• Title/Summary/Keyword: context analysis

Search Result 3,493, Processing Time 0.03 seconds

Analysis of trends in the use of geophysical exploration techniques for underwater cultural heritage (수중문화유산에 대한 지구물리탐사 기법 활용 동향 분석)

  • LEE Sang-Hee;KIM Sung-Bo;KIM Jin-Hoo;HYUN Chang-Uk
    • Korean Journal of Heritage: History & Science
    • /
    • v.56 no.3
    • /
    • pp.174-193
    • /
    • 2023
  • Korea is surrounded by the sea and has rivers connecting to it throughout the inland areas, which has been a geographical characteristic since ancient times. As a result, there have been exchanges and conflicts with various countries through the sea, and rivers have facilitated the transportation of ships carrying grain, goods paid for by taxes, and passengers. Since the past, the sea and rivers have had a significant impact on the lives of Koreans. Consequently, it is expected that there are many cultural heritages submerged in the sea and rivers, and continuous efforts are being made to discover and preserve them. Underwater cultural heritage is difficult to discover due to its location in the sea or rivers, making direct visual observation and exploration challenging. To overcome these limitations, various geophysical survey techniques are employed. Geophysical survey methods utilize the physical properties of elastic waves, including their reflection and refraction, to conduct surveys such as bathymetry, underwater topography and strata. These techniques detect the physical characteristics of underwater objects and seafloor formation in the underwater environment, analyze differences, and identify underwater cultural heritage located on or buried in the seabed. Bathymetry uses an echo sounder, and an underwater topography survey uses a side-scan sonar to find underwater artifacts lying on or partially exposed to the seabed, and a marine shallow strata survey uses a sub-bottom profiler to find underwater heritages buried in the seabed. However, the underwater cultural heritage discovered in domestic waters thus far has largely been accidental findings by fishermen, divers, or octopus hunters. This study aims to analyze and summarize the latest research trends in equipment used for underwater cultural heritage exploration, including bathymetric surveys, underwater topography surveys and strata surveys. The goal is to contribute to research on underwater cultural heritage investigation in the domestic context.

A Study on the Discourse Regarding the Lineage Transmission to Haewol in the Eastern Learning: Focused on Document Verification (해월의 동학 도통전수 담론 연구 - 문헌 고증을 중심으로 -)

  • Park Sang-kyu
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.48
    • /
    • pp.41-155
    • /
    • 2024
  • Among the records that attest to the period from July to August of 1863, when Suwun was believed to have transmitted the orthodox lineage to Haewol, the oldest documents are The Collection of Suwun's Literary Works (水雲文集), The Collection of Great Master Lord's Literary Works (大先生主文集), and The Records of Dao Origin of Master Choe's Literary Collection (崔先生文集道源記書, hereafter referred to as The Records of Dao Origin). The records regarding Suwun in these three documents are considered to have originated from the same context. The variances embedded in the three documents have led to arguments about which documents accurately reflect the fact of orthodox lineage transmission. Additionally, these variances highlight the necessity of a review regarding the characteristics of early Eastern Learning, such as its faith and organizational systems. Accordingly, by thoroughly examining these three documents, it is possible to elucidate the chronological order, establishment-date, accuracy, descriptive direction, and characteristics of the faith system of early Eastern Learning as these are reflected in each document. If successful, this examination would provide a clearer description of the developmental process of Eastern Learning from 1860 to 1880, facilitating a more in-depth analysis of the significance embedded in various forms of discourse on the movement's orthodox lineage transmission. In comparing the three documents and contrasting them with related sources, the results of the textual examination assert that the documents within the lineage of The Collection of Suwun's Literary Works, given they lack a clear record of the event regarding Haewol's orthodox lineage succession, may be the first draft of The Collection of Great Master Lord's Literary Works and The Records of Dao Origin, as these texts distinctly include that record. This reflects that Haewol's succession was not precisely recognized within and outside of the Eastern Learning order until the time when The Collection of Great Master Lord's Literary Works and The Records of Dao Origin were published. This is further attested to by the fact that during the late 1870s, when various Yeonwon (fountainhead) factions of Eastern Learning began to converge around Haewol, and his Yeonwon became the largest organization within Eastern Learning. At that point, the order's doctrine was reinterpreted, and its organization was reestablished. In this regard, it is necessary to view Eastern Learning after Suwun-especially the orthodox lineage transmission to Haewol-from a perspective that considers it more as competing forms of discourse than as a historical fact. This view enables a new perspective on Haewol's Eastern Learning, which forms a distinct layer from Suwun's, shedding light on the relationship between Haewol and the new religious movements in modern-day Korea.

Macrobenthic Community Structure Along the Environmental Gradients of Ulsan Bay, Korea (울산만의 저서환경 구배에 따른 저서동물군집 구조)

  • Yoon, Sang-Pil;Jung, Rae-Hong;Kim, Youn-Jung;Kim, Seong-Gil;Choi, Min-Kyu;Lee, Won-Chan;Oh, Hyun-Taik;Hong, Sok-Jin
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.14 no.2
    • /
    • pp.102-117
    • /
    • 2009
  • This study was carried out to investigate the extent to which benthic environment of Ulsan Bay was disturbed by organic materials and trace metals from the megacity and industrial complex. Field survey for benthic environment and macroinvertebrate community was seasonally conducted from February to November 2006 at nine stations covering the inside and outside of the bay. TOC was on average 1.7% while four (As, Cu, Pb, Zn) out of seven trace metals measured exceeded the Effects Range Low (ERL) in most of the stations. Total number of species sampled was 199 and mean density was 4,578 ind./$m^2$, both of which were greatly dominated by the polychaetes. Dominant species were Aphelochaeta monilaris (22.6%), Ruditapes philippinarum (17.1%), Magelona japonica (12.2%), Lumbrineris longifolia (9.9%) and their distribution was ruled by the difference in the benthic environmental condition of each station. From the multivariate analyses, four stational groups were identified: northern part of the bay, middle and lower part of the bay, the intersection of Taewha River and Gosa stream and outside of the bay. As a result, the community heterogeneity of inner bay was much more greater than that of outer bay. SIMPER analysis showed that four groups were represented by R. philippinarum-Capitella capitata, A. monilaris-Balanoglossus carnosus, Sinocorophium sinensis-Cyathura higoensis and M. japonica-Ampharete arctica, respectively. Spatio-temporal changes of macroinvertebrate communities in Ulsan Bay were closely related to those of depth, mean grain size and organic content, and Zn was also a meaningful factor in that context.

FAMILY DYNAMICS OF INCEST PERCEIVED BY ADOLESECENTS (청소년이 지각한 근친상간의 가족역동)

  • Kim, Hun-Soo;Shin, Hwa-Sik
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.6 no.1
    • /
    • pp.56-64
    • /
    • 1995
  • Family is a primary unit of the major socialization processing for children. Parents among the family members are one of the most important figures from whom the child and adolescent acquire a wide variety of behavior patterns, attitudes, values and norms. An organization of family members product family structural functioning. Abnormal family structure is one of the most important reference models in the learning of antisocial patterns of behavior. Therefore incest and child sexual abuse including spouse abuse, elderly abuse, and neglect occurs in the abnormal family structural setting. In particular, incest, a specific form of sexual abuse, was once thought to be a phenomenon of great rarity, but our clinical experiences, especially over the past decade, have made us aware that incest and child sexual abuse is not rare case and on the increasing trend. Therefore, the aim of this study was to determine the family problem and dynamics of incest family, and character pattern of post-incest adolescent victim in Korea. A total of 1,838 adolescents from middle and high school(1,237) and juvenile correctional institute(601) were studied, sampled from Korean student population and adolescent delinquent population confined in juvenile correctional institutes, using proportional stratified random sampling method. The subjects' ages ranged from 12 to 21 years. Data were collected through questionnaire survey. Data analysis was done by IBM PC of Behavior Science Center at the Korea university, using SAS program. Statistical methods employed were Chi-square, principal component analysis and t-test etc. The results of this study were as follows ; 1) Of 1,071 subjects, 40(3.7%) reported incest experiences(sibling incest : 1.6% ; another type of incest : 2.1%) in their family setting. 2) The character pattern of post-incest adolescent victim was more socially maladjusted, immature, impulsive, rigid, anxious and dependent than non-incest adolescent. Also they showed some problem in academic performance and their assertiveness. 3) The other family members of incest family revealed more psychological and behavioral problem such as depression, alcoholism, psychotic disorder and criminal act than the non-incest family, even though there is no evidence of the context between them. 4) The family dynamics of incest family tended to be dysfunctional trend, as compared with non-incest family. It showed that the psychological instability of family member, parental rejection toward their children, coldness and indifference among family member and marital discordance between the parents had significant correlation with incest.

  • PDF

The Effect of Brand Extension of Private Label on Consumer Attitude - a focus on the moderating effect of the perceived fit difference between parent brands and an extended brand - (PL의 브랜드확장이 소비자태도에 미치는 영향에 관한 연구 : 모브랜드 적합도 인식 차이의 조절효과를 중심으로)

  • Kim, Jong-Keun;Kim, Hyang-Mi;Lee, Jong-Ho
    • Journal of Distribution Research
    • /
    • v.16 no.4
    • /
    • pp.1-27
    • /
    • 2011
  • Introduction: Sales of private labels(PU have been growing m recent years. Globally, PLs have already achieved 20% share, although between 25 and 50% share in most of the European markets(AC. Nielson, 2005). These products are aimed to have comparable quality and prices as national brand(NB) products and have been continuously eroding manufacturer's national brand market share. Stores have also started introducing premium PLs that are of higher-quality and more reasonably priced compared to NBs. Worldwide, many retailers already have a multiple-tier private label architecture. Consumers as a consequence are now able to have a more diverse brand choice in store than ever before. Since premium PLs are priced higher than regular PLs and even, in some cases, above NBs, stores can expect to generate higher profits. Brand extensions and private label have been extensively studied in the marketing field. However, less attention has been paid to the private label extension. Therefore, this research focuses on private label extension using the Multi-Attribute Attitude Model(Fishbein and Ajzen, 1975). Especially there are few studies that consider the hierarchical effect of the PL's two parent brands: store brand and the original PL. We assume that the attitude toward each of the two parent brands affects the attitude towards the extended PL. The influence from each parent brand toward extended PL will vary according to the perceived fit between each parent brand and the extended PL. This research focuses on how these two parent brands act as reference points to one another in the consumers' choice consideration. Specifically we seek to understand how store image and attitude towards original PL affect consumer perceptions of extended premium PL. How consumers perceive extended premium PLs could provide strategic suggestions for retailer managers with specific suggestions on whether it is more effective: to position extended premium PL similarly or dissimilarly to original PL especially on the quality dimension and congruency with store image. There is an extensive body of research on branding and brand extensions (e.g. Aaker and Keller, 1990) and more recently on PLs(e.g. Kumar and Steenkamp, 2007). However there are no studies to date that look at the upgrading and influence of original PLs and attitude towards store on the premium PL extension. This research wishes to make a contribution to this gap using the perceived fit difference between parent brands and extended premium PL as the context. In order to meet the above objectives, we investigate which factors heighten consumers' positive attitude toward premium PL extension. Research Model and Hypotheses: When considering the attitude towards the premium PL extension, we expect four factors to have an influence: attitude towards store; attitude towards original PL; perceived congruity between the store image and the premium PL; perceived similarity between the original PL and the premium PL. We expect that all these factors have an influence on consumer attitude towards premium PL extension. Figure 1 gives the research model and hypotheses. Method: Data were collected by an intercept survey conducted on consumers at discount stores. 403 survey responses were attained (total 59.8% female, across all age ranges). Respondents were asked to respond to a series of Questions measured on 7 point likert-type scales. The survey consisted of Questions that measured: the trust towards store and the original PL; the satisfaction towards store and the original PL; the attitudes towards store, the original PL, and the extended premium PL; the perceived similarity of the original PL and the extended premium PL; the perceived congruity between the store image and the extended premium PL. Product images with specific explanations of the features of premium PL, regular PL and NB we reused as the stimuli for the Question response. We developed scales to measure the research constructs. Cronbach's alphaw as measured each construct with the reliability for all constructs exceeding the .70 standard(Nunnally, 1978). Results: To test the hypotheses, path analysis was conducted using LISREL 8.30. The path analysis for verification of the model produced satisfactory results. The validity index shows acceptable results(${\chi}^2=427.00$(P=0.00), GFI= .90, AGFI= .87, NFI= .91, RMSEA= .062, RMR= .047). With the increasing retailer use of premium PLBs, the intention of this research was to examine how consumers use original PL and store image as reference points as to the attitude towards premium PL extension. Results(see table 1 & 2) show that the attitude of each parent brand (attitudes toward store and original pL) influences the attitude towards extended PL and their perceived fit moderates these influences. Attitude toward the extended PL was influenced by the relative level of perceived fit. Discussion of results and future direction: These results suggest that the future strategy for the PL extension needs to consider that positive parent brand attitude is more strongly associated with the attitude toward PL extensions. Specifically, to improve attitude towards PL extension, building and maintaining positive attitude towards original PL is necessary. Positioning premium PL congruently to store image is also important for positive attitude. In order to improve this research, the following alternatives should also be considered. To improve the research model's predictive power, more diverse products should be included in study. Other attributes of product should also be included such as design, brand name since we only considered trust and satisfaction as factors to build consumer attitudes.

  • PDF

Methods for Integration of Documents using Hierarchical Structure based on the Formal Concept Analysis (FCA 기반 계층적 구조를 이용한 문서 통합 기법)

  • Kim, Tae-Hwan;Jeon, Ho-Cheol;Choi, Joong-Min
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.63-77
    • /
    • 2011
  • The World Wide Web is a very large distributed digital information space. From its origins in 1991, the web has grown to encompass diverse information resources as personal home pasges, online digital libraries and virtual museums. Some estimates suggest that the web currently includes over 500 billion pages in the deep web. The ability to search and retrieve information from the web efficiently and effectively is an enabling technology for realizing its full potential. With powerful workstations and parallel processing technology, efficiency is not a bottleneck. In fact, some existing search tools sift through gigabyte.syze precompiled web indexes in a fraction of a second. But retrieval effectiveness is a different matter. Current search tools retrieve too many documents, of which only a small fraction are relevant to the user query. Furthermore, the most relevant documents do not nessarily appear at the top of the query output order. Also, current search tools can not retrieve the documents related with retrieved document from gigantic amount of documents. The most important problem for lots of current searching systems is to increase the quality of search. It means to provide related documents or decrease the number of unrelated documents as low as possible in the results of search. For this problem, CiteSeer proposed the ACI (Autonomous Citation Indexing) of the articles on the World Wide Web. A "citation index" indexes the links between articles that researchers make when they cite other articles. Citation indexes are very useful for a number of purposes, including literature search and analysis of the academic literature. For details of this work, references contained in academic articles are used to give credit to previous work in the literature and provide a link between the "citing" and "cited" articles. A citation index indexes the citations that an article makes, linking the articleswith the cited works. Citation indexes were originally designed mainly for information retrieval. The citation links allow navigating the literature in unique ways. Papers can be located independent of language, and words in thetitle, keywords or document. A citation index allows navigation backward in time (the list of cited articles) and forwardin time (which subsequent articles cite the current article?) But CiteSeer can not indexes the links between articles that researchers doesn't make. Because it indexes the links between articles that only researchers make when they cite other articles. Also, CiteSeer is not easy to scalability. Because CiteSeer can not indexes the links between articles that researchers doesn't make. All these problems make us orient for designing more effective search system. This paper shows a method that extracts subject and predicate per each sentence in documents. A document will be changed into the tabular form that extracted predicate checked value of possible subject and object. We make a hierarchical graph of a document using the table and then integrate graphs of documents. The graph of entire documents calculates the area of document as compared with integrated documents. We mark relation among the documents as compared with the area of documents. Also it proposes a method for structural integration of documents that retrieves documents from the graph. It makes that the user can find information easier. We compared the performance of the proposed approaches with lucene search engine using the formulas for ranking. As a result, the F.measure is about 60% and it is better as about 15%.

New Insights on Mobile Location-based Services(LBS): Leading Factors to the Use of Services and Privacy Paradox (모바일 위치기반서비스(LBS) 관련한 새로운 견해: 서비스사용으로 이끄는 요인들과 사생활염려의 모순)

  • Cheon, Eunyoung;Park, Yong-Tae
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.33-56
    • /
    • 2017
  • As Internet usage is becoming more common worldwide and smartphone become necessity in daily life, technologies and applications related to mobile Internet are developing rapidly. The results of the Internet usage patterns of consumers around the world imply that there are many potential new business opportunities for mobile Internet technologies and applications. The location-based service (LBS) is a service based on the location information of the mobile device. LBS has recently gotten much attention among many mobile applications and various LBSs are rapidly developing in numerous categories. However, even with the development of LBS related technologies and services, there is still a lack of empirical research on the intention to use LBS. The application of previous researches is limited because they focused on the effect of one particular factor and had not shown the direct relationship on the intention to use LBS. Therefore, this study presents a research model of factors that affect the intention to use and actual use of LBS whose market is expected to grow rapidly, and tested it by conducting a questionnaire survey of 330 users. The results of data analysis showed that service customization, service quality, and personal innovativeness have a positive effect on the intention to use LBS and the intention to use LBS has a positive effect on the actual use of LBS. These results implies that LBS providers can enhance the user's intention to use LBS by offering service customization through the provision of various LBSs based on users' needs, improving information service qualities such as accuracy, timeliness, sensitivity, and reliability, and encouraging personal innovativeness. However, privacy concerns in the context of LBS are not significantly affected by service customization and personal innovativeness and privacy concerns do not significantly affect the intention to use LBS. In fact, the information related to users' location collected by LBS is less sensitive when compared with the information that is used to perform financial transactions. Therefore, such outcomes on privacy concern are revealed. In addition, the advantages of using LBS are more important than the sensitivity of privacy protection to the users who use LBS than to the users who use information systems such as electronic commerce that involves financial transactions. Therefore, LBS are recommended to be treated differently from other information systems. This study is significant in the theoretical point of contribution that it proposed factors affecting the intention to use LBS in a multi-faceted perspective, proved the proposed research model empirically, brought new insights on LBS, and broadens understanding of the intention to use and actual use of LBS. Also, the empirical results of the customization of LBS affecting the user's intention to use the LBS suggest that the provision of customized LBS services based on the usage data analysis through utilizing technologies such as artificial intelligence can enhance the user's intention to use. In a practical point of view, the results of this study are expected to help LBS providers to develop a competitive strategy for responding to LBS users effectively and lead to the LBS market grows. We expect that there will be differences in using LBSs depending on some factors such as types of LBS, whether it is free of charge or not, privacy policies related to LBS, the levels of reliability related application and technology, the frequency of use, etc. Therefore, if we can make comparative studies with those factors, it will contribute to the development of the research areas of LBS. We hope this study can inspire many researchers and initiate many great researches in LBS fields.

How Enduring Product Involvement and Perceived Risk Affect Consumers' Online Merchant Selection Process: The 'Required Trust Level' Perspective (지속적 관여도 및 인지된 위험이 소비자의 온라인 상인선택 프로세스에 미치는 영향에 관한 연구: 요구신뢰 수준 개념을 중심으로)

  • Hong, Il-Yoo B.;Lee, Jung-Min;Cho, Hwi-Hyung
    • Asia pacific journal of information systems
    • /
    • v.22 no.1
    • /
    • pp.29-52
    • /
    • 2012
  • Consumers differ in the way they make a purchase. An audio mania would willingly make a bold, yet serious, decision to buy a top-of-the-line home theater system, while he is not interested in replacing his two-decade-old shabby car. On the contrary, an automobile enthusiast wouldn't mind spending forty thousand dollars to buy a new Jaguar convertible, yet cares little about his junky component system. It is product involvement that helps us explain such differences among individuals in the purchase style. Product involvement refers to the extent to which a product is perceived to be important to a consumer (Zaichkowsky, 2001). Product involvement is an important factor that strongly influences consumer's purchase decision-making process, and thus has been of prime interest to consumer behavior researchers. Furthermore, researchers found that involvement is closely related to perceived risk (Dholakia, 2001). While abundant research exists addressing how product involvement relates to overall perceived risk, little attention has been paid to the relationship between involvement and different types of perceived risk in an electronic commerce setting. Given that perceived risk can be a substantial barrier to the online purchase (Jarvenpaa, 2000), research addressing such an issue will offer useful implications on what specific types of perceived risk an online firm should focus on mitigating if it is to increase sales to a fullest potential. Meanwhile, past research has focused on such consumer responses as information search and dissemination as a consequence of involvement, neglecting other behavioral responses like online merchant selection. For one example, will a consumer seriously considering the purchase of a pricey Guzzi bag perceive a great degree of risk associated with online buying and therefore choose to buy it from a digital storefront rather than from an online marketplace to mitigate risk? Will a consumer require greater trust on the part of the online merchant when the perceived risk of online buying is rather high? We intend to find answers to these research questions through an empirical study. This paper explores the impact of enduring product involvement and perceived risks on required trust level, and further on online merchant choice. For the purpose of the research, five types or components of perceived risk are taken into consideration, including financial, performance, delivery, psychological, and social risks. A research model has been built around the constructs under consideration, and 12 hypotheses have been developed based on the research model to examine the relationships between enduring involvement and five components of perceived risk, between five components of perceived risk and required trust level, between enduring involvement and required trust level, and finally between required trust level and preference toward an e-tailer. To attain our research objectives, we conducted an empirical analysis consisting of two phases of data collection: a pilot test and main survey. The pilot test was conducted using 25 college students to ensure that the questionnaire items are clear and straightforward. Then the main survey was conducted using 295 college students at a major university for nine days between December 13, 2010 and December 21, 2010. The measures employed to test the model included eight constructs: (1) enduring involvement, (2) financial risk, (3) performance risk, (4) delivery risk, (5) psychological risk, (6) social risk, (7) required trust level, (8) preference toward an e-tailer. The statistical package, SPSS 17.0, was used to test the internal consistency among the items within the individual measures. Based on the Cronbach's ${\alpha}$ coefficients of the individual measure, the reliability of all the variables is supported. Meanwhile, the Amos 18.0 package was employed to perform a confirmatory factor analysis designed to assess the unidimensionality of the measures. The goodness of fit for the measurement model was satisfied. Unidimensionality was tested using convergent, discriminant, and nomological validity. The statistical evidences proved that the three types of validity were all satisfied. Now the structured equation modeling technique was used to analyze the individual paths along the relationships among the research constructs. The results indicated that enduring involvement has significant positive relationships with all the five components of perceived risk, while only performance risk is significantly related to trust level required by consumers for purchase. It can be inferred from the findings that product performance problems are mostly likely to occur when a merchant behaves in an opportunistic manner. Positive relationships were also found between involvement and required trust level and between required trust level and online merchant choice. Enduring involvement is concerned with the pleasure a consumer derives from a product class and/or with the desire for knowledge for the product class, and thus is likely to motivate the consumer to look for ways of mitigating perceived risk by requiring a higher level of trust on the part of the online merchant. Likewise, a consumer requiring a high level of trust on the merchant will choose a digital storefront rather than an e-marketplace, since a digital storefront is believed to be trustworthier than an e-marketplace, as it fulfills orders by itself rather than acting as an intermediary. The findings of the present research provide both academic and practical implications. The first academic implication is that enduring product involvement is a strong motivator of consumer responses, especially the selection of a merchant, in the context of electronic shopping. Secondly, academicians are advised to pay attention to the finding that an individual component or type of perceived risk can be used as an important research construct, since it would allow one to pinpoint the specific types of risk that are influenced by antecedents or that influence consequents. Meanwhile, our research provides implications useful for online merchants (both online storefronts and e-marketplaces). Merchants may develop strategies to attract consumers by managing perceived performance risk involved in purchase decisions, since it was found to have significant positive relationship with the level of trust required by a consumer on the part of the merchant. One way to manage performance risk would be to thoroughly examine the product before shipping to ensure that it has no deficiencies or flaws. Secondly, digital storefronts are advised to focus on symbolic goods (e.g., cars, cell phones, fashion outfits, and handbags) in which consumers are relatively more involved than others, whereas e- marketplaces should put their emphasis on non-symbolic goods (e.g., drinks, books, MP3 players, and bike accessories).

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study on the Landscape Characteristics and Implications of the Royal Garden through 「The 36 Scenery of Seongdeok Summer Mountain Resort」 by Kangxi Emperor (강희제(康熙帝)의 「승덕 피서산장(避暑山莊) 36경」에 담긴 황가원림의 경관 특성과 함의)

  • RHO Jaehyun;MENG Zijun
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.4
    • /
    • pp.212-240
    • /
    • 2022
  • This study is a multi-layered exploration of 「The Thirty-Six Scenery of Seongdeok Summer Mountain Resort(承德避暑山莊三十六景)」 (The 36th view of Kangxi) recited by Emperor Kangxi of China through literature study, ancient calligraphy diagrams, and field studies. The conclusion of tracing the landscape characteristics and implications contained in 「The 36th view of Kangxi」 through the analysis of the headword(標題語) and the interpretation of the Jeyeong poem(題詠詩) is as follows. 「The 36th view of Kangxi」 is an extension of the outer edge of the Eight Sceneries, and when compared to the existing Eight Sceneries peom and Eight Sceneries painting, it is found that the landscape is centered on the 'viewpoint' rather than the landscape object. In particular, it aimed to create a structured landscape centered on nine types of buildings represented by 'Jeon(殿)' and 'Jeong(亭)' was given. In particular, Yeouiju, located in Lake district, is a scenic country endowed with the character of a gardens in Garden, which is composed by collecting famous representative Chinese landscapes and landscapes of Sansu-si and Sanshu Painting. As a result of headword analysis to understand the characteristics of landscape components, 14 landscapes (38.9%) related to water elements and 13 landscapes(36.1%) related to mountain elements, the elements related to architecture and civil engineering were classified in the order of 3 cases(8.3%), and the elements related to the skylight were classified in the order of 2 cases(5.6%). However, in Jeyeong-si, the mention of landscape vocabulary for climate elements was overwhelming. In other words, in the poems of 「The 36th Scenery of Kangxi」, scenery vocabulary symbolizing 'coolness' such as 雲(cloud), 水(water), 泉(spring), 清(clear), 波(wave), 流(wave), 風(wind) and 無暑(without heat), etc. It is not a coincidence that it appears, and it is strongly attached to the sense of place of Summer Mountain Resort in Rehe(熱河). Among the 23 landscapes whose seasonal background was confirmed, the fact that the lower landscape is portrayed as the majority and the climate elements of the resort area are portrayed in three-dimensional and multi-dimensional ways are closely related to the period of enjoying the gardens of Kangxi, the main subject of the landscape. In addition, many animal and plant landscapes appearing in Jeyeong-si appear to be in the same context as the spatial attributes of not only recreation, but also contemplation and hunting. On the other hand, in Jeyeongsi, there are 33 wonders(91.7%) citing famous people and famous books through ancient poems, old stories, and ancient stories tends to be prominent. It is inferred that this was based on Kangxi's understanding and pride in traditional Chinese culture. In 「The 36th view of Kangxi」, not only a book-writing description of the feelings of being entrusted to the family sutras, but also the spirit of patriotism, love, self-discipline and respect for mother and filial piety are strongly implied. Ultimately, 「The 36th view of Kangxi」 shows the real scene of the resort, as well as the spiritual dimension, in a multi-faceted and three-dimensional way, and the spirit of an emperor based on the dignity of the royal family and the sentiments of a writer it deserves to be called a collection of imperial records that were intended to reveal.