• Title/Summary/Keyword: Consumer protect

Search Result 125, Processing Time 0.031 seconds

Strategies for Establishing of the Systemic Collecting and Sharing of Food Risk Information (체계적인 식품 위해 정보 수집.공유 체계 구축 방안)

  • Choi, Sung-Rak
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.17 no.3
    • /
    • pp.456-462
    • /
    • 2007
  • Food safety has been a growing consumer concern over the last few decades, and remains a priority for consumers, the food industry, and regulatory agencies alike. Although consumer concern for food safety has increased, consumer confidence has decreased. The emphasis on food safety is related to that of preliminary risk management. The ability to collect and provide food risk information is a key element in enhancing the way food safety authorities protect consumers from risk. This review aims to investigate the current situations of international organizations, as well as several countries' systems for collecting and providing food risk information. Through the comparison and analysis of each system, this review proposes strategies to establish a systematic collecting of information and provision of infrastructure in Korea. To develop an information collection system suited to Korea's situation, it is necessary for Korea to strengthen interactions and cooperation with other trade partners through the enlargement of international networks. Such efforts on food risk communication should be made by providing high quality and clear information.

  • PDF

Study on Proof of Product Liability Act (제조물책임법 입증책임에 관한 연구)

  • Kim, Eun-Bin;Ha, Choong-Lyong
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.135-150
    • /
    • 2019
  • Under the Manufacturing Liability Act, consumers want to be protected from manufacturers by mitigating burden of proof as an important target to be protected. However, due to the complexity of the product, it is very difficult for consumers to prove defects from the manufacturing defect. This situation has led to a major revision of the Manufacturing Liability Act, which mitigates the burden of proof of consumers by applying fruitless liability. The Manufacturing Liability Act is comparable to the U.S., which has strong consumer rights and is protected by the Manufacturing Liability Act. The burden of proof can be regarded as the most necessary content for consumers within the manufacturing product liability law when responding to manufacturing defects. The U.S. intends to provide implications for achieving consumer protection in Korea's Manufacturing Liability Act by imitating the U.S. based on the burden of proof. Case comparison regarding burden of proof can be conducted based on various criteria, including criteria for each product and key features for determining the importance of the manufacturing product liability law. The Act on the Responsibility of Korean Manufacturing Products for the Protection of Consumers was developed based on the assessment criteria, and a remedy was proposed to protect consumers who suffered from manufacturing defects.

A Study on the Transaction Security of Electronic Payment (전자결제의 보안성에 관한 연구)

  • 홍선의
    • The Journal of Information Technology
    • /
    • v.1 no.1
    • /
    • pp.173-188
    • /
    • 1998
  • In this paper we discussed various types of electronic payment schemes that are emerging. Threats vary from malicious hackers attempting to crash a system, to threats to data or transaction integrity. An understanding of the various types of threats can assist a security manager in selecting appropriate cost-effective controls to protect valuable information resources. An overview of many of today's common threats presented in this paper will be useful to mangers studying their own threat environments with a view toward developing solutions specific to their organization. To ensure security on the Internet, several methods have been developed and deployed. They include authentication of users and servers, encryption, and data integrity. Transaction security is critical : without it, information transmitted over the Internet is susceptible to fraud and other misuse. So computer systems represents an Intermediary with the potential to access the flow of information between a user. Security is needed to ensure that intermediaries cannot eavesdrop on transactions, or copy/modify data. Online firms must take additional precautions to prevent security breaches. To protect consumer information, they must maintain physical security of their servers and control access to software passwords and private keys. Techniques such as secret and public-key encryption and digital signatures play a crucial role in developing consumer confidence in electronic commerce.

  • PDF

Study on Selection of HTS Wire for Fabrication of Fault Current-limiting Type HTS Cables (사고전류 제한형 초전도케이블 제작을 위한 초전도 선재 선정에 관한 연구)

  • Heo, Soung-Ouk;Kim, Tae-Min;Han, Byung-Sung;Du, Ho-Ik
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.26 no.12
    • /
    • pp.904-908
    • /
    • 2013
  • When an abnormal condition occurs due to a fault current at a consumer location where electricity is supplied through a high-capacity and high-$T_c$ superconducting(HTS) cable, the HTS cable would be damaged if there is no appropriate measure to protect it. Therefore, appropriate measures are needed to protect HTS cables. The fault-current-limiting HTS cable that was suggested in this study performs an ideal transport current function in normal operations and plays a role in limiting a fault current in abnormal operation (i.e., when a fault current is applied). It has a structure that facilitated its self-current-limiting ability through device change and reconfiguration in the existing HTS cable without extra switching equipment. To complete this structure, it is essential to investigate about the selection of the superconducting wire. Therefore, in this paper, HTS wire using two types of different stabilization layer is compared and examined the stability and current limiting properties under the existence of a fault current.

Privacy Protection and RFID(Radio Frequency IDentification) (RFID와 프라이버시 보호)

  • Lee, Cheol-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.443-446
    • /
    • 2006
  • RFID is the core of realizing ubiquitous environment. This is expected to improve economical effect through related industry revitalization, make-work, and so on, in the future, and to be linked to social see-through enhancement via national life change. However unchecked RFID use lets retailers collect unprecedented huge information and they link it to customer information database, so the voice of worry to bring about a result of trampling down consumer privacy doesn't make a negligible situation. Although RFID system is spreaded out socially, the servicing of law and system is not accomplished to protect individuals from personal information violation threat. At the same time, in ubiquitous computing environment, to protect individual information efficiently, from the step of planning and deciding this technology system, constitutional law, norm, the basic legal rights of the people, and so forth is to be considered. The objective of the research is to persent the privacy protection from the viewpoints of law on RFID.

  • PDF

A Study of XrML-based Rights Business Model for Digital Contents Copyright Administration (디지털 컨텐츠 저작권 관리를 위한 XrML 기반의 저작권 비즈니스 모델에 관한 연구)

  • 최지훈;유윤식;임산송;김진수;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.289-292
    • /
    • 2003
  • Digitalized multimedia contents is changing active digital contents in form passed from manufacturer directly to consumer though digital network of high speed, also face with big problem that is protection of rights to protect digital contents, to protect those and effort to active digital contents process height. Also, in situation that require change to more efficient system, the efficiency of rights document that is basic intermediate to be used in business of digital contents field is emphasized. Therefore, the design of common business model to share contents that have same purpose without depending on specific system to offer contents with another system is required. This paper designed adaptable rights business model to general digital contents, and designed and implemented rights document editing system to editable document for Right management according to designed business model.

  • PDF

A study on Internet user's protection (인터넷 이용자 보호에 관한 연구)

  • Park, Jong-Ryeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.157-164
    • /
    • 2011
  • As a computer technology is combined with communication technology, information and communication technology developed rapidly. As a result, The number of internet users increased quickly. Ability of human in using information was epoch-making, and it was increased through the Internet on behalf of an information-oriented society. As an Internet user hereby spreads explosively, legislations were established and revised to protect Internet users and consumers however, it is certain that the damages of Internet users are still increasing day by day. The purpose of this paper is to protect internet users and to reform the system. Also each portal site should provide fair information, and be responsible for conclusion of a contract. After they subdivide into personal service style, and analyze every situation and problems, they should improve problems.

Effect of a restaurant hygienic grade certificate program on consumer choices

  • Kim, Jae-il;Choi, Jinkyung
    • Nutrition Research and Practice
    • /
    • v.15 no.sup1
    • /
    • pp.70-78
    • /
    • 2021
  • BACKGROUND/OBJECTIVES: The recent coronavirus disease 2019 pandemic has brought to light issues regarding personal and environmental cleanliness. Individuals may have concerns about cleanliness at food service establishments when they consume food prepared at a restaurant. In Korea, a new restaurant hygienic certificate system was implemented in 2017. The effect of this new system has not been evaluated. SUBJECTS/METHODS: This study investigated consumers' perceptions of these new certificates using the protection motivation theory (PMT). An online survey was conducted to collect data and then exploratory factor analysis, analysis of variance, and multiple regression tests were run. RESULTS: The results of this study indicate that 3 different certificates had significant differences in threat (P < 0.001) and benefit (P < 0.001) perception. However, experience with a foodborne illness from a restaurant did not effect on the PMT variables. In addition, the 3-tier certificate did not motivate consumers to protect themselves against foodborne illnesses, while previous experiences of foodborne illness (P < 0.05), coping (P < 0.001), and benefits (P < 0.01) affected this protection motivation. CONCLUSIONS: This study suggests that consumers were not influenced by different certificate levels regarding their motivation to protect themselves from foodborne illnesses. Therefore, an improved plan should be initiated to clarify the meaning of these certificates. The results of this study can help the application and development of a new system for future adaptations.

Machine Learning Approach to the Effects of the Superstore Mandatory Closing Regulation

  • AN, Jiyoung;PARK, Heedae
    • Journal of Distribution Science
    • /
    • v.18 no.2
    • /
    • pp.69-77
    • /
    • 2020
  • Purpose - This paper is aimed to analyze the effects of the mandatory closing regulation targeting large retailers, which has been implemented since 2012 to protect small retailers. We examine the changes in consumers' choice of retailers and their purchasing patterns of agri-food following the implementation of such regulation. Research design, data, and methodology - Household spending patterns were identified through the historical data of household food purchase, consumer panel provided by the Rural Development Administration. Clustering was employed to determine the household spending patterns. Moreover, the different household spending patterns before and after the regulation were comparatively studied. The patterns of consumers' choice of retail stores and shopping baskets by the type of retailers, derived from the respective datasets before and after the regulation, were compared to analyze the effects of the regulation. Results -After the regulation, some consumers who used to shop at large retailers before the regulation changed their shopping places to small retailers. However, the product categories that consumers had mainly purchased before the regulation were rarely changed even after the regulation. Conclusions - Although the regulation helped migrate some of the consumers to small retailers, the regulation seemed to have failed to stimulate consumers to purchase the goods, normally bought at large retailers, from traditional markets. In other words, traditional markets are not effective substitutes for regulation-affected retailers.

A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection (아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향)

  • Kim, So-Ra;Rhee, Kee-Choon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.8
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.