• 제목/요약/키워드: Identity Threat

검색결과 56건 처리시간 0.024초

예술과 문화의 영역에 대한 재고 - 문화의 타자 키치, 아직도 예술의 적인가? (Policing the Border: Is Kitsch Still the Antagonist of Art?)

  • 김희영
    • 미술이론과 현장
    • /
    • 제5호
    • /
    • pp.25-41
    • /
    • 2007
  • Despite continuous efforts to redraw the boundaries between art and culture, the conventional concept of originality has persisted in approaches to the practice of contemporary art. In the discourse of originality, various forms of lesser arts that employ the method of replication have been referred to as kitsch, or "rear-guard," the opposite of avant-garde. This categorization points to the contested issue regarding the oppositional relation between modernism and mass culture. With its easily accessible content and financial affordability, mass culture has become both an irresistible attraction and a most powerful threat to modernism. This threat has instigated a discursive system that has situated mass culture as a cultural other of modernism. Taking the marginalized category of kitsch as the area of contention, this paper examines a discursive repression of kitsch. It analyzes the conceptual framework that defends originality and autonomy in art and, conversely, degrades kitsch as an inferior and dangerous cultural category. Greenberg'S concept of kitsch as a by-product of industrialization evolved into the criticism that advocates the autonomy of art. The Frankfurt School scholars, particularly Theodor Adorno and Max Horkheimer, practiced comparable cultural critiques. Focusing on mass culture such as film, radio, and television, instead of art works, they critically analyzed the system of mass culture and theorized the negative implications of the ubiquitous presence of kitsch. Some critics, on the other hand, perceived the growth of mass culture as opening possibilities in cultural development. Walter Benjamin and Harold Rosenberg asserted the socio-cultural dynamics of mass culture underlining the potential for continual transformation in reality and in the subject. They acknowledged that technological advances changed the condition of creation and enabled unmediated interactions between media. By scrutinizing conflicting views on kitsch, this paper intends to reassess arts that draw "the forces of the outside."

  • PDF

범죄피해자 정보보호법제의 개선방안에 대한 연구 (Measures for Enhancing System of Crime Victim's Information Protection)

  • 이권철
    • 한국콘텐츠학회논문지
    • /
    • 제16권10호
    • /
    • pp.175-187
    • /
    • 2016
  • 정보화시대에 있어 개인정보보호는 매우 중대한 의미를 갖는다. 그 중에도 범죄피해자정보는 가해자에게 누설될 경우 보복범죄로 신변안전이 위협되거나 불특정다수에게 누설될 경우에는 정서 및 심리적인 측면에서 2차 피해가 발생한다는 점에서 보호의 필요성이 더욱 크다. 피해자정보 보호규정은 형사소송법, 특정 범죄신고자 보호법과 성범죄피해자 보호를 위한 각 법률 등에 산재하고 있다. 기존의 연구는 개별법의 정보보호에 국한하여 그 내용이 논의되었기에 통합적으로 보호법제의 문제점을 분석하고 개선방안을 제시하는 연구가 요청된다. 이 필요성에서 출발한 본 연구는 광범위한 정보열람주체, 기재생략 및 신원관리카드 활성화 규정의 미흡, 위법정보공개에 대한 부적절한 처벌수준 등을 우리 법제상의 문제점으로 분석하였다. 이후 개선방안 도출의 시사점을 얻기 위하여 해외선진법제의 규정을 간략히 검토하였고 이와 같은 과정을 거쳐 개선방안을 법규정의 측면과 실무 측면으로 나누어 도출하고 제시하였다.

노화에 대한 고정관념 위협이 노인의 공간 작업기억 및 정서인식에 미치는 영향 (Effect of Stereotype Threat on Spatial Working Memory and Emotion Recognition in Korean elderly)

  • 이경은;이완정;최기홍;김현택;최준식
    • 한국노년학
    • /
    • 제36권4호
    • /
    • pp.1109-1124
    • /
    • 2016
  • 본 연구에서는 고정관념 위협이 노인의 공간 기억 및 정서인식기능에 미치는 영향을 확인하고, 개인이 지니고 있는 노화에 대한 인식에 따라 고정관념 위협의 효과가 다르게 나타나는지 검증해 보고자 하였다. 이를 위해 자발적으로 연구 참여 의사를 밝힌 60세 이상 노인 17명(남=7)을 대상으로 연구를 진행하였으며, 첫 번째 방문 시 K-WMS-IV와 MMSE를 포함한 기본 인지기능 검사를 실시하고, 자신의 노화에 대한 인식, 노화 불안, 노화에 대한 태도, 연령 정체성 척도에 응답하도록 하였다. 두 번째 방문 시, 실험군의 경우 노화가 인지기능을 저하시킨다는 스크립트를 읽도록 하여 고정관념 위협에 노출시켰으며, 대조군의 경우 중립적인 스크립트를 읽도록 하였다. 고정관념위협을 조작한 이후 공간 작업기억 과제 (콜시 블록 태핑 과제)와 정서 인식 과제 (얼굴표정 정서인식 과제)를 수행하도록 하고, 수행의 정확도를 관찰하였다. 연구 결과, 고정관념 위협에 노출된 노인 군이 그렇지 않은 노인 군에 비해 정서인식 과제에서 유의하게 저조한 수행 정확도 (p<.05)를 보였다. 또한 자신의 노화에 대한 인식과 고정관념 위협 사이에 상호작용 효과가 확인되어(p<.05), 자신의 노화에 대한 인식이 긍정적인 노인들은 고정관념 위협에 노출되더라도 정서인식 과제와 어려운 공간 작업기억 과제에서 대조군과 유사한 수행 정확도를 보인 반면, 자신의 노화에 대한 인식이 부정적인 노인들은 고정관념 위협에 노출되었을 때, 매우 저조한 수행 정확도를 나타내는 양상을 보였다. 따라서 본 연구에서는 고정관념 위협이 노인의 정서인식 기능에 부정적 영향을 미치는 것을 검증하였으며, 자신의 노화에 대한 긍정적 인식이 고정관념 위협으로 인한 인지기능 저하의 보호 요인으로 작용한다는 것을 확인하였다.

A pairing-free key-insulated certificate-based signature scheme with provable security

  • Xiong, Hu;Wu, Shikun;Geng, Ji;Ahene, Emmanuel;Wu, Songyang;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권3호
    • /
    • pp.1246-1259
    • /
    • 2015
  • Certificate-based signature (CBS) combines the advantages of both public key-based signature and identity-based signature, while saving from the disadvantages of drawbacks in both PKS and IBS. The insecure deployment of CBS under the hostile circumstances usually causes the exposure of signing key to be inescapable. To resist the threat of key leakage, we present a pairing-free key insulated CBS scheme by incorporating the idea of key insulated mechanism and CBS. Our scheme eliminates the costly pairing operations and as a matter of fact outperforms the existing key insulated CBS schemes. It is more suitable for low-power devices. Furthermore, the unforgeability of our scheme has been formally proven to rest on the discrete logarithm assumption in the random oracle model.

THE GREEK CONCEPTION OF THE OTTOMAN ERA: ISLAMOPHOBIA AND MUSLIMS LABELED AS THE OTHER

  • OZSUER, ESRA
    • Acta Via Serica
    • /
    • 제2권2호
    • /
    • pp.47-68
    • /
    • 2017
  • To the Greeks, the Ottoman era was a "Dark Age" one that comprised a threat to their Greek Orthodox identity. The identities of Orthodox and Hellene were integral parts in the construction of their national history. In fact, the Morea Uprising, which began in 1821, was symbolized by a priest blessing the Greek flag in Aya Lavra Church. One of the most common national myths is religious oppression of the Christian population during the Ottoman Era, namely Turkokratia. They identified Ottomans as Asian barbarians who did not let Greeks practice their religion freely, and who furthermore forced them to change their religion. These kinds of beliefs, which might be taken as religious propaganda, are today still highlighted both in Greek textbooks and in publications supported by the church and books and newspapers published in their affiliated institutes. The underlying truth behind all these propagandist statements is Islamophobia. The existence of Islamophobia in the Balkans, where religious nationalism is intense, has caused nations to hold to these kinds of mythical beliefs. Most of the time the stories and narratives have been used for history building. The objective of this paper is to demonstrate the effect of the anti-Islam propaganda of the church in Greece on the state and the people using Greek sources. The references are Greek religious textbooks and books and newspapers published by church-supporting publishing houses.

농촌지역 병원들의 경영개선을 위한 전략 (Strategies for Rural Hospitals in Korea)

  • 박종연;강명근;최귀선;조우현
    • 보건행정학회지
    • /
    • 제10권1호
    • /
    • pp.148-173
    • /
    • 2000
  • This thesis is a kind of case report on the managerial difficulties and strategies to overcome them for the rural hospitals in Korea. We examined environmental situations and SWOT(Strength, Weakness, Opportunity, Threat) of the hospitals, and suggested some strategies to improve the hospital business through analysing secondary data and brief survey to staffs and patients at 3 case hospitals. Among the strategies were included establishment of their identity as community hospitals, positioning towards high-touch services rather than high-tech services to improve their competence. For this positioning, patient satisfaction should be emphasized to make rapport with the residents in the community, and a few service areas should be selected and strengthened. Emergency care and geriatric health services are recommended to be covered strongly, because rural hospitals are usually the one and only hospital in the region and rural communities have aged population structure. In addition to these, networking is necessary among rural hospitals nationwide and with local clinics and tertiary hospitals near urban areas. And also, complementary role division with community health post should be developed to lessen the competitive relationship between public and private sectors. To support these strategies, fresh organizational culture should be built up to make hospital staff creative and enthusiastic on their job. Finally, inducement of governmental assistance will be necessary to make the environment advantageous to the rural hospitals.

  • PDF

TETRA 인증 프로토콜 분석 (The Analysis of the TETRA Authentication Protocol)

  • 박용석;안재환;정창호;안정철
    • 한국정보통신학회논문지
    • /
    • 제10권6호
    • /
    • pp.1070-1075
    • /
    • 2006
  • TETRA 시스템에서는 Challenge-response 프로토콜에 의해 단말기와 인증 센터간에 사전에 공유된 인증키가 일치하는지를 확인하는 인증 서비스를 제공함으로써 인가된 단말기만 망에 접속하도록 하고 있다. 그러나 TETRA 표준 인증 프로토콜은 단말기 식별자인 ISSI(Individual Short Subscriber Identity)가 복제된 단말기의 망 접속은 차단할 수 있지만, ISSI와 인증키가 모두 복제된 경우 복제단말기의 불법 사용을 막을 수 없는 취약점이 존재한다. 본 논문에서는 TETRA 표준인 ETSI규격에서 정의하고 있는 인증 프로토콜을 간략히 설명하고 인증 과정에서 사용되는 인증키의 생성/분배/주입 모델을 설명 한 후, 인증키가 인증 센터로 전달되는 과정에서 노출되었을 경우 발생할 수 있는 복제단말기의 위협을 분석한다. 마지막으로 ISSI와 인증키가 복제된 단말기의 망 접속을 차단할 수 있는 새로운 인증 프로토콜을 제안한다.

Research on the Development Strategies of Confucius Institute for Expanding China's Foreign Trade

  • Yanni, Qiao;Jinge, Yao;Bae, Ki-Hyung
    • International Journal of Contents
    • /
    • 제17권3호
    • /
    • pp.15-29
    • /
    • 2021
  • The purpose of this paper is to explore how the Confucius Institute Chinese international promotion could better promote the development of China's foreign trade, by analyzing the distribution of the Confucius Institute worldwide, based on the theory of language economics, using SWOT analysis to analyze the advantages and disadvantages of the internal environment, opportunities and challenges of the external environment of Chinese international promotion of Confucius Institute. The following findings were gathered: as a language teaching institution and information exchange platform, Confucius Institute has the ability to share trade information and increase trade opportunities; to improve cultural identity and reduce transaction costs; to promote cultural communication and integration, and drive the development of related industries. The internal disadvantages were mainly reflected in the mismatch between the global regional distribution structure of Confucius Institutes, and the economic and trade structure, such as, the asymmetry between language, culture output, and demand. In addition, the management mechanism was not perfect. External opportunities were mainly new opportunities brought by economic globalization, cultural diversity, and the development of the Belt and Road initiative. External challenges were mainly influenced by the China threat theory and the fierce cultural competition among countries. The corresponding countermeasures were put forward based on the advantages of the platform and grasping the external opportunities: improving the quality of operation and speeding up the localization process; respecting cultural differences and realizing cultural common learning; seeking multilateral cooperation and enhancing the capacity for independent development.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

Hizb Ut-Tahrir's Adaptation Strategies against the State Repression in Indonesia: A Social Movement Perspective

  • Aswar, Hasbi
    • 수완나부미
    • /
    • 제14권2호
    • /
    • pp.233-249
    • /
    • 2022
  • Hizb ut-Tahrir (HT) is an Islamic social movement that struggles to change the existing political system to the Islamic system. HT argues that all problems in the Muslim world are rooted in adopting secular thought and ideology and the separation between Islam and the state. Hence, HT works to persuade Muslims to abandon that way of life and only apply Islam as the country's only ideology and constitution. HT has spread this narrative since it started in 1953 in Jordan. With this ideological and political attitude, many countries consider HT a threat to their political and community life, suppressing this movement by arresting members and banning the group to reduce or end HT activities in these countries. The Indonesian government has also carried out this repressive policy to limit the influence of Indonesian HTI since 2017. This paper aims to discuss the strategy of Hizb ut-Tahrir to continue its political activities Indonesia after being dissolved by the Indonesian government in 2017. This article used content analysis method to interpret the data collected from interview and documents from Hizb ut-Tahrir. Responding to state repression, HTI sought other methods of action by changing the place of resistance or activities, and by changing its identity.