• Title/Summary/Keyword: Sanction

Search Result 84, Processing Time 0.022 seconds

An Exploratory Study of Influencer's Impacts for Cryptocurrency Markets: Focused on the Elon Musk's Twitter Activity (가상화폐 시장의 인물 영향력에 대한 탐색적 연구: 일론 머스크의 발언을 중심으로)

  • Ga-Yeon Hong;Sang-Gun Lee;Chang-Gyu Yang
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.83-97
    • /
    • 2023
  • The primary purpose of this study is to examine the influencer's impacts of cryptocurrency markets. By using Elon Musk's twitter activity to compute effects of influencer's impacts in cryptocurrency markets, this study aims to analyze influencer's impacts and to offer implications for cryptocurrency markets. This study used the tweets that Elon Musk posted for the period between the April 1, 2019 to July 31, 2021 to conduct event study to evaluate influencer's impacts in cryptocurrency market. The results revealed that (1) influencer's impacts was disappearing, and (2) speculative investments was still made in the cryptocurrency market, (3) duration of the influencer's impacts was becoming short. The results indicate that objective evaluation system for cryptocurrency and sanction of bad cryptocurrencies should be needed, in order to ensure right cryptocurrency investment environment. On the other hand, the government should make policies to create the right cryptocurrency investment environment and flatform.

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.

A Relational Approach to Political Geography of Border Dynamics: Case study of North Korea-China Border Region Dandong, China (접경지역 변화의 관계론적 정치지리학: 북한-중국 접경지역 단둥을 중심으로)

  • Chi, Sang-Hyun;Chung, Su-Yeul;Kim, Minho;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.287-306
    • /
    • 2017
  • Since the 1990s, political geographers have focused on the study of the process of border construction. They have shifted from the old morphological and functional approaches to boundary that have focused on the types and functions of boundaries. Recent scholarship on border studies understand boundaries and the border regions as entities with overlapping and competing relationships not as manifestation of territoriality. There has been the emphasis on the multidimensional actors and the historical and cultural legacies inherent in the border region as well. Based on these recent discussions, this study examines how the border region has been constructed by various actors and strategies in Dandong China, the border city between North Korea and China. Several sanctions including UN Security Council have been resolved and implemented in accordance with North Korea's nuclear and missile development, which is a relevant example to examine the "border as relationships" in which strategies of various actors are competing. In addition, this paper has a significance as a case study on the construction process of border and the characteristics of its materiality, which is a way to overcome the limitation of discourse-oriented critical geopolitical research.

Coping with dementia related behavior problems of the elderly and care providers (치매노인 문제행동과 간호제공자의 대처행동 관계)

  • Lim, Dong Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4805-4815
    • /
    • 2015
  • Dementia is targeted at the elderly and dependent family members, care providers, and the types of problem behaviors of the elderly with dementia by care providers learn how to cope with the relationship was tried for. Dementia in the elderly problem behaviour is the program's descriptive statistics, t-test, ANOVA, and dementia in the elderly problem behaviors for coping with behavior and the relationship between discrete variable using correlation analysis. The findings support the family and nursing experience of senile elderly issues, acting as a provider edge actions appeared the most high, and repeat the same question or request. ', ' Making loud noises or shouting. ' and '. 'Being stubborn, not listening to the words of the caregiver.' etc. In addition, this study, which appeared in dementia in the elderly cope with behavior based on behavioral problems and discuss the ' Verbal discussion ', ' Removal of the cause for incidents ' and ' Restriction of actions ' action causes this correlation. Therefore, caring for the elderly with dementia in a nursing institution and sanction providers related to dementia in the elderly appear to be frequently problem behaviors of the problematic behavior is not much need to be able to cope with the regular education, this study to the development of behavioral problems in dementia patients by an individualized nursing intervention program for caregivers caring for dementia patients, as basic materials will be provided.

UNSC Resolution against North Korea and ROKN's Reactions (유엔 안보리 대북제재 결의와 우리 해군의 대응)

  • Park, Chang Kwoun
    • Strategy21
    • /
    • s.39
    • /
    • pp.82-113
    • /
    • 2016
  • This paper analyzes the contents and the effects of the UNSC 2270, and its implications to South Korea's defense strategy and navy. The UN Security Council passed strong sanctions against North Korea which punish North Korea's 4th nuclear test. The sanctions compared to the previous ones require international society to take practical actions such as comprehensive trade bans as well as diplomatic isolation which will put significant pains on North Korea. Especially, these measures would greatly hamper economic development policy of Kim Joung-un regime. Because Kim Jung-un regime has inherent legitimacy problems which stems from the third family succession of the power, economic difficulties may play an important cause on the regime instability in the long term. In fact, the United States sees this possibility as an option to coerce North Korea in which North Korea choose denuclearization for its regime survival. Nevertheless, the prospects of the UN sanctions are not so optimistic. Considering North Korea's willingness for nuclear development and its level of nuclear technology, North Korea will try to play a gambit with the US and South Korea by exploiting its strategic advantages. North Korea's response will have three following strategies. First, it would actively pursue political and economic survival strategy by using China's support for the regime, strengthening its power grip in the name of countering US hostile policy, and enhancing peace propaganda. Second, North Korea will accelerate efforts to position its status as a nuclear de facto state. For this purpose, it could create nuclear crisis on the peninsula. Third, it would exploit local provocations as an exit strategy to get over the current situation. In order to counter North Korea's actions and punish North Korea's behavior strongly, South Korea needs following strategies and efforts. It should first make all the efforts to implement the UN sanctions. Strong and practical nuclear deterrence strategy and capability with the U.S. should be developed. Effective strategy and capabilities for the prevention and deterrence of North Korea's provocation should be prepared. For this purpose, North Korea's provocation strategy should be thoroughly reviewed. Active international cooperation is needed to punish and coerce North Korea's behavior. Finally, South Korea should prepare for the possible occurrence of North Korea's contingency and make use of the situation as an opportunity to achieve unification. All these strategies and efforts demand the more active roles and missions of South Korea's navy and thus, nullify North Korea's intention militarily.

The Law and Case Study on the Domain Name Protection (도메인네임의 보호(保護)에 관한 법리(法理) 및 사례연구(事例硏究))

  • Kim, Yeon-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.15
    • /
    • pp.169-209
    • /
    • 2001
  • As a domain name can be registered simply by filing an application for registration, disputes over the domain name between the holder of domain name and the holder of trademark increased. Since the holder of trademark who was late for registering domain name is willing to pay for the return of domain name, cybersquatters increased. Cybersqatters are not genuine users of the Internet. This article is to compare the construction of law by American Courts and by Korean Courts and to assert the creation of the law similar to the law of US as to anti-cybersqatting. American Courts applied the Trademark Act and the Anti-Dilution Act to resolve the disputes over domain name. To apply the Trademark Act, the Court required the plaintiffs to prove that the goods or the services expressed by the domain name should be identical or similar to the goods or the services represented by the trademark. However, there were many cases where the holder of domain name used it for the goods or the services irrelevant to those of the holder of trademark. Also, the Anti-Dilution Act could not successfully protect the holder of trademark from cybersquatters because it required that the trademark should be famous or distinctive. As a result, the US promulgated a new law which is designed to prohibit cybersquatters from being free of sanction by the existing laws. Korea Courts applied the Trademark Act and the Unfair Competition Prohibition Act to the cases disputing domain name. Likewise in the US, Korean Courts must cope with the issue of identity of the goods or the services, and the famousness or distinctiveness of trademark. The Courts hesitate to give a winning judgement to the holder of trademark simply because the domain name of alleged violator confused the trademark. Some scholars advocate the broadening of construction of the Unfair Competition Prohibition Act to illegalize cybersquatting but it is beyond the meaning of the law. Accordingly, it is a time to make a law similar to the Anti-Cybersquatting Act of the US. The law must be a fair and reasonable compromise to resolve the collision between system of registration of domain name and the system of registration of trademark. Some commentators advocate that the registration of domain name should be examined just as the one of trademark and to facilitate it, the Patent and Trademark Office should have jurisdiction of registration of domain name. But it abandons the distinction of domain name and trademark and results in obstructing e-commerce. By adopting the Anti-Cybersqatting Act, we can prohibit it. In other cases, we get a reasonable adjustment between the holder of domain name and the holder of trademark through the Trademark Act and the Unfair Competition Prohibition Act.

  • PDF

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

The Powers and Interim Measures of the Arbitral Tribunal in International Commercial Arbitration (국제상사중재에서 중재판정부의 권한과 임시적 처분에 관한 연구)

  • Lee, Kang-Bin
    • Journal of Arbitration Studies
    • /
    • v.18 no.2
    • /
    • pp.103-127
    • /
    • 2008
  • This paper is to research the powers and interim measures of the arbitral tribunal in the arbitral proceedings of the international commercial arbitration under arbitration legislation and arbitration rules including the UNCITRAL Model Law and Arbitration Rules. The powers of the arbitral tribunal may be found within the arbitration agreement or any arbitration rules chosen by the parties, or the chosen procedural law. The power of the arbitral tribunal to decide its own jurisdiction is one of the fundamental principles of international commercial arbitration. It is a power which is now found in nearly all modern arbitration and rules of arbitration. Where an arbitral tribunal has been appointed then it will usually have the power to proceed with the arbitration in the event that a party fails to appear. It cannot force a party to attend but it may sanction the failure. While the arbitral tribunal can direct the parties to attend and give evidence the arbitral tribunal has no power to compel a party to give evidence. The arbitral tribunal may continue the arbitration in the absence of the party or its failure to submit evidence and make an award on the evidence before it. Under most of arbitration legislation and arbitration rules, the arbitral tribunal has the power to appoint experts and obtain expert evidence. The power to order a party to disclose documents in its possession is a power given to the arbitral tribunal by many national laws and by most arbitration rules. The arbitral tribunal cannot, however, compel disclosure and in the case where a party refuses to disclosure documents then the sanctions that the arbitral tribunal can impose must be ascertained from the applicable rules or the relevant procedural law. A number of arbitration rules and national laws allow for the arbitral tribunal to correct errors within the award. Most of arbitration legislation and arbitration rules permit the arbitral tribunal to grant orders for interim measure of protection. Article 17(1) of the Revised UNCITRAL Model Law of 2006 states: Unless otherwise agreed by the parties, the arbitral tribunal may, at the request of a party, grant interim measures. Interim measures of protection usually take such forms as (1) conservatory measures intended to prevent irreparable damage and maintain the status quo; (2) conservatory measures intended to preserve evidence or assets. Orders for interim measures by the arbitral tribunal are not self-enforcing. However, the arbitral tribunal must have the powers necessary to make interim measures effective. The Article 17 B of the Revised UNCITRAL Model Law of 2006 provides applications for preliminary orders and conditions for granting preliminary orders. And the Article 17 H provides recognition of enforcement of interim measures. In conclusion, the revised articles with regard to interim measures of the UNCITRAL Model Law of 2006 would contribute significantly to the security of the effectiveness of interim measures in international commercial arbitration. Therefore, Korean Arbitration Law and Arbitration Rules would be desirable to admit such revised articles with regard interim measures.

  • PDF

Strategy for Improving Forestland Classification System in Korea (산지이용구분제도의 개선방안 연구)

  • Park, Young-Kyu;Jeon, Jun-Heon;Roh, Hye-Jung
    • Journal of Korean Society of Forest Science
    • /
    • v.98 no.6
    • /
    • pp.780-790
    • /
    • 2009
  • The objective of this study was to analyze 'Forestland Classification System' in Korea and to develop a strategy for its improvement. A survey was conducted in this study based on the Delphi technique, one of the interactive survey method relying on a panel of experts. The result indicated that the existing 'Forestland Classification System' was initiated for reasonable management of forestland, but now it turned into one of the most strict management restrictions. To improve forestland management in Korea, it was suggested to adopt 'Forest Function System' in this study. Moreover, to avoid indiscreet landuse conversion that might be occurred by substituting the 'Forest Function System' for the 'Forestland Classification System', it was suggested to adopt 'Forestland Conversion Propriety Assessment System'. In fact, landuse conversion has been regulated by the 'Environmental Impact Assessment System', but this system appeared inadequate to be applied to the forested area. Illegal acts for having permission of landuse conversion for reserved forests was another big issue in the forestland management. For example, alteration of the reserved status of forests or partition into patches smaller than the size limit has been attempted. Thus in this study, it was strongly recommended to take sanction against such illegal acts. In order to enhance the efficiency of forestland management, it was also suggested to integrate administrative agencies related to the landuse conversion or to take over the charge to local governments.

A study on the Seller's duty to mitigate Buyer's Damages in Int'l Sale of Goods (국제물품매매에서 매도인의 손해경감의무에 관한 고찰)

  • Ha, Kang Hun
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.62
    • /
    • pp.3-32
    • /
    • 2014
  • Article 77 sets forth the principle of prevention applied in several legal systems. Under this principle the party threatened by ooss as a consequence of a breach of contract by the other party is not permitted to await passively incurrence of the loss and then sue for damages. He is obliged to take adequate preventive measures to mitigate his loss. If the injured party abstains from taking such excessive measures he will not be considered to have failed to mitigate the loss under Article 77. The sanction provided in Article 77 against a party who fails to mitigate his loss only enables the other party to claim reduction in the damages. The reduction in damages under Article 77 is equal to the amount by which the loss should have been mitigated if the injured party had taken reasonable measures to avert or to lessen it. The aim of Article 77 is to encourage mitigation of the loss. The duty to mitigate the loss applies not only to a breach of contract in respect of an obligation whose performance is currently due. but also to an anticipatory breach of contract under Article 71. Article 85 contemplates that the buyer is in delay in fulfilling the latter obligation, or else that he fails to pay the price when payment is to be made concurrently with delivery of the goods by the seller. In both these situations of default, the seller who is either in possession of the goods or otherwise able to control their disposition must take measures, reasonable in the circumstances, to preserve them. The right of retention of the goods y the seller exists until he is reimbursed by the other party for the reasonable expenses incurred. Article 87 and Article 88 of the Convention grant different rights to the party obligated to take steps to preserve the goods; Article 87 allows him to deposit them in the warehouse of a third person, and Article 88 to sell them by whatever means appropriate. A difference exists between paragraph Article 88 (1) which grants the right to sell, and paragraph (2) which imposes the duty to take reasonable measures to sell the goods.

  • PDF