• Title/Summary/Keyword: 정책 준수

Search Result 287, Processing Time 0.025 seconds

A Comparative Study on Dispute Settlement Mechanism between The Korea - US FTA and The WTO (한미 FTA 및 WTO 분쟁해결제도 비교고찰)

  • Kim, In-Gu
    • International Area Studies Review
    • /
    • v.13 no.2
    • /
    • pp.618-642
    • /
    • 2009
  • Currently the nations which join the WTO shall observe understanding on rules and procedures governing the settlement of disputes in WTO agreement. In addition this agreement provides it will be able to apply dispute settlement mechanism of the WTO. Korea and the United States are accomplishing an important role as the core members of the WTO. Regardless of this, The Korea - US FTA is providing a separate dispute settlement system. This paper pursues a comparative analysis concerning rules and procedures of dispute settlement between The Korea - US FTA and the WTO, and furthermore derives problems from the viewpoint of effectiveness, and suggests alternatives and implications in view of trade policy. I hope this study contributes to setting-up and development of national trade policy and is applied to FTA negotiation hereafter.

A Study on the Mitigation of Information Security Avoid Behavior: From Goal Setting, Justice, Trust perspective (정보보안 회피행동 완화에 대한 연구: 정보보안 관련 목표설정, 공정성, 신뢰의 관점을 중심으로)

  • Hwang, In-Ho
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.217-229
    • /
    • 2020
  • Globally, information protection of organization has become an essential management factor, and organizations continue to invest high-level resources for information security. Security threats from insiders are not decreasing. The purpose of this study is to present the antecedence factors to mitigate the role conflict that is the cause of the security avoid behavior. For the study, a survey was conducted for employees of organizations with information security policies, and structural equation modeling was conducted using a total of 383 samples for hypothesis verification. As a result of the analysis, role conflict increased avoid behavior, and goal difficulty, goal specificity, justice, and trust mitigated role conflict. In particular, justice influenced the reduction of role conflict and avoid behavior through trust. The implications were to present the causes and mitigation factors for avoid behavior of employee, and it is judged that it will help the organization to establish a security strategy.

Health Exercise Biodata Analysis Education in the Corona 19 Pandemic Era: Cognitive Analysis of MZ Generation Face-to-Face Practice Class Content (코로나19시대 보건운동생체바이오데이터 교육: MZ세대 대면실습 참여 콘텐츠 인식 분석)

  • Choi, Kyung A
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.317-325
    • /
    • 2021
  • By analyzing the recognition analysis and motivation method of the determinants, this study investigates the future development direction of health exercise biodata analysis face-to-face practice education content. The participants were 40 millennial and zoomers (MZ) generation college graduates. Factors related to the decision to participate in face-to-face practice classes in the field of health exercise biodata and bio-digital content convergence technology in the era of COVID-19 were measured. Of the participants, 67.5% voluntarily decided to participate in small group classes while observing social distancing rules. This study presented the most effective and learning motive methods to participate in face-to-face training. Health exercise biodata needs improvement in terms of integrating with adjacent disciplines such as big data.

The Influence of IS Technology and Communication Uncertainty on IS Voice Behavior: The Role of Susceptibility to Informational Influence of Employee (정보보안 기술 및 커뮤니케이션 불확실성이 제언 행동에 미치는 영향: 개인의 정보 영향 민감성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.165-175
    • /
    • 2023
  • As the reduction of information exposure threats by organization insiders contributes to achieving information security(IS) goals, organizations are establishing strict IS policies applicable to insiders and increasing investment in IS systems. However, since IS incidents cause damage to an organization even by malicious information exposure by one person, psychological support for strengthening IS compliance behavior by insiders. This study aims to confirm how the uncertain organizational environment related to IS affects individual IS-related behavior. We surveyed insiders of organizations operating IS policies and tested the hypothesis using 440 samples. As a result, IS technology and communication uncertainty reduced IS voice behavior through IS prospective anxiety, and individuals' susceptibility to information influence moderated the relationship between IS technology, communication, and prospective anxiety and IS voice behavior. Our results suggest the necessity and direction of supplementing the uncertain IS environment in practice.

Analysis of changes in the Naesung stream channel and vegetation under hydrological fluctuations since 2010 using the ece-morphodynamic model (수문식생지형 모델링을 활용한 2010년 이후 수문 변동 조건에서의 내성천 하도 및 식생 변화 분석)

  • Choi, Hun;Lee, Chanjoo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.54-54
    • /
    • 2022
  • 수변식생(riparian vegetation)은 하천 지형학적 프로세스에 영향을 미치는 요인 중 하나로, 최근 기후변화와 더불어 중요성이 커지고 있다. 내성천은 사질 곡류 하천으로, 2014년과 2015년 유량 감소에 의해 급격한 식생의 정착이 나타났다. 내성천 수변식생의 정착 및 활착은 수문-지형학적 프로세스에 영향을 미쳤고, 결과적으로 하도와 범람원의 형태를 변화시켰다. 이와 같은 변화를 예측하고 분석하는 것은 이수, 치수 및 방재 정책과 생태계 사이의 균형 및 조화를 추구하는 정책결정에 필수적이다. 그러나 식생을 고려하지 않은 기존의 수문-지형 모델링에서는 이와 같은 변화를 재현할 수 없다. 본 연구의 목적은 흐름, 식생, 지형의 상호작용이 하천 지형에 미치는 영향을 시각화 및 분석하고, 식생을 고려하지 않은 기존의 모델들의 결과와 비교하고자 한다. 본 초록은 이를 위해 수문-지형학 모델인 D-Flow-FM을 수변 식생 모델과 결합한 커플링 모델(Van Oorschot et al., 2016)을 활용하여 내성천에서 2013년부터 2019년까지의 발생한 지형학적 프로세스와 식생 사이의 상호작용을 재현한 예비결과이다. 식생 모델 결과는 내성천 현장조사 자료와 원격탐사 자료를 이용해 검보정하였다. 식생을 고려한 모델의 하천 형태는 식생을 고려하지 않은 모델의 결과에 비해 좁고 깊은 형태로 나타났으며, 지형학적 변동성이 적게 나타났다. 이는 유량 변화와 관련하여 생태-지형학적 프로세스로 인한 수변 식생 변동성이 강의 형태에 영향을 미쳤다는 것을 보여준다. 모의된 하천의 형태학적 특성이나 식생의 분포 특성은 항공사진과 비교했을 때 준수한 수준이다. 본 모델은 기후변화에 따른 식생의 변동성이 하천에 미치는 영향을 연구하는 데에 활용할 수 있으며, 수문-생태-지형학적 프로세스에 의한 하천의 변화를 예측하고 분석하는 데에 유용하게 활용할 수 있을 것이다.

  • PDF

Policy measures to improve the efficiency of the supervisory system for Regulatory Agencies (감찰 감사조직에 대한 감독제도 효율화 정책방안)

  • Kiyeung Kim;Namje Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.721-727
    • /
    • 2023
  • To prevent corruption, waste, and abuse in national governance, audit agencies are established and granted significant authority and responsibilities, including ensuring their independence. However, questions have been raised about who oversees these agencies and addresses issues or misconduct that may arise within them. In the United States, to address this oversight concern, the Inspector General Act was enacted, creating an audit community called the Inspector General Community. This community comprises various audit agencies and promotes compliance with standards and investigates potential wrongdoing by audit personnel. It fosters a culture of independence and collaboration among diverse stakeholders, such as Congress, the President, the Government Accountability Office, and agency leadership. In light of this successful approach in the United States, this research seeks to study and apply similar oversight mechanisms to audit agencies in South Korea. There is a need to develop the relationship between oversight bodies and parliament in terms of improving the efficiency and effectiveness of government operations. Accordingly, this paper studies this American case and presents efficient policy measures for the supervisory system to be applied to Korea's audit organizations. It aims to identify policy insights for effective supervision, ensuring independence, and fostering a collaborative culture within our audit institutions. Therefore, domestic interest and research on this matter are essential to enhance our audit mechanisms and achieve efficient governance.

Research on Precision Processing Production System based on Manufacturing Execution System (제조 실행 시스템 기반 정밀 가공 생산 시스템 연구)

  • Seong-Uk Shin;Hyun-Mu Lee;Seung-Ho Park
    • Journal of Digital Policy
    • /
    • v.2 no.4
    • /
    • pp.17-23
    • /
    • 2023
  • In this paper, in order to improve production processing for small and medium-sized precision processing companies, we apply a manufacturing execution system to existing process methods and integrate precision processing data to strengthen process management within the company, increase facility operation efficiency, and realize a reduction in defect rates. The differences in productivity improvement and cost reduction rates were compared and analyzed. As a result, production productivity improved by 7.0% and product defect rate improved by 0.1% point due to the introduction of the manufacturing execution system. It was confirmed that manufacturing cost reduction improved by 10.0% and delivery compliance rate improved by 1.1%. If additional smart factory technology is applied based on the manufacturing execution system proposed in this study in the future, sales and profits in the processing industry are expected to increase due to an increase in the PQCD index.

Analysis of a Cross-cutting Issue, 'Access to Genetic Resources and Benefit-sharing' of the Conference of the Parties to the Convention on Biological Diversity (생물다양성협약 당사국회의의 핵심논제인 '유전자원에 대한 접근과 이익의 공유'에 관한 고찰)

  • Park, Yong-Ha
    • Journal of Environmental Policy
    • /
    • v.6 no.1
    • /
    • pp.41-60
    • /
    • 2007
  • Attempts were made to define the elements of debates, impact of decisions of the Access to Genetic Resources and Benefit-sharing(ABS) of the Conference of the Parties(COP) to the Convention on Biological Diversity(CBD) In Korea. Providing policy suggestions to cope with ABS, a cross-cutting issue of the meetings of the COP, was also undertaken. Meetings concerning ABS deal with several key matters such as an international regime, which is a legally binding implementation tool of the Bonn Guidelines, an international certificate of genetic resources' origin/source/legal provenance, and disclosure of origin of genetic resources, compliance measures with prior informed consent of the Contracting Parties providing such resources and with mutually agreed terms on which access was granted. Developing countries, rich in biodiversity and genetic resources, use the CBD as a major tool to maximize their national profits. They demand for national sovereign rights for the genetic resources and indigenous communities providing associated traditional knowledge. At the meetings of the COP, in addition, they requested that developed countries should transfer technologies and provide a financial mechanism for resource conservation to them. On the contrary, the developed countries argue that facilitating access to genetic resources is essential for scientific research and development, and that both Intellectual Property Rights and biotechnology using genetic resources should be protected to maximize their national benefits. Decisions of the COP concerning the Bonn Guidelines and compliance measures with ABS will affect on various socioeconomic fields of Korea, a country which is short of genetic resources. Especially, the importation of genetic resources and land development which might damage genetic resources will be limited seriously. Consequently, overall expenses will increase for the securing genetic resources from the foreign countries and developing biotechnology for conservation and sustainable uses of genetic resources. To minimize the adverse impacts, we endeavor to establish our clear standpoint and to lead the international trends, which are favorable for us. In order to achieve these objectives, government needs i) to proceed researches to lead the international ABS debates actively and to prepare the expected decisions of the future meetings of the COP, ii) to establish a national implementation plan to cope with the ABS and its related decisions, iii) to examine and improve the efficiencies of the national implementation plan with a proper monitoring system, and iv) cope with the other international meetings including the meetings of Trade Related Intellectual Properly Rights and International Treaty on Plant Genetic Resources for Food and Agriculture actively.

  • PDF

Usage of the International Standards for the Process of Methodological Acts and Software of the Records Management (기록관리 방법론 법제화와 소프트웨어 개발을 위한 국제표준의 활용)

  • Bolortuya, P.
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.1
    • /
    • pp.189-192
    • /
    • 2013
  • Since 2008, the General Archives Authority of Mongolia introduced management standards on international records, such as ISO 15489. GAAM translated the international standards and have trained government records managers with such standards. These international records management standards are also incorporated into the Mongolian records legislations and records management guidance. Complying with the standards are also the requirements for designing records management software in Mongolia.

A Study on the Definition of Security Requirements of Vulnerability Management in Analysis Step (분석단계에서 취약점 관리의 보안 요건 정의에 관한 연구)

  • Shin, Seong-Yoon;Lee, Hyun-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.3
    • /
    • pp.75-80
    • /
    • 2015
  • Vulnerability management is in compliance with security policies, and then, this is to ensure the continuity and availability of the business. In this paper, the application vulnerability management and IT infrastructure of the system is that it must be identified. And a viable vulnerability management plan should be drawn from the development phase. There are many that are not defined vulnerability in the area of identification and authentication, encryption, access control in identification and classification of vulnerabilities. They define the area without missing much in technical, managerial, and operational point of view. Determining whether the response of the identified vulnerability, and to select a countermeasure for eliminating the vulnerability.