• Title/Summary/Keyword: Protection Trade

Search Result 306, Processing Time 0.023 seconds

Impact of Foreign Direct Investment and International Trade on Economic Growth: Empirical Study in Vietnam

  • NGUYEN, Hieu Huu
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.3
    • /
    • pp.323-331
    • /
    • 2020
  • The study aims to assess the impact of foreign direct investment (FDI) and international trade (export and import) on Vietnam's economic growth for the 2000-2018 period. Secondary data is taken from the General Statistics Office of Vietnam. Ordinary least-square method is used in analyzing the impact of FDI, export and import on economic growth of Vietnam. Empirical test results show that FDI and international trade are related to Vietnam's economic growth. However, each economic variable has a different impact. FDI has a positive and statistically significant influence on economic growth of Vietnam. Export also has positive and statistically significant impact to the economic growth, while import has a negative but not statistically significant effect. The result is useful for the policy makers of Vietnam on foreign economic relations. In order to improve the effect of FDI and international trade on growth of the economy, the government of Vietnam should: (1) continue applying preferential policies to attract FDI; (2) select foreign investors aiming to quality, efficiency, high technology and environmental protection; (3) continue pursuing export-oriented policy; (4) enhance the added value of exported goods and control the type of imported goods; (5) further liberalize trade through signing and implementation of international trade commitments.

The Trade Regulation in the Multilateral Environmental Agreements on Climate Change (기후변화관련(氣候變化關聯) 국제환경협약체제하(國際環境協約體制下)의 무역규제조항(貿易規制條項))

  • Chung, Ye-Mo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.14
    • /
    • pp.349-370
    • /
    • 2000
  • The environmental problems such as global climate change, global waming, ozone depletion, environmental pollution have been caused by the rapid economic growth, increasing in use of fossil fuels for industrialization and scientific technology development. Especially human activities are significantly altering the atomosphere's composition and its radiative properties. To Stabilize greenhouse gas concentrations in the atmosphere at a level that would prevent dangerous anthropogenic interference with the climate system, the international community adopted the UN Framework Convention on Climate Change in 1992 and Kyoto protocol in 1997. Also to protect ozone layer the international community adopted the Vienna Convention for the Protection of the Ozone Layer in 1985, and the Montreal Protocol on Substances that Deplete the Ozone Layer in 1987. To achieve global environmental objectives, some multilateral environmental agreements includes trade regulation. For example, Montreal Protocol includes the provisions to regulate the world trade of the sudstances which might destroy ozone layer. However Kyoto Protocol has no provisions to regulate trade and is not in force yet. Although there is no trade regulation article in Kyoto Protocol, the international world trade will be influenced by limitation and reduction of CO2 and strengthening the CO2 emission standard for import good. For example Korean car industy agreed with EU to reduce CO2 emission from new passenger car and Korean Semiconductor industry agreed with WSC(World Semiconductor Council) to reduce PFCs in 1999.

  • PDF

Political Economy of Cross-Border Lobbies and the Stringency of the Rules of Origin Verification (해외로비와 원산지규정 사후검증제도의 엄격성에 대한 정치경제학)

  • Seok-Joon Hwang;Uk Hwang;JinKwon Lee
    • Korea Trade Review
    • /
    • v.45 no.1
    • /
    • pp.155-171
    • /
    • 2020
  • In reality, there are numerous [Note: I advise to change the tone to being more certain, as opposed to offering a possibility. You need to emphasize the seriousness of the conditions that your study wants to talk about] non-tariff trade barriers under free trade agreements, with various stakeholders having different trade-off interests. This study focuses on the rules of origin verification and considers cases in which domestic firms, foreign firms, and domestic consumer groups compete politically for their rent protection in the domestic market. As in Gwande et al. (2006), cross-border lobbies are considered possible wherein foreign firms also lobby the government to influence the decision-making process of how stringently to verify the rules of origin. [Note: Starting here, switch to past tense because a: study intentions above can be in present tense, b: study procedures should be in past tense] In this study, we assumed that all stakeholders form interest groups and present political contributions to the government based on their interests. The stringency of the rules of origin verification was then determined through this political process, and we compared this to a socially optimal one in the analysis. It was found that the verification was less stringent when there was cross-border lobbying than the socially optimal one.

Is the U.S. Trade Expansion Act Section 232 Consistent with GATT/WTO Rules? (미국 무역확장법 제232조 조치는 GATT/WTO 규정에 타당한가?)

  • Yin, Zi-Hui;Choi, Chang-Hwan
    • Korea Trade Review
    • /
    • v.44 no.1
    • /
    • pp.177-191
    • /
    • 2019
  • Global trade protectionism has increased further and U.S. priorities and protectionism have strengthened since Trump took office in 2017. Trump administration is actively implementing tariff measures based on U.S. domestic trade laws rather than the WTO rules and regulations. In particular, the American government has recently been imposing high tariffs due to national security and imposing economic sanctions on other countries' imports. According to the U.S. Trade Expansion Act Section 232, the American government imposed additional tariffs on steel and aluminum imports to WTO member countries such as China, India, and EU etc. on march 15, 2018. Thus, this study aims to investigate whether the U.S. Trade Expansion Act Section 232 is consistent with GATT/WTO rules by comparing the legal basis of US / China / WTO regulations related to Section 232 of the U.S. Trade Expansion Act, and gives some suggestions for responding to the Section 232 measure. As the Section 232 measure exceeded the scope of GATT's Security Exceptions regulation and is very likely to be understood as a safeguard measure. If so, the American government is deemed to be in breach of WTO's regulations, such as the most-favored-nation treatment obligations and the duty reduction obligations. In addition, American government is deemed to be failed to meet the conditions of initiation of safeguard measure and violated the procedural requirements such as notification and consultation. In order to respond to these U.S. protection trade measures, all affected countries should actively use the WTO multilateral system to prevent unfair measures. Also, it is necessary to revise the standard jurisdiction of the dispute settlement body and to explore the balance of the WTO Exception clause so that it can be applied strictly. Finally, it would be necessary for Chinese exporters to take a counter-strategy under such trade pressure.

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.

Methods to Introduce Criminal Remedies to Enahnce Effectiveness of Administrative Technology Misappropriation Investigation (기술침해 행정조사의 실효성제고를 위한 분쟁조정 방안 -형사적 구제방안을 중심으로-)

  • Byung-Soo, Kang;Yong-kil, Kim;Sung-Pil, Park
    • Journal of Arbitration Studies
    • /
    • v.32 no.4
    • /
    • pp.53-85
    • /
    • 2022
  • Small and medium-sized enterprises ("SMEs") are vulnerable to trade secret misappropriation. Korea's legislation for the protection of SMEs' trade secrets and provision of civil, criminal, and administrative remedies includes the SME Technology Protection Act, the Unfair Competition Prevention Act, the Industrial Technology Protection Act, the Mutually Beneficial Cooperation Act, and the Subcontracting Act. Among these acts, the revised SME Technology Protection Act of 2018 introduced the "administrative technology misappropriation investigation system" to facilitate a rapid resolution of SMEs' technology misappropriation disputes. On September 27, 2021, Korea's Ministry of SMEs announced that it had reached an agreement to resolve the dispute between Hyundai Heavy Industries and Samyeong Machinery through the administrative technology misappropriation investigation system. However, not until 3 years and a few months passed since the introduction of the system could it be used to resolve an SME's technology misappropriation dispute with a large corporation. So there arose a question on the usefulness of the system. Therefore, we conducted a comparative legal analysis of Korea's laws enacted to protect trade secrets of SMEs and to address technology misappropriation, focusing on their legislative purpose, protected subject matter, types of misappropriation, and legal remedies. Then we analyzed the administrative technology misappropriation investigation system and the cases where this system was applied. We developed a proposal to enhance the usefulness of the system. The expert interviews of 4 attorneys who are experienced in the management of the system to check the practical value of the proposal. Our analysis shows that the lack of compulsory investigation and criminal sanctions is the fundamental limitation of the system. We propose revising the SME Technology Protection Act to provide correction orders, criminal sanctions, and compulsory investigation. We also propose training professional workforces to conduct digital forensics, enabling terminated SMEs to utilize the system, and assuring independence and fairness of the mediation and arbitration of the technology misappropriation disputes.

A Comparison of Environment Clauses under Korea-China FTA and Korea-U.S. FTA (한·중 FTA 및 한·미 FTA의 환경조항 비교)

  • PAK, Myong-Sop;KIM, Sang-Man;WOO, Jung-Wouk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.69
    • /
    • pp.567-588
    • /
    • 2016
  • Korea-China FTA and Korea-U.S. FTA are the most significant FTA in volume and economic effect for Korea's perspective. Developed countries have dealt with environmental issues one of the main issues in FTA negotiation, while developing countries have been reluctant to it. Both Korea-China FTA and Korea-U.S. FTA have separate environment chapter respectively. A separate environment chapter was firstly introduced in Korea-U.S. for Korea's perspective. Both environment chapters provide high level of environment protection, recognition of multilateral environmental agreements, enforcement of environmental laws, and environmental cooperation. Both environment chapters require that each party make effort to improve environmental laws and measures. Korea-China FTA provides establishment a "Committee on Environment and Trade", and Korea-U.S. FTA provides establishment a "Environment Council" to oversee the implementation of environment clauses. Korea-China FTA and Korea-U.S. FTA have very similar provisions on environment and trade, and are expected to contribute to enhancing environment protection. However, a lot of provisions are somewhat declaratory rather than mandatory. Therefore, further environmental cooperation is encouraged to achieve the goals and objectives of the environment clauses and FTA.

  • PDF

A Study on the Improvement of Bayesian networks in e-Trade (전자무역의 베이지안 네트워크 개선방안에 관한 연구)

  • Jeong, Boon-Do
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.305-320
    • /
    • 2007
  • With expanded use of B2B(between enterprises), B2G(between enterprises and government) and EDI(Electronic Data Interchange), and increased amount of available network information and information protection threat, as it was judged that security can not be perfectly assured only with security technology such as electronic signature/authorization and access control, Bayesian networks have been developed for protection of information. Therefore, this study speculates Bayesian networks system, centering on ERP(Enterprise Resource Planning). The Bayesian networks system is one of the methods to resolve uncertainty in electronic data interchange and is applied to overcome uncertainty of abnormal invasion detection in ERP. Bayesian networks are applied to construct profiling for system call and network data, and simulate against abnormal invasion detection. The host-based abnormal invasion detection system in electronic trade analyses system call, applies Bayesian probability values, and constructs normal behavior profile to detect abnormal behaviors. This study assumes before and after of delivery behavior of the electronic document through Bayesian probability value and expresses before and after of the delivery behavior or events based on Bayesian networks. Therefore, profiling process using Bayesian networks can be applied for abnormal invasion detection based on host and network. In respect to transmission and reception of electronic documents, we need further studies on standards that classify abnormal invasion of various patterns in ERP and evaluate them by Bayesian probability values, and on classification of B2B invasion pattern genealogy to effectively detect deformed abnormal invasion patterns.

  • PDF

A Study on Countermeasures for Technical Barriers of Trade in Korea-China FTA (한.중 FTA의 무역기술장벽 대응방안에 관한 연구)

  • Seo, Min-Kyo;Kim, Hee-Jun
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.491-516
    • /
    • 2012
  • The purpose of this study is to research the situation of Technical Barriers of Trade(TBT) between Korea and China and analyze a pending issue such as a regular TBT notifications and specific trade concerns informed to WTO/TBT committee by Korea and China and seek the Countermeasures for Technical Barriers of Trade in Korea-China FTA. Generally, in case of a regular TBT notifications, "a protection of human health or safety" and "protection of the environment" are drawn a main articles from TBT committee data. And in case of a specific trade concerns, "international standard" and "transparency" are drawn a important factor from the said data. Henceforth those kinds of articles shall be an issuable matters for negotiation of Technical Barriers of Trade in Korea-China FTA. The results of the study indicate mainly that as Countermeasures of Korea for Technical Barriers of Trade in Korea-China FTA, Korean government level requires to withdraw an exclusive technical regulation of China and supports to improve Chinese technology for safety of products. Korean enterprises should develop products to meet an environment regulation and Korean government should support finance incentive, tax incentive to enterprises. Besides, regarding new international standard it is necessary for Korean side to dominate a relative regulation. First of all, it is important to secure a strength of capability and human resource for international standard activity. For improving a conveyance of notification information and transparency between Korea and China, it is efficient to establish a mutual direct network of notification.

  • PDF

Korean Firms' Intellectual Property Rights Protection Strategies to Deter Counterfeiting and Brand Piracy in Global Markets (한국기업의 해외시장에서의 위조상품 대응전략에 관한 연구)

  • Seo, Min-Kyo
    • International Commerce and Information Review
    • /
    • v.9 no.4
    • /
    • pp.351-374
    • /
    • 2007
  • Recently, there has been rapid and spectacular increase in world wide counterfeiting and other forms of piracy. According to the World Customs Organization(WCO), counterfeiting accounts for 5 to 7 percent of global merchandise trade, equivalent to lost sales of as much as US$512 billion last year. Also Korean firms' damages arising from the infringement of intellectual property rights in global markets, especially in China market, are increasing. However, the existing studies on the intellectual property rights(IRP) protection have mainly focused on legal protection. Because the law is often not the best defense against theft of intellectual property rights, we must develop more effective defensive weapons for protection of IRP. Given this troublesome trend, the intention of this paper is to discuss strategic and tactical efforts, including legal protection, that can serve as proactive measures to deter counterfeiting and thus to assure the protection of Korean firms' intellectual property rights.

  • PDF