• Title/Summary/Keyword: ITS1

Search Result 64,520, Processing Time 0.093 seconds

An Influence of the Source Information of Word Mouth on the Sales of Educational Service (구전의 정보원천이 교육서비스 판매에 미치는 영향)

  • Kang, Gye-Young;Song, In-Am;Hwang, Hee-Joong
    • Journal of Distribution Science
    • /
    • v.9 no.2
    • /
    • pp.73-81
    • /
    • 2011
  • This study is designed to examine the effects of information source effects of the word mouth have on the formed expectations for the private institution and to explore the formed expectations' effects on the actual sales of the educational service. Moreover, its purpose is in analyzing what medication effects the pre-conceived expectation has on selecting the educational service. After testing hypothesis, the results showed that the source effects of the information from word of mouth had a significant effect on the expectation factors, in terms of expertise, similarity, likability and familiarity expectation factors. However, it was found that effect was not significant for the truthfulness. The significant result was found on the expectation factors before visiting the private institution on selecting educational service, indicating a positive effect. As for the influence of source of the word of mouth information on selecting educational service, the results from the mediation effects of the expectation factors on selecting the educational service showed that for expectation factors, expertise had the partial mediation effect, truthfulness, perfect mediating effect, similarity, partial mediation effect, likability, perfect mediating effect, and familiarity, perfect mediating effect. A test of the mediating role of attribute expectations in the influence of WOM message source attributes on educational services choices showed the following: 1) It was proven that attribute expectations played a partial mediating role in the influence of expertise and similarity, respectively, on educational services choices. 2) On the influence of trustworthiness, likability, and familiarity on educational services choices, respectively, attribute expectations had a full mediation effect. This research differs from the previous ones, which focused only on consumer satisfaction with educational services offered by private educational institutions in that it covers not only the influences of both WOM source attributes and key component factors of educational services on both educational services choices and satisfaction with such services but also the influence of WOM source attributes on attribute expectations prior to the first visit to a particular private educational institutions, and in turn the influence of such attribute expectations on educational services choices. Most particularly, the significance of this study lies in the fact that in an effort to more clearly explain the causal relationship between WOM source effects and educational services choices a test of the mediating role of attribute expectations was conducted. Although the research seems simple, some theoretical implications can be drawn as follows: WOM message source effects on educational services choices were positive and moreover these positive impacts are likely to be reinforced by means of the mediating variable of attribute expectations.

  • PDF

Species Composition and Biomass of Marine Algal Community in the Vicinity of Yonggwang Nuclear Power Plant on the West Coast of Korea (서해안 영광원자력발전소 주변 해조군집의 종조성과 생물량)

  • KIM Young Hwan;HUH Sung-Hoi
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.31 no.2
    • /
    • pp.186-194
    • /
    • 1998
  • Species composition and biomass of intertidal benthic algae were studied at the coast of Yonggwang Nuclear Power Plant area and its adjacent stations over 4 seasons (October 1995-August 1996), Of 68 species identified, 7 were Cyanophyta, 12 were Chlorophyta, 14 were Phaeophyta and 35 were Rhodophyta. The largest number of algal species (44) was found at Sangnok, the northernmost station of the study area, whereas the smallest number of species (15) was found from Tongho, ca. 13 km north of the power plant site. Number of species showed highest during the spring (44) and minimum was recorded in autumn (28). Biomass per unit area showed maximum in spring ($189.5\;g\;dry\;wt{\cdot}m^{-2}$ in average) and minimum in winter ($107.9\;g\;dry\;wt{\cdot}m^{-2}$ in average). Biomass values exhibited a wide range of variation among the stations, ranging from a low of $22.0\;g\;dry\;wt{\cdot}m^{-2}$ in annual average at Tongho to a high of $295.7g\;dry\;wt{\cdot}m^{-2}$ in average at Sangnok. Dominant species in biomass were Corallina pilulifera, Sargassum thunbergii, Gymnogongrus flabelliformis and Enteromorpha compressa. There have been little variation in the dominant algal species around the power plant site during the past 10 years and also these algae appeared throughout the west coast of Korea with higher frequency.

  • PDF

A Study of the Factors Influencing Behavioral Intention for Organic Food: Using the Theory of Planned Behavior (유기농식품에 대한 소비자의 구매의도 영향요인 분석 계획적 행동이론을 중심으로)

  • Choi, Hwa-Sun;Lee, Kwang-Keun
    • Journal of Distribution Science
    • /
    • v.10 no.2
    • /
    • pp.53-62
    • /
    • 2012
  • Well-being is a reflection of current sociocultural trends that focus on the quality of life based on economic growth. Furthermore, organic food is believed to help people maintain good health and therefore leads to increased consumption of organic foods. Therefore, consumer interest in organic food is increasing, causing its market to grow, and this trend will be maintained in the future. The abuse of agricultural pesticides, gene manipulation, and bovine spongiform encephalopathy has caused consumers to worry about food safety. The well-being trend has also contributed to consumers' growing interest inorganic food and organic agricultural products. A consumer's choice offood is a complex processes affected by various factors. In particular, organic food is considered an individualistic merit good, considering the consumers' preferences related to certification policies. Therefore, various factors such as personal characteristics and sense of value could affect consumers' decisions. This research focused on an analysis of the factors influencing consumers' purchasing intention for organic food on the basis of an increase in organic food consumption. The research method was based on the theory of planned behavior (TPB). Factors such as consumer characteristics regarding food consumption, purchasing frequency, and other factors affecting purchasing intention were presented. The hypothesis was set using advanced research and stated that it is easier to forecast purchasing intentions by combining the theory of planned behavior and personal characteristics of consumer. The results show that two dimensions, attitude and perceived behavioral control, have statistically significant influence on the purchasing intention. It can be said that a positive attitude toward organic foods in particular increases the possibility of purchasing intention. In addition, consumers who consume more organic food products are more likely to have positive attitudes, and, in the past, purchasing frequency has positively influenced purchasing intention of organic foods. Consumers' negative feelings about the non-purchase of organic foods also showed a negative influence on purchasing intentions. In other words, even though consumers feel uncomfortable when not consuming organic food products, they do not try to purchase such products because of this feeling of discomfort. Furthermore, the subjective norm and the behavioral control of food-related involvement do not have a statistically significant influence on the purchasing intention or attitudes. This research verified the influence of factors related to purchasing intention. This study has several limitations: (1) even though consumers' responses can change based on the type of food, the types of food were not classified in this study; (2) future studies are necessary to analyze the attitudes of consumers on the basis of their purchasing experiences with organic foods.

  • PDF

Numerical Simulation of the Formation of Oxygen Deficient Water-masses in Jinhae Bay (진해만의 빈산소 수괴 형성에 관한 수치실험)

  • CHOI Woo-Jeung;PARK Chung-Kill;LEE Suk-Mo
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.27 no.4
    • /
    • pp.413-433
    • /
    • 1994
  • Jinhae Bay once was a productive area of fisheries. It is, however, now notorious for its red tides; and oxygen deficient water-masses extensively develop at present in summer. Therefore the shellfish production of the bay has been decreasing and mass mortality often occurs. Under these circumstances, the three-dimensional numerical hydrodynamic and the material cycle models, which were developed by the Institute for Resources and Environment of Japan, were applied to analyze the processes affecting the oxygen depletion and also to evaluate the environment capacity for the reception of pollutant loads without dissolved oxygen depletion. In field surveys, oxygen deficient water-masses were formed with concentrations of below 2.0mg/l at the bottom layer in Masan Bay and the western part of Jinhae Bay during the summer. Current directions, computed by the $M_2$ constituent, were mainly toward the western part of Jinhae Bay during flood flows and in opposite directions during ebb flows. Tidal currents velocities during the ebb tide were stronger than that of the flood tide. The comparision between the simulated and observed tidal ellipses showed fairly good agreement. The residual currents, which were obtained by averaging the simulated tidal currents over 1 tidal cycle, showed the presence of counterclockwise eddies in the central part of Jinhae Bay. Density driven currents were generated southward at surface and northward at the bottom in Masan Bay and Jindong Bay, where the fresh water of rivers entered. The material cycle model was calibrated with the data surveyed in the field of the study area from June to July, 1992. The calibrated results are in fairly good agreement with measured values within relative error of $28\%$. The simulated dissolved oxygen distributions of bottom layer were relatively high with the concentration of $6.0{\sim}8.0mg/l$ at the boundaries, but an oxygen deficient water-masses were formed within the concentration of 2.0mg/l at the inner part of Masan Bay and the western part of Jinhae Bay. The results of sensitivity analyses showed that sediment oxygen demand(SOD) was one of the most important influence on the formation of oxygen depletion. Therefore, to control the oxygen deficient water-masses and to conserve the coastal environment, it is an effective method to reduce the SOD by improving the polluted sediment. As the results of simulations, in Masan Bay, oxygen deficient water-masses recovered to 5.0mg/l when the $50\%$ reduction in input COD loads from Masan basin and $70\%$ reduction in SOD was conducted. In the western part of Jinhae Bay, oxygen deficient water-masses recovered to 5.0mg/l when the $95\%$ reduction in SOD and $90\%$ reduction in culturing ground fecal loads was conducted.

  • PDF

Keyword Network Analysis for Technology Forecasting (기술예측을 위한 특허 키워드 네트워크 분석)

  • Choi, Jin-Ho;Kim, Hee-Su;Im, Nam-Gyu
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.227-240
    • /
    • 2011
  • New concepts and ideas often result from extensive recombination of existing concepts or ideas. Both researchers and developers build on existing concepts and ideas in published papers or registered patents to develop new theories and technologies that in turn serve as a basis for further development. As the importance of patent increases, so does that of patent analysis. Patent analysis is largely divided into network-based and keyword-based analyses. The former lacks its ability to analyze information technology in details while the letter is unable to identify the relationship between such technologies. In order to overcome the limitations of network-based and keyword-based analyses, this study, which blends those two methods, suggests the keyword network based analysis methodology. In this study, we collected significant technology information in each patent that is related to Light Emitting Diode (LED) through text mining, built a keyword network, and then executed a community network analysis on the collected data. The results of analysis are as the following. First, the patent keyword network indicated very low density and exceptionally high clustering coefficient. Technically, density is obtained by dividing the number of ties in a network by the number of all possible ties. The value ranges between 0 and 1, with higher values indicating denser networks and lower values indicating sparser networks. In real-world networks, the density varies depending on the size of a network; increasing the size of a network generally leads to a decrease in the density. The clustering coefficient is a network-level measure that illustrates the tendency of nodes to cluster in densely interconnected modules. This measure is to show the small-world property in which a network can be highly clustered even though it has a small average distance between nodes in spite of the large number of nodes. Therefore, high density in patent keyword network means that nodes in the patent keyword network are connected sporadically, and high clustering coefficient shows that nodes in the network are closely connected one another. Second, the cumulative degree distribution of the patent keyword network, as any other knowledge network like citation network or collaboration network, followed a clear power-law distribution. A well-known mechanism of this pattern is the preferential attachment mechanism, whereby a node with more links is likely to attain further new links in the evolution of the corresponding network. Unlike general normal distributions, the power-law distribution does not have a representative scale. This means that one cannot pick a representative or an average because there is always a considerable probability of finding much larger values. Networks with power-law distributions are therefore often referred to as scale-free networks. The presence of heavy-tailed scale-free distribution represents the fundamental signature of an emergent collective behavior of the actors who contribute to forming the network. In our context, the more frequently a patent keyword is used, the more often it is selected by researchers and is associated with other keywords or concepts to constitute and convey new patents or technologies. The evidence of power-law distribution implies that the preferential attachment mechanism suggests the origin of heavy-tailed distributions in a wide range of growing patent keyword network. Third, we found that among keywords that flew into a particular field, the vast majority of keywords with new links join existing keywords in the associated community in forming the concept of a new patent. This finding resulted in the same outcomes for both the short-term period (4-year) and long-term period (10-year) analyses. Furthermore, using the keyword combination information that was derived from the methodology suggested by our study enables one to forecast which concepts combine to form a new patent dimension and refer to those concepts when developing a new patent.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

The Relationships among Perceived Value, Use-Diffusion, Loyalty of Mobile Instant Messaging Service (모바일 메신저 서비스의 지각된 가치, 사용-확산 그리고 충성도 간의 관계에 대한 연구)

  • Jo, Dong-Hyuk;Park, Jong-Woo;Chun, Hyun-Jae
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.193-212
    • /
    • 2011
  • Mobile instant messaging service is surfacing to an important keyword in the mobile market together with popularization of Smart phones. Mobile instant messaging service in Korea has become popular to the degree of 87.9% usages from total Smartphone holders, and it is expected that using populations will be more enlarged afterwards if considering a fact that its populations of Smartphone is continuously being increased after exceeding 10 million persons (Trend Monitor, June 2011). In the instant messaging market where competitions have been deepened day by day, raising customer's royalties will be the key for company's business survivals and goals of corporate marketing strategies. It could be said that understanding on which factors affect to customer retentions and royalties is very important. Specially, as changing status is being progressed very quickly in case of innovative mobile services like the instant messaging service, research necessities on how many do consumers use the services after accepting them, how much do consumers use them variously, and whether does it connect to long-term relations have been increased, but studies on such matters are in insufficient situations actually. Therefore, this study examined on which effects were affected to use-diffusion and loyalty factors from perceived customer vales' factors having been occurred after accepting the mobile instant messaging service, namely 'functional value', 'monetary value', 'emotional value', and 'social value'. Also, the study looked into what kind of roles do the service usage and using variety play to service's continued using intents as a loyalty index, recommending intents to others, and brand switching intents. And then the study laid the main purpose in trying to provide implications for enhancing customer securities and royalties on the mobile instant messaging service through research's results. The research hypotheses are as follows; H1: Perceived values will affect influences to royalties. H2: Use-Diffusion will affect influences to loyalty. H3: Perceived value will affect influences to loyalty. H4: The use-diffusion will play intermediating roles between perceived values and loyalty. Total 276 cases among collected 284 ones were used for the statistical analysis by SPSS ver. 15 package. Reliability, Factor analysis, regression were done. As the result of research, 'monetary value' and 'emotional value' affected to 'usage' among perceived value factors, and 'emotional value' was appeared as affecting the largest influence. Besides, the usage affected to constant-using intents and recommending intents to others, and using varieties were displayed as affecting to recommending intents to others. On the other hand, 'Using' and 'Using diversity' were appeared as not affecting to 'brand switching intentions'. Meanwhile, as the result of recognizing about effects of perceived values on the loyalty, it was appeared such like 'continued using intents' affected to'functional value', 'monetary value', and 'social value' first, and also 'monetary value', 'emotional value', and 'social value' affected to 'recommending intents to others'. On the other hand, it was shown such like only 'social value' affected influences to 'brand switching intents', and thus contrary results with the factor 'constant-using intents' were displayed. So, it seems that there are many applications to service provides who are worrying about marketing strategies for making consumer retains (constant-using) and new consumer's inductions (brand-switching intents). Finally, as a result of looking into intermediating roles of the use-diffusion factor in relations between conceived values and royalties at hypothesis 4, 'using' and 'using diversity' were displayed as affecting significant influences all together. Regarding to research result's implications, for expanding and promoting continued uses of the mobile instant messaging service by service providers: First, encouraging recognitions on the perceived value connected to users' service usage are necessary. Second, setting up user's use-diffusion strategies are required so as to enhance the loyalty after understanding a fact that use-diffusion patterns affecting to the service's loyalty are different. Finally, methods of raising customer loyalties and making constant relationships have to be grouped by analyzing on what are the customer value's factors that can satisfy users in competitive alterations.

A Hybrid Forecasting Framework based on Case-based Reasoning and Artificial Neural Network (사례기반 추론기법과 인공신경망을 이용한 서비스 수요예측 프레임워크)

  • Hwang, Yousub
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.43-57
    • /
    • 2012
  • To enhance the competitive advantage in a constantly changing business environment, an enterprise management must make the right decision in many business activities based on both internal and external information. Thus, providing accurate information plays a prominent role in management's decision making. Intuitively, historical data can provide a feasible estimate through the forecasting models. Therefore, if the service department can estimate the service quantity for the next period, the service department can then effectively control the inventory of service related resources such as human, parts, and other facilities. In addition, the production department can make load map for improving its product quality. Therefore, obtaining an accurate service forecast most likely appears to be critical to manufacturing companies. Numerous investigations addressing this problem have generally employed statistical methods, such as regression or autoregressive and moving average simulation. However, these methods are only efficient for data with are seasonal or cyclical. If the data are influenced by the special characteristics of product, they are not feasible. In our research, we propose a forecasting framework that predicts service demand of manufacturing organization by combining Case-based reasoning (CBR) and leveraging an unsupervised artificial neural network based clustering analysis (i.e., Self-Organizing Maps; SOM). We believe that this is one of the first attempts at applying unsupervised artificial neural network-based machine-learning techniques in the service forecasting domain. Our proposed approach has several appealing features : (1) We applied CBR and SOM in a new forecasting domain such as service demand forecasting. (2) We proposed our combined approach between CBR and SOM in order to overcome limitations of traditional statistical forecasting methods and We have developed a service forecasting tool based on the proposed approach using an unsupervised artificial neural network and Case-based reasoning. In this research, we conducted an empirical study on a real digital TV manufacturer (i.e., Company A). In addition, we have empirically evaluated the proposed approach and tool using real sales and service related data from digital TV manufacturer. In our empirical experiments, we intend to explore the performance of our proposed service forecasting framework when compared to the performances predicted by other two service forecasting methods; one is traditional CBR based forecasting model and the other is the existing service forecasting model used by Company A. We ran each service forecasting 144 times; each time, input data were randomly sampled for each service forecasting framework. To evaluate accuracy of forecasting results, we used Mean Absolute Percentage Error (MAPE) as primary performance measure in our experiments. We conducted one-way ANOVA test with the 144 measurements of MAPE for three different service forecasting approaches. For example, the F-ratio of MAPE for three different service forecasting approaches is 67.25 and the p-value is 0.000. This means that the difference between the MAPE of the three different service forecasting approaches is significant at the level of 0.000. Since there is a significant difference among the different service forecasting approaches, we conducted Tukey's HSD post hoc test to determine exactly which means of MAPE are significantly different from which other ones. In terms of MAPE, Tukey's HSD post hoc test grouped the three different service forecasting approaches into three different subsets in the following order: our proposed approach > traditional CBR-based service forecasting approach > the existing forecasting approach used by Company A. Consequently, our empirical experiments show that our proposed approach outperformed the traditional CBR based forecasting model and the existing service forecasting model used by Company A. The rest of this paper is organized as follows. Section 2 provides some research background information such as summary of CBR and SOM. Section 3 presents a hybrid service forecasting framework based on Case-based Reasoning and Self-Organizing Maps, while the empirical evaluation results are summarized in Section 4. Conclusion and future research directions are finally discussed in Section 5.

Deconstructive reading of Makoto Shinkai's : Stories of things that cannot meet without their names (해체로 읽는 신카이 마코토의 <너의 이름은. 군(君)の명(名)は.> : 이름 없이는 서로 만날 수 없는 사물들에 대해)

  • Ahn, Yoon-kyung;Kim, Hyun-suk
    • Cartoon and Animation Studies
    • /
    • s.50
    • /
    • pp.75-99
    • /
    • 2018
  • Makoto Shinkai, an animated film maker in Japan, has been featured as a one-person production system and as a 'writer of light', but his 2016 release of "Your Name" was a departure from the elements that characterize his existing works. At the same time, by the combination of the traditional musubi(むすび) story, ending these, it was a big hit due to its rich narratives and attraction of open interpretation possibility. As it can be guessed from the title of this work, this work shows the encounter between the Japanese ancient language and the modern language in relation to the 'name', and presents the image that the role of the name(language) is repeatedly emphasized with various variations in events for the perfect 'encounter'. In this work, the interpretations of $Signifi\acute{e}$ for characters and objects are extended and reserved as a metaphorical role of the similarity, depending on the meaning of the subject which they touch. The relationship between words and objects analyzed through the structure of Signifiant and $Signifi\acute{e}$ is an epoch-making ideological discovery of modern times revealed through F. Saussure. Focusing on "the difference" between being this and that from the notion of Saussure, Derrida dismissed logocentrism, rationalism that fully obeyed the order of Logos. Likewise, dismissing the center, or dismissing the owner had emerged after the exclusive and closed principle of metaphysics in the west was dismissed. Derrida's definition of 'deconstruction' is a philosophical strategy that starts with the insight on the nature of language. 'Dissemination,' a metaphor that he used as a methodological concept to read texts acts as interpretation and practice (or play), but does not pursue an ultimate interpretation. His 'undecidability' does not start with infinity, but ends with infinity. The researcher testifies himself and identifies that we can't be an interpreter of the world because we, as a human are not the subject of language but a user. Derrida also interpreted the world of things composed of Signifiant and $Signifi\acute{e}$ as open texts. In this respect, this study aimed to read Makoto's works telling about the meeting of a thing and a thing with name as a guide, based on Derrida's frame of 'deconstruction' and 'dissemination.' This study intends to re-consider which relationship the Signifiant and $Signifi\acute{e}$ have with human beings who live in modern times, examine the relationship between words and objects presented in this work through Jacques Derrida's destruction and dissemination concepts, and recognize that we are merely a part of Signifiant and $Signifi\acute{e}$. Just as Taki and Mitsuha confirm the existence by asking each other, we are in the world of things, expecting musubi that a world of names calls me.

A Study Consequence Management System of the Terrorism (테러리즘의 대응관리체제에 관한 고찰 - "9. 11 테러"를 중심으로 -)

  • Kim, Yi-Soo;Ahn, Byung-Soo;Han, Nam-Soo
    • Korean Security Journal
    • /
    • no.7
    • /
    • pp.95-124
    • /
    • 2004
  • It can be said that 'the September 11th Terrorist Attacks' in 2001 were not only the indiscriminate attacks on innocent people but also the whole - political, economical and military - attacks on human life. Also, 'the September 11th Terrorist Attacks' can be regarded as the significant events in the history of world, which were on the peak of the super-terrorism or new-terrorism that had emerged from the 1980s. However, if one would have analysed the developments of terrorism from the 1970s, they could have been foreknown without difficulty. The finding from this study can be summarized as the followings, First, in spite that the USA responsive system against terrorism had been assessed as perfect before 'the September 11th Terrorist Attacks', the fragilities were found in the aspects of the response on the new-terrorism or super-terrorism. The previous responsive system before 'the September 11th Terrorist Attacks' had the following defects as the followings: (1) it was impossible to establish the integrated strategy, because the organizations related to the response against terrorism had not integrated; (2) there were some weakness to collect and diffuse the informations related to terrorism; (3) the security system for the domestic airline service in USA and the responsive system of air defense against terrors on aircraft were very fragile. For these reasons, USA government established the 'Department of Homeland Security' of which the President is the head so that the many organizations related to terrorism were integrated into a single management system. And, it legislated a new act to protect security from terrors, which legalized of the wiretapping in spite of the risk of encroachment upon personal rights, increased the jail terms upon terrorists, froze the bank related to terrorist organization, and could censor e-mails. Second, it seem that Korean responsive system against terrors more fragile than that of USA. One of the reasons is that people have some perception that Korea is a safe zone from terrors, because there were little attacks from international terrorists in Korea. This can be found from the fact that the legal arrangement against terrorism is only the President's instruction No. 47. Under this responsive system against terrorism dependent on only the President's instruction, it is expected that there would be a poor response against terrors due to the lack of unified and integrated responsive agency as like the case of USA before 'the September 11th Terrorist Attacks'. And, where there is no legal countermeasure, it is impossible to expect the binding force on the outside of administrative agencies and the performances to prevent and hinder the terrorist actions can not but be limited. That is to say, the current responsive system can not counteract effectively against the new-terrorism and super-terrorism. Third, although there were some changes in Korean government's policies against terrorism. there still are problems. One of the most important problems is that the new responsive system against terrorism in Korea, different from that of USA, is not a permanent agency but a meeting body that is organized by a commission. This commission is controled by the Prime Minister and the substantial tasks are under the National Intelligence Service. Under this configuration, there can be the lack of strong leadership and control. Additionally, because there is no statute to response against terrorism, it is impossible to prevent and counteract effectively against terrorism. The above summarized suggests that, because the contemporary super-terrorism or new-terrorism makes numerous casualties of unspecified persons and enormous nationwide damages, the thorough prevention against terrorism is the most important challenge, and that the full range of legal and institutional arrangements for the ex post counteraction should be established. In order to do so, it is necessary for the government to make legal and institutional arrangements such as the permanent agency for protection from terrorism in which the related departments cooperates with together and the development of efficient anti-terror programs, and to show its willingness and ability that it can counteract upon any type of domestic and foreign terrorism so that obtain the active supports and confidence from citizens.

  • PDF