4 books found
ePDFs of chapters 1, 2 and 7 are available Open Access under CC-BY-NC-ND license. Despite recent achievements in the South Korean economy and development within welfare institutions, new forms of precarious work continue to prevail. This book introduces the concept of ‘melting labour’, which refers to the blurring of boundaries between traditional forms of work and workplace and the dissolution of standard employment relationships. Presenting a theoretical framework at the intersection of ‘melting labour’ and institutional protection of workers, it addresses how and why the Korean welfare state has failed to protect precarious workers. Based on rich, in-depth interviews with over 80 precarious workers in Korea, from subcontracted manufacturing workers to platform workers, it provides a real depiction of how workers lose control over their lives and experience precariousness in labour markets.
by Seung Mo Kang
2024 · Taylor & Francis
This book examines how the Treaty of Peace with Japan, a momentous agreement that delineated postwar order in the Pacific, was negotiated between Japan and 48 other nations in 1951. Even though the treaty was created to legally end the state of war between Japan and its Pacific War enemies, many other considerations - some of which had hardly anything to do with the Pacific War - were involved. The US-Soviet rivalry was the most representative, but this was not the only factor. For instance, the decision to invite Cambodia, Laos and Vietnam as signatories was determined based on French colonial interests, Indochinese yearning for independence and the need for French contribution in the North Atlantic Treaty Organization. Similarly, German reparations settlements after the First and Second World Wars impacted Japanese reparations settlement. Meanwhile, the commercial terms of the treaty were informed by the Great Depression and its legacies. This book addresses these aspects of the peace treaty that are hitherto not sufficiently elaborated upon in existing studies. Highlighting the importance of the treaty for shaping postwar East Asia and international relations in the region to the present day, this book will be a valuable resource for students and scholars of post-war Japan, International relations, and the Cold War.
Starting from voice services with simple terminals, a mobile device today is nothing short of a small PC in the form of smart-phones. The result has been a huge increase in data-services, giving mobile communication access to critical aspects of human life. This has led to the standardization of System Architecture Evolution/Long Term Evolution (SAE/LTE) by 3GPP and IEEE 802.16e / WiMAX. Together with penetration of mobile communications and new standardization come new security issues and, thus, the need for new security solutions. Security in Next Generation Mobile Networks provides a fresh look at those security aspects with the main focus on the latest security developments in 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS). This book includes six chapters, the first three serving as introductory text, and the remaining three providing more in-depth discussions. Chapter One gives a background of Next Generation Mobile Networks (NGMN) activity and requirements. Following this explanation, Chapter Two provides an overview of security, telecommunication systems, and their requirements, and Chapter Three provides some background on standardization. Chapter Four discusses the EPS (or SAE/LTE) security architecture developed by 3GPP. In particular, this chapter covers the authentication and key agreement method for SAE/LTE together with newly defined key hierarchy. This chapter also addresses the challenging aspects of SAE/LTE interworking and mobility with UMTS together with the necessary key-exchange technologies. Chapter Five provides an in-depth discussion of the WiMAX security requirements, the authentication aspects of PKMv2, and the overall WiMAX network security aspects. In Chapter Six, the text briefly covers security for: -Home(evolved)NodeB, which is the Femto solution from 3GPP -Machine-to-Machine (M2M) -Multimedia Broadcast and Multicast Service (MBMS) and Group Key Management. The intended audience for this book is mobile network and device architects, designers, researchers, and students. The goal of the authors, who have a combined experience of more than 25 years in mobile security standardization, architecture, research, and education, is to provide readers with a fresh, up-to-date look at the architecture and challenges of EPS and WiMAX security.
This volume comprises papers presented at the 2nd International Conference on Advanced Nondestructive Evaluation (ANDE 2007) held in Busan, Korea, on October 17-19, 2007. Many of the excellent papers included in this book show the current state of nondestructive technologies, which are experiencing rapid progress with the integration of emerging technologies in various fields. As such, this volume provides an avenue for both specialists and scholars to share their ideas and the results of their findings in the field of nondestructive evaluation.