• Title/Summary/Keyword: Collection Policy Framework

Search Result 35, Processing Time 0.023 seconds

Characteristics of Vegetation and Biota in the Gahwacheon Estuarine Wetland, Sacheon, South Korea: Proposals for the Ecosystem Conservation (사천 가화천하구습지의 식생 및 생물상 특성: 생태계 보전 대책의 제안)

  • Yeounsu, Chu;Kwang-Jin, Cho;Jeoncheol, Lim
    • Ecology and Resilient Infrastructure
    • /
    • v.9 no.4
    • /
    • pp.237-246
    • /
    • 2022
  • Owing to their high bioproductivity and unique physical environment, estuarine wetlands are gaining importance in national biodiversity management and habitat conservation. With regard to conservation and management of estuarine wetlands, this study analyzed the ecological characteristics of Gahwacheon Estuarine Wetland, an open estuary with various habitat types. Data from vegetation and biotic surveys have shown that 12 plant communities of five physiognomic vegetation types, including lentic herbaceous vegetation, halophytic herbaceous vegetation, and chasmophytic herbaceous vegetation. Due to the discharge of Namgang Dam and the effect of the tide, vegetation are distributed along the narrow waterside area. In terms of biodiversity, a total of 715 species, including 12 endangered wildlife species, were identified. Species diversity was relatively high in sections I and III where various riverbed structures and microhabitats were distributed. Due to the effect of the brackish water area following the inflow of seawater, endangered wildlife of various functional groups were also found to be distributed, indicating the high conservation value of that area. The collection of ecological information of the Gahwacheon Estuarine Wetland can be used as a framework for establishing the basis for conservation and management of the estuarine ecosystem and support policy establishment.

International Case Study and Strategy Proposal for IUCN Red List of Ecosystem(RLE) Assessment in South Korea (국내 IUCN Red List of Ecosystem(생태계 적색목록) 평가를 위한 국제 사례 연구와 전략 제시)

  • Sang-Hak Han;Sung-Ryong Kang
    • Journal of Wetlands Research
    • /
    • v.25 no.4
    • /
    • pp.408-416
    • /
    • 2023
  • The IUCN Red List of Ecosystems serves as a global standard for assessing and identifying ecosystems at high risk of biodiversity loss, providing scientific evidence necessary for effective ecosystem management and conservation policy formulation. The IUCN Red List of Ecosystems has been designated as a key indicator (A.1) for Goal A of the Kunming-Montreal Global Biodiversity Framework. The assessment of the Red List of Ecosystems discerns signs of ecosystem collapse through specific criteria: reduction in distribution (Criterion A), restricted distribution (Criterion B), environmental degradation (Criterion C), changes in biological interaction (Criterion D), and quantitative estimation of the risk of ecosystem collapse (Criterion E). Since 2014, the IUCN Red List of Ecosystems has been evaluated in over 110 countries, with more than 80% of the assessments conducted in terrestrial and inland water ecosystems, among which tropical and subtropical forests are distributed ecosystems under threat. The assessment criteria are concentrated on spatial signs (Criteria A and B), accounting for 68.8%. There are three main considerations for applying the Red List of Ecosystems assessment domestically: First, it is necessary to compile applicable terrestrial ecosystem types within the country. Second, it must be determined whether the spatial sign assessment among the Red List of Ecosystems categories can be applied to the various small-scale ecosystems found domestically. Lastly, the collection of usable time series data (50 years) for assessment must be considered. Based on these considerations, applying the IUCN Red List of Ecosystems assessment domestically would enable an accurate understanding of the current state of the country's unique ecosystem types, contributing to global efforts in ecosystem conservation and restoration.

Ecological Characteristics and Their Implications for the Conservation in the Taehwagang River Estuarine Wetland, Ulsan, South Korea (울산 태화강하구습지의 생태적 특성 및 보전을 위한 제안)

  • Pyoungbeom Kim;Yeonhui Jang;Yeounsu Chu
    • Ecology and Resilient Infrastructure
    • /
    • v.10 no.4
    • /
    • pp.171-183
    • /
    • 2023
  • Estuarine wetlands, which form a distinctive brackish water zone, serve as important habitats for organisms that have adapted to and thrive in this environment. Nonetheless, excessive development and utilization result in artificial disruptions that alter the distinctive functions and attributes of estuarine wetlands. To collect the basic data for the conservation of estuarine wetlands with excellent ecosystems, we investigated the vegetation distribution characteristics and biota status of the Taehwagang River Estuarine Wetland. Data from vegetation surveys have shown that 25 plant communities of six physiognomic vegetation types, including willow vegetation, lotic and lentic herbaceous vegetation, floating/submerged vegetation. In the upper reaches, where topographical diversity was high, various types of wetland vegetation were distributed. In terms of biodiversity, a total of 696 species, including 7 endangered wildlife species, were identified. Due to good ecological connectivity, tidal rivers are formed, brackish water species including various functional groups are distributed around this section. The inhabitation of various water birds, such as diving and dabbler ducks, were confirmed according to the aquatic environment of each river section. The collection of ecological information of the Taehwagang River Estuarine Wetland can be used as a framework for establishing the basis for conservation and management of the estuarine ecosystem and support policy establishment.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF