• Title/Summary/Keyword: 국경(國境)

Search Result 437, Processing Time 0.024 seconds

A Study on Taxation Electronic Commerce (전자상거래의 조세정책에 관한 연구)

  • Kim, Ju-Taek
    • Korean Business Review
    • /
    • v.15
    • /
    • pp.59-78
    • /
    • 2002
  • It is only 9 to 10 years since the use of internet became commercial. But electronic commerce is now a familiar form of commercial transaction. Though the ratio of electronic commerce compared to total commercial transaction is still low, it is certain that electronic commerce will be the major form of transactions in the future. In July 1, 1997, United States made a public "A Framework for Global Electronic Commerce" to set up Internet to be a duty free zone and declared to play the trigger role in getting the international discussion of "A Framework for Global Electronic Commerce". In July 8, 1997, EU also adopted "Bonn Declaration"-minimizing government regulations and imposing no new tax on electronic commerce. Focusing the international trend, we need to develop the tax policy that is suitable for our country situation as soon as we can. To be able to do that, we must make an endless effort like selecting professionals, making new administrative part and supporting the research.

  • PDF

SOC-based Control Strategy of Battery Energy Storage System for Power System Frequency Regulation (전력계통 주파수조정을 위한 SOC 기반의 배터리 에너지저장장치 제어전략)

  • Yun, Jun Yeong;Yu, Garam;Kook, Kyung Soo;Rho, Do Hwan;Chang, Byung Hoon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.5
    • /
    • pp.622-628
    • /
    • 2014
  • This paper presents the SOC-based control strategy of BESS(Battery Energy Storage System) for providing power system frequency regulation in the bulk power systems. As the life cycle of BESS would be shortened by frequent changes of charge and discharge required for frequency regulation in a steady state, the proposed algorithm operates BESS within a range of SOC where its life cycle can be maximized. However, during a transient period of which occurrence frequency is low, BESS would be controlled to use its full capacity in a wider range of SOC. In addition, each output of multiple BESS is proportionally determined by its SOC so that the balance in SOC of multiple BESS can be managed. The effectiveness of the proposed control strategy is verified through various case studies employing a test system. Moreover, the control result of BESS with the measured frequency from a real system shows SOC of BESS can be maintained within a specific range although the frequency deviation is biased.

Cyber kill chain strategy for hitting attacker origin (공격 원점지 타격을 위한 사이버 킬체인 전략)

  • Yoo, Jae-won;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.306-309
    • /
    • 2017
  • The development of modern ICT technology constitutes cyber world by using infrastructure in country and society. There is no border in cyber world. Countries around the world are carrying out cyber attacks for their own benefit. A cyber killer strategy is needed to defend cyber attacks. In order to defend the cyber attack or to determine the responsibility of attack, it is important to grasp the attacker origin point. Strategic cyber kill chains are needed to strike against the attacker origin. In this paper, we study the analysis of attacker origin. And analyze the cyber kill chain for attacker origin point strike. Study the efficient and customized cyber kill chain strategy for attacking the origin point. The cyber kill chain strategy will be a practical strategy to replace the power of nuclear and missiles with asymmetric power.

  • PDF

Study on the Propagation Speed of the wide-area power system frequency for the application of FNET (광역 전력계통 주파수 감시망 적용을 위한 광역계통주파수의 전파속도에 관한 연구)

  • Kook, Kyung-Soo;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1824-1831
    • /
    • 2009
  • This paper analyzes the propagation speed of the wide-area power system frequency. When a generator supplying the electric power to the grid is accidently tripped due to a disturbance on the systems, power system frequency suddenly drops during the transient period and this propagates from the location of the tripped generator to the other part of the systems like a wave. Since the propagation speed of the power system frequency depends on the own characteristics of power systems, its understanding from the perspective of the wide-area can help us in understanding power systems more correctly. In addition, the propagation speed of the power system frequency is used as a key parameter in the application study of IT based on the internet-based GPS synchronized frequency monitoring network (FENT) which has been recently implemented and operated in U.S. power systems. This paper simulates the generation trip on various locations in U.S. power systems deploying its latest dynamic model and calculates the propagation speed of the power system frequency for the application of FNET.

Design and Implementation of a Real Time Access Log for IP Fragmentation Attack Detection (IP Fragmentation 공격 탐지를 위한 실시간 접근 로그 설계 및 구현)

  • Guk, Gyeong-Hwan;Lee, Sang-Hun
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.331-338
    • /
    • 2001
  • With the general use of network, cyber terror rages throughout the world. However, IP Fragmentation isn\`t free from its security problem yet, even though it guarantees effective transmission of the IP package in its network environment. Illegal invasion could happen or disturb operation of the system by using attack mechanism such as IP Spoofing, Ping of Death, or ICMP taking advantage of defectiveness, if any, which IP Fragmentation needs improving. Recently, apart from service refusal attack using IP Fragmentation, there arises a problem that it is possible to detour packet filtering equipment or network-based attack detection system using IP Fragmentation. In the paper, we generate the real time access log file to make the system manager help decision support and to make the system manage itself in case that some routers or network-based attack detection systems without packet reassembling function could not detect or suspend illegal invasion with divided datagrams of the packet. Through the implementation of the self-managing system we verify its validity and show its future effect.

  • PDF

Impact Evaluation of Plug-in Electric Vehicle Loading on Distribution Systems in North America (북미 배전계통에서의 플러그인 전기자동차에 대한 계통영향 평가)

  • Kook, Kyung-Soo;Maitra, Arindam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2236-2245
    • /
    • 2009
  • This paper proposes the process for evaluating the impact of charging the PHEV(Plug-In Hybrid Electric Vehicle) on the distribution systems, and analyzes the study results employing the actual systems as the PHEV is highly expected to increase in the automobile industries in North America in the near future. Since the charging load of the PHEV directly connected to the distribution systems would consume electric power much more than any other existing electric product of residential customers, the new modeling and process would be required to consider the PHEV in distribution systems planning. The EPRI(Electric Power Research Institute) is collaboratively conducting the impact study of PHEV on the distribution systems with power utilities in North America. This study models distribution systems and the charging load of the PHEV using OpenDSS software, and analyzes the impact of PHEV on the distribution systems by assuming various scenarios with different charging time and PHEV types.

International Tax Avoidance Type and Tax Cooperation Between Nations (국제적 조세회피 유형과 국가간 조세협력)

  • Kim Dong-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.6
    • /
    • pp.117-124
    • /
    • 2006
  • Thanks to globalization and multi-corporations which have further created complex economic systems over the years, we are now experiencing new aspects of economic challenges as well. Any country abiding by law and order is required to have taxpayer's consent and cooperation upon levying taxes, however, taxpayers will resist or try to avoid paying taxes at all if they can. Particularly, it becomes easier for them to do by using tax haven wherever they we, and their endeavor is not likely to stop as long as they can. These kinds of actions have undoubtedly created tax loopholes which have in fact surfaced and brought to attention to many. Inevitably, each country aggressively pursuits to exchange tax information with others and cooperate each other Thus this study will look into various types of international tax avoidance cases and its root causes and focuses on ways to cooperate amongst nations. The study also suggests possible ways to develop and enhance international tax systems for all the parties concerned.

  • PDF

SDGs approach towards Building Resilience to Disaster and Climate Change (재해에 대한 리질리넌스 확보를 위한 지속가능개발목표의 이행)

  • Hong, Ilpyo;Park, Jihyeon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.77-77
    • /
    • 2016
  • 최근 기후변화로 인한 수문기상학적인 극한 사상들은 점점 대형화되고 있고, 그 발생빈도 또한 잦아지고 있다. 인구의 증가와 급격한 도시화, 자산 가치의 증가 등으로 물과 관련된 재해로 인한 피해는 점점 더 규모가 커지고 있다. 홍수와 가뭄, 허리케인, 쓰나미와 같이 물과 관련된 재해는 그 영향을 받는 사람들의 수로 본다면 지구상의 재해 중 90%를 차지하고 있을 만큼 그 규모가 크다 할 수 있으며, 전세계적으로 물관련 재해로 인한 재산상의 피해를 약 1,000억 달러 규모로 추산하고 있는데, 2030년에는 그 현재의 두 배가 될 것으로 예측하고 있다. 이와 같은 재해로 인한 피해는 개도국이나 최빈국뿐만 아니라 관련 인프라가 잘 구축되어 있는 선진국 또한 예외는 아니다. 2015년 9월 UN 세계지속가능 정상 회의에서 각국의 수반들 또한 17개의 "지속가능개발목표(Sustainable Development Goals; SDGs)"를 채택함으로서 post-2015 아젠다가 세계를 지속가능하고 균형 있게 바꾸어 나가기 위해서 취해야 하는 가장 시급하고 필요한 과감한 혁신적인 조치임을 인식하였다. 재해경감과 지속가능개발은 2005년 채택된 "효고프레임웍(Hyogo Framework for Action) 2005-2015"에서 도 중요하게 다루어 졌다. 2015년 3월 제3차 세계재해경감대회에서 채택된 "센다이 프레임웍(Sendai Framework for Disaster Risk Reduction) 2015-2030"은 Post-2015 개발의제의 첫 번째 합의 결의안이라 할 수 있으며, 인명피해의 실질적인 감소와 재해에 의한 영향으로 피해 보는 사람들의 수를 줄이고, 경제적 손실과 대형 인프라 피해의 경감을 주요 타겟으로 하고 있다. 이와 같은 리질리언스의 중요성은 SDGs의 Goal 11인 "안전하고 지속가능한 도시와 정주지 조성(Make cities and human settlements inclusive, safe, resilient and sustainable)"에서 강조되고 있을 뿐만 아니라 다양한 골에서 재해로 부터의 리질리언스 확보에 대한 필요성을 강조하고 있다. 재해 위험을 경감시키기 위해서 국제적으로, 지역적으로 또는 국경을 넘어서는 협력 관계의 구축이 중앙정부나 지방정부를 비롯한 국가적으로 절대적으로 필요한 노력이라 할 수 있다. 특히나, Post-2015 개발 아젠다에 대한 기후변화와 재해경감을 위한 금융지원을 포함한 최빈국, 개도국, 군소 도서국가들과 중견국 선진국들의 양자간이나 다자간 협력 채널을 통한 역량 강화가 필요하다.

  • PDF

A Study on the Problems of Procedural Law Against Cyber Crimes in Korea - On the Trend of Procedural Law Against Cyber Crimes of U.S - (우리 사이버범죄 대응 절차의 문제점에 관한 연구 - 미국의 사이버범죄대응절차법을 중심으로 -)

  • Lim Byoung-Rak;Oh Tae-Kon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.231-241
    • /
    • 2006
  • When current cyber attacks to information and communication facilities are examined, technologies such as chase evasion technology and defense deviation technology have been rapidly advanced and many weak systems worldwide are often used as passages. And when newly-developed cyber attack instruments are examined, technologies for prefect crimes such as weakness attack, chase evasion and evidence destruction have been developed and distributed in packages. Therefore, there is a limit to simple prevention technology and according to cases, special procedures such as real-time chase are required to overcome cyber crimes. Further, cyber crimes beyond national boundaries require to be treated in international cooperation and relevant procedural arrangements through which the world can fight against them together. However, in current laws, there are only regulations such as substantial laws including simple regulations on Punishment against violation. In procedure, they are treated based on the same procedure as that of general criminal cases which are offline crimes. In respect to international cooperation system, international criminal private law cooperation is applied based on general criminals, which brings many problems. Therefore, this study speculates the procedural law on cyber crimes and presents actual problems of our country and its countermeasures.

  • PDF

Effect of internal and external capabilities and activities of a company on absorptive capacity and performance (기업의 내부 및 외부역량과 활동이 흡수역량과 성과에 미치는 영향)

  • Kim, Young-Ki;Park, Seong-Taek
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.125-136
    • /
    • 2021
  • Innovation is essential for the survival of a company in the fierce competitive environment of the global era of borders along with rapid technological development and changes from the environment. It is very important to secure your own competitive advantage. In this study, the relationship between internal R&D capability and organizational support as a company internal factor and external R&D capability, external knowledge search, and absorptive capability as a company external factor on performance was examined. As a result of the analysis, it was found that internal R&D capability, organizational support, and external knowledge search had a significant effect on absorptive capability, and innovation performance had a positive effect on new product performance. However, the mediating effect of absorptive capacity has not been verified, suggesting that absorptive capacity has a low correlation between innovation performance and new product performance, or that other important factors act between absorptive capacity and performance variables. The results of this study are expected to be utilized as useful guidelines when establishing R&D strategies in companies.