• Title/Summary/Keyword: agency problem

Search Result 1,073, Processing Time 0.029 seconds

A Study of Efficient Measures for Installing and Managing Traditional Market Arcades (전통시장 아케이드의 설치 및 관리 효율화 방안 연구)

  • Kim, Young-Ki;Kang, Heon-Soo;Kim, Seung-Hee
    • Journal of Distribution Science
    • /
    • v.10 no.3
    • /
    • pp.15-30
    • /
    • 2012
  • It has been 10 years since the facility modernization projects of traditional markets was rigorously undertaken. Although more than 835 traditional Korean markets nationwide have already completed these projects, there does not exist a specific set of standards of installation, future maintenance, and management. As a result, the complaints made by civil stakeholders in accordance of the actual facility installation caused problems and delays of related projects. In addition, while some local governments secured and implemented their own differing standards, others have not yet established their own separate standards for maintenance and management. Specifically, 694 traditional markets nationwide were supported for the cost of installing arcades by 2010. For the short period of time after the arcade-supported projects were deployed, the number of the traditional markets had been rapidly growing as a prime example of the facility modernization projects. The arcade facilities are being planned and installed merely for screening the rain or the sun. Without fundamental data for the newly landscaped environments or information on the actual conditions of usage and assessment, there is a lack of comprehensive approaches that could possibly organize the public environments. Furthermore, the amount of support needed for repairs, maintenance, and management from the central and local governments is gradually increasing. Thus, it becomes both crucial and necessary to complement the current set of standards. The purpose of this study is to examine the actual conditions of usage, maintenance, and management among those traditional market facilities that were installed with the supports of the facility-modernization projects, especially for arcades. This will be carried out through investigating the local problems, issues, and considering international case studies. The results of this study will provide measures for effective and efficient installation and management of traditional market arcades. Improvements in the use of public resources could be directed towards transforming public business, as well as public enhancement and functional maintenance and reinforcement. Under this condition, the arcade is not a simple area to avoid rain or sunlight; it becomes a public space. It is highlighted that the arcade should establish its public business not only to activate markets but also to refine street environments and revitalize local communities. A more specific way to improve is introduced through systematic supplementation. This is needed to attract effective participation from local residents and is done so by conducting a fair procedure from the first stage of business and by providing guidelines for establishing arcades as public facilities. The study points out to the problem of merchants-centered plans and street use. It presents the need to expand to involve residents and customers. Given that the arcade is a public facility and merchants' ability to maintain it is limited, manuals and systems for its maintenance needs to be introduced through multi-party agreement of merchants, government, residents and customers.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

A line study on movement expression in Dragonball of Toriyama Akira (토리야마 아키라의 <드래곤볼>에 나타난 운동표현에 관한 선 연구)

  • Cho, Dai-Ho;Park, Keong-Cheol
    • Cartoon and Animation Studies
    • /
    • s.31
    • /
    • pp.153-176
    • /
    • 2013
  • In the early 20th century, the some of futurist painter was attempted to represents the 'fast-paced' and 'dynamism' on a two-dimensional picture. The expression of fast-paced and dynamic for look like move image in the painting have evolved as a variety of visual symbol. Visual symbols that represent these movements were settled as the line of the most movement expression in the comic. The of Toriyama Akira gained worldwide popularity is emphasized speed and dynamism as the action genre in cartoon, is nice a data to research the line of the movement expression of cartoon. There is three terms as the action line, The speed line, the effect line on the movement expression in The glossary of in the dictionary of , but it not easy to Separate them by means similar. This study is willing to says the semantically problem of previous lines on the movement expression and to present a new alternative in order to study the line on the movement expression of . This study Separate the line on movement expression from symbolic the perspective and try to newly define by using, was classified lines of four kinds by add the afterimage line on existing the speed line, the motion line, the effect line. First, the speed line was defined as 'The line expressing the movement expression of a moving target as the concept of speed'. It on the way of expression was subdivided the direct as speed line when it alter the shape of the target and the indirect speed line when it alter the background of the target. Second, the motion line was defined as 'The line simplified the moving form or the moving path of moving target'. Third, the effect line was defined as 'the line emphasizing the movement expression of a moving target by Sensory expression or emotional expression. Fourth, the afterimage lines was defined as 'The line expressing slowly moving or swaying the movement expression of target to the afterimage effect. The terminology presented in this study will be able to help the understanding of the line on the movement expression .

An Empirical Study on Successful Factor of Local Mobile App One-Person Creating Company : The Moderating Effects of Social Capital (지역 모바일 앱 1인 창조기업의 성공요인에 관한 실증분석 : 사회적 자본의 조절효과를 중심으로)

  • Cheon, Phyeong Uk;Chung, Dong Seop;Ock, Young Seok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.2
    • /
    • pp.201-219
    • /
    • 2014
  • The Republic of Korea in the real economy to a knowledge economy, and a center of creativity and imagination in the creative economy is changing the paradigm. As the core of creating economic, creative industries with the technology and information play an important role in the industry individuals. In order to solve the problem of the polarization of the economy and high youth unemployment rate of Korea, to recognize the role of the creative industries, as objection part, dimensions pan-national and one creative companies in industries of Mobile Apps various policies that support has been promoted. Support these policies to be able to contribute to the establishment of the success of mobile apps one-person creating company, we performed this study targeting one-person company that creates mobile apps area, we conducted a demonstration study of success factors, and thus more effective and efficient in an attempt to seek out support measures. In this study, we derive a research 4 hypothesis about the success factors of one creative enterprise through literature discussion, a study was made on the basis of empirical data of one-person company that creates mobile apps. The results of the analysis, first, if the development rate of the mobile application technology is fast and a new competition associated product is appeared, it was possible to find a tendency to be higher at the performance quantitative companies. Second, if the founder is a founding for the benefit and rewarding work and come to terms with the risk, it was possible to discover tends to be higher achievement quantitative. Third, if one-person company select a target market with capture intensively, it was possible to find a tendency for higher qualitative results. Fourth, it could be found that the reliability of the contact frequency of the network related performance business environment these characteristics enterprise management strategy and act as a significant modulatory effect. Provision of information relating to management and entrepreneurship education to be one creative enterprise is required, these results suggest that there is a provision continuing need for the opportunity to be able to meet and network and reliable variety have. In this study, to take advantage to promote the elimination measures that can increase the likelihood of success of the company of institutions to support one company that creates knowledge-based, such as in the field of mobile application.

  • PDF

Cardiac Intracoronary Stenting vs CABG: Prevention of Medical Accident (심장 스텐트 시술과 의료사고 예방)

  • Kim, Kyoung Reay;Park, Kook Yang
    • The Korean Society of Law and Medicine
    • /
    • v.18 no.2
    • /
    • pp.163-194
    • /
    • 2017
  • Coronary artery disease has increased in Korea as the country enters the aged society. It is well known that the incidence of coronary artery disease is related to aging, hypertension, diabetes, hyperlipidemia, and dietary habit. For effective treatment of significant coronary stenosis, close coordination between cardiac surgery and cardiology team is essential. Especially cardiologists' decision whether to do the stent placement or CABG is very important because the cardiologists usually start to consult the patients for their treatment. Recently, non-surgical interventions(that is stent placement) in cardiology field have dramatically increased as the national insurance system removed the limitation of the number of stents deployed. However, accidents are often caused by inappropriate use of stents, especially in patients with triple coronary disease or left main disease with heavy coronary calcifications. Another aspect of stent placement is to cope with an emergency case in the event of coronary rupture or pericardial tamponade during coronary interventions without cardiac surgeons. In the past two years, the Korea Consumer Agency (Consumer Dispute Coordination Committee) analyzed eight cases of medical dispute settlement. Only two hospitals were manned with both cardiologists and cardiac surgeons. Seven patients died of procedures of stenting and five patients died on the day of the procedure. Among the 8 cases, 5 cases showed 3 vessel disease and the rest of the cases had either severe calcification, complete occlusion or poor coronary antomies for stenting According to a 2017 national data registry of coronary stenting, less than 3 drug-eluting stents were implanted in 98% of all patients. In 2015, the number of stent procedures was 38,922, and approximately in 800 (2%) cases, more than four stents were used per patient. We emphasize that it is necessary to seriously consider the cost-benefit analysis between stent and CABG. The patient has the right to choose the right procedure by asking the liability of 'instruction explanation obligation'. He should be well informed of the pros and cons of both procedures to avoid overuse of stent. It can be solved by intimate discussion of individual cases with the cardiac surgeon and the patient. Unilateral dialogue with the patient, forceful restriction on the number of stenting, lack of surgeon's backup in difficult cases should all be avoided. It is also necessary to solve the problem not only at the hospital level, such as multidisciplinary integrated medical care, but also a nationwide solution such as expanding cardiac surgeons as essential personnel to public officials.

  • PDF

Limitations on Exclusive Rights of Authors for Library Reprography : A Comparative Examination of the Draft Revision of Korean Copyright Law with the New American Copyright Act of 1976 (저작권법에 준한 도서관봉사에 관한 연구 -미국과 한국의 저자재산권의 제한규정을 중시으로-)

  • 김향신
    • Journal of Korean Library and Information Science Society
    • /
    • v.11
    • /
    • pp.69-99
    • /
    • 1984
  • A dramatic development in the new technology of copying materials has presented us with massive problems on reconciling the conflicts between copyright owners and potential users of copyrighted materials. The adaptation to this changing condition led some countries to revise their copyright laws such as in the U. S. in 1976 and in Korea in 1984 for merging with the international or universal copyright conventions in the future. Copyright defined as exclusive rights given to copyright owners aims to secure a fair return for an author's creative labor and to stimulate artistic creativity for the general public good. The exclusive rights on copyrightable matters, generally for reproduction, preparation of derivative works, public distribution, public performance, and public display, are limited by fair use for scholarship and criticism and by library reproduction for its preservation and interlibrary loan. These limitations on the exclusive rights are concerned with all aspects of library services and cause a great burden on librarian's daily duty to provide balance between the rights of creators and the needs of library patrons. The fair use as one of the limitations on it has been coupled with enormous growth of a new technology and extended from xerography to online database systems. The implementation of the fair use and library reprography in Korean law to the local practices is examined on the basis of the new American copyright act of 1976. Under the draft revision of Korean law, librarians will face many potential problems as summarized below. 1. Because the new provision of 'life time plus 50 years' will tie up substantial bodies of material longer than the old law, until that date librarians would need permissions from the owners and should pay attention to the author's death date. 2. Because the copyright can be sold, distributed, given to the heirs, donated, as a whole or a part, librarians should chase down the heirs and other second owners. In case of a derivative work, this is a real problem. 3. Since a work has its protection from the moment of its creation, the coverage of copyrightable matter would be extended to the published or the unpublished works and librarian's work load would be heavier. Without copyright registration, no one can be certain that a work is in the public domain. Therefore, librarians will need to check with an authority. 4. For implementation of limitations on exclusive rights, fair use and library reproduction for interlibrary loan, there can be no substantial aggregate use and there can be no systematic distribution of multicopies. Therefore, librarians should not substitute reproductions for subscriptions or purchases. 5. For the interlibrary loan by photocopying, librarians should understand the procedure of royalty payment. 6. Compulsory licenses should be understood by librarians. 7. Because the draft revision of Korean law is a reciprocal treaty, librarians should take care of other countries' copyright law to protect foreign authors from Korean law. In order to solve the above problems, some suggestions are presented below. 1. That copyright clearinghouse or central agency as a centralized royalty payment mechanism be established. 2. That the Korean Library Association establish a committee on copyright. 3. That the Korean Library Association propose guidelines for each occasion, e.g. for interlibrary loan, books and periodicals and music, etc. 4. That the Korean government establish a copyright office or an official organization for copyright control other than the copyright committee already organized by the government. 5. That the Korean Library Association establish educational programs on copyright for librarians through seminars or articles written in its magazines. 6. That individual libraries provide librarian's copyright kits. 7. That school libraries distribute subject bibliographies on copyright law to teachers. However, librarians should keep in mind that limitations on exclusive rights are not for an exemption from library reprography but as a convenient access to library resources.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

The Past and Future of Public Engagement with Science and Technology (참여적 과학기술 거버넌스의 전개와 전망)

  • Kim, Hyomin;Cho, Seung Hee;Song, Sungsoo
    • Journal of Science and Technology Studies
    • /
    • v.16 no.2
    • /
    • pp.99-147
    • /
    • 2016
  • This paper critically reviews the previous discussion over public engagement with science and technology by Science and Technology Studies literatures with a focus on justification and acceptance. Recent studies pointed out that the "participatory turn" after the late 1990s was followed by confusion and disagreement over the meaning and agency of public engagement. Their discussion over the reproduction of the ever-present boundary between science and society along with so-called late modernity and post-normal science and sometimes through the very processes of public engagement draws fresh attention to the old problem: how can lay participation in decision-making be justified, even if we agree that privileging the position of experts in governance of science and technology is no longer justified? So far STS have focused on two conditions for participatory turn-1) uncertainties inherent in experts' ways of knowing and 2) practicability of lay knowledge. This paper first explicated why such discussion has not been logically sufficient nor successful in promoting a wide and well-thought-out acceptance of public engagement. Then the paper made a preliminary attempt to explain what new types of expertise can support the construction and sustainment of participatory governance in science and technology by focusing on one case of lay participation. The particular case discussed by the paper revolves around the actions of a civil organization and an activist who led legal and regulatory changes in wind power development in Jeju Special Self-governing Province. The paper analyzed the types of expertise constructed to be effective and legitimate during the constitution of participatory energy governance and the local society's support for it. The arguments of this paper can be summarized as follows. First, an appropriate basis of the normative claim that science and technology governance should make participatory turn cannot be drawn from the essential characteristics of lay publics-as little as of experts. Second, the type of 'expertise' which can justify participatory governance can only be constructed a posteriori as a result of the practices to re-construct the boundaries between factual statements and value judgment. Third, an intermediary expertise, which this paper defines as a type of expertise in forming human-nonhuman associations and their new pathways for circulations, made significant contribution in laying out the legal and regulatory foundation for revenue sharing in Jeju wind power development. Fourth, experts' conventional ways of knowing need to be supplemented, not supplanted, by lay expertise. Ultimately, the paper calls for the necessity to extend STS discussion over governance toward following the actors. What needs more thorough analysis is such actors' narratives and practices to re-construct the boundaries between the past and present, facts and values, science and society. STS needs a renewed focus on the actual sites of conflicts and decision-making in discussing participatory governance.

Classifying Predominant Type and Examining Risk Factors for Recurrence of Child Maltreatment (아동학대사례의 잠재유형화와 유형별 재학대 위험요인)

  • Lee, Sang-Gyun;Lee, Bong Joo;Kim, Sewon;Kim, Hyun-Soo;Yoo, Joan P.;Jang, Hwa Jung;Chin, Meejung;Park, Ji-Myung
    • Korean Journal of Social Welfare Studies
    • /
    • v.48 no.3
    • /
    • pp.171-208
    • /
    • 2017
  • The purpose of this study is to classify the underlying and parsimonious types of child maltreatment and examine whether the effects of risk factors on child maltreatment recurrence differ by type of maltreatment. We utilized the multiyear national administrative data from the National Child Maltreatment Information System collected by Child Protection Agency in Korea. Of 26,921 child maltreatment victims reported and substantiated on or after January 1, 2012, 1,447 children who had recurrence of child maltreatment until December 31, 2015 were selected as maltreatment recurrence group and 4,580 children who had not experienced maltreatment since first substantiation were assigned as maltreatment non-recurrence group. Latent class analysis(LCA) and latent transition analysis(LTA) were used to group children with similar maltreatment subtypes into discrete classes of child maltreatment recurrence. Logistic regression is employed to examine the association between the child maltreatment predominant types and risk factors for recurrence. Results of LCA and LTA showed four latent classes representing predominant type of child maltreatment: 'physical abuse predominant type', 'emotional abuse predominant type', 'sexual abuse predominant type', and 'neglect type'. Significant differences in the effect of risk factors among latent classes were found in child's age and gender, perpetrator's gender, family poverty, biological parent as the perpetrator, domestic violence toward partner, perpetrator's alcoholic problem, insufficient parenting skills, and out-of-home care service, Based on these findings, results suggested how the typology can be used to guide decision about who to target in prevention and intervention programs, and which features of risk factors to target. Practice and policy implications as well as further research tasks were discussed in the lights of searching for useful and important strategies to prevent recurrence of child maltreatment.

Korean Style System Model of Financial ADR (한국형 금융ADR의 제도모델)

  • Seo, Hee-Sok
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.343-386
    • /
    • 2013
  • "Financial ADR" system in South Korea can be represented by so-called "Financial Dispute Resolution System", in which Financial Supervisory Service (FSS) and Financial Dispute Resolution Committee are the principal actors in operation of the system, and this is discussed as an "Administrative Financial ADR System". The system has over 10-year history since it was introduced in around 1999. Nonetheless, it was not until when financial consumer protection began to be highlighted after the 2008 financial crisis that Financial ADR system actually started to draw attention in Korea. This was because interest has been rising in "Alternative Dispute Resolution (ADR)" as an institutional measure to protect financial consumers damaged via financial transactions. However, the current discussion on the domestic Financial ADR system shows an aspect that it is confined to who is to be a principal actor for the operation of Financial ADR institution with main regards to reorganization of supervisory system. This article aims to embody these facts in an institutional model by recognizing them as a problem and analyzing the features of the Financial ADR system, thereby clarifying problems of the system and presenting the direction of improvement. The Korean Financial ADR system can be judged as "administrative model integrated model consensual model quasi-judicial model non-prepositive Internal Dispute Resolution (IDR) model". However, at the same time, it is confronted with a task to overcome the two problems; the system is not equipped with institutional basis for securing its validity in spite of the adopted quasi-judicial effect model; and a burden of operating an integrated ADR system is considerable. From this perspective, the article suggests improvement plans for security of validity in the current system and for expansion of industry-control ADR system, in particular, a system of prepositive IDR model. Amongst them, it suggests further plans for securing the validity of the system as follows; promotion to expand the number of internal persons and to differentiate mediation procedures and effect; a plan to keep a financial institution from filing a lawsuit before an agreement recommendation or a mediation proposal is advised; and a plan to grant suspension of extinctive prescription as well as that of procedures of the lawsuit.