• Title/Summary/Keyword: Terms of Trade

Search Result 782, Processing Time 0.026 seconds

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

International Law on the Flight over the High Seas (공해의 상공비행에 관한 국제법)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.26 no.1
    • /
    • pp.3-30
    • /
    • 2011
  • According to the Article 86 of the United Nations on the Law of the Sea(UNCLOS) the provisions of high seas apply to all parts of the sea that are not included in the exclusive economic zone, in the territorial sea or in the internal waters of a State, or in the archipelagic waters of an archipelagic State. Article 87 also stipulates the freedom of the high seas. International laws on the flight over the high seas are found as follows; Firstly, as far as the nationality of the aircraft is concerned, its legal status is quite different from the ship where the flags of convenience can be applied practically. There is no flags of convenience of the aircraft. Secondly, according to the Article 95 of UNCLOS warships on the high seas have complete immunity from the jurisdiction of any State other than the flag State. We can suppose that the military(or state) aircraft over the high seas have also complete immunity from the jurisdiction of any State other than the flag State. Thirdly, according to the Article 101 of UNCLOS piracy consists of any act of voluntary participation in the operation of a ship or of an aircraft with knowledge of facts making it a pirate ship or aircraft. We can conclude that piracy can de done by a pirate aircraft as well as a pirate ship. Fourthly, according to the Article 111 (5) of UNCLOS the right of hot pursuit may be exercised only by warships or military aircraft, or other ships or aircraft clearly marked and identifiable as being on government service and authorized to that effect. We can conclude that the right of hot pursuit may be exercised only military aircraft, or aircraft clearly marked and identifiable as being on government service and authorized to that effect. Fifthly, according to the Article 110 of UNCLOS a warship which encounters on the high seas a foreign ship, is not justified in boarding it unless there is reasonable ground for suspecting that: (a) the ship is engaged in piracy, (b) the ship is engaged in the slave trade, (c) the ship is engaged in an authorized broadcasting and the flag State of the warship has jurisdiction under article 109, (d) the ship is without nationality, or (e) though flying a foreign flag or refusing to show its flag, the ship is, in reality, of the same nationality as the warship. These provisions apply mutatis mutandis to military aircraft. Sixthly, according to the Article 1 (5)(dumping), 212(pollution from or through the atmosphere), 222(enforcement with respect to pollution from or through the atmosphere) of UNCLOS aircraft as well as ship is very much related to marine pollution. Seventhly, as far as the crime on board aircraft over the high seas is concerned 1963 Convention on the Offences and Certain Other Acts Committed on Board Aircraft(Tokyo Convention) will be applied, and as for the hijacking over the high seas 1970 Convention for the Suppression of Unlawful Seizure of Aircraft(Hague Convention) and as for the sabotage over the high seas 1971 Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation(Montreal Convention) will be applied respectively. These three conventions recognize the flag state jurisdiction over the crimes on board aircraft over the high seas. Eightly, as far as reconnaissance by foreign aircraft in the high seas toward the coastal States is concerned it is not illegal in terms of international law because its act is done in the high seas. Ninthly as for Air Defence Identification Zone(ADIZ) there are no articles dealing with it in the 1944 Chicago Convention. The legal status of the foreign aircraft over this sea zone might be restricted to the regulations of the coastal states whether this zone is legitimate or illegal. Lastly, the Arctic Sea is the frozen ocean. So the flight over that ocean is the same over the high seas. Because of the climate change the Arctic Sea is getting melted. If the coastal states of the Arctic Sea will proclaim the Exclusive Economic Zone(EEZ) as the ocean is getting melted, the freedom of flight over that ocean will also be restricted to the regulations of the coastal states.

  • PDF