• Title/Summary/Keyword: Transaction risk

Search Result 199, Processing Time 0.027 seconds

A Comparative Study on bank's responsibilities in the Electronic Payment System -comparison between Korea and U.S.A- (국제 전자결제시스템에서 금융기관의 책임 및 정책적 시사점 -한국과 미국의 전자금융제도 비교-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.12 no.1
    • /
    • pp.35-54
    • /
    • 2010
  • This article explored the bank's responsibilities in electronic payment system between Korea and U.S.A. In order to complete my research object, I used Article 4A of the U.C.C. and EFTA of 1978 and by Electronic Financial Transaction Act of Korea as a analytic instruments. I also adapted America's various regulations to regulate concerned parties(banks). The system of this article is going to display as fellows; First, I presented recent trend and legal stabilities of electronic payment in this article. Second, I focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. I also did analyze the solution procession of error occurring in course of send of payment order. Third, In any action which involves a customers's liability for an unauthorized electronic fund transfer, the burden of proof is upon the financial institution to show that the electronic fund transfer was authorized. Forth, Customers have to report the error and unauthorized electronic fund transfer after awaring of it. Then bank will be liable for such a unauthorized electronic fund transfer. But If customer's failure to report, the bank has exemptions. Lastly, In order to prevent or detect the unauthorized electronic fund transfer, bank will agree with custom to establish a commercially reasonable security procedure, while bank has duties to notify in order to decrease the loss resulted from unauthorized payment order in korea law.

  • PDF

A Study on the Some Problems in Relation to the Issuance of Letters of Credit (신용장의 개설 관련 제 문제에 관한 연구)

  • Lee, Bang-Sik;Park, Suk-Jae
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.46
    • /
    • pp.159-177
    • /
    • 2010
  • This work intends to study some problems in relation to the issuance of letters of credit. Those problems are the delay of issuing letters of credit, the reissuing letters of credit, and the issuing letters of credit in the third party's name. Sellers and buyers must keep in mind that the supply of letter of credit by buyer is the condition precedent for a seller's shipment obligation. A seller has no obligation to ship the goods until he receives the letter of credit by buyer's bank, issuing bank. An issuing bank can have the risk that an original letter of credit and a reissued letter of credit can be used double in the exporting country. The most safe method for issuing bank is to cancel the original letter of credit and to reissue a new letter of credit. When an issuing bank issues a letter of credit in the third party's name, the bank should investigate the background of the transaction and give the buyer a proper line of credit.

  • PDF

A Study on Methodology for Considering Risk in Power Transactions in Futures Market (선물 시공에서의 전력거래 위험 고려 방법론 연구)

  • Park, Jong-Bae;Joung, Man-Ho;Kim, Bal-Ho;Kim, Jin-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.400-402
    • /
    • 2000
  • This paper presents a game theoretic approach for power transactions analysis in a competitive market. The considered competitive power market is regarded as PooICo model, and the participating players are restricted by only two generating entities for simplicity in this paper. The analysis is performed on the basis of marginal cost based relations of bidding price and bidding generations. That is, we assume that the bidding price of each player is determined by the marginal cost when the bidding generation is pre-determined. This paper models the power transaction as a two player game and analyzes by applying the Nash eauilibrium idea. The generalized game model for power transactions covering constant-sum(especially zero-sum), and nonconstant-sum game is developed in this paper. Also, the analysis for each game model are performed in the case studies. Here, we have defined the payoff of each player as the weighted sum of both player's profits.

  • PDF

A Comparative Study on the Electronic Payment System between United States and Korea (한국과 미국의 전자결제제도 비교연구 -고객보호관련 주요쟁점을 중심으로-)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.27-43
    • /
    • 2009
  • This article explored the customers protection regulations in electronic payment system by Article 4A of the UCC and EFTA of 1978 and by Electronic Financial Transaction Act of Korea. Both Korea and America have various regulations to protect concerned parties(customers). For examples, the errors of payment order, money-back guarantee, and unauthorized payment order etc. First, this Article focuses on the allocation of risk of loss caused by ambiguous term in payment orders that do not express the subjective intention of the senders. Second, most rights and obligations created by Article 4A of America can be varied with the agreement of affected parties. But there are some exceptions. The exceptions include the money-back guarantee. So Receiving bank have to pay to originator the ordered money included interest. However, Korea also has money-back guarantee but bank do not pay interest to sender. Lastly, Electronic Funds Transfer Act of 1978 and Regulation E has US$ 50 regulation in order to protect customers on the unauthorized payment order. Article 4A imposes duty to detect unauthorized payment orders to originator in relation to the establishment of commercially reasonable security procedure, while Korean law imposes the duty to notify the bank in order to decrease the loss resulted from unauthorized payment order.

  • PDF

A Study on the License Agreement of digital information - focusing on the UCITA - (디지털정보의 사용허락계약)

  • Han, Byoung-Wan;Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.11 no.1
    • /
    • pp.45-66
    • /
    • 2009
  • Licensing of information is the standard of the computer information business today. The huge bulk of vendors license their computer information products. The Uniform Computer Information Transactions Act(UCITA), therefore, does not originate licensing contracts. UCITA was developed to provide basic, recognizable default rules for the existing licensing activity that goes on and expands as commerce in computer information expands. UCITA's rules govern licensing of contracts for computer information from formation through performance, including remedies if there is a breach of contract. Included in UCITA are rules for warranties, both implied and express, and rules pertaining to risk of loss in a computer information transaction. Most of the rules in UCITA are the traditional and familiar rules of contract from the law of sales and from the common law, but adapted to the special nature of computer information licensing contracts. Freedom of contract is a dominating underlying policy for UCITA, exactly as that principle is the foundation for the law of commercial transactions, generally, and exactly as that law has served all commercial transactions in the United States and has contributed to the economic growth and health of the United States.

  • PDF

An Adaptive Agent Approach to Micropayment System

  • Chaiyarangkitrat, Surachai;Permpoontanalarp,Yongyuth
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1331-1334
    • /
    • 2002
  • Micropayment is an electronic payment system for small value transaction. It needs to use a little amount of resources, such as communication and computation due to its small value. In other words, the processing cost for the micropayment must be less than the value of the payment. Several kinds of transactions are suitable for micropayment, eg. the purchasing of train tickets or digital newspapers. Since micropayment systems are designed for small-amount payment the key factor for any micropayment system design is believed to be the minimization of resource consumption without compromising the standard security. In this paper, we propose an adaptive agent approach to credit-based micropayment system, which employs the concept of dynamic balancing between the resource consumption and the risk in the system. As a result of the dynamic balancing, our system not only solves the problem of global overspending but also uses fewer amount of resources than existing approaches. Our approach limits the amount of money spent by untrusted customers to all merchants. Thus, our approach provides a boundary of the global overspending. In addition, for trusted customers, our approach requires less scale of communication for verifying authorizations than all existing approaches.

  • PDF

Shrinkage Model Selection for Portfolio Optimization on Vietnam Stock Market

  • NGUYEN, Nhat;NGUYEN, Trung;TRAN, Tuan;MAI, An
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.9
    • /
    • pp.135-145
    • /
    • 2020
  • This paper provides the practical application of a linear shrinkage framework on Vietnam stock market. The cumulative data points observed in this analysis are 468 weeks from January 2011 to December 2019. All the companies listed on Ho Chi Minh City Stock Exchange (HOSE), except the companies under two years period from Initial Public Offering (IPO), are considered. The cumulative number of stocks picked is therefore 350 companies. The VNINDEX, which is the Vietnam Stock Index, is used as a reference index for shrinking to a single-index model. The empirical results show that the shrinkage of covariance matrix for portfolio optimization gives the promising results for the investors on Vietnam stock market. The shrinkage method helps the investors to produce the optimal portfolio in the sense of having higher profit with lower levels of risk compared to the portfolio of the traditional SCM method. Moreover, the portfolio turnover of shrinkage method is always kept at low magnitudes, and this makes the shrinkage portfolios save much transaction costs and reduce the liquidity risks in the trading process. In addition, the ability of shrinkage method in making profit is once again confirmed by the Alpha coefficient that achieves a high positive value.

User Authentication Using Biometrics and OTP in Mobile Device (중소기업형 바이오정보와 OTP를 이용한 사용자 인증)

  • Lee, Sang Ho
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.27-31
    • /
    • 2014
  • According to increasing of payment and settlements like smart banking, internet shopping and contactless transaction in smart device, the security issues are on the rise, such as the vulnerability of the mobile OS and certificates abuse problem, we need a secure user authentication. We apply the OTP using biometrics and PKI as user authentication way for dealing with this situation. Biometrics is less risk of loss and steal than other authentication that, in addition, the security can be enhanced more when using the biometric with OTP. In this paper, we propose a user authentication using biometrics and OTP in the mobile device.

  • PDF

An Investigation on the Efficiency of Research Collaborations: Data Envelopment Analysis and Stochastic Frontier Analysis on Bio-technology R&D Projects

  • Og, Joo-Young;Hwang, Jung-Tae
    • Asia-Pacific Journal of Business
    • /
    • v.10 no.2
    • /
    • pp.1-12
    • /
    • 2019
  • Collaborative research and development (R&D) has been encouraged based on the belief that knowledge spill-over is mutually beneficial for partners. Although the benefits are supported by science and technology policy research, the risk of R&D collaboration has not been extensively discussed. Two independent studies suggest that there are risks associated with the overuse of collaborative research frameworks. Two sets of R&D collaboration data were analyzed: between the national bio-technology research program and 1) Data Envelop Analysis (DEA), and 2) between Stochastic Frontier Analysis (SFA). In the case of SFA, output measures were integrated into a single output, with weights extracted from research programme managers' responses to the questionnaire. While the DEA result demonstrated the inefficiency of collaborative research, SFA did not. Unlike previous research highlighting risks associated with disclosing proprietary R&D and potential conflict of interest, our study indicates that the transaction's social cost affects collaborative research efficiency. Therefore, governments promoting R&D collaborations should be carefully managed, and policy makers must reconsider the strict conditions governing compulsory collaborative R&D programs.

Anomaly Detection Scheme Using Data Mining Methods (데이터마이닝 기법을 이용한 비정상행위 탐지 방법 연구)

  • 박광진;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.99-106
    • /
    • 2003
  • Intrusions pose a serious security risk in a network environment. For detecting the intrusion effectively, many researches have developed data mining framework for constructing intrusion detection modules. Traditional anomaly detection techniques focus on detecting anomalies in new data after training on normal data. To detect anomalous behavior, Precise normal Pattern is necessary. This training data is typically expensive to produce. For this, the understanding of the characteristics of data on network is inevitable. In this paper, we propose to use clustering and association rules as the basis for guiding anomaly detection. For applying entropy to filter noisy data, we present a technique for detecting anomalies without training on normal data. We present dynamic transaction for generating more effectively detection patterns.