• Title/Summary/Keyword: Circumvention

Search Result 13, Processing Time 0.026 seconds

A Study on Anti-Circumvention Rules: with Focus on the US' and the EU's Systems (우회덤핑 방지 제도에 대한 연구: 미국 및 EU 제도를 중심으로)

  • Youngjeen Cho
    • Korea Trade Review
    • /
    • v.47 no.5
    • /
    • pp.223-240
    • /
    • 2022
  • Anti-circumvention rules were discussed profoundly during the Uruguay Round and the DDA negotiations, although WTO members failed to reached an agreement to introduce it to the WTO Anti-Dumping Agreement. However, as the cases of circumvention of anti-dumping duties increase, a number of countries have enacted anti-circumvention regulations as part of their anti-dumping laws. This study aims to analyze anti-circumvention rules from the perspective of WTO law. After overviewing the object and purpose of anti-dumping and anti-circumvention regulations, it examines anti-circumvention regulations of the US, the EU, and India. Next, the study explores the possible WTO-inconsistent aspects of those regulations. Then, it discusses whether it would be preferable for countries not equipped with anti-circumvention regulations, such as Korea, to have one. Thereafter, this study proposes Korean government to introduce anti-circumvention rules into its anti-dumping law.

Korean Countermeasures against the Anti-Evasion, Anti-Circumvention in US (미국의 우회덤핑방지제도와 회피방지제도에 대한 우리나라의 대응방안)

  • Oh, Byung-Seok
    • Korea Trade Review
    • /
    • v.44 no.6
    • /
    • pp.231-246
    • /
    • 2019
  • Circumvention refers to the situation in which exporters try to circumvent import restrictions by setting up factories in third countries and assembling and producing parts locally. Circumvention dumping eliminates the impacts of existing anti-dumping measures, and major countries are introducing anti-circumvention dumping laws to address this problem. If the act of the exporting country is recognized as a circumvention dumping activity, anti-dumping duties are applied retroactively to the imported goods or components. Evasion is an act of importation that results in the reduction or non-application of cash deposits, securities, or anti-dumping or countervailing duties, in a manner that is substantive or false, substantive or omission. In this article, we reviewed the contents and examples of the anti-circumvention measures by the US Department of Commerce (DOC), the International Trade Commission (ITC), and the Anti-Evasion measures by the CBP. The CBP examples show how much inference can be made about which parts of the CBP's investigations, and in what ways. The enactment of the EAPA created an environment in which the role of the CBP was directly guaranteed, and it was possible to apply adverse inferences to those who did not respond to requests for information, resulting in stronger CBP's authority. Therefore, it is advisable for Korea to examine the introduction of domestic laws, such as the bypass anti-dumping system, in order to cope with unfair trade practices that undermine and neutralize the effects of anti-dumping measures.

Anti-Censorship and Anonymous Web-Browsing System (차단우회 및 익명성보장 웹브라우징 시스템)

  • Lee, Eunsu;Lee, Suk-bok
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.11
    • /
    • pp.20-26
    • /
    • 2015
  • Internet censorship-circumvention and anonymizing services are becoming important with an increase in Internet population. Existing circumvention/anonymizing systems, however, have their own limitations, and they mainly suffer from the shortage of volunteers who relay others' traffic to bypass censors. In this paper, we present a new way of achieving censorship-circumvention while guaranteeing anonymity through the cooperation between censored and uncensored users.

Networked Creativity on the Censored Web 2.0: Chinese Users' Twitter-based Activities on the Issue of Internet Censorship

  • Xu, Weiai Wayne;Feng, Miao
    • Journal of Contemporary Eastern Asia
    • /
    • v.14 no.1
    • /
    • pp.23-43
    • /
    • 2015
  • In most of the world, the current trend in information technology is for open data movement that promotes transparency and equal access. An opposite trend is observed in China, which has the world's largest Internet population. The country has implemented sophisticated cyber-infrastructure and practices under the name of The Golden Shield Project (commonly referred to as the Great Firewall) to limit access to popular international web services and to filter traffic containing 'undesirable' political content. Increasingly, tech-savvy Chinese bypass this firewall and use Twitter to share knowledge on censorship circumvention and encryption to collectively troubleshoot firewall evasion methods, and even mobilize actions that border on activism. Using a mixed mythological approach, the current study addresses such networked knowledge sharing among citizens in a restricted web ecosystem. On the theoretical front, this study uses webometric approaches to understand change agents and positive deviant in the diffusion of censorship circumvention technology. On policy-level, the study provides insights for Internet regulators and digital rights groups to help best utilize communication networks of positive deviants to counter Internet control.

Improvement of Transformation Efficiency by Strategic Circumvention of Restriction Barriers in Streptomyces griseus

  • Suzuki, Hirokazu;Takahashi, Shunji;Osada, Hiroyuki;Yoshida, Ken-Ichi
    • Journal of Microbiology and Biotechnology
    • /
    • v.21 no.7
    • /
    • pp.675-678
    • /
    • 2011
  • DNA methylation in Streptomyces griseus IFO 13350 was analyzed by high-performance liquid chromatographic analysis and bisulfite-based analysis to reveal two methylation sites, 5'-$GC^{5m}$ CGGC-3' and 5'-$GAG^{5m}$ CTC-3'. The methylation was reconstituted in Escherichia coli by simultaneous expression of S. griseus SGR4675 and S. achromogenes M.SacI. The E. coli cells produced plasmids that mimicked the methylation profile of S. griseus DNA, which was readily introduced into S. griseus. The results of this study raise the possibility of a promising approach to establish efficient transformation in several streptomycetes.

Review of Biometrics-Based Authentication Techniques in Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.321-327
    • /
    • 2021
  • Mobile devices have recently developed to be an integral part of humans' daily lives because they meet business and personal needs. It is challenging to design a feasible and effective user authentication method for mobile devices because security issues and data privacy threats have significantly increased. Biometric approaches are more effective than traditional authentication methods. Therefore, this paper aims to analyze the existing biometric user authentication methods on mobile platforms, particularly those that use face recognition, to demonstrate the methods' feasibility and challenges. Next, this paper evaluates the methods according to seven characteristics: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention. Last, this paper suggests that solely using the method of biometric authentication is not enough to identify whether users are authentic based on biometric traits.

Engineering Autogenous Cartilage Using PLA Coated PGA Chondrocyte Complex (자가연골세포와 PLA-coated PGA 복합체를 이용한 연골조직 재생)

  • Kim, Woo Seob
    • Archives of Plastic Surgery
    • /
    • v.32 no.1
    • /
    • pp.1-4
    • /
    • 2005
  • Previous sucessful results of neocartilage formation using tissue engineering technique in immunocompromised nude mouse xenograft model were reported. For clinical application, autogenous cell is preferrable to allogenic or xenogenic cell for circumvention of immune rejection. This study evaluates the feasibility of producing a engineered cartilage using autogenous chondrocytes. Chondrocytes were isolated from the auricular catilage of New Zealand White rabbit and seeded onto PGA polymer coated with polylactic acid in round pattern(diameter 0.7 cm, thickness 0.1 cm) at a concentration $7{\times}10^7$ chondrocytes per $cm^3$. Each Autogenous Cell-polymer constructs were implanted subcutaneously into the left side of dorsum of twelve Rabbits. Polymer templates not containg cells were implanted into the right side as a control. Fifteen rabbits were sacrificed at the following intervals: 5 rabbits at nine weeks, 7 rabbits at twelve weeksNew autogenous cartilage formation which retained the approximate dimensions of origianl round polymer template in 11 of 12 cell seeded implants. Histological examination using hematoxyline and eosin stain revealed vast majority of implants developed into mature cartilage. This study opens up the possibility of autologus cell transplant to construct autogenous cartilge.

An Experimental Analysis for a High Pulse Radiation Induced Latchup Conformation (고준위 펄스방사선에 의한 전자소자 Latchup의 발생시험 및 분석)

  • Lee, Nam-Ho;Hwang, Young-Gwan;Jeong, Sang-Hun;Kim, Jong-Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.3079-3084
    • /
    • 2014
  • When an integrated circuit device is burned out under high-intense radiation and device-level simulation that usually requires manufacturer's proprietary information is not available, experimental conformation of a failure mechanism is often the only choice. To distinguish Latchup from other causes experimentally, a new combination of multiple techniques have been developed and demonstrated. Power supply circumvention, hot-spot monitoring using an infrared camera, and supply current monitoring techniques were implemented for the conformation of the Latchup.

A Study on a Scenario-based Information Leakage Risk Response Model Associated with the PC Event Detection Function and Security Control Procedures (PC 이벤트 탐지 기능과 보안 통제 절차를 연계시킨 시나리오 기반 금융정보유출 위험 대응 모델에 관한 연구)

  • Lee, Ig Jun;Youm, Heung Youl
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.137-152
    • /
    • 2018
  • It is a measure to overcome limitations that occur in the activity of detecting and blocking abnormal information leakage activity by collecting the activity log generated by the security solution to detect the leakage of existing financial information and analyzing it by pattern analysis. First, it monitors real-time execution programs in PC that are used as information leakage path (read from the outside, save to the outside, transfer to the outside, etc.) in the PC. Second, it determines whether it is a normal controlled exception control circumvention by interacting with the related security control process at the time the program is executed. Finally, we propose a risk management model that can control the risk of financial information leakage through the process procedure created on the basis of scenario.

An Empirical Study on the Determinants of Korean FDI focused on China& Asean six Countries for years 2016 through 2019 (한국 기업의 해외직접투자 모형설정에 관한 실증 연구(중국&아세안6개국 중심:2016년-2019년 중심))

  • Lee eung kweon
    • Korea Trade Review
    • /
    • v.46 no.1
    • /
    • pp.1-21
    • /
    • 2021
  • The main purpose of this research is to analyze the changes in investment motivation by year through time series and cross-sectional analysis of the factors and investment decisions of Korean manufacturing companies. According to the investment pattern for Asean from the 1980s to the 19th, the first expansion period was 82 to 86, the average increase in overseas investment for securing foreign raw materials due to the second oil shock, and the second expansion period was a gradual increase in exports to the U.S. in 1987 to 1996. During the first stagnation period, direct investment in Asean stagnated in the aftermath of the 1998-05 Asian crisis, and in the third expansion period, part of the production facilities invested in China were relocated to Asean, increasing Asean's investment to become Korea's largest manufacturing investment in 17. Korea's proportion of investment in Asean surpassed that of mass investment since 10 years ago, and the proportion of investment in manufacturing sector has been transferred from China to Asean, and after 17 years, it has served as an overseas production base connecting China. As such, The main purpose of the research will be to extract the determinant factors and key factors for overseas direct investment and investment patterns in conjunction with global manufacturing companies' production base relocation and investment trends through empirical analysis. This research paper gave basic reference to the motivation and determinant of investment 16 years ago, and analyzed the changes in investment motivation by year and content through empirical analysis, contributing some reasonable purpose to the decision of companies and policy makers interested in overseas direct investment.