This paper analyzed the ways in which "others" were reproduced in Korean movies in the 1970s. In the midst of the social changes of the era, such as urbanization due to rapid industrial modernization, many people became laborers for industry in order to obtain the fruits of modernization.But the landscape of others, which was inevitably produced in the process of constructing such subjects, has been limited to analysis that is focused on gender and youth discourse. This article aims to extract the landscape of others in the 1970s by adopting a different perspective. The way in which the other is present can be divided into the following two categories. First, in 1970s film, the family community, in contrast with 1960s film, has disintegrated and cracked, due to the inability of others to enter or leave the community. The desperate perception that the family community can no longer function as a stable foundation or center of the constitution, and that it cannot have a sense of security and belonging,is revealed through the way the others are wandering in and out of the community. Second, 'Death' is an element of social life in the violence of the national ideology of the 1970s, and the everyday exceptional state. The way in which the 'other' is completely eliminated from the normal subjectivity requested by the state and is deported in film reflectshow everyday death or potential death is part of life of the 1970s. Normal life pursued through rapid urbanization and industrialization leads to the death of the other beings, but the way of existence of others is the desperate reality of the 1970s, when the boundaries of the state that provide stability and belonging are broken. As a result, the landscape of others in the 1970s reveals a violent reality that destroys the perfect middle class family discourse that industrial modernization was oriented around in the 1970s, and that produced masses of others who caused numerous deaths. In spite of regime censorship, Korean films were popularly revealing the violence of life brought in by the 1970s, following a detour of representation.
Background: Dental hygienists provide direct dental care in the closest proximity to the patient, and each practice requires a high level of focus and concentration. These skills are an important human resource that can impact the quality of dental care services. Since more than half of dental clinics provide as overtime work in addition to regular hours, this study aims to determine the association between working overtime and job performance for dental hygienists. Methods: The study was conducted using a combination of online and in-person surveys via Google Forms among 131 employed dental hygienists. The survey consisted of 7 questions on demographic and work characteristics, 16 questions on characteristics related to overtime and the effect of overtime on job security, health, and life, and 10 questions on job performance, for a total of 33 questions. Chi-square analysis and independent samples t-test were used to identify the characteristics of demographic and work characteristics, and descriptive statistics analysis was used for the characteristics of overtime. Independent samples t-test was used to test the difference in the mean of job performance according to whether or not they worked overtime, and linear regression analysis was used to show the association of working overtime and job performance. Results: The study found that 71% of dental clinics worked overtime. The average number of overtime per week was once (78.5%), and the most common problems with overtime were fatigue (52.7%) and lack of personal and leisure time (41.9%). The appropriate number of overtime per week considered by dental hygienists was once a week, which was confirmed to be 94.6%. When comparing job performance by overtime status, those who worked overtime were 3.38 points higher than those who did not (35.45 vs. 32.07). Multiple linear regression analysis of the association of working overtime night and job performance showed that a one-unit increase in worked overtime was associated with a statistically significant increase in job performance of about 3.1 (p<0.01). Conclusion: Working overtime was found to have a positive effect on job performance among dental hygienists. Therefore, as a way to improve the working environment, providing appropriate compensation or welfare for overtime can reduce the negative aspects of overtime and turn it into a positive influence on job performance. This could ultimately raise awareness of the dental hygienist as a professional and effect the efficiency of dental care services.
During the selection and characterization of target formations in the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin, we have carefully investigated the possibility of induced earthquakes and leakage of $CO_2$ during the injection, and have designed the storage processes to minimize these effects. However, people in Pohang city have a great concern on $CO_2$-injection-intrigued seismicity, since they have greatly suffered from the 5.4 magnitude earthquake on Nov. 15, 2017. The research team of the project performed an extensive self-investigation on the safety issues, especially on the possible $CO_2$ leakage from the target formation and induced earthquakes. The target formation is 10 km apart from the epicenter of the Pohang earthquake and the depth is also quite shallow, only 750 to 800 m from the sea bottom. The project performed a pilot injection in the target formation from Jan. 12 to Mar. 12, 2017, which implies that there are no direct correlation of the Pohang earthquake on Nov. 15, 2017. In addition, the $CO_2$ injection of the storage project does not fracture rock formations, instead, the supercritical $CO_2$ fluid replaces formation water in the pore space gradually. The self-investigation results show that there is almost no chance for the injection to induce significant earthquakes unless injection lasts for a very long time to build a very high pore pressure, which can be easily monitored. The amount of injected $CO_2$ in the project was around 100 metric-tonne that is irrelevant to the Pohang earthquake. The investigation result on long-term safety also shows that the induced earthquakes or the reactivation of existing faults can be prevented successfully when the injection pressure is controlled not to demage cap-rock formation nor exceed Coulomb stresses of existing faults. The project has been performing extensive studies on critical stress for fracturing neighboring formations, reactivation stress of existing faults, well-completion processes to minimize possible leakage, transport/leakage monitoring of injected $CO_2$, and operation procedures for ensuring the storage safety. These extensive studies showed that there will be little chance in $CO_2$ leakage that affects human life. In conclusion, the Small-scale Offshore $CO_2$ Storage Demonstration Project in the Pohang Basin would not cause any induced earthquakes nor signifiant $CO_2$ leakage that people can sense. The research team will give every effort to secure the safety of the storage site.
In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.
The missile technology and its development in south Korea have been restrained to the limit of 180 km by America which instead provided to Korea with security protection. In the same vein, America pressured South Korea to abort its nuclear weapons program so as to prevent another possible military encounter that can easily develop into a war between South and North Korea. This restraint was a bit relaxed when South Korea joined the Missile Technology Control Regime (MTCR) in 2001 whereby the limit was 300 km. The situation of South Korea is in much contrast with its neighbor, North Korea, which has fired Taepo Dong 1 and Taepo Dong 2 to put its alleged satellite respectively into the Earth orbit. The range of this rocket believed to be reaching more than 5,500 km, a range of the intercontinental ballistic missile, without any rein. South Korea that has just geared its full powers for its outer space industry, with the current space projects of putting its satellites into the low Earth orbit, will in future put its satellite into the geostationary orbit, 36,000 km above the Earth. To do so, such restraint had better be resolved. Korean space industry, as it is alike in other countries, started with putting and manufacturing sounding rockets, producing satellites but relying on foreign launching facilities, and learning launching capacities. Experiencing three time launchings of KITSAT, the current satellite projects of Korea are undertaken as follows: - Koreasat - STSAT - Komsat - MBSAT - COMS (Communication, Ocean, and Meteorological Satellite) Koreans waked up to the things of outer space in 2008 with the first Korean astronaut Li So-yeon, a lady bio systems engineer. Although the first Korean made rocket in cooperation with a Russian company to fire last August 2009 was a failure, it should be considered as an inevitable process for future endeavors. There are currently three outer space related laws of Korea: Aerospace Industry Development Promotion Act 1987, Outer Space Development Promotions Act 2005, and Space Damage Compensation Act 2008. The first two stemming from the two different ministries are, however, overlapping in many aspects and have some shortcomings to be improved.
More than a decade after its initial proposal, deployment of IP Multicast has been limited due to the problem of traffic control in multicast routing, multicast address allocation in global internet, reliable multicast transport techniques etc. Lately, according to increase of multicast application service such as internet broadcast, real time security information service etc., overlay multicast is developed as a new internet multicast technology. In this paper, we describe an overlay multicast protocol and propose fast join mechanism that considers switching of the tree. To find a potential parent, an existing search algorithm descends the tree from the root by one level at a time, and it causes long joining latency. Also, it is try to select the nearest node as a potential parent. However, it can't select the nearest node by the degree limit of the node. As a result, the generated tree has low efficiency. To reduce long joining latency and improve the efficiency of the tree, we propose searching two levels of the tree at a time. This method forwards joining request message to own children node. So, at ordinary times, there is no overhead to keep the tree. But the joining request came, the increasing number of searching messages will reduce a long joining latency. Also searching more nodes will be helpful to construct more efficient trees. In order to evaluate the performance of our fast join mechanism, we measure the metrics such as the search latency and the number of searched node and the number of switching by the number of members and degree limit. The simulation results show that the performance of our mechanism is superior to that of the existing mechanism.
This paper is to analyze the type characteristics and prospects of the North Korean nuclear strategy. To this end, the paper is composed of 5 chapters titled introduction; the concept and type of nuclear strategy; the nuclear capabilities of North Korea and the declarative nuclear strategy; the operational characteristics and prospects of the North Korean nuclear strategy; and conclusion. Recently, the deployment of nuclear weapons and the enhancement of nuclear capabilities in North Korea have raised serious problems in our security and military preparedness. Nuclear strategy means military strategy related to the organization, deployment and operation of nuclear weapons. The study of North Korea's nuclear strategy begins with a very realistic assumption that the nuclear arsenal of North Korea has been substantiated. It is a measure based on North Korea's nuclear arsenal that our defense authorities present the concepts of preemptive attack, missile defense, and mass retaliation as countermeasures against the North Korean nuclear issue and are in the process of introducing and deploying them. The declared nuclear declaration strategy of the DPRK is summarized as: (1)Nuclear deterrence and retaliation strategy under the (North Korea's) Nuclear Weapons Act, (2)Nuclear preemptive aggression, (3)The principle of 'no first use' of nuclear weapons in the 7th Congress. And the intentions and operational characteristics of the North Korean nuclear strategy are as follows: (1)Avoiding blame through imitation of existing nuclear state practices, (2)Favoring of nuclear strategy through declarative nuclear strategy, (3)Non-settlement of nuclear strategy due to gap between nuclear capability and nuclear posture. North Korea has declared itself a nuclear-weapon state through the revised Constitution(2012.7), the Line of 'Construction of the Nuclear Armed Forces and the Economy'(2013.3), and the Nuclear Weapons Act(2013.4). However, the status of "nuclear nations" can only be granted by the NPT, which is already a closed system. Realistically, a robust ROK-US alliance and close US-ROK cooperation are crucial to curbing and overcoming the North Korean nuclear threat we face. On this basis, it is essential not only to deter North Korea's nuclear attacks, but also to establish and implement our own short-term, middle-term and long-term political and military countermeasures for North Korea's denuclearization and disarmament.
Background: It is necessary to consider the overall countermeasure for analysis of nuclear activities according to the increase of the nuclear facilities like nuclear power and reprocessing plants in the neighboring countries including China, Taiwan, North Korea, Japan and South Korea. South Korea and comprehensive nuclear-test-ban treaty organization (CTBTO) are now operating the monitoring instruments to detect radionuclides released into the air. It is important to estimate the origin of radionuclides measured using the detection technology as well as the monitoring analysis in aspects of investigation and security of the nuclear activities in neighboring countries. Materials and methods: A three-dimensional forward/backward trajectory model has been developed to estimate the origin of radionuclides for a covert nuclear activity. The developed trajectory model was composed of forward and backward modules to track the particle positions using finite difference method. Results and discussion: A three-dimensional trajectory model was validated using the measured data at Chernobyl accident. The calculated results showed a good agreement by using the high concentration measurements and the locations where was near a release point. The three-dimensional trajectory model had some uncertainty according to the release time, release height and time interval of the trajectory at each release points. An atmospheric dispersion model called long-range accident dose assessment system (LADAS), based on the fields of regards (FOR) technique, was applied to reduce the uncertainties of the trajectory model and to improve the detective technology for estimating the radioisotopes emission area. Conclusion: The detective technology developed in this study can evaluate in release area and origin for covert nuclear activities based on measured radioisotopes at monitoring stations, and it might play critical tool to improve the ability of the nuclear safety field.
North Korea's uranium enrichment facility is a matter of international concern. It is of particular alarming to South Korea with regard to the security and safety of the country. This situation requires continuous monitoring of the DPRK and emergency preparedness on the part of the ROK. To assess the detectability of an undeclared uranium enrichment plant in North Korea, uranium concentrations in the air at both a short and a long distance from the enrichment facility were estimated. $UF_6$ source terms were determined by using existing information on North Korean facility and data from the operation experience of enrichment plants from other countries. Using the calculated source terms, two atmospheric dispersion models (Gaussian Plume Model and HYSPLIT models) and meteorological data were used to estimate the uranium particle concentrations from the Yongbyon enrichment facility. A maximum uranium concentration and its location are dependent upon the meteorological conditions and the height of the UF6 release point. This study showed that the maximum uranium concentration around the enrichment facility was about $1.0{\times}10^{-7}g{\cdot}m^{-3}$. The location of the maximum concentration was within about 0.4 km of the facility. It has been assumed that the uranium sample of about a few micrograms (${\mu}g$) could be obtained; and that few micrograms of uranium can be easily measured with current measurement instruments. On the contrary, a uranium concentration at a distance of more than 100 kilometers from the enrichment facility was estimated to be about $1.0{\times}10^{-13}{\sim}1.0{\times}10^{-15}g{\cdot}m^{-3}$, which is less than back-ground level. Therefore, based on the results of our paper, an air sample taken within the vicinity of the Yongbyon enrichment facility could be used to determine as to whether or not North Korea is carrying out an undeclared nuclear program. However, the air samples taken at a longer distance of a few hundred kilometers would prove difficult in detecting a clandestine nuclear activities.
Jeong, Hae Sun;Kim, Eun Han;Jeong, Hyo Joon;Han, Moon Hee;Park, Mi Sun;Hwang, Won Tae
Journal of Radiation Protection and Research
/
v.39
no.1
/
pp.38-45
/
2014
This paper describes the results of assessment of radiological dose resulting from operation of the Daedeok nuclear facilities including the HANARO research reactor, which has been performed to assure whether or not to comply with the regulation standards of the radioactive effluents releases. Based on the meteorological data and the radiation source term, the maximum individual doses were evaluated from 2010 to 2012. The atmospheric dispersion and the deposition factors of gaseous effluents were calculated using the XOQDOQ computer code. ENDOS-G and ENDOS-L code systems were also used for maximum individual dose calculation from gaseous and liquid effluents, respectively. The results were compared with the regulation standards for the radioactive effluents presented by the Nuclear Safety and Security Commission (NSSC). The effective doses and the thyroid doses of the maximum individual were calculated at the maximum exposed point in the Daedeok site, and contributions of exposure pathways to the radiological doses resulting from gaseous and liquid radioactive effluents were evaluated at each facility of the Daedeok site. As a result, the maximum exposed age was analysed to be the child group, and the operation of HANARO research reactor had a major effect more than 90% on the individual doses. The main exposure pathways for gaseous radioactive effluent were from ingestion and inhalation. The effective doses and the thyroid doses were considerably influenced by tritium and iodine, respectively. The gaseous radioactive effluents contributed more than 90% on the total doses, whereas the contributions of the liquid radioactive effluents were relatively low. Consequently, the maximum individual dose due to radioactive effluents from the nuclear facilities within the Daedeok site were less than 3% of the regulation standard over 3 years; therefore, it can be concluded that radioactive effluents from the nuclear facilities were well managed, with the radiation-induced health detriment for residents around the site being negligible.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.