• Title/Summary/Keyword: Conspiracy

Search Result 37, Processing Time 0.021 seconds

A Critical Review of Political Conspiracy in Korea (한국정치에서 음모론과 선거의 연관성: '장준하 사망', '광주민주화운동', '천안함 침몰'을 중심으로)

  • Chung, Tae-Il
    • Korea and Global Affairs
    • /
    • v.1 no.1
    • /
    • pp.7-30
    • /
    • 2017
  • The conspiracy theories of political events are occurring in every country and society. In Korean society, conspiracy theories about political events are constantly happening. Conspiracy refers to the phenomenon of a particular individual or group who oppose the official causes of social phenomena. Conspiracy is a resistance to the credibility of the state and the government. In Korean society, conspiracy occurs mainly in political events. The conspiracy theories of political events appear in the form of conservatism and progressivism, which seeks to replace political power and political power to stabilize political power. The conspiracy theory about Jang Jun-Ha's death occurred in the process of seeking justification for a person who is resisting the ruling forces. Also, the conspiracy theory of the Gwangju Democratization Movement and the Cheonan Warship Sinking may be a drag on the justification for the justification for the takeover of the new military government and the justification for the Disconnection of inter-Korean relations. In Korean politics, Conspiracy theory is a factor that confuses Korean society regardless of whether it is true or not.

The Politics of Hollywood Conspiracy Films in the Era of Late Capitalism (후기 자본주의 시대 헐리우드 음모론 영화의 정치성)

  • Lee, Jeeheng
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.3
    • /
    • pp.140-150
    • /
    • 2014
  • Conspiracy theory is often considered as a kind of paranoid and an act of throwing all the blame solely on the Big Other who is presumed to control all the incidents behind the curtain. While, it is also assessed as a socio-political sub-culture and a way of interpreting the world full of closure and insufficient information, keeping us from grasping 'the totality'. Meanwhile recent conspiracy films reflect the ever dense and concealed anatomy of the world now. And it reveals some kind of ideological tendency which is, 'sense of catastrophe' and 'non-ideology' reflecting the world of late capitalism society. This article intends to examine the altered representational appearance and ideology in recent conspiracy films so as to understand how the conspiracy theory, the social-political interpretational mechanism, is converged into the film narrative against the backdrop of late capitalism, a socio-political condition we live in.

여타 조건과 언어의 공모성

  • 김의수
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.06a
    • /
    • pp.142-152
    • /
    • 2002
  • There have been some notes on the functional unity of rules or conspiracy in Linguistics. In this paper, I show that so-called 'elsewhere condition', first mentioned in phonology, is observed not only in phonology, but also in morphology, syntax, semantics, and pragmatics. And I argue that it is a kind of functional unity of rules or conspiracy in cross-component of linguistic theories. How to handle this in the macro-scopic view of linguist ice is another major issue in further research.

  • PDF

Is it a real Conspiracy or just a Paranoia? : The Crying of Lot 49 (실제 음모인가 아니면 단순한 환각인가? - 『제49호 품목의 경매』를 중심으로)

  • Ryu, Da-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.451-458
    • /
    • 2016
  • The Crying of Lot 49 presents the writer's major ideas through Oedipa Maas who tries to seek out the truth of a mysterious underground postal network, Tristero. Of the many themes inherent in The Crying of Lot 49, probably the most important and widespread of all is 'paranoia', which plays a major role in helping us to comprehend and appreciate other thematic ideas. The other main motif in this novel is a conspiracy. However, it is really difficult to distinguish between reality and fantasy in the crazed environment. Therefore, it is uncertain that the existence of Tristero is a real conspiracy or just a paranoia. The world revealed to her after considering Tristero's knowledge is totally different from the world previously familiar to Oedipa and she discovers that the nature and origins of Tristero will not be a quest of simple curiosity any longer and she greatly needs to escape from the closed system of perception. The secret of the Tristero case should be found in order to return to reality. In addition, accepting what Oedipa has seen and heard may be a reasonable way for her to become a paranoiac.

Cryptanalysis of Kim et al.'s Traitor Tracing Scheme on ACISP02

  • Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.99-101
    • /
    • 2002
  • At ACISP'02, H.J. Kim et al.[1] proposed a new traitor tracing scheme. However, this paper show that the proposed scheme is to be insecure by presenting a conspiracy attack. Using our attack, any two subscribers can collaborate to derive the secret key of the data supplier and tell or sell it to any body. Thus, the unauthorized user can always decrypt the encrypted session key with the decrypted session key. Also the two subscribers cannot be traced by the data supplier

  • PDF

Secure Oblivious Transfer Protocol-based Digital Fingerprinting Against Conspiracy Attack (공모 공격에 안전한 불확정 전송 프로토콜 기반의 디지털 핑거프린팅 기법)

  • 최재귀;박지환;김태석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.145-153
    • /
    • 2004
  • Digital fingerprinting schemes are cryptographic methods that a seller can identify a traitor who illegally redistributed digital contents by embedding it into buyer's information. Recently, Josep Domingo-Ferrer suggested an anonymous digital fingerprinting scheme based on committed oblivious transfer protocol. It is significant in the sense that it is completely specified from a computation point of view and is thus readily implementable. But this scheme has the serious problem that it cannot provide the security of buyers. In this paper, we first show how to break the existing committed oblivious transfer-based fingerprinting schemes and then suggest secure fingerprinting scheme by introducing oblivious transfer protocol with two-lock cryptosystem based on discrete logarithm. All computations are performed efficiently and the security degree is strengthened in our proposal.

Internet Broadcasting As a Place for Conspiracy Theory or Discussion: Focus on BJ Hammer Wife of Afreeca TV (음모론 혹은 토론의 장으로써의 인터넷 방송: Afreeca TV의 망치부인을 중심으로)

  • Han, Sukhee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.61-70
    • /
    • 2017
  • This study analyzes various aspects of the Internet broadcasting that has rapidly increased in South Korea recently. Due to the development of technology, the Internet Broadcasting industry that ordinary viewers do the broadcasting themselves has appeared. Today, the most popular platform of the Internet broadcasting in South Korea is "Afreeca TV", which allows BJs do broadcasting in their channel with own contents. Related to current chaotic Korean society, Current Affairs/Politics becomes one of the new popular genres. Specifically, this study focuses on BJ Hammer Wife as a case study, who is famous in the Current Affairs/Politics industry. Then it examines what characteristics of her channel, her opinions, and the method of communication with common viewers implicate messages regarding the freedom of speech in South Korea. Throughout this, it explores that the Internet Broadcasting functions as a place for conspiracy or discussion, and discusses the blueprint of the Internet broadcasting.

Assessment of Library and Information Professionals' Perception of COVID-19 and Its Impacts on Libraries in Nigeria

  • Adegbilero-Iwari, Idowu;Ikenwe, Iguehi Joy;Adegbilero-Iwari, Oluwaseun Eniola
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.4
    • /
    • pp.25-39
    • /
    • 2022
  • Perceptions of Library and Information (LI) professionals in Nigeria and the impact of COVID-19 on libraries, librarians and library services, were studied. The significance of demographic factors on LI professionals' perception of COVID-19 and its impact on libraries was tested. Descriptive survey design and Purpose sampling technique were adopted. LIS professionals in Nigeria constituted the population, and an online questionnaire designed by the researchers through Microsoft Forms was used. Descriptive analysis of respondents' demographic data and their covid-19 perception were presented in frequencies and percentages using tables while multivariate regression technique was used to test the significance of relationship between variables at P < 0.05. Findings revealed that many (61.4%) of the respondents agreed that COVID-19 is real but have personal reservations. However, 47.5% indicated that COVID-19 is a scientific invention. On the impacts of COVID-19 on libraries, the study found that COVID-19 is a game changer that will enhance the creation of new services by libraries, cause the reconfiguration of library space for safe operations in post-COVID, establishment of new rules and regulations, and more reliance on e-resources. On the test of association, educational qualification of respondents had a significant impact on respondents' perceptions that COVID-19 will reduce the use of library print resources (P-value = 0.005, B: 0.38, [95% CI: 0.115 - 0.646]) and that library will create new services to address the changes caused by COVID-19. Also, educational qualification of respondents significantly influenced respondents' perception that COVID-19 is real. The study recommends that libraries should take advantage of the season to innovate, and that public health institutions should continually educate people on corona virus to disabuse people's mind of conspiracy theories.

Hydraulic Model Test for Bridge Stability Analysis at Downstream of Chun-Chon Dam (춘천(春川)댐 방류시(放流時) 교량(橋梁)의 안정성(安定性) 검토(檢討)를 위한 수리모형실험(水理模型實驗) 연구(硏究))

  • Choi, Han-Kyu;Beak, Hyo-Seon;Choi, Sang-Soon
    • Journal of Industrial Technology
    • /
    • v.24 no.B
    • /
    • pp.117-122
    • /
    • 2004
  • In The case of the bridge which is located in the downstream of the dam, effect of the running water and stability of the bridge is studing by using the Hydraulic model test. 1. The water level change of 'Seosang1 bridge' along Chunchon dam spill occurred through this experiment more greatly than a numerical conspiracy. 2. Bight is the spot where a difference occurs in located bridge piers(p18-p28) greatly, and an influence of Chunchon dam occurs in greatly.

  • PDF

A study on the Comparison Analysis for Messenger Evidence Using Mobile Forensics (모바일 포렌식을 이용한 메신저 증거 비교 분석 연구)

  • Hwang, Taejin;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.25-32
    • /
    • 2018
  • As the use of smartphones become more common, the communication via instant messenger becomes natural. However, it is important to secure the relevant information promptly since the chat room between participants can be used as a space for a criminal conspiracy, and crime-related contents can be stored and deleted easily on smartphones. Therefore, this study aims to identify the available data and to use it as proof by comparing and analyzing the instant messengers with high usage rate.

  • PDF