With an advent of recent knowledge-based society, the interest in intellectual property has increased. Firms have tired to result in productive outcomes through continuous innovative activity. Especially, ICT firms which lead high-tech industry have tried to manage intellectual property more systematically. Firm's interest in the patent has increased in order to manage the innovative activity and Knowledge property. The patent involves not only simple information but also important values as information of technology, management and right. Moreover, as the patent has the detailed contents regarding technology development activity, it is regarded as valuable data. The patent which reflects technology spread and research outcomes and business performances are closely interrelated as the patent is considered as a significant the level of firm's innovation. As the patent information which represents companies' intellectual capital is accumulated continuously, it has become possible to do quantitative analysis. The advantages of patent in the related industry information and it's standardize information can be easily obtained. Through the patent, the flow of knowledge can be determined. The patent information can analyze in various levels from patent to nation. The patent information is used to analyze technical status and the effects on performance. The patent which has a high frequency of citation refers to having high technological values. Analyzing the patent information contains both citation index analysis using the number of citation and network analysis using citation relationship. Network analysis can provide the information on the flows of knowledge and technological changes, and it can show future research direction. Studies using the patent citation analysis vary academically and practically. For the citation index research, studies to analyze influential big patent has been conducted, and for the network analysis research, studies to find out the flows of technology in a certain industry has been conducted. Social network analysis is applied not only in the sociology, but also in a field of management consulting and company's knowledge management. Research of how the company's network position has an impact on business performances has been conducted from various aspects in a field of network analysis. Social network analysis can be based on the visual forms. Network indicators are available through the quantitative analysis. Social network analysis is used when analyzing outcomes in terms of the position of network. Social network analysis focuses largely on centrality and structural holes. Centrality indicates that actors having central positions among other actors have an advantage to exert stronger influence for exchange relationship. Degree centrality, betweenness centrality and closeness centrality are used for centrality analysis. Structural holes refer to an empty place in social structure and are defined as efficiency and constraints. This study stresses and analyzes firms' network in terms of the patent and how network characteristics have an influence on business performances. For the purpose of doing this, seventy-four ICT companies listed in S&P500 are chosen for the sample. UCINET6 is used to analyze the network structural characteristics such as outdegree centrality, betweenness centrality and efficiency. Then, regression analysis test is conducted to find out how these network characteristics are related to business performance. It is found that each network index has significant impacts on net income, i.e. business performance. However, it is found that efficiency is negatively associated with business performance. As the efficiency increases, net income decreases and it has a negative impact on business performances. Furthermore, it is shown that betweenness centrality solely has statistically significance for the multiple regression analysis with three network indexes. The patent citation network analysis shows the flows of knowledge between firms, and it can be expected to contribute to company's management strategies by analyzing company's network structural positions.
Journal of the Korea Institute of Information Security & Cryptology
/
v.30
no.5
/
pp.909-928
/
2020
From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.
Because usually signal controllers on the crosswalks of mid-block provide pedestrian signals every cycle based on the fixed signal plan, pedestrian signals are provided even when there is no pedestrian demand. Consequently, signal is operated inefficiently and this may cause drivels to experience useless delay or violate the signal. Even though recently pushbuttons have been installed to improve the efficiency of pedestrian signal control in the crosswalks of mid-block and the pedestrian safety. they are not spread out national-wide in Korea because of the cost of the pushbutton equipments and the lack of an acknowledgement of the efficiency of the pushbutton. In this study, the effectiveness of the pushbutton on saving the vehicle delay was verified through before and after study in 4 study sites using a traffic micro-simulation model, VISSIM. To evaluate the viability of the pushbutton, a benefit/cost analysis was also performed for 4 study sites. It was found that B/C ratio of all of 4 study sites was greater than 1. The sensitivity analysis for the traffic volume and pedestrian volume were performed to identify the impact of the both volume on the operation of pushbutton. And, a benefit/cost analysis was performed for all scenarios. It was found that when the pedestrian volume is greater than 90ped/h, the pedestrian signal was operated same as the fixed signal plan. That is, there is no benefit of pushbutton at all once the pedestrian volume is greater than 90ped/h. When the pedestrian volume is equal to or less than 90ped/h and the traffic volume is greater than 2,500veh/h, B/C ratio is greater than 1. Also it was found that as traffic volume increases and pedestrian volume decreases, the benefit increases. In this study, the criteria for installation of pushbutton on the crosswalks of mid-block are developed through the sensitivity analysis and benefit/cost analysis. The results of this study may be used as a criteria for expansion of pushbutton system.
Cho, Kyu Chae;Park, Hyung Soo;Lee, Sang Hoon;Choi, Jin Hyeok;Seo, Sung;Choi, Gi Jun
Journal of Animal Environmental Science
/
v.18
no.sup
/
pp.81-90
/
2012
This study was evaluated high end research grade Near infrared spectrophotometer (NIRS) to low end popular field grade multiple Near infrared spectrophotometer (NIRS) for rapid analysis at forage quality at sight with 241 samples of Italian ryegrass silage during 3 years collected whole country for evaluate accuracy and precision between instruments. Firstly collected and build database high end research grade NIRS using with Unity Scientific Model 2500X (650 nm~2,500 nm) then trim and fit to low end popular field grade NIRS with Unity Scientific Model 1400 (1,400 nm~2,400 nm) then build and create calibration, transfer calibration with special transfer algorithm. The result between instruments was 0.000%~0.343% differences, rapidly analysis for chemical constituents, NDF, ADF, and crude protein, crude ash and fermentation parameter such as moisture, pH and lactic acid, finally forage quality parameter, TDN, DMI, RFV within 5 minutes at sight and the result equivalent with laboratory data. Nevertheless during 3 years collected samples for build calibration was organic samples that make differentiate by local or yearly bases etc. This strongly suggest population evaluation technique needed and constantly update calibration and maintenance calibration to proper handling database accumulation and spread out by knowledgable control laboratory analysis and reflect calibration update such as powerful control center needed for long lasting usage of forage analysis with NIRS at sight. Especially the agriculture products such as forage will continuously changes that made easily find out the changes and update routinely, if not near future NIRS was worthless due to those changes. Many research related NIRS was shortly study not long term study that made not well using NIRS, so the system needed check simple and instantly using with local language supported signal methods Global Distance (GD) and Neighbour Distance (ND) algorithm. Finally the multiple popular field grades instruments should be the same results not only between research grade instruments but also between multiple popular field grade instruments that needed easily transfer calibration and maintenance between instruments via internet networking techniques.
It is widely known that knowledge management plays a facilitating role that contributes to upgrading organizational performance. Knowledge management systems (KMS), especially, support the knowledge management process including the sharing, creating, and using of knowledge within a company, and maximize the value of knowledge resources within an organization. Despite this widely held belief, there are few studies that describe how companies actually develop, share, and practice their knowledge. Companies in the domestic small franchise sector, which are in the early stages in terms of knowledge management, need to improve their KMS to manage their franchisees effectively. From this perspective, this study uses a qualitative approach to explore the actual process of knowledge management implementation. This article presents a case study of PB (Paris Baguette) company, which is the first to build a KMS in the franchise industry. The study was able to confirm the following facts through the analysis of target companies. First, the chief executive's support is a critical success factor and this support can increase the participation of organization members. Second, it is important to build a process and culture that actively creates and leverages information in knowledge management activities. The organizational learning culture should be one where the creation, learning, and sharing of new knowledge is developed continuously. Third, a horizontal network organization is needed in order to make relationships within the organization more close-knit. Fourth, in order to connect the diverse processes such as knowledge acquisition, storage, and utilization of knowledge management activities, information technology (IT) capabilities are essential. Indeed, IT can be a powerful tool for improving the quality of work and maximizing the spread and use of knowledge. However, during the construction of an intranet based KMS, research is required to ensure that the most efficient system is implemented. Finally, proper evaluation and compensation are important success factors. In order to develop knowledge workers, an appropriate program of promotion and compensation should be established. Also, building members' confidence in the benefits of knowledge management should be an ongoing activity. The company developed its original KMS to achieve a flexible and proactive organization, and a new KMS to improve organizational and personal capabilities. The PB case shows that there are differences between participants perceptions and actual performance in managing knowledge; that knowledge management is not a matter of formality but a paradigm that assures the sharing of knowledge; and that IT boosts communication skills, thus creating a mutual relationship to enhance the flow of knowledge and information between people. Knowledge management for building organizational capabilities can be successful when considering its focus and ways to increase its acceptance. This study suggests guidelines for major factors that corporate executives of domestic franchises should consider to improve knowledge management and the higher operating activities that can be used.
Journal of The Korean Association For Science Education
/
v.41
no.4
/
pp.297-310
/
2021
This study explores the characteristics of within-school and across-school science teacher professional learning communities (hereafter, PLC) qualitatively. In-depth focus group interviews were conducted with science teachers belonging to seven PLCs within the science core school and three PLCs across schools. Interview questions include identity and motivation, major activities, and outcomes of PLC, as well as shortcomings and support plans for PLC. The results include both within-school and across-school science teacher PLCs formed for professional development related to science teaching and learning. Both science PLCs participated in the study showed the characteristics of a 'practice community' that developed a cooperative relationship through reciprocal participation, focusing on shared issues among members. Regarding issues, within-school PLCs focused on microscopic problems such as curriculum reconstruction of subject-matter, while across-school PLCs focused on macro problems such as teacher professional development. Regarding activities and roles as PLC, within-school and across-school science PLCs shared such features as collaborative professional development, and interpersonal education such as mentoring for novice teachers. In terms of PLC's influence and outcomes, science teacher PLCs has a positive effect not only on the teachers themselves, but also on the students and the teacher culture in the school. In addition, science teacher PLCs need improvement of the physical conditions for community operation, and software support such as protocol provision for PLC operation and joint research or re-education with universities. In particular, joint research between universities and science teacher PLCs shows the future orientation of the PLC as an 'inquiry community'. Based on the results, the necessity of active support for science PLC, the necessity of developing a cooperative system between science teacher PLC and universities, and ways to spread the PLC of science core schools to that of general schools were proposed.
The purpose of this study is to examine the meaning of learning methods for education to transmit the items designated as intangible cultural heritages focusing on Seoul-gut. Recently, as the Act on the Preservation and Promotion of Intangible Cultural Heritages was promulgated, 'the archetype' instead of 'the prototype' has become highlighted as a crucial axis for transmission. Although there are some controversies over the definition of the archetype among scholars, it is now possible for transmitters to make use of transformations rather freely being freed from strict orientation to the prototype to follow some fixed frame. Examining learning methods used in education to transmit mudang-gut, one of the items designated as intangible cultural heritages, however, this author has found that the prototype is still emphasized or in the center of learning instead. Presenting learning methods employed for Hwanghaedopyeongsansonoreum-gut of a national intangible cultural heritage, Namijanggunsadang-gut of Seoul Special City's intangible cultural heritage, and Bonghwasandodang-gut as examples, this researcher intends to reveal the reality. In the recent situation that education centering around academies is being widely spread to transmit mudang-gut, setting forth the designation of some of the items as intangible cultural heritages, they are publishing articles on newspaper as an advertisement to encourage learning about mudang-gut. Responding to the advertisement, there are more and more shamans intending to learn mudang-gut coming to the society for preserving items designated as intangible cultural heritages. They can, of course, perform mudang-gut on their own but come to learn it as there is no fixed or definite system for it. Even though the concept of the archetype was introduced, as now it is possible to learn the fixed frame through learning about the prototype regarding the item of mudang-gut as an intangible cultural heritage, those involved in shamanism are coming to it more and more. As transmitting the prototype rather deteriorated the liveliness of gut, those involved in shamanism are coming to it to learn about gut thinking that it is where they can learn the basic frame and also acquire more detailed knowledge about shamanism. Therefore, it is needed for the item of mudang-gut designated as an intangible cultural heritage to accept the aspects of change and develop new methods of education to transmit intangible cultural heritages.
The purpose of this study is to investigate the significance of Buddhist stone art in the cultural zone of Mt. Bukhan. Mt. Bukhan witnessed the prevalence of Buddhist culture in and around it since the introduction of Korean Buddhism and served as the center of Buddhist culture in the nation, where new Buddhist temples continued to be built from the Three Kingdoms Period to the Joseon Period. Of the characteristics of its Buddhist culture, it is very noteworthy that the construction of military temples in and around it in the latter half of Joseon supported the function of Buddhist temples as basic places of worship. These military temples were closely related to the mountain's geopolitical location, traffic routes, and position in the national defense system-- its mountain fortress was an important defense facility. The stone art works of Mt. Bukhan can be categorized into various types, including stone stupas, stone pagodas, rock-carved Buddhas, stone Buddhas, towers and monuments (stone monuments), stone lanterns, flagpole supports, and rock-carved sarira pagodas. There are diverse types of stone art left on the mountain. As for its period characteristics, it is clear that the Buddhist art of Silla spread even to the Gyeonggi region, and that most of the works of stone art were created during the first half of Goryeo and the latter half of Joseon. Starting in Goryeo, the Buddhist temples of the mountain maintained close relations with the royal court by operating as the royal buddhist shrine for the royal family. In the latter part of Joseon, the construction of the Bukhan mountain fortress became the most important opportunity to produce stone art. As for the distribution of the stone artwork, it was usually created in the west part of the mountain from Unified Silla to the first half of Goryeo and in the southern and eastern parts of the mountain from the latter half of Goryeo to the latter half of Joseon. It is estimated that central Buddhist temples of the mountain changed due to Silla's military goal of advancing toward the west coast along the Han River in its early days and the construction of the Bukhan mountain fortress in the latter half of Joseon to protect the capital city. Finally, the stone art of Mt. Bukhan holds very high significance in art history because various types of stone art continued to be created on and around the mountain, the stone artwork of the mountain reflected representative styles for each period, and e rare and ofthe works produced on the mountain exemplified rare and unique styles.
Park, Wan-Hyeok;Ko, Dongwook W.;Kwon, Tae-Sung;Nam, Youngwoo;Kwon, Young Dae
Journal of Korean Society of Forest Science
/
v.107
no.4
/
pp.486-496
/
2018
Pine wilt disease (PWD) in Gyeonggi province was first detected in Gwangju in 2007, and ever since has caused extensive damage. Insect vector and host tree in Gyeonggi province are Monochamus saltuarius and Pinus koraiensis, respectively, which are different from the southern region that consist of Monochamus alternatus and Pinus densiflora. Consequently, spread and mortality characteristics may be different, but our understanding is limited. In this research, we utilized the spatial data of newly infected trees in Gyeonggi province from 2008 to 2015 to analyze how it is related to various environmental and human factors, such as elevation, forest type, and road network. We also analyzed the minimum distance from newly infected tree to last year's closest infected tree to examine the dispersal characteristics based on new outbreak locations. Annual number of newly infected trees rapidly increased from 2008 to 2013, which then stabilized. Number of administrative districts with infected trees was 5 in 2012, 11 in 2013, and 15 in 2014. Most of the infected trees was Pinus koraiensis, with its proportion close to 90% throughout the survey period. Mean distance to newly infected trees dramatically decreased over time, from 4,111 m from 2012 to 2013, to approximately 600 m from 2013 to 2014 and 2014 to 2015. Most new infections occurred in higher elevation over time. Distance to road from newly infected trees continuously increased, suggesting that natural diffusion dispersal is increasingly occurring compared to human-influenced dispersal over time.
Yun, Ho Geun;Lee, Ah young;An, Jong Bin;Hwang, Tae Young;Lee, Jong Won
Korean Journal of Plant Resources
/
v.34
no.4
/
pp.311-338
/
2021
This study was investigated to find out the distribution of vascular flora and remarkable plants and its factors and management plan in the forest genetic resource reserve of Mt. Munsu, located in the DMZ and DMZ border area in Gimpo, Gyeonggi-do province. The survey was carried out 17 times from April 2019 to October 2020. First of all, in the forest genetic resource reserve of the Mt. Munsu, a total of 444 taxa in 95 families, 276 genera, 395 species, 13 subspecies, 33 varieties and 3 forms. This result was found to be about 9.09% of the total 4,881 taxa of vascular plants in Korea. In addition, endemic plants were classified as 6 taxa. Floristic special and rare plants were identified as 39 taxa and 3 taxa, respectively. Lastly, the invasive alien plants that appeared in Mt. Munsu of the forest genetic resource reserve were observed in 58 taxa. Moreover, the naturalization rate was 13.1% and the urbanization index was calculated to be 18.0%. As a result of comparing the vascular flora at the forest genetic resource reserve on Mt. Munsu identified in this study with previous studies, it was found the number of taxa was decreased compared to the previous studies, despite the fact that the recent survey section was wider and more varies routes were investigated. In particular, it was confirmed that the number of rare and endemic plants decreased significantly, and the number of invasive plants greatly spread to forest roads and hiking trails. Therefore, it is considered that the forest rest year system should be introduced for the conservation and management of native plants in the forest genetic resource reserve.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.