• 제목/요약/키워드: 흐름 정보

Search Result 3,313, Processing Time 0.033 seconds

Cultural Politics of Gendered Schadenfreude Surrounding an Idol Focusing on the debate over IU (아이돌을 둘러싼 젠더화된 샤덴프로이데(Schadenfreude)의 문화정치학 <아이유 사태>를 중심으로)

  • Kim, Hyun Gyung
    • Korean journal of communication and information
    • /
    • v.80
    • /
    • pp.115-142
    • /
    • 2016
  • This study aims to reveal the content of and logic behind a recent negative public sentiment toward female idols with the example of a debate over songstress IU's fourth album that was released late last year. While previous studies on fandom have focused on the identification process towards entertainers and making community, a recent phenomenon of "anti-fandom" or "malicious comments" implies that more research is needed on negative emotions such as hostility or schadenfreude (feelings of pleasure from others' misfortunes). Schadenfreude is a social sentiment that originated in modern liberalism, which features contradictions between public equality and private ownership, and that has been intensified in neoliberalism, which features a maximization of this contradiction centering on a meritocracy. Celebrities in Korea often become the targets of schadenfreude, which is associated with the suspicion that they gain popularity not from their abilities but from "just being popular." It should also be noted that this kind of schadenfreude operates differently between male and female entertainers. Specifically, the acquisition of money and fame by modern women whose presence used to be located in the private possessions of males is considered to be due to their unjustified use of sexuality. This is also the background of the recent online misogyny culture in Korea. In this context, IU, who had been successful at building a differentiated image of "sister-like idol artist," became a valid target. Although accusing IU of utilizing pedophilia reflects a stalemate that a current politics of sexual violence faces, it rather damages the name of an individual than attracts public attention to the structural causes of childsexualabuse. This is why I see the way that pedophilia was used in the debate over IU as a schadenfreude. Consequently, the term pedophilia here contributes to an expansion of the entertainment economy that is sustained by rises and falls of the celebrities' stock prices.

  • PDF

Separated Control Signaling Protocol for WDM Optical Networks (파장 분할 다중화 방식을 사용하는 광 전송망을 위한 분리 제어 신호 방식)

  • No, Seon-Sik;Kim, Su-Hyeon;So, Won-Ho;Kim, Yeong-Cheon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.6
    • /
    • pp.1-11
    • /
    • 2000
  • In this paper, we propose a novel control signaling protocol that efficiently controls connection setup and increases the utilization of network resources. The proposed protocol, Separated Control Signaling Protocol(SCSP), separates bearer control from call control lot WDM optical networks. The main function of call control is to check the availability of network resources such as wavelengths and receivers at destination node. Bearer control is to reserve and assign wavelengths. The signaling architecture of this protocol consists of call controller and hearer controller The call controller handles call setup and release, activates the beater controller, and manages the status of call and bearer. The bearer controller reserves wavelengths, sets up bearer, tears down bearer. and notifies the status of beater to call controller. The state transition diagrams of each controller are designed. Using control messages and related primitives, the information flows for call setup and bearer setup, hearer teardown and call release, and reaction for setup failures are described to evaluate the performance. The simulation results show that the separated control signaling protocol is superior to conventional one in terms of call blocking probability and resource utilization.

  • PDF

A Study on Methodology of U-City Promotion(Top-Down vs Bottom-Up Approach Model) (U-City 추진방법론에 대한 고찰(Top Down vs Bottom Up 모델))

  • Lee, Sang-Hun;Kim, Hyong-Bok
    • Spatial Information Research
    • /
    • v.17 no.1
    • /
    • pp.131-144
    • /
    • 2009
  • Recently, a lot of local autonomous entities are promoting Ubiquitous City(U-City) Construction by integrating Information Communication Technology(ICT) with city development, and also internationally, a lot of cities are making efforts to develop U-City to intensify a city's competitive strength and improve life quality of city dwellers. In keeping with such a stream of the times, each local autonomous entity and project developer are developing a lot of methodologies to establish optimal U-City in corresponding cities and also inquiring into a variety of development procedures, such as connecting existing urban development methods with information establishment methods. The method used usually is to establish Information strategy Plan(ISP) for a city which will be developed through consulting in the stage of city development planning. ISP is to establish vision & strategy for building the ubiquitous city and is a methodology including city vision, strategy, goal, and implementation method, etc. However, due to a lot of variables, such as a variety of city environment, establishment period, budget, information technology, and etc., it is difficult to contain establishment plans for every occasion in a similar method, in reality. Therefore, it is naturally necessary to suggest plans for city vision & strategy, and selection of element technology/service. Thus, this paper suggests models for vision & strategy establishment of U-City and suggests Top-Down Approach and Bottom-Up Approach method as a plan for U-City establishment. In addition, this paper analyzes general promotion methodologies for constructing U-City and analyzes how these two strategic methods [Top-Down Approach and Bottom-Up Approach] for city vision establishment are composed in such a methodology, to define and analyze its constituent plan.

  • PDF

Regional Difference of Project Finance and Its Policy Implications (프로젝트 금융의 지역적 차별성과 정책적 시사점)

  • Park, Won-Seok
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.11 no.4
    • /
    • pp.580-599
    • /
    • 2008
  • This paper aims at examining the existence and characteristics of regional difference in project finance in Korea. Main results of this paper are as follow. Firstly, regional difference in project finance between capital region and local can be seen partially. However, their characteristics are different from corporate finance. ANOVA tests show significant differences of excess interest rate occur in case of commercial real estate projects and significant differences of contracted terms occur in case of residential real estate projects carried out by local banks. Secondly, key factors causing the regional differences in project finance are asymmetric information for cash flow generated by the project between the capital region and local. Especially, regional differences in project finance are different from those in corporate financing because of local banks$^{\circ}{\phi}$ behaviors. They follow and act as the passive members of nationwide banks in case of the capital region projects. Thirdly, prepaid sale system and the guarantee system depending on construction companies dilute the regional differences in project finance in case of residential real estate projects. Although these systems contributed rapid growth of project finance, they may be the main factors distorting project finance market which lead to financial crisis. In these context, policy implications may be derived in order to solve the confronted problems of project finance market.

  • PDF

Ideal Relationship between Police and Press through the Analysis of 4P Model (4P모델 분석을 통한 경찰과 언론의 바람직한 관계 정립 방안)

  • Kim, Yong-Sik;You, Jae-Seol
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.340-349
    • /
    • 2011
  • This research analyzes the 4P(Police-Press-Politics-Public) model for establish an ideal relationship between press and police and suggests some practical policies. Through the examination of the relations among 4Ps(Police-Press-Politics-Public), Jean-Louis Loubet Del Bayle proposes 3 models from three aspets : exchange of information, relation of power, relation of legitimacy. The analysis of his models shows that politics and public give social and political legitimacy to police and press which, based on the legitimacy, thereby obtain necessary informations from external entities to fulfil their original functions. On the other hand, the inevitable relation of press and police with politics and public caused from their social functions, in turn, makes the relationship between press and police more complicated and delicate. This research concludes, the relationship between police and press should be well balanced for their successful social functions and benefits of the public. To this end, this study suggests that a specific press guideline which is imposed on press and police, must be prepared and that a specialized press office must be established in the police.

A Study on Programming Concepts of Programming Education Experts through Delphi and Conceptual Metaphor Analysis

  • Kim, Dong-Man;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.277-286
    • /
    • 2020
  • In this paper, we propose a new educational approach to help learners form concepts by identifying the properties of programming concepts targeting a group of experts in programming education. Therefore, we confirmed the typical properties of concepts by programming education experts for programming learning elements through conceptual metaphor analysis, which is a qualitative research method, and confirmed the validity through the delphi method. As a result of this study, we identified 17 typical properties of programming concepts that learners should form in programming education. The conclusions of this study are that need to compose the educational content more specifically for the conceptualization of learners' programming as follows: 1)the concept of a variable is to understand how to store data, how to set a name, what an address has, how to change a value, various types of variables, and the meaning of the size of a variable, 2)the concept of operator is to understand how to operate the four rules, how to deal with it logically, how to connect according to priority, meaning of operation symbols, and how to compare, 3)the concept of the control structure is to understand how to control the execution flow, how to make a logical judgment, how to set an execution rule, meaning of sequential execution, and how to repeat executing.

Analysis of Assortativity in the Keyword-based Patent Network Evolution (키워드기반 특허 네트워크 진화에 따른 동종성 분석)

  • Choi, Jinho;Kim, Junguk
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.107-115
    • /
    • 2013
  • Various networks can be observed in the world. Knowledge networks which are closely related with technology and research are especially important because these networks help us understand how knowledge is produced. Therefore, many studies regarding knowledge networks have been conducted. The assortativity coefficient represents the tendency of connections between nodes having a similar property as figures. The relevant characteristics of the assortativity coefficient help us understand how corresponding technologies have evolved in the keyword-based patent network which is considered to be a knowledge network. The relationships of keywords in a knowledge network where a node is depicted as a keyword show the structure of the technology development process. In this paper, we suggest two hypotheses basedon the previous research indicating that there exist core nodes in the keyword network and we conduct assortativity analysis to verify the hypotheses. First, the patents network based on the keyword represents disassortativity over time. Through our assortativity analysis, it is confirmed that the knowledge network shows disassortativity as the network evolves. Second, as the keyword-based patents network becomes disassortavie, clustering coefficients become lower. As the result of this hypothesis, weconfirm the clustering coefficient also becomes lower as the assortative coefficient of the network gets lower. Another interesting result concerning the second hypothesis is that, when the knowledge network is disassorativie, the tendency of decreasing of the clustering coefficient is much higher than when the network is assortative.

Progamers' Labor Postmodern Mode, Modern Ethics (프로게이머의 노동 탈근대적 양식, 근대적 윤리)

  • Pang, Huikyong;Won, Yong-jin
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.7-37
    • /
    • 2015
  • The study explores how the discourses on game addiction, which emphasize diligence and sincerity for labor and self-control, and professional gamers, who are trapped in pleasures of playing games in the virtual world, cohabit in Korean society. Progamers have grown from entertainment industry enlarged along with the current of the economic 'postmodernization,' mentioned by Hardt and Negri(1997; 2001; 2004). Hardt and Negri have elaborated on the economic postmodernization with the notion 'immaterial labor,' which blurs the line between economic (instrumental) actions and humane qualities as well as pertains to the potentiality of resistant practices against the power of modernity. From this perspective, progamers' labor is understood as 'affective labor,' an aspect of immaterial labor with the potentiality of resistance. However, meticulous examination of progamers' labor in this study reveals that progamers control their affects systematically, strategically, and rationally for their materialistic success. Progamers, while performing postmodern mode of labor, are subordinate to modern work ethics, which lead them to lose the potentiality of resistance. Consequently, while the discourses on game addiction and progamers outwardly form sharp contrast to each other, the two indeed are placed in tandem in the vein of modern work ethics of Protestantism.

  • PDF

A Design and Implementation of Application based on HTML5 of N-Screen Service (N-Screen Service를 위한 HTML5 기반의 Application 설계 및 구현)

  • Kim, Jeong-Jae;Seo, Joo-Hyun;Choi, Hyun-Woo;Lee, Jun-Ho;Kim, Jun-su;Cho, Kuk-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.671-674
    • /
    • 2012
  • Recently, depending on the development of smart devices, a variable services have been offered to meet user's convenience. Due to these advance, the needs of users are extremely being diversified and more specific. In that situation, the needs for the N-Screen system has been varied and gradually evolved. An existing N-Screen system that use the way of video streaming upload its multimedia contents to their own cloud server so that might take a long play-reaction time and the number of user is limited by the server's performance. Because of the web based protocol adopted by existing N-Screen system, there are many different problems like high delay, overhead and something caused by simplex data communications. Therefore, to solve the problems above, this study proposes an application based on HTML5. This application supports Video tag and Progressive download via HTML5 so that improves the play-reaction time for multimedia contents. This system can also get rid of the chronic problems such as an access limitation for lots of users as per video streaming encoding. Also, through web sockets, this study proposes a system that has lower delay than the existing system and communicates in full duplex to be able to link dynamically.

  • PDF

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.