• Title/Summary/Keyword: 침해지표

Search Result 35, Processing Time 0.023 seconds

Regression Models for Determining the Patent Royalty Rates using Infringement Damage Awards and Inter-Partes Review Cases (손해배상액과 무효심판 판례를 이용한 특허 로열티율 산정 회귀모형)

  • Yang, Dong Hong;Kang, Gunseog;Kim, Sung-Chul
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.1
    • /
    • pp.47-63
    • /
    • 2018
  • This study suggested quantitative models to calculate a royalty rate as an important input factor of the relief from royalty method which has the characteristics of income approach method and market approach method that are generally used in the valuation of intangible assets. This study built a royalty rate regression model by referring to the patent infringement damages cases based on royalties, i.e., by using the royalty rates as a dependent variable and the patent indexes of the corresponding patent right as independent variables. Then, a logistic regression model was constructed by referring to inter-partes review cases of patent rights, i.e. by using not-unpatentable results as a dependent variable and the patent indexes of the corresponding patent right as independent variables. A final royalty rate was calculated by matching the royalty rate from the royalty rate regression model with a not-unpatentable probability from the logistic regression model. The suggested royalty rate was compared with the royalty rate obtained by the traditional methods to check its reliability.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

A Comparative Study of Wetland Change Detection Techniques Using Post-Classification Comparison and Image Differencing on Landsat-5 TM Data (랜�V-5호(號) TM 데이타를 이용(利用)한 구분후(區分后) 비교(比較) 및 영상대차(映像對差)의 습지대(濕地帶) 변화(變化) 탐지(探知) 기법(技法)에 관(關)한 비교연구(比較硏究))

  • Choung, Song Hak;Ulliman, Joseph J.
    • Journal of Korean Society of Forest Science
    • /
    • v.81 no.4
    • /
    • pp.346-356
    • /
    • 1992
  • The extensive Snake River floodplain in Northwest United States has experienced major changes in water channels and vegetation types due to floodings. To detect the change of wetland cover-types for the period of 1985 and 1988, post-classification comparison and image differencing change detection techniques were evaluated using Landsat-5 TM digital data. Differenced infrared-band images indicated better accuracy indices than any visible-band images. A thresholding technique was applied to identify the change and no change categories from the transformed images produced by image differencing. The problems in using different accuracy indices, including the Kappa coefficient of agreement, overall accuracy, producer's accuracy, user's accuracy, and average accuracy(based on both the producer's and user's accuracy approaches) in determining an optimal threshold level, were examined.

  • PDF

An Empirical Study on the Effects of Business Performance by Information Security Management System(ISMS) (정보보호 관리체계(ISMS)가 기업성과에 미치는 영향에 관한 실증적 연구)

  • Jang, Sang Soo;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.15 no.3_1
    • /
    • pp.107-114
    • /
    • 2015
  • Since 2002, information security management system has been implemented (ISMS) certification scheme whilst providing telecommunications services to enhance the level of enterprise information security was ongoing and Prevent accidents and avoid spread of infringement, such as rapid response and there is a lot of it came true. However, this system is the protection of the country or the investment company, as part of the actual information on how management affects the performance came from or how measures are still lacking for. In this study, the companies have their own privacy ISMS certification measures the level of activity continued to improve information security performance measures and methodology are presented. The government is also based on the validity of the certification system to ensure the overall implementation of the ISMS itself is this a step increase effective information security system is to be certified in advance to prevent security incidents and to improve business performance to help.

The framework to develop main criteria for a DDoS correspondence (DDoS 대응 지표 프레임워크 개발)

  • Lee, Yeon-Ho;Kim, Beom-Jae;Lee, Nam-Yong;Kim, Jong-Bae
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.79-89
    • /
    • 2010
  • The government and companies build a DDoS correspondence system hastily to protect assets from cyber threats. It has become more and more intelligent and advanced such as DDoS attack. However, when outbreaks of the social incidents such as 7.7 DDoS attack(2009.7.7) or cases of the direct damage occurred, information security systems(ISS) only become the issue in the short term. As usual, sustained investment about ISS is a negative recognition. Since the characteristic of ISS is hard to recognize the effectiveness of them before incidents occurs. Also, results of incidents occurred classify attack and detection. Detailed and objective measurement criterion to measure effectiveness and efficiency of ISS is not existed. Recently, it is progress that evaluation and certification about for the information security management system(ISMS). Since these works propose only a general guideline, it is difficult to utilize as a result of ISMS improvement for organization. Therefore, this paper proposes a framework to develop main criteria by a correspondence strategy and process. It is able to detailed and objective measurements.

Development of S-SLA based on the Analyses of Security Functions for Anti-virus System (안티바이러스 시스템 보안기능 분석을 통한 보안SLA 등급화 지표 개발)

  • Yi, Wan-Suck;Lee, Dong-Bum;Won, Dong-Ho;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.237-249
    • /
    • 2010
  • If one analyzes recent cyber incidents including personal information infringement cases, it seems like actual attack is targeting Internet service providers but actually they are targeting Internet service users. For many users, all the services were not provided to them as they have signed for in the contract or personal informations, which users have provided to service providers when signing contracts, were disclosed to public without users' consent causing aftereffect. As a result, importance of S-SLA indexes, which is to be included in the SLA to be signed between a user and a service provider, is ever more increasing. Especially, if there is a S-SLA indexes for anti-virus services, service providers have to provide a high quality of service as they have signed in the SLA. However, there wasn't any researches in the S-SLA area domestically and there are only limited SLA indexes related to system or service maintenances at the moment. Therefore, this paper analyses security functions in anti-virus services and proposes S-SLA indexes for different security level.

A Study on Development of Evaluation Indicators for the Human Competency and Management In Managed Security Service (MSS) (보안관제 업무의 인적 역량 및 관리에 대한 평가지표 개발 연구)

  • Yang, Sung Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.6
    • /
    • pp.143-152
    • /
    • 2016
  • Currently many central administrative agencies, municipalities and public and private institutions operate Managed security services to cope with cyber security incidents. These entities exert efforts in operating efficiencies rather than introduction of services as they used to. Accordingly, quite a few policies, directions and guidelines have been established for stable operation of Managed security services. Still, Managed security is operated by individuals, whose competencies influence the quality of Managed security services to a great extent. In this respect, the present article examines Managed security technology and methods and describes evaluation methods and examples relevant to human competencies, so as to seek for some potential courses for further development as well as more efficient approaches to human resource management in terms of institutional Managed security services.

An Effectiveness Analysis of Landscape Management for the Historic and Cultural Environment Preservation Area of the Pungnammun Gate, Jeonju, by Applying 3D Visual Exposure (3차원 시각노출도를 이용한 전주 풍남문 역사문화환경보존지역의 경관 관리 효과 분석)

  • Lee, Jae-Yong
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.36 no.2
    • /
    • pp.30-37
    • /
    • 2018
  • The uniformed regulations for control of the height of buildings owned by individuals to protect landscape of cultural properties are causing serious social conflicts by limiting the development of landowners. It is urgent need of introducing indicators that can resolve such conflicts and evaluate the regulations of buildings, which can satisfy urban development as well as landscape management of cultural properties. Therefore, the purpose of this study is to simulate landscape changes according to the Cultural Heritage Protection Act and National Land Planning and Utilization Act by using Unity3D in the Pungnammun Gate(Treasure No. 308) of Jeonju and its surroundings, where architectural cultural property forms the symbolic landscape of the city. Then some items such as view points, target points were introduced and the quantitative evaluation of landscapes was attempted by applying the indicator of 3D Visual Exposure. As a result, the viewing opportunity and viewing area of Pungnammun Gate were not significantly influenced by changes in landscape according to the two laws. However, the change of the height of buildings by the National Land Planning and Utilization Act, which has the greatest development capacity, confirmed the possibility of weakening the identification of the Pungnammun Gate by increasing 3D Visual Exposure of the background buildings more than two times. Finally, it was confirmed that the skyline of Pungnammun Gate was clearly infringed upon development under the National Land Planning and Utilization Act, but the skyline was maintained similar to the current situation in the regulation by the Cultural Heritage Protection Act. Thus, this study is meaningful in that the application of 3D Visual Exposure showed the possibility of utilization as an indicator for quantitatively evaluating the protection of view on cultural property and skyline according to the changes of building heights.

Evaluation on Effectiveness of the Parallel Importation Policy in Korea: Luxury Apparel Brands (한국의 병행수입에 따른 정책의 유효성 평가: 럭셔리 의류브랜드)

  • Kwon, Soongi
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.9
    • /
    • pp.1583-1592
    • /
    • 2001
  • 연구의 목적은 병행수입제도의 정책운용적인 관점에서 고가품 수입의 큰 비중을 차지 하고있는 럭셔리의류 브랜드를 중심으로 병행수입제도 도입 이후 현 시점에서 공정경쟁의 관점에서 병행수입의 문제점 추출과 대안을 도출함으로써 정책적 시사점을 제시하고자 한다. 연구 방법은 문헌조사와 in-depth 인터뷰를 실시하였다. 연구 결과 제도적 측면에서는 병행수입제도 도입 당시 병행수입과 직접 관련된 지적재산법과 독점규제법 사이에는 전용사용권자의 보호와 규제라는 입법적 목적이 서로 다른 이유로 병행수입 도입 여부에 대한 논란이 있는 것으로 나타났다 , 상표권 침해 기준의 모호, 세관절차에 있어서의 문제점 등이 추출되었다. 럭셔리의류 산업적 측면에서 병행수입제도는 수입물품의 가격인하를 선도하여 소비자 이익 증진에 기 여 하는 반면에 명품의 유통경로가 다양해짐에 따라 위조상품의 처벌실적 이 증가하고, 이월상품과overrun된 제품의 저가수입 등의 문제점이 야기되고 있다. 이에 대한 정책적 해결방안으로는 공정거래법의 개정을 통한 병행수입 허용기준의 보완, 지적재산권법 에 병행수입허용 규정 명시 , 소비자 관점에서의 병행수입 제품에 대한 정확한 정보의 전달 등의 내용 보완이 이루어져 야 한다. 본 연구의 시사점은 정책당국에게 경쟁조건의 Global Standard라는 견지에서 제도적 운용의 개선이 시급히 이루어져야 하는 논거와 토대를 제공하였다. 또한 전용사용권자와 병행수입업체에는 정보의 비대칭성에 의존한 판매전략을 지양하고 소비자 보호와 적 정 한 상표권 보호의 합리적 조화가 궁극적으로 생존의 핵심전략임을 인식시켜 줄 수 있는 계기를 마련해 주었다.가치관은 이들의 의복관심과 의복착용 그리고 구매에 지대한 영향을 미친다는 것을 알 수 있다.포제로 평가되었다. 모든 남자포제가 전통적, 순수한 이미지의 포제로, 철릭을 제외한 모든 포제가 단순한 이미지로 나타나 조선시대 남자 포제가 공통적으로 가지는 이미지는 단순하고 순수한 이미지를 가지고 있음을 알 수 있다. 3. 남자 포제의 시기별 복식이미지에서는 조선전기(철릭, 답호, 직령)의 포제는 관할성 요인이 높은 의례적인, 관할한, 특이한 이미지로 평가되었고 조선중기(도포, 창의)의 포제는 품위있는, 절제된, 풍성한 이미지로 평가되었으며, 조선후기(주의)의 포제는 활동적인, 단순한, 직선적인 이미지로 나타났다. 따라서 시대별 남자 포제의 이미지는 시대적 여건과 상황에 따라 변화되어 왔으며, 시대에 따라 추구하는 이미지가 달랐다는 것을 알 수 있이러한 논란의 해결방안으로 관세법 고시에 의한 우회적 도입을 결정한 정부의 방침에 대해 제도적 측면에서의 문제점으로 저작권 침해 기준의 결여다.lavonoid 함량의 판단지표로 활용될 수 있을 것으로 사료되었다.

  • PDF

Anti-Obesity Effect of Panax Ginseng in Animal Models: Study Protocol for a Systematic Review and Meta-Analysis (동물실험에서 인삼의 항비만 효과: 체계적 고찰과 메타분석을 위한 연구 프로토콜)

  • Cho, Jae-Heung;Kim, Koh-Woon;Park, Hye-Sung;Yoon, Ye-Ji;Song, Mi-Yeon
    • Journal of Korean Medicine for Obesity Research
    • /
    • v.17 no.1
    • /
    • pp.37-45
    • /
    • 2017
  • Recently the global epidemic problem of obesity has stimulated intense interest in the study of physiological mechanisms using animal models as a way to gain crucial data required for translation to human studies. Panax ginseng has been reported to have anti-obesity or antidiabetic effects in many animal studies; however, there have been few studies investigating human obesity. Herein, we will assess and examine the evidence supporting the anti-obesity effect of Panax ginseng in animal models with respect to anthropometric and metabolic outcomes. We will include controlled, comparative studies assessing the effect of Panax ginseng in preclinical studies of obesity. Panax ginseng will be administered during or following the induction of experimental obesity. The primary outcome measure will be anthropometric assessment and the secondary outcome measures will include adipose tissue weight, total amount of food consumed and metabolic parameters. We will search MEDLINE, Embase, PubMed, Web of Science, and Scopus without language, publication date, or other restrictions. Ethical approval will not be necessary as the data collected in this study will not be individual patient data, consequently there will be no concerns about violations of privacy. After finishing the whole procedure, the results will be disseminated by publication in a peer-reviewed journal or presented at a relevant conference. This protocol has been registered on the Collaborative Approach to Meta-Analysis and Review of Animal Data from Experimental Studies (CAMARADES) website (http://www.camarades.info).