• Title/Summary/Keyword: Communications

Search Result 30,899, Processing Time 0.061 seconds

Analysis of the linkage between the three categories of content system according to the 2022 revised mathematics curriculum and the lesson titles of mathematics textbooks for the first and second-grade elementary school (2022 개정 수학과 교육과정에 따른 내용 체계의 세 범주와 초등학교 1~2학년 수학 교과서 차시명의 연계성 분석)

  • Kim, Sung Joon;Kim, Eun kyung;Kwon, Mi sun
    • Communications of Mathematical Education
    • /
    • v.38 no.2
    • /
    • pp.167-186
    • /
    • 2024
  • Since the 5th mathematics curriculum, the goals of mathematics education have been presented in three categories: cognitive, process, and affective goals. In the 2022 revised mathematics curriculum, the content system was also presented as knowledge-understanding, process-skill, and value-attitude. Therefore, in order to present lesson goals to students, it is necessary to present all three aspects that are the goals of mathematics education. Currently, the lesson titles presented in mathematics textbooks are directly linked to lesson goals and are the first source of information for students during class. Accordingly, this study analyzed how the three categories of lesson titles and content system presented in the 2015 revised 1st and 2nd grade mathematics textbook are connected. As a result, most lesson titles presented two of the three categories, but the reflected elements showed a tendency to focus on the categories of knowledge-understanding and process-skill. Some cases of lesson titles reflected content elements of the value-attitude category, but this showed significant differences depending on the mathematics content area. Considering the goals of mathematics lessons, it will be necessary to look at ways to present lesson titles that reflect the content elements of the value-attitude categories and also explore ways to present them in a balanced way. In particular, considering the fact that students can accurately understand the goals of the knowledge-understanding categories even without presenting them, descriptions that specifically reflect the content elements of the process-skill and value-attitude categories seem necessary. Through this, we attempted to suggest the method of presenting the lesson titles needed when developing the 2022 revised mathematics textbook and help present effective lesson goals using this.

The Study of Establishing the Multi-pass Eurasian Railroads (유라시아 철도의 다중경로 구축에 관한 연구)

  • Hahm, Beom-Hee;Huh, Nam-Kyun;Hurr, Hee-Young
    • Korean Business Review
    • /
    • v.21 no.2
    • /
    • pp.137-170
    • /
    • 2008
  • This study is presenting the logistics strategy in the international logistics markets which makes competition and corporation among north-east Asian countries to establishing the multi-pass Eurasian railroads. The countries located in north-east area of Eurasia like China, Japan, Russia and Korea are paying higher costs and disutility to the transportations and communications due to repeated conflicts and confrontations causes from the politic problems. They are being used surface transportation for most of all logistics between Europe and Asia except special merchandises because of characteristic of cargo to be air, the Silk Road remains vestige only which was main logistic passage to this area since BC. So far the Trans-Siberian Railway is being used by Russia mostly as north of Eurasian transport because of difficulties of service. The Trans-China Railway built in 1992 is not accomplishing as a international logistic passages. It is expected to take a long lead time because of characteristic of resource development and poor logistic infrastructure to the countries like Uzbekistan, double landlocked country, Mongolia and Azerbaijan, the countries do not be adjacent to the sea, even they have great economic jump-up plans through the development of their own resources. The Shanghai Cooperation Organization(SCO) start to sail officially in 2001 is constructed with China, Russia, Tadzhikistan, Kyrgyzstan, Kazakhstan and Uzbekistan as regular members of 6 countries and Mongolia, India, Pakistan, Afghanistan and Iran as observers 5 countries. It is started as a military alliance to protect terror, but now, it is expended to cooperate with the traffic, transportation, trade and share of energies. The Russia is doing their best to activate TSR as a government target to developnorth area equivalently, and economic develop of far-east Siberia. And also it is agreed provisionally to improve and repair of rail road between Nahjin and Hassan to connect TSR and TKR( Trans-Korea Railroad) by Russia, North Korea and South Korea with Russian's aggressive efforts. The development plan of this area is over lapped with GTI(Greater Tumen Initiative) promoted by UNDP, and is a cooperated project by 5 countries of South Korea, Mongolia, China, Russia and North Korea, subject to review the appropriation of energy, tour, environment, rail road connection between Mongolia and China and establishing a ferry route to north-east Asia. It is Japanese situation to pay attention to Russia and China even they have been supplying large-scope of infrastructure in Mongol area without any charges, target to get East Asia Main Rail Road to connect Mongolia and Zalubino of Russia. In case of the program for the Denuclearization of North Korea is not creeping, it will be accelerated to connect the TKR and TSR, TKR and TCR by somehow attending United States, including developing program promoted by UN ESCAP. As the result, Korean peninsular will continue the central role of competition and cooperation as in the past, now and future of north-east Asia, as of geographical-economics and geographical-politics whether it is requested or not wanted by neighbor countries.

  • PDF

A Study on pluralistic Reformation for Education of Telecommunication -for Establishment of Individual System for Comm. Education- (통신교육의 계열화와 계층화 -고유한 교역의 형성을 위하여-)

  • 조정현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.3 no.1
    • /
    • pp.28-30
    • /
    • 1978
  • Communication actions as a social band or Human community stick (fast) to human being ceaselessly w without stopping everywhere. All of comm. actions can be kept up and developed by the education of its own. Comm. actions have to include a character of social process, and so for it the social science should t to be some essential part of it. Therefore, Comm. education have to be schemed for achieving with a point of view of synthetical s science including technical and social factor. However, recentry Comm. education be suffered to lose of itowns essential attribute and individual i independence becausing to reduce social weight recklessly in their education It is a prindiple that Comm. science is an integrate science being composed of human, social and t technical subdepartments and so comm. education have to obey for Comm. constuctional theory, i international and social claim. Originally in Korea a educational idea and genealogy forming by the comm. scientific theory has I inherited on orthodoxy. But in 1961, communication college that is only the orthodox model of Comm. education, was f forced to close by some reckless policy and then the national administration for the Comm. education h have been weakened, and so recently it’s education became to degenerate as out of genealogy or n nonsystem alike some scattering Family. On the other side, today comm. science make to it’s modern scientific factor and to keep its l integrate level, therefore, all of educational provisions and administration for the telecomm. should t to be supplement to be fit for their plural chatacters. Comm. education have to occupy an individual educational system through the comm. theory, and t then it can be coexisted with neighbour scientific field equally and can include, connect coordinate o or effect its inference in each subfactor organically. Finally, educational system for telecommunication should to be requested as preeedence that i independent field including pluralism must be formed and sufficient autonomy be guarenteed, and s so Comm. education must be to restored its orthodox genealogy and be recovered individual system a and seIfrestraint field, and then it can be accomplished its own duty for nation and society.

  • PDF

Professional Speciality of Communication Administration and, Occupational Group and Series Classes of Position in National Public Official Law -for Efficiency of Telecommunication Management- (통신행정의 전문성과 공무원법상 직군렬 - 전기통신의 관리들 중심으로-)

  • 조정현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.3 no.1
    • /
    • pp.26-27
    • /
    • 1978
  • It can be expected that intelligence and knowledge will be the core of the post-industrial society in a near future. Accordingly, the age of intelligence shall be accelerated extensively to find ourselves in an age of 'Communication' service enterprise. The communication actions will increase its efficiency and multiply its utility, indebted to its scientic principles and legal idea. The two basic elements of communication action, that is, communication station and communication men are considered to perform their function when they are properly supported and managed by the government administration. Since the communication action itself is composed of various factors, the elements such as communication stations and officials must be cultivated and managed by specialist or experts with continuous and extensive study practices concerned. With the above mind, this study reviewed our public service officials law with a view to improve it by providing some suggestions for communication experts and researchers to find suitable positions in the framework of government administration. In this study, I would like to suggest 'Occupational Group of Communication' that is consisted of a series of comm, management positions and research positions in parallel to the existing series of comm, technical position. The communication specialist or expert is required to be qualified with necessary scientific knowledge and techniques of communication, as well as prerequisites as government service officials. Communication experts must succeed in the first hand to obtain government licence concerned in with the government law and regulation, and international custom before they can be appointed to the official positions. This system of licence-prior-to-appointment is principally applied in the communication management position. And communication research positions are for those who shall engage themselves to the work of study and research in the field of both management and technical nature. It is hopefully expected that efficient and extensive management of communication activities, as well as scientific and continuous study over than communication enterprise will be upgraded at national dimensions.

  • PDF

Clinical Observations of Gastrointestinal Cow Milk Allergy in Children According to a New Classification (새로운 분류법에 따른 소아 위장관 우유 알레르기 질환에 관한 임상적 고찰)

  • Hwang, Jin Bok;Choi, Seon Yun;Kwon, Tae Chan;Oh, Hoon Kyu;Kam, Sin
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.7 no.1
    • /
    • pp.40-47
    • /
    • 2004
  • Purpose: A new classification of gastrointestinal food allergy was published, but the changes of terminology between previously reported terms and the new ones were in a state of disorder. This has resulted in confusion between medical communication and diagnostic and therapeutic approaches. The clinical observations of infants presenting with gastrointestinal cow milk allergy (GI-CMA) were performed, and the changes in the terminology reviewed through the published Korean literature. Methods: Between March 2003 and July 2003, data from 37 consecutive infants with GI-CMA, aged 2 weeks to 15 months, were reviewed. The challenge and elimination test of cow milk, and the endoscopic and histologic findings, were used for the seven subdivisions of GI-CMA according to a new classification on the basis of patients' ages, clinical manifestations and location of gastrointestinal lesions. Results: The 37 patients had a mean age of $5.4{\pm}4.8$ months, with those observed in 26 (70.3%) of patients being below 6 months of age. The seven final diagnoses were; cow milk protein-induced enterocolitis (CMPIE) in 12 (32.4%), cow milk protein proctitis (PROC) in 12 (32.4%), IgE-mediated (IGE) in 6 (16.2%), gastroesophageal reflux-associated cow milk allergy (GERA) in 5 (13.5%) and eosinophilic gastroenterocolitis in 2 (5.4%). CMPIE was revealed as the typical type in 7 (18.9%) and the atypical type in 5 (13.5%), and all of typical CMPIE revealed cow milk protein-induced enteropathy. The mean age at symptom onset was $4.3{\pm}0.8$ months, and for those with typical and atypical CMPIE, and PROC and GERA were $3.8{\pm}4.6$, $10.4{\pm}3.8$, $3.4{\pm}3.9$ and $7.8{\pm}5.7$ months, respectively (p<0.05). The period from onset of symptom to diagnosis was $2.4{\pm}3.3$ (0.5~12) months, with those observed in atypical CMPIE and GERA being over 3months. Although the birth weights in all patients were within the 10~90 percentile range, the body weights on diagnoses were below the 3 percentile in 48.6%; IGE 16.7%, EOS 0%, typical CMPIE 85.7%, atypical CMPIE 60.0%, PROC 25.0% and GERA 100% (p<0.05). Through the review of the Korean literature, 8 case reports and 14 original articles for GI-CMA were found. Conclusion: GI-CMA is not a rare clinical disorder and is subdivided into seven categories on the basis of the patient's age, clinical manifestations and location of the gastrointestinal lesions. The terms for GI-CMA are changing with new classifications, and careful approaches are necessary for medical communications.

  • PDF

A Study on Commodity Asset Investment Model Based on Machine Learning Technique (기계학습을 활용한 상품자산 투자모델에 관한 연구)

  • Song, Jin Ho;Choi, Heung Sik;Kim, Sun Woong
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.127-146
    • /
    • 2017
  • Services using artificial intelligence have begun to emerge in daily life. Artificial intelligence is applied to products in consumer electronics and communications such as artificial intelligence refrigerators and speakers. In the financial sector, using Kensho's artificial intelligence technology, the process of the stock trading system in Goldman Sachs was improved. For example, two stock traders could handle the work of 600 stock traders and the analytical work for 15 people for 4weeks could be processed in 5 minutes. Especially, big data analysis through machine learning among artificial intelligence fields is actively applied throughout the financial industry. The stock market analysis and investment modeling through machine learning theory are also actively studied. The limits of linearity problem existing in financial time series studies are overcome by using machine learning theory such as artificial intelligence prediction model. The study of quantitative financial data based on the past stock market-related numerical data is widely performed using artificial intelligence to forecast future movements of stock price or indices. Various other studies have been conducted to predict the future direction of the market or the stock price of companies by learning based on a large amount of text data such as various news and comments related to the stock market. Investing on commodity asset, one of alternative assets, is usually used for enhancing the stability and safety of traditional stock and bond asset portfolio. There are relatively few researches on the investment model about commodity asset than mainstream assets like equity and bond. Recently machine learning techniques are widely applied on financial world, especially on stock and bond investment model and it makes better trading model on this field and makes the change on the whole financial area. In this study we made investment model using Support Vector Machine among the machine learning models. There are some researches on commodity asset focusing on the price prediction of the specific commodity but it is hard to find the researches about investment model of commodity as asset allocation using machine learning model. We propose a method of forecasting four major commodity indices, portfolio made of commodity futures, and individual commodity futures, using SVM model. The four major commodity indices are Goldman Sachs Commodity Index(GSCI), Dow Jones UBS Commodity Index(DJUI), Thomson Reuters/Core Commodity CRB Index(TRCI), and Rogers International Commodity Index(RI). We selected each two individual futures among three sectors as energy, agriculture, and metals that are actively traded on CME market and have enough liquidity. They are Crude Oil, Natural Gas, Corn, Wheat, Gold and Silver Futures. We made the equally weighted portfolio with six commodity futures for comparing with other commodity indices. We set the 19 macroeconomic indicators including stock market indices, exports & imports trade data, labor market data, and composite leading indicators as the input data of the model because commodity asset is very closely related with the macroeconomic activities. They are 14 US economic indicators, two Chinese economic indicators and two Korean economic indicators. Data period is from January 1990 to May 2017. We set the former 195 monthly data as training data and the latter 125 monthly data as test data. In this study, we verified that the performance of the equally weighted commodity futures portfolio rebalanced by the SVM model is better than that of other commodity indices. The prediction accuracy of the model for the commodity indices does not exceed 50% regardless of the SVM kernel function. On the other hand, the prediction accuracy of equally weighted commodity futures portfolio is 53%. The prediction accuracy of the individual commodity futures model is better than that of commodity indices model especially in agriculture and metal sectors. The individual commodity futures portfolio excluding the energy sector has outperformed the three sectors covered by individual commodity futures portfolio. In order to verify the validity of the model, it is judged that the analysis results should be similar despite variations in data period. So we also examined the odd numbered year data as training data and the even numbered year data as test data and we confirmed that the analysis results are similar. As a result, when we allocate commodity assets to traditional portfolio composed of stock, bond, and cash, we can get more effective investment performance not by investing commodity indices but by investing commodity futures. Especially we can get better performance by rebalanced commodity futures portfolio designed by SVM model.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

The Roles of Service Failure and Recovery Satisfaction in Customer-Firm Relationship Restoration : Focusing on Carry-over effect and Dynamics among Customer Affection, Customer Trust and Loyalty Intention Before and After the Events (서비스실패의 심각성과 복구만족이 고객-기업 관계회복에 미치는 영향 : 실패이전과 복구이후 고객애정, 고객신뢰, 충성의도의 이월효과 및 역학관계 비교를 중심으로)

  • La, Sun-A
    • Journal of Distribution Research
    • /
    • v.17 no.1
    • /
    • pp.1-36
    • /
    • 2012
  • Service failure is one of the major reasons for customer defection. As the business environment gets tougher and more competitive, a single service failure might bring about fatal consequences to a service provider or a firm. Sometimes a failure won't end up with an unsatisfied customer's simple complaining but with a wide-spread animosity against the service provider or the firm, leading to a threat to the firm's survival itself in the society. Therefore, we are in need of comprehensive understandings of complainants' attitudes and behaviors toward service failures and firm's recovery efforts. Even though a failure itself couldn't be fixed completely, marketers should repair the mind and heart of unsatisfied customers, which can be regarded as an successful recovery strategy in the end. As the outcome of recovery efforts exerted by service providers or firms, recovery of the relationship between customer and service provider need to put on the top in the recovery goal list. With these motivations, the study investigates how service failure and recovery makes the changes in dynamics of fundamental elements of customer-firm relationship, such as customer affection, customer trust and loyalty intention by comparing two time points, before the service failure and after the recovery, focusing on the effects of recovery satisfaction and the failure severity. We adopted La & Choi (2012)'s framework for development of the research model that was based on the previous research stream like Yim et al. (2008) and Thomson et al. (2005). The pivotal background theories of the model are mainly from relationship marketing and social relationships of social psychology. For example, Love, Emotional attachment, Intimacy, and Equity theories regarding human relationships were reviewed. As the results, when recovery satisfaction is high, customer affection and customer trust that were established before the service failure are carried over to the future after the recovery. However, when recovery satisfaction is low, customer-firm relationship that had already established in the past are not carried over but broken up. Regardless of the degree of recovery satisfaction, once a failure occurs loyalty intention is not carried over to the future and the impact of customer trust on loyalty intention becomes stronger. Such changes imply that customers become more prudent and more risk-aversive than the time prior to service failure. The impact of severity of failure on customer affection and customer trust matters only when recovery satisfaction is low. When recovery satisfaction is high, customer affection and customer trust become severity-proof. Interestingly, regardless of the degree of recovery satisfaction, failure severity has a significant negative influence on loyalty intention. Loyalty intention is the most fragile target when a service failure occurs no matter how severe the failure criticality is. Consequently, the ultimate goal of service recovery should be the restoration of customer-firm relationship and recovery of customer trust should be the primary objective to accomplish for a successful recovery performance. Especially when failure severity is high, service recovery should be perceived highly satisfied by the complainants because failure severity matters more when recovery satisfaction is low. Marketers can implement recovery strategies to enhance emotional appeals as well as fair treatments since the both impacts of affection and trust on loyalty intention are significant. In the case of high severity of failure, recovery efforts should be exerted to overreach customer expectation, designed to directly repair customer trust and elaborately designed in the focus of customer-firm communications during the interactional recovery process to affect customer trust rebuilding indirectly. Because it is a longer and harder way to rebuild customer-firm relationship for high severity cases, low recovery satisfaction cannot guarantee customer retention. To prevent customer defection due to service failure of high severity, unexpected rewards as a recovery will be likely to be useful since those will lead to customer delight or customer gratitude toward the service firm. Based on the results of analyses, theoretical and managerial implications are presented. Limitations and future research ideas are also discussed.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

The Role of the Soft Law for Space Debris Mitigation in International Law (국제법상 우주폐기물감축 연성법의 역할에 관한 연구)

  • Kim, Han-Taek
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.2
    • /
    • pp.469-497
    • /
    • 2015
  • In 2009 Iridium 33, a satellite owned by the American Iridium Communications Inc. and Kosmos-2251, a satellite owned by the Russian Space Forces, collided at a speed of 42,120 km/h and an altitude of 789 kilometers above the Taymyr Peninsula in Siberia. NASA estimated that the satellite collision had created approximately 1,000 pieces of debris larger than 10 centimeters, in addition to many smaller ones. By July 2011, the U.S. Space Surveillance Network(SSN) had catalogued over 2,000 large debris fragments. On January 11, 2007 China conducted a test on its anti-satellite missile. A Chinese weather satellite, the FY-1C polar orbit satellite, was destroyed by the missile that was launched using a multistage solid-fuel. The test was unprecedented for having created a record amount of debris. At least 2,317 pieces of trackable size (i.e. of golf ball size or larger) and an estimated 150,000 particles were generated as a result. As far as the Space Treaties such as 1967 Outer Space Treaty, 1968 Rescue Agreement, 1972 Liability Convention, 1975 Registration Convention and 1979 Moon Agreement are concerned, few provisions addressing the space environment and debris in space can be found. In the early years of space exploration dating back to the late 1950s, the focus of international law was on the establishment of a basic set of rules on the activities undertaken by various states in outer space.. Consequently environmental issues, including those of space debris, did not receive the priority they deserve when international space law was originally drafted. As shown in the case of the 1978 "Cosmos 954 Incident" between Canada and USSR, the two parties settled it by the memorandum between two nations not by the Space Treaties to which they are parties. In 1994 the 66th conference of International Law Association(ILA) adopted "International Instrument on the Protection of the Environment from Damage Caused by Space Debris". The Inter-Agency Space Debris Coordination Committee(IADC) issued some guidelines for the space debris which were the basis of "the UN Space Debris Mitigation Guidelines" which had been approved by the Committee on the Peaceful Uses of Outer Space(COPUOS) in its 527th meeting. On December 21 2007 this guideline was approved by UNGA Resolution 62/217. The EU has proposed an "International Code of Conduct for Outer Space Activities" as a transparency and confidence-building measure. It was only in 2010 that the Scientific and Technical Subcommittee began considering as an agenda item the long-term sustainability of outer space. A Working Group on the Long-term Sustainability of Outer Space Activities was established, the objectives of which include identifying areas of concern for the long-term sustainability of outer space activities, proposing measures that could enhance sustainability, and producing voluntary guidelines to reduce risks to long-term sustainability. By this effort "Guidelines on the Long-term Sustainability of Outer Space Activities" are being under consideration. In the case of "Declaration of Legal Principles Governing the Activities of States in the Exp1oration and Use of Outer Space" adopted by UNGA Resolution 1962(XVIII), December 13 1963, the 9 principles proclaimed in that Declaration, although all of them incorporated in the Space Treaties, could be regarded as customary international law binding all states considering the time and opinio juris by the responses of the world. Although the soft law such as resolutions, guidelines are not binding law, there are some provisions which have a fundamentally norm-creating character and customary international law. In November 12 1974 UN General Assembly recalled through a Resolution 3232(XXIX) "Review of the role of International Court of Justice" that the development of international law may be reflected, inter alia, by the declarations and resolutions of the General Assembly which may to that extend be taken into consideration by the judgements of the International Court of Justice. We are expecting COPUOS which gave birth 5 Space Treaties that it could give us binding space debris mitigation measures to be implemented based on space debris mitigation soft law in the near future.