• 제목/요약/키워드: Internet Negative

검색결과 697건 처리시간 0.025초

국제상거래 분쟁해결을 위한 온라인 ADR 모델 구축방안 (The Building Plan of Online ADR Model related to the International Commercial Transaction Dispute Resolution)

  • 김선광;김종락;홍성규
    • 한국중재학회지:중재연구
    • /
    • 제15권2호
    • /
    • pp.3-35
    • /
    • 2005
  • The meaning of Online ADR lies in the prompt and economical resolution of disputes by applying the information/communication element (Internet) to existing ADR. However, if the promptness and economical efficiency are overemphasized, the fairness and appropriateness of dispute resolution may be compromised and consequently Online ADR will be belittled and criticized as second-class trials. In addition, as communication is mostly made using texts in Online ADR it is difficult to investigate cases and to create atmosphere and induce dynamic feelings, which are possible in the process of dispute resolution through face-to-face contact. Despite such difficulties, Online ADR is expanding its area not only in online but also in offline due to its advantages such as promptness, low expenses and improved resolution methods, and is expected to develop rapidly as the electronic government decided to adopt it in the future. Accordingly, the following points must be focused on for the continuous First, in the legal and institutional aspects for the development of Online ADR, it is necessary to establish a framework law on ADR. A framework law on ADR comprehending existing mediation and arbitration should be established and it must include contents of Online ADR, which utilizes electronic communication means. However, it is too early to establish a separate law for Online ADR because Online ADR must develop based on the theoretical system of ADR. Second, although Online ADR is expanding rapidly, it may take time to be settled as a tool of dispute resolution. As discussed earlier, additionally, if the amount of money in dispute is large or the dispute is complicated, Online ADR may have a negative effect on the resolution of the dispute. Thus, it is necessary to apply Online ADR to trifle cases or domestic cases in the early stage, accumulating experiences and correcting errors. Moreover, in order to settle numerous disputes effectively, Online ADR cases should be analyzed systematically and cases should be classified by type so that similar disputes may be settled automatically. What is more, these requirements should reflected in developing Online ADR system. Third, the application of Online ADR is being expanded to consumer disputes, domain name disputes, commercial disputes, legal disputes, etc., millions of cases are settled through Online ADR, and 115 Online ADR sites are in operation throughout the world. Thus Online ADR requires not temporary but continuous attention, and mediators and arbitrators participating in Online ADR should be more intensively educated on negotiation and information technologies. In particular, government-led research projects should be promoted to establish Online ADR model and these projects should be supported by comprehensive researches on mediation, arbitration and Online ADR. Fourth, what is most important in the continuous development and expansion of Online ADR is to secure confidence in Online ADR and advertise Online ADR to users. For this, incentives and rewards should be given to specialists such as lawyers when they participate in Online ADR as mediators and arbitrators in order to improve their expertise. What is more, from the early stage, the government and public institutions should have initiative in promoting Online ADR so that parties involved in disputes recognize the substantial contribution of Online ADR to dispute resolution. Lastly, dispute resolution through Online ADR is performed by organizations such as Korea Institute for Electronic Commerce and Korea Consumer Protection Board and partially by Korean Commercial Arbitration Board. Online ADR is expected to expand its area to commercial disputes in offline in the future. In response to this, Korean Commercial Arbitration Board, which is an organization for commercial dispute resolution, needs to be restructured.

  • PDF

서울의 최근 자외선 복사의 변화 2004~2010 (Recent Variations of UV Irradiance at Seoul 2004~2010)

  • 김준;박상서;조나영;김우경;조희구
    • 대기
    • /
    • 제21권4호
    • /
    • pp.429-438
    • /
    • 2011
  • The climatology of surface UV radiation for Seoul, presented in Cho et al. (1998; 2001), has been updated using measurement of surface erythemal ultraviolet (EUV) and total ultraviolet (TUV) irradiance (wavelength 286.5~363.0 nm) by a Brewer Spectrophotometer (MK-IV) for the period 2004~2010. The analysis was also carried out together with the broadband total (global) solar irradiance (TR ; 305~2800 nm) and cloud amount to compare with the UV variations, measured by Seoul meteorological station of Korean Meteorological Agency located near the present study site. Under all-sky conditions, the day-to-day variability of EUV exhibits annual mean of 98% in increase and 31% in decrease. It has been also shown that the EUV variability is 17 times as high as the total ozone in positive change, whereas this is 6 times higher in negative change. Thus, the day to day variability is dominantly caused rather by the daily synoptic situations than by the ozone variability. Annual mean value of daily EUV and TUV shows $1.62kJm^{-2}$ and $0.63MJm^{-2}$ respectively, whereas mean value of TR is $12.4MJm^{-2}$ ($143.1Wm^{-2}$). The yearly maximum in noon-time UV Index (UVI) varies between 9 and 11 depending on time of year. The highest UVI shows 11 on 20 July, 2008 during the period 2004~2010, but for the period 1994~2000, the index of 12 was recorded on 13 July, 1994 (Cho et al., 2001). A 40% of daily maximum UVI belongs to "low (UVI < 2)", whereas the UVI less than 5% of the maximum show "very high (8 < UVI < 10)". On average, the maximum UVI exceeded 8 on 9 days per year. The values of Tropospheric Emission Monitoring Internet Service (TEMIS) EUV and UVI under cloud-free conditions are 1.8 times and 1.5 times, respectively, higher than the all-sky measurements by the Brewer. The trend analysis in fractional deviation of monthly UV from the reference value shows a decrease of -0.83% and -0.90% $decade^{-1}$ in the EUV and TUV, respectively, whereas the TR trend is near zero (+0.11% $decade^{-1}$). The trend is statistically significant except for TR trend (p = 0.279). It is possible that the recent UV decrease is mainly associated with increase in total ozone, but the trend in TR can be attributed to the other parameters such as clouds except the ozone. Certainly, the cloud effects suggest that the reason for the differences between UV and TR trends can be explained. In order to estimate cloud effects, the EUV, TUV and TR irradiances have been also evaluated for clear skies (cloud cover < 25%) and cloudy skies (cloud cover ${\geq}$ 75%). Annual mean values show that EUV, TUV and TR are $2.15kJm^{-2}$, $0.83MJm^{-2}$, and $17.9MJm^{-2}$ for clear skies, and $1.24kJm^{-2}$, $0.46MJm^{-2}$, and $7.2MJm^{-2}$ for cloudy skies, respectively. As results, the transmission of radiation through clouds under cloudy-sky conditions is observed to be 58%, 55% and 40% for EUV, TUV and TR, respectively. Consequently, it is clear that the cloud effects on EUV and TUV are 18% and 15%, respectively lower than the effects on TR under cloudy-sky conditions. Clouds under all-sky conditions (average of cloud cover is 5 tenths) reduced the EUV and TUV to about 25% of the clear-sky (cloud cover < 25%) values, whereas for TR, this was 31%. As a result, it is noted that the UV radiation is attenuated less than TR by clouds under all weather conditions.

비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형 (An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost)

  • 이현욱;안현철
    • 지능정보연구
    • /
    • 제17권4호
    • /
    • pp.157-173
    • /
    • 2011
  • 최근 인터넷 사용의 증가에 따라 네트워크에 연결된 시스템에 대한 악의적인 해킹과 침입이 빈번하게 발생하고 있으며, 각종 시스템을 운영하는 정부기관, 관공서, 기업 등에서는 이러한 해킹 및 침입에 의해 치명적인 타격을 입을 수 있는 상황에 놓여 있다. 이에 따라 인가되지 않았거나 비정상적인 활동들을 탐지, 식별하여 적절하게 대응하는 침입탐지 시스템에 대한 관심과 수요가 높아지고 있으며, 침입탐지 시스템의 예측성능을 개선하려는 연구 또한 활발하게 이루어지고 있다. 본 연구 역시 침입탐지 시스템의 예측성능을 개선하기 위한 새로운 지능형 침입탐지모형을 제안한다. 본 연구의 제안모형은 비교적 높은 예측력을 나타내면서 동시에 일반화 능력이 우수한 것으로 알려진 Support Vector Machine(SVM)을 기반으로, 비대칭 오류비용을 고려한 분류기준값 최적화를 함께 반영하여 침입을 효과적으로 차단할 수 있도록 설계되었다. 제안모형의 우수성을 확인하기 위해, 기존 기법인 로지스틱 회귀분석, 의사결정나무, 인공신경망과의 결과를 비교하였으며 그 결과 제안하는 SVM 모형이 다른 기법에 비해 상대적으로 우수한 성과를 보임을 확인할 수 있었다.

한.중 인터넷 이용자들의 한국영화 이해에 관한 비교 연구: <엽기적인 그녀> 영화 사이트의 관람후기 게시판을 중심으로 (A Study on Understanding about the Korean movie of Internet user in China: Focused on the Reply of Movie Web-site in China and Korea)

  • 이제영;최정기
    • 한국언론정보학보
    • /
    • 제34권
    • /
    • pp.196-243
    • /
    • 2006
  • 1990년대 말부터 시작된 한국 대중문화의 유행현상은 "한류(韓流)"라는 이름으로 중국 및 범아시아 지역에 퍼져나가고 있다. 그러나 "한류"에 대한 지금까지의 논의는 경제 논리의 수준에서 한정적인 연구들이 성행해 왔다. 이에 본 연구는 기존의 논의에 문제를 제기하고 대상이 되는 한국의 대중문화 콘텐츠와 이를 받아들이고 있는 수용자들의 대상에 대한 이해를 알아보는 것이 "한류"의 정체성을 밝히는 것임을 주장한다. 이를 위해 중국 인터넷 이용자들의 한국 영화 <엽기적인 그녀>에 대한 이해를 알아보고 문화교차 연구의 한 가지 사례 제시를 주된 목적으로 하였다. 영화<엽기적인 그녀>에 대한 중국 인터넷 이용자의 관람후기 게시판을 분석한 결과 반응의 특징을 크게 다섯 가지로 나눌 수 있었다. 영화의 현실감과 감정의 세밀하고 현실적인 묘사, 남자 주인공이 보여주는 순수하고 자기희생적인 태도에 대한 호감, 다른 영화에서 보여주지 못한 새로운 느낌을 받는다는 의견, 배역의 개성에 호감, "엽기적 행동"에 대한 거부감을 나타내는 의견이 있었다. 이 영화가 "한류"와 한국의 이미지에 어떠한 영향을 미쳤는지 분석한 결과 긍정적인 의견이 많았지만 이면에 저항감도 적지 않았다. 또한 중국 인터넷 이용자들과 한국 인터넷 이용자의 이 영화에 대한 이해를 비교해본 결과 한국의 인터넷 이용자들은 영화의 희극성을, 중국 인터넷 이용자들은 현실적이고 신선하다는 의견이 상대적으로 많았다. 결론적으로 중국의 인터넷 이용자는 이 영화에 대해 신선함과 현실감, 창의성, 내면의 감동에 이끌려 호감을 갖는 것이지 겉으로 드러난 형식이나 방식에 이끌리는 것은 아니라는 것을 보여준다. 또한 중국의 인터넷 이용자들은 이 영화를 한국의 인터넷 이용자와 다르게 이해하고 있으며 이러한 차이는 구성주의와 해석학에서 이야기하는 사회문화적, 역사적 상황이 다른 문화에서는 같은 대상에 대한 이해가 달라질 수도 있다는 예시를 보여준 것이다. 이렇듯 "한류"의 정체성을 파악하기 위해서는 우선 각 문화의 다양성과 특수성에 대한 연구가 선행되어야 하고 현재의 우리와 다른 사람들 사이에 진행되고 있는 문화적 욕구들이 어떻게 생성되고 있는지 현장에서 연구할 필요가 있다. 덧붙여 한국의 대중문화가 이러한 욕구에 잘 부합되고 있는지, 새로운 무엇을 만들어 내고 있지는 않은지 연구할 필요성을 절실히 느낀다.

  • PDF

풍물굿의 해외 문화이주 현상에 관한 연구 - 캐나다 토론토의 풍물패 활동을 중심으로 - (A Study of Cultural Migration of Pungmul-gut - Focusing on a Pungmul-pae's Activity in Toronto, Canada -)

  • 이용식
    • 공연문화연구
    • /
    • 제41호
    • /
    • pp.353-380
    • /
    • 2020
  • 사물놀이/풍물굿은 해외 한인들에게는 민족정체성의 상징이다. 한인사회의 각종 행사에서 사물놀이/풍물굿은 한국문화의 대표적 디아스포라 음악으로 자리매김한다. 한편으로 해외에서 사물놀이/풍물굿은 한국인뿐만 외국인도 즐기는 글로벌음악으로 성장했다. 해외에서 결성된 각종 음악공동체를 통해 사물놀이/풍물굿은 '전통과 변형', '정통성과 혼종성'의 담론을 통해 문화변용과 문화적응의 문화이주 현상을 극명하게 보여준다. 이 글에서는 캐나다 토론토에서 활동하는 풍물패 '비춰주네'의 문화적·음악적 정체성을 통해 풍물굿의 문화이주 현상을 밝혔다. 이 글에서 논의하는 캐나다 토론토의 풍물패 '비춰주네'는 외국인 상쇠에 의해 조직된 단체이다. 외국인들에게 풍물굿은 월드뮤직의 한 갈래로서 쉽게 배울 수 있는 음악이다. 그렇기에 월드뮤직에 관심 있는 외국인들에게 풍물굿은 접근이 어렵지 않다. 현재 이 단체는 외국인과 한인이 함께 어우러지는 개방적 '음악공동체'를 지향한다. 그러면서도 풍물굿의 전통성과 정통성을 유지하려는 노력을 경주한다. 각종 교재와 인터넷 시청각자료를 활용하여 가락의 정통성을 유지하면서 변형과 혼종성이라는 문화변용이 작용하지 않는다. 오히려 한인뿐만 아니라 외국인이 함께 참가하면서 한국음악의 세계화를 촉진시킨다. 풍물패 '비춰주네'의 공연 사례를 통해 캐나다에서의 풍물굿의 문화적응을 살펴보았다. 진보적 주류사회에서 주최하는 공연과 보수적 한인사회에서 주최하는 공연의 대비를 통해 풍물굿에 대한 인식을 살펴보았다. 진보적 외국인 감상층은 풍물굿의 민중적 본성을 이해한다. 보수적 한인 감상층은 풍물굿의 전통적 본질을 받아들이지만, '소란'한 음악적 · 음향적 요인은 받아들이기가 쉽지 않다. 결국 풍물굿의 긍정적/부정적 수용은 외국인/한인이라는 민족적 요인보다는 진보적/보수적이라는 사상적 성향이 중요하게 작동한다.

소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점 (Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective)

  • 정남호;한희정;구철모
    • Asia pacific journal of information systems
    • /
    • 제22권4호
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법 (A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model)

  • 조원진;노상규;윤지영;박진수
    • Asia pacific journal of information systems
    • /
    • 제21권1호
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.