• Title/Summary/Keyword: Legal protection

Search Result 692, Processing Time 0.027 seconds

A Study on the Ways to Joint Marine Development and Joint Marine Environmental Protection in Northeast Asia (동북아 해역 권원중첩수역 공동개발합의와 공동환경보호합의 도출 방안)

  • Kim, Ki-Sun
    • Strategy21
    • /
    • s.37
    • /
    • pp.193-241
    • /
    • 2015
  • China, Japan and Korea are the world's top 10 energy consumers, and so very interested in the development of seabed hydrocarbon resources in order to meet their energy demands. The East China Sea is the tri-junction area where three countries' entitlements on the maritime boundaries are overlapped. There are abundant oil reserves in the East China Sea, and therefore competitions among countries are growing to get control of them. Although these countries have concluded the bilateral agreements to jointly develop resources in the East China Sea, they do not function as well. Because joint development and management of seabed petroleum resources can lead to stable development system, and to lower possibility of legal and political disputes, the needs for joint development agreement among three countries are urgent. Meanwhile, Northeast Asian seas are semi-closed seas, which are geographically closed and vulnerable to marine pollution. Moreover there are a lot of nuclear power plants in coastal area, and seabed petroleum resources are being developed. So it is likely to occur nuclear and oil spill accidents. Fukushima nuclear disaster and Bohai Bay oil spill accident in 2011 are the cases to exhibit the potential of major marine pollution accidents in this area. It is anticipated that the risks become higher because power plants and offshore oil platforms are extending gradually. Therefore, the ways to seek the joint marine environmental protection agreement focused on regulation of nuclear power plant and offshore oil platform have to be considered. In this paper, we try to find the way to make joint development and joint environmental protection agreement in Northeast Asian seas. We concentrate on the measure to drive joint development of seabed petroleum deposits in East China Sea's overlap area, despite of maritime delimitation and territorial disputes, and we try to drive joint marine environmental protection system to respond to marine pollution and accidents due to offshore oil platform and nuclear power plants. Through these consideration, we seek solutions to deal with lack of energy, disputes of maritime territorial and boundary delimitation, and marine pollution in Northeast Asia.

Analysis of National Critical Information Infrastructure (NCII) Protection Policy Promotion System Based on Modified Policy Model Theory (수정된 정책모형이론에 기반한 국가정보통신기반시설 보호정책 추진체계 분석)

  • Ji-yeon Yoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.347-363
    • /
    • 2024
  • As the number of cyberattacks against the National Critical Information Infrastructure (NCII) is steadily increasing, many countries are strengthening the protection of National Critical Information Infrastructure (NCII) through the enactment and revision of related policies and legal systems. Therefore, this paper selects countries such as the United States, the United Kingdom, Japan, Germany, and Australia, which have established National Critical Information Infrastructure (NCII) protection systems, and compares and analyzes the promotion system of each country's National Critical Information Infrastructure (NCII) protection policy. This paper compares the National Critical Information Infrastructure (NCII) protection system of each country with the cybersecurity system and analyzes the promotion structure. Based on the policy model theory, which is a modification of Allison's theory and Nakamura & Smallwood's theory, this paper analyzes the model of each country's promotion system from the perspective of policy-making and policy-execution. The United States, Japan, Germany, and Australia's policy-promotion model is a system-strengthening model in which both policy-making and policy-execution are organized around the protection of the National Critical Information Infrastructure (NCII), while the United Kingdom and South Korea's policy-promotion model is an execution-oriented model that focuses more on policy-execution.

Study of the Fire Safety of Elderly Long-term Care Facilities for Welfare (노인요양시설의 소방안전에 대한 노인복지적 고찰)

  • Park, Hyunsik;Rhee, Okjin
    • Fire Science and Engineering
    • /
    • v.30 no.6
    • /
    • pp.124-129
    • /
    • 2016
  • This study examined cases of duplication and confliction of legislation related to fire safety in long-term care facilities. In addition, the aim was to provide implications about those cases in the perspectives of welfare for the aged. In relation to fire protection facilities, long-term care facilities are regulated by the Building Act and Fire Protection Act. Among those Acts, certain gaps, and conflicts by duplicated regulations were found. Although the related-acts have improved gradually, unsolved issues and retroactive applications still remained. The problems stated above were defined by reviewing specific cases and legal improvements in the perspectives of welfare for the aged were suggested.

Watermarking Technique for the Digital Contents Protection (디지털콘덴츠 보호를 위한 워터마킹 기술)

  • Song Hag-hyun;Kim Yoon-ho
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.66-72
    • /
    • 2004
  • Beyond the digital world from the analog age, the contents are very easily copied under the illegal conditions and these are rapidly distributed by the information super highway. The increase of ilegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Watermarking technology support to the legal users by the protection technique based chi the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we have researched the standardization of digital rights management and developed more efficient watermark embedding method.

  • PDF

FFT Based Information Concealing Method for Video Copyright Protection (동영상 저작권보호를 위한 FFT 기반 정보 은닉 기법)

  • Choi, Il-Mok;Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.62 no.4
    • /
    • pp.204-209
    • /
    • 2013
  • FFT based fingerprinting to conceal more information has developed for video copyright protection. More complex information of video is necessary to prove an ownership and legal distributions in invisible form. This paper describes a method to insert more information and to detect them. $3{\times}3$ points structure is used to present information. The possible ways to show are 8bit, $2^8$ = 256 where one point of 9 is always turn on. The points are marked in frequency domain that both real and imaginary party numbers are modified. The five successive frames of same scenes are used to mark because the same scene has very similar shape in FFT result. However, the detail values of coefficients are totally different each other to recognize the marked points. This paper also describes a method to detect the marked points by averaging and correlation algorithm. The PSNRs of marked images by our method had 51.138[dB] to 51.143[dB]. And we could get the correlation values from 0.79 to 0.87.

Watermarking Technique for the Digital Contents Protection (영상 콘텐츠 지적재산권 보호 워터마킹 기술)

  • 송학현;김윤호;류광렬
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.144-148
    • /
    • 2004
  • Beyond the digital world from the analog age, the contents are very easily copied under the illegal conditions and these are rapidly distributed by the information super highway. The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Watermarking technology support to the legal users by the protection technique based on the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we researched the standardization of digital rights management and developed more efficient watermark embedding method.

  • PDF

A Design of illegal Usage Protection System of Software through Internet (인터넷을 통한 소프트웨어 불법사용 방지시스템 설계)

  • 이상렬
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.110-118
    • /
    • 2001
  • In this paper we designed the software copyright protection system using encryption technology. Recently most of the softwares have used a password instead of physical devices such as lock key for the software copyright protection. In this case if the password be disclosed. somebody will carl use the software illegally. Therefore if the legal user disclose the password intentionally, somebody will can use more than license numbers. If we use the system suggested in this paper it will not be permitted to use concurrently more than license numbers. As a result nobody can use any softwares illegally. All of the software developers can check a sale amount correctly And the users can get the service of software maintenance quickly.

  • PDF

Current Status and Issues in Digital Trade Agreements: Focusing on Cross-border Data Flows and Data Protection (디지털 통상의 국제규범화 현황과 쟁점: 국경 간 데이터 이동 및 데이터 보호를 중심으로)

  • Joo Hyoung Lee;Jeongmeen Suh;Jaeyoun Roh
    • Korea Trade Review
    • /
    • v.46 no.3
    • /
    • pp.99-117
    • /
    • 2021
  • Korea's FTA e-commerce regulations are evolving into a standardized norm. However, "location of computing facilities", which was not covered by Korea's existing FTA, was newly established in Korea's first Mega FTA, RCEP. China, a member of RCEP, restricts data movement and requires data localization through its Cybersecurity law. These facts have led to start this study with interest in data-related regulations. It examined country-specific and regulatory characteristics in the process of forming digital trade norms, using the TAPED established by Burri et al. (2020). It also analyzed the current status of introducing norms related to 'data flow', 'data localization' and 'data protection' of the EU, USA and China, which are leading the formation of e-commerce trade norms. Finally, the legal review was conducted to compare the exact meaning of the wording expressed in each agreement for the six recently enacted Mega FTAs and Digital Economic Agreements. These findings are meaningful in that they provided implications for the effectiveness of RCEP and the direction of negotiations on Korea's digital trade norms.

Classification Type of Vascular Plants in Ecological Forest Site on the Gujaebong (Mt.), Hadong (하동 구재봉 생태숲 조성부지의 관속식물상 유형별 분류)

  • Oh, Hyun-Kyung
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.13 no.4
    • /
    • pp.18-29
    • /
    • 2010
  • The vascular plants in ecological forest site on the Gujaebong (Mt.), Hadong were listed 338 taxa; 85 families, 219 genera, 290 species, 1 subspecies, 40 varieties and 7 forms. Divided into 338 taxa; woody plants were 121 taxa (35.8%) and herbaceous plants were 217 taxa (64.2%). Based on the legal protection species, endangered wild plants II were recorded; Aconitum austro-koreense, Corylopsis gotoana var. coreana and rare plants (IUCN) by the Korea Forest Service and Korea National Arboretum 5 taxa were recorded; Botrychium virginianum, Aconitum austro-koreense, Coreanomecon hylomecoides, Corylopsis gotoana var. coreana, Viola albida. Based on the list of Korean endemic plants, 13 taxa were recorded; Cephalotaxus koreana, Thalictrum actaefolium, Vicia nipponica, Indigofera koreana, Stewartia koreana, Weigela subsessilis, etc. Based on the list of approved for delivering overseas of plants, 5 taxa were recorded; Coreanomecon hylomecoides, Vaccinium oldhami, Paulownia coreana, Asperula lasiantha, Carex okamotoi. Specific plant species by floral region were total 21 taxa (6.2% of all 338 taxa of vascular plants); Aconitum austro-koreense, Corylopsis gotoana var. coreana in class V, Cimicifuga heracleifolia, Coreanomecon hylomecoides in class IV, 4 taxa (Stewartia koreana, Phacellanthus tubiflorus, Lonicera subhispida, etc.) in class III, Potentilla dickinsii, Viola orientalis in class II, 11 taxa (Aconitum jaluense, Angelica anomala, Erythronium japonicum, etc.) in class I. The naturalized plants in the surveyed sites were 8 families, 15 genera, 15 taxa (Phytolacca americana, Crassocephalum crepidioides, Lolium perenne, etc.) and naturalization rate was 4.4% of all 338 taxa of vascular plants.

Applicability of Mandatory Rules for Seafarer Protection

  • Sohn, Kyung Han
    • Journal of Arbitration Studies
    • /
    • v.30 no.3
    • /
    • pp.21-45
    • /
    • 2020
  • The major legal issues of this case were governing law questions regarding the liability of the shipowner/employer to its employee. It is true that in the absence of the parties' choice of law, the arbitral tribunal may apply the substantive laws or rules of law which it deems appropriate. However, it does not mean that the arbitral tribunal has arbitrary discretion in choosing the appropriate law as the governing law of the case; rather, the arbitrators should carefully examine the conflict of law rules of the forum and the requirement of the law of the country where the upcoming arbitral award will be enforced. They must bear in mind the role of the "connecting factors" in determination of the governing law. Therefore, the application of an alien law, which has minimal connecting factor with the case, may lead to a conclusion that is hardly understood by the parties. On the same token, the arbitrators must pay attention to applying the mandatory rules of a country, the laws of which not being the governing law of the issue. It is said that the application of the mandatory rules is a necessary evil to secure the enforcement of the award in the country, which has national interest in applying its own law to the issue. Further, arbitrators must pay attention to the consistent application of the law and respect the integrity of a legal system to reach a fair conclusion. The place of service of a seafarer for a vessel navigating international sea ought to be its home port country rather than the country of the ship registry, and the party autonomy in choice of the law in a seafarer employment should be respected.