• Title/Summary/Keyword: Cyberspace

Search Result 339, Processing Time 0.032 seconds

The Agenda-Setting Process in Cyberspace: The Difference between Open Cyberspace and Closed Cyberspace (사이버공간의 특성과 의제 전개과정: 일반네티즌공간과 참여네티즌공간의 차이)

  • Park, Eun-Hee;Lee, Soo-Young
    • Korean journal of communication and information
    • /
    • v.18
    • /
    • pp.99-130
    • /
    • 2002
  • This study examines whether cyberspace produced by computer mediated communication(CMC) would perform the public sphere through the agenda-setting process. By doing this, this study focused on how the cyberspace agenda is set and on how the characteristics of cyberspace and the mass media influence the cyberspace agenda-setting process. Through this study, the possibility of cyberspace as the public sphere is found although the characteristics of cyberspace decide this possibility. In particular, in order for cyberspace to contribute to enhancing democracy as a form of alternative media, the interaction among cyberspace, mass media and the off-line arena is a necessary condition. The interaction between cyberspace and mass media regarding the Sungsoo Women's Middle School violence case provides two very important points. First, cyberspace helps the individual agenda to be adopted by mass media as the media agenda. Second, mass media confirmed the credibility of cyberspace agenda through reporting. In addition, this study reveals that cyberspace would perform as the public sphere only when the interaction between on-line and off-line is provided.

  • PDF

Types of Cyberspace Addiction and Adolescents' Psycho-Social Environment (사이버공간 중독유형와 청소년의 사회심리적 환경)

  • 백승문;황미영;김영희
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.1
    • /
    • pp.169-185
    • /
    • 2003
  • The present study was to investigate whether Cyberspace addiction groups could be classified into types and examine the relationship with types of Cyberspace addiction and adolescents' psychological environment. The findings were as follows: First, adolescents' Cyberspace addiction was analyzed by factor analysis and classified by four different types, which were named as sensation seeking, life interference, time dependency, and psychological dependency. Second, male students experienced more sensation seeking and life interference tendencies than female students who experienced more psychological dependency tendency than male students. High school students experienced more life interference tendency than middle school students. Third, there was relationship with types of adolescents Cyberspace addiction and psychological environment. Adolescents who addicted Cyberspace with sensation seeking were more likely to avoid conversation with families, and had a tendency of compulsiveness and depression. Adolescents who addicted Cyberspace with life interference had a tendency of compulsiveness and depression, and had a problem of school life and family relationship. Adolescents who addicted Cyberspace with time dependency showed the compulsiveness and avoided conversation with families. Adolescents who addicted Cyberspace with psychological dependency were more likely to have peer relationship and had a tendency of depression. Conclusively, the psycho-social environment such as compulsiveness, depression, family and peer relationship, and school environment was related to types of adolescents' Cyberspace addiction more or less.

Trust Building in Cyberspace (사이버 공간에서의 신뢰성 확보 방안 - 기업 내부관점에서 -)

  • Park, Gyeong-Hwan
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.403-415
    • /
    • 2003
  • This study is performed to examine the relationships between trust and antecedents in cyberspace. Trust is the major control system in cyberspace. Different time, different spaces, different cultures, indistinct boundaries, flexible structure, separation of information from matters, cybernetics, difficulty of control are differential characteristics between cyberspace and physical space. Providing fit information, use of effective electronic channels, previous trust management, feedback system about output, flexible culture, self-regulation, off-line meeting, providing information about tasks and roles, ability, and justice are supposed to have effects on trust in cyberspace. By electronic mediated systems, the company will have more business opportunity. But trust will be conditional factors of expanding business in cyberspace.

  • PDF

A Study on Epistemic Structure of the Architecture in Cyberspace. - A comparative analysis on Novak and Lynn based on Lacan's subject theory - (사이버공간의 인식적 구조에 관한 연구 - 라캉의 관점으로 본 노박과 린의 비교연구 -)

  • Lee Kyung-Hoon
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.3 s.50
    • /
    • pp.224-233
    • /
    • 2005
  • Cyberspace is created through the confluence of global electronic communications networks and technology, and also meant to be a three-dimensional space of information. Its application in arts, however, requires broader views and knowledge and often results a confounded definition of it. The study is to define cyberspace and the architecture in it, with the methodology of the structural criticism, focusing the textuality without any impression or intuition to reach its valid epistemic definition. Two architects in cyberspace; Novak and Lynn, and their works have been discussed and analyzed reflecting Benedikt's theory of cyberspace which has coined its definition in architecture in early 90's. Lacan's subject theory, including the mirror stage, has played a key role to evaluate the identities and the differences of various views towards cyberspace. It also enables us to construe the on-going status and meaning of cyberspace and the architecture In it.

Finding Policy Leverages with Analysis of Dynamic Growth Behaviors of Cyberspace and Electronic Commerce (전자공간과 전자상거래 성장의 동태성 분석을 통한 Policy Leverage 탐색)

  • 하원규;김도훈;문태훈;최남희;홍민기
    • Korean System Dynamics Review
    • /
    • v.1 no.1
    • /
    • pp.29-56
    • /
    • 2000
  • During the past few years, cyberspace and electronic commerce has been expanding throughout the world rapidly. The purpose of this paper is to find out policy leverages for boosting up cyberspace and electronic commerce using system dynamics simulation modeling approach. The system dynamics simulation model developed in this paper allows analysis of both the effect of factors on dynamic growth pattern of cyberspace as well as the effect of time delay in information processing, money transfer and delivery on model behavior. Finding of this study is that capacity of information infrastructure and size of cyberspace population are key factors of cyberspace growth. Also, reducing time delay in information flow, money flow, and delivery flow is an important policy leverages for growth of electronic commerce.

  • PDF

Problems Judicial Liability of On-Line Service Providers under the Infringement of Copyright in Internet (인터넷 상에서 저작권침해에 따른 온라인서비스 제공자의 책임문제)

  • 박종삼
    • Journal of Arbitration Studies
    • /
    • v.12 no.1
    • /
    • pp.123-169
    • /
    • 2002
  • The Advent of the global information structure and the do-called digital revolution raise countless new issues and questions. There are no limitations regulating the expressions on the cyberspace due to internet's of quality anonymity\ulcorner diversity\ulcorner spontaneity. Therefore, the freedom of speech is expanded in both areas of time and space, which was impossible with the old communicating system. The rapid development of the internet may not have occurred without techniques of linking and framing, which provide users flexible and easy access to other website. These techniques have enabled internet users to navigate the internet efficiently and sort through the products, services and information available on the internet. Although online technology raises many new legal issues, the law available to help us resolve them, at least today, is largely based on the world as it existed before online commerce became a reality. Thus the challenge is to predict how these new legal issues may be resolved using the current law. Especially, the damage from the above side effects on the cyberspace can be much more serious than in the real world because of promptness, wideness and anonymity. Therefore, regulating and controling the freedom of speech on the cyberspace became needed, and there are two kinds of opinion; one is that the laws in the real world should be applied for the cyberspace and the other is that regulating and controling the freedom of speech on the cyberspace should be performed by the users of cyberspace not by laws because the cyberspace is a free space and must not be interfered. In this study, the current judicial regulation of cyberspace, the side effects of cyberspace and the limitations of the freedom of speech are studied to solve the above problems with speech and the liabilities of on-line service providers are discussed around defamation the distribution of obscene pictures and information, and infringement of copyright.

  • PDF

Big Data Governance Model for Effective Operation in Cyberspace (효과적인 사이버공간 작전수행을 위한 빅데이터 거버넌스 모델)

  • Jang, Won-gu;Lee, Kyung-ho
    • The Journal of Bigdata
    • /
    • v.4 no.1
    • /
    • pp.39-51
    • /
    • 2019
  • With the advent of the fourth industrial revolution characterized by hyperconnectivity and superintelligence and the emerging cyber physical systems, enormous volumes of data are being generated in the cyberspace every day ranging from the records about human life and activities to the communication records of computers, information and communication devices, and the Internet of things. Big data represented by 3Vs (volume, velocity, and variety) are actively used in the defence field as well. This paper proposes a big data governance model to support effective military operations in the cyberspace. Cyberspace operation missions and big data types that can be collected in the cyberspace are classified and integrated with big data governance issues to build a big data governance framework model. Then the effectiveness of the constructed model is verified through examples. The result of this study will be able to assist big data utilization planning in the defence sector.

  • PDF

Spatial Analysis of Cyberspace and Mapping Cyberspace (사이버스페이스의 공간적 분석과 지도화)

  • 이희연
    • Journal of the Korean Geographical Society
    • /
    • v.37 no.3
    • /
    • pp.203-221
    • /
    • 2002
  • This study attempts to analyze the spatial characteristics of cyberspace and to map spatial variations of cyberspace. In order to analyze the spatial distribution of cyberspace, three measurement indices are selected such as commercial domain number, Internet backbone network, and Internet users, which are highly correlated to each other. The three sets of measurement showed that cyberspace in Korea is spreading in a highly uneven fashion, strongly favoring a few cities and unfavoring economically distressed cities. Seoul acts on overwhelmingly dominant role in cyberspace, by being concentrated a number of domains and having high-capacity bandwidth on Internet backbone network. Internet is selectively connecting several cities into highly interactive networks, while at the same time largely bypassing other cities. The development of Internet network through infrastructure investments at selected cities has resulted in an uneven accessibility and digital divide among cities. The regional disparity would be further reinforced by ICT development as the primary vehicle for unequal accessibility. The result of this study revealed that geography continues to matter, despite the recent rhetoric claiming of 'the death of distance'or 'the end of geography'.

A Study on Cybersecurity Policy in the Context of International Security (국제협력을 통한 사이버안보 강화방안 연구)

  • Kim, So Jeong;Park, Sangdon
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.51-59
    • /
    • 2013
  • Cyberspace, based on the dramatic development of information and communications technology, has brought enormous benefits to mankind. However, concerns over cyber terrorism and cyber attack are becoming serious. It is time to expand the global dialogue on international security issues in cyberspace. It is imperative to have a common understanding that cyberspace, the infrastructure for prosperity, should not be utilized as a space to create conflicts among states, and that all states agree to build confidence and peace in cyberspace. For this purpose, there are 3 tracks of international cooperations: 1)international cooperation such as UN and Conference on Cyberspace, 2)regional cooperations such as ARF and OSCE. 3)bilateral cooperations such US-Russia Cybersecurity Agreement, US-China presidential level dialogue. This paper will analyze the 1st track of international cooperations of UN and Conference on Cyberspace. With this, Korean government can prepare the forthcoming GGE activities and make our own strategy to deal with the global norms of good behaviour in cyberspace.

Legal Structure and Improvement Measures of Police Responsibility for Unlawful Information in the Cyberspace

  • Gu, Hyung-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.3
    • /
    • pp.105-111
    • /
    • 2016
  • Circulating various pieces of unlawful information that violate the law by leaking personal information or circulating violent/sexual materials or malignant programs in the cyberspace is unlawful, and blocking this beforehand is an important duty of the state. Preceding discussions on the legal restriction of unlawful information in the cyberspace have mostly been focused on the criminal responsibilities and civil responsibilities of information communications service providers, but this study has approached it with emphasis on the issue of police responsibility for the exercise of police authority to block unlawful information. It is because the principles of police responsibility to determine the target of police authority to block unlawful information provide the standards for the interpretation of existing laws and regulations and function as legislative principles for the enactment of new laws and regulations to prevent risks in the cyberspace.