• Title/Summary/Keyword: task-based

Search Result 4,693, Processing Time 0.039 seconds

A Morphological Study of Bamboos by Vascular Bundle Sheath (대나무류(類)의 유관속초(維管束鞘)에 의(依)한 형태학적(形態學的) 연구(硏究))

  • Kim, Jai Saing
    • Journal of Korean Society of Forest Science
    • /
    • v.25 no.1
    • /
    • pp.13-47
    • /
    • 1975
  • Among the many species of bamboo, it is well known that the dwarf-type is widely distributed in the tropical regions, and the slender type in temperated zone. In the temperated zone the trees have extensively differentiated into one hundred species in 50 genera. In many oriental countries, the bamboo wood is being used as a material for construction and for the manufacture of technical instruments. The bamboo shoot is also regarded as a good and delicious edible resource. Moreover, recent medical investigation verifies that the sap of certain species of the bamboo is an antibiotic effect against cancer. Fortunately, it is very easy to propagate the bamboo trees by using cutting from southeastern Asian countries. This important resource can further be used as a significant source of pulp, which is becoming increasingly important. The classification system of this significant resource has not been completely established to date, even though its importance has been emphasized. Initiated by Canlevon Linne in the 18th century, a classification method concerning the morphological characteristics of flowers was the first step in developing a classification. But it was not an easy task to accomplish, because this type of classification system is based on the sexual organs in bamboo trees. Because the bamboo has a long life cycle of 60-120 years and classification according to this method was very difficult as the materials for the classification are not abundant and some species have changed, even though many references related to the morphological classification of bamboo trees are available nowadays. So, the certification of bamboo trees according to the morphological classification system is not reasonable for us. Consequently, the classification system of bamboo trees on the basis of endomorphological characteristics was initiated by Chinese-born Liese. And classification method based on the morphological characteristics of the vascular bundle was developed by Grosser. These classification methods are fundamentally related to Holltum's classification method, which stressed the morphology of the ovary. The author investigated to re-establish a new classification method based on the vascular sheath. Twenty-six species in 11 genera which originated from Formosa where used in the study. The results obtained from the investigation were somewhat coordinated with those of Crosser. Many difficulties were found in distinguishing the species of Bambusa and Dendrocalamus. These two species were critically differentiated under the new classification system, which is based on the existence of a separated vascular bundle sheath in the bamboo. According to these results, it is recommended that Babusa divided into two groups by placing it into either subspecies or the lower categories. This recommendation is supported by the observation that the evolutional pattern of the bamboo thunk which is from outward to inward. It is also supported by the viewpoint that the fundamental hypothesis in evolution is from simple to complex. There remained many problems to be solved through more critical examination by comparing the results to those of the classification based on the sexual organs method. The author observed the figure of the cross-sectional area of vascular trunk of bamboo tree and compared the results with those of Grosser and Liese, i.e. A, $B_1$, $B_2$, C, and D groups in classification. Group A and $B_2$ were in accordance with the results of those scholars, while group D showed many differences, Grosser and Liese divided bamboo into "g" type and "h" type according to the vascular bundle type; and they included Dendrocalamus and Bambusa in Group D without considering the type of vascular bundle sheath. However, the results obtained by the author showed that Dendrocalamus and Bambusa are differentiated from each other. By considering another group, "i" identified according to the existence of separated vascular bundle sheath. Bambusa showed to have a separated vascular bundle sheath while Dendrocalamus does not have a separated vascular bundle sheath. Moreover, Bambusa showed peculiar characteristics in the figure of vascular development, i.e., one with an inward vascular bundle sheath and the other with a bivascular bundle sheath (inward and outward). In conclusion, the bamboo species used in this experiment were classified in group D, without any separated vascular bundle sheath, and in group E, with a vascular bundle sheath. Group E was divided into two groups, i.e., and group $E_1$, with bivascular sheath, and group $E_2$, with only an inward vascular sheath. Therefore, the Bambusa in group D as described by Grosser and Liese was included in group E. Dendrocalamus seemed to be the middle group between group $E_l$ and group $E_2$ under this classification system which is summarized as follows: Phyllostachys-type: Group A - Phyllostachys, Chymonobambus, Arundinaria, Pseudosasa, Pleioblastus, Yashania Pome-type: Group $B_2$ - Schizostachyum, Melocanna Hemp-type: Group D - Dendrocalamu Bambu-type: Group $E_1$ - Bambusa ghi.

  • PDF

Natural Language Processing Model for Data Visualization Interaction in Chatbot Environment (챗봇 환경에서 데이터 시각화 인터랙션을 위한 자연어처리 모델)

  • Oh, Sang Heon;Hur, Su Jin;Kim, Sung-Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.11
    • /
    • pp.281-290
    • /
    • 2020
  • With the spread of smartphones, services that want to use personalized data are increasing. In particular, healthcare-related services deal with a variety of data, and data visualization techniques are used to effectively show this. As data visualization techniques are used, interactions in visualization are also naturally emphasized. In the PC environment, since the interaction for data visualization is performed with a mouse, various filtering for data is provided. On the other hand, in the case of interaction in a mobile environment, the screen size is small and it is difficult to recognize whether or not the interaction is possible, so that only limited visualization provided by the app can be provided through a button touch method. In order to overcome the limitation of interaction in such a mobile environment, we intend to enable data visualization interactions through conversations with chatbots so that users can check individual data through various visualizations. To do this, it is necessary to convert the user's query into a query and retrieve the result data through the converted query in the database that is storing data periodically. There are many studies currently being done to convert natural language into queries, but research on converting user queries into queries based on visualization has not been done yet. Therefore, in this paper, we will focus on query generation in a situation where a data visualization technique has been determined in advance. Supported interactions are filtering on task x-axis values and comparison between two groups. The test scenario utilized data on the number of steps, and filtering for the x-axis period was shown as a bar graph, and a comparison between the two groups was shown as a line graph. In order to develop a natural language processing model that can receive requested information through visualization, about 15,800 training data were collected through a survey of 1,000 people. As a result of algorithm development and performance evaluation, about 89% accuracy in classification model and 99% accuracy in query generation model was obtained.

The Study on the Priority of First Person Shooter game Elements using Delphi Methodology (FPS게임 구성요소의 중요도 분석방법에 관한 연구 1 -델파이기법을 이용한 독립요소의 계층설계와 검증을 중심으로-)

  • Bae, Hye-Jin;Kim, Suk-Tae
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.61-72
    • /
    • 2007
  • Having started with "Space War", the first game produced by MIT in the 1960's, the gaming industry expanded rapidly and grew to a large size over a short period of time: the brand new games being launched on the market are found to contain many different elements making up a single content in that it is often called the 'the most comprehensive ultimate fruits' of the design technologies. This also translates into a large increase in the number of things which need to be considered in developing games, complicating the plans on the financial budget, the work force, and the time to be committed. Therefore, an approach for analyzing the elements which make up a game, computing the importance of each of them, and assessing those games to be developed in the future, is the key to a successful development of games. Many decision-making activities are often required under such a planning process. The decision-making task involves many difficulties which are outlined as follows: the multi-factor problem; the uncertainty problem impeding the elements from being "quantified" the complex multi-purpose problem for which the outcome aims confusion among decision-makers and the problem with determining the priority order of multi-stages leading to the decision-making process. In this study we plan to suggest AHP (Analytic Hierarchy Process) so that these problems can be worked out comprehensively, and logical and rational alternative plan can be proposed through the quantification of the "uncertain" data. The analysis was conducted by taking FPS (First Person Shooting) which is currently dominating the gaming industry, as subjects for this study. The most important consideration in conducting AHP analysis is to accurately group the elements of the subjects to be analyzed objectively, and arrange them hierarchically, and to analyze the importance through pair-wise comparison between the elements. The study is composed of 2 parts of analyzing these elements and computing the importance between them, and choosing an alternative plan. Among these this paper is particularly focused on the Delphi technique-based objective element analyzing and hierarchy of the FPS games.

  • PDF

A Study on the Effects of Risk Factors and Protection Factors of Care givers on Job Change Intention: Focused on the Mediation Effect of Occupational Adaptation (요양보호사의 위험요인과 보호요인이 이직의도에 미치는 영향 연구: 직업적응의 매개효과 중심으로)

  • Park, Su Jan;Kim, Youn Jae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.2
    • /
    • pp.159-175
    • /
    • 2018
  • The purpose of this study was to identify the factors that could overcome the crisis and adversity of the nursing care provider through understanding the effect of job adaptation on the turnover intention of the nursing care provider and to contribute to the various problems of the nursing care provider in the long term. In order to confirm this as an empirical research task, risk factors and protection factors, general characteristics of the survey subjects, job adaptation and turnover intention were selected, and the risk factors and protective factors of caregivers' As a mediator. So Seoul. The results of the questionnaire survey were as follows: 291 caregivers in the elderly medical welfare facilities in Gyeonggi area. First, as the relationship between the risk factors and protective factors of occupational caregivers and occupational adaptation were more severe, the higher the maladjustment of the workplace culture, the more the job satisfaction and organizational commitment were adversely affected. The emotional support, The higher the information support, the more satisfied and satisfied the job. Second, the relationship between the risk factors of the caregiver and the protective factors and the turnover intention, the higher the conflict of caregivers, the more unstable the workplace, the more difficult it is to adapt to work culture, Respectively. Finally, as a result of verifying the mediating effect of occupational adaptation on the relationship between risk factors and protective factors and turnover intention of caregivers, job satisfaction, which is a sub-factor of job adaptation, It is shown that they play mediating roles only in the relationship between stress and turnover intention, and do not play a mediating role in the relationship between protective factor self - efficacy and social support and turnover intention. In other words, if caregivers feel satisfaction about their job, they can be less stressed on their jobs, improve their self-efficacy, and have a positive attitude toward social support. Also, it was found that the more the caregiver 's immersion into the organization, the less job stress and turnover intention decreased, but the self - efficacy and social support perception were not influenced. Based on this, the director of the facility should strive to stabilize the operation of the facility and provide high-quality services by seeking ways to improve conflict resolution and adaptation to the workplace culture so that nursing care workers can adapt to their work. And it is required to develop active management strategies and institutional support for improving job satisfaction and organizational commitment of caregivers.

Study on the Small Fields Dosimetry for High Energy Photon-based Radiation Therapy (고에너지 광자선을 이용한 방사선 치료 시 소조사면에서의 흡수선량평가에 관한 연구)

  • Jeong, Hae-Sun;Han, Young-Yih;Kum, O-Yeon;Kim, Chan-Hyeong
    • Progress in Medical Physics
    • /
    • v.20 no.4
    • /
    • pp.290-297
    • /
    • 2009
  • In case of radiation treatment using small field high-energy photon beams, an accurate dosimetry is a challenging task because of dosimetrically unfavorable phenomena such as dramatic changes of the dose at the field boundaries, dis-equilibrium of the electrons, and non-uniformity between the detector and the phantom materials. In this study, the absorbed dose in the phantom was measured by using an ion chamber and a diode detector widely used in clinics. $GAFCHROMIC^{(R)}$ EBT films composed of water equivalent materials was also evaluated as a small field detector and compared with ionchamber and diode detectors. The output factors at 10 cm depth of a solid phantom located 100 cm from the 6 MV linear accelerator (Varian, 6 EX) source were measured for 6 field sizes ($5{\times}5\;cm^2$, $2{\times}2\;cm^2$, $1.5{\times}1.5\;cm^2$, $1{\times}1\;cm^2$, $0.7{\times}0.7\;cm^2$ and $0.5{\times}0.5\;cm^2$). As a result, from $5{\times}5\;cm^2$ to $1.5{\times}1.5\;cm^2$ field sizes, absorbed doses from three detectors were accurately identified within 1%. Wheres, the ion chamber underestimated dose compared to other detectors in the field sizes less than $1{\times}1\;cm^2$. In order to correct the observed underestimation, a convolution method was employed to eliminate the volume averaging effect of an ion chamber. Finally, in $1{\times}1\;cm^2$ field the absorbed dose with a diode detector was about 3% higher than that with the EBT film while the dose with the ion chamber after volume correction was 1% lower. For $0.5{\times}0.5\;cm^2$ field, the dose with the diode detector was 1% larger than that with the EBT film while dose with volume corrected ionization chamber was 7% lower. In conclusion, the possibility of $GAFCHROMIC^{(R)}$ EBT film as an small field dosimeter was tested and further investigation will be proceed using Monte Calro simulation.

  • PDF

Performance Analysis of Top-K High Utility Pattern Mining Methods (상위 K 하이 유틸리티 패턴 마이닝 기법 성능분석)

  • Ryang, Heungmo;Yun, Unil;Kim, Chulhong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.89-95
    • /
    • 2015
  • Traditional frequent pattern mining discovers valid patterns with no smaller frequency than a user-defined minimum threshold from databases. In this framework, an enormous number of patterns may be extracted by a too low threshold, which makes result analysis difficult, and a too high one may generate no valid pattern. Setting an appropriate threshold is not an easy task since it requires the prior knowledge for its domain. Therefore, a pattern mining approach that is not based on the domain knowledge became needed due to inability of the framework to predict and control mining results precisely according to the given threshold. Top-k frequent pattern mining was proposed to solve the problem, and it mines top-k important patterns without any threshold setting. Through this method, users can find patterns from ones with the highest frequency to ones with the k-th highest frequency regardless of databases. In this paper, we provide knowledge both on frequent and top-k pattern mining. Although top-k frequent pattern mining extracts top-k significant patterns without the setting, it cannot consider both item quantities in transactions and relative importance of items in databases, and this is why the method cannot meet requirements of many real-world applications. That is, patterns with low frequency can be meaningful, and vice versa, in the applications. High utility pattern mining was proposed to reflect the characteristics of non-binary databases and requires a minimum threshold. Recently, top-k high utility pattern mining has been developed, through which users can mine the desired number of high utility patterns without the prior knowledge. In this paper, we analyze two algorithms related to top-k high utility pattern mining in detail. We also conduct various experiments for the algorithms on real datasets and study improvement point and development direction of top-k high utility pattern mining through performance analysis with respect to the experimental results.

A PLS Path Modeling Approach on the Cause-and-Effect Relationships among BSC Critical Success Factors for IT Organizations (PLS 경로모형을 이용한 IT 조직의 BSC 성공요인간의 인과관계 분석)

  • Lee, Jung-Hoon;Shin, Taek-Soo;Lim, Jong-Ho
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.207-228
    • /
    • 2007
  • Measuring Information Technology(IT) organizations' activities have been limited to mainly measure financial indicators for a long time. However, according to the multifarious functions of Information System, a number of researches have been done for the new trends on measurement methodologies that come with financial measurement as well as new measurement methods. Especially, the researches on IT Balanced Scorecard(BSC), concept from BSC measuring IT activities have been done as well in recent years. BSC provides more advantages than only integration of non-financial measures in a performance measurement system. The core of BSC rests on the cause-and-effect relationships between measures to allow prediction of value chain performance measures to allow prediction of value chain performance measures, communication, and realization of the corporate strategy and incentive controlled actions. More recently, BSC proponents have focused on the need to tie measures together into a causal chain of performance, and to test the validity of these hypothesized effects to guide the development of strategy. Kaplan and Norton[2001] argue that one of the primary benefits of the balanced scorecard is its use in gauging the success of strategy. Norreklit[2000] insist that the cause-and-effect chain is central to the balanced scorecard. The cause-and-effect chain is also central to the IT BSC. However, prior researches on relationship between information system and enterprise strategies as well as connection between various IT performance measurement indicators are not so much studied. Ittner et al.[2003] report that 77% of all surveyed companies with an implemented BSC place no or only little interest on soundly modeled cause-and-effect relationships despite of the importance of cause-and-effect chains as an integral part of BSC. This shortcoming can be explained with one theoretical and one practical reason[Blumenberg and Hinz, 2006]. From a theoretical point of view, causalities within the BSC method and their application are only vaguely described by Kaplan and Norton. From a practical consideration, modeling corporate causalities is a complex task due to tedious data acquisition and following reliability maintenance. However, cause-and effect relationships are an essential part of BSCs because they differentiate performance measurement systems like BSCs from simple key performance indicator(KPI) lists. KPI lists present an ad-hoc collection of measures to managers but do not allow for a comprehensive view on corporate performance. Instead, performance measurement system like BSCs tries to model the relationships of the underlying value chain in cause-and-effect relationships. Therefore, to overcome the deficiencies of causal modeling in IT BSC, sound and robust causal modeling approaches are required in theory as well as in practice for offering a solution. The propose of this study is to suggest critical success factors(CSFs) and KPIs for measuring performance for IT organizations and empirically validate the casual relationships between those CSFs. For this purpose, we define four perspectives of BSC for IT organizations according to Van Grembergen's study[2000] as follows. The Future Orientation perspective represents the human and technology resources needed by IT to deliver its services. The Operational Excellence perspective represents the IT processes employed to develop and deliver the applications. The User Orientation perspective represents the user evaluation of IT. The Business Contribution perspective captures the business value of the IT investments. Each of these perspectives has to be translated into corresponding metrics and measures that assess the current situations. This study suggests 12 CSFs for IT BSC based on the previous IT BSC's studies and COBIT 4.1. These CSFs consist of 51 KPIs. We defines the cause-and-effect relationships among BSC CSFs for IT Organizations as follows. The Future Orientation perspective will have positive effects on the Operational Excellence perspective. Then the Operational Excellence perspective will have positive effects on the User Orientation perspective. Finally, the User Orientation perspective will have positive effects on the Business Contribution perspective. This research tests the validity of these hypothesized casual effects and the sub-hypothesized causal relationships. For the purpose, we used the Partial Least Squares approach to Structural Equation Modeling(or PLS Path Modeling) for analyzing multiple IT BSC CSFs. The PLS path modeling has special abilities that make it more appropriate than other techniques, such as multiple regression and LISREL, when analyzing small sample sizes. Recently the use of PLS path modeling has been gaining interests and use among IS researchers in recent years because of its ability to model latent constructs under conditions of nonormality and with small to medium sample sizes(Chin et al., 2003). The empirical results of our study using PLS path modeling show that the casual effects in IT BSC significantly exist partially in our hypotheses.

Importance of End User's Feedback Seeking Behavior for Faithful Appropriation of Information Systems in Small and Medium Enterprises (중소기업 환경에서의 합목적적 정보시스템 활용을 위한 최종사용자 피드백 탐색행위의 중요성)

  • Shin, Young-Mee;Lee, Joo-Ryang;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.61-95
    • /
    • 2007
  • Small-and-medium sized enterprises(SMEs) represent quite a large proportion of the industry as a whole in terms of the number of enterprises or employees. However researches on information system so far have focused on large companies, probably because SMEs were not so active in introducing information systems as larger enterprises. SMEs are now increasingly bringing in information systems such as ERP(Enterprise Resource Planning Systems) and some of the companies already entered the stage of ongoing use. Accordingly, researches should deal with the use of information systems by SME s operating under different conditions from large companies. This study examined factors and mechanism inducing faithful appropriation of information systems, in particular integrative systems such as ERP, in view of individuals` active feedback-seeking behavior. There are three factors expected to affect end users` feedback-seeking behavior for faithful appropriation of information systems. They are management support, peer IT champ support, and IT staff support. The main focus of the study is on how these factors affect feedback-seeking behavior and whether the feedback-seeking behavior plays the role of mediator for realizing faithful appropriation of information systems by end users. To examine the research model and the hypotheses, this study employed an empirical method based on a field survey. The survey used measurements mostly employed and verified by previous researches, while some of the measurements had gone through minor modifications for the purpose of the study. The survey respondents are individual employees of SMEs that have been using ERP for one year or longer. To prevent common method bias, Task-Technology Fit items used as the control variable were made to be answered by different respondents. In total, 127 pairs of valid questionnaires were collected and used for the analysis. The PLS(Partial Least Squares) approach to structural equation modeling(PLS-Graph v.3.0) was used as our data analysis strategy because of its ability to model both formative and reflective latent constructs under small-and medium-size samples. The analysis shows Reliability, Construct Validity and Discriminant Validity are appropriate. The path analysis results are as follows; first, the more there is peer IT champ support, the more the end user is likely to show feedback-seeking behavior(path-coefficient=0.230, t=2.28, p<0.05). In other words, if colleagues proficient in information system use recognize the importance of their help, pass on what they have found to be an effective way of using the system or correct others' misuse, ordinary end users will be able to seek feedback on the faithfulness of their appropriation of information system without hesitation, because they know the convenience of getting help. Second, management support encourages ordinary end users to seek more feedback(path-coefficient=0.271, t=3.06, p<0.01) by affecting the end users' perceived value of feedback(path-coefficient=0.401, t=6.01, p<0.01). Management support is far more influential than other factors that when the management of an SME well understands the benefit of ERP, promotes its faithful appropriation and pays attention to employees' satisfaction with the system, employees will make deliberate efforts for faithful appropriation of the system. However, the third factor, IT staff support was found not to be conducive to feedback-seeking behavior from end users(path-coefficient=0.174, t=1.83). This is partly attributable to the fundamental reason that there is little support for end users from IT staff in SMEs. Even when IT staff provides support, end users may find it less important than that from coworkers more familiar with the end users' job. Meanwhile, the more end users seek feedback and attempt to find ways of faithful appropriation of information systems, the more likely the users will be able to deploy the system according to the purpose the system was originally meant for(path-coefficient=0.35, t=2.88, p<0.01). Finally, the mediation effect analysis confirmed the mediation effect of feedback-seeking behavior. By confirming the mediation effect of feedback-seeking behavior, this study draws attention to the importance of feedback-seeking behavior that has long been overlooked in research about information system use. This study also explores the factors that promote feedback-seeking behavior which in result could affect end user`s faithful appropriation of information systems. In addition, this study provides insight about which inducements or resources SMEs should offer to promote individual users' feedback-seeking behavior when formal and sufficient support from IT staff or an outside information system provider is hardly expected. As the study results show, under the business environment of SMEs, help from skilled colleagues and the management plays a critical role. Therefore, SMEs should seriously consider how to utilize skilled peer information system users, while the management should pay keen attention to end users and support them to make the most of information systems.

Design Strategies and Processes through the Concept of Resilience (리질리언스 개념을 통해서 본 설계 전략과 과정)

  • Choi, Hyeyoung;Seo, Young-Ai
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.46 no.5
    • /
    • pp.44-58
    • /
    • 2018
  • Cities face new challenges not only in natural disasters by climate change but also in social and economic fluctuations. With the existing simple reconstruction method, it is difficult to solve the overall problems that a city or region may face. As a new approach to cope with various changes, the concept of resilience is emerging. Resilience is also one of the themes of recent major urban design projects. Design with the concept of resilience is a new strategy that can deal with various changes of urban space, rather than a temporary trend. The purpose of this paper is to explore the design method by analyzing cases where the concept of resilience is employed. We aim to examine what kind of design strategies are needed for the resilience design and how this design process differ in character, as compared to general design projects. Cases for this study include the "Rebuild by Design" competition held in 2013 and the "Resilient by Design/Bay Area Challenge" competition held in 2017. This paper consists of literature reviews and case studies. The latter is divided into two aspects: content analysis based on the theory of resilience and characteristics of the design process. Cases are analyzed through literature reviews and process characteristics of resilience design in response to the general design process. The main categories for urban resilience used as the framework for analysis include: Urban Infrastructure, Social Dynamics, Economic Dynamics, Health and Wellbeing, Governance Networks, and Planning and Institutions. As a result, the aspects of resilience concepts considered and design strategies undertaken by each team were identified. Each team tried to connect all 6 categories to their design strategies, placing special value on the role of governance, a system that enables collaborative design and project persistency. In terms of the design process, the following characteristics were found: planning the whole project process in the pre-project phase, analyzing predictable socioeconomic risk factors in addition to physical vulnerabilities, aiming for landscape-oriented integrated design, and sustainable implementation strategies with specific operations and budget plans. This paper is meaningful to connect the concept of resilience, which has been discussed in various articles, to design strategy, and to explore the possibility of constructing a practical methodology by deriving the characteristics of the resilience design process. It remains a future task to research design strategies that apply the concept of resilience to various types of urban spaces, in addition to areas that are vulnerable to disasters.

E-Commerce in the Historical Approach to Usage and Practice of International Trade ("무역상무(貿易商務)에의 역사적(歷史的) 어프로치와 무역취인(貿易取引)의 전자화(電子化)")

  • Tsubaki, Koji
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.224-242
    • /
    • 2003
  • The author believes that the main task of study in international trade usage and practice is the management of transactional risks involved in international sale of goods. They are foreign exchange risks, transportation risks, credit risk, risk of miscommunication, etc. In most cases, these risks are more serious and enormous than those involved in domestic sales. Historically, the merchant adventurers organized the voyage abroad, secured trade finance, and went around the ocean with their own or consigned cargo until around the $mid-19^{th}$ century. They did business faceto-face at the trade fair or the open port where they maintained the local offices, so-called "Trading House"(商館). Thererfore, the transactional risks might have been one-sided either with the seller or the buyer. The bottomry seemed a typical arrangement for risk sharing among the interested parties to the adventure. In this way, such organizational arrangements coped with or bore the transactional risks. With the advent of ocean liner services and wireless communication across the national border in the $19^{th}$ century, the business of merchant adventurers developed toward the clear division of labor; sales by mercantile agents, and ocean transportation by the steam ship companies. The international banking helped the process to be accelerated. Then, bills of lading backed up by the statute made it possible to conduct documentary sales with a foreign partner in different country. Thus, FOB terms including ocean freight and CIF terms emerged gradually as standard trade terms in which transactional risks were allocated through negotiation between the seller and the buyer located in different countries. Both of them did not have to go abroad with their cargo. Instead, documentation in compliance with the terms of the contract(plus an L/C in some cases) must by 'strictly' fulfilled. In other words, the set of contractual documents must be tendered in advance of the arrival of the goods at port of discharge. Trust or reliance is placed on such contractual paper documents. However, the container transport services introduced as international intermodal transport since the late 1960s frequently caused the earlier arrival of the goods at the destination before the presentation of the set of paper documents, which may take 5 to 10% of the amount of transaction. In addition, the size of the container vessel required the speedy transport documentation before sailing from the port of loading. In these circumstances, computerized processing of transport related documents became essential for inexpensive transaction cost and uninterrupted distribution of the goods. Such computerization does not stop at the phase of transportation but extends to cover the whole process of international trade, transforming the documentary sales into less-paper trade and further into paperless trade, i.e., EDI or E-Commerce. Now we face the other side of the coin, which is data security and paperless transfer of legal rights and obligations. Unfortunately, these issues are not effectively covered by a set of contracts only. Obviously, EDI or E-Commerce is based on the common business process and harmonized system of various data codes as well as the standard message formats. This essential feature of E-Commerce needs effective coordination of different divisions of business and tight control over credit arrangements in addition to the standard contract of sales. In a few word, information does not alway invite "trust". Credit flows from people, or close organizational tie-ups. It is our common understanding that, without well-orchestrated organizational arrangements made by leading companies, E-Commerce does not work well for paperless trade. With such arrangements well in place, participating E-business members do not need to seriously care for credit risk. Finally, it is also clear that E-International Commerce must be linked up with a set of government EDIs such as NACCS, Port EDI, JETRAS, etc, in Japan. Therefore, there is still a long way before us to go for E-Commerce in practice, not on the top of information manager's desk.

  • PDF