• 제목/요약/키워드: Circumvention

검색결과 13건 처리시간 0.021초

우회덤핑 방지 제도에 대한 연구: 미국 및 EU 제도를 중심으로 (A Study on Anti-Circumvention Rules: with Focus on the US' and the EU's Systems )

  • 조영진
    • 무역학회지
    • /
    • 제47권5호
    • /
    • pp.223-240
    • /
    • 2022
  • Anti-circumvention rules were discussed profoundly during the Uruguay Round and the DDA negotiations, although WTO members failed to reached an agreement to introduce it to the WTO Anti-Dumping Agreement. However, as the cases of circumvention of anti-dumping duties increase, a number of countries have enacted anti-circumvention regulations as part of their anti-dumping laws. This study aims to analyze anti-circumvention rules from the perspective of WTO law. After overviewing the object and purpose of anti-dumping and anti-circumvention regulations, it examines anti-circumvention regulations of the US, the EU, and India. Next, the study explores the possible WTO-inconsistent aspects of those regulations. Then, it discusses whether it would be preferable for countries not equipped with anti-circumvention regulations, such as Korea, to have one. Thereafter, this study proposes Korean government to introduce anti-circumvention rules into its anti-dumping law.

미국의 우회덤핑방지제도와 회피방지제도에 대한 우리나라의 대응방안 (Korean Countermeasures against the Anti-Evasion, Anti-Circumvention in US)

  • 오병석
    • 무역학회지
    • /
    • 제44권6호
    • /
    • pp.231-246
    • /
    • 2019
  • Circumvention refers to the situation in which exporters try to circumvent import restrictions by setting up factories in third countries and assembling and producing parts locally. Circumvention dumping eliminates the impacts of existing anti-dumping measures, and major countries are introducing anti-circumvention dumping laws to address this problem. If the act of the exporting country is recognized as a circumvention dumping activity, anti-dumping duties are applied retroactively to the imported goods or components. Evasion is an act of importation that results in the reduction or non-application of cash deposits, securities, or anti-dumping or countervailing duties, in a manner that is substantive or false, substantive or omission. In this article, we reviewed the contents and examples of the anti-circumvention measures by the US Department of Commerce (DOC), the International Trade Commission (ITC), and the Anti-Evasion measures by the CBP. The CBP examples show how much inference can be made about which parts of the CBP's investigations, and in what ways. The enactment of the EAPA created an environment in which the role of the CBP was directly guaranteed, and it was possible to apply adverse inferences to those who did not respond to requests for information, resulting in stronger CBP's authority. Therefore, it is advisable for Korea to examine the introduction of domestic laws, such as the bypass anti-dumping system, in order to cope with unfair trade practices that undermine and neutralize the effects of anti-dumping measures.

차단우회 및 익명성보장 웹브라우징 시스템 (Anti-Censorship and Anonymous Web-Browsing System)

  • 이은수;이석복
    • 전자공학회논문지
    • /
    • 제52권11호
    • /
    • pp.20-26
    • /
    • 2015
  • 인터넷 사용 인구의 증가함에 따라 인터넷 차단우회 및 익명성 서비스에 대한 필요성은 해마다 증가하고 있다. 기존의 차단우회 및 익명성 서비스를 제공하는 시스템들은 각자의 기술적인 문제점들로 인하여 현실적으로 사용이 어려운 경우가 많다. 본 논문은 검열 ISP 안의 사용자와 자유 ISP 안의 사용자가 상호 협력을 통하여 차단 우회 및 익명성을 획득할 수 있는 방법에 대하여 제안한다.

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • 제14권1호
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Improvement of Transformation Efficiency by Strategic Circumvention of Restriction Barriers in Streptomyces griseus

  • Suzuki, Hirokazu;Takahashi, Shunji;Osada, Hiroyuki;Yoshida, Ken-Ichi
    • Journal of Microbiology and Biotechnology
    • /
    • 제21권7호
    • /
    • pp.675-678
    • /
    • 2011
  • DNA methylation in Streptomyces griseus IFO 13350 was analyzed by high-performance liquid chromatographic analysis and bisulfite-based analysis to reveal two methylation sites, 5'-$GC^{5m}$ CGGC-3' and 5'-$GAG^{5m}$ CTC-3'. The methylation was reconstituted in Escherichia coli by simultaneous expression of S. griseus SGR4675 and S. achromogenes M.SacI. The E. coli cells produced plasmids that mimicked the methylation profile of S. griseus DNA, which was readily introduced into S. griseus. The results of this study raise the possibility of a promising approach to establish efficient transformation in several streptomycetes.

Review of Biometrics-Based Authentication Techniques in Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.321-327
    • /
    • 2021
  • Mobile devices have recently developed to be an integral part of humans' daily lives because they meet business and personal needs. It is challenging to design a feasible and effective user authentication method for mobile devices because security issues and data privacy threats have significantly increased. Biometric approaches are more effective than traditional authentication methods. Therefore, this paper aims to analyze the existing biometric user authentication methods on mobile platforms, particularly those that use face recognition, to demonstrate the methods' feasibility and challenges. Next, this paper evaluates the methods according to seven characteristics: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention. Last, this paper suggests that solely using the method of biometric authentication is not enough to identify whether users are authentic based on biometric traits.

자가연골세포와 PLA-coated PGA 복합체를 이용한 연골조직 재생 (Engineering Autogenous Cartilage Using PLA Coated PGA Chondrocyte Complex)

  • 김우섭
    • Archives of Plastic Surgery
    • /
    • 제32권1호
    • /
    • pp.1-4
    • /
    • 2005
  • Previous sucessful results of neocartilage formation using tissue engineering technique in immunocompromised nude mouse xenograft model were reported. For clinical application, autogenous cell is preferrable to allogenic or xenogenic cell for circumvention of immune rejection. This study evaluates the feasibility of producing a engineered cartilage using autogenous chondrocytes. Chondrocytes were isolated from the auricular catilage of New Zealand White rabbit and seeded onto PGA polymer coated with polylactic acid in round pattern(diameter 0.7 cm, thickness 0.1 cm) at a concentration $7{\times}10^7$ chondrocytes per $cm^3$. Each Autogenous Cell-polymer constructs were implanted subcutaneously into the left side of dorsum of twelve Rabbits. Polymer templates not containg cells were implanted into the right side as a control. Fifteen rabbits were sacrificed at the following intervals: 5 rabbits at nine weeks, 7 rabbits at twelve weeksNew autogenous cartilage formation which retained the approximate dimensions of origianl round polymer template in 11 of 12 cell seeded implants. Histological examination using hematoxyline and eosin stain revealed vast majority of implants developed into mature cartilage. This study opens up the possibility of autologus cell transplant to construct autogenous cartilge.

고준위 펄스방사선에 의한 전자소자 Latchup의 발생시험 및 분석 (An Experimental Analysis for a High Pulse Radiation Induced Latchup Conformation)

  • 이남호;황영관;정상훈;김종열
    • 한국정보통신학회논문지
    • /
    • 제18권12호
    • /
    • pp.3079-3084
    • /
    • 2014
  • 펄스 방사선에 의해 전자소자가 받는 영향으로는 Upset, Latchup, Burnout 등이 있다. 이 가운데 Latchup은 대상 소자에 회복 불가능한 영구손상(Permanent Damage)을 가져오게 되며 Burnout으로도 이어져 장비전체에 치명적 기능마비를 유발하기도 한다. 본 연구에서는 전자소자의 내부 공정설계 및 구조정보 활용이 불가능한 상황에서 실험을 통해서 펄스 방사선에 의한 Latchup 발생을 분석하고자 시도하였다. 소자를 전자빔변환 고준위 펄스 감마선 조사한 직후 수행한 전원제공 회로의 차단, 적외선 카메라의 열원측정, 그리고 손상발생 소자의 내부 회로분석의 세 단계별 확인과정은 펄스 방사선에 의해 유발된 Latchup임을 검증하는 효율적 방안으로 여겨진다.

PC 이벤트 탐지 기능과 보안 통제 절차를 연계시킨 시나리오 기반 금융정보유출 위험 대응 모델에 관한 연구 (A Study on a Scenario-based Information Leakage Risk Response Model Associated with the PC Event Detection Function and Security Control Procedures)

  • 이익준;염흥열
    • 한국전자거래학회지
    • /
    • 제23권4호
    • /
    • pp.137-152
    • /
    • 2018
  • 기존 금융정보유출 행위를 탐지하기 위해 보안솔루션에서 생성한 행위 로그를 수집하여 패턴분석으로 정보유출 이상행위를 탐지하고 차단하는 활동에서 발생되는 한계점을 극복하고, 효과적으로 대응하기 위한 방안으로 첫 번째, PC에서 정보유출 경로(외부에서 읽기, 외부로 저장하기, 외부로 전송하기 등)로 이용되는 PC내 실행 프로그램들을 실시간으로 모니터링하고 두 번째, 해당 프로그램이 실행하는 시점에 연관된 보안 통제 프로세스와 상호 연동하여 정상 통제예외 통제우회 행위인지를 파악한 다음 마지막 단계인 시나리오 기반으로 생성한 처리 절차를 통해 금융정보유출 위험을 통제할 수 있는 위험 관리 모델을 제안함으로서 정보 보호 측면의 보안성 강화 및 업무 효율성 향상의 기대효과를 창출하고자 한다.

한국 기업의 해외직접투자 모형설정에 관한 실증 연구(중국&아세안6개국 중심:2016년-2019년 중심) (An Empirical Study on the Determinants of Korean FDI focused on China& Asean six Countries for years 2016 through 2019)

  • 이응권
    • 무역학회지
    • /
    • 제46권1호
    • /
    • pp.1-21
    • /
    • 2021
  • The main purpose of this research is to analyze the changes in investment motivation by year through time series and cross-sectional analysis of the factors and investment decisions of Korean manufacturing companies. According to the investment pattern for Asean from the 1980s to the 19th, the first expansion period was 82 to 86, the average increase in overseas investment for securing foreign raw materials due to the second oil shock, and the second expansion period was a gradual increase in exports to the U.S. in 1987 to 1996. During the first stagnation period, direct investment in Asean stagnated in the aftermath of the 1998-05 Asian crisis, and in the third expansion period, part of the production facilities invested in China were relocated to Asean, increasing Asean's investment to become Korea's largest manufacturing investment in 17. Korea's proportion of investment in Asean surpassed that of mass investment since 10 years ago, and the proportion of investment in manufacturing sector has been transferred from China to Asean, and after 17 years, it has served as an overseas production base connecting China. As such, The main purpose of the research will be to extract the determinant factors and key factors for overseas direct investment and investment patterns in conjunction with global manufacturing companies' production base relocation and investment trends through empirical analysis. This research paper gave basic reference to the motivation and determinant of investment 16 years ago, and analyzed the changes in investment motivation by year and content through empirical analysis, contributing some reasonable purpose to the decision of companies and policy makers interested in overseas direct investment.