• Title/Summary/Keyword: Sovereign

Search Result 166, Processing Time 0.021 seconds

Digital Identity Trend for Digital Trust Society (디지털 신뢰 사회 실현을 위한 디지털 아이덴티티 동향)

  • Kwon, D.S.;Lee, H.;Park, J.D.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.3
    • /
    • pp.114-124
    • /
    • 2019
  • The Internet was designed for machines, not humans, and hence, nobody owns a digital identity. Instead, a digital identity is rented from a website and an application. This lack of unique and secure digital identities has resulted in confusion in the online/cyber world. Digital identities pose one of the oldest and most difficult problems with regard to the Internet. There is still no way to use digital credentials to prove, own, and control an online identity, namely a self-sovereign identity, in the same manner we do in the offline world, particularly without a trusted third party. This article discusses the current open standards for digital identities, proposes solutions pertaining to digital identities in the future, and introduces the concept of a blockchain-based self-sovereign digital identity without the need of trusted third parties.

A Study on the Limits in the Use of Force against a Hijacked Civil Aircraft (피랍 민간항공기에 대한 무력행사의 한계에 관한 연구)

  • Kim, Man-Ho
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.141-163
    • /
    • 2004
  • The limits in the use of force against a civil aircraft which intrudes into sovereign airspace have not been defined in the aspect of international law. Therefore, this paper intends to analyze international laws and practices about sovereign airspace intrusions by the civil aircraft, and to examine the legality in the use of force against the civil aircraft hijacked by means of political terrorism, in particular. In this paper, the sphere of study is restricted within the problems of interception against the civil aircraft which intrudes into sovereign airspace in times of peace, excluding the problems against a state aircraft, and the responsibilities for the civil or criminal affairs due to interceptions. Herein this paper analyzes the existing international laws and the cases of each nation's use of force against the civil aircraft which intrudes into sovereign airspace, and organizes the conditions in the use of force which have been accepted in international laws and practices, and then applies them to the special case of civil aircraft hijacked by political terrorism. Consequently, this paper suggests that the basic principles of necessity, ultimateness, and proportionality be taken into consideration in the use of force against civil aircraft which intrudes into sovereign airspace. This study finally suggests that the possibility in the use of force against civil aircraft hijacked by political terrorism might be higher than any type of civil aircraft intrusions into sovereign airspace due to the factor of necessity of national security concerned.

  • PDF

A Study for the Relationship between the Sovereign and the Follower in Juyeok (『주역』 속에 나타난 최고 통치권자와 부하 직원의 상호 작용 관계 연구)

  • Lee, Daehee
    • (The)Study of the Eastern Classic
    • /
    • no.32
    • /
    • pp.363-390
    • /
    • 2008
  • In this article, the author studied the relationship between the Sovereign and the follower in Juyeok which contained some eliments, such as Eum-Yang, Soseong 8 gyae, Daeseong 64 gyae. In Juyeok, the 'Sovereign 5 hyo' (1) shows distinctiveness in basic characteristics whether they are Eum or Yang(high level classification), (2) shows characteristics of Soseong-gyae to which they belong(middle level classification), (3) shows different characteristics according to Daeseong-gyae's circumstances(low level classification). Five Yanghyo are regarded as male sovereign having masculinity, whereas five Eumhyo are female sovereign with femininity. Gungyae is the most 'sturdy type leader' who possesses dignity and has good judgement. Taegyae, the blessing type leader, holds affection and calmness within sturdiness. Rigyae is gorgeous and passionate 'enthusiastic type leader'. Jingyae, the pioneering leader, bravely starts ascending in Eum-dominant atmosphere. Songyae has the virtue of hesitancy and concession, known as the leader of humbleness. Gamgyae always stay low and calm, regarded as a leader of sense. Gangyae shoots up from the earth, meaning a leader of strong will. Gongyae, embracing type leader, is straight and square, though it tries to embrace everything. Daeseong-gyae(64gyae) is formed by Soseong-gyae piling another Soseong-gyae. The characteristics of Soseong 8gyae are embodied in two-level form, the top(inner gyae) and the bottom(outer gyae). Simultaneously, the whole characteristics of 대성괘 are embodied. The Sovereign should show his/her leadership based on the 'characteristics of Daeseong-gyae'. These characteristics are the contingency from 'contingency leadership'. In other words, they are preconditions which leaders ought to admit.

The Long-Run Relation of Public Debt and Fiscal Balance to Government Bond Rates: An Empirical Study on the Validity of Modern Monetary Theory (국가부채 및 재정수지와 국채이자율의 장기적 관계: 현대화폐이론 검증을 중심으로)

  • Kangwoo Park
    • Analyses & Alternatives
    • /
    • v.7 no.3
    • /
    • pp.181-230
    • /
    • 2023
  • Evaluating the empirical validity of Modern Monetary Theory, this study implements panel cointegration analysis on annual panel data (2000-2022) of OECD countries. Specifically, the sample countries are divided into groups based on the presence of their own sovereign currencies, and for each group, the long-run equilibrium relation (cointegration) between the ratio of public debt or fiscal deficit and government bond rates is tested and estimated. Main findings are as follows: applying the pooled mean-group estimation for panel cointegration, it is found that both the ratios of public debt and fiscal deficit have significantly positive long-run correlation with government bond rates in countries without sovereign currency such as the Euro-zone or fixed exchange rate regime countries. However, in countries with sovereign currency such as non-Euro-zone or floating exchange rate regime countries, the long-run correlation is either negative or not statistically significant. Particularly, in countries without sovereign currency, the ratio of public debt has significantly positive correlation with the real government bond rates in the short run as well as the long run. These results are consistent with the prediction of Modern Monetary Theory, thus providing a supporting evidence for the empirical validity of the theory.

China's Debt Woes: Not Yet a "Lehman Moment"

  • Sharma, Shalendra D.
    • East Asian Economic Review
    • /
    • v.19 no.1
    • /
    • pp.99-114
    • /
    • 2015
  • What explains the sharp increase in the Chinese economy's indebtedness, in particular the China's onshore corporate debt? Has the overall debt burden reached a threshold where it poses a systemic risk, thereby making the economy vulnerable to a "Lehman Moment" - with disorderly unwinding of the private sector and sovereign debt? What are the short and longer term implications of China's growing debt problems on domestic economic growth and the broader global political economy? What has Beijing done to ameliorate the problem, how effective were its efforts, and what must it do to deal with this problem?

A Literature Study on Comparing the Agarwood Formulas in 『Sheng ji zong lu』 and 『Donguibogam』 (『성제총록(聖濟總錄)』과 『동의보감(東醫寶鑑)』의 침향 배오 처방 비교 연구)

  • Kim, Jeong-Hoon;Kim, Hyun-Jung;Park, Min-Joo;Lee, Jang-Cheon;Lee, Boo-Kyun
    • Herbal Formula Science
    • /
    • v.27 no.1
    • /
    • pp.73-86
    • /
    • 2019
  • Objectives : In spite of the difficulty of getting Agarwood, the number of species of wild Agarwood is rapidly decreasing by insistent demands. Here, we investigate how various formula of Agarwood is used so that we can make use of them more helpful in clinics today. Methods : Determining the range of 'the Sovereign and Minister' component more than 12.96%" or 'equally used', this study distinguished whether Agarwood is used as 'the Sovereign and Minister' component among 409 Agarwood formulas in "Sheng ji zong lu(聖濟總錄)" and 103 Agarwood formulas in "Donguibogam (東醫寶鑑)". Additionally, we analyzed the component ratio of Agarwood, and also the usage in Deficiency-Excess pattern. Results : Among Agarwood formulas in "Sheng ji zong lu" and "Donguibogam", each percentage of Agarwood formulas which Agarwood comprises 'the Sovereign and Minister' component was 26%(106/406) and 13%(13/99). Analyzing these formulas of "Sheng ji zong lu", 53 formulas were used in Deficiency pattern and other 53 formulas were used in Excess pattern. Also in "Donguibogam", 6 formulas were used in each Deficiency pattern and Excess pattern, and only 1 formula in both of Deficiency and Excess pattern. Conclusions : Showing almost equal ratio of usage in Deficiency-Excess pattern, this study showed that those Agarwood formulas of "Sheng ji zong lu" and "Donguibogam" which Agarwood comprises 'the Sovereign and Minister' component can be used in both Deficiency-Excess pattern evenly.

Self-Sovereign Identity (SSI): Structured Literature Reviews with Socio-Technical Perspective (Self-Sovereign Identity (SSI: 자기주권신원) 연구 동향 분석: 사회경제, 법률, 기술적 고찰을 중심으로)

  • Son, Young Jin;Park, Min Jung;Park, Jung Suk;Hwang, Hwa Jung;Chai, Sang Mi
    • The Journal of Information Systems
    • /
    • v.30 no.4
    • /
    • pp.119-152
    • /
    • 2021
  • The concept of Self-Sovereign Identity (SSI) has emerged to overcome the limitations of traditional centralized personal identity management systems in our society. Therefore, in this study, 36 seminal researches out of 112 collected studies were investigated with a systematic literature review method to deliver a core common definition as well as the research trends on SSI in the socioeconomic, legal and technological fields. SSI studies in the legal field have mainly considered the conflicts with relevant laws such as General Data Protection Regulation (GDPR) and privacy protection laws. The study of SSI in the technology field have looked at the trends of the technical components to implement SSI and discussed the necessities of establishing standards to increase interoperability for SSI diffusion worldwide. This study ultimately derived the core definition of SSI from a various academic fields as "a trust-based personal identity management system that enables autonomous self-identification by a identity owner without a centralized system or 3rd party intervention". The results of this study contribute to the understanding of the essential SSI concept which were varied on different research fields and industries. The results also provide a foundation for discovering various SSI-based business models, applications as well as future research opportunities. Furthermore, this study suggested that SSI must be developed with interdisciplinary manner among the socioeconomic, legal, and technological fields to be practically applicable system to enable autonomous self-identification by a identity owner in our society.

Study on the Application of a Decentralized Identity System within University Based on Zero-Knowledge Proof for Self-Sovereign Identity Assurance (자기주권 신원 보장을 위한 영지식증명 기반의 대학 내 DID 시스템 적용방안 연구)

  • Im Sung Sik;Kim Seo Yeon;Kim Dong Woo;Han Su Jin;Lee Ki Chan;Oh Soo Hyun
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.141-150
    • /
    • 2024
  • With the increasing frequency of incidents related to personal information leaks, there is a growing concern about personal information protection. Moreover, with the emergence of blockchain technology, there is a heightened interest in self-sovereign identity models applied through blockchain, with ongoing research on Decentralized Identifiers (DID) to achieve this. However, despite universities storing and utilizing significant information such as personal data, their computer systems are operated and managed based on centralized systems, leading to annual occurrences of personal data breaches. Therefore, this paper proposes and implements a DID-based computing system applicable within universities. Additionally, it establishes and executes prominent services within the university context. The proposed system ensures users' self-sovereign identities through verifiable credentials, enabling the establishment of a secure integrated information system within the university, departing from traditional centralized systems.

Preventing Capital Flight to Reach Lucrative Investment In Indonesia

  • BASORUDIN, Muhammad;KUSMARYO, R. Dwi Harwin;RACHMAD, Sri Hartini
    • Asian Journal of Business Environment
    • /
    • v.10 no.1
    • /
    • pp.29-36
    • /
    • 2020
  • Purpose: This study aims to analyze the effect of macroeconomic and non-macroeconomic determinants of capital flight. Research design, data and methodology: With five determinants, this survey was conducted by Eviews 10, and the ordinary least squares (OLS) as a statistical method was applied for examining the research hypothesis. The five determinants are a budget deficit, economic growth, inflation rate, the exchange rate, and sovereign rating. The capital flight measurement uses the World Bank residual approach. The data derive from the Central Bank of Indonesia, BPS-Statistics Indonesia, OECD, and Moody's Investor Service. Results: The result considers that economic growth, the exchange rate, and the sovereign rating will decrease capital flight. In addition, the budget deficit and the inflation rate will increase capital flight. The sovereign rating decreases capital flight bigger than the other determinants. In addition, the exchange rate is statistically significant. Conclusions: The most influential problem of capital flight in Indonesia is because of non-macroeconomics factor political issue, corruption, bad regulation, and others. That's why the investment climate in Indonesia is still not secure. We propose that the regime would have to amend the business rule for reducing capital, raising the investment climate, and demonstrating the creative industry.

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.