• Title/Summary/Keyword: party identification

Search Result 42, Processing Time 0.029 seconds

Political Regionalism in Korean Congressional Elections 1988$\sim$2004: A case study with provincial border regions Yeongdong, Muju and Kimcheon (총선으로 본 지역주의 -영동.무주.김천 지역을 중심으로-)

  • Kim, Jai-Han
    • Journal of the Korean association of regional geographers
    • /
    • v.13 no.4
    • /
    • pp.381-395
    • /
    • 2007
  • After the democratization process since 1988, the national scale voting behavior in congressional elections has changed from a rural-government party and urban-opposite party connection to a political regionalism oriented pattern. In this context, the case study with provincial border regions aims to investigate possible party identification change of the region, and to find a relationship between polling score ratio and socio-political characteristics of the candidates. As a result, Yeongdong shows a strong negation to the presumed Chungcheong local party and shows a continuous party identification with the Kyungsang local party. Muju reveals a more or less weakened identification with the Jeolla local party, on the contrary, Kimcheon shows a unchanged strong identification with the Kyungsang local party. The regional neighborhood effect was verified quite partly between the subdivision districts of the border regions. With a application of linear fitting method, it is certified that voters have attached great importance to the belonging party, native place, as well as political career of the candidates as a voting criterion.

  • PDF

How perceptions of inter-party conflict influence partisan affect: The moderating role of party identification (당파적 편향에 따른 책임 귀속: 여야간 갈등인식과 정당 호감도를 중심으로)

  • Gil, Jung-ah;Ha, Shang E.
    • Korean Journal of Legislative Studies
    • /
    • v.25 no.1
    • /
    • pp.45-78
    • /
    • 2019
  • This study examines the relationship between individuals' perceptions on party conflict and affective polarization. It pays particular attention to party identification as a moderating variable. Using a survey conducted in the context of the 2014 Korean local election, the present study hypothesizes that perceiving serious inter-party conflict in the political arena is likely to increase negative feelings toward out-group political party among partisans only. Not only do the results confirm our hypothesis but suggest that conflict perception leads to affective polarization among partisan voters. This paper contributes to our understanding of the mechanism that links the attribution of blame to out-group political party for legislative gridlock with ever-growing affective polarization of the electorate.

Multiple-Shot Person Re-identification by Features Learned from Third-party Image Sets

  • Zhao, Yanna;Wang, Lei;Zhao, Xu;Liu, Yuncai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.775-792
    • /
    • 2015
  • Person re-identification is an important and challenging task in computer vision with numerous real world applications. Despite significant progress has been made in the past few years, person re-identification remains an unsolved problem. This paper presents a novel appearance-based approach to person re-identification. The approach exploits region covariance matrix and color histograms to capture the statistical properties and chromatic information of each object. Robustness against low resolution, viewpoint changes and pose variations is achieved by a novel signature, that is, the combination of Log Covariance Matrix feature and HSV histogram (LCMH). In order to further improve re-identification performance, third-party image sets are utilized as a common reference to sufficiently represent any image set with the same type. Distinctive and reliable features for a given image set are extracted through decision boundary between the specific set and a third-party image set supervised by max-margin criteria. This method enables the usage of an existing dataset to represent new image data without time-consuming data collection and annotation. Comparisons with state-of-the-art methods carried out on benchmark datasets demonstrate promising performance of our method.

Perceptions of Issue Ownership and Party Choice: A Case of the Korean Legislative Election, 2016 (한국 정당의 이슈 소유권(issue ownership)과 유권자 투표행태: 20대 총선을 중심으로)

  • Choi, Hyono
    • Korean Journal of Legislative Studies
    • /
    • v.24 no.1
    • /
    • pp.171-202
    • /
    • 2018
  • Issue ownership concerns a party's issue handling reputation. When a party is perceived to have the best solution for an issue, voters identify the party as the owner of the issue. Extant literature of issue ownership voting shows that voters tend to vote for a party that they identify as the owner of an issue they concern most. That is, the effect of issue ownership on voting is conditioned by the perceived salience of the issue in question. This study investigates another condition of issue ownership voting: i.e. party behavior in election campaigns. It argues that the effect of issue ownership on voting is conditional: it depends on party behavior as well as issue salience. During the campaign in the 2016 legislative election, only the Democratic Party of Korea, the opposition party at that time, actively presented itself as the owner of economic issues. The analysis results of this study show that the identification of the Democratic Party as the economic issue owner affects voting for the party when a voter thinks the economy to be the most important issue. However, the identification of the other parties as the economic issue owner does not affect voting for them under the same condition. The results support the argument that party behavior as well as issue salience are conditions of issue ownership voting.

PGP Certification System in Blockchain Environments (블록체인 환경에서의 PGP 인증 시스템)

  • Kim, Daehan;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.

Consideration of Voluntary Company by Police to Legality of Criminal Investigation (경찰의 임의동행에 의한 수사의 적법성에 대한 고찰)

  • Son, Bong-Son
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.105-113
    • /
    • 2007
  • Company without voluntary agreement(nature) of police, violation on the reason of company, violation on identification state, Violations on duties to notify the party's family members and to allow the party have a chance to be notified. Violation on duty to notify the party to have the right to call an investigation authority, Violation on the time of company, Violation on the place of company, and Violation on using force such as compulsory during the process of voluntary company in state of illegal voluntary company. It also has to decide whether the evidences are illegal and eliminated by these two requisites even in probative value and evidence admissibility on confession of the party under the illegal voluntary company.

Attitudes of Korean People Toward Income Polarization and Their Evaluation of Government Policies (소득양극화에 대한 한국인의 입장과 정부정책에 대한 판단)

  • Kim, DongSu ;Kim, Okhwan ;Jung, Taeyun ;Choi, Young-jin
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.2
    • /
    • pp.87-108
    • /
    • 2013
  • With questionnaires conducted for 613 adult Koreans in Seoul, the present study examined how their social features (income level, political party identification, political values, values of capitalism and egalitarianism) exercise influence on attitudes toward income polarization and their evaluation of government policies. Two groups of participants (high vs. low) for each social feature were formed first. Then their attitudes toward income polarization (liberal vs. conservative) and evaluations of policies (liberal vs. conservative) exercised by government (Participatory vs. Practical) were compared. Results indicated that liberal value was strengthened by liberal value, anti-capitalistic, and conservative value was strengthened by egalitarian values, and party identification. It was also found that party identification partial effect on the judgment of policies exercised by Participatory Government. These findings were discussed in terms of their implications for Korean society and measures for communication constructive for settlement of income polarization were suggested.

  • PDF

Trusted Third Party(TTP) Based Mono-directional Entity Authentication Scheme in Mobile Agent (이동 에이전트에 대한 신뢰 센터 기반 단방향 엔티티 인증 기법)

  • Lee, Gi-Hyeon;No, Hwan-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3356-3366
    • /
    • 1999
  • Electric commerce system based on distributed mobile on object such as mobile agents need both precise identification and secure authentication scheme on remotemobile entities. In this paper, existing discrete logarithm based Schnorr like entity authentication schemes are improved by the analysis of performance and security on the bi-directional interactive proofs. And ElGamal like schemes are also proposed. Then, there are enhanced with oblivious transfer based mono-directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication process.

  • PDF

Analysis and Elimination of Side Channels during Duplicate Identification in Remote Data Outsourcing (원격 저장소 데이터 아웃소싱에서 발생하는 중복 식별 과정에서의 부채널 분석 및 제거)

  • Koo, Dongyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.981-987
    • /
    • 2017
  • Proliferation of cloud computing services brings about reduction of the maintenance and management costs by allowing data to be outsourced to a dedicated third-party remote storage. At the same time, the majority of storage service providers have adopted a data deduplication technique for efficient utilization of storage resources. When a hash tree is employed for duplicate identification as part of deduplication process, size information of the attested data and partial information about the tree can be deduced from eavesdropping. To mitigate such side channels, in this paper, a new duplicate identification method is presented by exploiting a multi-set hash function.

Secure RFID-based Payment System against Various Threats (위.변조에 안전한 RFID 지급결제시스템)

  • Kim, In-Seok;Choi, Eun-Young;Lee, Dong-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.141-146
    • /
    • 2007
  • Barcodes have been widely used to implement automatic identification systems but there are various problems such as security weakness or distance restriction in scanning barcode signals in a barcode-based automatic identifcation systems. Recently researchers are gradually interested in radio frequency identification (RFID) and RFID systems have been applied to various fields than before. Especially one of RFID application fields, a bank system uses RFID tagged bankontes to prevent illegal transactions such as counterfeiting banknotes and money laundering. In this paper, we propose a RFID system for protecting location provacy of a banknote holder. In addition, our paper describes that a trust party can trace a counterfeit banknote holder to provide against emergencies.