Transactions Security Tools in Account Receivables Management

被引:0
|
作者
Wodynska, Anna [1 ]
机构
[1] Gornoslaska Wysza Szkola Handlowa Katowicach, Katowicach, Poland
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Large competition among goods and services suppliers caused that granting clients deferred term of payment became a standard, so in other word granting clients commercial credit is a standard. Companies try to limit credit risk by securing their trade transactions in accordance with their credit policy that determines in some way the choice of trade transaction security tools. This article presents a full range of trade transaction security tools according to the general division into personal and property securities. The author pays attention to the fact that while conducting a proper credit policy in relation to clients, a company has chances to monitor efficiently the receivables and insist on their payment as well as use, as needed, the earlier prepared trade transaction security tools. The author convinces that regardless of the choice of trade transaction security tools, or reasons leading the receivables managing person, the basic criterion of security evaluation shall be its real, checked and verified value. The pledge on an object that does not exist is not worth much. The same applies to security granted by an insolvent person.
引用
收藏
页码:111 / 124
页数:14
相关论文
共 50 条
  • [31] RECEIVABLES AND ... BOTTOM-LINE CREDIT MANAGEMENT
    不详
    INDUSTRIAL DISTRIBUTION, 1979, 69 (05): : 203 - 205
  • [32] Online E&P asset management tools accelerate market transactions
    Fockens, P
    Warren, WE
    OIL & GAS JOURNAL, 2001, 99 (17) : 18 - +
  • [33] Tools that troubleshoot database transactions
    Bruno, Lee
    Data Communications, 1996, 25 (10):
  • [34] Factoring account receivables towards mitigating cash flow fluctuation for construction projects
    Chen, Jieh-Haur
    Chen, W. H.
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5538 - 5542
  • [35] TENDER AS RELATED TO SECURITY TRANSACTIONS
    Wickhem, John D.
    IOWA LAW REVIEW, 1942, 27 (04) : 579 - 600
  • [36] Security in Mobile Governmental Transactions
    Khozooyi, Nassim
    Tahajod, Maryam
    Khozooyi, Peyman
    SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 168 - +
  • [37] Security Research of Online Transactions
    Wei, Xianmin
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 773 - 776
  • [38] On the Security of Tenant Transactions in the Cloud
    Varadharajan, Vijay
    Tupakula, Udaya
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 525 - 530
  • [39] Tax Planning for Security Transactions
    Gutkin, Sydney A.
    Beck, David
    TAXES-THE TAX MAGAZINE, 1953, 31 (11): : 906 - 931
  • [40] MATERIALS IN THE LAW OF SECURITY TRANSACTIONS
    Cormack, Joseph M.
    COLUMBIA LAW REVIEW, 1933, 33 (04) : 777 - 779