• Title/Summary/Keyword: conflict information

Search Result 832, Processing Time 0.027 seconds

The relationship between the major market-based media and the government in Korea (한국의 민주화와 미디어 : 정부와 시장 주류 미디어의 관계)

  • Jo, Hang-Je
    • Korean journal of communication and information
    • /
    • v.16
    • /
    • pp.168-206
    • /
    • 2001
  • This study attempts to examine the relationships between the major market-based media and the government after closing military regime era, 1961-1987. After the military regime was collapsed, while the mass media in Korea obtained independence and autonomy from government, they have been confronted with the terrible competition not so much comparatively as before. The watchdog role in the traditional liberalism, which is regarded as normative relationship between the media and the government would be transformed in accordance with the market condition and the maturity of democracy. Thus, the watchdog metaphor has been variously deviated in rower-centered society; lap dog, guard dog, attack dog. liberalists argue that the primary democratic role of the media is to art as a public watchdog overseeing the state. Social democrats, however, criticize them as simplistic conception which could be only applied to the government. They argue that the media should be seen as a source of redress against the abuse of all forms of power over others; the home, the economy, and the civil society. The lap dog view is that the media is overwhelmingly dependent on the established power structure contrary to the watchdog. While the guard dog perspective is a means to preserve the power structure alarming with playing 'conflict role', the attack do8 aims to the private interest of the media in intruding into the politics. The attack dog perspective by T. Patterson could be composed of the interpretive style of report, the game schema report over the policy schema in the election, and the negativism against politics and government. The market-dominant press has been likely to transform from lap-guard dog into attack-guard dog. In Roh Tae Woo government(1988-1992), while the press was a lessened lap-guard dog before three parties merger in 1990, after merger the press had been transformed as the reinforced lap-guard dog because this merger entailed joint, party-to-party negotiations, and the formation of the new party preceded by dissolution of the ruling blot. In the early stage of Kim Young Sam government(1993-1997), the press has kept in pace with the reform movement drive-forced by the government. However, the press withdrew the support of Kim's reform in reaching the level of threat to ruling bloc. The press coalesced only circumstantially with government and was interested in preserving some margin of independence. The failure of Kim's reform proved the political muscle of the press in post-autho-ritarianism. In the middle stage of Kim Dae Jung government (1998-) that resulted in the shift of power structure as once-opposition party leader, the stress has been a manifested attack-guard dog owing to the anti-cold war policy, the realignment policy of power, and the minority-base of Kim's government. The press has endeavored to hold political communication within limits relatively less threatening to the established order.

  • PDF

Korean Media Partisanship in the Report on THAAD Rumor Network and Frame Analysis (사드 루머(THAAD rumor) 보도에 나타난 한국 언론의 정파성 네트워크 분석과 프레임 분석을 중심으로)

  • Hong, Juhyun;Son, Young Jun
    • Korean journal of communication and information
    • /
    • v.84
    • /
    • pp.152-188
    • /
    • 2017
  • This study stereotyped the media on the basis of ideological inclinations and media types and explored the news coverage through word analysis, network analysis, and frame analysis. There was no difference between conservative media and progressive media in terms of the amount of news. The conservative mainstream media considered the THAAD rumor as an unnecessary misunderstanding and a rumor based conflict of the south-south. The progressive mainstream media mentioned much about Hwang Gyoan, external influences, and lies and highlighted the government's opinion that there was external influence that spread a vicious rumor. Conservative media mentioned on the bringing about social disturbance and in case of progressive media mentioned social disturbance, and progressive media mentioned the responsibility of government and the attitude of conservative media about the diffusion of the rumor. In conclusion the press framed the THAAD rumor on the basis of their ideological inclinations instead of the role of journalist.

  • PDF

WordNet-Based Category Utility Approach for Author Name Disambiguation (저자명 모호성 해결을 위한 개념망 기반 카테고리 유틸리티)

  • Kim, Je-Min;Park, Young-Tack
    • The KIPS Transactions:PartB
    • /
    • v.16B no.3
    • /
    • pp.225-232
    • /
    • 2009
  • Author name disambiguation is essential for improving performance of document indexing, retrieval, and web search. Author name disambiguation resolves the conflict when multiple authors share the same name label. This paper introduces a novel approach which exploits ontologies and WordNet-based category utility for author name disambiguation. Our method utilizes author knowledge in the form of populated ontology that uses various types of properties: titles, abstracts and co-authors of papers and authors' affiliation. Author ontology has been constructed in the artificial intelligence and semantic web areas semi-automatically using OWL API and heuristics. Author name disambiguation determines the correct author from various candidate authors in the populated author ontology. Candidate authors are evaluated using proposed WordNet-based category utility to resolve disambiguation. Category utility is a tradeoff between intra-class similarity and inter-class dissimilarity of author instances, where author instances are described in terms of attribute-value pairs. WordNet-based category utility has been proposed to exploit concept information in WordNet for semantic analysis for disambiguation. Experiments using the WordNet-based category utility increase the number of disambiguation by about 10% compared with that of category utility, and increase the overall amount of accuracy by around 98%.

A Study on GIS DB Building Plan for Maritime Boundary Determination (우리나라 해양경계 획정을 위한 GIS DB 구축 항목선정에 관한 연구)

  • Choi, Yun-Soo;Im, Young-Tae;Hwang, Yoo-Jeong;Lee, Yoo-Jung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.4
    • /
    • pp.41-50
    • /
    • 2008
  • Intense competition for resources has forced many countries pay attention to their eyes to the ocean. Therefore, the disputes and the conflict over the delimitation of the EEZ and continental shelf will be sharpened. Since 1982 Law of the Sea Convention, Korea has opened the talks with Japan and China to discuss the boundary issues as the adjacent water zone is less than 400 miles between Korea and Japan and Korea and China. This study is to review the important rules and techniques for the delimitation of the maritime boundary which have defined in the Law of the Sea Convention and IHO-51 technical guide and to figure out how to build the maritime delimitation GIS DB to negotiate effectively with the neighboring countries. Definition of the base point and baseline will be the utmost important concept to delimit the ocean boundary. The policy makers and the specialists who prepare for the international negotiation meeting between the countries have to be ready to draw the maritime boundary for our best interest under the Law of the Sea Convention. The negotiation strategies and the principles can be made with the concrete and reliable database relevant to maritime boundary issues. So effective and fast strategic decision for negotiation can only be made based on maritime boundary delimitation GIS DB.

  • PDF

4D BIM based Workspace Planning Process in Building Construction Project (4D BIM 기반의 건설프로젝트 작업공간 계획 프로세스)

  • Choi, Byungjoo;Lee, Hyun-Soo;Park, Moonseo;Kim, Hyunsoo;Hwang, Sungjoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.5
    • /
    • pp.175-187
    • /
    • 2013
  • Each participant in building construction project requires their own workspace to execute their activities. In this environment, inappropriate workspace planning in construction site causes workspace conflicts which result in a loss of productivity, safety hazard and poor-quality issues. Therefore, workspace should be regarded as one of the most important resources and constraints have to be managed at construction site. However, current construction planning techniques such as Gantt chart, network diagram and critical path method have proven to be insufficient to workspace planning. This paper contains formalized process for workspace planning in 4D BIM environment to prevent workspace related problems in construction project. The proposed process in this paper represents workspace occupation status for each activity and suitable solutions for identified workspace conflicts by integrating workspace attributes and activity execution plan. Based on the result of this study, project manager will be able to prevent probable workspace conflicts and negative effect on project performance by devising appropriate workspace plan during preconstruction phase.

Metadata Management for E-Commerce Transactions in Digital Library (디지털 도서관에서 전자상거래 트랜잭션을 위한 메타데이타 관리 기법)

  • Choe, Il-Hwan;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.29 no.1
    • /
    • pp.34-43
    • /
    • 2002
  • Since traditional static metadata set like Dublin Core has static metadata attributes about bibliography information, integration of metadata for various metadata, problems about standard and extension of metadata must be considered for applying it to new environment. Specially, as event-driven metadata write method included the notion of e-commerce come out for interoperability in digital libraries, traditional metadata management which cannot distinguish between different kinds of update operations to new extension of metadata set occurs unsuitable waiting of update operation. So, improvement is needed about it. In this paper, we show whether alleviative transaction consistency can be applied to digital library or not. Also it would divide newer metadata into static metadata attribute connected in read operation within user read-only transaction and dynamic metadata attribute in update operation within dynamic(e-commerce) update transactions. We propose newer metadata management algorithm considered in classfication of metadata attributes and dynamic update transaction. Using two version for minimal maintenance cost and ARU(Appended Refresh Unit) for dynamic update transaction, to minimize conflict between read and write operations shows fast response time and high recency ratio. As a result of the performance evaluation, we show our algorithm is proved to be better than other algorithms in newer metadata environments.

An Analysis of the 9.11 Terror Attack News Reports on the Daily Newspapers in the U.S., Korea, and China (미국, 한국, 중국 일간지의 '9.11 테러' 뉴스보도 비교분석)

  • Yu, Sae-Kyung;Kim, Mi-Ra
    • Korean journal of communication and information
    • /
    • v.18
    • /
    • pp.165-198
    • /
    • 2002
  • By comparing and analyzing the September 11 terror attack news reports on the daily papers in the U.S., Korea, and China, this research found that national ideology and international relationship concerned have affected news report frames about international dispute matters. Both quantitative and qualitative researches identify differences in news framing. For example, after the September 11 terror attack, the most pages of the USs The New York Times and Korean Chosunilbo were covered with related articles(382 and 192 reports, respectively), whereas Chinese Inminilbo cur down to only 32 reports about the issue. Also in content, both The New York Times and Chosunilbo viewed the September 11 terror attack as evil acts which threatened world peace and justified military action against Afghanistan as inevitable revenge and justice for such evil acts, in the point of the USs official view. However, Inminilbo gave out news only based on facts in a neutral viewpoint. Moreover, regarding American military intervention, the Chinese newspapers held very different news frame from the other two by describing considerable sacrifice and pain of innocent people of Afghanistan seriously. For the story composition, daily newspapers in all three countries took the same way to report focusing on specific events with episodes.

  • PDF

An Optimization of Hashing Mechanism for the DHP Association Rules Mining Algorithm (DHP 연관 규칙 탐사 알고리즘을 위한 해싱 메커니즘 최적화)

  • Lee, Hyung-Bong;Kwon, Ki-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.13-21
    • /
    • 2010
  • One of the most distinguished features of the DHP association rules mining algorithm is that it counts the support of hash key combinations composed of k items at phase k-1, and uses the counted support for pruning candidate large itemsets to improve performance. At this time, it is desirable for each hash key combination to have a separate count variable, where it is impossible to allocate the variables owing to memory shortage. So, the algorithm uses a direct hashing mechanism in which several hash key combinations conflict and are counted in a same hash bucket. But the direct hashing mechanism is not efficient because the distribution of hash key combinations is unvalanced by the characteristics sourced from the mining process. This paper proposes a mapped perfect hashing function which maps the region of hash key combinations into a continuous integer space for phase 3 and maximizes the efficiency of direct hashing mechanism. The results of a performance test experimented on 42 test data sets shows that the average performance improvement of the proposed hashing mechanism is 7.3% compared to the existing method, and the highest performance improvement is 16.9%. Also, it shows that the proposed method is more efficient in case the length of transactions or large itemsets are long or the number of total items is large.

A Study on the Conflict Between the Call for Journalists' Phone Records and the Shield Law: Focusing on the Review of Paragraph 2, Article 13 of the Act of Protection of the Secrecy of Correspondence (기자의 통화내역 조회와 취재원 보호 간의 갈등: 통신비밀보호법 제13조 제2항 논의를 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • v.25
    • /
    • pp.103-133
    • /
    • 2004
  • Korean citizens enjoy not only the freedom of communication but also the secrecy of electronic communication. Article 18 of the Constitution of the Republic of Korea prescribes that the secrecy of correspondence should not be infringed. Namely, all citizens enjoy guaranteed privacy of correspondence. But many people have been experiencing the infringement of those rights. The purpose of this paper is to evaluate whether Paragraph 2, Article 13 of the Act on Protection of the Secrecy of Correspondence infringes on the constitutional rights of privacy of electronic communication. The results of this study indicate that the law violates the Constitution. Paragraph 3, Article 12 (Personal Liberty, Personal Integrity) of the constitution stipulates that "Warrants issued by a judge through due process (upon the request of a prosecutor) have to be presented in case of arrest, detention, seizure, or search." However, prosecutors, the police, and National Intelligence Service have made numerous inquiries calling for the journalists' telephone records without warrants issued by a judge. So, this study suggests that the paragraph should be amended to be compatible with the Constitution. Meanwhile, journalists should make a more concerted effort to protect their news sources in exercising constitutionally protected freedom of the press.

  • PDF

On Resistance of Bit Permutation Based Block Cipher against Nonlinear Invariant Attack (비트 순열 기반 블록암호의 비선형 불변 공격 저항성 연구)

  • Jeong, Keonsang;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.325-336
    • /
    • 2020
  • Nonlinear Invariant Attack is an attack that should be considered when constructing lightweight block ciphers with relatively simple key schedule. A shortcut to prove a block cipher's resistance against nonlinear invariant attack is checking the smallest dimension of linear layer-invariant linear subspace which contains all known differences between round keys is equal to the block size. In this paper, we presents the following results. We identify the structure and number of optimal bit-permutations which require only one known difference between round keys for a designer to show that the corresponding block cipher is resistant against nonlinear invariant attack. Moreover, we show that PRESENT-like block ciphers need at least two known differences between round keys by checking all PRESENT-like bit-permutations. Additionally, we verify that the variants of PRESENT-like bit-permutations requiring the only two known differences between round keys do not conflict with the resistance against differential attack by comparing the best differential trails. Finally, through the distribution of the invariant factors of all bit-permutations that maintain BOGI logic with GIFT S-box, GIFT-variant block ciphers require at least 8 known differences between round keys for the resistance.