• Title/Summary/Keyword: Issue-network

Search Result 1,546, Processing Time 0.031 seconds

A Study on the Effect of the Document Summarization Technique on the Fake News Detection Model (문서 요약 기법이 가짜 뉴스 탐지 모형에 미치는 영향에 관한 연구)

  • Shim, Jae-Seung;Won, Ha-Ram;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.201-220
    • /
    • 2019
  • Fake news has emerged as a significant issue over the last few years, igniting discussions and research on how to solve this problem. In particular, studies on automated fact-checking and fake news detection using artificial intelligence and text analysis techniques have drawn attention. Fake news detection research entails a form of document classification; thus, document classification techniques have been widely used in this type of research. However, document summarization techniques have been inconspicuous in this field. At the same time, automatic news summarization services have become popular, and a recent study found that the use of news summarized through abstractive summarization has strengthened the predictive performance of fake news detection models. Therefore, the need to study the integration of document summarization technology in the domestic news data environment has become evident. In order to examine the effect of extractive summarization on the fake news detection model, we first summarized news articles through extractive summarization. Second, we created a summarized news-based detection model. Finally, we compared our model with the full-text-based detection model. The study found that BPN(Back Propagation Neural Network) and SVM(Support Vector Machine) did not exhibit a large difference in performance; however, for DT(Decision Tree), the full-text-based model demonstrated a somewhat better performance. In the case of LR(Logistic Regression), our model exhibited the superior performance. Nonetheless, the results did not show a statistically significant difference between our model and the full-text-based model. Therefore, when the summary is applied, at least the core information of the fake news is preserved, and the LR-based model can confirm the possibility of performance improvement. This study features an experimental application of extractive summarization in fake news detection research by employing various machine-learning algorithms. The study's limitations are, essentially, the relatively small amount of data and the lack of comparison between various summarization technologies. Therefore, an in-depth analysis that applies various analytical techniques to a larger data volume would be helpful in the future.

Intelligent Brand Positioning Visualization System Based on Web Search Traffic Information : Focusing on Tablet PC (웹검색 트래픽 정보를 활용한 지능형 브랜드 포지셔닝 시스템 : 태블릿 PC 사례를 중심으로)

  • Jun, Seung-Pyo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.93-111
    • /
    • 2013
  • As Internet and information technology (IT) continues to develop and evolve, the issue of big data has emerged at the foreground of scholarly and industrial attention. Big data is generally defined as data that exceed the range that can be collected, stored, managed and analyzed by existing conventional information systems and it also refers to the new technologies designed to effectively extract values from such data. With the widespread dissemination of IT systems, continual efforts have been made in various fields of industry such as R&D, manufacturing, and finance to collect and analyze immense quantities of data in order to extract meaningful information and to use this information to solve various problems. Since IT has converged with various industries in many aspects, digital data are now being generated at a remarkably accelerating rate while developments in state-of-the-art technology have led to continual enhancements in system performance. The types of big data that are currently receiving the most attention include information available within companies, such as information on consumer characteristics, information on purchase records, logistics information and log information indicating the usage of products and services by consumers, as well as information accumulated outside companies, such as information on the web search traffic of online users, social network information, and patent information. Among these various types of big data, web searches performed by online users constitute one of the most effective and important sources of information for marketing purposes because consumers search for information on the internet in order to make efficient and rational choices. Recently, Google has provided public access to its information on the web search traffic of online users through a service named Google Trends. Research that uses this web search traffic information to analyze the information search behavior of online users is now receiving much attention in academia and in fields of industry. Studies using web search traffic information can be broadly classified into two fields. The first field consists of empirical demonstrations that show how web search information can be used to forecast social phenomena, the purchasing power of consumers, the outcomes of political elections, etc. The other field focuses on using web search traffic information to observe consumer behavior, identifying the attributes of a product that consumers regard as important or tracking changes on consumers' expectations, for example, but relatively less research has been completed in this field. In particular, to the extent of our knowledge, hardly any studies related to brands have yet attempted to use web search traffic information to analyze the factors that influence consumers' purchasing activities. This study aims to demonstrate that consumers' web search traffic information can be used to derive the relations among brands and the relations between an individual brand and product attributes. When consumers input their search words on the web, they may use a single keyword for the search, but they also often input multiple keywords to seek related information (this is referred to as simultaneous searching). A consumer performs a simultaneous search either to simultaneously compare two product brands to obtain information on their similarities and differences, or to acquire more in-depth information about a specific attribute in a specific brand. Web search traffic information shows that the quantity of simultaneous searches using certain keywords increases when the relation is closer in the consumer's mind and it will be possible to derive the relations between each of the keywords by collecting this relational data and subjecting it to network analysis. Accordingly, this study proposes a method of analyzing how brands are positioned by consumers and what relationships exist between product attributes and an individual brand, using simultaneous search traffic information. It also presents case studies demonstrating the actual application of this method, with a focus on tablets, belonging to innovative product groups.

A Study on the Improvement of Flexible Working Hours (탄력적 근로시간제 개선에 대한 연구)

  • Kwon, Yong-man
    • Journal of Venture Innovation
    • /
    • v.5 no.3
    • /
    • pp.57-70
    • /
    • 2022
  • In modern industrial capitalism, the relationship between the provision of work and the receipt of wages has become an important principle governing society. According to the labor contract, the wages provided by entrusting the right to dispose of one's labor to the employer are directly compensated, and human life should be guaranteed and reproduced with proper rest. The establishment of labor relations under free contracts represents a problem in protecting workers, and accordingly, the maximum of working hours is set as a minimum right for workers, and the standard for minimum rest is set and assigned. The reduction of working hours is very important in terms of the quality of life of workers, but it is also an important issue in efficient corporate activities. As of 2020, Korea has 1,908 hours of annual working hours, the third lowest among OECD 37 countries in the happiness index surveyed by the Sustainable Development Solution Network(SDSN), an agency under the United Nations. Accordingly, the necessity of reducing working hours has been recognized, and the maximum working hours per week has been limited to 52 hours since 2018. In this situation, various working hours are legally excluded as a way to maintain the company's value-added creation and meet the diverse needs of workers, and Korea's Labor Standards Act restricts flexible working hours within three months, flexible working hours exceeding three months, selective working hours, and extended working hours. However, in the discussion on the application of the revised flexible working hours system in 2021 and the expansion of the settlement unit period recently discussed, there is a problem with the flexible working hours system, which needs to be improved. Therefore, this paper aims to examine the problems of the flexible working hours system and improvement measures. The flexible working hours system is a system that does not violate working hours even if the legal working hours are exceeded on a specific day or week according to a predetermined standard, and does not have to pay additional wages for excessive overtime work. It is mainly useful as a form of shift work in manufacturing, sales service, continuous business or electricity, gas, water, and transportation for long-term operations. It is also used as a way to shorten working hours, such as expanding holidays through short working days. However, if the settlement unit period is expanded, it is disadvantageous to workers as the additional wages that workers can receive will not be received. Therefore, First, in order to expand the settlement unit period currently under discussion, additional wages should be paid for the period expanded from the current standard. Second, it is necessary to improve the application of the flexible working hours system to individual workers to have sufficient consultation with individual workers in a written agreement with the worker representative, Third, clarify the allowable time for extended work during the settlement unit period, and Fourth, limit the daily working hours or apply to continuous rest. In addition, since the written agreement of the worker representative is an important issue in the application of the flexible working hours system, it is necessary to secure the representation of the worker representative.

An Empirical Study on the Determinants of Supply Chain Management Systems Success from Vendor's Perspective (참여자관점에서 공급사슬관리 시스템의 성공에 영향을 미치는 요인에 관한 실증연구)

  • Kang, Sung-Bae;Moon, Tae-Soo;Chung, Yoon
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.139-166
    • /
    • 2010
  • The supply chain management (SCM) systems have emerged as strong managerial tools for manufacturing firms in enhancing competitive strength. Despite of large investments in the SCM systems, many companies are not fully realizing the promised benefits from the systems. A review of literature on adoption, implementation and success factor of IOS (inter-organization systems), EDI (electronic data interchange) systems, shows that this issue has been examined from multiple theoretic perspectives. And many researchers have attempted to identify the factors which influence the success of system implementation. However, the existing studies have two drawbacks in revealing the determinants of systems implementation success. First, previous researches raise questions as to the appropriateness of research subjects selected. Most SCM systems are operating in the form of private industrial networks, where the participants of the systems consist of two distinct groups: focus companies and vendors. The focus companies are the primary actors in developing and operating the systems, while vendors are passive participants which are connected to the system in order to supply raw materials and parts to the focus companies. Under the circumstance, there are three ways in selecting the research subjects; focus companies only, vendors only, or two parties grouped together. It is hard to find researches that use the focus companies exclusively as the subjects probably due to the insufficient sample size for statistic analysis. Most researches have been conducted using the data collected from both groups. We argue that the SCM success factors cannot be correctly indentified in this case. The focus companies and the vendors are in different positions in many areas regarding the system implementation: firm size, managerial resources, bargaining power, organizational maturity, and etc. There are no obvious reasons to believe that the success factors of the two groups are identical. Grouping the two groups also raises questions on measuring the system success. The benefits from utilizing the systems may not be commonly distributed to the two groups. One group's benefits might be realized at the expenses of the other group considering the situation where vendors participating in SCM systems are under continuous pressures from the focus companies with respect to prices, quality, and delivery time. Therefore, by combining the system outcomes of both groups we cannot measure the system benefits obtained by each group correctly. Second, the measures of system success adopted in the previous researches have shortcoming in measuring the SCM success. User satisfaction, system utilization, and user attitudes toward the systems are most commonly used success measures in the existing studies. These measures have been developed as proxy variables in the studies of decision support systems (DSS) where the contribution of the systems to the organization performance is very difficult to measure. Unlike the DSS, the SCM systems have more specific goals, such as cost saving, inventory reduction, quality improvement, rapid time, and higher customer service. We maintain that more specific measures can be developed instead of proxy variables in order to measure the system benefits correctly. The purpose of this study is to find the determinants of SCM systems success in the perspective of vendor companies. In developing the research model, we have focused on selecting the success factors appropriate for the vendors through reviewing past researches and on developing more accurate success measures. The variables can be classified into following: technological, organizational, and environmental factors on the basis of TOE (Technology-Organization-Environment) framework. The model consists of three independent variables (competition intensity, top management support, and information system maturity), one mediating variable (collaboration), one moderating variable (government support), and a dependent variable (system success). The systems success measures have been developed to reflect the operational benefits of the SCM systems; improvement in planning and analysis capabilities, faster throughput, cost reduction, task integration, and improved product and customer service. The model has been validated using the survey data collected from 122 vendors participating in the SCM systems in Korea. To test for mediation, one should estimate the hierarchical regression analysis on the collaboration. And moderating effect analysis should estimate the moderated multiple regression, examines the effect of the government support. The result shows that information system maturity and top management support are the most important determinants of SCM system success. Supply chain technologies that standardize data formats and enhance information sharing may be adopted by supply chain leader organization because of the influence of focal company in the private industrial networks in order to streamline transactions and improve inter-organization communication. Specially, the need to develop and sustain an information system maturity will provide the focus and purpose to successfully overcome information system obstacles and resistance to innovation diffusion within the supply chain network organization. The support of top management will help focus efforts toward the realization of inter-organizational benefits and lend credibility to functional managers responsible for its implementation. The active involvement, vision, and direction of high level executives provide the impetus needed to sustain the implementation of SCM. The quality of collaboration relationships also is positively related to outcome variable. Collaboration variable is found to have a mediation effect between on influencing factors and implementation success. Higher levels of inter-organizational collaboration behaviors such as shared planning and flexibility in coordinating activities were found to be strongly linked to the vendors trust in the supply chain network. Government support moderates the effect of the IS maturity, competitive intensity, top management support on collaboration and implementation success of SCM. In general, the vendor companies face substantially greater risks in SCM implementation than the larger companies do because of severe constraints on financial and human resources and limited education on SCM systems. Besides resources, Vendors generally lack computer experience and do not have sufficient internal SCM expertise. For these reasons, government supports may establish requirements for firms doing business with the government or provide incentives to adopt, implementation SCM or practices. Government support provides significant improvements in implementation success of SCM when IS maturity, competitive intensity, top management support and collaboration are low. The environmental characteristic of competition intensity has no direct effect on vendor perspective of SCM system success. But, vendors facing above average competition intensity will have a greater need for changing technology. This suggests that companies trying to implement SCM systems should set up compatible supply chain networks and a high-quality collaboration relationship for implementation and performance.

Analysis on elements of policy changes in character industry (캐릭터산업의 정책변인연구)

  • Han, Chang-Wan
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.597-616
    • /
    • 2013
  • Character industry is not only knowledge-based industry chiefly with copyrights but also motive power for creative economy to take a role functionally over the fields of industries because it has industrial characteristic as complement product to promote sale value in manufacturing industry and service industry and increase profit on sales. Since 2003, the national policy related to character has aimed to maximize effect among connected industries, extend its business abroad, enforce copyrights through the improvement of marketing system, develop industrial infrastructure through raising quality of character products. With the result of this policy, the successful cases of connected contents have been crystallized and domestic character industry has stepped up methodically since 2007. It is needed to reset the scales of character industry and industrial stats because there are more know-how of self industry promotion and more related characters through strategy of market departmentalization starting with cartoon, animation, games, novels, movies and musicals. Especially, The Korea government set our target for 'Global Top Five Character Power' since 2009 and has started to carry out to find global star characters, support to establish network among connected industries, diversify promotion channels, and develop licensing business. Particularly, since 2013, There have been prospered the indoor character theme park with time management just like character experimental marketing or Kids cafes using characters, the demand market of digital character focusing on SNS emoticon, and the performance market for character musical consistently. Moreover, The domestic and foreign illegal black markets on off-line have been enlarged, so we need another policy alternative. To prepare for the era of exploding character demand market and diversifying platform, it is needed to set up a solid strategy that is required the elements of policy changes in character industry to vitalize character industry and support new character design and connected contents. the following shows that the elements of policy changes related to the existing policy, the current position of market. Nowadays, the elements of policy changes in domestic character industry are that variety of consumers in the digital character market according to platform diversification, Convergence contents of character goods for the Korean waves, legalization of the illegal black contents market, and controling the tendency of consumers in departmentalized market. This can help find the policy issue entirely deferent with the existing character powers like US, Japan or Europe. In its final analysis, the alternatives are the promotion of models with contract copyrights of domestic and foreign connected contents, the diversification of profit models of platform economy, the additive development of target market related to enlarging the Korean waves, and the strategy of character market for the age-specific tendency according to developing character demand market.

A Study on the establishment of IoT management process in terms of business according to Paradigm Shift (패러다임 전환에 의한 기업 측면의 IoT 경영 프로세스 구축방안 연구)

  • Jeong, Min-Eui;Yu, Song-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.2
    • /
    • pp.151-171
    • /
    • 2015
  • This study examined the concepts of the Internet of Things(IoT), the major issue and IoT trend in the domestic and international market. also reviewed the advent of IoT era which caused a 'Paradigm Shift'. This study proposed a solution for the appropriate corresponding strategy in terms of Enterprise. Global competition began in the IoT market. So, Businesses to be competitive and responsive, the government's efforts, as well as the efforts of companies themselves is needed. In particular, in order to cope with the dynamic environment appropriately, faster and more efficient strategy is required. In other words, proposed a management strategy that can respond the IoT competitive era on tipping point through the vision of paradigm shift. We forecasted and proposed the emergence of paradigm shift through a comparative analysis of past management paradigm and IoT management paradigm as follow; I) Knowledge & learning oriented management, II) Technology & innovation oriented management, III) Demand driven management, IV) Global collaboration management. The Knowledge & learning oriented management paradigm is expected to be a new management paradigm due to the development of IT technology development and information processing technology. In addition to the rapid development such as IT infrastructure and processing of data, storage, knowledge sharing and learning has become more important. Currently Hardware-oriented management paradigm will be changed to the software-oriented paradigm. In particular, the software and platform market is a key component of the IoT ecosystem, has been estimated to be led by Technology & innovation oriented management. In 2011, Gartner announced the concept of "Demand-Driven Value Networks(DDVN)", DDVN emphasizes value of the whole of the network. Therefore, Demand driven management paradigm is creating demand for advanced process, not the process corresponding to the demand simply. Global collaboration management paradigm create the value creation through the fusion between technology, between countries, between industries. In particular, cooperation between enterprises that has financial resources and brand power and venture companies with creative ideas and technical will generate positive synergies. Through this, The large enterprises and small companies that can be win-win environment would be built. Cope with the a paradigm shift and to establish a management strategy of Enterprise process, this study utilized the 'RTE cyclone model' which proposed by Gartner. RTE concept consists of three stages, Lead, Operate, Manage. The Lead stage is utilizing capital to strengthen the business competitiveness. This stages has the goal of linking to external stimuli strategy development, also Execute the business strategy of the company for capital and investment activities and environmental changes. Manege stage is to respond appropriately to threats and internalize the goals of the enterprise. Operate stage proceeds to action for increasing the efficiency of the services across the enterprise, also achieve the integration and simplification of the process, with real-time data capture. RTE(Real Time Enterprise) concept has the value for practical use with the management strategy. Appropriately applied in this study, we propose a 'IoT-RTE Cyclone model' which emphasizes the agility of the enterprise. In addition, based on the real-time monitoring, analysis, act through IT and IoT technology. 'IoT-RTE Cyclone model' that could integrate the business processes of the enterprise each sector and support the overall service. therefore the model be used as an effective response strategy for Enterprise. In particular, IoT-RTE Cyclone Model is to respond to external events, waste elements are removed according to the process is repeated. Therefore, it is possible to model the operation of the process more efficient and agile. This IoT-RTE Cyclone Model can be used as an effective response strategy of the enterprise in terms of IoT era of rapidly changing because it supports the overall service of the enterprise. When this model leverages a collaborative system among enterprises it expects breakthrough cost savings through competitiveness, global lead time, minimizing duplication.

Some New Problems of International Aviation Security- Considerations Forcused on its Legal Aspects (최근국제항공보안대책(最近國際航空保安対策)의 제간제(諸間題) -특히 법적측면(法的測面)을 중심(中心)으로-)

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.5
    • /
    • pp.53-75
    • /
    • 1993
  • This article is concerned with the comment on "Some New Problems of International Aviation Security-Considerations Forcused on its Legal Aspects". Ever since 1970, in addition to the problem of failure to accept the Tokyo, Hague and Montreal Conventions, there has been also the problem of parties to them, failing to comply with their obligations under the respective treaties, in the form especially of nominal penalties or the lack of any effort to prosecute after blank refusals to extradite. There have also been cases of prolonged detention of aircraft, passengers and hostages. In this regard, all three conventions contain identical clauses which submit disputes between two or more contracting States concerning the interpretation or application of the respective conventions to arbitration or failing agreement on the organization of the arbitration, to the International Court of Justice. To the extent to which contracting States have not contracted out of this undertaking, as I fear they are expressly allowed to do, this promision can be used by contracting States to ensure compliance. But to date, this avenue does not appear to have been used. From this point of view, it may be worth mentioning that there appears to be an alarming trend towards the view that the defeat of terrorism is such an overriding imperative that all means of doing so become, in international law, automatically lawful. In addition, in as far as aviation security is concerned, as in fact it has long been suggested, what is required is the "application of the strictest security measures by all concerned."In this regard, mention should be made of Annex 17 to the Chicago Convention on Security-Safeguarding International Civil Aviation against Acts of Unlawful Intereference. ICAO has, moreover, compiled, for restricted distribution, a Security Manual for Safeguarding Civil Aviation Against Acts of Unlawful Interference, which is highly useful. In this regard, it may well be argued that, unless States members of ICAO notify the ICAO Council of their inability to comply with opecific standards in Annex 17 or any of the related Annexes in accordance with Article 38 of the 1944 Chicago Convention on International Civil Aviation, their failure to do so can involve State responsibility and, if damage were to insure, their liability. The same applies to breaches of any other treaty obligation. I hope to demonstrate that although modes of international violence may change, their underlying characteristics remain broadly similar, necessitating not simply the adoption of an adequate body of domestic legislation, firm in its content and fairly administered, but also an international network of communication, of cooperation and of coordination of policies. Afurther legal instrument is now being developed by the Legal Committee of ICAO with respect to unlawful acts at International airports. These instruments, however, are not very effective, because of the absence of universal acceptance and the deficiency I have already pointed out. Therefore, States, airports and international airlines have to concentrate on prevention. If the development of policies is important at the international level, it is equally important in the domestic setting. For example, the recent experiences of France have prompted many changes in the State's legislation and in its policies towards terrorism, with higher penalties for terrorist offences and incentives which encourage accused terrorists to pass informations to the authorities. And our government has to tighten furthermore security measures. Particularly, in the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescence to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. The general opinion is that the legal oystem could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the sovereign rights of states, and the human rights of the individuals. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co - ordinated measures.

  • PDF

Accessibility Analysis in Mapping Cultural Ecosystem Service of Namyangju-si (접근성 개념을 적용한 문화서비스 평가 -남양주시를 대상으로-)

  • Jun, Baysok;Kang, Wanmo;Lee, Jaehyuck;Kim, Sunghoon;Kim, Byeori;Kim, Ilkwon;Lee, Jooeun;Kwon, Hyuksoo
    • Journal of Environmental Impact Assessment
    • /
    • v.27 no.4
    • /
    • pp.367-377
    • /
    • 2018
  • A cultural ecosystem service(CES), which is non-material benefit that human gains from ecosystem, has been recently further recognized as gross national income increases. Previous researches proposed to quantify the value of CES, which still remains as a challenging issue today due to its social and cultural subjectivity. This study proposes new way of assessing CES which is called Cultural Service Opportunity Spectrum(CSOS). CSOS is accessibility based CES assessment methodology for regional scale and it is designed to be applicable for any regions in Korea for supporting decision making process. CSOS employed public spatial data which are road network and population density map. In addition, the results of 'Rapid Assessment of Natural Assets' implemented by National Institute of Ecology, Korea were used as a complementary data. CSOS was applied to Namyangju-si and the methodology resulted in revealing specific areas with great accessibility to 'Natural Assets' in the region. Based on the results, the advantages and limitations of the methodology were discussed with regard to weighting three main factors and in contrast to Scenic Quality model and Recreation model of InVEST which have been commonly used for assessing CES today due to its convenience today.

Islamist Strategic Changes against U.S. International Security Initiative (미국(美國)의 대외안보전략(對外安保戰略)에 대응한 이슬람Terrorism의 전술적(戰術的) 진화(進化))

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.517-534
    • /
    • 2007
  • Since the beginning of human society, there have always been struggles and competitions for survival and prosperity, terrorism is not a recent phenomenon, however in modern times it has progressed to reflect the advances in civilization and power structures. At the time of the 9.11 terrorist attacks in the U.S. A., a new world order was in the process of being established after the breakdown of the Cold War era. The attacks drove both the Western and the Islamic worlds into heightened fear of terrorism and war, which threatened the quality of life of the whole mankind. Through two war campaigns against the Islamic world, it seems the U.S. has been pushing its own militaristic security road map of the Greater Middle East democratic initiative, justifying it as a means to retaliate and eradicate the terrorist threats towards themselves. However, with its five-year lopsided victories that cost the nation almost four thousand military casualties, and the war expenses that could match the Vietnam war, the U.S. does not yet seem to be totally emancipated from the fears of terrorism. Terrorism, in itself, is a means of resisting forced rules a form of alternative competition by the weak against the strong, and a way of expressing a dismissive response against dictatorial ideas or orders which allow for no normal changes. Intrinsically, the nature of terrorism is a reaction opposing power logics. Confronted with the absolute military power of the U.S., the Islamic strategies of terrorism have begun to rapidly evolve into a new stage. The new strategies take advantage of their civilization and circumstances, they train and inspire their front-line fighters on the Internet, and issue their orders through the clandestine network of the Al Qaeda operatives. These spontaneously generated strategies have been gained speed among the second, and third Islamic generations, many of whom are now spread throughout western societies. This represents a failure of the power-driven, one-sided overseas security initiatives by the U.S., and is creating a culture of fear and distrust in western societies. It is feared that the U.S. war campaigns have made the clash of religions far worse than before, and may ever lead to global ethnic separations and large-scale population movements. Eventually, it may result in the terrorist groups, enlarged and secretly supported by the huge sums of oil money, driving all mankind into a series of irreparable catastrophes.

  • PDF

The Inflow of the Creative-Class and Forming of Cultural Landscape on the Kyunglidan-Gil (경리단길 창조계급의 유입과정과 문화경관 형성요인)

  • Yang, Hee eun;Son, Yong-Hoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.6
    • /
    • pp.158-170
    • /
    • 2013
  • With the recent 'Creative economy' and 'Cultural prosperity' coming to the fore as a new code to build up a city or a region, it is necessary to focus on strengthening the regional creative capacity as well as developing spontaneous regional culture. In such trend this research aims to explore the Kyunglidan-gil, Seoul, Korea in which creative-class are appearing autogenously in clusters and forming new cultural landscape, to identify the factors of their accumulation and changing aspect of cultural landscape. This study has the following purposes: First, Investigating the historical context of the Kyunglidan-gil's landscape. Second, considering the process of the creative-class being flowed into the Kyunglidan-gil as the subject leading to the modification of the region. Third, their activity was analyzed to consider the unique aspect of forming the cultural landscape at the Kyunglidan-gil. Regarding why the creative-class should flow in, results of the study drew five factors including region in issue compared to inexpensive rents, coexistence with nature, quiet atmosphere seeming isolated from the urban confusion, location possible to test and share individual materials one likes, and a site with synergy effect of activity through the network with acquaintances. Also, five characteristics of cultural landscape forming by the people's activity were drawn - space of communication for increasing creativity, temporary and flexible spatial use, expression of one's identity and taste, distinguishing, and positive use of the existing facilities. Like this, by exposing the 'creative-class', a subject of the leader in changing process of the Kyunglidan-gil, this research identified the aspect of forming cultural landscape.