112 research outputs found

    A study on awarding a reasonable amount of damage in case of failing to prove an actual damage in intellectual property infringement

    Get PDF
    ์ฆ๊ฑฐ์กฐ์‚ฌ์˜ ๊ฒฐ๊ณผ์— ์˜ํ•œ ์ฆ๋ช…์— ์˜ํ•ด์„œ๋งŒ ์†ํ•ด์•ก ์ž…์ฆ์„ ์ธ์ •ํ•  ๊ฒฝ์šฐ ์ž…์ฆ์‹คํŒจ๋กœ ๊ท€๊ฒฐ๋  ํ™•๋ฅ ์ด ์ง€์ ์žฌ์‚ฐ๊ถŒ ์‚ฌ๊ฑด์—์„œ๋Š” ์ผ๋ฐ˜ ๋ฏผ์‚ฌ ์‚ฌ๊ฑด๋ณด๋‹ค ํ•œ์ธต ๋†’๋‹ค. ํŠนํ—ˆ๋ฒ• ์ œ128์กฐ ์ œ2ํ•ญ์˜ ์†ํ•ด์•ก ์ถ”์ •์กฐํ•ญ๊ณผ ๊ฐ™์€ ์—ฌํƒ€์˜ ์ž…์ฆ์ฑ…์ž„ ๊ฒฝ๊ฐ์กฐํ•ญ๋งŒ์œผ๋กœ๋Š” ์ด๋Ÿฐ ์–ด๋ ค์›€์„ ์ œ๋Œ€๋กœ ํ•ด์†Œํ•˜๊ธฐ ์–ด๋ ค์›Œ ๋™ ์ œ5ํ•ญ๊ณผ ๊ฐ™์€์ด๋ฅธ๋ฐ” ์ƒ๋‹น์•ก ์†ํ•ด์•ก ์ธ์ •์กฐํ•ญ์˜ ์—ญํ• ์ด ๋ฌด์ฒ™ ์ค‘์š”ํ•˜๋‹ค. ์šฐ๋ฆฌ ์ง€์ ์žฌ์‚ฐ๊ถŒ ๋ฒ•๋ฅ ๋“ค ๊ฑฐ์˜ ๋ชจ๋‘์— ๋„์ž…๋œ ์œ„ ์กฐํ•ญ์€ ์ฆ๋ช…๋„ ๊ฒฝ๊ฐ๋ฟ ์•„๋‹ˆ๋ผ ๋ณ€๋ก  ์ „์ฒด์˜ ์ทจ์ง€์— ์˜ํ•œ ์ฃผ์š”์‚ฌ์‹ค์ธ์ • ๊ฐ€๋Šฅ์„ฑ๋„ ๋ฐฐ์ œํ•˜์ง€ ์•Š์•„,์ผ๋ฐ˜ ๋ฏผ์‚ฌ์‚ฌ๊ฑด์— ๋„๋ฆฌ ์ ์šฉ๋˜๋Š” ์šฐ๋ฆฌ ๋Œ€๋ฒ•์›์˜ ๋น„์Šทํ•œ ํŒ๊ฒฐ์ด๋‚˜ ์ผ๋ณธ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•์˜ ๋น„์Šทํ•œ ์กฐํ•ญ๊ณผ๋Š”๊ตฌ๋ณ„๋˜๋Š” ์˜์˜๋ฅผ ๊ฐ€์ง„๋‹ค.์ด ๊ธ€์—์„œ ์‹ค์‹œํ•œ ํ†ต๊ณ„๋ถ„์„์— ๋”ฐ๋ฅด๋ฉด ์ด๋ฏธ ์ง€์ ์žฌ์‚ฐ๊ถŒ ์นจํ•ด๋กœ ์ธํ•œ ์†ํ•ด๋ฐฐ์ƒ์„ ์ธ์ •ํ•œ ์šฐ๋ฆฌ ํŒ๊ฒฐ์˜์•ฝ 7ํ•  ์ด์ƒ์ด ์œ„ ์กฐํ•ญ์˜ ๋„์›€์„ ๋ฐ›๊ณ  ์žˆ๋Š”๋ฐ”, ๋…ผ๋ž€ ๊ฐ€๋Šฅ์„ฑ์— ๋ถˆ๊ตฌํ•˜๊ณ  ์ ์–ด๋„ ์ง€์ ์žฌ์‚ฐ๊ถŒ ์†Œ์†ก์—์„œ๋Š”์œ„ ์กฐํ•ญ์˜ ์—ญํ• ์„ ์•ž์œผ๋กœ ๋”์šฑ ํ™•๋Œ€ํ•˜์—ฌ์•ผ ํƒ€๋‹นํ•˜๋‹ค๊ณ  ๋ณธ๋‹ค.The probability of failure in fulfilling the burden of proof is much higher in intellectual property cases than in normal civil cases if the courts allow parties to prove the amount of damages only based on examination of the evidence. The role of so-called a reasonable amount of damage acknowledgement provision such as Korean Patent Act, Article 128, paragraph 5 is very important because other paragraphs for reducing the burden of proof including the paragraph 2 in the same article dont seem to work well in resolving the difficulty from higher burden of proof properly. In the perspective that a reasonable amount of damage acknowledgement provision make it possible not only to reduce the level of convincement by proof, arguably, but also to prove a fact in issue only by the circumstantial review of parties arguments by the court, the above provision which has been introduced into almost all Korean intellectual property laws is distinctively important from the similar judgments by Korean Supreme Court and the similar provisions in Japanese intellectual property laws. According to the statistical analysis conducted in this article, more than approximately 70% of the judgments which have awarded the damages caused by intellectual property infringement have based on the above provision and, despite of the potential controversy, the role of the provisions should be expanded at least in the field of intellectual property litigation in the future.OAIID:oai:osos.snu.ac.kr:snu2013-01/102/0000008736/5SEQ:5PERF_CD:SNU2013-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:YEMP_ID:A078845DEPT_CD:931CITE_RATE:0FILENAME:์ธ๊ถŒ๊ณผ์ •์˜-์ง€์ ์žฌ์‚ฐ๊ถŒ ์นจํ•ด์˜ ์†ํ•ด์•ก ์ž…์ฆ ๊ณค๋ž€์‹œ ์ƒ๋‹นํ•œ ์†ํ•ด์•ก์˜ ์ธ์ •์— ๊ด€ํ•˜์—ฌ.pdfDEPT_NM:๋ฒ•ํ•™๊ณผEMAIL:[email protected]_YN:NCONFIRM:

    ISPs' liability under Korean Copyright Act 2006

    Get PDF
    2006. 12. ๊ฐœ์ •๋œ ์ €์ž‘๊ถŒ๋ฒ•์€ ์˜จ๋ผ์ธ์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„์— ๊ด€ํ•˜์—ฌ ๊ตฌ๋ฒ• ์ œ77์กฐ, ์ œ77์กฐ์˜2์— ์„œ ์ด๋ฏธ ์ •ํ•˜์˜€๋˜ ๋‚ด์šฉ์„ ์ œ102์กฐ, ์ œ103์กฐ์— ๊ฑฐ์˜ ๊ทธ๋Œ€๋กœ ์Šน๊ณ„์‹œํ‚ค๊ณ  ์žˆ๋‹ค. ์•„์šธ๋Ÿฌ ์‹ ์„ค๋œ ๊ฐœ์ • ์ €์ž‘๊ถŒ๋ฒ• ์ œ104์กฐ๋Š”, ์ €์ž‘๋ฌผ ์ „์†ก์„ ์ฃผ๋œ ๋ชฉ์ ์œผ๋กœ ํ•˜๋Š” ์†Œ์œ„ ํŠน์ˆ˜ํ•œ ์œ ํ˜•์˜ ์˜จ๋ผ์ธ์„œ๋น„์Šค์ œ๊ณต์ž์—๊ฒŒ ๋‹นํ•ด ์ €์ž‘๋ฌผ ๋“ฑ์˜ ๋ถˆ๋ฒ•์ ์ธ ์ „์†ก์„ ์ฐจ๋‹จํ•˜๋Š” ์†Œ์œ„ ๊ธฐ์ˆ ์ ์ธ ์กฐ์น˜ ์˜๋ฌด๋ฅผ ๋ถ€๊ณผํ•˜์˜€๊ณ , ์ด๋ฅผ ๋ถˆ์ดํ–‰ํ•˜๋ฉด ์ œ์žฌ๋ฅผ ๊ณผํ•˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ด์œ ๋กœ ๋ฒ• ์ œ104์กฐ๋Š” ํ–ฅํ›„ ์ €์ž‘๊ถŒ๋ฒ• ์žฌ๊ฐœ์ •๊ณผ์ •์—์„œ ์‚ญ์ œํ•จ์ด ๋” ํ•ฉ๋ฆฌ์ ์ด๋‹ค. ์ฒซ์งธ, ISP์˜ ์ฑ…์ž„์˜ ์ œํ•œ์š”๊ฑด์ด ์•„๋‹ˆ๋ผ ์ฑ…์ž„์˜ ์š”๊ฑด์„ ์ •ํ•œ ์ œ104์กฐ์™€ ๊ฐ™์€ ์ž…๋ฒ•๋ฐฉ์‹์€ ์™ธ๊ตญ์—๋„ ์„ ๋ก€๊ฐ€ ๋“œ๋ฌผ๋‹ค. ๋‘˜์งธ, ํŠน์ˆ˜ํ•œ ์œ ํ˜•์˜ ์˜จ๋ผ์ธ์„œ๋น„์Šค์ œ๊ณต์ž ๊ฐœ๋…์ด ๋ชจํ˜ธํ•˜์—ฌ ๊ฑฐ์˜ ๋ชจ๋“  ์œ ํ˜•์˜ ISP๋“ค์—๊ฒŒ ํ™•์žฅ ๋‚จ์šฉ๋  ์šฐ๋ ค๊ฐ€ ์žˆ๋‹ค. ์…‹์งธ, ๋ฌธ๊ด‘๋ถ€์˜ ๊ณ ์‹œ์— ๋”ฐ๋ผ ๊ธฐ์ˆ ์  ๋ณดํ˜ธ์กฐ์น˜๊ฐ€ ๋ฌด์—‡์ธ์ง€ ํ˜„์‹ค์ ์œผ๋กœ ํ™•์ •๋˜๋Š” ๊ฒƒ์€ ๋ถ€์ ์ ˆํ•˜๋‹ค. ๋„ท์งธ, ์ œ104์กฐ์™€ ๊ฐ™์€ ์กฐํ•ญ์€ ์ €์ž‘๊ถŒ๋ณดํ˜ธ๋ฅผ ๊ทนํžˆ ๊ฐ•์กฐํ•˜์—ฌ์˜จ ๋ฏธ๊ตญ์—์„œ์กฐ์ฐจ ์•„์ง ์ž…๋ฒ•๋˜์ง€ ์•Š์•˜๋‹ค.The Korean Copyright Act amended in Dec. 2006 includes section 102 & 103 very similar to the preceding section 77 & 77-2 which were ISP's copyright infringement liability limitation provisions. The new section 104 in the Act also imposes the duty along with penalty upon socalled a specific type of ISP whose main purpose is distribution of works by transmission, to accommodate so-called technological measures for interrupting illegal distribution of copyrighted materials. However, it would be more reasonable to rescind the section 104 in the future amendment of the Act, because of the following reasons: First, there is rare precedents in the world for sec. 104 which is not ISP's liability limitation provision but ISP's liability creating provision. Second, the scope of sec. 104 may be improperly expanded to almost all ISPs owing to an ambiguous definition for a specific type of ISP. Third, it is unfair that just notification by Korean Ministry of Culture & Tourism actually will determine what the technological measures are to be. Fourth, even USA which has put great stress on the copyright protection has not yet similar provision to sec 104.OAIID:oai:osos.snu.ac.kr:snu2007-01/102/0000008736/3SEQ:3PERF_CD:SNU2007-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:NEMP_ID:A078845DEPT_CD:931CITE_RATE:0FILENAME:[3-2 200703] ๊ฐœ์ • ์ €์ž‘๊ถŒํ•˜์˜ isp ์ฑ…์ž„ - ๋ฐ•์ค€์„.pdfDEPT_NM:๋ฒ•ํ•™๊ณผCONFIRM:

    Personal Information from the Perspective of Intellectual Property

    Get PDF
    ํ•œ๊ตญ์€ ๋ฌผ๋ก  ์„ธ๊ณ„์˜ ๊ฑฐ์˜ ๋ชจ๋“  ๊ฐ๊ตญ์€, ๋„๋ฆฌ ๋ฌดํ˜•(็„กๅฝข)์˜ ์ •๋ณด์— ๋Œ€ํ•ด ๊ฐ€์žฅ ํšจ์œจ์ ์ธ ๊ด€๋ฆฌ๋ฅผ ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์ง์ ‘์ ์ธ ๊ด€๋ จ์ž์—๊ฒŒ ๋งˆ์น˜ ๋ฏผ๋ฒ•์ƒ ์†Œ์œ ๊ถŒ๊ณผ ๋น„์Šทํ•œ ๋…์ ๊ถŒ์„๋ถ€์—ฌํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ๊ทœ์œจํ•˜๋Š” ๋ฒ•๋ฅ ์ฒด๊ณ„๋ฅผ, ์ด๋ฏธ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ• ์ œ๋„์˜ ์ˆ˜๋ฆฝ๊ณผ์ •์—์„œ์ฒดํ—˜ํ•œ ๋ฐ” ์žˆ๋‹ค. ์ด๋Ÿฐ ๊ฒฝํ—˜์€ ํ˜„์žฌ ์น˜์—ดํ•˜๊ฒŒ ๋‹คํˆฌ์–ด์ง€๋ฉด์„œ ์ ์  ์ค‘์š”๋ฌธ์ œ๊ฐ€ ๋˜๊ณ  ์žˆ๋Š” ๊ฐœ์ธ์ •๋ณด๋ผ๋Š” ๋˜ ํ•˜๋‚˜์˜ ๋ฌดํ˜•์  ์ •๋ณด์— ๊ด€ํ•ด ์žฅ์ฐจ ์˜ฌ๋ฐ”๋ฅธ ๋ณดํ˜ธ์ฒด๊ณ„๋ฅผ ๊ฐ๊ตญ์ด ์ •๋ฆฝํ•ด๋‚˜๊ฐ€๋Š” ๋ฐ ์†Œ์ค‘ํ•œ ๋ฐ‘๊ฑฐ๋ฆ„์ด ๋  ๊ฒƒ์ด๋‹ค.๋ณธ๋ž˜์˜ ๊ฐœ์ธ์ •๋ณด๋Š” ํ”„๋ผ์ด๋ฒ„์‹œ๊ถŒ ํ˜น์€ ์ธ๊ฒฉ๊ถŒ์˜ ๊ทœ์œจ์ด ์ ํ•ฉํ•œ ๋Œ€์ƒ์— ๋ถˆ๊ณผํ•˜๋”๋ผ๋„ ๊ทธ๋Ÿฐ ๊ฐœ๋ณ„์ ์ธ ๊ฐœ์ธ์ •๋ณด๋“ค์ด ๋Œ€๊ฑฐ ์ง‘ํ•ฉ๋œ ์ด๋ฅธ๋ฐ” ์ง‘ํ•ฉ๊ฐœ์ธ์ •๋ณด๋Š” ๋น„๊ฒฝ์Ÿ์ ์ธ ์žฌ์‚ฐ๊ถŒ์˜ ์„ฑ์งˆ์„ ๊ฐ€์ง€๊ณ  ์žˆ๊ธฐ ๋•Œ๋ฌธ์—, ๊ทธ ๋ณดํ˜ธ์ฒด๊ณ„๋ฅผ ์žฅ์ฐจ ๋ฐ”๋ฅด๊ฒŒ ์ •๋ฆฝํ•˜๋Š”๋ฐ ์žˆ์–ด ์ž…๋ฒ• ๋‹น๊ตญ์€ ๊ณผ๊ฑฐ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ• ์ˆ˜๋ฆฝ์˜ ๊ฒฝํ—˜์„ ์ž˜ ํ™œ์šฉํ•˜์—ฌ์•ผ๋งŒ ํ•  ๊ฒƒ์ด๋‹ค. ์ด์— ๋”ฐ๋ฅด๋ฉด ์ƒ๋ž˜์ ์ธ ๊ฐœ์ธ์ •๋ณด๋ณด์œ ์ž๋ณด๋‹ค ์•„์ง ์†Œํ™€ํžˆ ์ทจ๊ธ‰๋˜๊ณ  ์žˆ๋Š” ์ง‘ํ•ฉ๊ฐœ์ธ์ •๋ณด์˜ ์ž‘์„ฑ์ž์—๊ฒŒ, ๋ณ„๋„์˜ ๋…์ ๊ถŒ์„ ๋ถ€์—ฌํ•˜๊ฑฐ๋‚˜ ์ ์–ด๋„ ๋ถ€๋‹นํ•œ ์นจํ•ด๋กœ๋ถ€ํ„ฐ ์†Œ๊ทน์ ์ธ ๋ณดํ˜ธ๋ฅผ ๊ตฌํ• ๊ถŒ๋ฆฌ๋ฅผ ๋ถ€์—ฌํ•˜๋Š” ๋“ฑ, ์ง€๊ธˆ๋ณด๋‹ค๋Š” ๋” ํŠผํŠผํ•œ ๋ฒ•์  ์ง€์œ„๋ฅผ ๋ถ€์—ฌํ•˜๋Š” ๊ฒƒ์ด ํ–ฅํ›„ ํ•œ๊ตญ์˜๊ฐœ์ธ์ •๋ณด ๋ฒ•์ œ์—์„œ ํ•„์š”ํ•œ ๋ฐฉํ–ฅ์ด๋ผ๊ณ  ์‚ฌ๋ฃŒ๋œ๋‹ค.Not only Korea but also almost all countries in the world have already experienced, through the adoption of intellectual property law system, a new legal protection system whose purpose is to achieve the most effective management of intangible information by granting exclusive rights similar to the ownership under the civil law to the closely related person or entity. Such experience will be an important foundation for each country to establish a proper legal protection system in the future for another type of intangible information as personal information which is becoming increasingly important but still under severe debate. Because so-called collective personal information which is the result of massive gathering of personal information has non-rivalrous nature of intangible property even though the original personal information is no more than the object of privacy right or moral rights, the legislature should refer to the past experience from adoption of intellectual property law when it considers the proper protection system in the future especially for collective personal information. According to this perspective, the future appropriate amendment of present legal system for personal information in the Korea would be to give more strong legal status by granting exclusive rights or at least passive protection from unfair infringement to the aggregator of collective personal information who has been relatively neglected than inherent holder of personal information.OAIID:oai:osos.snu.ac.kr:snu2013-01/102/0000008736/7SEQ:7PERF_CD:SNU2013-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:YEMP_ID:A078845DEPT_CD:931CITE_RATE:0FILENAME:์ •๋ณด๋ฒ•ํ•™-17-3-01-๋ฐ•์ค€์„.pdfDEPT_NM:๋ฒ•ํ•™๊ณผEMAIL:[email protected]_YN:NCONFIRM:

    ์ธํ„ฐ๋„ท์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„์— ๊ด€ํ•œ ๊ตญ๋‚ด ํŒ๋ก€์˜ ๋™ํ–ฅ : ์†Œ๋ฆฌ๋ฐ”๋‹ค ํ•ญ์†Œ์‹ฌํŒ๊ฒฐ๋“ค์„ ์ค‘์‹ฌ์œผ๋กœ

    Get PDF
    Precedent decisions in Korea, whose issues were the Internet Service Providers secondary liability derived from userscopyright infringement, depend on the United States decisions for their fundamental structures. Former Cocktail 98decision and Internet Empiredecision, latter Sora-badatrial decisions faithfully imported the contributory liability and vicarious liability principles under the US case law into ISPs liability theoryin Korea. Moreover, recent Sora-bada criminal appellate decision adopted the Sony doctrine, which had been presented in Sony decision by the US Supreme Court, as implied criteria. So, The Supreme Court of Korea in Sora-bada cases would be likely to substantially consult the Grokster decision of the US Supreme Court on June 27, 2005. But there is a definite limit to do so, because the Grokster decision is nothing but the application of the so-called inducement theory, which has been codified only in US patent law, to Groksters specific facts.์ด์šฉ์ž๋“ค์˜ ์ €์ž‘๊ถŒ์นจํ•ดํ–‰์œ„์— ๋”ฐ๋ฅธ ์ธํ„ฐ๋„ท์„œ๋น„์Šค์ œ๊ณต์ž์˜ ๋ถ€์ˆ˜์ ์ธ ์ฑ…์ž„์„ ๋‹ค๋ฃฌ ํ•œ๊ตญ์˜ ๊ทธ๊ฐ„ ํŒ๋ก€๋“ค์€ ๋น„๋ก ๋ช…์‹œ์ ์œผ๋กœ ์„ ์–ธํ•˜๊ณ  ์žˆ์ง€๋Š” ์•Š์œผ๋‚˜, ๋‚ด์šฉ์ƒ ๋งŽ์€ ๋ถ€๋ถ„์„ ็พŽๅœ‹์—์„œ์˜ ๋…ผ์˜์— ์˜์ง€ํ•˜๊ณ  ์žˆ๋‹ค. ์ข…๋ž˜ ์นตํ…Œ์ผ 98 ๅˆคๆฑบ์ด๋‚˜ ์ธํ„ฐ๋„ท์ œ๊ตญ ๅˆคๆฑบ, ๋‚˜์•„๊ฐ€ ์†Œ๋ฆฌ๋ฐ”๋‹ค 1์‹ฌํŒ๊ฒฐ๋“ค์ด ๋ฏธ๊ตญ ํŒ๋ก€๋ฒ•์ƒ์˜ ๅฏ„่ˆ‡่ฒฌไปป์ด๋‚˜ ไปฃไฝ่ฒฌไปป์˜ ๋ฒ•๋ฆฌ๋ฅผ ์ถฉ์‹คํ•˜๊ฒŒ ๋„์ž…ํ•˜๊ณ  ์žˆ๊ณ , ์ตœ๊ทผ ์†Œ๋ฆฌ๋ฐ”๋‹ค ํ˜•์‚ฌํ•ญ์†Œ์‹ฌ์€ ๋ฏธ ์—ฐ๋ฐฉ๋Œ€๋ฒ•์›์˜ Sony ํŒ๊ฒฐ์—์„œ ์ œ์‹œ๋œ Sony ์›์น™์„ ์•”๋ฌต์ ์ธ ํŒ๋‹จ๊ธฐ์ค€์œผ๋กœ ์ฑ„ํƒํ•˜๊ณ  ์žˆ๋‹ค. ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ ํ–ฅํ›„ ์šฐ๋ฆฌ ๋Œ€๋ฒ•์›์ด ์†Œ๋ฆฌ๋ฐ”๋‹ค ์‚ฌ๊ฑด์„ ํ•ด๊ฒฐํ•จ์— ์žˆ์–ด ๋ฏธ ์—ฐ๋ฐฉ๋Œ€๋ฒ•์›์ด 2005. 6. 27. ๋‚ด๋ฆฐ ๊ทธ๋ก์Šคํ„ฐ(Grokster) ํŒ๊ฒฐ์„ ์ƒ๋‹นํžˆ ์ฐธ๊ณ ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ํ•˜์ง€๋งŒ ๊ทธ๋ก์Šคํ„ฐ ํŒ๊ฒฐ์€ ๋ฏธ ํŠนํ—ˆ๋ฒ•์ƒ ํŠน์œ ํ•œ ์†Œ์œ„่ช˜็™ผ๏งค่ซ–์„ ๊ทธ๋ก์Šคํ„ฐ์˜ ํŠน์ˆ˜ํ•œ ์‚ฌ์‹ค๊ด€๊ณ„์— ์‘์šฉํ•œ ๊ฒƒ์— ๋ถˆ๊ณผํ•˜๋ฏ€๋กœ, ์œ„์™€ ๊ฐ™์€ ์ฐธ๊ณ ์—๋Š” ๋ถ„๋ช…ํ•œ ํ•œ๊ณ„๊ฐ€ ์žˆ๋Š” ๊ฒƒ์ด๋‹ค.OAIID:oai:osos.snu.ac.kr:snu2005-01/102/0000008736/1SEQ:1PERF_CD:SNU2005-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:NEMP_ID:A078845DEPT_CD:931FILENAME:[1-2 200509] ์ธํ„ฐ๋„ท์„œ๋น„์Šค์ œ๊ณต์ž์˜ ์ฑ…์ž„์— ๊ด€ํ•œ ๊ตญ๋‚ด ํŒ๋ก€์˜ ๋™ํ–ฅ - ๋ฐ•์ค€์„.pdfDEPT_NM:๋ฒ•ํ•™๊ณผCONFIRM:

    ์š”์ธ๋ถ„์„ ๋ชจํ˜•์˜ ๊ฐ•๊ฑด์„ฑ์— ๋Œ€ํ•˜์—ฌ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (์„์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์‹ฌ๋ฆฌํ•™๊ณผ, 2013. 2. ๊น€์ฒญํƒ.In this study, model robustness was examined for mainly two factor analysis models, TFA(Traditional Factor Analysis) and BCFA(Bayesian Copula Factor Analysis). There were three abnormal data scenarios, which were outlier, kurtosis, and high correlation matrix cases. Both models were applied to each of the scenario data. It was revealed that BCFA model outperforms TFA model across the scenarios: the former was superior in terms of robustness when compared to the latter. In fact, BCFA could resolve the big loading problems which arise when TFA is applied to the dataset, revealing the factor structure clearly. Additionally, some related issues are discussed in this article.Introduction-----------------------------------------------------------------------------------------------1 Factor analysis models----------------------------------------------------------------------------------2 Traditional factor analysis model (TFA)---------------------------------------------------------2 Bayesian factor analysis model (BFA)-----------------------------------------------------------4 Bayesian Copula Factor analysis model (BCFA)--------------------------------------------------5 Domains of Comparison--------------------------------------------------------------------------------7 Outliers--------------------------------------------------------------------------------------------------7 Kurtosis------------------------------------------------------------------------------------------------10 High correlations among variables-----------------------------------------------------------------10 Model comparison-------------------------------------------------------------------------------------12 Study 1-------------------------------------------------------------------------------------------------12 Study 2-------------------------------------------------------------------------------------------------27 Study 3-------------------------------------------------------------------------------------------------36 General discussion-------------------------------------------------------------------------------------40 Conclusion-----------------------------------------------------------------------------------------------43 References-----------------------------------------------------------------------------------------------45 Abstract in Korean-------------------------------------------------------------------------------------47Maste

    Usefulness of Urinary Trypsinogen-2 Dipstick Test for Diagnosis of Acute Pancreatitis

    Get PDF
    Background/Aims: The clinical usefulness of urinary trypsinogen-2 dipstick test is still in controversy. We evaluated the usefulness of urinary trypsinogen-2 dipstick test in patients with acute pancreatitis. Methods: Urinary trypsinogen-2 dipstick test was prospectively performed in 50 patients with acute pancreatitis, 50 patients with non-pancreatic abdominal pain, and 50 healthy controls. Results: On admission, urinary trypsinogen-2 dipstick test was positive in 36 of 50 patients with acute pancreatitis (sensitivity, 72%) and in 4 of 50 patients with non-pancreatic abdominal pain (specificity, 92%). On the other hand, it was all negative in controls. The sensitivity and specificity of serum lipase were 78% and 94%, respectively. At 24 hours after admission, the positive rate of urinary trypsinogen-2 dipstick test rose from 72% to 94% (p๏ผ0.02). The results of urinary trypsinogen-2 dipstick test was positive in 14 of 15 patients with severe pancreatitis and 22 of 35 patients with mild pancreatitis according to the criteria by Atlanta International Symposium, 1992. Conclusions: Urinary trypsinogen-2 dipstick test is comparable to serum lipase in diagnosing acute pancreatitis. Delayed measurement and severe pancreatitis are more likely to yield positive results with urinary trypsinogen-2 dipstick test. Thus, we suggest that the cut-off value of urinary trypsinogen-2 dipstick test should be lowered to increase its sensitivity.ope

    ๊ฒŒ์ž„ ์•„์ดํ…œ์˜ ๋ฒ•์  ๋ฌธ์ œ

    No full text
    OAIID:oai:osos.snu.ac.kr:snu2009-01/102/0000008736/2SEQ:2PERF_CD:SNU2009-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:NEMP_ID:A078845DEPT_CD:931FILENAME:์ฒจ๋ถ€๋œ ๋‚ด์—ญ์ด ์—†์Šต๋‹ˆ๋‹ค.DEPT_NM:๋ฒ•ํ•™๊ณผEMAIL:[email protected]_YN:NCONFIRM:

    Trademark use on the Internet, the concept and its position โ…ข - mainly about the cases related to meta tags or Hangul domain names -

    No full text
    ์šฐ๋ฆฌ ํŒ๋ก€๋Š” ๋Œ€์ฒด๋กœ ์ธํ„ฐ๋„ท๊ณต๊ฐ„์—์„œ๋„ ๊ฒฝ์Ÿ์ž์— ์˜ํ•œ ์ƒํ‘œ์˜ ์‚ฌ์šฉ์ด ์กด์žฌํ•˜๋ ค๋ฉด ๊ถŒ๋ฆฌ์ž์˜ ํ•ด๋‹น ์ƒํ‘œ๊ฐ€ ์†Œ๋น„์ž์—๊ฒŒ ์‹œ๊ฐ์ ์œผ๋กœ ์ธ์‹๋˜์–ด์•ผ ํ•œ๋‹ค๋Š” ์ž…์žฅ์„ ์ทจํ•˜๊ณ  ์žˆ์ง€๋งŒ, ๋ฉ”ํƒ€ํƒœ๊ทธ๋‚˜ ํ•œ๊ธ€๋„๋ฉ”์ธ์ด๋ฆ„์— ๊ด€ํ•œ ์ผ๋ถ€ ํŒ๋ก€๋Š” ํ•ด์„์ƒ ๋ฐ˜๋Œ€์ž…์žฅ์„ ์ทจํ•˜๊ณ  ์žˆ๋Š” ๋“ฏํ•˜๋‹ค. ์ธํ„ฐ๋„ท ๊ณต๊ฐ„์—์„œ๋Š”, ์นจํ•ด์ž๊ฐ€ ์ƒํ‘œ๊ถŒ์„ ์นจํ•ดํ•˜๋ ค๋ฉด ๊ฑฐ์˜ ์–ธ์ œ๋‚˜ ์ž์‹ ์˜ ์ƒํ’ˆ์ƒ์— ๊ถŒ๋ฆฌ์ž์˜ ์ƒํ‘œ๋ฅผ ๋ถ€์ฐฉํ•˜๋Š” ๋“ฑ ์‹œ๊ฐ์ ์œผ๋กœ ์†Œ๋น„์ž์—๊ฒŒ ์ œ์‹œํ•˜์—ฌ์•ผ ํ–ˆ๋˜ ํ˜„์‹ค๊ณต๊ฐ„์—์„œ์™€ ๋‹ฌ๋ฆฌ, ์ƒํ‘œ๊ฐ€ ๊ฐ€์ง„ ๊ณ ๊ฐํก์ž…๋ ฅ์„ ๊ฒฝ์Ÿ์—…์ž๊ฐ€ ํ™œ์šฉํ•˜๊ณ  ์žˆ์Œ์—๋„ ์†Œ๋น„์ž์—๊ฒŒ ํ•ด๋‹น ์ƒํ‘œ๊ฐ€ ์ง์ ‘ ๋ณด์ด์ง€๋Š” ์•Š๋Š”๋‹ค. ์šฐ๋ฆฌ ์ƒํ‘œ๋ฒ•์€ ์ด๋Ÿฐ ํ˜„์‹ค๊ณต๊ฐ„๊ณผ ์ธํ„ฐ๋„ท๊ณต๊ฐ„์˜ ์ฐจ์ด์ ์„ ๋ฏธ์ฒ˜ ์ƒํ‘œ๋ฒ•์ƒ ์ƒํ‘œ์˜ ์‚ฌ์šฉ ๋ฌธ๊ตฌ์— ๋ฐ˜์˜ํ•˜์ง€ ๋ชปํ•œ ์ƒํƒœ์ด๋ฏ€๋กœ ๊ทธ๋Ÿฐ ์‚ฌ์ •์„ ๊ฐ์•ˆํ•˜์—ฌ ์žฅ์ฐจ ๊ด€๋ จ๊ฐœ์ •์ด ์žˆ์„ ๋•Œ๊นŒ์ง€ ์ƒํ‘œ๋ฒ•์˜ ๊ด€๋ จ๊ทœ์ •์„ ์•„์ฃผ ์‹ ์ถ•์ ์œผ๋กœ ํ•ด์„ํ•˜์—ฌ์•ผ ํ•œ๋‹ค. ํ˜„ํ–‰ ์ƒํ‘œ๋ฒ•์ด ์‹œ๊ฐ์ ์œผ๋กœ ์ธ์‹๊ฐ€๋Šฅํ•œ ๊ฒƒ๋งŒ ์ƒํ‘œ๋กœ ์ธ์ •ํ•˜๊ณ  ์žˆ๋”๋ผ๋„ ์šฐ๋ฆฌ ํŒ๋ก€๋Š” ๋น„์‹œ๊ฐ์  ํ™œ์šฉ ์—ญ์‹œ ์‹œ๊ฐ์  ํ™œ์šฉ๊ณผ ๋”๋ถˆ์–ด ์ƒํ‘œ์˜ ์‚ฌ์šฉ์ด ๋  ์ˆ˜ ์žˆ๋‹ค๋Š” ์‚ฌ์‹ค์„ ์ด๋ฏธ ๊ฐ„์ ‘์ ์œผ๋กœ ์‹œ์ธํ•˜์—ฌ ์™”์Œ์„ ์—ฌ๊ธฐ์„œ ์œ ์˜ํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค.While many Korean court's cases about the internet space generally have taken a position trademark use by competitor exists only when the mark is visually recognizable to the consumers, some case law on meta tags and so-called Hangul domain name arguably took the opposite position. Unlike in the real world where any competitor should almost always visually present the disputed mark to the consumer by, as an example, attaching the trademark to his counterfeits, the mark in the cyberspace is invisible to the consumers even though the competitor misappropriates goodwill of the mark owner. Because the statutory provisions for trademark use requirement in Korea have not yet reflected the above mentioned difference between the real world and cyberspace, the relevant provision in the Korean Trademark Act should inevitably be interpreted very flexibly to fill the gap in the current law until an amendment to the law will be made in the future. Here, we should be careful about the fact that our courts already have indirectly acknowledged non-visual use of a trademark and visual trademark use can be a type of trademark use though Korean Trademark Act defines trademark as a visually recognizable construct.OAIID:oai:osos.snu.ac.kr:snu2011-01/102/0000008736/6SEQ:6PERF_CD:SNU2011-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:YEMP_ID:A078845DEPT_CD:931FILENAME:์ฒจ๋ถ€๋œ ๋‚ด์—ญ์ด ์—†์Šต๋‹ˆ๋‹ค.DEPT_NM:๋ฒ•ํ•™๊ณผEMAIL:[email protected]_YN:NCONFIRM:

    Is it illegal to download illegal material from internet? - In relation to the requirement of Reproduction for Private Use exception in Korean Copyright Act

    No full text
    ์šฐ๋ฆฌ ์ €์ž‘๊ถŒ๋ฒ• ์ œ30์กฐ ์‚ฌ์ ๋ณต์ œ ์กฐํ•ญ์˜ ์š”๊ฑด ํ•ด์„๊ณผ ๊ด€๋ จํ•˜์—ฌ, ๊ณผ๊ฑฐ P2P ๊ธฐ์ˆ ์˜ ์†Œ๋ฆฌ๋ฐ”๋‹ค ์‚ฌ๊ฑด์—์„œ ์‹œ์ž‘ํ•˜์—ฌ ์ŠคํŠธ๋ฆฌ๋ฐ ๊ธฐ์ˆ ์˜ ๋ฒ…์Šค๋ฎค์ง ์‚ฌ๊ฑด์„ ๊ฑฐ์ณ ์›นํ•˜๋“œ ๊ธฐ์ˆ ์— ๋Œ€ํ•œ ์ตœ๊ทผ ์‚ฌ๊ฑด(์„œ์šธ์ค‘์•™์ง€๋ฐฉ๋ฒ•์›์˜ 2008์นดํ•ฉ968 ํŒ๊ฒฐ)์— ์ด๋ฅด๊ธฐ๊นŒ์ง€ ๊ณ„์† ์„ธ๋ถ€์ ์ธ ์Ÿ์ ์ด ๋ณ€ํ™”ํ•˜๊ณ  ์žˆ๋‹ค. ์œ„ 2008์นดํ•ฉ968ํ˜ธ ํŒ๊ฒฐ์—์„œ๋Š” ๊ฐ€์ • ๋ฐ ์ด์— ์ค€ํ•˜๋Š” ๋ฒ”์œ„์ธ๊ฐ€๊ฐ€ ๋ฌธ์ œ๋˜์ง€ ์•„๋‹ˆํ•˜๊ณ  ๋ถˆ๋ฒ•์›๋ณธ์œผ๋กœ๋ถ€ํ„ฐ ๋ณต์ œํ•œ ๋•Œ๋ผ๋ฉด ์‚ฌ์ ๋ณต์ œ๋ฅผ ์ฃผ์žฅํ•  ์ˆ˜ ์—†๋Š” ์ง€๊ฐ€ ์Ÿ์ ์ด์—ˆ๋‹ค. ์ด์™€ ๊ด€๋ จํ•˜์—ฌ 2009. 6. 19. ๊ฐœ์ •๋œ ์ผ๋ณธ ์ €์ž‘๊ถŒ๋ฒ•์€ ์œ„๋ฒ•์†ก์‹ ์„ ์•Œ๊ณ  ์ˆ˜์‹ ํ•œ ๊ฒฝ์šฐ๋ฅผ ์‚ฌ์  ๋ณต์ œ์—์„œ ์ œ์™ธํ•˜๊ณ  ์žˆ๋‹ค. ์•„์šธ๋Ÿฌ 2008. 1. 1.๋ถ€ํ„ฐ ์‹œํ–‰์ค‘์ธ ๋…์ผ ์ €์ž‘๊ถŒ๋ฒ•์€ ๋ช…๋ฐฑํ•˜๊ฒŒ ๋ถˆ๋ฒ•์ ์œผ๋กœ ๊ณต์ค‘์ด ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š” ์›๋ณธ์„ ์‚ฌ์ ๋ณต์ œ์˜ ์˜์—ญ์—์„œ ์ œ์™ธํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ๋ฏธ๊ตญ์˜ ์ƒํ™ฉ์€ ์›๋ณธ์˜ ๋ถˆ๋ฒ•์„ฑ์ด ์ด์šฉ์ž์˜ ์•…์˜๋ฅผ ๊ฒฐ์ •ํ•˜๋Š” ํ•œ ์š”์†Œ๋กœ์„œ ์ด์šฉ์ž์—๊ฒŒ ๋ถˆ๋ฆฌํ•˜๊ฒŒ ๊ณ ๋ ค๋˜๋Š” ์š”์†Œ์— ๋ถˆ๊ณผํ•˜์ง€ ๊ทธ๊ฒƒ ๋•Œ๋ฌธ์— ๊ณต์ •์ด์šฉ ์„ฑ๋ฆฝ์ด ๋ถˆ๊ฐ€๋Šฅํ•ด์ง€๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋ผ๋Š” ํƒœ๋„๋ฅผ ๋ณด์ด๊ณ  ์žˆ๋‹ค. ํ•œ๊ตญ์—์„œ์˜ ์ผ๋ถ€ ํ•™์„ค์ด๋‚˜ ์œ„ 2008์นดํ•ฉ968ํ˜ธ ํŒ๊ฒฐ์€ ์ธํ„ฐ๋„ท์ƒ ๋ถˆ๋ฒ•์›๋ณธ์„ ๋‹ค์šด๋กœ๋“œ ๋ฐ›๋Š” ์ด์šฉํ–‰์œ„๋ผ๋ฉด ๊ณต์ •ํ•œ ์‚ฌ์ ๋ณต์ œ๋กœ ๋ณผ ์ˆ˜ ์—†๋‹ค๋Š” ์ž…์žฅ์„ ์ทจํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ, ์ด๋Š” ํ˜„ํ–‰ ์ €์ž‘๊ถŒ๋ฒ• ํ•ด์„์˜ ํ•œ๊ณ„๋ฅผ ๋ฒ—์–ด๋‚œ ๊ฒƒ์ด์–ด์„œ ๋ถ€๋‹นํ•˜๋‹ค. ์ธํ„ฐ๋„ท ์‹œ๋Œ€์— ์‚ฌ์ ๋ณต์ œ์กฐํ•ญ์ด ์ž˜ ๋งž์ง€ ์•Š๋Š” ์ƒํ™ฉ์ด ๋œ ์ด์ƒ ์œ„ ์กฐํ•ญ์„ ์กด์†์‹œํ‚ค๋ ค๋ฉด ๊ฒฐ๊ตญ ์ž…๋ฒ•๋ก ์  ๊ต์ •์ด ๋ถˆ๊ฐ€ํ”ผํ•˜๋‹ค. ๊ทธ ํ•ด๊ฒฐ์ฑ… ์ค‘ ๊ฐ€๋ น ๋ช…๋ฐฑํ•˜๊ฒŒ ์œ„๋ฒ•ํ•œ ์†ก์‹ ์„ ์ˆ˜์‹ ํ•œ ๋•Œ๋ฅผ ์ œ์™ธํ•˜๋Š” ๋“ฑ ์‚ฌ์ ๋ณต์ œ์˜ ๋ฒ”์œ„๋ฅผ ์ธํ„ฐ๋„ท๊ณต๊ฐ„์—์„œ ๋‹ค์‹œ ์ถ•์†Œํ•˜๋Š” ๋ฐฉ๋ฒ•๋„ ์ด๋ก ์ƒ ๊ฐ€๋Šฅํ•˜๋‹ค. ํ•˜์ง€๋งŒ ๊ทธ ์œ„์ถ•ํšจ๊ณผ์˜ ํํ•ด๊ฐ€ ํด ๊ฒƒ์ด๋‹ค. ๋”ฐ๋ผ์„œ ์ฐจ๋ผ๋ฆฌ ๋ณต์ œ๋ถ€๊ณผ๊ธˆ ์ œ๋„์˜ ๋„์ž…์„ ์ด์ œ๋Š” ์ง„์ง€ํ•˜๊ฒŒ ๊ฒ€ํ† ํ•˜๊ณ  ๋…ธ๋ ฅํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค.The detailed issues in relation to the requirement of Reproduction for Private Use exception in Korean Copyright Act has continuously changed from the Sori-Bada cases on P2P technology, through the Bucks cases on streaming technology, to the recent PDBox case on web storage technology. In the PDBox case, whether downloading from illegal materials make it impossible to claim the defense of Private Use exception or not was the central issue while the other issue of whether or not "within the limit of is personal, family or the equivalent use" was no more significant. In this regard, Japanese new copyright act revised on June 19. 2009 excluded a user's downloading from their Private Use exception if he knew the illegality of the transmission. And the German new copyright act (effective on Jan. 1. 2008) also excluded a user's downloading if he reproduces a copyrighted origin which was manifestly unlawfully made available to the public. However, US courts have ruled, the fact that the copies obtained were unauthorized did not preclude fair use even though the fact could be a factor in determining the defendant's bad faith and would negatively affect in the court's finding of fair use. In Korea, some scholars and the above PDBox case decision asserted that it couldn't be classified as a fair Private Use if it was to download illegal material from internet. But such arguments seem to be implausible because those are far beyond the scope of the appropriate interpretation of the current Korean Copyright Act. So, it is unavoidable to find the new legislative frameworks for salvation of Private Use exception in the internet era when the Private Use exception itself never goes quite smoothly. One of those legislative frameworks could be one more limitation of Private Use exception's scope such as, say, "not being the reproduction from manifestly illegal transmission." However, a shrinking effect will be huge. As a result, I recommend that we should seriously consider and make an effort for the introduction of the levy system.OAIID:oai:osos.snu.ac.kr:snu2010-01/102/0000008736/1SEQ:1PERF_CD:SNU2010-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:YEMP_ID:A078845DEPT_CD:931FILENAME:์ฒจ๋ถ€๋œ ๋‚ด์—ญ์ด ์—†์Šต๋‹ˆ๋‹ค.DEPT_NM:๋ฒ•ํ•™๊ณผEMAIL:[email protected]_YN:NCONFIRM:

    The relationship between Intellectual property law andother laws in Korea

    No full text
    ์ด ๊ธ€์€ ํ•œ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•์ด๋ž€ ๋ฌด์—‡์ธ๊ฐ€๋ฅผ ๋‹ค๋ฃฌ 3๋ถ€์ž‘ ์ค‘ ๋งˆ์ง€๋ง‰ ๋ถ€๋ถ„์ด๋‹ค. ์ด ๊ธ€์—์„œ๋Š” ํ•œ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•๊ณผ ํ•œ๊ตญ์˜ ๋ฏผ๋ฒ•?์ƒ๋ฒ•?ํ—Œ๋ฒ•?ํ–‰์ •๋ฒ•?๊ฒฝ์ œ๋ฒ• ๋“ฑ๊ณผ์˜ ๊ด€๊ณ„๋ฅผ ๊ฐ๊ฐ ๋Œ€๊ฐ€์กฑ ๊ตฌ์„ฑ์› ์ค‘์—์„œ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ• 3ํ˜•์ œ์— ๋Œ€ํ•œ ์–ด๋จธ๋‹ˆ?์•„๋ฒ„์ง€?ํ• ์•„๋ฒ„์ง€?์‚ผ์ดŒ?์‚ฌ์ดŒ๋™์ƒ์˜ ์ง€์œ„์— ๋น„์œ ํ•˜์˜€๋‹ค.์–ด๋จธ๋‹ˆ ๋ฏผ๋ฒ•์€ ํƒ€๋‹นํ•œ ํ•ด์„๋ก ์„ ์ œ๊ณตํ•ด์ค„ ๋ฟ ์•„๋‹ˆ๋ผ ํ˜„์‹ค์˜ ์—ฐ๊ตฌ์ธ๋ ฅ ๊ณต๊ธ‰์›์ด๊ธฐ๋„ ํ•˜๋‹ค. ์ž๋…€๋“ค ์ค‘ ํŠนํžˆ ์ €์ž‘๊ถŒ๋ฒ•์ด ์–ด๋จธ๋‹ˆ์™€ ์นœ์ˆ™ํ•˜๋‹ค. ๊ทธ๋Ÿฐ๋ฐ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ• 3ํ˜•์ œ ์ „์ฒด๋ฅผ ๊ธฐ์ค€์œผ๋กœ ํ•œ๋‹ค๋ฉด ๋ฒ•์ •์†ํ•ด๋ฐฐ์ƒ ์ œ๋„์˜ ๋„์ž…์ด๋‚˜ ํผ๋ธ”๋ฆฌ์‹œํ‹ฐ๊ถŒ์˜ ์˜์—ญ ๋…ผ๋ž€์—์„œ์ฒ˜๋Ÿผ ์–ด๋จธ๋‹ˆ์— ๋Œ€ํ•œ ๋ฐ˜๋ฐœ๋„ ์กด์žฌํ•œ๋‹ค. ํ•œ๊ตญ ์ƒ๋ฒ•์€ ํ•œ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•๊ณผ ์ƒํ˜ธ ๊ฐ„์— ์กฐ๋ฌธ ์ƒ์˜ ์ ‘์ ์ด ๊ฑฐ์˜ ์กด์žฌํ•˜์ง€ ์•Š๋Š”๋‹ค๋Š” ์  ๋•Œ๋ฌธ์— ์„œ๋กœ ๋ณ„๋‹ค๋ฅธ ๊ด€๋ จ์ด ์—†๋‹ค๊ณ  ์ž์ฃผ ์˜คํ•ด๋ฅผ ๋ฐ›๋Š”๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ํ˜„์‹ค์˜ ๊ณต๊ฐ„์—์„œ ์ง€์ ์žฌ์‚ฐ๊ถŒ์„ ํ–‰์‚ฌํ•˜๋Š” ์ฃผ์ฒด๊ฐ€ ์ฃผ๋กœ ์ƒ๋ฒ•์ƒ์˜ ์ฃผ์‹ํšŒ์‚ฌ ๋“ฑ์ด๋ผ๋Š” ์ , ์ง€์ ์žฌ์‚ฐ๊ถŒ์„ ์‚ฐ์ถœํ•˜๊ธฐ ์œ„ํ•œ ๋…ธ๋ ฅ์ด ์‹ค์ œ๋กœ ์ž๋ณธ์„ ์ง‘์ค‘ํ•  ์ˆ˜ ์žˆ๋Š” ์ฃผ์‹ํšŒ์‚ฌ์— ์˜ํ•ด ๋Œ€๊ฑฐ ์ˆ˜ํ–‰๋œ๋‹ค๋Š” ์  ๋“ฑ์„ ๊ณ ๋ คํ•  ๋•Œ ํ•œ๊ตญ ์ƒ๋ฒ•์€ ๋ฐฐํ›„์—์„œ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•์„ ์ž‰ํƒœ์‹œํ‚ค๊ณ  ๊ธธ๋Ÿฌ์ฃผ๋Š” ์•„๋ฒ„์ง€์™€ ๊ฐ™๋‹ค. ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ ํ•œ๊ตญ ํ—Œ๋ฒ•์€ ํŠนํ—ˆ๋ฒ•์›์˜ ํƒ„์ƒ์„ ๋‘˜๋Ÿฌ์‹ผ ๊ฒฐ์ •์  ๋ณ€ํ™”์— ์ด๋ฐ”์ง€ํ•˜์˜€๋‹ค๋Š” ์ ์—์„œ ํ• ์•„๋ฒ„์ง€๋กœ์„œ์˜ ๊ถŒ์œ„ ์žˆ๋Š” ์ง€์‹œ๋ฅผ ๋‚ด๋ฆฐ ์ ์ด ์žˆ๋‹ค. ํ•œ๊ตญ ํ–‰์ •๋ฒ•์ด ์‚ผ์ดŒ๊ณผ๋„ ๊ฐ™๋‹ค๊ณ  ๋ณธ ๊ฒƒ์€ ๊ทธ๊ฒƒ์ด, ๊ณต๋ฒ• ์˜์—ญ์— ์†ํ•จ์—๋„, ์‚ฌ๊ถŒ์œผ๋กœ ๋ถ„๋ฅ˜๋˜๋Š” ํŠนํ—ˆ๊ถŒ์˜ ๋“ฑ๋ก์ ˆ์ฐจ ๋“ฑ์— ํฌ๊ฒŒ ๊ด€์—ฌํ•˜๊ณ  ์˜ค๋Š˜๋‚  ๊ณผํ•™๊ธฐ์ˆ ํ–‰์ •๋ฒ•์„ ํ†ตํ•˜์—ฌ ์ง€์ ์žฌ์‚ฐ๊ถŒ์ด ์ฐฝ์ถœ๋˜๋Š”๋ฐ ์กฐ๋ ฅํ•˜๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๋์œผ๋กœ ํ•œ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•๊ณผ ํ•œ๊ตญ ๊ฒฝ์ œ๋ฒ•์€ ๊ฐ๊ฐ ์‚ฌ๋ฒ•๊ณผ ๊ณต๋ฒ•์˜ ์ผ๊ฐ€์— ๋”ฐ๋กœ ์†ํ•˜๋ฉด์„œ๋„ ๊ณตํžˆ ์ž๋ณธ์ฃผ์˜ ํ•˜์˜ ๋…์ ์„ ๋Œ€์ƒ์œผ๋กœ ํ•œ๋‹ค๋Š” ์ ์—์„œ ๊ณตํ†ต๋˜๋ฏ€๋กœ ์‚ฌ์ดŒ๊ด€๊ณ„์— ๋น„์œ ๋œ๋‹ค. ํ•œ๊ตญ ๊ฒฝ์ œ๋ฒ•์€ ์กฐ๋งŒ๊ฐ„ ํ•œ๊ตญ ํŠนํ—ˆ๋ฒ•๊ณผ๋Š” ๋”์šฑ ์ž์ฃผ ์ถฉ๋Œํ•  ๊ฒƒ์ด๋‹ค. ํ•˜์ง€๋งŒ ๋ถ€์ •๊ฒฝ์Ÿ๋ฐฉ์ง€๋ฒ•๊ณผ๋Š” ๋ฒ•๋ฆฌ์ ์œผ๋กœ ๊ฐ€๊นŒ์›Œ, ๋‘ ๋ฒ•๋ฅ ์ด ๊ฐ™์€ ์˜์—ญ์— ์†ํ•œ๋‹ค๊ณ  ์ฃผ์žฅ๋˜๊ธฐ๋„ ํ•œ๋‹ค.์ด ๊ธ€์—์„œ๋Š” ์ด์ƒ๊ณผ ๊ฐ™์€ ๋Œ€๊ฐ€์กฑ์  ๋น„์œ ๋ฅผ ํ†ตํ•˜์—ฌ ํ•œ๊ตญ๋ฒ•์ด๋ž€ ํ•˜๋‚˜์˜ ์ง€๋ถ• ์•„๋ž˜์„œ ํ•œ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•์„ ๋‘˜๋Ÿฌ์‹ผ ์—ฌ๋Ÿฌ ๋ฒ•๋ฅ ๋“ค์˜ ์ƒํ˜ธ ์œ„์น˜๋ฅผ ํ†ตํ•ฉํ•˜์—ฌ ๊ณ ์ฐฐํ•ด ๋ณด์•˜๋‹ค. ๋‚˜์•„๊ฐ€ ์ด๋Ÿฐ ํ†ตํ•ฉ์  ๊ณ ์ฐฐ์„ ํ†ตํ•˜์—ฌ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ์ ๋“ค์„ ์ถ”๊ฐ€๋กœ ์ œ์‹œํ•˜์˜€๋‹ค. ํ•œ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•์ด ํ•œ๊ตญ๋ฒ• ์•ˆ์—์„œ์กฐ์ฐจ ์ƒ๋Œ€์ ์œผ๋กœ ๊ธ‰๊ฒฉํžˆ ํŒฝ์ฐฝํ•˜๊ณ  ์žˆ๋‹ค๋Š” ์ , ๊ทธ ์ค‘์š” ์›์ธ์œผ๋กœ ๋ฏผ๋ฒ•?์ƒ๋ฒ•?ํ—Œ๋ฒ•?ํ–‰์ •๋ฒ•์˜ ํฐ ๋„์›€์ด ์žˆ์—ˆ๋‹ค๋Š” ์ , ์ด๋Ÿฐ ๊ณ ๋งˆ์›€์„ ๊ฐš๋Š” ๊ธฐ๋ณธ์  ๋ฐฉํ–ฅ์€ ๋‹ค๋ฆ„ ์•„๋‹ˆ๋ผ ํ•œ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•์˜ ์žฅ์ฐจ ์šด์˜์— ์žˆ์–ด ์™ธ๊ตญ ์ง€์ ์žฌ์‚ฐ๊ถŒ๋ฒ•์˜ ๊ธฐ๋ฌ˜ํ•œ ๋…ผ๋ฆฌ์— ๋„ˆ๋ฌด ์ฃผ๋ชฉํ•˜๊ธฐ๋ณด๋‹ค ํ•œ๊ตญ์˜ ๋‹ค๋ฅธ ๋ฒ•๋ฅ ๋“ค์˜ ์•ž์„  ์ œ์‹œ๋‚ด์šฉ ๋˜๋Š” ํ•œ๊ตญ์˜ ์ด์ฒด์  ์ƒํ™ฉ์ด ๋” ์ค‘์š”ํ•˜๊ฒŒ ๊ณ ๋ ค๋˜์–ด์•ผ ํ•จ์„ ์žŠ์ง€ ์•Š๋Š” ๊ฒƒ์ด๋ผ๋Š” ์  ๋“ฑ์ด ๊ทธ๊ฒƒ๋“ค์ด๋‹ค.OAIID:oai:osos.snu.ac.kr:snu2013-01/102/0000008736/4SEQ:4PERF_CD:SNU2013-01EVAL_ITEM_CD:102USER_ID:0000008736ADJUST_YN:YEMP_ID:A078845DEPT_CD:931FILENAME:ํƒ€๋ฒ•.pdfDEPT_NM:๋ฒ•ํ•™๊ณผSCOPUS_YN:NCONFIRM:
    • โ€ฆ
    corecore