The primary purpose of this study is to examine the influencer's impacts of cryptocurrency markets. By using Elon Musk's twitter activity to compute effects of influencer's impacts in cryptocurrency markets, this study aims to analyze influencer's impacts and to offer implications for cryptocurrency markets. This study used the tweets that Elon Musk posted for the period between the April 1, 2019 to July 31, 2021 to conduct event study to evaluate influencer's impacts in cryptocurrency market. The results revealed that (1) influencer's impacts was disappearing, and (2) speculative investments was still made in the cryptocurrency market, (3) duration of the influencer's impacts was becoming short. The results indicate that objective evaluation system for cryptocurrency and sanction of bad cryptocurrencies should be needed, in order to ensure right cryptocurrency investment environment. On the other hand, the government should make policies to create the right cryptocurrency investment environment and flatform.
Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.
Journal of the Economic Geographical Society of Korea
/
v.20
no.3
/
pp.287-306
/
2017
Since the 1990s, political geographers have focused on the study of the process of border construction. They have shifted from the old morphological and functional approaches to boundary that have focused on the types and functions of boundaries. Recent scholarship on border studies understand boundaries and the border regions as entities with overlapping and competing relationships not as manifestation of territoriality. There has been the emphasis on the multidimensional actors and the historical and cultural legacies inherent in the border region as well. Based on these recent discussions, this study examines how the border region has been constructed by various actors and strategies in Dandong China, the border city between North Korea and China. Several sanctions including UN Security Council have been resolved and implemented in accordance with North Korea's nuclear and missile development, which is a relevant example to examine the "border as relationships" in which strategies of various actors are competing. In addition, this paper has a significance as a case study on the construction process of border and the characteristics of its materiality, which is a way to overcome the limitation of discourse-oriented critical geopolitical research.
Journal of the Korea Academia-Industrial cooperation Society
/
v.16
no.7
/
pp.4805-4815
/
2015
Dementia is targeted at the elderly and dependent family members, care providers, and the types of problem behaviors of the elderly with dementia by care providers learn how to cope with the relationship was tried for. Dementia in the elderly problem behaviour is the program's descriptive statistics, t-test, ANOVA, and dementia in the elderly problem behaviors for coping with behavior and the relationship between discrete variable using correlation analysis. The findings support the family and nursing experience of senile elderly issues, acting as a provider edge actions appeared the most high, and repeat the same question or request. ', ' Making loud noises or shouting. ' and '. 'Being stubborn, not listening to the words of the caregiver.' etc. In addition, this study, which appeared in dementia in the elderly cope with behavior based on behavioral problems and discuss the ' Verbal discussion ', ' Removal of the cause for incidents ' and ' Restriction of actions ' action causes this correlation. Therefore, caring for the elderly with dementia in a nursing institution and sanction providers related to dementia in the elderly appear to be frequently problem behaviors of the problematic behavior is not much need to be able to cope with the regular education, this study to the development of behavioral problems in dementia patients by an individualized nursing intervention program for caregivers caring for dementia patients, as basic materials will be provided.
This paper analyzes the contents and the effects of the UNSC 2270, and its implications to South Korea's defense strategy and navy. The UN Security Council passed strong sanctions against North Korea which punish North Korea's 4th nuclear test. The sanctions compared to the previous ones require international society to take practical actions such as comprehensive trade bans as well as diplomatic isolation which will put significant pains on North Korea. Especially, these measures would greatly hamper economic development policy of Kim Joung-un regime. Because Kim Jung-un regime has inherent legitimacy problems which stems from the third family succession of the power, economic difficulties may play an important cause on the regime instability in the long term. In fact, the United States sees this possibility as an option to coerce North Korea in which North Korea choose denuclearization for its regime survival. Nevertheless, the prospects of the UN sanctions are not so optimistic. Considering North Korea's willingness for nuclear development and its level of nuclear technology, North Korea will try to play a gambit with the US and South Korea by exploiting its strategic advantages. North Korea's response will have three following strategies. First, it would actively pursue political and economic survival strategy by using China's support for the regime, strengthening its power grip in the name of countering US hostile policy, and enhancing peace propaganda. Second, North Korea will accelerate efforts to position its status as a nuclear de facto state. For this purpose, it could create nuclear crisis on the peninsula. Third, it would exploit local provocations as an exit strategy to get over the current situation. In order to counter North Korea's actions and punish North Korea's behavior strongly, South Korea needs following strategies and efforts. It should first make all the efforts to implement the UN sanctions. Strong and practical nuclear deterrence strategy and capability with the U.S. should be developed. Effective strategy and capabilities for the prevention and deterrence of North Korea's provocation should be prepared. For this purpose, North Korea's provocation strategy should be thoroughly reviewed. Active international cooperation is needed to punish and coerce North Korea's behavior. Finally, South Korea should prepare for the possible occurrence of North Korea's contingency and make use of the situation as an opportunity to achieve unification. All these strategies and efforts demand the more active roles and missions of South Korea's navy and thus, nullify North Korea's intention militarily.
As a domain name can be registered simply by filing an application for registration, disputes over the domain name between the holder of domain name and the holder of trademark increased. Since the holder of trademark who was late for registering domain name is willing to pay for the return of domain name, cybersquatters increased. Cybersqatters are not genuine users of the Internet. This article is to compare the construction of law by American Courts and by Korean Courts and to assert the creation of the law similar to the law of US as to anti-cybersqatting. American Courts applied the Trademark Act and the Anti-Dilution Act to resolve the disputes over domain name. To apply the Trademark Act, the Court required the plaintiffs to prove that the goods or the services expressed by the domain name should be identical or similar to the goods or the services represented by the trademark. However, there were many cases where the holder of domain name used it for the goods or the services irrelevant to those of the holder of trademark. Also, the Anti-Dilution Act could not successfully protect the holder of trademark from cybersquatters because it required that the trademark should be famous or distinctive. As a result, the US promulgated a new law which is designed to prohibit cybersquatters from being free of sanction by the existing laws. Korea Courts applied the Trademark Act and the Unfair Competition Prohibition Act to the cases disputing domain name. Likewise in the US, Korean Courts must cope with the issue of identity of the goods or the services, and the famousness or distinctiveness of trademark. The Courts hesitate to give a winning judgement to the holder of trademark simply because the domain name of alleged violator confused the trademark. Some scholars advocate the broadening of construction of the Unfair Competition Prohibition Act to illegalize cybersquatting but it is beyond the meaning of the law. Accordingly, it is a time to make a law similar to the Anti-Cybersquatting Act of the US. The law must be a fair and reasonable compromise to resolve the collision between system of registration of domain name and the system of registration of trademark. Some commentators advocate that the registration of domain name should be examined just as the one of trademark and to facilitate it, the Patent and Trademark Office should have jurisdiction of registration of domain name. But it abandons the distinction of domain name and trademark and results in obstructing e-commerce. By adopting the Anti-Cybersqatting Act, we can prohibit it. In other cases, we get a reasonable adjustment between the holder of domain name and the holder of trademark through the Trademark Act and the Unfair Competition Prohibition Act.
The Journal of the Institute of Internet, Broadcasting and Communication
/
v.17
no.4
/
pp.193-201
/
2017
Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.
This paper is to research the powers and interim measures of the arbitral tribunal in the arbitral proceedings of the international commercial arbitration under arbitration legislation and arbitration rules including the UNCITRAL Model Law and Arbitration Rules. The powers of the arbitral tribunal may be found within the arbitration agreement or any arbitration rules chosen by the parties, or the chosen procedural law. The power of the arbitral tribunal to decide its own jurisdiction is one of the fundamental principles of international commercial arbitration. It is a power which is now found in nearly all modern arbitration and rules of arbitration. Where an arbitral tribunal has been appointed then it will usually have the power to proceed with the arbitration in the event that a party fails to appear. It cannot force a party to attend but it may sanction the failure. While the arbitral tribunal can direct the parties to attend and give evidence the arbitral tribunal has no power to compel a party to give evidence. The arbitral tribunal may continue the arbitration in the absence of the party or its failure to submit evidence and make an award on the evidence before it. Under most of arbitration legislation and arbitration rules, the arbitral tribunal has the power to appoint experts and obtain expert evidence. The power to order a party to disclose documents in its possession is a power given to the arbitral tribunal by many national laws and by most arbitration rules. The arbitral tribunal cannot, however, compel disclosure and in the case where a party refuses to disclosure documents then the sanctions that the arbitral tribunal can impose must be ascertained from the applicable rules or the relevant procedural law. A number of arbitration rules and national laws allow for the arbitral tribunal to correct errors within the award. Most of arbitration legislation and arbitration rules permit the arbitral tribunal to grant orders for interim measure of protection. Article 17(1) of the Revised UNCITRAL Model Law of 2006 states: Unless otherwise agreed by the parties, the arbitral tribunal may, at the request of a party, grant interim measures. Interim measures of protection usually take such forms as (1) conservatory measures intended to prevent irreparable damage and maintain the status quo; (2) conservatory measures intended to preserve evidence or assets. Orders for interim measures by the arbitral tribunal are not self-enforcing. However, the arbitral tribunal must have the powers necessary to make interim measures effective. The Article 17 B of the Revised UNCITRAL Model Law of 2006 provides applications for preliminary orders and conditions for granting preliminary orders. And the Article 17 H provides recognition of enforcement of interim measures. In conclusion, the revised articles with regard to interim measures of the UNCITRAL Model Law of 2006 would contribute significantly to the security of the effectiveness of interim measures in international commercial arbitration. Therefore, Korean Arbitration Law and Arbitration Rules would be desirable to admit such revised articles with regard interim measures.
The objective of this study was to analyze 'Forestland Classification System' in Korea and to develop a strategy for its improvement. A survey was conducted in this study based on the Delphi technique, one of the interactive survey method relying on a panel of experts. The result indicated that the existing 'Forestland Classification System' was initiated for reasonable management of forestland, but now it turned into one of the most strict management restrictions. To improve forestland management in Korea, it was suggested to adopt 'Forest Function System' in this study. Moreover, to avoid indiscreet landuse conversion that might be occurred by substituting the 'Forest Function System' for the 'Forestland Classification System', it was suggested to adopt 'Forestland Conversion Propriety Assessment System'. In fact, landuse conversion has been regulated by the 'Environmental Impact Assessment System', but this system appeared inadequate to be applied to the forested area. Illegal acts for having permission of landuse conversion for reserved forests was another big issue in the forestland management. For example, alteration of the reserved status of forests or partition into patches smaller than the size limit has been attempted. Thus in this study, it was strongly recommended to take sanction against such illegal acts. In order to enhance the efficiency of forestland management, it was also suggested to integrate administrative agencies related to the landuse conversion or to take over the charge to local governments.
Article 77 sets forth the principle of prevention applied in several legal systems. Under this principle the party threatened by ooss as a consequence of a breach of contract by the other party is not permitted to await passively incurrence of the loss and then sue for damages. He is obliged to take adequate preventive measures to mitigate his loss. If the injured party abstains from taking such excessive measures he will not be considered to have failed to mitigate the loss under Article 77. The sanction provided in Article 77 against a party who fails to mitigate his loss only enables the other party to claim reduction in the damages. The reduction in damages under Article 77 is equal to the amount by which the loss should have been mitigated if the injured party had taken reasonable measures to avert or to lessen it. The aim of Article 77 is to encourage mitigation of the loss. The duty to mitigate the loss applies not only to a breach of contract in respect of an obligation whose performance is currently due. but also to an anticipatory breach of contract under Article 71. Article 85 contemplates that the buyer is in delay in fulfilling the latter obligation, or else that he fails to pay the price when payment is to be made concurrently with delivery of the goods by the seller. In both these situations of default, the seller who is either in possession of the goods or otherwise able to control their disposition must take measures, reasonable in the circumstances, to preserve them. The right of retention of the goods y the seller exists until he is reimbursed by the other party for the reasonable expenses incurred. Article 87 and Article 88 of the Convention grant different rights to the party obligated to take steps to preserve the goods; Article 87 allows him to deposit them in the warehouse of a third person, and Article 88 to sell them by whatever means appropriate. A difference exists between paragraph Article 88 (1) which grants the right to sell, and paragraph (2) which imposes the duty to take reasonable measures to sell the goods.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.