Korea follows the slope design criteria during construction. It was enacted by the Ministry of Land, Transport and Maritime Affairs. There are cases where the Soil-nail is designed as a measure to secure slope stability. The arrangement of the soil-nail may be arranged at equal intervals or may be arranged differently depending on the soil failure model. The optimum design of the countermeasure method is determined by securing stability of the slope through optimization of dimensions and shape. However, when uniform nails are placed at low elevations in slopes, the standard safety factor is exceeded, which may hinder economic design. It is preferable to arrange the reinforcement of the nails over the entire slope. When the horizontal spacing of the nails was topology optimized according to the slope height, it was possible to minimize the amount of reinforcement while satisfying the standard safety factor. Since the active load is reduced in the section where the slope height is lowered, the safety factor after reinforcement may be excessively increased. Therefore, the phase optimization method is proposed as an economical optimal design method using the reinforcing shape density. In addition, a relational expression was designed to optimize the horizontal spacing by slope height.
Journal of the Korean Society of Marine Environment & Safety
/
v.27
no.2
/
pp.324-339
/
2021
In this study, we determined the correlation between the wave characteristics and the change in the area of Haeundae Beach, conducted regression analysis between the wave characteristics and the change in beach area, and derived a formula for calculating the change in beach area. The change in beach area was calculated by applying the derived formula to wave observation data corresponding to a period of approximately 10 months, and the formula was subsequently validated by comparing the obtained results with the observed area. It is found that the error associated with the formula for calculating the change in beach area ranges from 1.5 m to 2.7 m based on the average beach width, and the correlation coefficient corresponding to the observed area ranges from 0.91 to 0.94. Furthermore, it is observed that the change in beach area is af ected by the wave direction in the western zone, wave height in the central zone, and wave height and wave period in the eastern zone. These results can contribute to understanding the impact of a coastal improvement project on the beach area fluctuation characteristics of Haeundae Beach and the ef ectiveness of such a coastal improvement project. By applying the aforementioned derived formula to highly accurate wave prediction data, the change in beach area can be calculated and incorporated for predicting significant long-term changes in beach areas. Furthermore, such a prediction can be considered as the basis for making decisions while establishing preemptive countermeasure policies to prevent coastal erosion.
Journal of Korean Library and Information Science Society
/
v.51
no.4
/
pp.185-210
/
2020
The library faced an unexpected crisis of COVID-19, and as a countermeasure strategy, non-face-to-face online service has been reinforced. Therefore, this study attempted to present a plan to overcome the challenges arising from rapidly changing external environment and current crisis. To this end, data search, electronic library, library service, cultural event and open space management status of 288 public libraries serviced as an integrated site were investigated. Based on this, the meaning of online services in the post-COVID-19 era and the implication of it were examined. As a result, first, the increase in the use rate of online data search services with the spread of non-face-to-face culture, second, the expansion of the services of the electronic library, third, the diversification of non-face-to-face, online services, fourth, expansion of online cultural event services, fifth, the diversification of open space services were proposed, sixth, Introduced an artificial intelligence system for unattended loan return based on access and the Seventh, expansion of experiential cultural support services and educational contents through VR, AR and MR. It is deemed necessary for the research on the future direction of the library's non-face-to-face services to be conducted by investigating the current status of online services in various types of libraries and the types and case studies of library services in the era of COVID-19.
The Journal of the Convergence on Culture Technology
/
v.9
no.2
/
pp.227-233
/
2023
Along with the 4th Industrial Revolution, the impact of "unmanned" is affecting all fields around the world, and in particular, in the military sector, "unmanned" is so important that it occupies a part of the main combat system. Recently, the South Korean military is facing a crisis due to the North Korea's UAV incident that invaded our airspace and descended to Seoul. In response, the South Korea military declared its willingness and countermeasures to capture and destroy North Korea's UAV. However, as the technological development of UAV continues and the utilization plan is expanding, the countermeasures for UAV at the current level can be useless. Also, the threat from North Korea is not just UAV. North Korea has practically a nuclear power and is set to conduct its seventh nuclear test, and its missile technology is also being advanced, with 38 arounds of 67 missile tests conducted in 2022 alone. It is also developing five key strategic weapons that can pose a fatal threat to Korea, and North Korea's strong conventional forces are located around the NLL(Northern Limit Line), and the port of Long Range Artillery is facing the Seoul metropolitan area. It is important to respond to North Korea's UAV threats, which are now receiving much attention, but it will be necessary to comprehensively analyze and clearly prioritize North Korea's threats and use a limited budget to respond to them.
KSCE Journal of Civil and Environmental Engineering Research
/
v.28
no.3B
/
pp.315-321
/
2008
Recently, in the light of environments and utilization, countermeasures to preserve beaches in coastal area are required without depending on such as jetties and breakwaters. The necessity of integrated sand management including not only coastal sediment but also sediment discharge from hinterland rivers is increased so as to establish long-term counterplan for sediment transport. In this regard, the following subjects are examined in this study; efficient ways for discharged sand to be transported from a river to the neighboring coast, the river terrace occurrence and its growth at the river delta, measures to improve storage efficiency of the discharged sand and measures to prevent the sand resources from being discharged into the deep sea during flooding. In recent, A jetty of 260 m length was constructed at Namdae River mouth in the year of 2005 as a countermeasure against the occurrence of sand-bar at river mouth and its close. In this study, a series of numerical experiments were carried out to investigate the characteristics of sediment transport and morphological change due to the construction of jetty at the entrance of Namdae River mouth. Firstly, The sand discharge from Namdae River is quantified by one-dimensional numerical analysis assuming the mixed sand of three different particle diameters. Then, in order to understand the transport behavior of the sand discharge from river and river mouth phenomena the numerical experiments were then conducted to examine the flow behaviors of river efflux and wind generated circulations in coastal area. And, after establishing the numerical model system, which predicts the sea bed changes obtained from the flux model combining with the wave propagation, wave-induced currents and sediment transport models, the sediment transport in the vicinity of Namdae River mouth is analyzed.
Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.
User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.
Background: It is necessary to consider the overall countermeasure for analysis of nuclear activities according to the increase of the nuclear facilities like nuclear power and reprocessing plants in the neighboring countries including China, Taiwan, North Korea, Japan and South Korea. South Korea and comprehensive nuclear-test-ban treaty organization (CTBTO) are now operating the monitoring instruments to detect radionuclides released into the air. It is important to estimate the origin of radionuclides measured using the detection technology as well as the monitoring analysis in aspects of investigation and security of the nuclear activities in neighboring countries. Materials and methods: A three-dimensional forward/backward trajectory model has been developed to estimate the origin of radionuclides for a covert nuclear activity. The developed trajectory model was composed of forward and backward modules to track the particle positions using finite difference method. Results and discussion: A three-dimensional trajectory model was validated using the measured data at Chernobyl accident. The calculated results showed a good agreement by using the high concentration measurements and the locations where was near a release point. The three-dimensional trajectory model had some uncertainty according to the release time, release height and time interval of the trajectory at each release points. An atmospheric dispersion model called long-range accident dose assessment system (LADAS), based on the fields of regards (FOR) technique, was applied to reduce the uncertainties of the trajectory model and to improve the detective technology for estimating the radioisotopes emission area. Conclusion: The detective technology developed in this study can evaluate in release area and origin for covert nuclear activities based on measured radioisotopes at monitoring stations, and it might play critical tool to improve the ability of the nuclear safety field.
Journal of Korean Tunnelling and Underground Space Association
/
v.22
no.4
/
pp.347-365
/
2020
In order to resolve traffic problems in urban areas and to increase the area of green spaces, tunnels in downtown areas are being increased. Additionally, the application of large port smoke extraction ventilation systems is increasing as a countermeasure to smoke extraction ventilation for tunnels with high potential for traffic congestion. It is known that the smoke extraction performance of the large port smoke extraction system is influenced not only by the amount of the extraction flow rate, but also by various factors such as the shape of the extraction port (damper) and the extraction air velocity through a damper. Therefore, in this study, the design standards and installation status of each country were investigated. When the extraction air flow rate was the same, the smoke extraction performance according to the size of the damper was numerically simulated in terms of smoke propagation distance, compared and evaluated, and the following results were obtained. As the cross-sectional area of the smoke damper increases, the extraction flow rate is concentrated in the damper close to the extraction fan, and the smoke extraction rate of the damper in downstream decreases, thereby increasing the smoke propagation distance on the downstream side. In order to prevent such a phenomenon, it is necessary to reduce the cross-sectional area of the smoke damper and increase the velocity of passing air through the damper so that the pressure loss passing through the damper increases, thereby reducing the non-uniformity of smoke extraction flow rate in the extraction section. In this analysis, it was found that when the interval distance of the extraction damper was 50 m, the air velocity passing through damper was 4.4 m/s or more, and when the interval distance of the extraction dampers was 100 m, the air velocity passing through damper was greater than 4.84 m/s, it was found to be advantageous to ensure smoke extraction performance.
Journal of Korea Entertainment Industry Association
/
v.15
no.4
/
pp.337-347
/
2021
This study is a qualitative study conducted to provide basic data for therapists working in long-term care hospitals to improve their countermeasure strategies for new infectious diseases and improvement of the treatment room infection management system, and to help therapists understand their infection management work. Colaizzi's phenomenological research method was applied as the research method. Telephone interviews were conducted with nine occupational therapists and physical therapists working in nursing hospitals. The contents of the interview were recorded with the consent of the study subjects, and additional confirmation was received by email. The recorded content was analyzed after transcription, and the meaning and nature of the experience coping with COVID-19 were described. The content was organized into 6 themes, 17 main meaning and 49 meaning units. In accordance with the COVID-19 situation, the infection control system has been strengthened by reinforcing infection control education in nursing hospitals, practicing infection control, and supervising infection control outside business hours. It was found that the treatment environment was changed due to the restriction of treatment activities by practicing distancing in the treatment room, adjusting rest and meal times during working hours, and strengthening infection control. In addition, the therapist's role has been expanded and the paradigm of treatment has changed, such as considering the untact intervention, and they have experienced cohort quarantine, pre-tested for COVID-19, vaccinations, and side effects from COVID-19. However, due to the infection work, the therapist's work burden is increased, and the person is experiencing fear, depression, and work stress from the spread of COVID-19. They were also aware of the need for nursing hospital care personnel support, such as guaranteeing rest after vaccination and providing infection control tools and equipment. The results of this study are expected to be used as basic data for human and physical support for the development of infectious disease response strategy programs in nursing hospital treatment rooms and for infection control in nursing hospitals.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.