This study's purpose is to present the improvement of effectiveness of security activity for international conference which can be held hereafter. On the basis of security activity problems originating in G20 summit meeding that had been held in Seoul in 2010. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Seoul G20 summit meeding and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role of event site activity stage for international conference are as followings; First, 'security protocol section' protocol and security are needed mutual win-win enough to be compared with adaptative relationship, thereby being demanded the closer cooperation and information exchange. Second, 'situation management section' there is a need of reinforcing the cooperative system between situation rooms of each agency in order to possibly operate all of the security manpower integrally, which are dispersed by function and by event site, in addition to the swift and organic information exchange between wide-area local government and all the security agencies focusing on a preparation planning group. Third, 'security manpower resource management section' there is a need of encouragement and interest in the leadership in order to devise system that all of the security manpower can concentrate on event and to be possibly satisfied the given conditions. Fourth, 'local government cooperative support section' the wide-area local government of a hosting city as international city operates several kinds of the facilities for international conference, supports operation of conference, achieves a ripple effect of event such as tourism, maximizes service of accomodations, and performs the primary responsibility for the maintenance of the traffic facilities, thereby needing to execute special inspection under the responsibility of Si-Do governors.
Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.
Journal of Korean Society of Environmental Engineers
/
v.34
no.4
/
pp.260-269
/
2012
The aim of this study is to evaluate the applicability of adsorption models for understanding the thermodynamic properties of adsorption process. For this study, the adsorption isotherm data of $NO_3$-N ion onto a commercial anion exchange resin obtained at various experimental conditions, i.e. different initial concentrations of adsorbate, different dosages of adsorbent, and different temperatures, were used in calculating the thermodynamic parameters and the adsorption energy of adsorption process. The Gibbs free energy change (${\Delta}G^0$) of adsorption process could be calculated using the Langmuir constant $b_M$ as well as the Sips constant, even though the results were significantly dependant on the experimental conditions. The thermodynamic parameters such as standard enthalpy change (${\Delta}H^0$), standard entropy change (${\Delta}S^0$) and ${\Delta}G^0$ could be calculated by using the experimental data obtained at different temperatures, if the adsorption data well fitted to the Langmuir isotherm model and the plot of ln b versus 1/T gives a straight line. As an alternative, the empirical equilibrium constant(K) defined as $q_e/C_e$ could be used for evaluating the thermodynamic parameters instead of the Langmuir constant. The results from the applications of D-R model and Temkin model to evaluate the adsorption energy suggest that the D-R model is better than Temkin model for describing the experimental data, and the availability of Temkin model is highly limited by the experimental conditions. Although adsorption energies determined using D-R model show significantly different values depending on the experimental conditions, they were sufficient to show that the adsorption of $NO_3$-N onto anion exchange resin is an endothermic process and an ion-exchange process.
Journal of the Korean Academy of Child and Adolescent Psychiatry
/
v.11
no.1
/
pp.60-69
/
2000
Objective:This study was carried out to evaluate the reliability and validity of the Korean form of the Children's Yale-Brown Obsessive Compulsive Scale(CY-BOCS). Method:Forty-two children with obsessive-compulsive disorder(OCD)(31 boys and 11 girls, aged 7 to 18 years) were assessed with CY-BOCS. Interrater agreement was assessed by two raters in subsample(n=20). discriminant and convergent validity were assessed by comparing CY-BOCS scores to Clinical Global Impression-OCD(CGI-OCD), Leyton Obsessional Inventory-Child Version (LOI-CV), State-Trait Anxiety Inventory for Children(STAI-C), and Child Depression Inventory(CDI). Results:Internal consistency was high, measuring 0.86 for the 10 items and total score. The intraclass correlations for the CY-BOCS total, obsession, and compulsion scores were 0.94, 0.94, 0.84, suggesting excellent interrater agreement for subscale and total scores. The CY-BOCS total score showed highest correlation with CGI-OCD(r=0.88), and significant correlation with LOI-CV(r=0.51), Trait Anxiety score(r=0.43), and CDI scores(r=0.49), but it was not correlated with State-Anxiety score(r=0.25). Conclusion:The results of this study indicate that the Korean form of CY-BOCS is a reliable and valid scale for rating obsessive-compulsive symptom severity.
Journal of the Korean Institute of Landscape Architecture
/
v.45
no.3
/
pp.66-79
/
2017
In 2014, a Donghak Peasant Revolution Memorial Park design competition was held with various forms and techniques to convey mourning. This is a process of the reconsideration of memorial projects that are used to stimulate the collective memory and it is a meaningful resource for examining the consciousness of contemporary designers in regards to the memorial designs that are currently under planning in Korea. This study investigated the background of the Donghak commemorative projects that took place at the same site in a timely manner and analyzed the design competition through the existing literature research. Through this, it was seen that the memorial, which was formed by means of past political purposes, has changed into a way to collect various opinions and forms through open design competition. A framework of analysis prepared through multi-layer analysis is daily use, interaction and spontaneity, abstraction, temporality, locality, integration and harmony with surroundings. The results of this study are as follows. First, in order to convey memorial commemoration in everyday life, the projects organized scattered memorial spaces with special characteristics and linked them with daily activities program. Second, the projects used direct participation and emotional experiences to interact with monuments. Third, color, vertical elements, clustering, and park frame manipulation were used for abstract reproduction. Fourth, the projects introduce architecture and furniture that can be changed and plants for temporal change. Fifth, the previous terrain was restored and the setting of the scene was reproduced in order to make the site a space with place. Sixth, to improve the connection with existing monuments, the projects used techniques such as relaxation and the reinforcement of circulation lines and axes. Seventh, a path and a building conforming to the terrain were arranged for harmony with the surroundings.
The study is to grope for the unified device of the women's welfare policy in the United Korea by considering and comparing with the women's welfare in South Korea and North Korea centering on the women's welfare law and system among the social security laws and systems in the present both countries. The both Koreas have enforced the different women's welfare policies according to the different ideologies and constitutions. But in the welfare policy women are in the secondary stage by means of the ideology of sexual devision. It, therefore, is clear that the position of the North Korean woman goes in advance of the South Korean woman in the law and system. However, they are similar to the North Korean women in the aspects of the application of law and system. That is, both of them are discriminated not only in home and labor participation, but also in social welfare. There are the patriarchal family system and sexual devision of labor under the discrimination against woman. As though the both sexes are equal in law, the welfare law and system are applicated unequally to woman because of the ideology of sexual devision and familism which family should take the primary responsibility of welfare. From this perspective the women's welfare policy of the United Korea is not just to unify both laws and systems related women's welfare, but to search for the convergence on the higher level of quality and to make the real gender-equal society. The study suggests as the women's welfare the spread of the application of social welfare system, and social security network constructed through the mother protection policy, women's poverty and social security on basis of the primary principles such as the gender equal right as civil right, benefits of social welfare as social right, escape from the patriarchal familism, strengthening of resposibility of state and the principle of women participation in process of social welfare management. The device of women's welfare means building the social welfare system based on the real gender equality, so the unification will be the important turning point for the gender-equal society to the South-North Korean women.
KSCE Journal of Civil and Environmental Engineering Research
/
v.13
no.2
/
pp.73-84
/
1993
In this research, configuration design optimization of plane truss structure has been tested by using decomposition technique. In the first level, the problem of transferring the nonlinear programming problem to linear programming problem has been effectively solved and the number of the structural analysis necessary for doing the sensitivity analysis can be decreased by developing stress constraint into member stress approximation according to the design space approach which has been proved to be efficient to the sensitivity analysis. And the weight function has been adopted as cost function in order to minimize structures. For the design constraint, allowable stress, buckling stress, displacement constraint under multi-condition and upper and lower constraints of the design variable are considered. In the second level, the nodal point coordinates of the truss structure are used as coordinating variable and the objective function has been taken as the weight function. By treating the nodal point coordinates as design variable, unconstrained optimal design problems are easy to solve. The decomposition method which optimize the section areas in the first level and optimize configuration variables in the second level was applied to the plane truss structures. The numerical comparisons with results which are obtained from numerical test for several truss structures with various shapes and any design criteria show that convergence rate is very fast regardless of constraint types and configuration of truss structures. And the optimal configuration of the truss structures obtained in this study is almost the identical one from other results. The total weight couldbe decreased by 5.4% - 15.4% when optimal configuration was accomplished, though there is some difference.
This study's purpose is to present the improvement of effectiveness of security activity for international conference among Several Countries which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Busan in 2005. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role and importance of site activity stage for international conference among several countries are as followings ; First, the system that experienced security-enforcement agents can be selected for the next national security event is needed, by data-basing the security-enforcement agents who were experienced in security event as man power management. Second, the middle-term plan for the introduction of high-tech equipment and joint inspection with relevant security agents are needed for the efficient explosive technical detection. Third, high-tech security equipment could be introduced through the international high-tech security equipment exhibition. Fourth, an anti-terrorism plan should be measured by sharing information through the cooperation with domestic and international intelligence agency. Fifth, public relations should be measured systematically by organization rather than agents' individual public relations. Sixth, political consideration to secure integrative coordination with other agency is needed for security activity, through normal cooperation with fire fighting related agency such as an electric, gas, elevator company. Seventh, a definite press guideline is needed for a convenient news coverage and safety during security event.
The purpose of this study is to improve Korean food market competitiveness in China, and to develop product diversity. Therefore, the paper will discuss and analyze the feasibility of combining Korean and Chinese cuisines. The paper is based on a SPSS-analyzed survey of 255 Jiangsu residents focusing on the concept of breakfast, and the recognition of and preference for Korean food. The result showed a high level of eating out for breakfast in Jiangsu province and the expectation of many options. The respondents generally preferred porridge, steamed stuffed dumplings, noodles and other options that are relatively convenient. Korean foods such as bulgogi, samgyeopsal, tteokbokki and bibimbap generally enjoyed a high degree of recognition and preference. This study selected bulgogi, jeyukbokkeum, dakgalbi and japchae as the stuffings for steamed dumplings and an evaluation of sensory attributes including saltiness, sweetness, spiciness, and gravy was conducted using 30 professionals. Relatively high scores were recorded in all aspects. Compared with the reference product, the dumplings with Korean food stuffing achieved higher scores. As a new development and attempt, the steamed dumplings with Korean food filling evaluated during this test demonstrated feasibility and enormous market potential. The study provides a new direction and reference value for the Chinese breakfast market and for the penetration of Korean food into the Chinese market.
Journal of the Korean Institute of Landscape Architecture
/
v.44
no.6
/
pp.148-161
/
2016
In the case of the government, which plays a pivotal role in the landscape architecture system, the management of positions in landscape architectural organizations is lacking. At the local government level, while public officials for managing landscape architecture are being hired, there are problems and vulnerabilities in both management and system operations as such public officials recruited for positions in landscape architectural services operate under the forestry service. Accordingly, this study analyzed the Korean administrative system of public officials in the landscape architectural service and their satisfaction with the organizational culture and behavior. The aim was to provide practical data for improving the job satisfaction of public officials in landscape architectural service and enhance the status of landscape architecture. First, a survey was conducted regarding current organizational culture/behavior and job adequacy, and differences when compared to different job series with regards to the public officials in the landscape architectural service. The results indicated that job satisfaction of those in landscape architectural service was generally high, but they showed strong centralization, i.e., orders from superiors and limitations on autonomy. Second, an analysis was conducted to improve the organizational culture/behavior and job satisfaction of public officials in the landscape architectural service, and a comparative analysis was conducted on the differences between the analysis result and preceding studies by the Ministry of Government Administration and Home Affairs(2006). The results indicated that organizational commitment/satisfaction of public officials in the landscape architectural service was relatively low among those who had a great amount of work experience related to forestry. Therefore, it was shown that it is necessary to ensure expertise in landscape architecture. Third, a comprehensive analysis was conducted regarding the influences on "working environment", "legal system" and "job allocation" in regard to public officials in land architectural service. The results indicated that satisfaction in the value system was high when given significance to the job as public officials in land architectural. However, their satisfaction in the land architectural system was low due to the lack of independence in their positions, the vulnerable legal system of land architectural service and low employment rates. Fourth, current public officials in landscape architectural service process tasks such as forestry, architecture, city planning and administration that are not related to their area of expertise. Therefore, an analysis was conducted on whether there is a difference in the job satisfaction of public officials in landscape architectural service according to statistical variables. It was identified that "legal system", "job satisfaction" and "organizational commitment" with regard to public officials in landscape architectural service can be improved through ensuring their expertise. This study suggests the following tasks to further inquire into landscape architecture in general. First, establish an identity of work allocation for public officials in the landscape architectural service, and second, establish an organizational constitution according to the positions in landscape architectural service. Accordingly, it is necessary for interested parties of landscape architecture to devise practical strategies so that such tasks can be converged administratively and reflected in policies.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.