The purpose of this study is to reveal and confirm the factor structure inherent in the Korean inventory of peer relationships(KIPR; Sang-Hwang Hong, et al., 2009) in order to strengthen the interpretive usefulness of the test. For this purpose, the inventory was administered to the total of 616 children in the fourth through sixth grades in three elementary schools located in Gyungnam area, and the data from 578 of them were analyzed. The results of the study can be summarized as follows. First, as a result of the exploratory factor analysis of 3-factor and 4-factor models, the 3-factor model was found to be more appropriate. In the 3-factor model, the factor 1 is named "Lack of Self-Confidence and Social Withdrawal" as it consists of such circumplex scale items as Non-Assertiveness (C5), Social Avoidance (C4), the Cold (C3), and Too Submissive (C6). The factor 2 is named "Too Aggressive and Controlling" and consists of items Too Controlling (C1) and Hard to be Supportive (C2). The factor 3 is named "Too Caring" and consists of items Too Responsible (C7), Over Involvement (C8), and Too Submissive (C6). Second, as a result of the confirmatory factor analysis, the 3-factor model, in comparison to the 4-factor model, was found to better reflect the collected data(RMSEA=.054), its goodness of fit was not satisfactory but within the acceptable range(CFI=.786), and its power of simplicity and clarity was also adequate(PCFI=.733). In the current study, through the exploratory and confirmatory factor analyses of scores from the Korean inventory of peer relationships circumplex scales, scales within the peer relationship circumplex model that are near each other and are highly correlated were confirmed to be grouped together as same factors. I believe the main merit of the study lies in the above result having provided the necessary foundation for forming the superordinate and representative scale that encompasses the eight circumplex scales, which enhances the test's interpretive usefulness.
This study investigates the relation of managerial ability and firm performance in case of Chaebol in Korea. We employ non-financing firms at Korean markets for the period 2000-2015. Most important decision is made by the head of Chaebol which increases firm value eventually and he has such a strong dominant power that managers belongs to Chaebol have to follow mother firm's decision directions. So it is expected that managers belongs to Chaebol have to focus on long term performance rather than short term profits, which means they concentrate their managerial ability much on the firm value. Otherwise, managers in which non-Chaebol focus their ability on periodic accounting earnings. Thus, this study examines an empirical analysis on the relation of managerial ability and firm performance and the effect of Chaebol on the relation of managerial ability and firm performance. Empirical results are as follows: First, there exists a statistically significant positive relation between managerial ability and firm performance either short- or long-term. Second, we extend this relationship into Chaebol condition and find that managerial ability of Chaebol positively influences on the firm value which is long-term performance, rather than return on assets which is short-term performance. These results imply that managers belongs to Chaebol much concentrate their ability on long-term value which is differenciated from the case of non-Chaebol samples. Chaebol is an important issue in Korea because it dominates most of Korean local economy so its' impact from small changes on our economy is big enough. Our study examining the relationships between managerial ability of Chaebol and firm performance is meaningful and it is a good signal that they concentrate their ability much on the long-term value rather than short-term profits. We expect that the results of this study will provide the academic and practical references. This study will contribute to the future research in accounting through an analysis of managerial ability which is a new measure, Chaebol, and firm value.
In this study, it is analyzed whether oil price plays a major role in the pricing return on Koran stock market and examined why the covariance risk between oil and return on stock is different in each industry. Firstly, this study explores whether the expected rate of return on stock is pricing due to global oil price factors as a function of risk premium by using a two-factor APT. Also, it is examined whether spill-over effects of oil price volatility affect the beta risk to oil price. Considering the asymmetry of oil price volatility, we use the GJR model. As a result, it shows that oil price is an independent pricing factor and oil price volatility transmits to stock return in only electricity and electrical equipment. Secondly, the two step-analyzing process is introduced to find why the covariance between oil price factor and stock return is different in each industry. The first step is to study whether beta risk exists in each industry by using two proxy variables like size and liquidity as control variables. The second step is to grasp the systematic relationship between the difference of liquidity and size and beta to oil price factor by using the panel-data model which can be analyzed efficiently using the cross-sectional data formed with time series. Through the analysis, we can argue that oil price factor is an independent pricing factor in only electricity and electrical equipment having the greatest market capitalization, and know that beta risk to oil price factor is a proxy of size in the other industries. According to the result of panel-data model, it is argued that the beta to oil price factor augments when market capitalization increases and this fact supports the first assertion. In conclusion, the expected rate of return of electricity and electrical equipment works as a function of risk premium to market portfolio and oil price, and the reason to make beta risk power differentiated in each industry attributes to the size.
The present study explored and compared the risk factors of two subtypes of maritally violent men with those of a nonviolent comparison group. One type of batterers consisted of a community sample, and the other was sought from the criminal justice system. The identities of the male community batterers were not exposed to the society since their victims did not contact any of the social service agents related to domestic violence. To identify the different characteristics associated with two subtypes of woman abusers, a total of 152 nonviolent men, 82 male community batterers, and 336 offenders in a criminal justice system were considered. The results of the descriptive analysis showed that the level of physical violence of the community batterers was two times lower than that of the batterers who received legal punishments. The results of the multinominal logistic regression were as follows: (1) The variables that distinguished the male community batterers from the nonviolent men were the use of physical violence towards children, marital decision power, and income. (2) Four factors had been found to distinguish batterers in the criminal justice system from nonbatterers, namely: attitudes towards woman battering, education, violence towards children, and level of jealousy. (3) The community batterers showed a higher level of education and of stress as well as a longer period of marital relationship compared to the batterers in the criminal justice system. On the other hand, the batterers who received legal punishments had more severe alcohol problems and had an accepting attitude towards the use of violence. This study also investigated psychopathology among batterers using MCMI-III, based on 333 subjects. In terms of the mean scores, there were no subscales associated with personality pathology in all the male groups. Based on the logit model, the community batterers showed a stronger tendency towards having a passive-aggressive personality than did their counterparts, and they recorded a higher level of narcissism compared to the court-referred battering men. Post-traumatic stress was the only symptom that distinguished the batterers who received legal punishments from the other groups. The theoretical and practical implications of these results were pointed out and discussed in the paper.
In his highly cited book, Innovator's Dilemma (1997), Christensen introduced a notion of disruptive technology that is based on the observations from disk-drive industry and used it as an explanatory variable through which new entrants outperform incumbents in the industry. In explaining his later observations of disruptive innovations in other industries, however, his early theory based on disruptive technology has been applied to all cases without careful distinction between the notions of technology and business model (Markides, 2006). Furthermore, it has been criticized that his model suffers from lack of enough explanatory power and other important factors that are necessary to fully explain the observed phenomena in various cases (Danneels, 2004). Motivated by the critics in literature, the current study carefully distinguishes between innovation of technology and innovation of business model in the process of disruptive innovation, and apply our framework to the case of internet shopping mall business. Our study yields two main results. First, the internet-related business model which Christensen argued as an example of disruptive innovation is accomplished through two distinctive and separable growth phases: a period of technology growth and a period of business model growth. Second, in the process of disruptive innovation, the notion of enabling technology plays an important bridging role that connects core technology and business model. Furthermore, we confirm that the success of business model innovation depends on the degree of maturity of the enabling technologies. In conclusion, Christensen's notion of disruptive innovation can be further detailed in terms of technology innovation and business model innovation, and if there exist enabling technologies, the chance of success of the business model is higher when the enabling technology is matured rather than when the core technology is merely acknowledged as a disruptive technology.
This study was designed to empirically analyze the effect of control activities(physical, managerial and technical securities) of information protection on organizational effectiveness and the mediating effects of information application. The result was summarized as follows. First, the effect of control activities(physical, technical and managerial securities) of information protection on organizational effectiveness showed that the physical, technical and managerial security factors have a significant positive effect on the organizational effectiveness(p < .01). Second, the effect of control activities(physical, technical and managerial securities) of information protection on information application showed that the technical and managerial security factors have a significant positive effect on the information application(p < .01). Third, the explanatory power of models, which additionally put the information protection control activities(physical, technical and managerial securities) and the interaction variables of information application to verify how the information protection control activities( physical, technical and managerial security controls) affecting the organizational effectiveness are mediated by the information application, was 50.6%~4.1% additional increase. And the interaction factor(${\beta}$ = .148, p < .01) of physical security and information application, and interaction factor(${\beta}$ = .196, p < .01) of physical security and information application among additionally-put interaction variables, were statistically significant(p < .01), indicating the information application has mediated the relationship between physical security and managerial security factors of control activities, and organizational effectiveness. As for results stated above, it was proven that physical, technical and managerial factors as internal control activities for information protection are main mechanisms affecting the organizational effectiveness very significantly by information application. In information protection control activities, the more all physical, technical and managerial security factors were efficiently well performed, the higher information application, and the more information application was efficiently controlled and mediated, which it was proven that all these three factors are variables for useful information application. It suggested that they have acted as promotion mechanisms showing a very significant result on the internal customer satisfaction of employees, the efficiency of information management and the reduction of risk in the organizational effectiveness for information protection by the mediating or difficulty of proved information application.
Kim, Yi-Hyun;Hong, Suk-Young;Lee, Hoon-Yol;Lee, Jae-Eun
Korean Journal of Remote Sensing
/
v.27
no.2
/
pp.191-201
/
2011
Soybean has widely grown for its edible bean which has numerous uses. Microwave remote sensing has a great potential over the conventional remote sensing with the visible and infrared spectra due to its all-weather day-and-night imaging capabilities. In this investigation, a ground-based polarimetric scatterometer operating at multiple frequencies was used to continuously monitor the crop conditions of a soybean field. Polarimetric backscatter data at L, C, and X-bands were acquired every 10 minutes on the microwave observations at various soybean stages. The polarimetric scatterometer consists of a vector network analyzer, a microwave switch, radio frequency cables, power unit and a personal computer. The polarimetric scatterometer components were installed inside an air-conditioned shelter to maintain constant temperature and humidity during the data acquisition period. The backscattering coefficients were calculated from the measured data at incidence angle $40^{\circ}$ and full polarization (HH, VV, HV, VH) by applying the radar equation. The soybean growth data such as leaf area index (LAI), plant height, fresh and dry weight, vegetation water content and pod weight were measured periodically throughout the growth season. We measured the temporal variations of backscattering coefficients of the soybean crop at L, C, and X-bands during a soybean growth period. In the three bands, VV-polarized backscattering coefficients were higher than HH-polarized backscattering coefficients until mid-June, and thereafter HH-polarized backscattering coefficients were higher than VV-, HV-polarized back scattering coefficients. However, the cross-over stage (HH > VV) was different for each frequency: DOY 200 for L-band and DOY 210 for both C and X-bands. The temporal trend of the backscattering coefficients for all bands agreed with the soybean growth data such as LAI, dry weight and plant height; i.e., increased until about DOY 271 and decreased afterward. We plotted the relationship between the backscattering coefficients with three bands and soybean growth parameters. The growth parameters were highly correlated with HH-polarization at L-band (over r=0.92).
How much influence does a business plan have on a corporate performance? Whilst previous studies and literatures all assert a strong correlation between the two, very few have actually conducted practical analyses to support that. This study takes an empirical approach in its analysis of Korea' s small and medium-sized enterprises (SME) with the view to finding an answer to the question. A business plan' s components, which have to date been suggested only in theory and in concept, have been selected through the study of literatures and preliminary examination. The selected components were then narrowed down into five factors of productivity, implementation, operational direction, product/service and customer accessibility by applying factor analysis. With which items to measure corporate performance is also an important question as results differ depending on which measurement items were used. For the purpose of this study, corporate performance was classified into effectiveness, adaptability and efficiency to measure how greatly each is influenced by the components of a business plan. Results show that effectiveness and adaptability have a positive (+) influence on corporate performance. The regression model seems to explain effectiveness particularly well. However, different directions of influences were showed in explain power of the research model were not high. And it can be interpreted that implementation of the plan is as important as the establishment of it. Thus a good corporate performance is to be had only under an excellent plan and following an excellent implementation. In most of the companies surveyed, business plans were established regularly led by the intense involvement of the CEO. Such plans were then used in internal operations, such as guiding operational direction and measuring corporate performance. Unlike general expectations, relatively few companies used them in financing from external sources such as banks or venture capitals. These findings are different from previous studies conducted in this field. Also, as market uncertainty was pointed out as the biggest obstacle to business planning. a manager must pay more attention to acquiring external information and knowledge so as to minimize it.
Recently the abusive calls on on-demand bonds have been a critical issue among many engineering and construction companies in Korea. On-demand bond is referred to as an independent guarantee in the sense that the guarantee is independent from its underlying contract although it was issued based on such underlying contract. For this reason, the issuing bank is not required to and/or entitled to look into whether there really is a breach of underlying contract in relation to the call on demand-bonds. Due to this kind of principle of independence, the applicant has to run the risk of the on demand bond being called by the beneficiary without due grounds. Only where the call proves to be fraudulent or abusive in a very clear way, the issuing bank would not be obligated to pay the bond proceeds for the call on on-demand bonds. In order to prevent the issuing bank from paying the proceeds under the on-demand bond, the applicant usually files with its competent court an application for injunction prohibiting the beneficiary from calling against the issuing bank. However, it is in practice difficult for the applicant to prove the beneficiary's call on the bond to be fraudulent since the courts in almost all the jurisdictions of advanced countries require very strict and objective evidences such as the documents which were signed by the owner (beneficiary) or any other third party like the engineer. There is another way of preventing the beneficiary from calling on the bond, which is often utilized especially in the United Kingdom or Western European countries such as Germany. Based upon the underlying contract, the contractor which is at the same time the applicant of on-demand bond requests the court to order the owner (the beneficiary) not to call on the bond. In this case, there apparently seems to be no reason why the court should apply the strict fraud rule to determine whether to grant an injunction in that the underlying legal relationship was created based on a construction contract rather than a bond. However, in most jurisdictions except for United Kingdom and Singapore, the court also applies the strict fraud rule on the ground that the parties promised to make the on-demand bond issued under the construction contract. This kind of injunction is highly unlikely to be utilized on the international level because it is very difficult in normal situations to establish the international jurisdiction towards the beneficiary which will be usually located outside the jurisdiction of the relevant court. This kind of injunction ordering the owner not to call on the bond can be rendered by the arbitrator as well even though the arbitrator has no coercive power for the owner to follow it. Normally there would be no arbitral tribunal existing at the time of the bond being called. In this case, the emergency arbitrator which most of the international arbitration rules such as ICC, LCIA and SIAC, etc. adopt can be utilized. Finally, the contractor can block the issuing bank from paying the bond proceeds by way of a provisional attachment in case where it also has rights to claim some unpaid interim payments or damages. This is the preservative measure under civil law system, which the lawyers from common law system are not familiar with. As explained in this article, it is very difficult to block the issuing bank from paying in response to the bond call by the beneficiary even if the call has no valid ground under the underlying construction contract. Therefore, it is necessary for the applicants who are normally engineering and construction companies to be prudent to make on-demand bonds issued. They need to take into account the creditability of the project owner as well as trustworthiness of the judiciary system of the country where the owner is domiciled.
The purpose of this study was to analyze the effect on the selectivity on of high-voltage rectification device that measured the performance of the grid, and the contrast improvement ability (K factor) by measuring the scattered radiation content of the transmitted X-rays. The scattered radiation generated when the X-ray flux comes from the diagnostic X-ray generator that passes through an object. Targeting four different rectifications of X-ray generators, the mean value of the tube voltage and the tube current was measured in order to maximize the accuracy of the generating power dose within the same exposure condition. Using fluorescence meter, the content of the scattered rays that are transmitted through the acrylic was measured depending on the grid usage. When grid is not used, the content of the scattered rays was the lowest (34.158%) with the single-phase rectifier, was increased with the inverter rectifier (37.043%) and the three-phase 24-peak rectification method (37.447%). The difference of the scattered radiation content of each device was significant from the lowest 0.404% to the highest 3.289% while using 8:1 grid, the content of the scattered ray was the lowest with the single content of the scattered ray was the lowest with the single-phase rectifier (18.258%), was increased with the rectifier (25.502%) and the 24-peaks rectification (24.217%). Furthermore, there was difference up to content 7.244% to the lowest content 1.285% within three-phase 24-peaks rectification, inverter rectifications, and single-phase rectifier depending on the selectivity of the grid. Drawn from the statistical analysis, there was a similar relationship between the contrast improvement factor and the K factor. As a result, the grid selectivity and the contrast were increased within the single-phase rectifier rather than the constant voltage rectifier.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.