• Title/Summary/Keyword: 정책 규범

Search Result 345, Processing Time 0.022 seconds

What makes us to be crazy about digital games? - A Philosophical Concern on the Nature of GameWorld and Its Members- (왜 게임은 우리를 미치게 만드는가? -게임세계의 본성에 대한 철학적 분석-)

  • Yoh, Myeung-Sook
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.684-691
    • /
    • 2006
  • 컴퓨터 게임은 이미 전세계적으로 가장 영향력 있는 엔터테인먼트 장르로서 자리잡아가고 있고, 우리나라에서도 차세대 성장동력산업의 핵심으로 간주하여 막대한 투자가 이루어지고 있지만, 어느 산업보다도 정책적 일관성을 유지하기 어렵고 일반인들의 정서적 공감대를 얻어내기 어려운 실정이다. 그 이유는 아직 게임행위와 그로 인한 결과물들에 대한 견실한 가치론이 구축되지 못했기 때문인데, 더 근원적으로는 제반 디지털 문화현상과 양립 가능한 세계관과 인간관의 기초개념이 정립되지 못했기 때문이라고 볼 수 있다. 바야흐로 게임의 철학이 요청되는 시점이다. 본 논문은 이러한 상황인식하에, 우리나라 디지털문화에 내재된 이중규범과 존재론적 전제의 오류들을 검토하고, 계산주의(Computationalism)와 가상실재론(Virtual Realism)이라는 이론적 맥락을 토대로 온라인 게임, 가상현실 그리고 현실이 일관되게 상호작용하는 구조를 밝히고자 한다. 그러한 과정에서 게임 폐인과 스타 게이머의 간극, 아이템 현금거래의 정당성, 인기있는 게임의 철학적 이유, 게임 심의규정의 현실 적합성 등에 대한 논의가 이루어질 것이며, 궁극적으로 게임은 단순한 엔터테인먼트 매체가 아니라 그 자체로서 '생활양식(form of life)'이기 때문에 어느 관공서의 표어처럼 말 그대로 "게임으로 하나되는 세상"이 가능하다는 결론에 이르게 될 것이다.

  • PDF

Creating Change in the Ecology of Religious Education for Overcoming Racism (인종주의 극복을 위한 종교교육 생태의 창조적 변화에 관한 연구)

  • Son, Moon
    • Journal of Christian Education in Korea
    • /
    • v.61
    • /
    • pp.109-129
    • /
    • 2020
  • This study reflects the regional context of Northeast Asian countries embodied in US-North Korean nuclear tension. The researcher uses the methodological inquiry of practical theology to analyze the political affairs and intertwine with religious education. The ecology of religious education to dismantle the threat of ethnic and racial discrimination such as white supremacy supports a shared pedagogy between students and their teachers in the narrative of Jesus to challenge all forms of oppression as the democratic presence of God.

A Study on the Meta Analysis of Korean Digital Politics (디지털정치 실증연구에 관한 메타분석)

  • Park, Young-Min
    • Journal of Digital Convergence
    • /
    • v.9 no.1
    • /
    • pp.201-212
    • /
    • 2011
  • This study is to carry out meta-analysis on doctoral dissertations which had been written after 2004 when the empirical analysis about digital politics had begun. This study aims to identify tendency of recent analysis. For this purpose, it classifies the research trends of digital politics as political participation, political process, political advertising and election campaigns, and examines the researcher's definition, framework of empirical analysis, and all the results. Moreover, the study systematically summarizes the research model, analysis unit, concept and its components in order to ensure availablity so that the information could be available for the further research.

Influences of Work and Family on the Married Female Workers' Health (기혼 여성노동자의 건강에 미치는 직업특성과 가족특성)

  • Park, Soo-Mi;Han, Sung-Hyun
    • Korea journal of population studies
    • /
    • v.27 no.2
    • /
    • pp.155-175
    • /
    • 2004
  • 이 연구는 여성의 삶의 질에 '일'과 '가족'이 갖는 의미가 무엇인지를 알아보기 위해서, 여성의 '신체적${\cdot}$정신적 건강'에 미치는 '일'과 '가족'의 효과를 분석하고 있다. 이 연구는 생산직 및 사무직에 종사하는 기혼 여성 902명에 대한 설문지 면접조사결과를 회귀분석방법으로 분석하였다. 분석결과, 기혼여성노동자의 신체적 건강과 정신건강에 미치는 직업특성${\cdot}$가족특성의 영향력에 변별성이 발견되었다. 가족특성이 기혼여성노동자의 정신건강에만 유의미한 영향을 미친 반면, 직업특성은 이들의 신체적 건강${\cdot}$정신건강 모두에 유의미한 영향을 미침으로써 여성들에게 직업이 갖는 의미가 재해석되어야 함을 암시하였다. 분석결과가 함의하는 바는 다음과 같다. 첫째, '업무스트레스'의 효과처럼 동일한 변수가 성별로 상이한 효과를 미친다는 사실에서 '일'에 대한 성별화된 사회규범이 해체되어야 한다. 둘째, 여성의 연령 증가, 자녀수 증가에 따라 정신건강이 좋아진다는 결과에서 여성에게 '가족'과 '일'의 갈등적 측면 못지않게 지원적 측면이 강화되고 있다. 셋째, 기혼여성노동자의 건강에 가장 영향력 있는 변수는 '가정형편' 변수로서, 건강의 계층화 현상에 주목할 필요가 있으며 저소득층에 대한 각별한 건강복지정책이 요구된다는 점이다.

Understanding Korean College Students' Social Commerce Behavior through an Integrated Model of Technology Readiness, Technology Acceptance Model, and Theory of Planned Behavior (한국 대학생의 소셜 커머스 행동의 이해: 기술준비도, 기술수용모형 및 계획된 행동이론의 통합모형을 중심으로)

  • Joo, Ji Hyuk
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.99-107
    • /
    • 2015
  • When new information communication technologies(ICTs) have appeared, researchers and praticitioners have explored how to spread the technologies. In e-commerce, social commerce has been introduced recently and attempts to understand social commerce have proposed diverse research models. This study proposed a hypothetical model which integrates technology readiness(TR), technology acceptance model(TAM), and theory of planned behavior(TPB). Through PLS path modeling, we found that every hypothesis except social norm-intention path alone proved significant. This result means that integrated model is useful to understand the adoption of new ICTs including social commerce. Finally, based on the findings, suggestions for future research were discussed.

The Influence of Social Identification and Persistent Communication Activities on Interpersonal Trust in the Virtual Community (온라인 공동체에서 사회적 정체성과 지속적인커뮤니케이션 활동이 구성원 간 신뢰에 미치는 영향에 관한연구)

  • Cho, Seung-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.65-77
    • /
    • 2011
  • The current study investigated how interpersonal trust is developed in online communities, where most of individual identities are unknown or doubtful. To better understand and theorize the underlying mechanism, a survey was conducted integrating the literature on computer-mediated communication (CMC) and extending previous research on social identify model. The findings confirmed that integrity, benevolence, and openness are essential components in the concept of trustworthiness, which is predicted by social identification and persistency of communication activities in the virtual community.

A Meta-Analysis of Cyberethics Research and Critical Evaluation from a Perspective of Information Human Rights (사이버윤리 연구동향 분석과 정보인권 측면에서의 평가)

  • MYUNG, JAEJIN;LEE, HAN TAE
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.3-21
    • /
    • 2013
  • This study reviewed academic research related to the cyberethics in the field of humanities and social sciences. The most active and vibrant field of cyberethics is Pedagogy, followed by Law, communication, philosophy, social welfare science, sociology, business administration and psychology. In the field of cyberethics every major has different research themes. The research trend of cyberethics does not reflect distinctiveness of cyberspace, remaining in previous ethical philosophy. Further, it just establishes abstract morality. In the overall research of cyberethics lacks recognition of information human rights, therefore, it shows little tendency to living ethics. Moral recognition based on information human rights should be emphasized, and multi-disciplinary study is requested for future studies.

  • PDF

A Study on the Restructuration of Norm System in the Field of ICT for the Smart Media (Smart미디어시대 정보통신·미디어(ICT) 분야 규범체계의 재구조화에 관한 연구)

  • Ji, Seong-Woo
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.33-62
    • /
    • 2013
  • In this paper, the consolidation of ICT basic legislation and ICT special legislation concerning "Ministry of Science, ICT and Future Planning" and "Korea Communications Commission" which came on the back of governmental reorganization in recent years is discussed in the theoretical and practical aspect. Development of "data communication technology" innovatively changed the method of livelihood of mankind, the emergence of network under global dimension provided financial social benefit and posed a challenge and a threat at the same time. Form digital revolution human kind can expect to receive many important blessings. Nevertheless, there are many advantages of development of technology by digital revolution, cyberspace like online media, internet etc. has realistically many problems that must be solved. To maximum positive aspects like the expansion of freedom of expression and creating plan of economy by the advance of transmission technology is needed. And to minimize side effects of informatization is required more. The First, Special Act on ICT has an adaptation in normative standardization to be fit in media convergence beyond convergence of broadcasting and telecommunications. Henceforth, there must be established a legal basis for the achievement of protection of economic evolution and freedom of speech in digital media, information, communication technology and content development. The second, the government action is to accomplish economic development and freedom of information in structural aspect of norm. Therefore minimizing normative problem by reorganization of organization remains clearly unresolved in politics. The third, Special Act on ICT must be basic law covering info-communications field, pay telecommunication and media contents field. The forth, from a technical point of view, net neutrality, conflict of interest for digital content and so on can be fixed easily. Special Act on ICT must not only pursuit of development of industry. Special Act on ICT and pursuit of enhancing quality of life of people and preparing program to promote democratization. From now on, we need to make powerful nation of information& communications technology and in information human rights protection field got to be one step ahead of others with reference to appear all the various aspects must be brought together in the discussion of legislation process of Special Act on ICT.

Legal Status of Space Weaponization (우주공간에서의 무기배치와 사용의 법적 지위)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.247-276
    • /
    • 2017
  • The protection of space asset has been new major cause of space militarization. For such purpose, it has been officially announced that a policy of deterring and denying any adversaries from accessing the outer space. Space militarization is to be conversed into a new concept of space weaponization. The USA has announced its policy of space weaponization, while China and Russia have not revealed their plan or policy. Latter States, however, have proposed a draft treaty limiting the deployment of warfare in the outer space. The terms of the Outer Space Treaty, reflecting three significant United Nations General Assembly resolutions from the 1960s, support the position that ground rules must be observed in the exploration and the use of outer space, particularly in the absence of specific space law rules. Yet the combination (and culmination) of these two approaches to the legal regulation of outer space-specific rules as and when agreed by the international community and the translation of principles developed for terrestrial regulation to outer space-still leaves much room for uncertainty and exploitation for military and strategic purposes. As space weaponization may contribute to deterring the use of weapon, it may be not against the UN Charter Article 2(4). If space weaponization might generate the space debris such that the outer space is no more available for exploration and use, it is against the proportionality principle and discrimination principle enshrined in the laws of the war. But, if the limitation upon the kind and use of space weaponization is agreed among the States, then the space weaponization may not be against the laws of the war, and be considered permissible within the rationale of limited war.

  • PDF

Violations of Information Security Policy in a Financial Firm: The Difference between the Own Employees and Outsourced Contractors (금융회사의 정보보안정책 위반요인에 관한 연구: 내부직원과 외주직원의 차이)

  • Jeong-Ha Lee;Sang-Yong Tom Lee
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.17-42
    • /
    • 2016
  • Information security incidents caused by authorized insiders are increasing in financial firms, and this increase is particularly increased by outsourced contractors. With the increase in outsourcing in financial firms, outsourced contractors having authorized right has become a threat and could violate an organization's information security policy. This study aims to analyze the differences between own employees and outsourced contractors and to determine the factors affecting the violation of information security policy to mitigate information security incidents. This study examines the factors driving employees to violate information security policy in financial firms based on the theory of planned behavior, general deterrence theory, and information security awareness, and the moderating effects of employee type between own employees and outsourced contractors. We used 363 samples that were collected through both online and offline surveys and conducted partial least square-structural equation modeling and multiple group analysis to determine the differences between own employees (246 samples, 68%) and outsourced contractors (117 samples, 32%). We found that the perceived sanction and information security awareness support the information security policy violation attitude and subjective norm, and the perceived sanction does not support the information security policy behavior control. The moderating effects of employee type in the research model were also supported. According to the t-test result between own employees and outsourced contractors, outsourced contractors' behavior control supported information security violation intention but not subject norms. The academic implications of this study is expected to be the basis for future research on outsourced contractors' violation of information security policy and a guide to develop information security awareness programs for outsourced contractors to control these incidents. Financial firms need to develop an information security awareness program for outsourced contractors to increase the knowledge and understanding of information security policy. Moreover, this program is effective for outsourced contractors.