Corona 19 brought about a major shift in the Korean church's pastoral style. Contact and non-contact ministry styles using the Internet and media devices are being held together. The elderly, who have been classified as digital vulnerable, need to see whether they are properly adapting to these changes and they have any difficulties in their religious lives. This study is to organize the current status of Corona 19 related to Korean churches, look at the current state of church programs for Christian elderly people, look at how important the religious life is to their lives, and to suggest educational pastoral methods for their religious lives based on the theory of Maria Harris' educational ministry. First, in terms of Koinonia, it was suggested that the heritage, beliefs, values and ways of life held by the Christian elderly be shared with people inside and outside the church in order to entertain and embrace everyone without alienation. Second, from the perspective of Leiturgia, educational ministry was proposed to expand prayer life from a personal area to a public area to become a life of practicing prayer and justice by providing public prayer content with media that can be used by the elderly to perform spirituality. Third, it was suggested that in terms of Didache, it should be required that the elderly should be educated to be familiar with the changing technologies, that teaching environment should be extended from church to online, and that the educational content of tradition and new forms should be dealt with extensively. Fourth, from the perspective of Kerigma, Christian elderly people who have suffered in various life environments, both personally and socially, should listen to the words again and gain the power to overcome the corona crisis through the God's words, so that they can be melted into the curriculum of koinonia, leiturgia, didache, and diakonia. Fifth, it was suggested that senior citizens should switch their consciousness to become subjects of service, not objects of service, and that digital literacy education should be provided individually at eye level to narrow the digital gap for Diakonia curriculum.
This paper examines a social and cultural history of horror films through the keyword "technology", focusing on The Spark of Fear: Technology, Society and the Horror Film (2015) written by Brian N. Duchaney. Science fiction film is closely connected with technology in film genres. On the other hand, horror films have been explained in terms of nature/supernatural. In this regard, The Spark of Fear, which accounts for horror film history as (re)actions to the development of technology, is remarkable. Early horror films which were produced under the influence of gothic novels reflected the fear of technology that had been caused by industrial capitalism. For example, in the film Frankenstein (1931), an angry crowd of people lynch the "monster", the creature of technology. This is the action which is aroused by the fear of technology. Furthermore, this mob behavior is suggestive of an uprising of people who have been alienated by industrial capitalism during the Great Depression. In science fiction horror films, which appeared in the post-war boom, the "other" that manifests as aliens is the entity that destroys the value of prosperity during post-war America. While this prosperity is closely related to the life of the middle class in accordance with the suburbanization, the people live conformist lives under the mantle of technologies such as the TV, refrigerator, etc. In the age of the Vietnam War, horror films demonize children, the counter-culture generation against a backdrop of the house that is the place of isolation and confinement. In this place, horror arises from the absolute absence of technology. While media such as videos, internet, and smartphones have reinforced interconnectedness with the outside world since the 1980s, it became another outside influence that we cannot control. "Found-footage" and "torture porn" which were rife in post-9/11 horror films show that the technologies of voyeurism/surveillance and exposure/exhibitionism are near to saturation. In this way, The Spark of Fear provides an opportune insight into the present day in which the expectation and fear of the progress of technology are increasingly becoming inseparable from our daily lives.
Recommendation system plays a significant role on relieving difficulties of selecting information among rapidly increasing amount of information caused by the development of the Internet and on efficiently displaying information that fits individual personal interest. In particular, without the help of recommendation system, E-commerce and OTT companies cannot overcome the long-tail phenomenon, a phenomenon in which only popular products are consumed, as the number of products and contents are rapidly increasing. Therefore, the research on recommendation systems is being actively conducted to overcome the phenomenon and to provide information or contents that are aligned with users' individual interests, in order to induce customers to consume various products or contents. Usually, collaborative filtering which utilizes users' historical behavioral data shows better performance than contents-based filtering which utilizes users' preferred contents. However, collaborative filtering can suffer from cold-start problem which occurs when there is lack of users' historical behavioral data. In this paper, hybrid music recommendation system, which can solve cold-start problem, is proposed based on the playlist data of Melon music streaming service that is given by Kakao Arena for music playlist continuation competition. The goal of this research is to use music tracks, that are included in the playlists, and metadata of music tracks and playlists in order to predict other music tracks when the half or whole of the tracks are masked. Therefore, two different recommendation procedures were conducted depending on the two different situations. When music tracks are included in the playlist, LightFM is used in order to utilize the music track list of the playlists and metadata of each music tracks. Then, the result of Item2Vec model, which uses vector embeddings of music tracks, tags and titles for recommendation, is combined with the result of LightFM model to create final recommendation list. When there are no music tracks available in the playlists but only playlists' tags and titles are available, recommendation was made by finding similar playlists based on playlists vectors which was made by the aggregation of FastText pre-trained embedding vectors of tags and titles of each playlists. As a result, not only cold-start problem can be resolved, but also achieved better performance than ALS, BPR and Item2Vec by using the metadata of both music tracks and playlists. In addition, it was found that the LightFM model, which uses only artist information as an item feature, shows the best performance compared to other LightFM models which use other item features of music tracks.
Journal of Korean Home Economics Education Association
/
v.35
no.1
/
pp.35-52
/
2023
This study investigated the utilization and satisfaction of lunchboxes according to food-related lifestyle. A sample of 819 adults who regularly purchased lunchboxes were studied. This study can provide basic data for effective menu development. The participants of the study were classified into 4 groups: a 'taste-seeking group', an 'economy-seeking group', 'a convenience-seeking group', and a 'health-seeking group'. The purchase price of lunchboxes was in the range of 3,500 to 4,000 won. The 'health-seeking group' was shown to spend the highest amount on lunchboxes, over 5,100 won. Information about lunchboxes was obtained primarily through convenience stores followed by Internet SNS (p<0.05). Most participants considered nutritional value when purchasing a lunchbox (p<0.001), of which protein, caloric, and sodium content were perceived as important. Moreover, lunchboxes with clean and hygienic aesthetics were preferred amongst the 'health-seeking group' (p<0.01). The 'economy-seeking group' had a higher satisfaction linked with taste (3.66) and quantity (3.60, p<0.001). Furthermore, in terms of the satisfaction with a menu variety the 'health-seeking group' showed the highest satisfaction with a score of 3.76, while the 'convenience-seeking group' ranked the lowest satisfaction with a score of 3.46 (p<0.05). All groups were satisfied with the convenience for purchasing lunchbox (p<0.001). Additionally, most participants preferred white rice (p<0.001) and meat (p<0.01) with cooked by fried and grilled. Lastly, in the content of the lunchbox use in the future, most participants indicated the intent for continuous use (p<0.01) and recommendation to others with the reason for the low price (19.2%) in the 'economy-seeking group', fresh ingredients (16.2%) in the 'convenience-seeking group', and nutritive (17.3%) in the 'health-seeking group', as well as for the convenience of purchase in the overall groups. Taken together, 'taste' and 'convenience' were the most important factors for all groups, while 'nutrition of food' and 'addition of condiments' scored relatively low on the satisfaction in all groups. Therefore, we recommend for the growth of the convenience store lunchbox market, that it is necessary to improve the quality of the lunchbox by developing various menus based on lifestyle group and fortifying nutrition.
This study aims to classify broadscale anti-religious movements in Korea based on critical public sentiment and analyze the meanings of these movements. To carry out the research, global religious changes that have occurred in modern times were closely looked into first. The world religions have had an influence on the world's religious awareness. As a result, they intend to acquire universality on their own individual grounds while keeping consistency with the past. This phenomenon used to appear to retain the identity, recreate tradition, transform itself to fit in the present times, pursue innovation, or even become overshadowed by other forms of thought such as when religions have collided with nationalism. How does Korean society perceive the changes that emerged in world religions? In general, the circumstances that Korea faces in this era tend to manifest themselves via the Internet, multimedia, and Youtube wherein they sound off on religion and this includes criticism of Christianity, demand for reformation, attack on minor religions, pro-reform academic circles and media, and the propagation of anti-theism. Criticism of religion is interpreted as an anti-religious movement. The secularism and anti-theism brought up by some Western scholars and critical theories of religion from scientific or historical perspectives are being spread through bookstores. Christianity is prone to reflecting on itself and trying to emphasizing a meta-religious spirituality. This in short, characterizes anti-religious movements in Korea. Indeed, criticism against particular religions has also emerged in the past. However, anti-religious movements that have recently come into existence in Korea are in some regards unprecedented when compared to that of the past in terms of their patterns and context. Especially, the active anti-Christianity movement in general is definitely a new phenomenon. This research mainly focused on Christianity, but on-going anti-religious movements will be a major topic for further research that aims to understand the religious changes unfolding in Korea.
Samul nori/Pungmul-gut is the symbol of ethnic identity for the Koreans abroad. It is the representative diaspora musical genre which is performed many cultural events held by Koreans. It is, at the same time, a global music which is appreciated by not only the Koreans but also the foreigners. Many musical communities in various countries exhibit the cultural migration through the discourse of 'tradition/variation' and 'authenticity/hybridity' in the course of the acculturation and enculturation of samul nori/pungmul-gut. The pungmul-pae 'Bichoe June' active in Toronto, Canada was organized by a foreign performer. For the foreigners pungmul-gut is easy to access as a genre of world music. As a percussion ensemble, it is easy to learn for the foreigners. The pungmul-pae 'Bichoe June' is a 'music community' consist of the Koreans and foreigners. The band tries to preserve the traditionality and authenticity of the Korean music. There is no variation or hybridity in its music since the member still learns the authentic music through various available textbooks and internet sites. Through the participation of the Koreans and foreigners, the band stimulates the globalzation of the pungmul-gut. The enculturation of the pungmul-gut is exhibited in two performances held by the band. One was host by the Canadian progressive group and the other was by the Korean conservative community. The former understood the nature of pungmul-gut as the music of the common people. The latter, however, accepted the music as the representative traditional music but was not easy to enjoy the 'noisy' music. In other words, the positive/negative acceptance of the pungmul-gut depends of the ideological nature of the listeners rather than the ethnical nature.
The digital transformation of finance is accelerating, and digital banking has already become a major banking channel. Banks have traditionally placed importance on CRM(Customer Relationship Management) and have tried to retain their loyal customers, who contribute significantly to the bank, such as long-term transactions, holding accounts with a certain balance or more, and holding loans. In this situation, this study exploratorily analyzed the consumer behavior of digital banking deposits in a major bank of Korea(1,145 samples). Statistical analysis was performed using SPSS. The main findings of the study are summarized as follows. It was found that there were differences of consumer behavior in digital banking deposits by generation, and the MZ generation used digital banking more on holidays than other generations. As a result of analyzing the behavior of existing loyal customers and regular customers of digital banking deposit, there was a significant difference in both the amount and period of the deposit. It was confirmed that the existing loyal customers of the bank also engage in consumer behavior that contributes to the bank in digital banking. In addition, the interaction between the customer type and the date of sign up for the deposit period, which is the goal setting of financial consumers, it was found that there was a significant effect. This study empirically analyzed the consumer behavior of digital banking in a situation where decrease of bank branches and encounters with digital banking. The major concepts of the consumer behavior theory are Loyal Customer, Goal Pursuit, and Habit, which were confirmed in an example of digital banking. The results of this study can suggest practical implications for existing banks and Internet-only banks, including the importance of customer management in digital banking.
Journal of the Korea Society of Computer and Information
/
v.14
no.12
/
pp.157-167
/
2009
Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.
Information and Communications Technology (ICT) is one of the technologies which represent the core value of the creative economy. It has served as a vehicle connecting the existing industry and corporate infrastructure, developing existing products and services and creating new products and services. In addition to the ICT, new devices including big data, mobile gadgets and wearable products are gaining a great attention sending an expectation for a new market-pioneering. Further, Internet of Things (IoT) is helping solidify the ICT-based social development connecting human-to-human, human-to-things and things-to-things. This means that the manufacturing-based hardware development needs to be achieved simultaneously with software development through convergence. The essential element the convergence between hardware and software is OS, for which world's leading companies such as Google and Apple have launched an intense development recognizing the importance of software. Against this backdrop, the status-quo of the software market has been examined for the study of the present report (Korea Evaluation Institute of Industrial Technology: Professional Design Technology Development Project). As a result, the software platform-based Google's android and Apple's iOS are dominant in the global market and late comers are trying to enter the market through various pathways by releasing web-based OS and similar OS to provide a new paradigm to the market. The present study is aimed at finding the way to utilize a smart content by which anyone can be a developer based on OS responding to such as social change, newly defining a smart content to be universally utilized and analyzing the market to deal with a rapid market change. The study method, scope and details are as follows: Literature investigation, Analysis on the app market according to a smart classification system, Trend analysis on the current content market, Identification of five common trends through comparison among the universal definition of smart content, the status-quo of application represented in the app market and content market situation. In conclusion, the smart content market is independent but is expected to develop in the form of a single organic body being connected each other. Therefore, the further classification system and development focus should be made in a way to see the area from multiple perspectives including a social point of view in terms of the existing technology, culture, business and consumers.
With the development of information and communications technology (ICT) and big data technology, anyone can easily obtain and utilize vast amounts of data through the Internet. Therefore, the capability of selecting high-quality data from a large amount of information is becoming more important than the capability of just collecting them. This trend continues in academia; literature reviews, such as systematic and non-systematic reviews, have been conducted in various research fields to construct a healthy knowledge structure by selecting high-quality research from accumulated research materials. Meanwhile, after the COVID-19 pandemic, remote healthcare services, which have not been agreed upon, are allowed to a limited extent, and new healthcare services such as health recommender systems (HRS) equipped with artificial intelligence (AI) and big data technologies are in the spotlight. Although, in practice, HRS are considered one of the most important technologies to lead the future healthcare industry, literature review on HRS is relatively rare compared to other fields. In addition, although HRS are fields of convergence with a strong interdisciplinary nature, prior literature review studies have mainly applied either systematic or non-systematic review methods; hence, there are limitations in analyzing interactions or dynamic relationships with other research fields. Therefore, in this study, the overall network structure of HRS and surrounding research fields were identified using citation network analysis (CNA). Additionally, in this process, in order to address the problem that the latest papers are underestimated in their citation relationships, the GraphSAGE algorithm was applied. As a result, this study identified 'recommender system', 'wireless & IoT', 'computer vision', and 'text mining' as increasingly important research fields related to HRS research, and confirmed that 'personalization' and 'privacy' are emerging issues in HRS research. The study findings would provide both academic and practical insights into identifying the structure of the HRS research community, examining related research trends, and designing future HRS research directions.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.