrease in its profit as a result.

A Study about Electronic Commerce System of Real Estate for Activation of Real Estate Transaction (부동산 거래 활성화를 위한 전자거래 시스템에 관한 연구)

  • Kim Young-Sun
    • Management & Information Systems Review
    • /
    • v.18
    • /
    • pp.21-40
    • /
    • 2006
  • The activation of an Real Estate transaction that be necessary correspond the user need of Internet suitably for be able to become safe and quick transaction of Real Estate transaction. We have been changed into a buyer center in the market of the while of a shalesman center that The taste of an immovable property buyer is various today. The area range of an Real Estate brokerage that take charge of real estate brokerage business have been reduced gradually that take the influence on Implementation of an Real Estate information system. The age of change of the environment which is bring the change of the mode of an real estate transaction that are leading the change of an Real estate circulation market. The paper is design for implementation of real estate transaction system that lead the period of new Internet and the purpose to accomplish the activation of an immovable property information system that offer an real estate service information

  • PDF

Probabilistic Graphical Model for Transaction Data Analysis (트랜잭션 데이터 분석을 위한 확률 그래프 모형)

  • Ahn, Gil Seung;Hur, Sun
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.4
    • /
    • pp.249-255
    • /
    • 2016
  • Recently, transaction data is accumulated everywhere very rapidly. Association analysis methods are usually applied to analyze transaction data, but the methods have several problems. For example, these methods can only consider one-way relations among items and cannot reflect domain knowledge into analysis process. In order to overcome defect of association analysis methods, we suggest a transaction data analysis method based on probabilistic graphical model (PGM) in this study. The method we suggest has several advantages as compared with association analysis methods. For example, this method has a high flexibility, and can give a solution to various probability problems regarding the transaction data with relationships among items.

An Efficient Altruistic Looking Protocol for the Mobile Transaction Management System (이동 데이터베이스 시스템을 위한 효율적인 이타적 잠금기법)

  • 권혁신;김세윤;김응모
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • We propose an advanced transaction scheduling protocol to improve the concurrency and to guarantee the mobility for the mobile database management systems. Mobility, portability, and wireless link In mobile computing environment can cause certain drawbacks, and thus it is more difficult to solve the concurrency control problems. However, a locking scheme should be used to guarantee the data consistency and to prevent the data conflicts. It is well known that data consistency is guaranteed by standard transaction scheduling schemes like two-phase locking (2PL). It has two of operation, lock and unlock. But 2PL does not give solution for mobile system. Altruistic Locking (AL) and classifying transactions, we adapt, can give solution for the previous problems. AL, as an advanced protocol, has attempted to reduce delay effects associated with lock release moment by the use of donation. In this paper, we extend those approaches and classify the transactions to reduce delay effects of short-lived transaction caused by long-lived transaction. In addition, we show efficient solution for the case of disconnection occurrence. Our protocol, namely, Mobile Altruistic Locking (MAL) is shown to be efficiently used in order to reduce delay effects and to guarantee database consistency in a state of the slippery connection in mobile database systems.

  • PDF

Flash-Aware Transaction Management Scheme for flash Memory Database (플래시 메모리 데이터베이스를 위한 플래시인지 트랜잭션 관리 기법)

  • Byun Si Woo
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.65-72
    • /
    • 2005
  • Flash memories are one of best media to support portable computers in mobile computing environment. The features of non-volatility, low power consumption. and fast access time for read operations are sufficient grounds to support flash memory as major database storage components of portable computers. However. we need to Improve traditional transaction management scheme due to the relatively slow characteristics of flash operation as compared to RAM memory. In order to achieve this goal. we devise a new scheme called flash-aware transaction management (FATM). FATM improves transaction performance by exploiting SRAM and W-Cache, We also propose a simulation model to show the performance of FATM. Based on the results of the performance evaluation, we conclude that FATM scheme outperforms the traditional scheme.

  • PDF

A Locking-based Transaction Management Scheme of Database Systems for Supporting Web-based Classes (웹기반 수업을 지원하는 데이터베이스 시스템의 로킹 기반 트랜잭션 관리기법)

  • Park, Chan-Jung;Kim, Han-Il
    • The Journal of Korean Association of Computer Education
    • /
    • v.4 no.2
    • /
    • pp.51-61
    • /
    • 2001
  • With the advance of computer and communication technologies, a lot of virtual schools provide web-based classes that provide learning environments out of temporal and spatial constraints and many research works on the web-based classes have been proposed. Various techniques are required to build the virtual schools efficiently. One of them is the scheme for transaction management. However, existing transaction management schemes have inappropriate features for supporting web-based classes. In this paper, we propose a new locking-based transaction processing protocol that satisfies the requirements after presenting the requirements for transaction management to support web-based classes. In the protocol, a new method, called mark, is adopted to satisfy the requirements. The proposed protocol also eliminates unnecessary delays or abortions and thus, the proposed protocol can improve the performance of database systems.

  • PDF

Business Transaction Preparation Plan for Business Reference Model Management (BRM 운영을 위한 단위과제 정비방안)

  • Kim, Hwa-Kyoung;Kim, Eun-Ju
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.14 no.4
    • /
    • pp.199-219
    • /
    • 2014
  • BRM (Business Reference Model, hereinafter referred to as BRM) has been introduced with the objective to improve task-related information sharing among organizations, task processing speed, efficiency of organization management, and administrative services. Furthermore, a Records Management Reference Table, which is a business-based records management system, has been put in to operation. However, it is necessary to reidentify if the BRM is put into use according to its initial objectives and purposes after 10 years of its introduction based on the pending problems and matters of improvement. Therefore, in this study, the necessity for business transaction management has been reviewed based on the problems present in the "business transaction" operation, which is the lowest unit of BRM, and it proposes a business transaction identification plan through a business analysis. As a result, three major points to improve BRM management have been suggested.

A Study on the Advanced Association Rules Algorithm of n-Items (개선된 n-항목 연관 규칙 알고리즘 연구)

  • 황현숙;어윤양
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.4
    • /
    • pp.29-39
    • /
    • 2002
  • The transaction tables of the existing association algorithms have two column attributes : It is composed of transaction identifier (Transaction_id) and an item identifier (item). In this kind of structure, as the volume of data becomes larger, the performance for the SQL query statements came applicable decreases. Therefore, we propose advanced association rules algorithm of n-items which can transact multiple items (Transaction_id, Item 1, Item 2…, Item n). In this structure, performance hours can be contracted more than the single item structures, because count can be computed by query of the input transaction tables. Our experimental results indicate that performance of the n items structure is up to 2 times better than the single item. As a result of this paper, the proposed algorithm can be applied to internet shopping, searching engine and etc.

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.