• Title/Summary/Keyword: legal Protection

Search Result 690, Processing Time 0.028 seconds

Type and Settlement System of Disputes in Electronic Commerce (전자상거래 분쟁의 유형과 해결제도)

  • 이강빈
    • Journal of Arbitration Studies
    • /
    • v.11 no.1
    • /
    • pp.217-245
    • /
    • 2001
  • Like traditional commerce, disputes are bound to arise in the course of conducting an e-commerce transaction. At present of June 30, 2001, 259 cases of dispute on e-commerce have been applied for the mediation of Electronic Transaction Dispute Mediation Committee, types of them are 170 cases of delayed delivery of commodity, 21 cases of contract cancellation and refund, 16 cases of personal information protection, 16 cases of false and exaggerated advertisement, 14 cases of commodity defect. The settlement systems of e-commerce dispute are litigation and Alternative Dispute Resolution(ADR). ADR encompasses mediation, arbitration, and similar private tools for resolving disputes. ADR offers many perceived advantages. Speed of resolution and low cost are often cited as the primary benefits. Therfore e-commerce disputes may be settled more effectively by litigation. The settlement systems of e-commerce dispute by ADR are the mediation of Electronic Transaction Dispute Mediation Committee, the mediation of Consumer Dispute Mediation Commercial Arbitration Board, and the arbitration of Korean Commerical Arbitration Board. E-commerce sets up the probability that its merchants and customers will not exist in the same legal jurisdictions. The confusing application of laws and wide geographical dispersion of these parties will necessitate a faster and cheaper dispute resolution methodology. Therefore, online ADR may be effective for e-commerce dispute resolution. The examples of online ADR opetation are the cyber mediation of Electronic Transaction Dispute Resolution Committee, the cyber mediation of Korean Commercial Arbitration Board, the cyber mediation of Click N Settle, the online ADR of BBB online, and the cyber arbitration of virtual Magistrate.

  • PDF

A Study on the Problems and Improvements in the Related Law in order to Introduction of the Electronic Letter of Credit in Korea (한국의 전자신용장 도입을 위한 관련 법률상의 문제점과 개선방안에 관한 연구)

  • Kim, Tae-Hwan
    • International Commerce and Information Review
    • /
    • v.11 no.2
    • /
    • pp.233-257
    • /
    • 2009
  • The 21st century is witnessing the explosive increase in the usage of internet and international electronic transactions. Due to the unique characteristics of the electronic information, substantial part of such transaction can and do take the form of cross-border transactions. However, there have not been settled appropriate set of rules applicable to the international electronic transactions. Currently, in respect to e-L/C transactions in international trade, there are laws such as Electronic Transaction Basic Act in our country, E-Trade Promotion Act, E-Signature Law, Act on Promotion of Information and Communication Network Utilization and Information Protection and Marine Charter 5 in the Commercial Law. Nevertheless, a complete legislation, that is a uniform rule for e L/C which could support e L/C transactions fully hasn't been established yet. Accordingly, those laws concerned need to improve to regulate e-L/C transactions. The purpose of this paper is to look into the national status for law readjustment to prepare for a new electronic environment and to use appropriately the e-L/C issued by electronic means, and to conduct a comparative analysis on the related regulations to introduce a pertinent laws and propose related regulations to contribute to the making of effective laws to regulate e-L/C.

  • PDF

A Study on the Standards for Regulating Obscenity on the Internet (인터넷상 음란물 규제의 법률적 기준에 관한 소고)

  • Jin, Kwangmyoung
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.51-59
    • /
    • 2014
  • Korea also has tried to regulate the obscenity which is floating on the Internet in order to protect mainly minors. There are many statutes enacted to prohibit circulating pornographies to minors. However, there were minors who independently disseminate the pornographies to other minors. In the end, I can tell that existing statutes have not at least effectively regulate the obscenity on the Internet. Therefore, this article examines a possible limit of pornography on the Internet for the protection of minors, reviewing the CDA and the U.S. Courts' decisions. This article also examines the existing statutes' standard for regulating obscenity on the Internet in Korea. In addition, the article also tries to make a proposal to Korean legal systems that govern the obscenity on the internet.

Security and Law for Medical Information (의료정보보호를 위한 법률과 방안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.677-680
    • /
    • 2013
  • The risk of leakage of personal information is growing with new services such as social networking and cloud services by the rapid development of information. In particular, the field of medical IT technology is required to solve problems arising from the aging society and sustainable economic development, and in accordance with the requirements to improve the quality of life, a new market for medical devices and healthcare services can be expected. However, most of the medical information system was computerized with the introduction of IT technology, and when they exchange and transfer of medical information between institutions, medical information leakage occurs and security risk is growing. In this paper we review and analyse the security of personal health information related to the major legal systems and technical and administrative protection.

  • PDF

A study on the needs of independent dental hygiene practices in the public dental hygienists (보건치과위생사의 자율(독립)적 직무수행 요구도 조사)

  • Jang, Young-Eun;Heo, Sun-Su;Kim, Eun-Kyeong;Kim, Nam-Hee
    • Journal of Korean society of Dental Hygiene
    • /
    • v.17 no.3
    • /
    • pp.505-513
    • /
    • 2017
  • Objectives: The purpose of this study was to identify the needs of independent dental hygiene practices in the Korean public dental hygienists. Methods: This research was a cross-sectional survey study. 159 Korean public dental hygienists were selected by simple random sampling on March 10, 2017. 133 public dental hygienists were participated, after excluding 26 hygienists who showed insufficient responses. The respondents were asked to select one of the following options to reflect their needs: direct supervision, indirect supervision, and independent dental hygiene practice. Results: The results showed that the public dental hygienists wanted both public oral health practices (62.5%) and assistance in preventive dental treatments (63.4%) to be performed independently. Conclusions: The public dental hygienists were required to independently perform oral health education and fluoride mouth rinsing projects. Dental hygienists should improve their capability of independently practicing dental hygiene first, and then indicators. It should be established and measured to evaluate their competency in this respect. Legal protection should be considered for independent dental hygiene practices.

Integration and Verification of Privacy Policies Using DSML's Structural Semantics in a SOA-Based Workflow Environment (SOA기반 워크플로우 환경에서 DSML의 구조적 접근방법을 사용한 프라이버시 정책 모델의 통합과 검증)

  • Lee, Yong-Hwan;Jan, Werner;Janos, Sztipanovits
    • Journal of Internet Computing and Services
    • /
    • v.10 no.4
    • /
    • pp.139-149
    • /
    • 2009
  • In order to verify that a lot of legal requirements and regulations are correctly translated into software, this paper provides a solution for formal and computable representations of rules and requirements in data protection legislations with a DSML (Domain Specific Modeling Language). All policies are formally specified through Prolog and then integrated with DSML, According to the time of policy verification, this solution has two kinds of policies: static policies, dynamic policies.

  • PDF

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

Flow-based P2P Traffic Identification using SVM (SVM을 이용한 플로우 기반 P2P 트래픽 식별)

  • Um, Nam-Kyoung;Woo, Sung-Hee;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.123-130
    • /
    • 2008
  • To avoid some protection systems such as firewall, P2P applications have recently used to apply dynamic port numbers. Reliable estimates of P2P traffic require examination of packet payload, a methodological land mine from legal, privacy technical, logistic, and fiscal perspectives. Indeed, access to user payload is often rendered impossible by one of these factors, inhibiting trustworthy estimation of P2P growth and dynamics. Despite various methods such as port-based and signature-based techniques, it still dose not satisfy the method which uses both qualitative and quantitative aspects. In this paper, a method using SVM mechanism which discriminate the P2P traffic from non-P2P traffics using differences between P2P and other application traffics is suggested. This is a systematic methodology to identify P2P networks, and without relying on packet payload.

  • PDF

A study on copyright protection & utilization of bibliographic utility database (서지유틸리티 데이타베이스의 저작권 보호와 이용에 관한 연구)

  • Hong, Jae Hyeon
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.111.1-111.1
    • /
    • 1993
  • There are two types of bibliographic database, the one IS bibliographic database with creativlty. theother is bibliographic database without creativlty, The purpose of this paper is to investigate the problemsof bibliographic database with creatlvity by giving consideration of copyright law and the problems ofbihographic database w~thout creat~vity by sui genem system. Thus thls paper provided the methods thatresolve the problems of the current copyright law in order to protect all types of database being producedby way of the cooperation between the libraries and the information service centers. Secondly, this paperprovlded the legal devlces to protect bibliographic database produced by the libraries wh~ch cannot beprotected due to the lack of the creatlvity in the selection or arrangement of the material.

A study on copyright protection & utilization of bibliographic utility database (서지유틸리티 데이타베이스의 저작권 보호와 이용에 관한 연구)

  • 홍재현
    • Journal of the Korean Society for information Management
    • /
    • v.10 no.2
    • /
    • pp.111-143
    • /
    • 1993
  • There are two types of bibliographic database, the one IS bibliographic database with creativlty. the other is bibliographic database without creativlty, The purpose of this paper is to investigate the problems of bibliographic database with creatlvity by giving consideration of copyright law and the problems of bihographic database w~thout creat~vity by sui genem system. Thus thls paper provided the methods that resolve the problems of the current copyright law in order to protect all types of database being produced by way of the cooperation between the libraries and the information service centers. Secondly, this paper provlded the legal devlces to protect bibliographic database produced by the libraries wh~ch cannot be protected due to the lack of the creatlvity in the selection or arrangement of the material.

  • PDF