• Title/Summary/Keyword: market surveillance

Search Result 69, Processing Time 0.026 seconds

Monitoring of fish pathogens in wild marine fish of Korean coastal offshore water in 2008 (2008년 우리나라 연근해산 어류에 대한 병원체 모니터링)

  • Cho, Mi-Young;Jee, Bo-Young;Park, Gyeong-Hyun;Lee, Chang-Hoon;Lee, Deok-Chan;Kim, Jin-Woo;Park, Mi-Seon;Park, Myoung-Ae
    • Journal of fish pathology
    • /
    • v.22 no.1
    • /
    • pp.75-83
    • /
    • 2009
  • Disease surveillance was performed to monitor the prevalence of fish pathogens in wild marine fish caught in coastal offshore water from February to October in 2008. A total of 401 fish samples were collected at set net or fish market at landing port on the coast of Pohang, Geoje, Yeosu and Jeju. In this study, 17 kinds of fish pathogens were isolated from 152 fish samples. The detection rates of parasites, bacteria or viruses were 21.4%, 17.0% and 2.7%, respectively. The detected parasites were Scutica, Trichodina, Cryptocaryon, Dactylogyrus, Microcotyle, Benedenia, Bivagina, Heteraxin, Caligus, Epistylis and nematode. The dominant bacterial pathogens were Vibrio, Streptococcus, Photobacterium and Psuedomonas. Red sea bream iridovirus (RSIV) and lymphocystis disease virus (LDV) were detected in 6 species of fish virus examined in this study. The detection rates of fish pathogens from Scorpaenidae, Monacanthidae, Pleuronectidae, Sparidae and Carangidae investigated over 30 samples were 59.2%, 48.4%, 34.2%, 30.6% and18.2%, respectively.

A Study on Qualified Merger and Asset Adjustment Account on Corporate Income Tax Law (법인세법상 적격합병시 자산조정계정에 관한 연구)

  • Lim, Sung-Jong
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.83-97
    • /
    • 2016
  • The purpose of this study is to evaluate our system and consider how the tax rules on corporate reorganization and asset adjustment account can be improved. The scope of this study includes the Korean tax rules on corporate reorganizations, as well as key tax benefits provided by the Special Tax Treatment Control Act. In case of Korea, The relevant regulations and system of taxation respecting the merger has been made the rapid progress in several respects in this situation, there are capable of improvement. This paper suggests improve some problems on tax avoidance abusing incomplete tax law. First, the asset adjustment account is the difficulty that it needs to follow-up during this period of time, as well as the complexity of the accounting and tax adjustments on the practice. If it is permitted to succeed asset-liability as market value, the complexity of asset adjustment account in corporate tax accounting also disappear. Second, in case that controlling shareholders possess more than 20% of merged entity, they could not get the tax deferral until after the time of two years has elapsed. It needs to further alleviate the merged entity ratio than the present level. Finally, after the merger it will be to strengthen the surveillance provisions of five years from the current two years. In addition, continuity of shareholder's requirements and business requirements, it is also necessary to strengthen the requirements of the follow-up provided by a separate regulation.

  • PDF

A Liability for Damage caused by Drug (의약품 부작용과 손해배상)

  • Song, Jinsung
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.3
    • /
    • pp.77-116
    • /
    • 2020
  • The use of drugs that reflect the experiences and achievements of modern science has given human being the benefits of treating diseases and improving health conditions. However, in addition to the benefits of those, medicines have inherently inevitable adverse reactions. Many countries are taking measures such as market entry regulations or post-marketing surveillance to minimize damage caused by drug side effects, but the occurrence of side effects cannot be eliminated. Although the damage is force majeure, in some cases, the doctor who prescribed the drug or the pharmacist who administered the drug may have to compensate for the damage. The liability depends on whether the side effects were known in advance, the type of medicine, etc. On the other hand, in some cases, drug manufacturer may have to take liability for the side effect itself. As it is not easy for victims to be compensated for damages in those cases, many countries, including Korea, are setting to protect victims through the Product Liability Act. Drugs are also one of the product, so liability set by the Product Liability Act may apply. Even before the enactment and enforcement of the Product Liability Act, damage caused by drug has occurred. To resolve them, precedents have developed case law, which have many similarities with the Product Liability Act, but also have differences. Damage caused by drug manufactured prior to the enforcement of the Product Liability Act may occur in the future. In this context, the legal principles of the case laws will remain valid and be applied. This is an important reason to review the case law of precedents.

Study on Legal Regulations for Utilization of Drone in Private Security (민간경비에서 드론 활용과 법적 규제에 관한 연구)

  • Kim, Kye Won;Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.163-178
    • /
    • 2017
  • Recently, drone applications have been expanded not only in the military and security fields but also in daily life such as commercial and sports, and there is also a growing interest in using drone for private security work. This study focuses on the discussion on the use of drones in private security, drones regulation in the related laws such as the Private Security Act and the Aviation Safety Law, and major issues in accepting the Private Security Act. First, it focuses on the scope of private security work as defined by the Private Security Act, focusing on the use of drones as surveillance, information gathering, guidance and warning services, evacuation services, search and related material transport services, respectively. Second, the related laws for the use of drones in private security work include the Private Security Act and the Aviation Safety Act. However, the Private Security Act does not prescribe the current drones and the use of drones is regulated by Aviation Safety Act. Third, it is necessary to adjust the qualifications and authority range of security guards in the Private Security Act, to accept the drones as a type of security equipment, and to consider how countermeasures against threat types using drones should be accepted in the Private Security Act.

Current research trends of analytical methods for non-nutritive sweeteners (Non-nutritive sweeteners 분석을 위한 최근 분석기술 동향)

  • Yun, Choong-In;Kim, Young-Jun
    • Food Science and Industry
    • /
    • v.55 no.1
    • /
    • pp.58-73
    • /
    • 2022
  • Due to the recent demand for low-calorie foods, consumers are looking for alternative sweeteners that can control blood sugar, low risk of tooth decay and low calories. Regulations for permitted sweeteners in food vary from every country, and it is important for the government and the food industry to monitor products containing these sweeteners to ensure global compliance. Therefore, rapid, precise, and accurate analysis for food matrices should be applied to quality control, market surveillance, monitoring, and evaluation of food additive intake in the food industry. To analyze sweeteners simultaneously, it is essential to develop an efficient and rapid analytical method and to perform appropriate pretreatment steps such as solvent extraction and purification. This study presented the recent analysis trends about the suitable extraction method for food matrices focusing on non-nutritive sweeteners. Additionally, techniques for multi-compounds analysis using HPLC and LC-MS/MS and non-destructive analysis techniques using FT-IR were comprehensively described.

A study on the developmental plan of Alarm Monitoring Service (기계경비의 발전적 대응방안에 관한 연구)

  • Chung, Tae-Hwang;So, Seung-Young
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.145-168
    • /
    • 2010
  • Since Alarm Monitoring Service was introduced in Korea in 1981, the market has been increasing and is expected to increase continually. Some factors such as the increase of social security need and the change of safety consciousness, increase of persons who live alone could be affected positively on Alarm Monitoring Service industry. As Alarm Monitoring Service come into wide use, the understanding of electronic security service is spread and consumer's demand is difficult, so consideration about new developmental plan is need to respond to the change actively. Electronic security system is consist of various kinds of element, so every element could do their role equally. Alarm Monitoring Service should satisfy consumer's various needs because it is not necessary commodity, also electronic security device could be easily operated and it's appearance has to have a good design. To solve the false alarm problem, detection sensor's improvement should be considered preferentially and development of new type of sensor that operate dissimilarly to replace former sensor is needed. On the other hand, to settle the matter that occurred by response time, security company could explain the limit on Alarm Monitoring System to consumer honestly and ask for an understanding. If consumer could be joined into security activity by security agent's explanation, better security service would be provided with mutual confidence. To save response time the consideration on the introduction of GIS(Global Information System) is needed rather than GPS(Global Positioning System). Although training program for security agents is important, several benefits for security agents should be considered together. The development of new business model is required for preparation against market stagnation and the development of new commodity to secure consumer for housing service rather than commercial facility service. for the purpose of those, new commodity related to home-network system and video surveillance system could be considered, also new added service with network between security company and consumer for a basis is to be considered.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Attitudes to Safety of Genetically Modified Foods in Korea -Focus on Consumers- (유전자재조합 식품의 안전성에 대한 기본인식 조사 -일반 소비자를 중심으로 _)

  • 김영찬;박경진;김성조;강은영;김동연
    • Journal of Food Hygiene and Safety
    • /
    • v.16 no.1
    • /
    • pp.66-75
    • /
    • 2001
  • A survey was conducted to investigate consumers'attitudes toward the foods developed by gene recombination techniques from December, 1999 to April, 2000. The questionnaires were mailed to 1,500 people, and the 1,101 people responded. The consumers were asked about knowledge, acceptance, intention of purchasing, and labeling information. Although the portion of the consumers (88.8%) knowing the genetically modified floods (GMF) was lower than that of the flood expert group (98.7%), many consumers had some knowledge on the GMF, which may be influenced by news released from mass media. Seventy-nine percent of the consumers responded that gene recombination technology is necessary in food production, which is similar to the findings on the survey of the expert group. The portion of the consumers responding that these foods are potentially hazard was 88.1%, which is a little higher than the data (80.9%) from the expert group. The consumers having greater knowledge less worried about a potential hazard of the gene recombinant foods (p<0.01). Although 62.9% of the consumers responded to be willing to purchase those foods, only 16.2% of them responded to purchase the foods with no conditions, which is lower to that from the expert group (23.5%). There was no statistically significant relationship between the knowledge and the intention of purchasing. The ninety point three percent of the consumers wanted the information on gene recombination to be labeled on the foods. The data from this survey suggest that knowledge of the consumers on the GMF are not accurate, so proper strategy for consumer education may need to be developed. In addition, it is necessary to improve safety assessment system and analytical techniques for genetically modified foods (GMF) and to build pre- and post-market surveillance system fur efficient implementation of the GMF labeling.

  • PDF

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF