• Title/Summary/Keyword: Internet Regulation

Search Result 210, Processing Time 0.026 seconds

A Study on the Image Communication of Military Style in 20th Century (20세기 밀리터리 스타일의 이미지 커뮤니케이션에 대한 연구)

  • Cho, Jung-Mee;Yoo, Hee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.8
    • /
    • pp.1309-1321
    • /
    • 2008
  • Military style is not limited to a single period but represents various image communications related to items, synthetic images and different periodical culture backgrounds. The purpose of this study is to define the communicational function of the military style beginning from the 1st world war up to the modern days, and furthermore explain the characteristics and contents of military styles in different periods by studying the nowadays various symbols of the military style in denotative and connotative aspects. The research method is documentary studies through the literature and academic paper, and examined masters' and doctors' thesis, domestic and overseas books and fashion magazines, photographs and materials collected from the internet. As a result, first, the military style is a significant fashion code in understanding modern fashion by serving as a strong communication function representing people’s ritual through various image items called the 'military look'. Second, the meaning of the image communication through military look changed throughout the different periods. During the 1st and 2nd World war the military look supported Fascism by serving as a media representing extreme patriotism and at the same time social images like functionalism, women liberation, regulation and saving. During the cold war period it was used by young progressives like hippies and punks to send an opposing message towards war and commercialism. Since then up to the 80s it was a medium representing the ‘new role of women’, who possess same social rights and power as the men. However in the 90s the military style had to go through a paradigm transition period. Since this period it got affected by the post modernism and designers, consumers alike adopted military style to create unique beauty It can also be said that it began to be used as a pure fashion code representing intertextuality. It was rather expressed as a metonymy than a metaphor and combined with elegance and feminine factor, which contrasts to the original military concept, it now represents totally new hybrids such as difference, dissemination and varieties.

Rent Seeking Analysis of IPTV Introduction Process in Korea (IPTV 도입 과정에 대한 지대추구론적 분석)

  • Jung, In-Soak
    • Korean journal of communication and information
    • /
    • v.47
    • /
    • pp.5-22
    • /
    • 2009
  • This study analysed the complicated introduction process of IPTV in Korea, based on the rent seeking theory which is one of an useful economic theory for explaining the dynamic interaction between government and entrepreneurs. Rent seeking theory describes the possibility of lobbying for economic regulations or regulatory capture which refers to collusion between firms and the government agencies assigned to regulate them. The introduction of IPTV(Internet Protocol TV) in Korea was the most controversial policy issue since the beginning of new media business of cable TV in 1995. In addition to the ordinary conflict between the old and new entrepreneurs, IPTV caused the bureaucratic conflicts between the Ministry of Information and Communication and the Korean Broadcasting Commission (Two regulation agencies were merged into KCC(Korean Communications Commission) in 2008). Through the process all related policy players, including the government, pursued their own rent, and it caused vicious circle of continuous rent seeking and mutual distrust among players. Finally, all-directional lobby of pre-IPTV companies brought about the successful entrance to IPTV market and the enactment of IPTV special law which includes deregulation compared to the existing Broadcast Act. Considering the convergence trend of media related laws it means going against the times. Until now, the conflict phenomena occurring in broadcast industry were mostly explained based on the sociological conflict theory. However, the result of this study shows the usefulness and necessity of rent seeking theory because it gives an economic explanation of conflict behavior.

  • PDF

The Attitude on Introduction for Total Amount in Terrestrial Broadcasting Television: Comparison of Public and Professional Awareness (지상파 TV에 광고총량제 도입에 대한 태도: 일반인과 전문가 인식비교)

  • Jung, Jin-Tack
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.205-213
    • /
    • 2015
  • Era of multi-channel digital multimedia on the Internet, cable, satellite and IPTV and the growth of new media such as terrestrial broadcast advertising with the poor rating has also dropped sharply. In this situation, terrestrial TV suggesting the introduction for total amount system appearing comments. In this study, the introduction of these intermediate advertising the public and professional awareness about the issue by comparing the introduction for total amount advertising feasibility was done in the purpose. The results were as follows. First, Studies on terrestrial TV suggesting the introduction of total amount system and public opinion about the differences in perception between experts is high. Second, Both the public and professionals about the total amount system preferred application stage were in favor of gradual for/limited permit cross-media. Third, the general population was higher than the positive response from experts about the benefits of the total amount system. Finally, the general public about the disadvantages of the total amount system they were more positive response than the experts. The introduction for total amount system validity of these data for future total amouny system to provide a basis for enforcement is expected to give.

Legal Research on FinTech Regulatory Sandbox Fostering Financial Innovations in Korea (핀테크 활성화를 위한 규제 샌드박스의 도입 방안 연구)

  • Ko, Young-Mi
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.213-267
    • /
    • 2017
  • Regulatory barrier is considered most challenging out of all FinTech barriers, which many technology innovators have always experienced. Even though technological solutions promise customers accessibility to more cost-effective and secured financial services, it is quite challenging to create regulatory environment that enables innovation FinTech industry. Especially, a common challenge FinTech innovators and business face is regulatory uncertainty and confusion rather than any particular regulation. Since many FinTech models are continuously introducing new innovative ways in providing financial services, significant confusion could be raised in applying principles of existing law and regulations. In addition, it is uncertain whether or not applying complex regulatory compliance model intended for large financial institutions to small start-ups is appropriate since most existing regulations and rules are established and introduced without considering innovative tools such as mobile instruments, e-trade, and internet. Therefore, new mechanism to access to regulatory information in a more cost-effective, quick and immediate way should be created. Regulators, technological innovators, and financial customers should cooperate each other to find out appropriate solutions for those issues. Many regulators are introducing regulatory sandbox which provides service providers with opportunities to test their innovations, during the test, providing regulators with enough time to understand risks of innovations. However, regulatory sandbox is not a panacea for all challenges to FinTech innovations. Therefore, regulators should make comprehensive and multidimensional efforts including regulatory sandbox in supporting FinTech ecosystem.

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

A Study on the Analysis of Difference between IT and Non-IT Companies on the Consumer Dispute Resolution System's Continuous Use Intention -Focusing on Korean Small and Medium Enterprises (소비자 분쟁처리시스템 지속사용의도에 대하여 IT기업과 비IT기업 간의 차이분석에 관한 연구 -한국 중소기업을 중심으로)

  • Jung, Soo-Yong;Shin, Yong-tae;Han, Jeong-Hoon;Lee, Sung-Hoon
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.203-212
    • /
    • 2017
  • This research analyzed the factors that have the influences on the intentions to use the consumer dispute settlement system for the small- and medium-sized corporations. The consumer dispute settlement system is a general Internet information portal service which enables the small- and medium-sized corporations and the small businesses receive the support for the accurate damage handling method and the legal service through the Internet in their disputes with the black consumers or the consumers. With the small- and medium-sized corporation users who use the consumer dispute settlement system as the subjects, the research took a lot at what influences the consumer dispute settlement system has on the quality of the information, the quality of the system, the ease-of-use regarding which the environmental factors are perceived, and the ease that was perceived and, finally, what influences it has on the intention of the use. The accuracy, the convenience, and the costs of the consumer dispute settlement system had the positive influences on the ease-of-use that was perceived and the accuracy and the convenience, also had the positive influences on the usefulness that was perceived. Also, it was verified that the ease-of-use of the consumer dispute settlement system that was perceived and the usefulness of use of the consumer dispute settlement system that was perceived finally had the positive influence relationships with the intention of the use. It is highly expected that if, based on the results of this research, the quality of the consumer dispute settlement system is maintained and supplemented to fit the priority order, there will be the maintenance of, and the development toward, a system that is even more improved than the previously existent system.

Korea's Terrorist Environment and Crisis Management Plan (한국의 테러환경과 위기관리 방안)

  • Jang, Sung Jin;Kim, Young-Hyun;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.52
    • /
    • pp.73-91
    • /
    • 2017
  • This study is based on the political and economic standpoint of each country, Use advanced equipment to prevent new terrorism from causing widespread damage, In order to establish a countermeasures against terrorism in accordance with the reality of Korea, which is effective in responding to terrorist attacks, Korea conducted a SWOT analysis of the terrorist environment and terrorist environment through specialists. First, internal strengths of Korea 's terrorist environment include stable security situation, weakness of religious and ethnic conflicts, strong regulation and control of firearms, and counter terrorism capabilities and know - how accumulated during major international events. Second, the internal weaknesses of the terrorist environment in Korea include the insecurity of the people, the instability caused by the military confrontation with North Korea, the absence of anti-terrorism law system, the difficulty of terrorism control and management by the development of the Internet and IT technology. Third, the external opportunities for Korea 's terrorist environment are as follows: ease of supplementation and learning through cases of foreign terrorism failure, ease of increase of terrorist budget and support with higher terrorism issues, strengthening of counterterrorism through military cooperation with allied nationsRespectively. Fourth, the external threats to the terrorist environment in Korea are the increase of social dissatisfaction due to the continuous influx of defectors and foreign workers, the goal of terrorism from international terrorist organizations through alliance with the United States,Increased frequency of incidents, and increased IS coverage of terrorism around the world. In addition, the SWOT in - depth interviews on the terrorist environment of the expert group were conducted to diagnose and analyze the problems, terrorism awareness and legal system in the Korean terror environment. The results of the study are summarized as follows.First, the basic law on terrorism should be enacted.Second, the establishment of an integrated anti-terrorism organization.Third, securing and nurturing specialized personnel in response to terrorism.

  • PDF

User-Perspective Issue Clustering Using Multi-Layered Two-Mode Network Analysis (다계층 이원 네트워크를 활용한 사용자 관점의 이슈 클러스터링)

  • Kim, Jieun;Kim, Namgyu;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.93-107
    • /
    • 2014
  • In this paper, we report what we have observed with regard to user-perspective issue clustering based on multi-layered two-mode network analysis. This work is significant in the context of data collection by companies about customer needs. Most companies have failed to uncover such needs for products or services properly in terms of demographic data such as age, income levels, and purchase history. Because of excessive reliance on limited internal data, most recommendation systems do not provide decision makers with appropriate business information for current business circumstances. However, part of the problem is the increasing regulation of personal data gathering and privacy. This makes demographic or transaction data collection more difficult, and is a significant hurdle for traditional recommendation approaches because these systems demand a great deal of personal data or transaction logs. Our motivation for presenting this paper to academia is our strong belief, and evidence, that most customers' requirements for products can be effectively and efficiently analyzed from unstructured textual data such as Internet news text. In order to derive users' requirements from textual data obtained online, the proposed approach in this paper attempts to construct double two-mode networks, such as a user-news network and news-issue network, and to integrate these into one quasi-network as the input for issue clustering. One of the contributions of this research is the development of a methodology utilizing enormous amounts of unstructured textual data for user-oriented issue clustering by leveraging existing text mining and social network analysis. In order to build multi-layered two-mode networks of news logs, we need some tools such as text mining and topic analysis. We used not only SAS Enterprise Miner 12.1, which provides a text miner module and cluster module for textual data analysis, but also NetMiner 4 for network visualization and analysis. Our approach for user-perspective issue clustering is composed of six main phases: crawling, topic analysis, access pattern analysis, network merging, network conversion, and clustering. In the first phase, we collect visit logs for news sites by crawler. After gathering unstructured news article data, the topic analysis phase extracts issues from each news article in order to build an article-news network. For simplicity, 100 topics are extracted from 13,652 articles. In the third phase, a user-article network is constructed with access patterns derived from web transaction logs. The double two-mode networks are then merged into a quasi-network of user-issue. Finally, in the user-oriented issue-clustering phase, we classify issues through structural equivalence, and compare these with the clustering results from statistical tools and network analysis. An experiment with a large dataset was performed to build a multi-layer two-mode network. After that, we compared the results of issue clustering from SAS with that of network analysis. The experimental dataset was from a web site ranking site, and the biggest portal site in Korea. The sample dataset contains 150 million transaction logs and 13,652 news articles of 5,000 panels over one year. User-article and article-issue networks are constructed and merged into a user-issue quasi-network using Netminer. Our issue-clustering results applied the Partitioning Around Medoids (PAM) algorithm and Multidimensional Scaling (MDS), and are consistent with the results from SAS clustering. In spite of extensive efforts to provide user information with recommendation systems, most projects are successful only when companies have sufficient data about users and transactions. Our proposed methodology, user-perspective issue clustering, can provide practical support to decision-making in companies because it enhances user-related data from unstructured textual data. To overcome the problem of insufficient data from traditional approaches, our methodology infers customers' real interests by utilizing web transaction logs. In addition, we suggest topic analysis and issue clustering as a practical means of issue identification.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF