• Title/Summary/Keyword: illegal activities

Search Result 123, Processing Time 0.02 seconds

A Study on the Legal Matters of Overseas Direct Sales: Focused on Chinese Students' C2C Start up (해외직판의 법적 문제에 관한 연구 - 중국인 유학생의 C2C창업을 중심으로 -)

  • ZHOU, Ling-Ke;PARK, Kwang-So
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.71
    • /
    • pp.245-265
    • /
    • 2016
  • A number of Chinese students who are studying in Korea have been gradually increasing since Korea and China established diplomatic relations. Many of them sale Korean products to China while studying for their degree programs in colleges. This kind of transactions can be named C2C overseas direct sales. C2C overseas direct sales which are being performed by Chinese student are good for exportation of Korean products. However Some of these transactions are not legal according to present law, First, Chinese student don't have legal status to make the transactions. Second, Chinese students usually make false declarations for evading the taxes, including tariff and VAT, Third, Chinese students can not offer the after-sale service for the goods for the Chinese consumers. Although C2C transactions have some legal matters, they should not be banned by a one-size-fits-all method. In this study, we highly recommend for the development of C2C transactions, First, Korean government should give Chinese students legal status. Second, China customs must strictly prohibit illegal activities of smuggling by taking advantage of postal route. Third, sellers in China can offer the after-sale service to consumers through some specialist A/S firms.

  • PDF

A Modern Analysis of 'Guanxi' of Foreign Investment in China

  • LEE, Seoung-Taek;PARK, Woo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.68
    • /
    • pp.197-218
    • /
    • 2015
  • China is a land of guanxi, everything is connected with guanxi. China has a business culture based on guanxi connections underpinned by strong Confucian ethics. However, there are some reasons why it is difficult for western companies to run businesses in China. Firstly, foreign firms lack the understanding and experiences necessary for doing business in China. They don't know the absence of alternatives is one of reasons that guanxi is so powerful in Chinese society. Secondly, there are many misconceptions about guanxi. It is easier for many foreign scholars or businessmen to equate guanxi with corruption due to the ambiguity of guanxi. Thus, if a foreign enterprise possesses guanxi, it can be a source of competitive advantage for doing business due to lack of law systems for anti-corruption activities in China. Furthermore, it is gaining increasing importance not only in Business to Government(B2G) but also in Business to Consumers(B2C) relationships. Therefore,managers should pay great attention to the proper use of guanxi instead of being involved in corrupt behaviours because now the governments hold a strong attitude against corruption. In particular, establishment of working guanxi through red envelops(basically giving money) or illegal gifts can cause a great problem for both parties, which were naturally accepted among most government officials and businessmen until recently.

  • PDF

SPACE-BASED OCEAN SURVEILLANCE AND SUPPORT CAPABILITY

  • Yang Chan-Su
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.253-256
    • /
    • 2005
  • The use of satellite remote sensing in maritime safety and security can aid in the detection of illegal fishing activities and provide more efficient use of limited aircraft or patrol craft resources. In the area of vessel traffic monitoring for commercial vessels, Vessel Traffic Service (VTS) which use the ground-based radar system have some difficulties in detecting moving ships due to the limited detection range. A virtual vessel traffic control system is introduced to contribute to prevent a marine accident such as collision and stranding from happening. Existing VTS has its limit. The virtual vessel traffic control system consists of both data acquisition by satellite remote sensing and a simulation of traffic environment stress based on the satellite data, remotely sensed data. And it could be used to provide timely and detailed information about the marine safety, including the location, speed and direction of ships, and help us operate vessels safely and efficiently. If environmental stress values are simulated for the ship information derived from satellite data, proper actions can be taken to prevent accidents. Since optical sensor has a high spatial resolution, JERS satellite data are used to track ships and extract their information. We present an algorithm of automatic identification of ship size and velocity. This paper lastly introduce the field testing results of ship detection by RADARSAT SAR imagery, and propose a new approach for a Vessel Monitoring System(VMS), including VTS, and SAR combination service.

  • PDF

Discussions on Regulation and Use of Police Drones (경찰활동상 드론규제와 활용을 위한 논의)

  • Park, Han-Ho;Kim, Sung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.408-415
    • /
    • 2017
  • The aim of this study is to discuss some of the prominent ideas which use drone for police works. Focusing on the extent of the utility and practicability of using drone in policing, this paper attempts to address both positive and negative aspects in conjunction with related statutes and regulations. This study uses a qualitative case study approach and offers three practical implications including: (1) enacting a law that covers using drones in policing, (2) hiring technical professionals or training police officers to prevent illegal drones and to implement a variety of policing strategies, and (3) collecting data and information on crime and criminals and then developing the best way to respond to these problems.

A New Defense against DDoS Attacks using Reputation (평판을 이용한 새로운 DDoS 공격 대응 방안 연구)

  • Shin, Jung-Hwa;Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.8
    • /
    • pp.1720-1726
    • /
    • 2011
  • The DDoS attacks which are increasing recently must have many zombie PCs before attacking targeted systems by attacker. A zombie PC is infected by attacker's malignant code and may be operated by the his/her special malicious purposes. But most users generally don't know that their PCs are infected and used as zombies by illegal activities covertly. In this paper, we propose a new scheme that decreases vulnerable PCs and isolates them from Internet before being zombie PCs. The proposed scheme point the reputations of connected PCs and decide whether their Internet connections are keeping continuously or not. Also We show the figures how to infect susceptable PCs to zombie PCs, and analyze the decrease effects of DDoS attacks adapted by the proposed scheme with various experiments.

An Analysis of a Precedent of the Supreme Court about School Safety Accidents (학교 안전사고에 대한 대법원 판례 분석)

  • Kim, Dal-Hyo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.19 no.2
    • /
    • pp.168-179
    • /
    • 2007
  • There are many students in school. So school safety accidents are happened by accident. But, if teachers know and understand about school safety accidents exactly, the school safety accidents can be reduced. The conclusion of this study is as follow. First, generally teacher has a duty and responsibility to protect and care students in educational activities. And teacher has a responsibility to protect and care students only in the cases of predictability. Second, teacher must do his/her best about a duty of attention. If teacher do his/her best about a duty of attention, he(she) has not the responsibility about the accident. Third, teacher needs to have more concern student who has a controversial figure. And teacher needs to have an evidence that he/she did his/her best for the student ordinary times. Fourth, the criteria of teacher's legal or illegal punishment to students is (1) the motivation and details for punishment, (2) the methods and degree for punishment, (3) a part of body for punishment, (4) the degree of damage for punishment. Fifth, teacher need to learn the program about school safety accidents systematically.

The Role of IMO for the Eradication of IUU Fishing (국제해사기구의 IUU 어업 퇴치 기여 및 전망)

  • Kim, Jung-Eun
    • The Journal of Fisheries Business Administration
    • /
    • v.46 no.3
    • /
    • pp.15-29
    • /
    • 2015
  • The illegal, unreported and unregulated fishing can be properly regulated only if fishing activities, transhipment and landing of illegally caught fish, and processing of fish at sea involved in it are integrally managed. To do this, flag States, port States, coastal States, market States and relevant regional fisheries management organizations shall closely cooperate. In addition, fishing boats involved in IUU fishing often ignore requirements of safety of navigation so that they could be exposed to more causes of incidents and could have less chances to be rescued. Then, it seems to be necessary for the regulation on IUU fishing to include a certain consideration of strengthening safety of those ships. International Maritime Organization(IMO) has developed and implemented international rules for the safety of shipping. IMO has cooperated with Food and Agricultural Organization on IUU fishing since 2000 and the third joint meeting is scheduled in November 2015. This paper reviews the recommendations adopted in the previous meetings, and the measures actually taken as a result of the cooperation and, in particular, focus on the additional roles of IMO for the eradication of the IUU fishing.

A Study on the Differences in the Cognition of the Visitor-Reservation System: Focused on Uiryeong-Gil Area in Bukhansan National Park

  • Sim, Kyu-won;Choe, Yunseon;Jang, Jin;Nam, Seungmin
    • Journal of Forest and Environmental Science
    • /
    • v.37 no.1
    • /
    • pp.69-78
    • /
    • 2021
  • This study aims to verify a difference between the years 2014 and 2019 of Uiryeong-Gil, which is operated by the Visitor-Reservation System, in terms of the cognition of system, operational effectiveness, and behavioral intention. The analysis is as follows. First, among the overall cognition of the Visitor-Reservation System, the satisfaction from - prevention for safety for accident, expansion to other parks, number of visitor restriction, and satisfaction with reservation method - increased compared to 2014. Second, among the effects of the Visitor-Reservation System operation, satisfaction shows differences in year-to-year levels in terms of resource protection, resource damage mitigation efficiency, natural experience opportunity, comfort of visit-environment, and prevention of illegal activities. Third, the analysis of the differences in the behavior of the Visitor-Reservation System showed that the satisfaction of visitors, revisit intention, and overall satisfaction differed per year. The results of this study are meaningful in that the Visitor-Reservation System is no longer the restriction, but the change in cognition for the protection of ecosystems and sustainable visiting in order to expand the Visitor-Reservation System into a sustainable policy.

An Application of Deep Clustering for Abnormal Vessel Trajectory Detection (딥 클러스터링을 이용한 비정상 선박 궤적 식별)

  • Park, Heon-Jei;Lee, Jun Woo;Kyung, Ji Hoon;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.169-176
    • /
    • 2021
  • Maritime monitoring requirements have been beyond human operators capabilities due to the broadness of the coverage area and the variety of monitoring activities, e.g. illegal migration, or security threats by foreign warships. Abnormal vessel movement can be defined as an unreasonable movement deviation from the usual trajectory, speed, or other traffic parameters. Detection of the abnormal vessel movement requires the operators not only to pay short-term attention but also to have long-term trajectory trace ability. Recent advances in deep learning have shown the potential of deep learning techniques to discover hidden and more complex relations that often lie in low dimensional latent spaces. In this paper, we propose a deep autoencoder-based clustering model for automatic detection of vessel movement anomaly to assist monitoring operators to take actions on the vessel for more investigation. We first generate gridded trajectory images by mapping the raw vessel trajectories into two dimensional matrix. Based on the gridded image input, we test the proposed model along with the other deep autoencoder-based models for the abnormal trajectory data generated through rotation and speed variation from normal trajectories. We show that the proposed model improves detection accuracy for the generated abnormal trajectories compared to the other models.

Analysis of Regulation and Standardization Trends for Drone Remote ID (드론 원격 식별 규정 및 표준화 동향 분석)

  • Kim, H.W.;Kang, K.S.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.6
    • /
    • pp.46-54
    • /
    • 2021
  • Drone remote identification (ID) capability is essential to ensure public safety, help law enforcement, and secure the safety and efficiency of the national airspace. Remote ID technology can be used to differentiate compliant drones from illegal drones that pose a potential security risk by providing airspace awareness to the civil aviation agency and law enforcement entities. In addition, the increased safety and efficiency obtained by mandating remote ID will make it possible to operate drones over populated areas and beyond visual lines of sight. In addition, remote ID will allow drones to be safely integrated into unmanned traffic management systems and the national airspace. Remote ID devices can be categorized by type, i.e., broadcast remote ID or network remote ID. The broadcast remote ID, which has high technical maturity and will be applied in the near future, is primarily considered to ensure the security of drones. The network remote ID, which is being developed and tested and will be applied in the distant future, can be used additionally to ensure the safety and the efficiency of the national airspace. In this paper, we analyze the trends on regulation and standardization activities for drone remote ID primarily in the United State and Europe.