• Title/Summary/Keyword: Cyber Trade

Search Result 72, Processing Time 0.026 seconds

A Study on The Protection of Intellectual Property Right about The Electronic Commerce - Focusing on the Domain Name And the Trademark Infringement - (전자상거래상(電子商去來上) 지식재산권(知識財産權)의 보호문제(保護問題)에 관한 연구(硏究) - Domain Name과 상표권(商標權) 침해여부(侵害與否)를 중심(中心)으로 -)

  • Lee, Han-Sang
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.1013-1032
    • /
    • 2000
  • At present, the scale of Electronic Commerce through internet has been rapidly increasing due to the development of information & communication technology, and aggregated to 2.4 billion dollar in America last year (1998). The market scale of worldwide electronic commerce is also presumed to be about 130 billion dollar in 2000, and to occupy more than 20% of the whole world trade in world 2020. Since the right of trademark, despite of being effective only in registered nations on the principle of territorialism, is unified on the cyber space of internet without domestic barrier or local limitation which make it easier to conduct the distribution of information rapidly through the address-internet domain name, those are very important that the systematic dispute-solving plan on problems such as decision of its Act and international jurisdiction to be established, in an effort to prevent the newly emerging dispute instances such as trademark infringement and improper competitiveness. In addition, it is natural that on the threshold of the electronic commerce age which formed with an unified area without the worldwide specific regulation, each country including us makes haste with the enactment of "electronic commerce Act" aiming at coming into force in 1999, in keeping with getting through "non-tariff law on electronic commerce" by U. S. parliament on May, 1998. In view of the properties of electronic commerce transactions through internet, there are the large curtailment of distributive channel, surmounting of restrictions on transaction area, space and time and the easy feedback with consumer and the cheap-required capital, from which the problems may arise - registration of trademark, the trademark infringement of domain name and the protection of prestigious trademark. Therefore, it is necessary to take the counter-measure, with a view of reviewing the infringement of trademark and domain name and the instances of each national precedent and to preventing the disputes. The improvement of the persistent system should be needed to propel the harmonious protection of those holding trademark right's credit and demanders' expectant profit by way of the righteous use of trademark.

  • PDF

The connective method for efficient e-marketplace of cyber shipping trade (사이버 해운 거래의 효율화를 위한 e-Marketplace의 연계 방안)

  • 한계섭;최형림;박남규;김현수;박민선
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.149-166
    • /
    • 2002
  • 국내·외 사회 전 분야의 급속한 전자상거래 발전에 따라 해운·항만 분야에도 인터넷 사업의 진출기회가 확대되고 전략적 활동이 증가하고 있다. 그 중에서도 인터넷을 기반으로 세계가 하나의 시장으로 통합되는 경향을 보이고 있어 기업의 활동 범위가 광역화되고 있으며, 시간과 장소의 통합이 기업간 거래에서 중요시 되고 있다. 지금 세계 각 국은 해상연계 물류, 무역 등 물품의 중개 관련 사이트 및 선박 운송에 따른 각종 해운관련 서비스를 가상 공간에서 제공하는 사이버 해운 시장의 선점 및 구축에 모든 힘을 쏟고 있다. 해상 운송에 따른 각종 수송서비스를 생산, 공급하는 경제활동을 해운 활동이라 한다. 해운 시장의 불확실성, 다변성, 국제성, 개방성을 특성으로 하는 해운 거래는 전자상거래를 통해 효율적으로 처리될 수 있다. 즉, 해운 거래의 비용 감소와 양질의 서비스로 선주, 화주 등 거래 당사자들의 만족도를 높일 수가 있다. 이에 따라 국내에서도 오프라인상의 해운 거래소가 사이버 해운거래소로 옮겨질 예정이다. 가상 공간을 통한 해운 거래의 구체적인 장점은 다음과 같다. 구매업체는 기존 공급업체에 대한 접근 및 새로운 공급업체의 확보가 용이하며, 경쟁 입찰 등을 통해 저렴한 비용으로 물품을 구입할 수 있다. 판매 업체의 경우 채널 확장이 가능하며 판매비를 절감할 수 있다. 또한 e-Marketplace의 입장에서 보면 해운 산업 전체를 위한 새로운 시장을 형성할 수 있으며, 이를 통해 지속적인 수익 창출도 가능하다. 이러한 해운 거래의 B2B e-Marketplace의 출현은 향후 해운 거래의 새로운 패러다임으로 자리 잡을 것이다. 사이버 해운 거래소는 선박 매매와 용선, 화물 거래를 위한 선·화주의 연결, 표준화된 카탈로그 구축, 각종 전자문서 생성, 전자 결제, 온라인 보험 가입, 해운 선용품 판매 및 관련 정보 제공 등 해운 거래를 위한 종합적인 서비스가 제공되어야 한다. 이를 위해, 본문에서는 e-Marketplace의 효율적인 연계 방안에 대해 해운 관련 업종별로 제시하고 있다. 리스트 제공형, 중개형, 협력형, 보완형, 정보 연계형 등이 있는데, 이는 해운 분야에서 사이버 해운 거래가 가지는 문제점들을 보완하고 업종간 협업체제를 이루어 원활한 거래를 유도할 것이다. 그리하여 우리나라가 동북아 지역뿐만 아니라 세계적인 해운 국가 및 물류 ·정보 중심지로 성장할 수 있는 여건을 구축하는데 기여할 것이다.

  • PDF

A Study on Economic Operation for Liner-Fleet by Fluctuation of Fuel Oil Price (연료유 가격변동에 따른 컨테이너선대의 경제적 운영방안)

  • Lee, Soo-Dong;Shin, Jeong-Hoon;Kim, Chul-Hyun;Chang, Myung-Hee
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2009.06a
    • /
    • pp.173-174
    • /
    • 2009
  • For container shipping company, fuel oil prise is a considerable expense. In the last 3 years, fuel oil prises have risen considerably. An increasing fuel oil prise in container shipping, in the short term, is only partially compensated through surcharges and will therefore affect earnings negatively. This paper deals with the impact of increasing fuel oil price and capital costs for vessels on the number of vessels on the Asia-Europe trade. As per result of 'H' carrier's operation in 2008, there were no cost difference between 8 and 9 vessels operation in case the fuel oil price is USD 169/tons while adopt USD 31,818 as fixed cost. We can expect that the fuel oil price will not be decreased under USD 200 $/Ton on the basis of current high oil price phenomenon. When the fuel oil price is over USD 200 $/ton, therefore, 9 vessels operation is more economic than 8 vessel operation even if the fixed cost is over USD 35,000.

  • PDF

A Study on the Revitalization Strategy for Inter-Korean Railway by Building the Railway Logistics Depot - Focused on the Donghae Line - (철도 물류기지 구축을 통한 남북철도 활성화 방안 연구 - 동해선을 중심으로 -)

  • Kim, Young-Min;Cho, Chi-Hyun
    • Journal of Distribution Science
    • /
    • v.8 no.2
    • /
    • pp.5-12
    • /
    • 2010
  • The allotment rate for railway transportation keeps an yearly 6% in Korea. However, the railway logistics will cause the opposite result according to the continuous investment and logistics rationalization. The study on railway logistics as well as inter-Korean railway that might highly contribute to the development of railway logistics is not enough at all. The purpose of this paper is to study the revitalization strategy for inter-Korean railway by forecasting the demand and the scale of railway logistics depot. The revitalization strategies for inter-Korean railway through railway logistics depot are as followings. First, it is necessary to strengthen the partnership with coal user in the logistics depot. Second, it is encouraged to provide the financial assistance that are needed in the maintenance of the decrepit North Korea's track as well as the establishment of Donghae northern line that is from Gangneung to Jejin. Third, the railway cost on long/short transportation and large sized shipper is needed to apply in a flexible way. Fourth, it is necessary to obtain the railway traffic right by involving the foreign mining development. Fifth, it is encouraged to constantly find the small sized shipper like cement company.

  • PDF

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

A Study on Seeking an Alternative Approach to the Remedy for Breach of the Duty of Disclosure in English Marine Insurance Law (영국 해상보험법에서 고지의무 위반에 대한 구제의 대안에 관한 연구)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.24
    • /
    • pp.25-49
    • /
    • 2004
  • English contract law has traditionally taken the view that it is not the duty of the parties to a contract to give information voluntarily to each other. In English law, one of the principal distinctions between insurance contract law and general contract law is the existence of the duty of disclosure in insurance law. This article is, therefore, designed to analyse the scope or extent of the duty of disclosure and the remedy for breach of the duty in English marine insurance law. The main purpose of this article is also to seek the alternative remedy for the breach. The results of analysis are as following : First, the scope of the duty of disclosure is closely related to the test of materiality and the concept of a hypothetical prudent insurer. The assured is required to disclose only material circumstances subject to MIA 1906, s. 18(1). The test of materiality, which had caused a great deal of debate in English courts over 30 years, was finally settled by the House of Lords in Pan Atlantic and the House of Lords rejected the 'decisive influence' test and the 'increased risk' test, and the decision of the House of Lords is thought to accept the 'mere influence' test in subsequent case by the Court of Appeal. Secondly, an actual insurer is, in order to avoid contract, required to provide proof that he is induced to enter into the contract by reason of the non-disclosure of the assured. But this subjective test of actual inducement is somewhat meaningless in sense that English court takes the test of materiality as a starting point and assumes the presumption of inducement even in case of no clear proof on the inducement. Finally, MIA 1906, s. 18 provides expressly for the remedy of avoidance of the contract for breach of the duty of disclosure. This means rescission or retrospective avoidance of the entire contract, and the remedy is based upon a fairly crude 'all-or-nothing' approach. The remedy of rescission is too draconian from the point of view of the assured, because he can be deprived of all cover despite he is innocent perfectly. An inadvertent breach from an innocent mistake is as fatal as wilful concealment. What is, therefore, needed in English marine insurance law with respect to remedy for the breach is to introduce a more sophisticated or proportionate remedy ascertaining degrees of fault.

  • PDF

A Survey Study on the Performance of Cyber Trade of Korean Traders (사이버무역에 관한 무역업계 실태(實態) 조사(調査))

  • Sim, Sang-Bee
    • International Commerce and Information Review
    • /
    • v.2 no.1
    • /
    • pp.149-158
    • /
    • 2000
  • [ $\Box$ ]무역업계는 인터넷의 발전에 따라 급속히 사이버화 하고 있는 무역환경에 적극적으로 대응하기 위해 사이버무역의 도입과 활성화를 위한 움직임을 급속히 확대하고 있는 것으로 나타났다. - 조사대상업체의 절반이 넘는(51.8%) 업체들이 자사제품 홍보, 거래선 발굴, 오퍼 및 거래협상 둥 각종 무역업무에 인터넷을 이용하고 있는 것으로 나타났다. - 그러나 무역업계의 사이버무역 활용은 아직 초기단계 수준으로, 이용업체의 절반이상(57.3%)은 작년(1999년) 이후에 처음으로 사이버무역을 시작하였으며 사이버무역에 의한 수출비중도 10% 미만(1999년: 8.8%)의 낮은 수준인 것으로 조사되었다. - 반면, 향후 무역업계의 사이버무역 도입 확대와 수출비중 증가는 가속화될 것으로 나타나, 2000년에는 사이버무역 비중이 전년보다 두 배 이상 늘어난 18.7%에 달할 것으로 예상되었으며, 특히 중소기업의 경우 사이버무역 비중이 상대적으로 대기업보다 커질 것으로 전망되었다. $\Box$ 무역업계가 사이버무역을 도입하는 이유로는 "해외시장 개척효과" 때문이라는 응답이 가장 많았으며, 다음으로 "수출업무 신속화률 통한 인건비 절감"과 "광고비의 절약" 등의 효과를 염두에 두고 있는 것으로 나타났다. - 따라서 여러 수출단계 중에서도 "해외거래선 발굴", "해외시장정보의 수집", "자사 제품의 해외 홍보" 등 주로 시장개척과 마케팅단계에서 사이버무역이 가장 많이 활용되고 성과도 큰 것으로 나타났다. - 시장개척과 마케팅을 위하여 약 40%의 무역업체가 무역거래 알선 사이트를 이용하고 있으며 특히 중소기업의 활용이 두드러진 것으로 파악되었다. - 반면, 사이버무역 활동이 애로를 겪고 있는 수출단계로는 "대금결제, 물류 유통", "신용조회", "거래계약 체결" 등의 순으로 조사되었는데, 이는 국제적 인증제도의 미비, 신용조사에 대한 공신력 부족 둥이 주된 요인인 것으로 분석되었다. $\Box$ 한편, 무역업계는 사이버무역의 필요성과 활용성과에 대해 긍정적인 인식을 갖고 있으나, 사이버무역을 활성화하는데 필요한 인프라로서 사이버 무역 전문인력이나 인터넷 통신환경 등은 아직 만족할 만한 수준이 못 되는 것으로 조사되었다. - 사이버인력 부문에서는 무역업무 종사자 중 인터넷 활용직원의 비율이 50%가 되지 않는 업체가 전체의 절반을 넘고 있으며, 특히 중소기업의 인터넷 활용 직원의 비율이 대기업에 비해 낮은 것으로 나타났다. - 향후 무역업체가 10명의 무역인력을 채용한다고 가정할 경우, 평균 4.5명을 사이버무역 전문인력으로 채용할 계획이라고 밝히고 있으며, 중소기업(4.7명)이 대기업(3.4명)보다 사이버무역 전문인력에 대한 수요가 더 큰 것으로 나타나 이에 대한 대책이 시급한 것으로 파악되었다. - 인터넷 전용선 설치비율도 전체적으로 40%대에 그치고 있으며, 특히 중소기업의 경우 전용선 이용비율(38.5%)이 대기업(80%)의 절반에도 못미치는 열악한 수준에 있어 중소기업의 사이버 무역이용에 하나의 걸림돌이 되고 있는 것으로 조사되었다. $\Box$ 사이버 무역활성화를 위해 가장 시급한 과제로는 "사이버무역 전문인력 확충을 위한 체계적 교육 및 훈련제공"과 "사이버무역 관련법규 및 제도의 마련"으로 나타나, - 정부나 유관기관이 앞장서서 사이버무역 관련 교육프로그램의 개발, 자격시험제도의 도입 등과 아울러 대외무역법 둥 관련법률 및 제도를 정비해 줄 것을 무역업계에서 기대하는 것으로 지적되었다.

  • PDF

Improvement of Performance for Online Certificate Status Validation (실시간 인증서 상태검증의 성능개선)

  • Jung, Jai-Dong;Oh, Hae-Seok
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.433-440
    • /
    • 2003
  • According as the real economic activities are carried out in the cyber world and the identity problem of a trade counterpart emerges, digital signature has been diffused. Due to the weakness for real-time validation using the validation method of digital signature, Certificate Revocation List, On-line Certificate Status Protocol was introduced. In this case, every transaction workload requested to verify digital signature is concentrated of a validation server node. Currently this method has been utilized on domestic financial transactions, but sooner or later the limitation will be revealed. In this paper, the validation method will be introduced which not only it can guarantee real-time validation but also the requesting node of certificate validation can maintain real-time certificate status information. This method makes the revocation management node update the certificate status information in real-time to the validation node while revoking certificate. The characteristic of this method is that the revocation management node should memorize the validation nodes which a certificate holder uses. If a certificate holder connects a validation node for the first time, the validation node should request its certificate status information to the above revocation management node and the revocation management node memorizes the validation node at the time. After that, the revocation management node inform the revocation information in real-time to all the validation node registered when a request of revocation happens. The benefits of this method are the fact that we can reduce the validation time because the certificate validation can be completed at the validation node and that we can avoid the concentration of requesting certificate status information to a revocation node.

A Study on Spam Regulation (스팸규제에 관한 연구)

  • Baek, Yun-Chul
    • Journal of Information Management
    • /
    • v.38 no.4
    • /
    • pp.48-67
    • /
    • 2007
  • The economic burden which our society has to take exceeds the benefit that it becomes by the free circulation of information. Problems such as inconvenience or inequality between people can also occur since the regulation task of spam e-mail or SMS is imposed on two organs; the Department of Information and Communication and Free Trade Commission. The dualization of regulation separates related laws, which makes exception according to the $\ulcorner$Law on Information Communication Usage and Information Protection$\lrcorner$ or poses double regulation toward the same case. The spam prevention activity at free hands of information communication network provider such as portal site or mobile communication has many limitations along with comparison and analysis of spam regulations abroad. Therefore, examinations on legal obligation such as service restriction, identification and technical measure to spam prevention is needed. This study focuses on making the scope of spam regulation clear by considering the domestic related laws and the general environment of industry, on enacting law which regulates spam including advertisement and on deducting essential facts in enacting or modifying related laws and thus, deducting the form and contents of spam regulation law which is most decent in our domestic environment.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.