• Title/Summary/Keyword: 환경적 침해

Search Result 394, Processing Time 0.031 seconds

A Study on Economic Evaluation of Beneficiary Pays Principle in Water Resource Management - The Case of Namyangju in Korea - (수자원관리 부문에서 수혜자부담원칙 경제적 평가에 관한 연구 - 남양주시 사례분석 -)

  • Yoon, Jaehyun
    • Journal of Environmental Impact Assessment
    • /
    • v.23 no.5
    • /
    • pp.323-336
    • /
    • 2014
  • Using hedonic price method, this paper analyzes the impact of restriction for water quality protection on property value with the officially announced price of reference land in the city of Namyangju in 2012 to evaluate Water Use Fee, based on beneficiary pays principle, levied on the downstream area of the Han River in Korea. The results from the regression analyses of the models used show that the double-log model is the preferred model in the case of Namyangju. Using the double-log model, the total compensation for the city of Namyangju is estimated to be 8.6 trillion won with 95% confidence interval between 4.4 trillion and 12.4 trillion won. Under the perpetuity compensation scheme at the discount rate of 10%, the estimated annual compensation is 0.9 trillion won with 95% confidence interval between 0.4 trillion and 1.2 trillion won. This is more than Water Use Fee collected in 2012 for the Han River, which is approximately 0.5 trillion won. Considering the size of the restricted area of the Paldang area, which is more than 18 times of that of Namyangju, the rate of Water Use Fee, which is based on beneficiary pays principle and imposed on the residents of the downstream area, needs to be increased to sufficiently compensate the economic loss caused to the upstream areas of the Han River in Korea.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.

A Plan to Provide Effective Risk Map Information by Linking a 3D Disaster Information Display System with an On-site Assistance Application (3D 재해 정보 표출시스템과 현장 지원 APP간의 연계를 통한 효과적인 Risk Map 정보제공 방안)

  • KIM, Do-Ryeong;GANG, Su-Myung;RYU, Dong-Ha;PARK, Ju-Sung;JO, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.1
    • /
    • pp.141-153
    • /
    • 2016
  • The increase in frequency and scale of natural disasters is the typical negative examples of the global climate change and the change of the human living environment in cities. The damage caused by natural disasters in particular including human and physical damage is directly linked to the safety and properties of citizens. Besides, the damage may occur to SOC facilities directly or indirectly. The SOC facilities damaged by disasters cause infringement of citizens safety rights. Therefore, a plan to provide prompt and effective risk map information by linking a 3D disaster information display system, which handles the information of the damage that may occur to SOC facilities such as bridges, beams, and dams at the time of disasters, with an on-site assistance application is suggested in this study. The prompt provision of risk map information is defined as a dynamic expression technology in this study. Also, disaster information is processed and compressed with a module developed to be linked organically to a system that displays disaster information, a proliferation system that can use the information on site, and a DB system that constructs a relationship with the information. Based on the module, the effective disaster information compression plan will be prepared, and the prompt information transmission system will be secured in the future.

Constitutional Protection for the Secrecy of Wire Communication and Freedom of News Reporting on Public Affairs (공적 인물의 통신비밀보호와 공적 관심사에 대한 언론보도의 자유: '안기부 X파일' 사건에 대한 서울고법 2006노1725판결을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.38
    • /
    • pp.211-244
    • /
    • 2007
  • Article 17 and 18 of the Korean Constitution respectively prescribe the violation of individual's right to privacy and the secrecy of wire communication. Meanwhile, Article 20 of the Criminal Code provides that an act which is conducted within the ambit of laws or pursuant to accepted business practices or which does not violate the social norms shall not be punishable. In 1999, the Constitutional Court held that media reports on public matters of public figures must be given strong constitutional protection, and treated differently from reports on private matters of private figures. In accordance with the decision, the Supreme Court has expanded the scope of constitutional guarantee of freedom of expression since 2002. This study analyzes the issue of media liability for publication of illegally intercepted wire communication by a third person. Particularly, it reviews Seoul High Court's ruling on 'X-file scandal' which disclosed intercepted wire communications between notable public figures regarding a slush fund for a presidential candidate. In the light of this analysis, the study concludes that the media reporting of the intercepted communication does not violate social norms of Article 20, and therefore it is entitled to a constitutional privilege.

  • PDF

A Study on Package Design of Intellectual Property Protection Programs -a focus on trademark and registration of design- (패키지디자인의 법적보호에 관한 연구 -의장 및 상표등록을 중심으로-)

  • Yang, Cho-San
    • Archives of design research
    • /
    • v.17 no.4
    • /
    • pp.27-36
    • /
    • 2004
  • The protection of intellectual property right in international conventions are worldwide or regional areas already exists a century. Therefore, our country is positive affiliated with international conventions. After that time, such as a violation of international convention and an example of imitations are continually that we prognosticate the international trade market activities was difficult not only became an issue of country credit risk. At this point, the major purpose of this study make an analysis of both paralleled with the case study follow an example and the comprehension with concerned about recognition of intellectual property right. In additionally, it stands a plan of package design protections under the WTO systems. This study have carried out a theoretical and practical analysis of intellectual property right and statistical analysis through the inside and outside of the country packaging design study and a case study of troubles with intellectual property. Besides, it is accomplish the purpose of the study that established exploratory study survey about inside and outside of the country packaging design infringement case study and relative package design industry employees with consumptions real research. I hoped that this study will be a foundation on which packaging, design industry protections to intellectual property right.

  • PDF

Legal Issues of Urban Parks as a Reservation Area in the Initial Legislation on Urban Parks in Korea and the Implementation of the Park Act (1967~1980) (우리나라 도시공원 관련 초기 법률 입안과 「공원법(1967~1980년)」 시행과정에서 나타난 유보지로서 도시공원에 관한 제도의 문제)

  • Oh, Chang-Song
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.46 no.3
    • /
    • pp.103-116
    • /
    • 2018
  • The Park Act (1967~1980) was the first law to define urban parks in Korea. The urban parks of that time were similar to a reservation area used for other purposes after giving regulation. Because 'the urban park as a reservation area' in the past is a repeated park issue in the present, it is necessary to consider the issues of the original law system that created the cause. From this perspective, this study analyzed the legislation to reserve an urban park by collecting bills and information about the factual relationship between 1960 70s park issues and the Park Act. Analysis showed that the reason for the adoption of different kinds of urban parks in the law of a nature park is that a negative list separated from the Urban Planning Act is required to curb private usage. Inherent in the Park Act, however, was the problem of allowing the encroachment of urban parks by governmental power. (1) The Park Act sets out a wide range of cases to abolish urban park. (2) Unclear setting of governmental power could abuse the urban park. (3) Insufficient standards were able to erode the urban park with large for-profit facilities. (4) The inactivity of the Urban Public Park Committee had reduced democratic decision-making and professional judgement on park issues. Therefore, the Park Act was characterized as infringing on the environment and right to urban parks and took a passive attitude in creating parks and in citizen usage thereof. The Park Act had limitations as a progenitor for establishing the characteristics and concepts of urban parks.

A Study on Developing Policy Indicators of Personal Information Protection for Expanding Secure Internet of Things Service (안전한 사물인터넷 서비스 확산을 위한 개인정보보호정책평가지표 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.29-51
    • /
    • 2018
  • As the core technology of the Fourth Industrial Revolution, the Internet of Things has been developed and has enabled various services, and personal information has been handled freely in the process. However, the infringement threat of personal information is increasing as more convenient services are provided and more information devices including smart devices are connected to the network. Therefore, this study is to analyze prioritizing personal information protection policy indicators in order to provide IoT services by constructing secure environment for implementing the Internet of things as the core technology of the 4th Industrial Revolution. This study reviewed personal information protection policy indicators based on the literature survey, and identified 3 fields, 9 areas, and 25 indicators through Delphi analysis for experts. The weights were calculated based on the AHP survey for 66 experts and the results were used to present the relative importance and priority of the policy indexes. The results of this study found the policy field was the most important, followed by the technical field, and the administrative field. Of the three areas of the policy field, strengthening the personal information protection laws related to IoT is the most important, while among the indicators, promoting and revising the personal information protection law related to IoT is the most important. Comparisons of the fields, areas, and indicators of IoT-related personal information protection policies found consistent values. The personal information protection policy indicators derived this way will contribute to the nation's competitiveness by expanding secure IoT policies in the future.

A Study on the Relative Importance of the Administrative and Technical Measures for the Personal Information Protection (개인정보의 관리적·기술적 보호조치 기준의 상대적 중요도에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.135-150
    • /
    • 2014
  • As the collection and use of personal information increases, the accidents that abuse and leak personal information are continuously increasing. The nation has established new laws and strengthened related laws for the prevention of the mass leakage of personal information and the secondary damage due to the leaked personal information. The nation also established the guidelines that need to be implemented by the institutions handling personal information for the safety of the personal information. For the efficient implementation of guidelines under the limited time and resources, it is necessary to establish the priorities between guidelines. This paper compares the relative importance of the guidelines by AHP (Analytic Hierarchy Process) technique. We performed the analysis on two expert groups, the group of consultants working in information security consulting company and the group of information security staffs handling personal information directly in the company. We compared the differences between groups and recommended the relative importances of the guidelines.

Institutionalization of the Value of Ecosystem services (생태계 서비스 가치의 제도화)

  • Hwang, Eun-Ju;Chun, Jae-Kyong
    • Korean Journal of Environment and Ecology
    • /
    • v.31 no.3
    • /
    • pp.337-343
    • /
    • 2017
  • This study is going to contribute the activation of ecosystem services written in the 3rd National Basic Plan for Nature Conservation(2016~2025) in Korea. Meanwhile we considered the benefits that the nature has given to the humankind as free goods or services which we may consume traditionally without due payment therefore. But on account of the expansion of cities and expedition of development, as the carrying capacity of the nature has been breached, people have come to try to restore and enhance artificially such vulnerable capacity. It is necessary to compensate the opportunity cost which the land owners or occupiers have to pay for conservation and maintenance of natural capitals which yield the ecosystem services. Therefore the institutionalization of ecosystem services should be established that the consumers who enjoy such services should share the interest from enjoying services with the land owners or occupiers who produce the ecosystem services, under the legal system which will make it possible to connect the benefit sharing with the conservation of environment. However it is the first task that the present legal system could not realize the fair and equitable benefit sharing between the producers and consumers of ecosystem services. And the second task in such legal system is that the value of ecosystem services could not be fully considered in the process of development planning. According to the analysis of this study, the institutionalization of ecosystem services in the government side and the civilian side could be realized to somewhat extent, although not sufficient. Especially the transactions of ecosystem services through the private contract among stakeholder are possible in the course of development planning or without any relevancy to a development project. The final task in the institutionalization of ecosystem services is how to assess the ecosystem services and to value the economic benefits therefrom on the basis of what kinds of procedures relating to some development processes. To overcome such difficulties, it is necessary that the state, trend and change of ecosystem services confronting with a developing project should be assessed concretely at the threshold of development. It is possible to integrate the ecosystem services into the environmental impact assessment(IEA), not by way of the Act of IEA, but by way of the Decree thereof.