burning money
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 5)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 4 (2) ◽  
pp. 585
Author(s):  
Cinta Rici Rahmawati

Predatory pricing adalah praktek menjual rugi sebagai strategi penetapan harga dimana harga yang ditetapkan atas suatu produk atau layanan sangat rendah dari harga pasaran industri dengan tujuan untuk mencari konsumen baru serta menciptakan hambatan bagi pesaing usaha lain yang akan masuk sehingga bisa menyingkirkan pesaing usaha yang lain dan bisa menguasai pasar. Tindakan ini sering disebut upaya illegal dalam menguasai pasar karena menghilangkan persaingan sehat sehingga pasar lebih rentan menjadi monopoli. Konsep keuangan startup sendiri memang akrab dengan konsep bakar uang atau burning money/cash burn dimana kondisi ini terjadi jika pengeluaran masih lebih besar daripada pendapatan, jika startup tidak mendapatkan dana investasi, tentu saja riwayat mereka akan berakhir karena faktor kehabisan uang inilah yang menjadi salah satu faktor bangkrutnya startup. Kondisi burning money/cash burn tidak dapat dipastikan berapa lama hingga mencapai pendapatan yang diinginkan. Ovo merupakan layanan dompet digital asal Indonesia yang memudahkan penggunanya untuk bertansaksi di merchant yang menjalin kerjasama dengannya.


2020 ◽  
Vol 1 (2) ◽  
pp. 409-415
Author(s):  
I Made Agus Mertajaya ◽  
I Made Suwitra ◽  
I Ketut Sukadana

This study aims to determine the application of sanctions to the perpetrators of the crime of destroying money in the pitra yadnya ceremony. The phenomenon that is happening now is that many Hindu people in Bali burn rupiah currency in the pitra yadnya ceremony on the grounds that it is a provision for the person being ceremonied. Grounded by the phenomenon the stuy examines two issues: a) how is regulate the destruction of money regulating in the to law Law Number 7 of 2011 concerning Currency, b) whether or not the burning of money as a fundametal provision in the pitra yadnya ceremony is classified as a criminal act. In conducting this research, the authors use normative the research method and statutory approachs and conceptual approach. Furthermore, the legal materials that have been collected are processed using the descriptive analysis method. The results showed that the regulation on the destruction of rupiah currency contained in Article 1 paragraph (10) of Law Number 7 of 2011 and Article 11 paragraph (1) to Article 11 paragraph (4) also regulates the destruction of rupiah. Burning money as a provision in the pitra yadnya ceremony cannot be classified as a criminal act because it does not fulfill the criminal element, namely the element of the intent of the act being committed and the inner will of the person burning the money in question. Apart from that, this also gets the penalties written off because they are considered connected to the public interest.


2020 ◽  
Vol 3 (3) ◽  
Author(s):  
Can Liu

This article mainly studies the current status of the operation of the "burning money model" of Internet products, expounds and analyzes the disadvantages of this operating model, studies the practical effects brought by the "burning money model", and explores the development direction of future Internet products. Domestic scholars have done a lot of research on the development of Internet products in the future and have achieved certain results. This article aims to discuss the development model of China ’s Internet products, summarize the current “burning money” behavior in the operation process of Internet products, and combine the development situation of China ’s Internet in the new era to make suggestions for the future development of Internet products.


2016 ◽  
Vol 36 (1) ◽  
pp. 81-99
Author(s):  
Filipe Costa de Souza ◽  
Leandro Chaves Rêgo

2015 ◽  
Vol 56 ◽  
Author(s):  
Ralf C. Staudemeyer ◽  
James Connan

Protecting computing infrastructure is an expensive but necessary task. Companies that run their own computing infrastructure need to constantly vigilant in order to guard against intruders on their networks and groups or individuals that seek to intercept their communications. Companies turn to Firewall and Intrusion Detection System vendors to help them safeguard their information and infrastructure. These companies are putting their faith in expensive devices that attempt to distinguish between friendly and malicious traffic. Despite the expense and complexity of these systems, malicious users seem to find ways to avoid detection and news of massive breaches have become an almost daily occurrence. We propose to fundamentally change the way to look at information security. We highlight some of the fundamental flaws in current systems and expose risks that many experts know, but are not aware of.


2013 ◽  
Vol 30 (3) ◽  
pp. 211-218 ◽  
Author(s):  
John W. Pracejus ◽  
Thomas C. O'Guinn ◽  
G. Douglas Olsen
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document