• Title/Summary/Keyword: security goods

Search Result 152, Processing Time 0.025 seconds

A Study on the Retention of Title under UCC (UCC상 소유권유보에 관한 연구)

  • MIN, Joo-Hee
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.75
    • /
    • pp.29-48
    • /
    • 2017
  • This study describes the retention of title under UCC. UCC ${\S}$ 2-401 prescribes that any retention or reservation by the seller of the title (property) in goods shipped or delivered to the buyer is limited in effect to a reservation of a security interest. It means that the retention of title generates a security interest in the same way like a charge. To be effective, a security interest must be attached or perfected. Once attachment occurs, a security interest is enforceable against the buyer. Once a security interest is perfected, a security interest is enforceable against third parties. Under UCC, a simple retention of title clause is valid as long as it is incorporated into the contract of sale. If the seller acquires a perfected security interest, he as a secured party can enjoy a priority against other creditors. But if a security interest is not perfected but PMSI is afforded, the seller has a special priority. Secondly, under UCC ${\S}$ 9-335 and 9-336, if a security interest under an enlarged retention of title clause is perfected, the seller as the secured party has a valid security interest in the product or mass into which his goods have been mixed or commingled. But in terms of assession of goods, as the seller has a security interest only in his goods, if the seller wants to enlarge his security interest in the whole, a security agreement should cover its intention. Thirdly, under UCC ${\S}$ 9-315, a security interest in proceeds of subsale of goods supplied by the seller is a perfected security interest if the security interest in the original collateral was perfected. But if the proceeds are cash proceeds, it should be identifiable from other funds of the buyer.

  • PDF

Development of Korean Cybersecurity Goods Menu (Korean Cybersecurity Goods Menu 개발)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.266-267
    • /
    • 2015
  • The information security (information security knowledge) industry is technology-intensive, high value-added industries. South Korea's response has excellent ICT skills and experience and skills in a variety of cyber attacks, has become a benchmark in the world. However, the small size of the domestic information security company, supporting infrastructure is lacking. Domestic information security industry is the primary condition to activate the export. In order to export it is necessary to develop for the Korean Cybersecurity Goods Menu for products, services and technologies of the domestic information security industry. Buyer Menu as well as foreign and domestic Seller, companies and governments know the details of the assets and product information security industry and is a prerequisite to sell. In this paper, I study the Korean Cybersecurity Goods Menu development.

  • PDF

The Study of a rational management to the protective area of military installations (군사시설보호구역의 합리적 관리방안에 관한 연구)

  • Kim, Myeong-Sun
    • Journal of National Security and Military Science
    • /
    • s.2
    • /
    • pp.23-89
    • /
    • 2004
  • The protective area of military installations can be a essential investment goods for producting public goods like military installations and national security. For the purpose of this, The protective area of military installations are set up and applicated at important strategic areas. It causes colplications and frictions among the people, government and army inevitably to set up the protective area of military installations, as the relation between the army which produces security or public goods and the people that make and use valuable goods is opposed and contradictory to each other. Heretofore, the civil petition of the protective affair to military installations has been presented individually. As local self- government is fixed, a local selg-governing body presents many civil petitions now. Therefore the protective affair to military installations came to be examined carefully in the aspecs of improving the relationship between the civil and army, raising natinal competitiveness, and increasing efficiency of military operations. Though the relationship between the civil and army is opposed and contradictory, it is required to be in keeping with each other with a situation around society, that is, changes and trend of national security, politics, economy, society. Accordingly, if you drive plans of rational management to the protective area of military installations, you can not only achieve successful military installations, but also be a great help to growth of a local community. Then 「The Army with the people」worthy of the name can be real.

  • PDF

An Economic Analysis of Alternative Mechanisms for Optimal IT Security Provision within a Firm (기업 내 최적 정보기술보안 제공을 위한 대체 메커니즘에 대한 경제적 분석)

  • Yu, Seunghee
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.107-117
    • /
    • 2013
  • The main objective of this study lies at examining economic features of IT security investment and comparing alternative mechanisms to achieve optimal provision of IT security resources within a firm. There exists a paucity of economic analysis that provide useful guidelines for making critical decisions regarding the optimal level of provision of IT security and how to share the costs among different users within a firm. As a preliminary study, this study first argues that IT security resources share some unique characteristics of pure public goods, namely nonrivalry of consumption and nonexcludability of benefit. IT security provision problem also suffers from information asymmetry problem with regard to the valuation of an individual user for IT security goods. Then, through an analytical framework, it is shown that the efficient provision condition at the overall firm level is not necessarily satisfied by individual utility maximizing behavior. That is, an individual provision results in a suboptimal solution, especially an underprovision of the IT security good. This problem is mainly due to the nonexcludability property of pure public goods, and is also known as a free-riding problem. The fundamental problem of collective decision-making is to design mechanisms that both induce the revelation of the true information and choose an 'optimal' level of the IT security good within this framework of information asymmetry. This study examines and compares three alternative demand-revealing mechanisms within the IT security resource provision context, namely the Clarke-Groves mechanism, the expected utility maximizing mechanism and the Groves-Ledyard mechanism. The main features of each mechanism are discussed along with its strengths, weaknesses, and different applicability in practice. Finally, the limitations of the study and future research are discussed.

  • PDF

Perceived Risk in Online Purchase of Sporting Goods (스포츠용품 인터넷 구매의 위험지각에 관한 연구)

  • Min Dai-Hwan;Lee Seung-Yeop;Rim Seong-Taek
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.2
    • /
    • pp.127-143
    • /
    • 2006
  • As the number of Internet users increases, online shopping malls are gradually flourishing and sales are continuously growing. However, since consumers are not able to check what they purchase when buying products on the Internet, they are bound to have higher risk perception than buying directly from off-line stores. Especially, sporting goods require a special attention because a preliminary test is important. Therefore, the risk perception is much higher when people purchase sporting goods online. This study first identifies the multi-dimensionality of risk perception. Then, it investigates whether online purchasing experience of sporting goods makes differences in the level of risk perception. In addition, it examines whether the risk perception by those who had an experience in purchasing sporting goods online affects the customer satisfaction. This study has identified five dimensions in the concept of risk perception, such as financial risk, performance risk, security risk, delivery risk, and psychological/physical risk. A statistical analysis shows that people without an experience in purchasing sporting goods online have perceived significantly higher performance risk, security risk, and psychological/physical risk than those with online purchasing experiences. Finally, this study has found that delivery risk, financial risk, and psychological/physical risk have significant negative influences on the customer satisfaction.

  • PDF

The Effects of the Attributes of Second-Hand Luxury Goods Trading Platforms on Perceived Usefulness, Perceived Enjoyment, and Continuance Intention to Use (중고 명품 거래 플랫폼의 속성이 지각된 유용성, 유희성 및 지속사용의도에 미치는 영향)

  • Chen Xi Jiang;Mi Sook Kim
    • Fashion & Textile Research Journal
    • /
    • v.24 no.6
    • /
    • pp.731-743
    • /
    • 2022
  • This study examined the effects of platforms' attributes(economy, convenience, ease of use, and security) on perceived usefulness, perceived enjoyment, trust, and the continuance intention to use. Data were collected through a survey conducted with 327 users of second-hand luxury goods trading platforms in their twenties and thirties; 300 were used for statistical analysis using SPSS26.0 for exploratory factor analysis and correlation analysis, and AMOS 26.0 for confirmatory factor analysis and structural equation modeling. For the attributes of second-hand luxury goods trading platforms, four factors were extracted: economy, convenience, ease of use and security. The results showed that only the security of second-hand luxury goods platforms had a positive effect on the perceived usefulness of the platform, but other attributes did not influence perceived usefulness. In contrast, all attributes of the platform showed positive effects on perceived enjoyment. Perceived enjoyment had a strong effect on trust; however, perceived usefulness did not affect trust. The continuance intention to use the platforms was most influenced by perceived usefulness, trust, and perceived enjoyment, in that order. The current findings can help marketers of second-hand luxury goods platforms optimize the platforms' attributes based on the marketing objectives and develop strategies to build perceived usefulness and enjoyment first, and in turn, trust and intention to use.

A Study on the Risk Management in International Transaction of Digital Goods (디지털물(物) 국제법래(國際去來)의 리스크관리방안(管理方案)에 관한 연구(硏究))

  • Ahn, Byung-Soo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.29
    • /
    • pp.143-172
    • /
    • 2006
  • This study focuses on the risk management of "Digital Goods" appeared with the progress of information technology(IT) in international transaction. As a result of that digital goods have a lot of uncertainty between the general goods or service which have been deal with object of international transaction broadly because digital goods hold uniqueness. In this study, the author give a definition of "Digital Goods" and make an examination of uniqueness of that in international transaction. Next, six risks are defined base on risk theory and risk analysis matrix applying risk mapping model is made. Conclusionally, risk transfer as insurance is adequate to manage business risk, security risk, credit risk and legal risk. Meanwhile, risk avoidance is adequate to manage reputation risk and market risk. But, this study have following three limits. Firstly, concerning definition of the risk, real case is not applied owing to lack of transaction data. Secondly, measuring of the risk is not based on absolute data but relative data. Lastly, suggesting way of risk management is not concrete and practical to international trader of digital goods.

  • PDF

A Secure Mobile Agent Transfer Protocol in Mobile Agents Based E-Commerce System (이동 에이전트 기반 저자사걸 시스템에서의 안전한 이동 에이전트 전송 프로토콜)

  • Han, Seung-Wan;Im, Hyeong-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1657-1665
    • /
    • 2000
  • Mobile agents based e-commerce system has many advantage than traditional e-commerce-information gathering on goods, price settlement and payment, delivery of the goods purchased, and so on. However, due to the security vulnerability that stems from mobile agent's mobility, mobile agents based e-commerce system has additional security problems. Therefore, in order to do e-commerce securely in th system, first of al the security issues on mobile agents must be addressed. It this paper, we propose a mobile agent transfer protocol that provides confidentiality and integrity of mobile agent in transit and mutual authentication for communicating hosts. We further show the security of the protocol against many possible attacks. Also, we suggest the location management mechanism of mobile agents based on the trust center. This mechanism is capable of finding their locations transparently and detecting mobile agent clones.

  • PDF

Analysis on the Information Security Manpower Policy (정보보호인력 양성정책 분석)

  • Kim, Tae-Seong;Jeon, Hyo-Jeong
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.241-250
    • /
    • 2003
  • With an increasing awareness of information security, the market demand for better information security goods and services causes shortage in well trained information security manpower. This study analyzes the priorities of the options available to the qualitative information security manpower training policy. The analysis is conducted through four hierarchies: goals, criteria, sub-criteria and alternatives for each of which priorities are developed through the rating approach of the Analytic Hierarchy Process (AHP). 3 criteria and 8 sub-criteria are involved in the four hierarchies. The analysis result indicates that the fundamental information security technology is the most desirable.

  • PDF

Introduction Plans of Japanese AEO System for the Trade Security and Trade Facilitation (무역의 안전과 원활화를 위한 일본기업의 AEO 제도 도입방안에 관한 연구)

  • Woo, Sung-Koo;Kim, Jae-Myeong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.47
    • /
    • pp.263-298
    • /
    • 2010
  • The global trading system is vulnerable to terrorist exploitation while the international trade is an essential element for the economic development. Customs has a unique role in the international trade to provide increased security while ensuring facilitation of the legitimate flow of goods and the role of Customs has become more and more indispensable these days. In response to this trend, the World Customs Organization(WCO), the organization of more than 170 Customs administrations all over the world, adopted an international framework("SAFE Framework") in 2005, which includes the Authorized Economic Operator(AEO) concept, whereby a party involved in the international movement of goods would be approved by Customs as complying with the supply chain security standards, and given benefits, such as simplified Customs procedure and less Customs intervention. In this stream, the Japanese government has developed and promoted AEO Program in close cooperation with the business sector, aiming at ensuring security while facilitating legitimate trade. For that purpose, Japan Customs, as a main entity in the field of international trade, has developed comprehensive AEO program with combination of programs for importers, exporters, warehouse operators, Customs brokers and logistics operators, such as forwarders and carriers, which are consistent with the "SAFE Framework" developed by the WCO. The purpose of this paper aims to analyse the introduction plans of AEO program for the trade security and trade facilitation with Japanese AEO system.

  • PDF