• Title/Summary/Keyword: transactions

Search Result 45,574, Processing Time 0.048 seconds

Family Ownership's Predisposition to the Related Party Transaction and Its Influence on a Stock Price Crash: Evidence from Indonesia

  • SUMIYANA, Sumiyana;SETYOWATI, Servatia Mayang
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.103-115
    • /
    • 2021
  • This study investigates the relationship between family ownership and the stock price crash risk. It believes that this relationship would never be in direct connection. The authors design and then find that family ownership is predisposed, in the first place, to the related party transaction, then the related party transaction causes the future stock price crash. This study infers that employing the power of family ownership creates the Type I agency problem, although this is not relevant for the Type II problem. From the perspective of the hoarding theory, family ownerships produce opaque accounts by blurring financial information. The blurred information is probably hidden in the related party transactions. This study, therefore, splits these transactions into accounts receivable, other accounts receivable and other receivables. Finally, this research concludes that the family ownership affects related party transactions. These then are used as an instrument to influence the leaded related party transaction. The latest, leaded related party transactions influence the future stock price crash. This study infers that related party transactions are abusive practices, especially on the types of receivables. It implies corporate governance's revitalisation.

A Study on the Improvement of User Identification of Non-Face-to-Face Financial Transactions with Messenger Phishing Case (비대면 금융거래 사용자 확인 개선방안 연구 - 메신저피싱 사례를 중심으로)

  • Eun Bi Kim;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.353-362
    • /
    • 2023
  • Messenger phishing, communications frauds crime, exploits remote control of smartphones and non-face-to-face financial transactions, causing property damage due to money transfers, as well as account opening and loans in the name of victims. Such financial accidents may be careless of victims, but the current messenger phishing criminal method is intelligent and can be seen as digging into loopholes in the non-face-to-face user verification process. In this paper we analyze how messenger phishing uses loopholes in user identification procedures in non-face-to-face financial transactions. Through experiments, it is suggested to improve the non-face-to-face verification process for safer financial transactions.

Infrastructure for Electronic Financial Transactions in Korea: Current Status and Policy Issues (국내 금융거래전자화를 위한 하부구조 구축: 현황 및 정책과제)

  • 김병연;정철용
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.153-185
    • /
    • 1997
  • As the computer-based electronic processing of financial transactions become more and more popular in financial areas, the need for more efficient and secure infrastructure has been increased. This Paper addresses the current status and Policy issues in building such infrastructure for electronic financial transactions in Korea. We examine our financial computer networks, electronic payment and clearing systems, standardization, and related laws, comparing with those in United States, Japan, and European countries and suggest policy recommendation in each area.

  • PDF

Discovering Time Weighted Association Rules (시간 가중치를 고려한 연관규칙)

  • 손승현;김재련
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.61
    • /
    • pp.51-58
    • /
    • 2000
  • Discovery of association rules has been used useful in many fields, especially in the fields of the inventory display, catalog design and cross selling. In previous works, all transactions In the database are treated uniformly. In this paper, we present a method for partitioning transactions in the database using time weights. Transactions are assigned different weights as time goes on. Examples show that these method provides purchasing patterns in the database as well as finding association rules.

  • PDF

A Study on the Comparison of the Basic Law on Electronic Commerce and the UETA (전자거래기본법과 통일전자거래법(UETA)의 비교)

  • Jeon, Soon-Hwan
    • The Journal of Information Technology
    • /
    • v.8 no.2
    • /
    • pp.135-148
    • /
    • 2005
  • The purpose of this article is to study on the Comparison of the Basic Law on Electronic Commerce and the Uniform Electronic Transactions Act(UETA). The purpose of th Basic Law on Electronic Commerce is to contribute to the national economy by clarifying the legal effect of transactions by means of electronic messages so as to ensure the security and reliability thereof and to secure fair trade, and further by establishing sound and orderly transactions, and promoting electronic commerce. It is important to understand that the purpose of the UETA is to remove barriers to electronic commerce by validating and effectuating electronic records and signatures. It is not a general contracting-the substantive rules of contracts remain unaffected by UETA. Nor is a digital signature statute. To the extent that a State has a Digital Signature Law, the UETA is designed to support and compliment that statute.

  • PDF

A Fair-Exchange E-Payment Protocol For Digital Products With Customer Unlinkability

  • Yen, Yi-Chung;Wu, Tzong-Chen;Lo, Nai-Wei;Tsai, Kuo-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2956-2979
    • /
    • 2012
  • Along with the development of Information Technology, online transactions through Internet have become more popular for the reasons of convenience and efficiency. In order to provide secure and reliable online transactions, an effective electronic payment protocol is crucial. In this paper, we propose a novel electronic payment protocol for digital product transactions with an offline arbiter to achieve fair exchange, automated dispute resolution, customer anonymity, and customer unlinkability. In our protocol a product token is adopted to eliminate the need of key management for digital product decryption in the offline arbiter. In addition, Elliptic Curve Cryptography (ECC)-based self-certified public key is utilized to further reduce computing overheads. According to our analysis, the efficiency of our protocol can be greatly increased in comparison with previous literatures.

Electronic Fund Transfer Systems in United States (미국(美國)의 전자자금이체(電子資金移替)시스템에 관한 고찰(考察))

  • Kang, Won-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.59-87
    • /
    • 2001
  • In recent years electronic fund transfers covered by the Electronic Fund Transfer Act 1978 for consumer protection and the Article 4A of Uniform Commercial Code(U.C.C.) 1989 for wholesale electronic payments in United States. Electronic fund transfers carried out by use of a wire transfer network, automated clearing house, or other communication system of a clearing house or other association of banks such as direct deposit, Fedwire, automated teller machine, point-of-sale, and credit card transactions have been increasingly common in consumer transactions and wholesale transactions. Especially, the Article 4A of U.C.C. governs the rights and obligations associated with transactions such as an issue and acceptance of payment order, execution of sender's payment order by receiving bank, and payment. These legal frameworks in connection with electronic fund transfers in United States can play a leading role in establishing model not only within the United States, but also as a basis for developments of electronic commerce law in Korea including other countries.

  • PDF

Simulation of Multiversion Real-time Transactions in Database Systems for Factory Automation (공장 자동화를 위한 데이터베이스 시스템에서의 다중 버전 실시간 트랜잭션의 시뮬레이션)

  • 유인관
    • Journal of the Korea Society for Simulation
    • /
    • v.3 no.1
    • /
    • pp.125-134
    • /
    • 1994
  • In real-time database systems, transactions's commitment done before the given deadlines is more important than just getting the maximum throughput. Transactions missing the given deadlines are no longer meaningful in real-time applications. Therefore, there is a need for new transaction processing models to meet the given deadlines in real-time database applications, because moat conventional transaction models are not designed to meet deadlines. In this paper we propose a new transaction models which uses multiple versions of a data item. The model uses read-from graphs and dynamic reorder of transactions to meet deadlines. A read-from graph contains the past read semantics of read operations and support the model to decide which database operation to be taken. Then, we show simulation results comparing the proposed model with other transaction models such as two phase locking model and the optimistic concurrency control model.

  • PDF

A Study on the Problems in International Transactions of Digital Goods (디지털물(物)의 국제거래상의 문제점에 관한 연구)

  • Oh, Won-Suk;Lim, Sung-Chul
    • International Commerce and Information Review
    • /
    • v.8 no.3
    • /
    • pp.343-368
    • /
    • 2006
  • International transactions of digital goods with the abovementioned characteristics are categorized by stages to review the characteristics and illustrate the problems in this study. The problems that may possibly arise during the implementation of the contract on digital goods are divided by stage, such as delivery, payment and insurance cover in preparation for possible diverse risks. International transactions of digital goods are expected to gain more weight in the world trade in the future. Therefore, legal and technical supports in the international level and international commercial custom need to be settled to smoothen and facilitate international transactions of digital goods.

  • PDF

Transactions Ordering based Secure Concurrency Control Scheme (트랜잭션 순서 기반 보안 동시성 제어 기법)

  • Lee Won-Sup;Lee Sang-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.57-64
    • /
    • 2005
  • While the secure concurrency control schemes in multilevel secure database management systems synchronize transactions cleared at different security level they must consider the problem covert channel. although previous works achieve the confidentiality successfully, they overlook the integrity or the availability. For being evaluated as highly secure database systems , the multilevel secure database management systems must achieve the confidentiality, integrity, and the availability that are the well-known major security aspects. By use of verified transactions ordering relationship, in this Paper, we Propose a new secure concurrency control scheme that is capable of increasing the degree of fairness among transactions cleared at different security levels.

  • PDF