• Title/Summary/Keyword: Party

Search Result 2,136, Processing Time 0.025 seconds

Format Study of 2002 Televised Presidential Debates Sponsored by Presidential Debate Committee (대통령후보 TV합동토론 형식(Format) 비교 연구: 대통령선거방송토론위원회 주최 합동토론회를 중심으로)

  • Song, Jong-Gil
    • Korean journal of communication and information
    • /
    • v.22
    • /
    • pp.107-130
    • /
    • 2003
  • This study evaluated the debate formats adopted in the 2002 Televised Presidential Debates. Presidential Debate Committee have sponsored Televised Presidential Debates during the official campaign period. However, it is not easy task for the Committee to coordinate each party's different interests, such as voters, candidates, and broadcasters. Presidential candidates tries to use the debates as one of their campaign strategies. Broadcasters argued limitations in programming and production process. Regardless of the obstacles, voters expect that the committee makes ideal debate formats. The committee adopted two new forms in the 2002 Debates. The committee allowed direct exchange between candidates as well as advance question preparation by candidate. The committee intends that candidates focus on discussing policy issues. Some studies found that the debate format to allow direct exchange between candidates makes candidates focus on image issues rather than policy issues. The findings of this study are similar to the previous studies'. The new debate formats adopted in 2002 televised presidential debates did not guarantee policy issue oriented discussion. The committee or scholars should evaluate the debate formats used in the presidential debates in order to establish ideal debate formats that gives important information for votes to determine their choice. It is necessary to systematically evaluate the debate formats of former presidential campaign for developing right debate formats.

  • PDF

Making a Civil War Surrounding History in Cyber Space Focused on 5·18 Discourses in Ilbe Storehouse (사이버 공간에서의 역사의 내전(內戰)화 '일간베스트저장소'의 5·18 언설을 중심으로)

  • Jung, Soo-Young;Lee, Youngjoo
    • Korean journal of communication and information
    • /
    • v.71
    • /
    • pp.116-154
    • /
    • 2015
  • Officially given a historical signifier as Gwangju Democratic Movement since 1987, far-right and conservative group have restated that $5{\cdot}18$ is a rebellion and a riot that was committed by rebellious elements who obeyed North Korea's command or who were connected with North Korea. As those who had been responsible for the rebellion, revolt and riot were rewarded, far-right and conservatives' collective narrative that a country was born where the pro-North Korea left became dominated aroused extreme hostility towards $5{\cdot}18$. Far-right and conservatives involved in many different fields such as political party, university, press and media and civil group carry out incendiary discourse politics with intention to reestablish history and memory of $5{\cdot}18$ in their own story. Many people at online sites such as Ilbe Storehouse who are considered 'young right wing' is a main route to spread the far-right groups' remarks on $5{\cdot}18$. Ilbe is a main channel to reconstitute and reproduce the far-right conservatives' remarks and information on $5{\cdot}18$. Ilbe is one of main area where remarks of disparagement and ridicule, hostility and hatred on $5{\cdot}18$ unfurl. This study collects $5{\cdot}18$-related remarks and stories unfolded at Ilbe and examines how these remarks and stories make significance as to $5{\cdot}18$ and how information resources which remarks are dependent upon are connected each other. In this process, this study intends to find implications of incendiary politics that echoed of remarks on $5{\cdot}18$ have which at the online site Ilbe and by the far-right conservatives.

  • PDF

Influence of Democracy on Social Policy : The Case of Defective Democracy in Korea (민주주의가 사회복지정책에 미치는 영향 : 한국의 결함 있는 민주주의를 중심으로)

  • Lee, Shin-Yong
    • Korean Journal of Social Welfare
    • /
    • v.59 no.4
    • /
    • pp.137-162
    • /
    • 2007
  • In democracy basic rights such as political equality and participation through elections have been respected, opportunities of corporation and opposition have been guaranteed, and ability of self-learning and self-correction have been developed. These positive factors give preconditions for the welfare development in the democratic state. Because in this state adults get the suffrage and the open competition for official positions induces political parties use social policies as means to win the election. That is to say, political parties have an incentive to use various social policies to win the election. Democracy, therefore, has affinity with social policy. The affinity between democracy and social policy can be found also in Korea which was democratized in 1987. But, in Korea, the positive relationship between democracy and social policy is very weak due to the problem of constitutional structures. Korean Parliament usually enacts abstract social act and delegates the right to fill concrete contents of the social acts to the executive. Delegation itself has no problem, but excessive delegation is a problem since the executive can overuse its discretion as sacrificing the social rights of the citizen. In addition social consensus could not be achieved in this constitutional structures, which are a obstacle to establishing a political process in the Parliament to promote the welfare development through party competition. Excessive delegation should be reduced, and the Parliament should fill concrete contents of the social acts as exercising its legislative power more. Then a mechanism of welfare development can be launched in Korea.

  • PDF

A Study on the Improvement of National Marine Pollution Response Policy based on the Analysis of Gulf of Mexico Oil Spill Incident (미국 멕시코만 오염사고 분석을 통한 국가방제정책 개선방안 연구)

  • Kim, Sang-Woon;Lim, Chang-Soo;Lee, Wan-Sub;Ha, Chang-Woo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.17 no.3
    • /
    • pp.257-264
    • /
    • 2011
  • On April 20, 2010, semi-submersible offshore drilling unit Deepwater Horizon was exploded and sank, and 4.9 million barrels(about 778 thousand tons) of crude oil was spilled into the Gulf of Mexico. As more than one year has been passed since the incident, a lot of investigation reports and lessons learned have been made public and also a lot more will be released soon. This paper studies the final report of the National Commission on "the BP Deepwater Horizon Oil Spill and Offshore Drilling", which was organized by the executive directive of U.S. President Barack Obama, and the interim report of Joint Investigation team of U.S. Coast Guard and BOEMRE of "Report of Investigation into the Circumstances Surrounding the Explosion, Fire, Sinking and Loss of Eleven Members Aboard the Mobile Offshore Drilling Unit Deepwater Horizon". The review is focused on the response to the oil spill. And the paper suggests how to improve national marine pollution response policy. In the paper, the Korean governments is suggested to reinforce the capability for instructing and supervising the responsible party's source control measures, to review how to introduce in-situ burning and vessel of opportunity program into our country, and to continue monitoring on the progress of developments of R&D projects related to oil spill response in the U.S..

The compensation for damage by space accidents (우주손해배상법에 관한 약간의 고찰)

  • Kim, Sun-Ihee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.3-25
    • /
    • 2007
  • In 2002 Republic of Korea successfully launched a self-made mined proportion rocket and it is expected that she will be able to have own space launching system by 2010. According to Article 14 of the Space Exploration Promotion Act, a new law should be established to impose the limit of compensation for the damage by space accident. Therefore, The Space Accident Liability Act was passed in Korean Congress on Nov. 22, 2007 and it will be enforced in six months. The purpose of this Act is to provide reparation for the damage of the third parties that a launch causes; and the Commonwealth should be insured against any possible space accidents to pay for such a damage. Here space accident means the damages to our life, body, and properties from the launching of space objects. There should be an actual loss to establish the compensation of Liability Act. Article 2 in Liability Act defines "damage" as follows: the term "damage" means loss of life, personal injury or loss of or damage to property of persons. Physical and material damages are included in the conception of damage. The meaning of a launching includes any test launch and launch for a real arrangement which will ultimately provides a wide range of compensation. Article 4 indicates that absolute liability should be imposed in compensating for damage by space accidents. Article 4 also indicates that a launching party should be absolutely liable to compensate for the damage caused by its space object on the surface of the Earth. In general, liability stands where fault is. But if the activity is ultra-hazardous and causes serious harm, the individual needs to compensate for the damage unlimitedly. Because of the many launchings for the Seattleite launching, a launching organization is obligated to the liability insurance in preparation for the space accidents. According to the Article 6 of Space Accident Liability Act, to be insured for the compensation for damage is obligatory. It says: "In accordance with Article 11 in the Space Exploration Promotion Act, the person who wants to receive an approval f3r launching needs to be insured in compensation for the possible damage by space accidents.

  • PDF

Ad Planning Model by Comparison Challenge Approach in the e-Marketplace (e-Marketplace에서의 비교도전에 의한 광고계획 모델)

  • 이재규;이재원
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.137-153
    • /
    • 2003
  • Comparison shopping is the most popular functionality in the e-Marketplace. Most of their revenue has been generated kent the Internet advertisement, but the ad earning was declined as the ad costing per action method widespread. Seller less familiar to the customer shrinks from chances for advertising and exposing their products. So, we need an efficient methodology subject to the seller's ad budget and other constraints, and it also has to increase comparison broker's earning in the e-Marketplace. Our research proposed and developed an ad planning methodology using comparison challenge approach which can be applied by 3$^{rd}$ party comparison brokers. Comparison challenge planning is organized with challenge policy of competitor level, product level and specification level. With that policies and basic challenge propositions, we measure the quantified value of functional distance between the specifications of my product and competitor's product. My product challenges the comparison using the comparative ad format to the similar but inferior competitor's product based on quantified valuation. Comparison challenge planning system has two phases of comparative value generation and optimization. We developed a prototype system and applied it to the desktop PC market of five major manufacturers. Our performance was emphasized by comparing to other comparative ad methods such as random display method and minimum distance method..

  • PDF

The Negotiation Model of Negotiation Agents for m-Commerce (모바일 전자상거래를 위한 협상 에이전트의 협상모델)

  • 정진국;이순근;조근식
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.155-175
    • /
    • 2003
  • In context of e-commerce, negotiation is a procedure to help negotiate between buyer and seller by adjusting their negotiation issues such as price and in terms of payment. We used intelligent agent and mobile device to promote new framework of e-commerce. Moreover, this framework can help buyers and sellers to carry their commercial transactions effectively. In regard to that issue, we need to carry out the research of negotiation agent that can be used in e-commerce fields. In this paper, we modeled the negotiation using CSP for the performance of agent in m-commerce environment. Furthermore we implemented interface for mobile device to extract buyer's requirement and preference easily Besides that we used utility function to make a decision for various evaluation functions and suggestions that are used for evaluation of negotiation issues. A difficulty of generating offer is dependent on the number of negotiation issues and the range of the values. Therefore, if any offer has a number of negotiation issues and the range of values are wide, the search space will be exponentially expanded. There have been many studies fur solving this problem, we applied those techniques to improve the agent's ability of negotiation. For example, a contract can be accomplished by exchanging seller and buyer's offer that is generated by agent to adjust the requisite profit for each party. Finally, we show the improvement of satisfaction as the negotiation is processed.

  • PDF

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

The Effect of Make-up Education on Elderly Women's Life Satisfaction (화장교육이 노인여성의 생활만족도에 미치는 영향)

  • Kim, Jung-Si;Min, Kyung-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1749-1755
    • /
    • 2011
  • This study aimed to identify the effect of make-up education on the life satisfaction of elderly women based on a make-up education session for eight weeks from May 28 to July 16, 2010 provided to elderly women aged 60 or above who visited P Seniors' Welfare Center in D city. 80 samples were divided into the experimental group of 40 people and the control group of 40 people based on age and interest in make-up. Their life satisfaction level was identified before the survey. The experimental group received an eight-week make-up education session. In order to verify effects of the make-up education, follow-up tests were conducted toward the experimental and control groups both to compare life satisfaction levels. The make-up education was divided into elegant and natural make-up, make-up to look ten years younger, face-changing make-up, seasonal (spring, summer, autumn, and winter) make-up, make-up for Korean traditional costumes, and party make-up. In each class, students practiced make-up on their face while taking a lecture on theories. After the education, the students found the education satisfactory overall. Based on the results, the life satisfaction of the experimental group who received the make-up education significantly increased (p<0.05), confirming that make-up education affects the life at old age.