• Title/Summary/Keyword: corruption

Search Result 315, Processing Time 0.026 seconds

A Modern Analysis of 'Guanxi' of Foreign Investment in China

  • LEE, Seoung-Taek;PARK, Woo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.68
    • /
    • pp.197-218
    • /
    • 2015
  • China is a land of guanxi, everything is connected with guanxi. China has a business culture based on guanxi connections underpinned by strong Confucian ethics. However, there are some reasons why it is difficult for western companies to run businesses in China. Firstly, foreign firms lack the understanding and experiences necessary for doing business in China. They don't know the absence of alternatives is one of reasons that guanxi is so powerful in Chinese society. Secondly, there are many misconceptions about guanxi. It is easier for many foreign scholars or businessmen to equate guanxi with corruption due to the ambiguity of guanxi. Thus, if a foreign enterprise possesses guanxi, it can be a source of competitive advantage for doing business due to lack of law systems for anti-corruption activities in China. Furthermore, it is gaining increasing importance not only in Business to Government(B2G) but also in Business to Consumers(B2C) relationships. Therefore,managers should pay great attention to the proper use of guanxi instead of being involved in corrupt behaviours because now the governments hold a strong attitude against corruption. In particular, establishment of working guanxi through red envelops(basically giving money) or illegal gifts can cause a great problem for both parties, which were naturally accepted among most government officials and businessmen until recently.

  • PDF

Identification and analysis of low molecular organic compounds during complete feed spoilage from natural corrupt feeds (배합사료의 자연부패과정 중 발생하는 저분자 유기화합물의 동정 및 분석)

  • Yu, Ji Min;Kim, Yong Tak;Yi, Kwon Jung;Kim, Dong-Woon;Kim, Soo-Ki;Moon, Hyung In
    • Korean Journal of Veterinary Service
    • /
    • v.40 no.4
    • /
    • pp.259-264
    • /
    • 2017
  • In this study, the changes of low molecular weight compounds during natural decay process for 4 weeks were analyzed. Natural corruptions were observed in the slate warehouse with summer humidity and temperature throughout the rainy season by using commercially available compound feeds. Koiganal was detected from 14 days of natural decay and corruption with chicken, pig, and Korean cattle feed. Ethyl palmitate, Ethyl pentadecanoate and, Methyl elaidatel were detected from chicken, pig, and Korean cattle feed. So, Koiganal can be useful for monitoring the degree of pollution of corruption of livestock feeds in advance.

An Enhanced Remote Data Checking Scheme for Dynamic Updates

  • Dong, Lin;Park, Jinwoo;Hur, Junbeom;Park, Ho-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1744-1765
    • /
    • 2014
  • A client stores data in the cloud and uses remote data checking (RDC) schemes to check the integrity of the data. The client can detect the corruption of the data using RDC schemes. Recently, robust RDC schemes have integrated forward error-correcting codes (FECs) to ensure the integrity of data while enabling dynamic update operations. Thus, minor data corruption can be recovered by FECs, whereas major data corruption can be detected by spot-checking techniques. However, this requires high communication overhead for dynamic update, because a small update may require the client to download an entire file. The Variable Length Constraint Group (VLCG) scheme overcomes this disadvantage by downloading the RS-encoded parity data for update instead of the entire file. Despite this, it needs to download all the parity data for any minor update. In this paper, we propose an improved RDC scheme in which the communication overhead can be reduced by downloading only a part of the parity data for update while simultaneously ensuring the integrity of the data. Efficiency and security analysis show that the proposed scheme enhances efficiency without any security degradation.

Enhancing TCP Performance over Wireless Network with Variable Segment Size

  • Park, Keuntae;Park, Sangho;Park, Daeyeon
    • Journal of Communications and Networks
    • /
    • v.4 no.2
    • /
    • pp.108-117
    • /
    • 2002
  • TCP, which was developed on the basis of wired links, supposes that packet losses are caused by network congestion. In a wireless network, however, packet losses due to data corruption occur frequently. Since TCP does not distinguish loss types, it applies its congestion control mechanism to non-congestion losses as well as congestion losses. As a result, the throughput of TCP is degraded. To solve this problem of TCP over wireless links, previous researches, such as split-connection and end-to-end schemes, tried to distinguish the loss types and applied the congestion control to only congestion losses; yet they do nothing for non-congestion losses. We propose a novel transport protocol for wireless networks. The protocol called VS-TCP (Variable Segment size Transmission Control Protocol) has a reaction mechanism for a non-congestion loss. VS-TCP varies a segment size according to a non-congestion loss rate, and therefore enhances the performance. If packet losses due to data corruption occur frequently, VS-TCP decreases a segment size in order to reduce both the retransmission overhead and packet corruption probability. If packets are rarely lost, it increases the size so as to lower the header overhead. Via simulations, we compared VS-TCP and other schemes. Our results show that the segment-size variation mechanism of VS-TCP achieves a substantial performance enhancement.

The Impact of Financial Integration on Economic Growth in Southeast Asia

  • Bong, Angkeara;Premaratne, Gamini
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.1
    • /
    • pp.107-119
    • /
    • 2019
  • This paper examines the impact of financial integration on economic growth in Southeast Asia over the period 1993-2013. This paper further investigates whether the relationship depends on the level of financial and economic development, government corruption, and macroeconomic policy. These questions raise important issues both from a theoretical and a policy perspective. We employ the generalized methods of moment (GMM) in the dynamic panel estimation framework to analyse several factors, including initial income, initial schooling, financial development, inflation, trade openness, corruption, and financial crisis. The study further analyzes the data using the EGLS model to examine the consistency of the GMM model. We found that financial integration has a significant positive effect on economic growth in Southeast Asia. Our findings suggest that increasing financial integration could improve the productive capacity of the economy, including more investments and efficient allocation of capital, and thus enhancing economic growth in this region. More specifically, the results suggest that the government should work towards eliminating corruption and stabilizing macroeconomics in order to enhance financial integration and economic growth. This paper sheds new insights on a better evaluation of the past and present theorizing on the subject of financial integration and economic growth; especially, in Southeast Asia.

Model adaptation employing DNN-based estimation of noise corruption function for noise-robust speech recognition (잡음 환경 음성 인식을 위한 심층 신경망 기반의 잡음 오염 함수 예측을 통한 음향 모델 적응 기법)

  • Yoon, Ki-mu;Kim, Wooil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.1
    • /
    • pp.47-50
    • /
    • 2019
  • This paper proposes an acoustic model adaptation method for effective speech recognition in noisy environments. In the proposed algorithm, the noise corruption function is estimated employing DNN (Deep Neural Network), and the function is applied to the model parameter estimation. The experimental results using the Aurora 2.0 framework and database demonstrate that the proposed model adaptation method shows more effective in known and unknown noisy environments compared to the conventional methods. In particular, the experiments of the unknown environments show 15.87 % of relative improvement in the average of WER (Word Error Rate).

Enhancement of SCTP Throughput using Chunk Checksum

  • Lin Cui;Koh Seok J.;Hong Yong-Geun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.1147-1150
    • /
    • 2006
  • Stream Control Transmission Protocol (SCTP) uses the 32-bit checksum in the common header, by which a corrupted SCTP packet will be regarded as a lost packet and then discarded. This may result in degradation of SCTP's throughput performance over wireless networks. This paper proposes a new chunk checksum scheme for SCTP, in which each data chunk contains its own checksum field and SACK chunk carry corresponding Transmission Sequence Number (TSN) with timestamp for every corruption event. The proposed chunk checksum scheme is introduced with the following three purposes: 1) to distinguish the chunk corruptions from the chunk losses; 2) to avoid the unnecessary halving of the congestion window (cwnd) in the case of chunk corruption; 3) to avoid the unwanted timeouts which can be induced in conventional SCTP in the case that the retransmitted data chunks are corrupted again in wireless networks. Simulation results show that the proposed chunk checksum scheme could improve the SCTP throughput in the wireless environments with a high bit error rate.

  • PDF

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.1
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

The State-Owned Enterprises Reform in Vietnam

  • Lam, Tran Dinh
    • SUVANNABHUMI
    • /
    • v.6 no.2
    • /
    • pp.37-63
    • /
    • 2014
  • The economic renovation in Vietnam has shown promising achievements. The process of reforming and equitizing state-owned enterprises, and reducing subsidies from the government have made significant progress since 1986. However, this policy has not received the adequate valuation from leaders. Big companies have not been equitized, and are still managed and subsidized by the government, resulted in budget losses. Corporations have been dominated by political interests. This has led to arguments for better and more feasible measures which could save national budget. Corruption in Vietnam mostly originates from state-owned enterprises, for the monopoly was given by government to those enterprises as foreign partners continue to compete under market-oriented mechanism and transparent supervision. Therefore, renovation of the business mechanism, as well as speeding up equitization and minimizing people's properties, have become crucial in the regional integration trend. This is entirely a vital factor in the renovation process. This study explores plans, as well as the merits of the renovation process in Vietnam, ultimately envisioning to overcome current consequences and motivate Vietnam's economy.

  • PDF