• Title/Summary/Keyword: security for costs

Search Result 379, Processing Time 0.025 seconds

Third Party Funding in International Arbitration and its most current Development in Asia -Issue of Security for Costs and its main Cases

  • Kim, Se-Jin;kim, Dae-Jung
    • Journal of Arbitration Studies
    • /
    • v.29 no.4
    • /
    • pp.77-100
    • /
    • 2019
  • Third-party funding in international and domestic disputes is a fast-growing trend and it is increasingly used by large, solvent companies that simply wish to share risk in their finance. On January 10, 2017, the Civil Law Amendment Bill was passed in Singapore and on June 2017 an "Arbitration and Mediation Legislation (Third Party Funding) Bill" in Hong-Kong had a third-party funding to finance the international arbitration and other dispute resolutions expressly approved. This arbitral tribunal's expanding discretion over critical interim measure of security cost was in issue. In Essar v. Norscot (2016), the arbitrator found that the additional third-party funding costs were recoverable as "other costs of the parties." In here, the decision showed the issue of a tribunal's power over cost measures could spread out to be reviewed and broadened through the legislative process. A recent investor-state arbitration case of ICSID, RSM Production Corporation v. Saint Lucia, covered the express awarding of security for costs where a claimant was funded by a third-party funder. It seems inevitable that the volume of third-party funding industry will grow more as time goes on. The next step would be to formulate guidelines on how to determine criteria against which an application for security for costs is measured.

A Study on the Costs Factors of an being additional Budget by the Security System (보안시스템으로 인해 추가되는 예산 외 비용의 요인에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1481-1488
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network. and most of the network through a Various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information assets from External attacks. But, The use of Security Systems inside the network makes a significant impact on Security and Performance, as well as a result causes Economic Additional Costs. Therefore, In this paper, it will be to analyze by associated a case study and experimental results about the Additional Costs Factors(Variable situations difficult to predict and Information Security Recognition levels, Security Systems, Information Asset Assessment). This is expected to serve as a valuable Information for the Reduction of an Costs in a Network deployment and Design in a future.

Cost Management for Security Applications

  • Arshi Naim;Zubairul Hasan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.63-72
    • /
    • 2024
  • This is an extended paper, focusing on the cost management for the organizations dealing with the crucial issues of security systems. Information Technology (IT) is an important and irreplaceable need of society and all working sector's success depends on IT to a greater extent; therefore maintaining security features is one of the most important aspects of IT. When security in the IT sector is discussed, Patch Management (P.Mgnt) has to be taken under account. P. Mgnt includes many concerns and areas to be described for IT security such as methods and problems in updating patch, methods of reducing security risks with P.Mgnt, methods of achieving economies of scale by controlling the operational costs and taking decisions in investing as and when necessary. This paper presents a general definition of Patch management, its benefits and management of working cost through theoretical models, also the paper gives methods of feeding techniques for microstrip patch antenna MPA, showing the contracting and non contracting methods.

A Device Authentication Mechanism Reducing Performance Cost in Mobile P2P Networks

  • Jeong, Yoon-Su;Kim, Yong-Tae;Shin, Seung-Soo;Lee, Sang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.923-948
    • /
    • 2013
  • The main concern in mobile peer-to-peer (P2P) networks is security because jamming or eavesdropping on a wireless link is much easier than on a wired one and such damage can be incurred without physical access or contact. In particular, authentication has increasingly become a requirement in mobile P2P environments. This paper presents a new mutual authentication mechanism which requires less storage space and maintains a high level of security in mobile P2P networks. The proposed mechanism improves efficiency by avoiding the use of centralized entities and is designed to be agile in terms of both reliability and low-cost implementation. The mechanism suggested in the simulation evaluates the function costs occurring in authentication between the devices under mobile P2P network environment comparing to existing method in terms of basic operation costs, traffic costs, communications costs, storage costs and scalability. The simulation results show that the proposed mechanism provides high authentication with low cryptography processing overhead.

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

A Study on the Importer Security Filing and Additional Carrier Requirements(10+2 rule) in U.S. (미국 관세청의 선적전 추가 보안관련 정보 제출법안(10+2 Rule)에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.395-416
    • /
    • 2008
  • The advance information for oceangoing cargoes destined to th United States enable CBP to evaluate the potential risk of smuggling WMD and to facilitate the prompt release of legitimate cargo following its arrival in the Unites States. On January 1, 2008, CBP promulgate regulations, also known as 10+2 rule, to require the electronic transmission of additional data elements for improved high-risk targeting, including appropriate security elements of entry data for cargo destined to the United States by vessel prior to loading of such cargo on vessels at foreign seaports. The potential impact to an importer's international supply chain will be as follows ; Firstly, importers will take incremental supply chain costs and filing costs. Secondly, anticipate delay in shipment of containerized cargo. Thirdly, importers could be charged fines if they fail to file and file inaccurate or missing data. Companies exporting to the United States should be interested in 10+2 rule, analyze their current processes and procedures to ensure that they are prepared to handle the additional filing requirements of 10+2 rule. And they should focus on how 10+2 impacts their supply chain in terms of costs and sourcing. They will be necessary to revise service legal agreements with their forwarders, customs brokers or carriers in order to meet filing requirements of 10+2 rule.

  • PDF

A Study on a Security Engineering Methodology for Information Security Systems Considering Quality and Cost (품질과 비용을 고려한 프로세스 기반의 보안공학방법론에 관한 연구)

  • Choi, Myeong-Gil
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.2
    • /
    • pp.23-43
    • /
    • 2009
  • For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. To improve the effectiveness of security engineering, this paper suggests a security methodology ISEM, which considers both product assurance and production processes, takes advantages in terms of quality and cost. To verify the effectiveness of ISEM, this paper introduces the concepts of quality loss, and compares the development costs and quality losses between ISEM and CC through the development of VPN system.

  • PDF

Third-Party Funding in International Discussions and Treaty Arbitration (국제투자중재와 제3자 자금제공: 국제적 논의와 중재판정례에서의 쟁점)

  • Eom, Jun-Hyun
    • Journal of Arbitration Studies
    • /
    • v.31 no.4
    • /
    • pp.3-27
    • /
    • 2021
  • Recent Discussions on Third-Party Funding (TPF) in the forums of UNCITRAL, ICSID, and ICC are making different levels of progress towards finalizing the rules. However, they also have similarities in dealing with legal issues related to TPF, such as definitions, disclosure, allocation of costs, and security for costs. International treaty tribunals have dealt with TPF issues, too. When it comes to the standing of funded claimants, the tribunal in Ambiente v. Argentina did not accept the argument that claimants were controlled by the TPF provider. Concerning the scope of the disclosure, the tribunal in Tennant v. Canada ordered the disclosure of the TPF arrangement. As for the allocation of costs, the tribunal in Kardassopoulos v. Georgia noted that there is no reason why a TPF agreement should be treated differently than an insurance contract. Regarding the security for costs, the tribunal in South American Silver v. Bolivia considered the mere existence of a third-party funder as not an exclusive factor to determine costs in the earlier stage of the proceedings. Lastly, relating to TPF as a ground for annulment, the tribunal in Teinver v. Argentina declined the respondent's argument that the TPF agreement was the vehicle of fraud.

Multi-functionality of honey bees for eco-friendly food production (환경친화적 식량생산을 위한 꿀벌의 다원적 가치)

  • Jung, Chuleui
    • Food Science and Industry
    • /
    • v.55 no.2
    • /
    • pp.166-175
    • /
    • 2022
  • Current food system has developed with the agricultural innovation to feed the increasing population of the world, but with high costs such as environmental contamination and inequality with low sustainability. Human has developed long history of mutualistic interaction with honey bee. This manuscript describes the multi-functionality of honey bee for food production. Firstly honey bee produces honey, bee pollen, royal jelly and propolis which are rich in functionality. Second honey bee serves as the main pollinator for crop production which is worth for 28% of total crop production values in Korea. Lastly honey bee can be an alternative meat produciton system with lower energy, carbon costs but higher nutritional security. This manuscript described those parts and discussed the multi-functionality of honey bees for eco-friendly food security pursuing lowered environmental cost and carbon-zero strategies in the climate change era.

A Study on The Effective Classification of Signal Facilities using LCC Analysis (LCC 분석을 이용한 효과적인 신호 설비 분류에 관한 연구)

  • Kim, Doo-Suk;Kim, Young-Hoon;An, Chan-Gi;Jang, Seong-Yong
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2711-2717
    • /
    • 2011
  • This paper presents the classification scheme of the signal facilities on the railroad considering the construction costs and maintenance costs in a low population area. The construction costs of the new signal facility system can be compare with the costs of the present signal facilities as the classification scheme. The signal facilities on the railroad were classified as the railroad security regulations and then the scheme is considered through the LCC analysis. In order to test this research, the costs of signal facilities obtained from ones on TAEBACK railroad line. The costs categorized the construction costs, the labor cost and the maintenance costs can be effectively applied to the LCC analysis. The scheme is very useful to make a decision whether the new signal facilities on railroad in low population area is build or not in terms of the costs.

  • PDF