• Title/Summary/Keyword: Collusion

Search Result 120, Processing Time 0.022 seconds

The Analysis of Korean Fair Trade Commission's Judgemental Cases of Cartels in Telecommunications and Media Industry (통신 및 미디어 산업에서의 카르텔에 대한 심결사례 연구 행정지도, 카르텔유형, 경쟁제한성 판단, 카르텔 제재를 중심으로)

  • Oh, Jeong-Ho
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.627-670
    • /
    • 2009
  • This study analyzed Korean Fair Trade Commission's judgemental cases of cartels in telecommunications and media industry and presented the following results. First, cartels were formed frequently in multi-channel broadcasting industry, telecommunications industry, movie industry, and newspaper industry. In addition, price-fixing were observed in almost all subfield of telecommunications and media industry. Second, administrative guidance facilitated more opportunities for collusion in the telecommunications industry than in the media industry. Third, the telecommunications and media industry, similar to overall domestic industries, had a high proportion of hard-core cartels. Fourth, the depth of judgemental case in evaluating agreements among competitors was generally low, even though detail evaluations were found in the cases of large fines. Fifth, the overall level of sanctions was relatively low.

  • PDF

Violence and an Ethical Figure in Harold Pinter's One for the Road (해롤드 핀터의 『길 떠나기 전 한잔』에 나타난 폭력과 윤리적 주체)

  • Lee, Seon Hyeon
    • English & American cultural studies
    • /
    • v.18 no.4
    • /
    • pp.103-137
    • /
    • 2018
  • Harold Pinter's One for the Road(1984) is a play about violence. Nicholas, who appears to be the manager of a place, interrogates Victor, Nicky, and Victor's wife Gila in a room for one day from morning to night. There is no direct physical violence in this play. But hints about the atrocities that took place outside the stage make the audience guess the violence and cruelty. Violence, which is not seen as such, is the central theme of the play. One for the road is worth reading as a resistance to breaking the mirror of global ideology, not as it deals with violent events confined to Turkey. The problem which Pinter had in mind, in particular, is that the United States plays a leading role in producing world-class ideologies, and that Britain is involved in collusion with the United States in cultivating such ideological fantasies, both abroad and at home. This thesis analyzes the contrasting reactions of each character in the play based on this social context. In particular, the conflicting reactions of the characters on the system are the most important conflict in the drama. Nicolas is a manager who moves on the system without seeing the truth. Victor and his family, on the other hand, do not move within the same ideology as Nicholas. This paper will take a look at what their strategies of resistance is and how they are revealed in the work. In fact, Nicholas appears split. Nicholas seemingly reacted decisively to the interpellation of the system. He expresses his belief and respect for the legitimacy of his actions. However, he has repeatedly sought the respect and love of Victor. Nicholas is now swaying. The theme that Nicholas presents consciously by grabbing at his own sway is 'Patriotism.' But this fantasy splits through Victor's silence and death demands. Therefore, the questions to be answered are: So why does Nicolas appear to be torn apart in a system that directs violence? But why is he forced to assimilate into the system? What other figures imply? To answer these questions, this thesis will take Slavoj Zizek's view of ideology. On the other hand, there are previous studies that read the system of violence in One for the road from the Althusser's perspective. Surely, this play explores the role of Ideological State Apparatus. However, from the point of view of Althusser, it is not possible to read Nicholas's division and the point of resistance seen by Victor's family. Pinter does not limit the scope of the ideological system as a closed one that regenerates ideologies, but secures the domain of main body resistance and struggle. On the other hand, there are already several domestic theses that read Pinter's work in Zizek's perspective. But these theses are mainly focused on analysis of Mountain Language. What this thesis would suggest is that there is a potential for an ethical figure of Zizek to be considered in One for the Road.

Disgust and Domination (혐오와 지배)

  • Shin, Eun-hwa
    • Journal of Korean Philosophical Society
    • /
    • v.143
    • /
    • pp.189-214
    • /
    • 2017
  • Disgust is caused by human being incompleteness and also its denial. Therefore the understanding of disgust is concerned with the understanding of humans. Thinking critically about disgust, we can solve the problems of disgust and reflect on our limitations. I will refer to Nussbaum's view which finds out in "projective disgust" an antipathy to human fault and a wish for completeness. This article is interested in the fact that disgust is not only a rejective feeling of a person but also a collective emotion which is connected with an antagonistic relationship and power exercise. Specifically, this article focuses on the point that disgust is mobilized to maintain a dominative relationship between humans. This is associated with the inner characteristics of disgust because disgust in itself contains a one-sided perspective, exclusiveness, hierarchy, and domination. This article aims to reveal a collusion between disgust and domination. For the purpose we will pay attention to two basic inclinations which are immanent in disgust; purity and exclusion, while relying on Nussbaum's view of disgust. In accordance with this analysis, this article will specificity treat disgust which can be summarized as an ideological function of emotion and its violent tendency. Then, we can ensure that disgust threats the equal and dignitary worth of human beings and hinders the diversity and rationality of a liberal society. In addition, it will be emphasized that disgust should not be used as an ideology which discriminates and suppresses a specific group in a society.

The Kokutai Theology of State Shinto and Notion of Public-Private : Focusing on Kokutai no Hongi (국가신도의 국체신학과 공사(公私)관념: 《국체의 본의》를 중심으로)

  • Park, Kyutae
    • The Critical Review of Religion and Culture
    • /
    • no.26
    • /
    • pp.150-193
    • /
    • 2014
  • The point in the thought of modern Japanese State Shinto(國家神道) liesin the concept of "kokutai"(國體) which was highly connected with theideology of Emperor system. The kokutai, mainly made up of "the oracle byAmaterasu blessing Japan to be as eternal as heaven and earth"(天壤無窮の神勅), "an unbroken line of Emperors"(萬世一系), and the notion of"Emperor as living God"(現人神), was clearly manifested at Kokutai noHongi(國體の本義), published by the Ministry of Education, Science andCulture 1n 1937. Then, the notion of public-private represented by "selflessdevotion"(滅私奉公) was the prevailing substance of that kokutai. Thepurpose of this essay is to examine the way how the "theology of kokutai" -kokutai ideology based upon such a notion of public-private represented by"selfless devotion" - had been described at Kokutai no Hongi, and tounderstand the mythological, theological meaning of that "theology ofkokutai" associated with the religiosity of State Shinto. Additionally, this essaywill explore a kind of aesthetical way how to reproduce the State Shinto incontemporary Japanese society from the perspective of "collusion betweenpublic and private". In doing so, this paper will pay attention to the principaltexts of State Shinto such as Meiji Constitution(大日本帝國憲法, 1889),Imperial Rescript on Education(敎育勅語, 1890), Kamunagara no Taido(惟神の大道, 1940), Shinmin no Michi(臣民の道, 1941), Kokushi Kaisetsu(國史槪說, 1943), and Jinja Hongi(神社本義,1944), including Kokutai no Hongi.

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.

Efficient Self-Healing Key Distribution Scheme (효율적인 Self-Healing키 분배 기법)

  • 홍도원;강주성;신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.141-148
    • /
    • 2003
  • The self-healing key distribution scheme with revocation capability proposed by Staddon et al. enables a dynamic group of users to establish a group key over an unreliable network, and has the ability to revoke users from and add users to the group while being resistant to collusion attacks. In such a protocol, if some packet gets lost, users ale still capable of recovering the group key using the received packets without requesting additional transmission from the group manager. In this scheme, the storage overhead at each group member is O($m^2$1og p) and the broadcast message size of a group manager is O( ((m$t^2$+mt)log p), where m is the number of sessions, t is the maximum number of colluding group members, and p is a prime number that is large enough to accommodate a cryptographic key. In this paper we describe the more efficient self-healing key distribution scheme with revocation capability, which achieves the same goal with O(mlog p) storage overhead and O(($t^2$+mt)log p) communication overhead. We can reduce storage overhead at each group member and the broadcast message size of the group manager without adding additional computations at user's end and group manager's end.

Equality, Labor and Competition in the 'Grapes of Wrath' by John Steinbeck (존 스타인벡의 '분노의 포도'에서 평등, 노동, 경쟁)

  • Shon Donghwan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.53-59
    • /
    • 2024
  • The novel "The Grapes of Wrath" shows the painful reality of Americans during the Great Depression through the migration journey of the Tom Jod's family, who had no choice but to move from Oklahoma to California and their hardships in California. This presents empathy for their wrath and offers hope for a brotherly solution. This article presents institutional solutions against each novel situation from the perspective of the Constitution, labor law, and competition law. From a constitutional perspective, the poverty of Oklahoma's smallholders is not a result of choice, but is caused by the natural environment and capital concentration, so it is suggested that the government have to intervene to guarantee a minimum standard of living to realize equal rights. From a labor law perspective, worker supply projects are unconstitutional because they constitute intermediate exploitation of labor, and immigrants like the Joad family have the right to form labor unions. From a competition law perspective, it was shown that the large landowners' setting of fruit prices constitutes predatory pricing, and the farmers' attempts to pay similarly low wages constitute collusion. Through this, the attempt was made to recognize that the law is a means to resolve the public wrath that may currently exist, and to show that the story in the novel can bring empathy and understanding to minorities. It is hoped that reading novels can be a way to help interpret the law and sympathize with others as an indicator of a just society.

In Search of "Excess Competition" (과당경쟁(過當競爭)과 정부규제(政府規制))

  • Nam, II-chong;Kim, Jong-seok
    • KDI Journal of Economic Policy
    • /
    • v.13 no.4
    • /
    • pp.31-57
    • /
    • 1991
  • Korean firms of all sizes, from virtually every industry, have used and are using the term "excessive competition" to describe the state of their industry and to call for government interventions. Moreover, the Korean government has frequently responded to such calls in various ways favorable to the firms, such as controlling entry, curbing capacity investments, or allowing collusion. Despite such interventions' impact on the overall efficiency on the Korean economy as well as on the wealth distribution among diverse groups of economic agents, the term "excessive competition", the basis for the interventions, has so far escaped rigorous scrutiny. The objective of this paper is to clarify the notion of "excessive competition" and "over-investment" which usually accompanies "excessive competition", and to examine the circumstances under which they might occur. We first survey the cases where the terms are most widely used and proceed to examine those cases to determine if competition is indeed excessive, and if so, what causes "excessive competition". Our main concern deals with the case in which the firms must make investment decisions that involve large sunk costs while facing uncertain demand. In order to analyze this case, we developed a two period model of capacity precommitment and the ensuing competition. In the first period, oligopolistic firms make capacity investments that are irreversible. Demand is uncertain in period 1 and only the distribution is known. Thus, firms must make investment decisions under uncertainty. In the second period, demand is realized, and the firms compete with quantity under realized demand and capacity constraints. In the above setting, we find that there is "no over-investment," en ante, and there is "no excessive competition," ex post. As measured by the information available in period 1, expected return from investment of a firm is non-negative, overall industry capacity does not exceed the socially optimal level, and competition in the second period yields an outcome that gives each operating firm a non-negative second period profit. Thus, neither "excessive competition" nor "over-investment" is possible. This result will generally hold true if there is no externality and if the industry is not a natural monopoly. We also extend this result by examining a model in which the government is an active participant in the game with a well defined preference. Analysis of this model shows that over-investment arises if the government cannot credibly precommit itself to non-intervention when ex post idle capacity occurs, due to socio-political reasons. Firms invest in capacities that exceed socially optimal levels in this case because they correctly expect that the government will find it optimal for itself to intervene once over-investment and ensuing financial problems for the firms occur. Such planned over-investment and ensuing government intervention are the generic problems under the current system. These problems are expected to be repeated in many industries in years to come, causing a significant loss of welfare in the long run. As a remedy to this problem, we recommend a non-intervention policy by the government which creates and utilizes uncertainty. Based upon an argument which is essentially the same as that of Kreps and Wilson in the context of a chain-store game, we show that maintaining a consistent non-intervention policy will deter a planned over-investment by firms in the long run. We believe that the results obtained in this paper has a direct bearing on the public policies relating to many industries including the petrochemical industry that is currently in the center of heated debates.

  • PDF

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

A Review of Archaeological Research on Silla in North Korea (북한의 신라 고고학 연구 현황과 특징)

  • Yoon, Sangdeok
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.2
    • /
    • pp.270-285
    • /
    • 2020
  • This study examines the state of archeological research on Silla and Unified Silla conducted in North Korea and identifies its characteristics. In South Korea, most research has focused on prehistoric times in North Korea, and little research has been done on Silla and Unified Silla. Noting this, we attempted to examine the history of archaeological research in North Korea to provide foundations upon which to go forward. The research was examined in terms of general archaeological themes including tombs, fortresses, the capital city, earthenware, roof tiles, ornaments, weapons, and horse harnesses, and we identified four characteristics from the examination. First, Juche ideology had a great influence on interpretation of the unification of the three kingdoms. The Juche ideology was first proposed in 1955, and at the time, it was not fully established as an ideology but rather seen as constituting opposition to toadyism. Accordingly, the unification of the three kingdoms led by Silla was seen as amounting to collusion with foreign forces and was not acknowledged. A piece of evidence shows that this change took place around 1962. Second, an inclination to testify to the 'uniqueness' of the cultures of the three kingdoms is observed. The argument is that culture in the Korean peninsula has unique characteristics that set it apart from Chinese culture, and that the cultures of the three kingdoms share much in common. This inclination was not mentioned in research until the 1950s, and it can be seen as an effort to comply with Juche ideology and prove the principle of unity as stated in the national leader's instructions in the 1960s. Third, the influence of Goguryeo on the formation of Silla culture is emphasized. Related research explains that Baekje, Silla, and Gaya adopted the 'superior' culture of Goguryeo, and could establish 'uniqueness' of culture accordingly. It is claimed that an advanced Goguryeo culture was disseminated throughout Balhae and Unified Silla, and then to Goryeo, resulting in a true unification of the ethnic culture. Fourth, researchers in North Korea presume the Silla tombs and other relics to be far older than South Korean researchers' estimate. From a standpoint of highlighting the long history of Korea, they estimate the Silla Dynasty was founded in the early or mid-first century. Accordingly, archeological evidence that demonstrates the establishment of the state is dated as far back. Such an estimate is also indispensable in justifying the explanation that the chamber tombs of Goguryeo had a direct influence on Silla. These research characteristics which arose during the 1960s continue to be basic guidelines for North Korean researchers.