• Title/Summary/Keyword: Security business Law

Search Result 149, Processing Time 0.024 seconds

Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet

  • Azab, Rania S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.424-435
    • /
    • 2022
  • When the owners of the intellectual property rights of digital content have lost control over it in the digital environment, there emerged fears that the intellectual property laws, especially copyright law, would not be effective as in the material (Offline ) world. The reason is that the digital environment helps to reproduce copies in high quality and at almost no cost, while copyright law protection has been limited to programs embedded in CDs. According to copyright laws, the owner of the program did not have the right to prevent buyers of the initial physical copy of the program from copying and reselling it to more than one individual without the permission of the original owner. As a result, business owners have invented the idea of licensing digital content and programs instead of selling them. They set out terms that serve their commercial interests regardless of their abuse to intellectual property laws or even the rules of the traditional contract to sell a material property. The abuse has resulted from the way those terms are concluded and the heavy rules that are unfair to consumer rights. Therefore, business owners insisted on dealing with the website and its programs and digital content as material property. Here raises the question of whether the website and its digital content are subject to the protection of copyright law or the rules of the traditional contract or licensing contracts. As the answer to this question affects the protection of consumer rights, is it possible to find a balance between it and the protection of the owners of digital programs' rights.That is what we will discuss in this paper.

A Study on the Guarantee Instruments and Types in the International Business Contracts (국제(國際) 비즈니스 계약(契約)에서의 보증수단(保證手段) 및 유형(類型)에 관한 연구(硏究))

  • Park, Suk-Jae
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.26
    • /
    • pp.203-223
    • /
    • 2005
  • Many international transactions involve the use of security devices, commonly referred to as "guarantees", "bonds", or "standby credits", designed to protect one of the parties from a breach by its counter-party. These security mechanisms may be provided by banks, insurance companies, specialized surety companies, or other financial service firms. Although some legal systems distinguish between "guarantees", "bonds", and "indemnities", these terms are often used as synonyms in the everyday language of international traders. It may therefore be necessary to examine the particular characteristics and nature of the guarantee obligation in order to properly classify the guarantee. Two main categories of guarantee are demand and suretyship. Under a demand guarantee, the guarantor must pay on first demand by the beneficiary. The beneficiary only has to demand payment under the guarantee - there is no need to prove that the principal has actually defaulted on a contractual obligation. Under a suretyship or conditional guarantee, the obligation of the guarantor is triggered by the actual default or contractual breach of the principal, as evidenced in a document such as a court judgement or arbitral award against the principal. Guarantees have been widely used in the international business transactions. Main uses of guarantees are as follows : Performance Bonds/Guarantees, Bid(or Tender) Bonds/Guarantees, Advance Payment or Repayment Bonds/Guarantees, Retention Bonds/Guarantees, Maintenance(or Warranty) Bonds/Guarantees etc.

  • PDF

Evaluation of Similarity Analysis of Newspaper Article Using Natural Language Processing

  • Ayako Ohshiro;Takeo Okazaki;Takashi Kano;Shinichiro Ueda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.1-7
    • /
    • 2024
  • Comparing text features involves evaluating the "similarity" between texts. It is crucial to use appropriate similarity measures when comparing similarities. This study utilized various techniques to assess the similarities between newspaper articles, including deep learning and a previously proposed method: a combination of Pointwise Mutual Information (PMI) and Word Pair Matching (WPM), denoted as PMI+WPM. For performance comparison, law data from medical research in Japan were utilized as validation data in evaluating the PMI+WPM method. The distribution of similarities in text data varies depending on the evaluation technique and genre, as revealed by the comparative analysis. For newspaper data, non-deep learning methods demonstrated better similarity evaluation accuracy than deep learning methods. Additionally, evaluating similarities in law data is more challenging than in newspaper articles. Despite deep learning being the prevalent method for evaluating textual similarities, this study demonstrates that non-deep learning methods can be effective regarding Japanese-based texts.

An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure (정부의 정보 보안 대책 법제화의 사전 효과성 분석 방법)

  • Shim, Woohyun
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.241-256
    • /
    • 2015
  • In order to ensure that all firms are cyber-secure, many governments have started to enforce the implementation of various security measures on firms. Prior to the implementation, however, it is vague whether government enforced security measures will be effective for mitigating cyber-security risks. By applying a method for estimating the effectiveness of a mandatory seatbelt law in reducing fatalities from motor vehicle accidents, this study develops an ex ante evaluation method that can approximate the effectiveness of a government enforced security measure in reducing country-wide or industry-wide cyber-security risks. Using data obtained from the Korean Internet and Security Agency, this study then explores how to employ the developed method to assess the effectiveness of a specific security measure in mitigating cyber-security risks, if enforced by the government, and compares the effectiveness of various security measures. The comparison shows that compulsory security training has the highest effectiveness.

A study on The Private Investigator usage for Enterprise Security Activity: Focusing on countermeasure to the Industrial Spy (민간조사원(탐정)을 활용한 기업보안활동의 강화방안: 산업 스파이에 대한 대응방안을 중심으로)

  • Sin, Sung-Gyun;Park, Sang-Jin
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.199-228
    • /
    • 2009
  • National security of post cold-war since 1990's shift that conception of the national security transfer traditional military strength to economic strength. Accordingly, the national interest about how to protect the of the high-technology industry enterprises has become contentious social issue. The U.S. and advanced countries promote the policy to protect The United State's Economic Espionage Act(EEA). The Korea reaching to high level a field at IT, Shipbuilding, Steel, Automobile Industry and huge capital investment to high-technology & development. But, systematic industry security activity not an unfold. So private investigator collect the evidence and information of business case for prevent danger is efficient. The private investigator system, deal with the matter efficiently, will good system to prevent economic loss of business, state and nation through make a good use in business crime that machinery of law difficult to intervene. This article countermeasure about industry spy through make a good use of private investigator.

  • PDF

A Study on Developing the Educational Program for the Emergency Response with a Railroad Fire Accident (철도화재사고 비상대응 교육프로그램 개발에 관한 연구)

  • Roh, Sam-Kew;Park, Sang-Gyu;Ham, Eun-Gu;Kim, Si-Gon
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1511-1517
    • /
    • 2008
  • In January, 2005, "railroad security law" was presented, preparing the systematic equipment that allows several railroad operators to consider the railroad security issue, and each of railroad operative institutions accepted such situation that construct the integral railroad security system, resulting in constructing the emergent system coping with the railroad fire accident through the relevant study business to improve the railroad security efficiency against fire. This study tried to present the studying direction on developing the emergent educational program coping with the railroad fire accident, which is distributed to the spot, about the railroad worker for improving the railroad security efficiency against fire through the education of systematic and efficient emergent countermeasure procedure of emergent system against the railroad fire accident.

  • PDF

Some Problems on the Guidebook to Incoterms(R) 2010 published by ICC (국제상업회의소 발간 "ICC Guide to Incoterms(R) 2010" 상의 문제점에 관한 연구)

  • Lee, Shie-Hwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.54
    • /
    • pp.81-98
    • /
    • 2012
  • The Incoterms(R) 2010 rules take account of the continued spread of customs-free zones, the increased use of electronic communications in business transactions, heightened concern about security in the movement of goods and changes in transport practices. And the Guide to Incoterms(R) 2010 is the authoritative companion work to Incoterms(R) 2010, the ICC rules on the use of domestic and international trade terms. The guide responds to business needs for a better understanding of these ICC rules that are used in countless commercial transactions every day. But, contrary to the previous guidebook, there is many errors and mistake in the Guide to Incoterms(R) 2010 which should be amended. The purpose of this paper is to point out the problems and amend the errors and unify the expression in guidebook.

  • PDF

Global Trade Management Strategies for Export Companies from the Supply Chain Management Perspective (공급사슬관점에서 수출기업의 글로벌 무역관리 전략)

  • Yang, Jung-Ho
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.35
    • /
    • pp.179-219
    • /
    • 2007
  • Cross-border supply chains undergone complexity in the global trade process, unpredictability and continually evolving regulations and information requirements. Under these circumstances, longer lead time inhibiting quick response to market demands, unanticipated supply chain costs eroding product cost savings, compliance and documentation errors causing delays and fines are challenging global trade companies when they execute global business. These problems are mainly caused by unautomated, unintegrated process which lead to longer and more unpredictable lead times, slower cash flow, cost overruns, and ultimately lower profits and less satisfied customers. Complex and unpredictable global trade environment requires global trade companies of global trade management functions to automate and control this complex environment for driving out cost, time and risk from their business. Global trade management allows cost savings, supply chain efficiencies and improved compliance through improving global supply chain visibility, facilitating cash flow by supply chain financing, enhancing supply chain security and risk management.

  • PDF

The Analyzing the Consumer Information Leak Case of Korean Card Companies with Business Ethics CLD: Studying on Cause and Solution with System Dynamics (윤리경영 인과지도를 바탕으로 분석한 한국의 카드사 고객정보 유출 사건: 시스템다이내믹스를 활용한 원인 탐구와 해결책 모색)

  • Kim, SeungBum;Shin, Ho-Sang
    • Korean System Dynamics Review
    • /
    • v.17 no.1
    • /
    • pp.77-105
    • /
    • 2016
  • Whenever Information leak case had been happened, even though IT Infra systems were reinforced, those cases of kind were not decreased. It meant that the causes are not only the fault of IT, but also other things. So that the information leak cases should have been studied by the interdisciplinary way. There was a point of view for the Business Ethics which needed to be studied in the interdisciplinary way. Financial Information Leak Case of three representative Card Companies in Korea which is happened in 2014 was a case which was composed by many problems. These were bad circumstances, half-educated, lower salary, and the most of all, the C-Levels' ignorance of the law. By studying the CLD: Causal Loop Diagram of Business Ethics and those mentioned factors, few meanings were discovered. Firstly, this case was not a accident, but a predeterminate issue at all, because of the structural unethical corruption. Secondly, main reason of this case was not only criminals who leaked information, but also managers, especially CEO who didn't obey the law, forced that to employees. Thirdly, although those companies had moral guide and did CSR activities, it was not help to protect this information leak case. This study shows that the important thing was not the action for showing, but effective action to management for sustainability.

Bankruptcy Protection Law in US With Focus on The Bankruptcy Abuse Prevention And Consumer Act Of 2005

  • Alharthi, Saud Hamoud
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.215-219
    • /
    • 2022
  • Bankruptcy is one of the major areas that have attracted the interest of many researchers in the American system, particularly in terms of the laws that oversee it. It provides a plan of reorganization that enables the debtor or the proprietor to discharge liabilities to the creditors through dividing the assets to settle debts. This activity is carried out under supervision to fairly protect the interests of the creditors. Bankruptcy protection systems are dynamic and complex in nature, in line with the economic sector, ensuring the protection of affected individuals from falling into huge losses. Some bankruptcy procedures give the debtor the opportunity to stay in operation or business activity and benefit from revenues until the debt is settled. This law allows some debtors to be relived from any financial burden after the distribution of assets, even if the debt is not paid in full. In light of the above information, this research paper seeks to explore the nature of the complexity of bankruptcy protection laws, their characteristics, and the justice system that regulate them. It also sheds more light on the decision-making powers on bankruptcy cases. There are specialized courts that cover bankruptcy cases located in district courts in every state.