• Title/Summary/Keyword: 사이버망명

Search Result 2, Processing Time 0.018 seconds

Effectiveness of the Internet Real-Name Verification Law: Evidence from Self-censorship and Intention to Detour the Regulation (인터넷실명제와 우회로의 선택: 인터넷 공론장 참여자들의 자기검열과 우회로 선택의향을 중심으로)

  • Han, Hye-Kyung;Kim, Eu-Jong
    • Korean journal of communication and information
    • /
    • v.55
    • /
    • pp.50-73
    • /
    • 2011
  • This paper investigates the effectiveness of Real-Name System on Internet, which has been applied to some Internet service provider bulletin boards in Korea. The goal of the Real-Name system on the Internet is controlling expression of slanderous or abusive language. The effectiveness of the regulation is dependent on the people's perceptions and attitude toward to the legislation. This empirical study examines the antecedents that affect the perceptions and attitude toward the regulation. Further, we investigate the relationships among variables such as internet public sphere participation, attitude to the regulations, and intention to choose detours. Results of regression analysis show that the younger and the more progressive individuals are, the more they oppose the implementation of the law. Also, it was found that people who have more political interest and participate more actively in public sphere via internet, tend to oppose the law. Structural equation models reveal that participation in online public sphere drives negative attitudes about the regulation. In addition, people with negative perceptions about the law tend to choose the detours such as 'cyber asylum' and 'service asylum'.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.