• Title/Summary/Keyword: Core-collection

Search Result 329, Processing Time 0.026 seconds

Evaluation of Incident Detection Algorithms focused on APID, DES, DELOS and McMaster (돌발상황 검지알고리즘의 실증적 평가 (APID, DES, DELOS, McMaster를 중심으로))

  • Nam, Doo-Hee;Baek, Seung-Kirl;Kim, Sang-Gu
    • Journal of Korean Society of Transportation
    • /
    • v.22 no.7 s.78
    • /
    • pp.119-129
    • /
    • 2004
  • This paper is designed to report the results of development and validation procedures in relation to the Freeway Incident Management System (FIMS) prototype development as part of Intelligent Transportation Systems Research and Development program. The central core of the FIMS is an integration of the component parts and the modular, but the integrated system for freeway management. The whole approach has been component-orientated, with a secondary emphasis being placed on the traffic characteristics at the sites. The first action taken during the development process was the selection of the required data for each components within the existing infrastructure of Korean freeway system. After through review and analysis of vehicle detection data, the pilot site led to the utilization of different technologies in relation to the specific needs and character of the implementation. This meant that the existing system was tested in a different configuration at different sections of freeway, thereby increasing the validity and scope of the overall findings. The incident detection module has been performed according to predefined system validation specifications. The system validation specifications have identified two component data collection and analysis patterns which were outlined in the validation specifications; the on-line and off-line testing procedural frameworks. The off-line testing was achieved using asynchronous analysis, commonly in conjunction with simulation of device input data to take full advantage of the opportunity to test and calibrate the incident detection algorithms focused on APID, DES, DELOS and McMaster. The simulation was done with the use of synchronous analysis, thereby providing a means for testing the incident detection module.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Current status and prospects of molecular marker development for systematic breeding program in citrus (감귤 분자육종을 위한 분자표지 개발 현황 및 전망)

  • Kim, Ho Bang;Kim, Jae Joon;Oh, Chang Jae;Yun, Su-Hyun;Song, Kwan Jeong
    • Journal of Plant Biotechnology
    • /
    • v.43 no.3
    • /
    • pp.261-271
    • /
    • 2016
  • Citrus is an economically important fruit crop widely growing worldwide. However, citrus production largely depends on natural hybrid selection and bud sport mutation. Unique botanical features including long juvenility, polyembryony, and QTL that controls major agronomic traits can hinder the development of superior variety by conventional breeding. Diverse factors including drastic changes of citrus production environment due to global warming and changes in market trends require systematic molecular breeding program for early selection of elite candidates with target traits, sustainable production of high quality fruits, cultivar diversification, and cost-effective breeding. Since the construction of the first genetic linkage map using isozymes, citrus scientists have constructed linkage maps using various DNA-based markers and developed molecular markers related to biotic and abiotic stresses, polyembryony, fruit coloration, seedlessness, male sterility, acidless, morphology, fruit quality, seed number, yield, early fruit setting traits, and QTL mapping on genetic maps. Genes closely related to CTV resistance and flesh color have been cloned. SSR markers for identifying zygotic and nucellar individuals will contribute to cost-effective breeding. The two high quality citrus reference genomes recently released are being efficiently used for genomics-based molecular breeding such as construction of reference linkage/physical maps and comparative genome mapping. In the near future, the development of DNA molecular markers tightly linked to various agronomic traits and the cloning of useful and/or variant genes will be accelerated through comparative genome analysis using citrus core collection and genome-wide approaches such as genotyping-by-sequencing and genome wide association study.

Life Experiences of Middle School Students from Broken Homes (결손가정 중학생의 생활경험)

  • Choe, Gee-Hyun;Chung, Yeon-Kang;Yeoum, Soon-Gyo
    • Journal of the Korean Society of School Health
    • /
    • v.10 no.2
    • /
    • pp.271-283
    • /
    • 1997
  • This study is designed for the school health education, contributing experience of life from middle school students from broken homes by describing specifically what they go through. And on this basis this study works out a grounded theory on the experience of life for middle school students from broken homes. The data was collected through a series of interviews with nine subjects singled out at each stage of research. With the permission of the subjects, the interviews were recorded and transcribed. The interviews lasted from 30 minutes up to one hour and 20 minutes. The in-depth interviewing methods and observations was used for data collection. The data was analyzed in the framework of grounded theory as mapped out by Strauss & Corbin (1990). By analyzing the materials eighty-three concepts were extracted, and they were united into 21 subordinate categories through the course of analysis. These were classified into nine precedence categories. The core category was found to be the adaptation of 'Wichookdem" or "Shrinkage". "Shrinkage" widows experienced was showed as the results "Self-reliance" and "Overcoming" through the course of generation and reaction, confrontation, and adaptation. According to the analysis findings of materials, the central phenomenon was showed as "shrinkage", the causal condition as "surprise", "Darkness", "Grudge", "Desolate", "Empty". The veins as presence of those around people and existence of support, and the meditate situation as self-support. For the strategy in solving "shrinkage", preparations of countermeasure and self-reinforcement were showed. And self-reliance and overcoming were the results. Through the contrast to the cases of ground materials, relation statements as follows were induced; (1) The weaker the suffering is, the weaker the "shrinkage" tends to be. (2) The stronger the suffering is, the stronger the "shrinkage" tends to be. (3) The more frequent and serious the suffering, the stronger the "shrinkage" tend to be. (4) The more infrequent and not serious the suffering is, the weaker the "shrinkage" tends to be. (5) The weaker the "shrinkage" is, the more self-control1ed the responses tends to be. (6) The stronger the "shrinkage" is, the more impulsive the responses tends to be. (7) The more satisfying the support is, the more self-controlled the responses to the "shrinkage" tends to be. (8) The more dissatisfying the support is, the more impulsive the responses to the "shrinkage" tends to be. (9) The more concrete the type of support is, the more self-controlled the responses to the "shrinkage" tends to be. (10) The more superficial the type of support is, the more impulsive the responses to the "shrinkage" tends to be. (11) The more self-controlled the responses are, the more self-reliant the subjects tends to be. (12) The more impulsive the responses are, the more conflict and wandering the subjects tends to be. (13) Whether the responses to the "shrinkage" express themselves in self-control or an impulse, it will be resulted in the form of either tension or pain. The following two were confirmed on the basis of repetitive relations; (1) If a subject's suffering is weak, infrequent and not serious, the "shrinkage" is weak. Also the subject's support is highly satisfying, and the support type is concrete. The responses to the "shrinkage" result in self-control which consequence is self-reliance with part. of it resulting in tension and pain. (2) If a subject's suffering is strong, frequent and serious, the "shrinkage" is strong. Also the subject's support is dissatisfying, and the support type is superficial. The responses to the "shrinkage" result in an impulsion whose consequence is wandering with part of it resulting in tension and pain. Through the results in this study, the following is to be suggested; O This research is basically aimed at analyzing the experience of the middle school students living in broken homes, for the more inclusive approach, the study for them is made systematically according to the type of their problems.

  • PDF

Ground Security Activities for Prevention of Aviation Terrorism -Centered on San Francisco International Airport of the U.S.A.- (항공테러방지를 위한 지상 보안활동 -미국 샌프란시스코국제공항을 중심으로-)

  • Kang, Maeng-Jin;Kang, Jae-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.2
    • /
    • pp.195-204
    • /
    • 2008
  • With the growth of airline management, as well as computer and IT security, the international trade in this modern society has been rapidly increasing, Along with the advancing, airplanes have become a universal means of communication. However, the complications associated with airplane safety have also been brought up as a result, the most concerning of which is terrorism. One of the main counterplans for preventing terrorism is Ground security activities the core of Ground security activities is absolute safety for passengers in both passenger terminal and freight terminal. Subastral security refers to physical protection, proximity control and 100% security search and freight guarding of the passengers' possessions, and the personnel's duties to perform such jobs are be! coming more crucial. On the other hand, Airport security check has bee n gradually developing since the 1960's, when hijacking began to take place. Although the airports have been providing more safe and comfortable services to their customers, terrorism is still happening today. When Ground security activities is minute, the users feel displeasure and discomfort, yet considering solely their convenience can brings problems in achieving safety. Since the 9.11 terror in 2001, the idea of improving and strengthening airport security was reinforced and a considerable amount of estate is being spent today for invention and application of new technology. Various nations, including the United States, have been improving their systems of security through public services; public police department is actively carrying out their duties in airports as well. In San Francisco International Airport, private police department is in charge of collection of data, national events, VIP protection, law enforcement, cooperation within facilities, daily-based patrol and traffic control. Under guidance and supervision of national organizations, such as TSA, general police department interprets X-Rays, operates metal detectors, checks passports or IDs and observes reactions to explosives. Under these circumstances, studies about advancement of cooperation and duties of general police department and private police department necessitated: especially about private police department and their training for searching equipments, decrease in number of turn over rate, invention of technology and prior settlement in estate for security. The privacy of the public, who make up the major population of airport passengers, must also be minimized. In the following research, the activities of police departments in San Francisco International Airport will be analyzed in order to understand recent actions of the United States on airport security.

Performance of Investment Strategy using Investor-specific Transaction Information and Machine Learning (투자자별 거래정보와 머신러닝을 활용한 투자전략의 성과)

  • Kim, Kyung Mock;Kim, Sun Woong;Choi, Heung Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.65-82
    • /
    • 2021
  • Stock market investors are generally split into foreign investors, institutional investors, and individual investors. Compared to individual investor groups, professional investor groups such as foreign investors have an advantage in information and financial power and, as a result, foreign investors are known to show good investment performance among market participants. The purpose of this study is to propose an investment strategy that combines investor-specific transaction information and machine learning, and to analyze the portfolio investment performance of the proposed model using actual stock price and investor-specific transaction data. The Korea Exchange offers daily information on the volume of purchase and sale of each investor to securities firms. We developed a data collection program in C# programming language using an API provided by Daishin Securities Cybosplus, and collected 151 out of 200 KOSPI stocks with daily opening price, closing price and investor-specific net purchase data from January 2, 2007 to July 31, 2017. The self-organizing map model is an artificial neural network that performs clustering by unsupervised learning and has been introduced by Teuvo Kohonen since 1984. We implement competition among intra-surface artificial neurons, and all connections are non-recursive artificial neural networks that go from bottom to top. It can also be expanded to multiple layers, although many fault layers are commonly used. Linear functions are used by active functions of artificial nerve cells, and learning rules use Instar rules as well as general competitive learning. The core of the backpropagation model is the model that performs classification by supervised learning as an artificial neural network. We grouped and transformed investor-specific transaction volume data to learn backpropagation models through the self-organizing map model of artificial neural networks. As a result of the estimation of verification data through training, the portfolios were rebalanced monthly. For performance analysis, a passive portfolio was designated and the KOSPI 200 and KOSPI index returns for proxies on market returns were also obtained. Performance analysis was conducted using the equally-weighted portfolio return, compound interest rate, annual return, Maximum Draw Down, standard deviation, and Sharpe Ratio. Buy and hold returns of the top 10 market capitalization stocks are designated as a benchmark. Buy and hold strategy is the best strategy under the efficient market hypothesis. The prediction rate of learning data using backpropagation model was significantly high at 96.61%, while the prediction rate of verification data was also relatively high in the results of the 57.1% verification data. The performance evaluation of self-organizing map grouping can be determined as a result of a backpropagation model. This is because if the grouping results of the self-organizing map model had been poor, the learning results of the backpropagation model would have been poor. In this way, the performance assessment of machine learning is judged to be better learned than previous studies. Our portfolio doubled the return on the benchmark and performed better than the market returns on the KOSPI and KOSPI 200 indexes. In contrast to the benchmark, the MDD and standard deviation for portfolio risk indicators also showed better results. The Sharpe Ratio performed higher than benchmarks and stock market indexes. Through this, we presented the direction of portfolio composition program using machine learning and investor-specific transaction information and showed that it can be used to develop programs for real stock investment. The return is the result of monthly portfolio composition and asset rebalancing to the same proportion. Better outcomes are predicted when forming a monthly portfolio if the system is enforced by rebalancing the suggested stocks continuously without selling and re-buying it. Therefore, real transactions appear to be relevant.

A Study on the Success Factors of Co-Founding Start-up by Step: Focusing on the Case of Opportunity-type Start-up (공동창업의 단계별 성공요인에 관한 연구: 기회형 창업기업 사례를 중심으로)

  • Yun, Seong Man;Sung, Chang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.1
    • /
    • pp.141-158
    • /
    • 2023
  • From the perspective of an entrepreneur, one of the most important factors for understanding the inherent limitations of a startup, reducing the risk of failure, and succeeding is the composition of the talent, that is, the founding team. Therefore, a common concern experienced by entrepreneurs in the pre-entrepreneurship stage or the early stage of startup is the choice between independent startups and co-founding start-up. Nonetheless, in Korea, the share of independent entrepreneurship is significantly higher than that of co-founding start-up. On the other hand, focusing on the fact that many successful global innovative companies are in the form of co-founding start-up, the success factors of co-founding start-up were examined. Most of the related preceding studies are studies that identify the capabilities and characteristics of individual entrepreneurs as factors influencing the survival and success of entrepreneurship, and there is a lack of research on partnerships, that is, co-founding start-up, which are common in the field of entrepreneurship ecosystems. Therefore, this study attempted a multi-case study through in-depth interviews, collection of relevant data, analysis of contextual information, and consideration of previous studies targeting co-founders of domestic startups that succeeded in opportunistic startups. Through this, a model for deriving the phased characteristics and key success factors of co-founding start-up was proposed. As a result of the study, the key element of the preliminary start-up stage was 'opportunity', and the success factors were 'opportunity recognition through entrepreneur's experience' and 'idea development'. The key element in the early stages of start-up is "start-up team," and the success factor is "trust and complement of start-up team," and synergy is shown when "diversity and homogeneity of start-up team" are harmonized. In addition, conflicts between co-founders may occur in the early stages of start-ups, which has a large impact on the survival of start-ups. The conflict between the start-up team could be overcome through constant "mutual understanding and respect through communication" and "clear division of work and role sharing." It was confirmed that the core element of the start-up growth stage was 'resources', and 'securing excellent talent' and 'raising external funds' were important factors for success. These results are expected to overcome the limitations of start-up companies, such as limited resources, lack of experience, and risk of failure, in entrepreneurship studies, and prospective entrepreneurs preparing for a start-up in a situation where the form of co-founding start-up is attracting attention as one of the alternatives to increase the success rate. It has implications for various stakeholders in the entrepreneurial ecosystem.

  • PDF

A Study on the Various Attributes of E-Sport Influencing Flow and Identification (e-스포츠의 다양한 속성이 유동(flow)과 동일시에 미치는 영향에 관한 연구)

  • Suh, Mun-Shik;Ahn, Jin-Woo;Kim, Eun-Young;Um, Seong-Won
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.1
    • /
    • pp.59-80
    • /
    • 2008
  • Recently, e-sports are growing with potentiality as a new industry with conspicuous profit model. But studies that dealing with e-sports are not enough. Hence, proposes of this paper are both to establish basic model that is for the design of e-sport marketing strategy and to contribute toward future studies which are related to e-sports. Recently, the researches to explain sports-sponsorship through the identification theory have been discovered. Many researches say that somewhat proper identification is a requirement for most sponsors to improve the their images which is essential to sponsorship activity. Consequently, the research for sponsorship associated with identification in the e-sports, not in the physical sports is the core sector of this study. We extracted the variables from online's major characteristics and existing sport sponsorship researches. First, because e-sports mean the tournaments or leagues in the use of online game, the main event of the game is likely to call it online game. Online media's attributes are distinguished from those of offline. Especially, interactivity, anonymity, and expandibility as a e-sport game attributes are able to be mentioned. So, these inherent online attributes are examined on the relationship with flow. Second, in physical sports games, Fisher(1998) revealed that team similarity and team attractivity were positively related to team identification. Wann(1996) said that the result of former game influenced the evaluation of the next game, then in turn has an effect on the identification of team supporters. Considering these results in the e-sports side, e-sports gamer' attractivity, similarity, and match result seem to be important precedent variables of the identification with a gamer. So, these e-sport gamer attributes are examined on the relationship with both flow and identification with a gamer. Csikszentmihalyi(1988) defined the term flow as feeling status for him to be making current positive experience optimally. Hoffman and Novak(1996) also said that if a user experienced the flow he would visit a website without any reward. Therefore flow might be positively associated with user's identification with a gamer. And, Swanson(2003) disclosed that team identification influenced the positive results of sponsorship, which included attitude toward sponsors, sponsor patronage, and satisfaction with sponsors. That is, identification with a gamer expect to be connected with corporation identification significantly. According to the above, we can design the following research model. All variables used in this study(interactivity, anonymity, expandibility, attractivity, similarity, match result, flow, identification with a gamer, and identification with a sponsor) definitely were defined operationally underlying precedent researches. Sample collection was carried out to the person who has an experience to have enjoyed e-sports during June 2006. Much portion of samples is men because much more men than women enjoy e-sports in general. Two-step approach was used to test the hypotheses. First, confirmatory factor analysis was committed to guarantee the validity and reliability of variables. The results showed that all variables had not only intensive and discriminant validity, but also reliability. Then, research model was examined with fully structural equation using LISREL 8.3 version. The fitness of the suggested model mostly was at the acceptable level. Shortly speaking about the results, first of all, in e-sports game attributes, only interactivity which is called a basic feature in online situation affected flow positively. Secondly, in e-sports gamer's attributes, similarity with a gamer and match result influenced flow positively, but there was no significant effect in the relationship between the attractivity of a gamer and flow. And as expected, similarity had an effect on identification with a gamer significantly. But unexpectedly attractivity and match result did not influence identification with a gamer significantly. Just the same as the fact verified in the many precedent researches, flow greatly influenced identification with a gamer, and identification with a gamer continually had an influence on the identification with a sponsor significantly. There are some implications in these results. If the sponsor of e-sports supports the pro-game player who absolutely should have the superior ability to others and is similar to the user enjoying e-sports, many amateur gamers will feel much of the flow and identification with a pro-gamer, and then after all, feel the identification with a sponsor. Such identification with a sponsor leads people enjoying e-sports to have purchasing intention for products produced by the sponsor and to make a positive word-of-mouth for those products or the sponsor. For the future studies, we recommend a few ideas. Based on the results of this study, it is necessary to find new variables relating to the e-sports, which is not mentioned in this study. For this work to be possible, qualitative research seems to be needed to consider the inherent e-sport attributes. Finally, to generalize the results related to e-sports, a wide range of generations not a specific generation should be researched.

  • PDF

An Examination into the Illegal Trade of Cultural Properties (문화재(文化財)의 국제적 불법 거래(不法 去來)에 관한 고찰)

  • Cho, Boo-Keun
    • Korean Journal of Heritage: History & Science
    • /
    • v.37
    • /
    • pp.371-405
    • /
    • 2004
  • International circulation of cultural assets involves numerous countries thereby making an approach based on international law essential to resolving this problem. Since the end of the $2^{nd}$ World War, as the value of cultural assets evolved from material value to moral and ethical values, with emphasis on establishing national identities, newly independent nations and former colonial states took issue with ownership of cultural assets which led to the need for international cooperation and statutory provisions for the return of cultural assets. UNESCO's 1954 "Convention for the Protection of Cultural Property in the Event of Armed Conflict" as preparatory measures for the protection of cultural assets, the 1970 "Convention on the Means of Prohibiting and Preventing the Illicit Import and Transfer of Ownership of Cultural Property" to regulate transfer of cultural assets, and the 1995 "Unidroit Convention on Stolen or Illegally Exported Cultural Objects" which required the return of illegally acquired cultural property are examples of international agreements established on illegal transfers of cultural assets. In addition, the UN agency UNESCO established the Division of Cultural Heritage to oversee cultural assets related matters, and the UN since its 1973 resolution 3187, has continued to demonstrate interest in protection of cultural assets. The resolution 3187 affirms the return of cultural assets to the country of origin, advises on preventing illegal transfers of works of art and cultural assets, advises cataloguing cultural assets within the respective countries and, conclusively, recommends becoming a member of UNESCO, composing a forum for international cooperation. Differences in defining cultural assets pose a limitation on international agreements. While the 1954 Convention states that cultural assets are not limited to movable property and includes immovable property, the 1970 Convention's objective of 'Prohibiting and preventing the illicit import, export and transfer of ownership of cultural property' effectively limits the subject to tangible movable cultural property. The 1995 Convention also has tangible movable cultural property as its subject. On this point, the two conventions demonstrate distinction from the 1954 Convention and the 1972 Convention that focuses on immovable cultural property and natural property. The disparity in defining cultural property is due to the object and purpose of the convention and does not reflect an inherent divergence. In the case of Korea, beginning with the 1866 French invasion, 36 years of Japanese colonial rule, military rule and period of economic development caused outflow of numerous cultural assets to foreign countries. Of course, it is neither possible nor necessary to have all of these cultural properties returned, but among those that have significant value in establishing cultural and historical identity or those that have been taken symbolically as a demonstration of occupational rule can cause issues in their return. In these cases, the 1954 Convention and the ratification of the first legislation must be actively considered. In the return of cultural property, if the illicit acquisition is the core issue, it is a simple matter of following the international accords, while if it rises to the level of diplomatic discussions, it will become a political issue. In that case, the country requesting the return must convince the counterpart country. Realizing a response to the earnest need for preventing illicit trading of cultural assets will require extensive national and civic societal efforts in the East Asian area to overcome its current deficiencies. The most effective way to prevent illicit trading of cultural property is rapid circulation of information between Interpol member countries, which will require development of an internet based communication system as well as more effective deployment of legislation to prevent trading of illicitly acquired cultural property, subscription to international conventions and cataloguing collections.