• Title/Summary/Keyword: Hard Law

Search Result 172, Processing Time 0.028 seconds

A study on legal service of AI

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.7
    • /
    • pp.105-111
    • /
    • 2018
  • Last March, the world Go competition between AlphaGo, AI Go program developed by Google Deep Mind and professional Go player Lee Sedol has shown us that the 4th industrial revolution using AI has come close. Especially, there ar many system combined with AI hae been developing including program for researching legal information, system for expecting jurisdiction, and processing big data, there is saying that even AI legal person is ready for its appearance. As legal field is mostly based on text-based document, such characteristic makes it easier to adopt artificial intelligence technology. When a legal person receives a case, the first thing to do is searching for legal information and judical precedent, which is the one of the strength of AI. It is very difficult for a human being to utilize a flow of legal knowledge and figures by analyzing them but for AI, this is nothing but a simple job. The ability of AI searching for regulation, precedent, and literature related to legal issue is way over our expectation. AI is evaluated to be able to review 1 billion pages of legal document per second and many people agree that lot of legal job will be replaced by AI. Along with development of AI service, legal service is becoming more advanced and if it devotes to ethical solving of legal issues, which is the final goal, not only the legal field but also it will help to gain nation's trust. If nations start to trust the legal service, it would never be completely replaced by AI. What is more, if it keeps offering advanced, ethical, and quick legal service, value of law devoting to the society will increase and finally, will make contribution to the nation. In this time where we have to compete with AI, we should try hard to increase value of traditional legal service provided by human. In the future, priority of good legal person will be his/her ability to use AI. The only field left to human will be understanding and recovering emotion of human caused by legal problem, which cannot be done by AI's controlling function. Then, what would be the attitude of legal people in this period? It would be to learn the new technology and applying in the field rather than going against it, this will be the way to survive in this new AI period.

Worsening Tension Between the United States and China in the South China Sea, A Sign of 'Thucydides Trap'? (미(美) Lassen 함(艦)의 남중국해(南中國海) 기동(機動)은 '투키디데스 함정'의 전조(前兆)?)

  • Yang, Jeong-Sung
    • Strategy21
    • /
    • s.38
    • /
    • pp.287-320
    • /
    • 2015
  • On October 27, 2015, USS Lassen(DDG82), a 9,200 ton class Aegis destroyer of the United States Navy, began its operations within 12 nautical miles of Subi Reef, one of the seven artificial islands that China has built and claimed sovereignty over. The maneuver was joined by anti-submarine patrol airplanes such as P-8A and P-3. The White House press secretary mentioned that the President of the United States approved the operation. In response, China announced that it warned the US Navy ship about the 'illegal violation' by sending two destroyers(PLAN Lanzhou and Taizhou). This event represents a close call case where tension between the United States and China in the South China Sea might have been elevated to a conflict between the two navies. Moreover, considering that this happened only one month after Chinese president Xi's state visit to the United States, the event shows that the positions of the two countries have become starkly different to the extent that they are so hard to be reconciled. The United States' position is different from those of Vietnam and the Philippines. Countries like Vietnam and the Philippines have been directly involved in disputes with regard to sovereignty claims across the waters in the South China sea. As for the United States, being a third party in the disputes, it still cannot be a by-stander watching the whole waters in the region fall under the influence of China. Accordingly, the United States maintains that all countries bear the rights of innocent passage and military operations in the Exclusive Economic Zones(EEZ) as stipulated by the United Nations Convention on the Law of the Sea(UNCLOS). In contrast, China claims that, historically, the South China sea has been part of China's territorial waters, and that foreign countries are not allowed to conduct military operations within the waters. It strongly accuses that such military operations are illegal. Against this background, this paper tracks the different positions of the United States and China on the issues regarding the South China sea. It also carefully looks at the possibility that, in the process of dealing with the issues, the two countries may get into an armed conflict as the phrase 'Thucydides Trap' predicts.

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

Efficacy Evaluation of Anti-wrinkle Products in Japan

  • Masaki Hitoshi
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.29 no.2 s.43
    • /
    • pp.67-77
    • /
    • 2003
  • Two categories of cosmetic products, cosmetics and quasi-drugs, have been established by the Ministry of Health, Labor and Welfare (MHLW) in Japan. Japanese pharmaceutical law has defined that products categorized as cosmetics do not exhibit any effects on human skin. In fact, cosmetic products are not permitted to claim any efficacy. On the other hand, products in the quasi-drug category can claim several efficacies such as anti-inflammatory effects, whitening/lightning effects, hair growth effects and so on. Unfortunately, the Japanese MHLW has not yet approved the efficacy of anti-aging/anti-wrinkle effects as a claim point. However, the population is aging, and the demand for anti-aging/anti-wrinkle products is increasing year by year. Japanese cosmetic companies have proposed to the MHLW that anti-aging/anti-wrinkle agents be approved as a claim concept of a quasi-drug. However, unified evaluation methods for anti-aging/anti-wrinkle effects have not been established. Currently, each company evaluates the efficacy of products/materials using their own original methods. Thus, to request approval of the MHLW, the establishment of a unified evaluation method is needed. Consequently, the Japan Cosmetic Industry Association (JCIA) has established a task force to develop guidelines for evaluating anti-wrinkle effects in 1998. In conclusion, the JCIA would like to adopt visual and image analysis scales to evaluate the anti-wrinkle effects objectively. Generally, wrinkles are roughly classified into three groups as fine wrinkles, linear deep wrinkles and crow's feet. However, academic societies of dermatology or cosmetics have not yet established a definition of wrinkles in Japan. Thus, in advance of setting up an evaluation method, the definition of wrinkles f3r evaluation must be decided. Wrinkles are defined by the task force of the JCIA as follows; furrows that people can recognize visually and that appear on the forehead, the corners of the eyes and the backs of the neck with aging. In addition, furrows are emphasized by exposure to solar light and by dry conditions. Visual evaluation is the most sensitive method and can be applied to most types of wrinkles. However, visual evaluation is hard to express digitally as results. Besides, in the case of image analysis, comparisons of data obtained from distinct examinations can not be done, because data from image analysis are relative values. Thus, to enhance the reliability of the evaluations, the adoption of an objective scale was required. The principle of the evaluation method is to analyze images taken from silicone replicas of wrinkle areas using several parameters, such as the proportion of the wrinkle $area({\%})$, the mean depth of the wrinkles (mm), the mean depth of the deepest wrinkle (m) and the deepest point on the deepest wrinkle. Lights are shown on the skin replica from an orthogonal direction of the main orientation of the wrinkle, and the resulting shadow images are quantified by the image analysis method. To increase the precision of the data or to allow comparisons of independent examinations, a scale with furrows of several depths, 200, 400, 600, 800, and $1000{\mu}m$, is adapted in the evaluation system. I will explain the guidelines established by the JCIA in the presentation.

Characteristics of Marriage Immigrants' Acculturation Stage and the Source of Support: With an Emphasis on Filipino Marriage Immigrants' Family Life Culture in Korea (결혼이주여성의 한국가정생활 문화적응 단계별 특성 -필리핀 결혼이주여성을 중심으로-)

  • Hong, Dal-Ah-Gi;Chae, Ock-Hi;Han, Eun-Jin;Song, Bok-Hee
    • Journal of Family Resource Management and Policy Review
    • /
    • v.16 no.4
    • /
    • pp.1-22
    • /
    • 2012
  • The purpose of this study is to determine the characteristics of Filipino marriage immigrants' acculturation stages in regards to their Korean family life culture and to identify the source of the support for each stage, hence to provide information for educational programs that would promote successful acculturation for each stage. The following findings have been obtained through in-depth interviews with 18 female Filipino immigrants to Korea. In a range of obstacles from the Honeymoon Stage to the Confusion stage, the first are the language and the aspects of the food/cooking/ingredients/diet that are different from their own culture. Especially, pregnancy/childbirth is a major change in one's life and the biggest challenge in the acculturation process. As food and cooking are the first change that the immigrants have to face and get accustomed to in the early stage of their Korean life, the food culture is rather easier for the immigrants to get accustomed to than other parts of Korean life. From the Honeymoon Stage to the Harmony Stage, the immigrants make efforts to help their family in the home, while they look to their future in their children during the Autonomy Stage. Regardless of how long they have been in Korea, from the Honeymoon Stage to the Autonomy Stage, the immigrants have a hard time with the patriarchal environment in Korea due to the bilateral nature of kinship in the Philippines. Secondly, the immigrants receive the most support from their husband, family, and the tutors in Korean culture, while their mothers-in-law are the main source of the support for the Korean diet. At the Confusion Stage, the immigrants start visiting the regional multicultural family support centers and get help from the friends they meet there while depending on the TV for cooking tips. From the Harmony Stage, they may seek a job through the community network with their own effort and their children's help. In the Autonomy Stage, they are concerned about their children rather than their own parents, and they find their own identity as a Korean and realize that their effort is important.

  • PDF

A Study of Field Application Process of Public Key Algorithm RSA Based on Mathematical Principles and Characteristics through a Diagnostic (수학원리와 특성 진단을 기반으로 한 공개키 RSA 알고리즘의 현장 적용 프로세스)

  • Noh, SiChoon;Song, EunJee;Moon, SongChul
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.71-81
    • /
    • 2015
  • The RSA public key encryption algorithm, a few, key generation, factoring, the Euler function, key setup, a joint expression law, the application process are serial indexes. The foundation of such algorithms are mathematical principles. The first concept from mathematics principle is applied from how to obtain a minority. It is to obtain a product of two very large prime numbers, but readily tracking station the original two prime number, the product are used in a very hard principles. If a very large prime numbers p and q to obtain, then the product is the two $n=p{\times}q$ easy station, a method for tracking the number of p and q from n synthesis and it is substantially impossible. The RSA encryption algorithm, the number of digits in order to implement the inverse calculation is difficult mathematical one-way function and uses the integer factorization problem of a large amount. Factoring the concept of the calculation of the mod is difficult to use in addition to the problem in the reverse direction. But the interests of the encryption algorithm implementation usually are focused on introducing the film the first time you use encryption algorithm but we have to know how to go through some process applied to the field work This study presents a field force applied encryption process scheme based on public key algorithms attribute diagnosis.

Discussion on Chilgeojiak and Discourse of Married Couples in Okhwangibong (<옥환기봉>에 나타난 칠거지악 논쟁과 부부 담론)

  • Park, Eun-jeong
    • Journal of Korean Classical Literature and Education
    • /
    • no.39
    • /
    • pp.99-135
    • /
    • 2018
  • This study aims at examining the discussions of Chilgeojiak, meaning seven vices that can be valid causes of divorce, and the discourse on a married couple shown in the deposal of Empress Kwak in Okhwangibong. The study first analyzes the relationship between the incidents of expelling wives from homes in the Joseon Dynasty Era and the seven vices. The divorce of Yi Mi and Shin Taeyeong and the deposal of Queen Yun by King Seongjong show that the standards of judgement in most of the seven vices are unclear or controversial. In Okhwangibong, the arguments about Chilgeojiak are examined through the form of a novel with the expulsion of Empress Kwak. Empress Kwak was deposed by her husband, Emperor Kwangmu, due to jealousy and evil deeds. However, she was devoted to her parents-in-law, bore sons, and above all, she was the emperor's first wife and had gone through hard times and supported her husband. Considering these circumstances, her deposal is not quite agreeable. Readers have the same question, and this has become a cause of the creation of a series. The reasons for Empress Kwak's jealousy lie in Okhwan-a jade ring, the existence of Empress Eum, and the partial love of Emperor Kwangmu. That is, it is not Empress Kwak's fault. Additionally, unrealistic elements involved in Empress Kwak's evil deeds and the story structure focused on her work as factors that make readers support Empress Kwak. Therefore, Okhwangibong displays the realities regarding the discourse of husbands and wives of the era rather than the love in Okhwan, the jade ring, between Emperor Kwangmu and Empress Eum. Such understanding continues to exist in the following series and is a valid problem in the present time.

A Study on Detection Technique of Anomaly Signal for Financial Loan Fraud Based on Social Network Analysis (소셜 네트워크 분석 기반의 금융회사 불법대출 이상징후 탐지기법에 관한 연구)

  • Wi, Choong-Ki;Kim, Hyoung-Joong;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.851-868
    • /
    • 2012
  • After the financial crisis in 2008, the financial market still seems to be unstable with expanding the insolvency of the financial companies' real estate project financing loan in the aftermath of the lasted real estate recession. Especially after the illegal actions of people's financial institutions disclosed, while increased the anxiety of economic subjects about financial markets and weighted in the confusion of financial markets, the potential risk for the overall national economy is increasing. Thus as economic recession prolongs, the people's financial institutions having a weak profit structure and financing ability commit illegal acts in a variety of ways in order to conceal insolvent assets. Especially it is hard to find the loans of shareholder and the same borrower sharing credit risk in advance because most of them usually use a third-party's name bank account. Therefore, in order to effectively detect the fraud under other's name, it is necessary to analyze by clustering the borrowers high-related to a particular borrower through an analysis of association between the whole borrowers. In this paper, we introduce Analysis Techniques for detecting financial loan frauds in advance through an analysis of association between the whole borrowers by extending SNA(social network analysis) which is being studied by focused on sociology recently to the forensic accounting field of the financial frauds. Also this technique introduced in this pager will be very useful to regulatory authorities or law enforcement agencies at the field inspection or investigation.

Self-Disclosure and Confidential Responsibility of Professor Regarding Employee Invention (직무발명에 대한 교수의 자기 공개와 비밀유지 의무에 관한 연구)

  • Na, Dong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.752-758
    • /
    • 2020
  • A professor is an employed as a member of a college, and his invention is transferred to the Industry-Academic Cooperation Foundation (IACF). A professor often reveals his inventions in a thesis or at a symposium before the IACF applies for a patent. Such self-disclosure could be in violation of the confidential responsibility. This study analyzes the number of patent invalidation trials as well as self-revealed patent applications raised in connection with the confidential responsibility. This study also scrutinizes cases to figure out whether the confidential responsibility was breached depending on the time of the self-disclosure both before and after the succession of an invention. In addition, side effects that could accompany self-disclosure are investigated. In the case of the self-disclosure by the professor, an invention to which the college belongs fails to secure patent right or it is hard to obtain comprehensive right. Even if rights were secured, it could be invalidated. Furthermore, they could infringe the confidential responsibility of employees under the Invention Promotion Act, and also could contravene the confidential responsibility specified by the Enforcement Decree of the unfair Competition Prevention if the succession of the invention is confirmed. Therefore, colleges should manage self-disclosure of employee invention and take appropriate action.

Establishment Method of the Regulatory Framework for Communications Reflecting the Ecosystem Elements (생태계 요소를 반영한 방송통신 규제체계의 정립 방안)

  • Hong, Dae-Sik;Choe, Dong-Uk
    • Journal of Legislation Research
    • /
    • no.41
    • /
    • pp.401-434
    • /
    • 2011
  • The discussion on the adoption of the horizontal regulatory framework is underway to overcome the problems regarding the vertical regulatory framework resulting from a convergence of broadcasting and telecommunications services. Recently, however, the horizontal regulatory framework shows its limitation to regulate the ecosystem established mainly by Google and Apple. The existing horizontal regulatory framework does not fully reflect the characteristics of the two-sided market and the change in the competition structure in the broadcasting and telecommunications sector. What is important to note is that if the existing horizontal regulatory framework is simply applied to the ecosystem, a regulatory imbalance can be caused among ecosystems. The existing horizontal regulatory framework, which is subject to a value chain structure, categorizes business entities into either contents layer or transmission layer and applies the same regulation to all business entities in the same category. However, in the ecosystem, a keystone-player can be categorized into different layers depending on its strategy. Therefore, if the existing horizontal regulatory framework is applied as it is, the regulatory imbalance between keystone-players located in less regulated areas and keystone-players located in more regulated areas occurs resulting in a distortion of competition. There are two possible ways to establish a new regulatory framework to prevent the distortion of competition likely to be caused by the adoption of a horizontal regulatory system. First, a new ecosystem regulatory framework different from the existing one can be established. Second, the horizontal regulatory framework can be modified to reflect the ecosystem elements. The first approach is hard to adopt given the current situation as the approach requires the analysis of all broadcasting and telecommunications ecosystems including mobile and wired services; currently research and study on the competition conditions in the ecosystems is not enough. Therefore, this paper supports the second approach proposing a modified horizontal regulatory framework through the improvement of institutions and remedies suitable for accommodating the ecosystem elements. This paper intends to propose a way to regulate broadcasting and telecommunications ecosystems taking into consideration the ecosystem elements on top of the Telecommunications Business Act, Broadcasting Act, IPTV Act, the competition condition evaluation system of the Basic Act on Broadcasting and Telecommunications Development, and regulation on common carriers under the Telecommunications Business Act.