• Title/Summary/Keyword: The legal trust system

Search Result 54, Processing Time 0.022 seconds

Analysis on Management Practice of Trust Farming Corporations (농업회사 법인의 경영 실태 분석)

  • Kim, Jeong-Pil;Kim, Jai-Hong
    • Korean Journal of Agricultural Science
    • /
    • v.28 no.2
    • /
    • pp.147-161
    • /
    • 2001
  • Efficiency and competitive power in agribusiness management has became important issue due to the rapid changes in farming environment under new WTO agreement. To increase competitive power, small-sized petty farm should be restructured to be specialized large-scaled farming system. Trust farming corporation(TFC) has been introduced to increase farm productivity and competitive power through large scale farming system and refined management skills. Eventually, TFCs are expected to revitalize rural economy. TFCs are increasing in numbers, but they are unsatisfactory in quality often with insolvent operations. The typical problems with TFCs are internal conflicts among members, lack of management abilities and incentives, inefficiency in machinery use, and insolvent operations. The self effort by members and legal-institutional assistance can alleviate the negative factors against the rational for cooperative management and sustain TFCs. This study identifies the management problems of TFCs. To provide the methods for increasing management efficiency, improving rational management skills, and hence to help revitalizing the rural economy with competitive power, 20 TFCs in Nonsan County is surveyed. The major findings are as follows; 1) According to the survey result of 20 trust farming corporations, investments on the accumulation of knowledges and information, accounting management, machinery management are required due to the present lack of management/accounting ability. There also exist problems associated with revenue sources, labor uses, and public recognition. To increase management efficiency under current situation, corporations should import active business plans with expanding farming execution and off-farm season business. 2) Based on the result of corporations' business analysis, more than 50% of the corporations were not able to provide profit dividends to the members. It suggests that trust farming corporations need appropriate and stable revenue sources to sustain business. It is also required that corporations should reduce their excessive expenditure on fixed assets. 3) Theoretical amounts of consignment fees for tillage operation, planting, and harvesting were found to be 338,874 won, 216,596 won, and 332,318 won, respectively. Although actual levels of fee are 110%~120% of these theoretical levels of consignment fee, corporations' expected fee levels could not be acheived because of competency of consignment market.

  • PDF

International and National Legal Experience in Combating Corruption and the Influence of Information Policy on Improving the Implementation of Anti-Corruption Measures

  • Bagdasarova, Anaid E.;Dzhafarov, Navai K.;Kosovskaya, Viktoria A.;Muratova, Elena V.;Petrova, Irina A.;Fedulov, Vyacheslav I.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.169-174
    • /
    • 2022
  • The purpose of the study is to research the legal nature and essence of corrupt behavior, as well as the international and national legal aspects of the fight against corruption. The article discloses the relation between the factual results of the operation of anti-corruption normative and legal acts and the goals and objectives for which they were adopted. The effectiveness of the regulatory effect and quality of anti-corruption legislation is determined by the example of the Russian Federation. The article provides an analysis of theoretical aspects of the theory and history of the formation and development of anti-corruption legislation (on the example of Russia and some other countries, as well as international legal norms) giving several practical examples from foreign legislation demonstrating the structure of the system of government bodies battling against corrupt behavior (including its latent forms). The authors suggest that there is a need for a unified conception of information and propaganda support of state anti-corruption activities. This will make it possible to inform the population that the state is actively working to prevent corruption threats and to bring perpetrators to justice, as well as contribute to citizens' trust in the state policy in this area. At the same time, it is necessary to regularly inform the citizens about the provisions of the anti-corruption legislation, explaining the importance of their observance.

Improving Legislation on the use of Healthcare Data for Research Purposes (보건의료 빅데이터의 연구목적 사용에 대한 법제 개선방안)

  • Park, Dae Woong;Jeong, Hyun Hak;Jeong, Myung Jin;Ryoo, Hwa Shin
    • The Korean Society of Law and Medicine
    • /
    • v.17 no.2
    • /
    • pp.315-346
    • /
    • 2016
  • With the development of big data processing technology, the potential value of healthcare big data has attracted much attention. In order to realize these potential values, various research using the healthcare big data are essential. However, the big data regulatory system centered on the Personal Information Protection Act does not take into account the aspect of big data as an economic material and causes many obstacles to utilize it as a research purpose. The regulatory system of healthcare information, centered on the primary purpose of patient treatment, should be improved in a way that is compatible with the development of technology and easy to use for public interest. To this end, it is necessary to examine the trends of overseas legal system reflecting the concerns about the balance of protection and utilization of personal information. Based on the implications of the overseas legal system, we can derive improvement points in the following directions from our legal system. First, a legal system that specializes in healthcare information and encompasses protection and utilization is needed. De-identification, which is an exception to the Privacy Act, should also clearly define its level. It is necessary to establish a legal basis for linking healthcare big data to create synergy effects in research. It is also necessary to examine the introduction of the opt-out system on the basis of the discussion on the foreign debate and social consensus. But most importantly, it is the people's trust in these systems.

  • PDF

The Effect of Franchisor's Pre-open Support Services on Franchisee's Relationship Quality and Performance in Foodservice Franchise System (외식 프랜차이즈 가맹본부 개점 전 지원서비스가 가맹점 관계품질과 경영성과에 미치는 영향)

  • Han, Sang-Ho;Bae, Gi Cheol;Lee, Jae-Han
    • The Korean Journal of Franchise Management
    • /
    • v.2 no.1
    • /
    • pp.152-172
    • /
    • 2011
  • This study aims to analyze the effect of franchisor's pre-open support services on franchisee's relationship quality and performance in foodservice franchise system. The analysis data was collected from 500 franchisees located in Seoul and Gyeonggi-do of Republic of Korea. The finding are as followings: firstly, the factors of information providing, market researching, interior and equipment supporting, education and training supporting, sale and promotion supporting, and legal supporting influence positively franchisee's satisfaction. Second, regarding relationship among relationship quality, satisfaction positively influences trust and commitment, and trust positively influence commitment. Third, relationship quality influences positively both financial and non-financial performance.

Self-Sovereign Identity (SSI): Structured Literature Reviews with Socio-Technical Perspective (Self-Sovereign Identity (SSI: 자기주권신원) 연구 동향 분석: 사회경제, 법률, 기술적 고찰을 중심으로)

  • Son, Young Jin;Park, Min Jung;Park, Jung Suk;Hwang, Hwa Jung;Chai, Sang Mi
    • The Journal of Information Systems
    • /
    • v.30 no.4
    • /
    • pp.119-152
    • /
    • 2021
  • The concept of Self-Sovereign Identity (SSI) has emerged to overcome the limitations of traditional centralized personal identity management systems in our society. Therefore, in this study, 36 seminal researches out of 112 collected studies were investigated with a systematic literature review method to deliver a core common definition as well as the research trends on SSI in the socioeconomic, legal and technological fields. SSI studies in the legal field have mainly considered the conflicts with relevant laws such as General Data Protection Regulation (GDPR) and privacy protection laws. The study of SSI in the technology field have looked at the trends of the technical components to implement SSI and discussed the necessities of establishing standards to increase interoperability for SSI diffusion worldwide. This study ultimately derived the core definition of SSI from a various academic fields as "a trust-based personal identity management system that enables autonomous self-identification by a identity owner without a centralized system or 3rd party intervention". The results of this study contribute to the understanding of the essential SSI concept which were varied on different research fields and industries. The results also provide a foundation for discovering various SSI-based business models, applications as well as future research opportunities. Furthermore, this study suggested that SSI must be developed with interdisciplinary manner among the socioeconomic, legal, and technological fields to be practically applicable system to enable autonomous self-identification by a identity owner in our society.

Civil liability and criminal liability of accidents caused by autonomous vehicle hacking (해킹으로 인한 자율주행자동차 사고 관련 책임 법제에 관한 연구 -민사상, 형사상, 행정책임 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.19-30
    • /
    • 2019
  • As the 4th industrial revolution has recently become a hot topic, the importance of autonomous vehicles has increased and interest has been increasing worldwide, and accidents involving autonomous vehicles have also occurred. With the development of autonomous vehicles, the possibility of a cyber-hacking threat to the car network is increasing. Various countries, including the US, UK and Germany, have developed guidelines to counter cyber-hacking of autonomous vehicles, In the case of Korea, limited temporary operation of autonomous vehicles is being carried out, but the legal system to be applied in case of accidents caused by vehicle network hacking is insufficient. In this paper, based on the existing legal system, we examine the civil liability caused by the cyber hacking of the autonomous driving car, while we propose a law amendment suited to the characteristics of autonomous driving car and a legal system improvement plan that can give sustainable trust to autonomous driving car.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.

A Legal and Systematic Study On Consumer Protection In Electronic Commerce (전자상거래에서의 소비자보호에 관한 법.제도적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.787-796
    • /
    • 2009
  • The electronic commerce keeps going through a tremendous growth since the latter half of 1990's. But the consumer damages are being increased from characteristics such as non-confrontation, anonymity, internationality, unilaterality and possibility of temptation. Accordingly, this thesis has derived legal and systematic improvements for consumer protection in general as follows. First of all, it is necessary to extend the period to exercise the subscription withdrawal rights according to electronic commerce consumer protection law. Second, the electronic commerce has high possibility of causing errors by consumers because it is performed by non-confrontation and the accurate information must be provided to prevent errors in advance because it is not easy for consumers to prove their own errors. Third, a certification mark system on electronic agreement has to be adopted. Fourth, the legal, systematic and technological measures have to be adopted to prevent from having a sense of fear toward leaking or using personal information through a safe personal information management. Fifth, a strict supervision on internet trust mark is required. Finally, because the intervention or interference by a third party may take place through a hacking on messages or documents sent according to procedure in terms of online settlement, it is necessary to raise security on the system through a precise authentication between concerned parties.

E-voting Implementation in Egypt

  • Eraky, Ahmed
    • Journal of Contemporary Eastern Asia
    • /
    • v.16 no.1
    • /
    • pp.48-68
    • /
    • 2017
  • Manual elections processes in Egypt have several negative effects; that mainly leads to political corruption due to the lack of transparency. These issues negatively influence citizen's participation in the political life; while electronic voting systems aim to increase efficiency, transparency, and reduce the cost comparing to the manual voting. The main research objectives are, finding the successful factors that positively affects E-voting implementation in Egypt, in addition of finding out the reasons that keep Egyptian government far from applying E-voting, and to come up with the road map that Egyptian government has to take into consideration to successfully implement E-voting systems. The findings of the study suggest that there are seven independent variables affecting e-voting implementation which are; leadership, government willingness, legal framework, technical quality, awareness, citizen's trust in government and IT literacy. Technology-Organization-Environment (TOE) theory was used to provide an analytical framework for the study. A quantitative approach (i.e., survey questionnaire) strategy was used to collect data. A random sampling method was used to select the participants for the survey, whom are targeted voters in Egypt and have access to the internet, since the questionnaire was distributed online and the data is analyzed using regression analysis. Practical implications of this study will lead for more citizen participation in the political life due to the transparency that E-voting system will create, in addition to reduce the political corruption.