This study agrees with the idea that a situation centered perspective provides a useful contribution in understanding women's attitude on organizations. Women's occupational experiences are less related to their "femaleness" than to the structural constraints inherent in the occupational positions women fill. So characteristics of the organizational situation including gender composition and hierarchical status may "shape and define" women's experience on the job. The present study examined the managerial level's gender gap and "glass ceiling" of the corporation. According to Kanter, if the ratio of women to men in organizations begins to shift, as affirmative action and new hiring and promotion policies promised, forms of relationships and corporate culture should also change. However, the mere presence of women on workplace may not, in itself, result in women-friendly work condition. This study analyzes "Korean Women Manger Panel survey(2010 3rd. wave)" to examine how much gender gap of the managerial level persists and when the glass ceiling effect emerges. Using t-test and ANOVA, various aspects of the gender gap within managerial level were verified. The most significant finding is the glass ceiling effect starts from very low level of management. Policy implications from the statistical analysis of the Panel survey are: 1) We need to increase the absolute number of the women managers for securing middle level women leadership pipe line. 2) We need to confront the fact that the glass ceiling starts from the very low managerial level, and to explore more realistic way to break up the vicious circle for the tokenism. and 3) We need to looking beyond numbers in approaching women's matter at work. At the cultural and institutional level, work-family programs and policies, women's ratings of their competence, and family-friendly organization's climate should be considered.
The aim of this article is to illuminate the Park Yeol(朴烈)·Kaneko Humiko(金子文子) Case from the perspective of performance, by analyzing newspapers published in Colonial Korea. The Park Yeol·Kaneko Humiko Case include the High Treason Incident(大逆事件) case and the mysterious photo(怪寫眞) case that occurred in Tokyo in Imperial Japan from 1923 to 1926. Even though Park Yeol·Kaneko Humiko were individually imprisoned during this period, they proceeded to act shrewdly and preposterously as performers. First, they made the trial itself into an astonishing case by donning traditional Korean clothes and insisting on using the Korean language in Japanese Imperial Court. Second, they caused the judge in charge to accidentally take the so-called 'mysterious photo,' which later led to the collapse of the Japanese cabinet. The newspapers published in Colonial Korea served as unique stage on which Park Yeol and Kaneko Humiko performed. The newspaper articles reported on the public trials as if it were a drama, describing their clothes, look, and dialogue in public court. The news about them was published not as it occurred but in a plotted sequence because of a press ban, consequentially building suspense among readers. Meanwhile, the Korean newspaper editorials pointed out the injustice of the High Treason Incident, breaking down the Japanese judge's opinion. The Park Yeol·Kaneko Humiko Case was a social drama that revealed the disharmony that led to the breakdown of Taisho Democracy and imprinting national resistance in Japan as well as in Korea.
The Red Book is a personal record that contains Jung's psychological self-experiment and describes his own experiences of the individuation process. Throughout The Red Book, Jung describes how he got caught by the spirit of the depths and dethroned the spirit of this time, how he regained his lost soul by getting to the bottom of inner processes, how he differentiated the soul upon encountering the various aspects of his soul, and finally how he confronted God approaching Jung in the form of the divine opposites. The spirit of the depths as a personification of the collective unconscious caught up with Jung and launched him into the individuation process. The spirit of the depths was "the God yet to come". Jung realized that he had been driven by the collective spirit of his time and then set off on a journey into a new territory of life under the guidance of the spirit of the depths. Jung first encountered his lost soul, afterwards experiencing various aspects of the soul-spirit duo such as Salome-Elijah, Helena-Simon, and Baucis-Philemon. In the process of individuation, the initial experience of the soul can appear to the ego as a Satanic force which darkens the consciousness. The Red Book describes how Jung consciously integrated the Satanic force and came to realize the meaning of it. Jung's experience of emotionally gripping aspects of the soul led him to the awareness of the dark side of God, Satan, while the insights he gained from that Satanic emotionality led him to the awareness of the bright side of God, Christ. Through this process, he finally encountered the opposites in God. Jung also referred to the Self as an image of God which manifests itself in the psyche. Jung later discovered God as a phenomenal psychic reality which incarnates itself from the unconscious into the conscious. He did it in terms of strict empirical science. Although the incarnation process of the deity is the main cause of psychological conflict and distress of a human being, if accepted consciously, we come to realize that the incarnation process of the deity in the psyche is the ultimate teleology and meaning of our life as well.
The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.
According to one Medicare report, in the US, total federal spending on health care expends almost 18 percent of the nation's GDP, about double what most industrialized nations spend on health care. And in 2011, Medicare spending reached close to $554 billion, which amounted to 21 percent of the total spent on U.S. health care in that year. Of that $554 billion, Medicare spent 28 percent, or about $170 billion, on patients' last six months of life. So what are the reasons of this high cost in EOL care and its possible solutions? Much spendings of Medicare on End-of-Life care for the terminally ill/chronically ill in the US has led health economics experts to assess the characteristics of the care. Decades of study shows that EOL care is usually supply-sensitive and poor in cost-effectiveness. The volume of care is sensitively depending on the supply of resources, rather than the severity of illness or preferences of patients. This means at the End-of-Life care, the medical resources are being overused. On the other hand, opposed to the common assumption, "The more care the better utility", the study shows that the outcome is very poor. Actually the patient preference and concerns are quite the opposite from what intense EOL care would bring about. This study analyzes the reasons for the supply-sensitiveness of EOL care. It can be resulted from the common misconception about the intense care and the outcome, physicians' mission for patients, lack of End-of-Life Care Decision which helps the patients choose their own preferred treatment intensity. It also could be resulted from physicians' fear of legal liabilities, and the management strategy since the hospitals are also seeking for financial benefits. This study suggests the possible solutions for over-treatment at the End-of-Life resulting from supply-sensitiveness. Solutions can be sought in two aspects, legal implementation and management strategy. In order to implement advance directive properly, active ethics education for physicians to change their attitude toward EOL care and more conversations about end-of-life care between physicians and patients is crucial, and incentive system for the physicians who actively have the conversations with patients will also help. Also, the general education towards the public is also important in the long run, and easy and official advance directive registry system-such as online registry-has to be built and utilized more widely. Alternative strategies in management are also needed. For example, the new strategic cost management and management education, such as cutting unnecessary costs and resetting values as medical providers have to be considered. In order to effectively resolve the problem in EOL care for the terminally ill/chronically ill and provide better experience to the patients, first of all, the misconception and the wrong conventional wisdom among doctors, patients, and the government have to be overcome. And then there should be improvements in systems and cultures of the EOL care.
This thesis compares and analyzes the dynamics between policy, knowledge and power of Myanmar's higher education development. The papers begins by exploring the dynamics during the Socialist Military Regime(1962~1988), the Collapse of Higher Education Era(1988~2010), Thein Sein's Reform Era(2010~2015) and the current Aung San Suu Kyi's Civilian Era(2015~Now). By highlighting recent dramatic policy changes, the article argues that the policy discourse on the subject of internationalization of higher education and the technocratization of education development policy by the current Civilian Government in its new policy discourse, that resulted in the active participation as well as the contributions of international donors has directly impacted on the policy dynamics around the Comprehensive Education Sector Review and the introduction of the National Education Strategic Plan 2016~2020. Further, by examining complex interaction between the current domestic education stakeholders and international donors in education sector in Myanmar, this thesis argues that the new analytical framework on the understanding of policy dynamics in developing countries goes beyond the national level. The paper argues that there needs to be broadening of the analytical framework towards the multidimensional analysis perspective that includes global, national as well as local level policy, knowledge and power dynamics in Myanmar's dynamically changing higher education sector.
According to the "Special Act on the Restoration and Maintenance of the Core Relics of the Shilla Kingdom" enacted in 2019, the Shilla Kingdom refers to the capital of Shilla and Unified Shilla period, and refers to Gyeongju, where the king lived, and the nearby area. Shilla Wanggyeong is a heritage registered on the UNESCO World Heritage List in 2000 under the name of Gyeongju Historic Site and belongs to Wolseong District, Hwangnyongsa District, and Daeneungwon District among the five districts registered as Gyeongju Historic Site. Unlike the Namsan and Sanseong districts, the Shilla Kingdom is a heritage consisting mostly of archaeological sites without physical substance. Gyeongju City sought to promote local tourism while providing more direct experiences to visitors by restoring the heritage that constitutes the Shilla Kingdom. Starting with the restoration of Woljeonggyo Bridge in 2005, the Shilla Wanggyeong restoration project began in earnest. Gyeongju City tried to restore the building site on the west side of Donggung Palace and Wolji after Woljeonggyo Bridge, but it was canceled due to opposition from the UNESCO World Heritage Committee. The World Heritage Committee opposed the restoration and recommended a heritage impact assessment for similar projects in the future. During the miscarriage impact assessment procedure, there is an OUV attribute analysis process of the heritage to be evaluated. This study intends to preemptively derive OUV attributes for the Silla Kingdom through literature and overseas case analysis. In the case of literature research, domestic and foreign research data related to the UNESCO World Heritage Convention and World Heritage Management were examined, and in overseas cases, the architectural works of Krakow Historical District, Stonehenge and Abbury Geoseok Ruins in England, and Le Corbusier were analyzed. Through this, the outstanding universal value attributes of the Silla Kingdom were derived. This study is expected to be used as a reference in the process of restoration projects of other heritage constituting the Shilla Kingdom or construction plans in nearby areas in the future and serve as an indicator to improve the management system of the Shilla Kingdom more efficiently from the perspective of world heritage.
This study investigated body images based on the survey data drawn from college students in three East Asian countries(Korea, Japan, and China). 347 Korean, 341 Chinese, and 271 Japanese college students responded to questions designed to measure body images such as body-related values (operability, inclination, locus of evaluation, and instrumentality of appearance), body esteem (appearance, and health), and objectified body-consciousness ( surveillance and shame). The results showed that body images differ among countries. Regarding body-related values, Korean students have least conservative beliefs and followed by Japanese, and Chinese. Korean students showed the highest acceptance level for the voluntary body alteration(operability), highest inclination to body appearance over health. They also showed the strongest tendency of evaluating their body from the observer's point of view and the strongest belief about the social utility of body appearance compare to Japanese and Chinese students. Appearance- esteem of Korean was similar to Chinese but higher than Japanese. Surveillance and shame about body appearance of Korean students were similar to Japanese but higher than Chinese. Compare to male students, females showed stronger belief about the body appearance over health, lower appearance esteem, and higher surveillance and shame about body. Korean women showed the least conservative body-related values, and the levels of body appearance esteem and objectified body consciousness were located in between Japanese and Chinese women. Japanese women showed especially low body appearance esteem and highest surveillance and shame. Chinese women showed the most conservative body-related value, the highest appearance-esteem, and the lowest surveillance and shame. It was revealed that the body-related values indirectly affect to appearance-esteem through the mediating role of objectified body consciousness in Chinese and Japanese samples, but that the body-related values had direct effect on appearance-esteem as well in Korean sample.
User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.
This fMRI study is aim to investigate effects of competitive environment in cognitive empathic process in human brain. Empathy is known as a crucial factor for human's adaptive behavior in aspects of social cognition and it is almost automatic process, on the other hand competitive situation is psychologically devastated environment to win someone for getting rewards. We hypnotized that reading and understanding of other person's mind are a specific characteristic related to survival evolutionarily, however competition would have an effect on the empathic cognitive process because of mechanisms of competition. To manipulate the competitive atmosphere, one researcher took a role of competitor against participants and they were instructed to get monetary rewards when their performance was better than a competitor. 21 participants(9 males and 12 females) performed to judge the emotional valence of the empathic task consisted of illustrated images with various situation could be experienced in real world as on $1^{st}$ person perspective in both competitive and non-competitive condition, and did same performance with objects stimulus in control condition. In order to examine the competition effects on empathic process,, hemodynamic response were obtained during fMRI session and the imaging data were analyzed to identify brain regions where responses to each condition across the two consecutive runs. Participants' reaction time in competitive condition was faster statistically significant than non-competitive one. Activation for competitive condition increased in the following areas: ACC, mPFC, SMG, thalamus extended caudate and Nacc, parahippocampal gyrus, and for non-competitive condition increased paracingulate gyrus, temporal pole, vmPFC, superior occipital gyrus. As a result of regression analysis using empathic scores as covariance, the rSMG, IFG, fusiform gyrus, thalamus, putamen were correlated with higher empathic levels, and TPJ were correlated with lower empathic scores. We suggest that these observations could mean competitive environment have an effect on neural base of cognitive empathic process.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.