• Title/Summary/Keyword: Trust System

Search Result 999, Processing Time 0.028 seconds

A Study on the Design of a Fake News Management Platform Based on Citizen Science (시민과학 기반 가짜뉴스 관리 플랫폼 연구)

  • KIM, Ji Yeon;SHIM, Jae Chul;KIM, Gyu Tae;KIM, Yoo Hyang
    • Journal of Science and Technology Studies
    • /
    • v.20 no.1
    • /
    • pp.39-85
    • /
    • 2020
  • With the development of information technology, fake news is becoming a serious social problem. Individual measures to manage the problem, such as fact-checking by the media, legal regulation, or technical solutions, have not been successful. The flood of fake news has undermined not only trust in the media but also the general credibility of social institutions, and is even threatening the foundations of democracy. This is why one cannot leave fake news unchecked, though it is certainly a difficult task to accomplish. The problem of fake news is not about simply judging its veracity, as no news is completely fake or unquestionably real and there is much uncertainty. Therefore, managing fake news does not mean removing them completely. Nor can the problem be left to individuals' capacity for rational judgment. Recurring fake news can easily disrupt individual decision making, which raises the need for socio-technical measures and multidisciplinary collaboration. In this study, we introduce a new public online platform for fake news management, which incorporates a multidimensional and multidisciplinary approach based on citizen science. Our proposed platform will fundamentally redesign the existing process for collecting and analyzing fake news and engaging with user reactions. People in various fields would be able to participate in and contribute to this platform by mobilizing their own expertise and capability.

A Study on the Suppression and Punishment of International Terrorism (국제(國際)테러리즘의 억제(抑制)와 처벌(處罰)에 관한 연구(硏究) -중국민항기(中國民航機) 공중납치사건(空中拉致事件)을 중심(中心)으로-)

  • Yoh, Yeung-Moo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.87-123
    • /
    • 1989
  • The purpose of this thesis is to do a research on suppression of peacetime international terrorism and penal system of terrorists by political and economic means. International terrorism means wanton killing, hostage taking, hijacking, extortion or torture committed or threatened to be comitted against the innocent civilian in peacetime for political motives or purposes provided that international element is involved therein. This research is limited to international terrorism of political purposes in peacetime, especially, hijacking of civil aircraft. Hijacking of civil aircraft include most of international terrorism element in its criminal act and is considered to be typical of international terrorism in view of multinationality of its crews, passengers and transnational borders involved in aircraft hijacking. Civil air transportation of today is a indispensable part of international substructure, as it help connect continuously social cultural and economic network of world community by dealing with massive and swift transportation of passengers and all kinds of goods. Current frequent hijacking of civil aircraft downgrade the safety and trust of air travel by mass slaughter of passengers and massdestruction of goods and endanger indispensable substructure of world community. Considering these facts, aircraft hijacking of today poses the most serious threat and impact on world community. Therefore, among other thing, legal, political, diplomatic and economic sanctions should be imposed on aircraft hijacking. To pursue an effective research on this thesis aircraft hijacking by six Chineses on 5th May, 1983, from mainland China to Seoul, Korea, is chosen as main theme and the Republic of Korea's legal, political and diplomatic dealing and settlement of this hijacking incident along with six hijackers is reviewed to find out legal, political diplomatic means of suppression and solution of international terrorism. Research is focused on Chinese aircraft hijacking, Korea-China diplomatic negotiation, Korea's legal diplomatic handling and settlement of Tak Chang In, mastermind of aircraft hijacking and responses and position of three countries, Korea, China and Taiwan to this case is thoroughly analyzed through reviewing such materials as news reportings and comments of local and international mass media, Korea-China Memorandum, statements of governments of Korea, China and Taiwan, verdicts of courts of Korea, prosecution papers and oral argument by the defendants and lawyers and three antiaircraft hijacking conventions of Hague, Tokyo and Montreal and all the other instruments of international treaties necessary for the research. By using above-mentioned first-hand meterials as yardsticks, legal and political character of Chinese aircraft hijacking is analyzed and reviewed and close cooperation among sovereign states based on spirit of solidarity and strict observance of international treaties such as Hague, Tokyo and Montreal Conventions is suggested as a solution and suppressive means of international terrorism. The most important and indispensable factor in combating terrorism is, not to speak, the decisive and constant resolution and all-out effort of every country and close cooperation among sovereign states based on "international law of cooperation."

  • PDF

The characteristics of Pacioli's Bookkeeping (파치올리 부기론의 특성에 관한 고찰)

  • Yoon Seok-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.297-306
    • /
    • 2005
  • Compendium of arithmetic, geometry, and proportions and proportionality' that was published in Venice in 1494 has been recognized as the first bookkeeping data in the world. Major characteristics of Pacioli's bookkeeping rules were reviewed in this study as follows: All the necessary particulars for double entry bookkeeping were provided in Pacioli's bookkeeping rules;. List of property was described at the time of start of business; Three major books were used; Details of daily transactions were considered to be important; Strike through was lined at each description in journal books, details of daily transactions, and list of property after entry of ledger; Amount columns were provided and Arabic numerals were used; Annual settlement custom was being initiated; Profit and loss account was prepared at year-end; Trial balance sheet was inevitably described; Books were verified prior to closing accounts; Control account was not established; Financial statements were not prepared and business analysis was made, too; Finished goods inventory was not adjusted; Mark was assigned to books; Inter-office account was prepared; Branch accounts and branch ledgers were prepared; There was entries of trust; Current arrangement was described; The principle 'Cost or market price, whichever is lower basis' was promoted: Petty cash system is explained Checks and bills of exchange are used in bank account. As mentioned, characteristics of Pacioli's bookkeeping rules were reviewed; the signs of necessity for preparation of profit and loss statement and balance sheet is found as well as preparation of trial balance sheet and the rules may be considered as a very excellent one in terms of the bookkeeping on initiating stage of double entry bookkeeping.

  • PDF

The Influences of Cognitive Authority of Online Information Sources on Information Quality Evaluation (온라인 정보원의 인지적 권위에 대한 인식이 정보의 품질 평가에 미치는 영향)

  • Lee, Changho;Yi, Yongjeong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.4
    • /
    • pp.157-173
    • /
    • 2019
  • Due to the fact that cognitive authority influences an individual's thoughts so that a given information is perceived as appropriate, people evaluate information based on their cognitive authority. The purpose of the present study is to examine the perception of the cognitive authority of online information sources used by college students to carry out their academic tasks, and to determine whether such perceptions affect the quality assessment of information sources, such as webpages, e-journals, and Wikipedia,. Specifically, we measured how cognitive authority, which were formed by the author, the surface, and the content of an information source influenced its accuracy, usefulness, completeness, and expertise. For this purpose, online surveys were conducted with college students, and 172 valid responses were obtained. Findings indicated that all the characteristics that formed the cognitive authority of an information source had significant impacts on its accuracy, usefulness, completeness, and expertise. The study suggests academic implications that confirm the associations between cognitive authority and credibility of information in the context of online information sources. Furthermore, the study provides practical implications that system developers or operators of information sources need to consider diverse factors that affect their cognitive authority to promote users' trust on the information that they deliver.

An Empirical Investigation into the Role of Core-Competency Orientation and IT Outsourcing Process Management Capability (핵심역량 지향성과 프로세스 관리역량이 IT 아웃소싱 성과에 미치는 연구)

  • Kim, Yong-Jin;Nam, Ki-Chan;Song, Jae-Ki;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.17 no.3
    • /
    • pp.131-146
    • /
    • 2007
  • Recently, the role of IT service providers has been enlarged from managing a single function or system to reconstructing entire information management processes in new ways to contribute to shareholder value across the enterprise. This movement toward extensive and complex outsourcing agreements has been driven by the assumption that outsourcing information technology functions is a reliable approach to maximizing resource productivity. Hiring external IT service providers to manage part or all of its information-related services helps a firm focus on its core business and provides better services to its clients, thus obtaining sustainable competitive advantage. This practice of focusing on the strategic aspect of outsourcing is referred to as strategic sourcing where the focus is capability sourcing, not procurement. Given the importance of the strategic outsourcing, however, to our knowledge, there is little empirical research on the relationship between the strategic outsourcing orientation and outsourcing performance. Moreover, there is little research on the factor that makes the strategic outsourcing effective. This study is designed to investigate the relationship between strategic IT outsourcing orientation and IT outsourcing performance and the process through which strategic IT outsourcing orientation influences outsourcing performance, Based on the framework of strategic orientation-performance and core competence based management, this study first identifies core competency orientation as a proper strategic orientation pertinent to IT outsourcing and IT outsourcing process management capability as the mediator to affect IT outsourcing performance. The proposed research model is then tested with a sample of 200 firms. The findings of this study may contribute to the literature in two ways. First, it draws on the strategic orientation - performance framework in developing its research model so that it can provide a new perspective to the well studied phenomena. This perspective allows practitioners and researchers to look at outsourcing from an angle that emphasizes the strategic decision making to outsource its IT functions. Second, by separating the concept of strategic orientation and outsourcing process management capability, this study provides practices with insight into how the strategic orientation can work effectively to achieve an expected result. In addition, the current study provides a basis for future studies that examine the factors affecting IT outsourcing performance with more controllable factors such as IT outsourcing process management capability rather than external hard-to-control factors including trust and relationship management. This study investigates the major factors that determine IT outsourcing success. Based on strategic orientation and core competency theories, we develop the proposed research model to investigate the relationship between core competency orientation and IT outsourcing performance and the mediating role of IT outsourcing process management capability on IT outsourcing performance. The model consists of two independent variables (core-competency-orientation and IT outsourcing process management capability), and two dependent variables (outsourced task complexity and IT outsourcing performance). Comprehensive data collection was conducted through an outsourcing association. The survey data were analyzed using a structural analysis method. IT outsourcing process management capability was found to mediate the effect of core competency orientation on both outsourced task complexity and IT outsourcing performance. Further analysis and findings are discussed.

Development of an Automated Design Algorithm for the Longitudinal Members of Oil Tankers based on H-CSR (H-CSR 기반 유조선 종강도 부재의 설계 자동화 알고리즘 개발)

  • Park, Chan-im;Jeong, Sol;Song, Ha-cheol;Na, Seung-soo;Park, Min-cheol;Shin, Sang-hoon;Lee, Jeong-youl
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.53 no.6
    • /
    • pp.503-513
    • /
    • 2016
  • In order to reduce the green-house gas exhaustion, International Maritime Organization (IMO) has been reinforcing carbon gas regulations. Due to the regulations, a lot of competitions for designing Eco ship in the shipbuilding industry are progressing now. It is faced with the necessity of reducing hull weight by combining automated systems for optimal compartment arrangement with hull structural design. Most researches on optimum structural design method have been consistently in progress and applied to minimize weight and cost of mid-ship section in preliminary ship design stage based on analytical structural analysis method on fixed compartment arrangement. In order to reduce design period and to improve international technical competitiveness by shortening the period of hull structural design and enhancing design accuracy, it has been felt necessity to combine optimized compartment arrangement with optimum design of ship structure based on the international regulations and rules. So in this study, the automated design algorithm for longitudinal members has been developed to combine automated algorithm of compartment arrangement with hull structural design system for oil tanker. The SeaTrust-Hullscan software developed by Korean Register is used to perform ship structural design for mother ship and selected design cases. The effect of weight reduction is verified with comparison of ship weight between mother ship and the cases suggested in this study.

The Dehistoricization Trend in Historical Plays: Play with History and Everyday Life History Writing (역사극의 탈역사화 경향: 역사의 유희와 일상사적 역사 쓰기)

  • Kim, Sunghee
    • Journal of Korean Theatre Studies Association
    • /
    • no.48
    • /
    • pp.51-84
    • /
    • 2012
  • In Korea, historical plays took an epoch-making turn from the previous historical plays in terms of approaches to topic and material and methods of rewriting history in the 1990s. Historical plays became dehistoricized with individual, everyday life, and faction emerging as major codes of historical plays according to mistrust in history and grand narrative as the original and disappearance of trust in the growth and totality of history. A new trend became dominant of presenting fictionality prominent instead of reproduction of history and freely playing with history outside the context. While modern historical plays were subject to the content of history, post-modern historical plays sought after new history writing to tell a new story on history within a framework of fiction. Focusing on some of the trends in post-modern historical plays since the 1990s, which include play with history, daily life-style history writing, and reproduction patterns of colonial modernity, this study examined the goals, representations, and text strategies of new history writing in three historical plays, Generation After Generation(2000) by Park Geunhyung, The Mercenaries(2000) by Park Sujin, and Chosun Detective Hong Yunshik(2007) by Sung Giwoong. In Generation After Generation, the author adopts a plot of starting with the present and tracing back to the past, breaking down the myth of racially homogeneous nation. At the same time, he discloses that the colonial history is not just by the oppressive force of Japan but also by the voluntary cooperation of Korean people. That is, we are also accountable for the colonial history of the nation. The Mercenaries contrasts the independence movement during the colonial period against the modern history developed after Liberation, thus highlighting the still continuing coloniality, namely post-colonial present. The past is presented as the "phantom of history" making its appearance according to the request of the present hoping for salvation. The author politicizes history and grants political wishes to history by summoning the history by personal memories such as fictional diaries and letters with Messiah-like images opposed to the present of collapse and catastrophe. In Chosun Detective Hong Yunshik, the author makes an attempt at the microscopic reproduction of daily life by approaching the 1930s as the modern period when capitalist daily life started to take root. The lists of signs comprising daily life in colonial Gyeongseong are divided between civilization and savagery and between modern and premodern. With the progress of narrative, however, they become mixed together and reversed in the representation system in which the latter overwhelms the former.

A Study on the Factors Affecting the Recognition of Self-determination Right and the Necessity of Decision Support for the Elderly Living Alone (독거노인의 자기결정권 인식과 의사결정 지원 필요성에 대한 영향요인 연구)

  • Kim, Hyojung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.125-134
    • /
    • 2019
  • The purpose of this study is to explore the direction of decision support for senior citizens living alone by identifying the level of self-determination and desire for decision support. The survey was conducted on 300 elderly people living alone in five districts of Seoul. The analysis results are as follows: First, it has been shown that elderly living alone have thought that it is most important to reflect their decisions when deciding where to live. Second, respondents highly recognized that the need for support decision making as the age group grew. Third, it was found that the factors affecting the perception of the need to support decision-making by senior citizens living alone were age, trust in family and recognition of importance in decision-making. The study suggested the need for a specific, institutionalized system to support decision making for elderly living alone.

Improving Archival Descriptive Standard Based on the Analysis of the Reviews by Archival Communities on RiC-CM Draft (RiC에 대한 기록공동체의 리뷰를 통해 본 기록물 기술표준 개선을 위한 제안)

  • Park, Ziyoung
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.81-109
    • /
    • 2017
  • This study suggests an analysis of the reviews provided by international archival professionals on the RiC-CM draft published by ICA EGAD. Some implications for the Korean archival management environment were also suggested. Some professional reviews were accessible through the internet. Italian archival professionals held workshops at various levels for the analysis and discussion of the draft. Duranti, the project director of InterPARES, also gave opinions about the draft in cluding the perspective of digital preservation. In the review of Artefactual, the draft was discussed in terms of system implementation. Reed, the director of Recordkeeping Innovation, also gave a feedback based on the record management experiences in Australia. Some implications can be suggested based on these professional opinions. First, we should try to build a test bed for the adoption of RiC to archival description in the Korean environment. Second, a minimum level of data elements that can secure authenticity and integrity will also be needed. Third and lastly, rich authority data for agents and functions related to archival records and records groups are essential to take full advantage of the standard.

Personal Credit Evaluation System through Telephone Voice Analysis: By Support Vector Machine

  • Park, Hyungwoo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.63-72
    • /
    • 2018
  • The human voice is one of the easiest methods for the information transmission between human beings. The characteristics of voice can vary from person to person and include the speed of speech, the form and function of the vocal organ, the pitch tone, speech habits, and gender. The human voice is a key element of human communication. In the days of the Fourth Industrial Revolution, voices are also a major means of communication between humans and humans, between humans and machines, machines and machines. And for that reason, people are trying to communicate their intentions to others clearly. And in the process, it contains various additional information along with the linguistic information. The Information such as emotional status, health status, part of trust, presence of a lie, change due to drinking, etc. These linguistic and non-linguistic information can be used as a device for evaluating the individual's credit worthiness by appearing in various parameters through voice analysis. Especially, it can be obtained by analyzing the relationship between the characteristics of the fundamental frequency(basic tonality) of the vocal cords, and the characteristics of the resonance frequency of the vocal track.In the previous research, the necessity of various methods of credit evaluation and the characteristic change of the voice according to the change of credit status were studied. In this study, we propose a personal credit discriminator by machine learning through parameters extracted through voice.