6 research outputs found

    The Effects of Higher Education on University Students' Entrepreneurial intentions in China

    Get PDF
    ์ด ๋…ผ๋ฌธ์€ ๊ณ ๋“ฑ๊ต์œก ๋ฐฐ๊ฒฝ์„ ๊ฐ–์€ ์ค‘๊ตญ๋Œ€ํ•™์ƒ๋“ค๊ณผ ์ด๋“ค์˜ ๊ธฐ์—…์ฐฝ์—…ํ™œ๋™ ๊ฐ„์˜ ๊ด€๊ณ„๋ฅผ ์•Œ์•„๋ณด๋Š”๋ฐ ๊ทธ ๋ชฉ์ ์ด ์žˆ๋‹ค. ์ด๊ฒƒ์„ ์œ„ํ•ด Ajzen์˜ TPB(theory of planed behavior)๋ชจํ˜•์—์„œ ์ œ์‹œํ•œ ๊ตฌ์กฐ๋ฐฉ์ •์‹์„ ์‚ฌ์šฉํ•˜์—ฌ ์ค‘๊ตญ๋Œ€ํ•™์ƒ๋“ค์˜ ์ฐฝ์—…์˜๋„๊ฐ€ ์–ด๋–ป๊ฒŒ ํ˜•์„ฑ๋˜๊ณ  ์žˆ๋Š”๊ฐ€๋ฅผ ์‹ค์ฆ๋ถ„์„ํ•˜์˜€๋‹ค. ์ด ๋ถ„์„์— ํ•„์š”ํ•œ ์ž๋ฃŒ๋Š” ์šฐํ•œ์ง€์—ญ์— ์žˆ๋Š” ์ค‘๋ถ€๊ถŒ ์ผ๋ฐ˜๋Œ€ํ•™ ํ•™์ƒ๋“ค๋กœ๋ถ€ํ„ฐ ๊ตฌํ•ด์กŒ๋‹ค. Ajzen์˜ ์ด๋ก ์— ์˜ํ•˜๋ฉด ๋Œ€ํ•™์ƒ๋“ค์˜ ์ฐฝ์—…์€ ๊ฐœ์ธ์˜ ํƒœ๋„์™€ ์ธ์ง€๋œ ํ–‰๋™์กฐ์ •์˜ ๊ฒฐํ•ฉ์œผ๋กœ ์„ค๋ช…๋  ์ˆ˜ ์žˆ๋‹ค. ์‹ค์ฆ๋ถ„์„ ๊ฒฐ๊ณผ ์ค‘๊ตญ์˜ ๊ฒฝ์šฐ ์ฃผ๊ด€์ ์ธ ํ–‰๋™๊ทœ๋ฒ”๋ณด๋‹ค๋Š” ๊ฐœ์ธ์˜ ํƒœ๋„๊ฐ€ ๊ต์œก์  ๋ฐฐ๊ฒฝ๊ณผ ๊ด€๊ณ„์—†์ด ์ฐฝ์—…์˜์ง€์— ํฐ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค.๊ทธ๋Ÿฌ๋‚˜ ํ•™๋ฌธ์  ์ „๊ณต์€ ์ฐฝ์—…ํ™œ๋™์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์ฃผ์š”์š”์ธ์œผ๋กœ๋‚˜ํƒ€๋‚ฌ๋‹ค. ์ค‘๊ตญ์—์„œ ๋Œ€ํ•™์ƒ ์กธ์—…์ž ๋…ธ๋™์‹œ์žฅ์˜ ๋ณ€ํ™”์— ์ ์‘ํ•˜๊ณ  ์ง€์†์ ์ธ ๊ฒฝ์Ÿ์ด์ต์„ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ด์„œ ๊ณ ๋“ฑ๊ต์œก๊ธฐ๊ด€์€ ์ค‘๊ตญ์—์„œ ๋Œ€ํ•™์ƒ๋“ค์˜ ์ฐฝ์—…ํ™œ๋™์„ ๊ณ ์–‘ํ•˜๊ธฐ ์œ„ํ•ด์„œ ์ฐฝ์—…ํ™œ๋™์— ๋Œ€ํ•œ ๋‹ค์–‘ํ•œ ๊ธฐ์ˆ ๊ณผ ๋Šฅ๋ ฅ์„ ๋ฐฐ์–‘ํ•˜๊ธฐ ์œ„ํ•ด ๋…ธ๋ ฅํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ์ด๋…ผ๋ฌธ์€ ์ค‘๊ตญ์—์„œ ๊ณ ๋“ฑ๊ต์œก๊ณผ ๋Œ€ํ•™์ƒ์˜ ์ฐฝ์—…ํ™œ๋™ ๊ฐ„์˜ ๊ด€๊ณ„๋ฅผ ๋ถ„์„ํ•จ์œผ๋กœ์จ ์ค‘๊ตญ ๋…ธ๋™์‹œ์žฅ์„ ์ข€ ๋” ํฌ๊ด„์ ์œผ๋กœ ์ดํ•ดํ•˜๋Š”๋ฐ ๋„์›€์„ ์ฃผ๋Š” ๊ฒƒ์œผ๋กœ ์ƒ๊ฐ๋œ๋‹ค.Chapter1. Introduction 1.1 The background and purpose 1.2 The plan of the paper Chapter2. Entrepreneurial intention and educational background 2.1 Literature review 2.2 Entrepreneurial intention model 2.3 The theoretical framework for the relationship between educational background and entrepreneurial intention Chapter3. Methodology 3.1 Research framework 3.2 Research design Chapter4. Results and discussion 4.1 Entrepreneurial intentions and its antecedents 4.2 Educational background and TPB components Chapter5. Summary, limitation and conclusions 5.1 Validity of the TPB 5.2 Relationship between educational background and entrepreneurial intentions Reference

    A Study on Internet Intellectual Property Right Infringement and Protection in China

    Get PDF
    With the rapid development of Internet technology and the number of Internet users continue to increase, the Internet has brought us convenience, but it also brings problems. Compared to traditional intellectual property rights, the online intellectual property combines the two characteristics of network technology and intellectual property. These characteristics break the proprietary, regional and timing characteristics of the traditional intellectual property rights. Peopleโ€™s intelligence outcome can be propagated to all over the world only if the place is covered with internet. The intellectual property rights infringement cases became broader, shorter, and more infringer features. These infringement cases become more frequent, various types of infringement have been submitted, and more and more rights have been infringed. As there are governance vulnerabilities of the Internet and loopholes in the law, the current legislation can not keep up the pace of development of computer network technology, and it makes it difficult to trace the responsibility of the infringer. The equity interests are not duly protected. Violations of intellectual property extend beyond the individual, and many international big companies get stuck. As the network intellectual property rights are not well protected, it is leading to more infringement and is bound to affect the development of the Internet. China put too much emphasis on government control which may affect on the development and improvement of the networking industry. The relevant departments protecting internet intellectual property has develop a series of rules and regulations, but these are low-leveled, and lack of authoritative, systematic, and coordination with other laws. The number of regulations on management of the government is much more than the NPC's legislative. In legislative process, the lack of democratic participation led to many loopholes in the management and the lack of legality. Therefore, legislation should be strengthened to establish the internet intellectual property rights regulatory agencies to strengthen links with the international protection of intellectual property department, learning the advanced experience of foreign internet IPR cases. So that it can improve the awareness of intellectual property rights of internet users and create a harmonious Internet environment.List of Figures โ…ณ Abstract โ…ด 1. ์„œ ๋ก  1 1.1 ์—ฐ๊ตฌ์˜ ๋ฐฐ๊ฒฝ ๋ฐ ๋ชฉ 1 1.2 ์—ฐ๊ตฌ์˜ ๋‚ด์šฉ ๋ฐ ๋ฐฉ๋ฒ• 2 2. ์ค‘๊ตญ์˜ ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ๊ฐœ๋…๊ณผ ํŠน์ง• 3 2.1 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ์˜ ๊ฐœ๋… 3 2.2 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ๊ฐœ๋… 6 2.2.1 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ๊ฐœ๋… 8 2.2.2 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ดํ–‰์œ„์˜ ๊ฐœ๋… 11 2.3 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ํŠน์ง• 11 2.4 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ์ข…๋ฅ˜ 16 2.4.1 ์ธํ„ฐ๋„ท ์ธ์‹ ๊ถŒ(ไบบ่บซๆฌŠ) ์นจํ•ด 16 2.4.2 ์ธํ„ฐ๋„ท ์žฌ์‚ฐ๊ถŒ ์นจํ•ด 19 2.4.3 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด 20 3. ์ค‘๊ตญ์˜ ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ํ˜„ํ™ฉ๊ณผ ํ˜•์‹ 22 3.1 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ํ˜„ํ™ฉ 22 3.2 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ํ˜•์‹ 24 3.2.1 ํ™ˆํŽ˜์ด์ง€์™€ ์›น์‚ฌ์ดํŠธ ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด 24 3.2.2 P2P ๋‹ค์šด๋กœ๋“œ ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด 27 3.2.3 ์—…๋กœ๋“œ์™€ ๋‹ค์šด๋กœ๋“œ ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด 29 3.2.4 ๋„คํŠธ์›Œํฌ ์ •๋ณด ์ „์†ก๊ถŒ 30 3.2.5 ์‚ฌ์ด๋ฒ„์Šค์ฟผํŒ… (cyber-squatting 31 3.2.6 ์ธํ„ฐ๋„ท ํ”„๋ผ์ด๋ฒ„์‹œ ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด 33 3.2.7 ์˜จ๋ผ์ธ ๊ฒŒ์ž„ ์ง€์‹์žฌ์‚ฐ๊ถŒ ์นจํ•ด 35 4.์ค‘๊ตญ์˜ ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ๋ณดํ˜ธ์ œ๋„์™€ ๋ฐœ์ „ ์ „๋ง 37 4.1 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ์˜ ๋ณดํ˜ธ์ œ๋„ 37 4.1.1 ์ž…๋ฒ• ๋ณดํ˜ธ์™€ ๋ฌธ์ œ์  37 4.1.2 ์‚ฌ๋ฒ•๋ณดํ˜ธ์™€ ๋ฌธ์ œ์  39 4.2 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ์˜ ๋ณดํ˜ธํ˜„ํ™ฉ 41 4.2.1 ์ค‘๊ตญ ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ๋ณดํ˜ธ ์ฒด๊ณ„ ๋ณด์™„์˜ ํ•„์š”์„ฑ 41 4.2.2 ๋ณดํ˜ธ๋ฐฉ์•ˆ 44 4.2.3 ๋„๋•์„ฑ์˜ ๊ฐ•ํ™” 47 4.3 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ๋ณดํ˜ธ์ œ๋„์˜ ๋ฐœ์ „์ „๋ง 50 4.3.1 ๋ณดํ˜ธ๊ธฐ์ˆ ์˜ ์ง€์†์ ์ธ ๊ฐœ๋ฐœ 50 4.3.2 ใ€Š์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ๋ฒ•ใ€‹์˜ ์ œ์ • 52 4.3.3 ์ธํ„ฐ๋„ท ์ง€์‹์žฌ์‚ฐ๊ถŒ ๋ณดํ˜ธ ์ „๋ฌธ ๊ธฐ๊ตฌ ์„ค๋ฆฝ 53 4.3.4 ์ธํ„ฐ๋„ท ์‹ค๋ช…์ œ์˜ ์‹œํ–‰ 55 4.3.4.1 ์ธํ„ฐ๋„ท ์‹ค๋ช…์ œ ์‹œํ–‰์˜ ๋ฒ•์  ์žฅ์•  55 4.3.4.2 ์ธํ„ฐ๋„ท ์‹ค๋ช…์ œ๊ฐ€ ์ง€์ผœ์•ผ ํ•  ์›์น™ 56 4.3.4.3 ์‹ค๋ช…์ œ๋ฅผ ๋ณด์™„ํ•˜๋Š” ์กฐ์น˜ 59 5. ๊ฒฐ ๋ก  61 ์ฐธ๊ณ ๋ฌธํ—Œ 64 List of Figures Fig. 1 Torrent ์‚ฌ์šฉ๋Ÿ‰ ์ƒ์œ„ 10,000๊ฐœ์˜ ๋ถ„์•ผ๋ณ„ ๋ถ„ํฌ (2010๋…„) 28 Fig. 2 ๋„๋ฉ”์ธ ๋„ค์ž„ ๊ด€๋ จ ๋ถ„์Ÿ์‚ฌ๊ฑด ๋ฐœ์ƒ ๊ฑด์ˆ˜ 3
    corecore