• Title/Summary/Keyword: terms of address

Search Result 571, Processing Time 0.028 seconds

Beyond Politeness: A Spoken Discourse Approach to Korean Address Reference Terms

  • Hong, Jin-Ok
    • English Language & Literature Teaching
    • /
    • v.15 no.2
    • /
    • pp.93-119
    • /
    • 2009
  • Internalized Confucian cultural scripts trigger meta-pragmatic thinking in Korean communication. Commonly shared cultural knowledge acts as a powerful constraint upon the behavioral patterns of each participant and this knowledge can be strategically manipulated to avoid confrontations. The strategic use of address reference terms utilizes cultural values as a face-redress mechanism to achieve situation-specific goals. This paper offers a view of Korean address reference terms that rests on four revisions of politeness theory (Brown & Levinson, 1978, 1987). First, the notion of discernment - or 'wakimae' - as a culture-specific mechanism is reanalyzed. Secondly, culture-specific values as another R (ranking of imposition) variable are introduced. Thirdly, a reevaluation of the notion of positive face (respect) is discussed. Finally, the address reference terms in combination with other honorifics by the speaker that can be strategically applied either to threaten or to enhance the face of the hearer is observed. Because Confucianism is embedded in Korean cultural identity, teaching cultural values integrated and their roles in situation-dependent politeness is required in order to understand interactional nature of politeness occurring from particular discourse contexts.

  • PDF

Trends in Network Address Moving Technology (네트워크 주소 이동 기술 동향)

  • Park, K.M.;Woo, S.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.6
    • /
    • pp.73-82
    • /
    • 2017
  • Moving Target Defense(MTD) is a novel security technology concept in which the IT infrastructure changes its form actively and prevents various types of cyber attacks. Network address moving technology is the field that has been most actively researched in terms of MTD. A number of studies on network address moving published over the last decade have suggested a virtual address-based network address moving technology for efficiency in the implementation. However, virtual address-based network address moving technology has serious vulnerabilities in terms of security and availability. This paper examines the technological characteristics of the existing studies and analyzes their limitations. It suggests security requirements to be considered when designing the network address moving technology through a technological analysis.

A Study on Extending of the Addressable Object of Address of Things (사물주소 부여대상 확대 방안 연구)

  • Yang, Sungchul
    • Journal of Cadastre & Land InformatiX
    • /
    • v.54 no.1
    • /
    • pp.75-87
    • /
    • 2024
  • There There is a difference in terms of administrative power in that the address of things are not an address under Public Act. In terms of location expression, it is possible to express the location more flexibly and in more detail than the road name address, so it should be improved so that it can be assigned and managed in an appropriate location, so that the location of the entire territory can be expressed together with the road name address. As a result of the comparison between the road name address and the address of things based on the analysis results of related laws such as the existing Road Name Address Act, the Building Act, and the Regulations on the Preparation and Management of Basic Address Information, it was confirmed that there are fundamental limitations of the address of things system. Accordingly, this study attempted to suggest ways to improve the address of thing system by broadly dividing it into the legal aspect and the addressable object aspect. From the legal point of view, firstly, it is necessary to improve the upper and lower level laws by unification together with a clear definition of the term subject of addressable object; secondly, according to the Building Act, facilities that are not used for residence among buildings must be given an address of thing; and thirdly, it is necessary to make it easy to use and link with heterogeneous public data by classifying the registration items of the basic address information map by type of geographical feature to be assigned an address. From the point of view of addressability, firstly, it must be given to all facilities in the relevant category so that it can be recognised that all specific facilities have object addresses, and secondly, it is necessary to be able to address the address of things to places that are used by many, even if there are no facilities.

Cultural Differences in Politeness and Notion of Flattery (공손표현과 아부의 문화적 차이)

  • Yoon, Jae-Hak
    • Cross-Cultural Studies
    • /
    • v.33
    • /
    • pp.331-358
    • /
    • 2013
  • This paper looks into several aspects of linguistic behaviors attested in Korean and American English corpora. A special attention is paid to the areas of politeness phenomena, terms of address, power and solidarity, practice of flattery, and closely-related non-linguistic behaviors such as tipping and gift-giving conventions. An analysis of the data reveals that Korean society remains very much superior-oriented, non-egalitarian, non-democratic despite the pride and sense of accomplishment among the populace that the nation has achieved a satisfactory level of democracy. In particular, the following facts in Korean and the Korean society are exposed by an examination of the data: ${\bullet}$ There is a notional gap of positive politeness ${\bullet}$ Superiors enjoy an unfair advantage in the power and solidarity system ${\bullet}$ The terms of address system is set up to make a clear distinction between levels and the terms of address, in turn, dictate norms of expected behavior ${\bullet}$ The notion and practice of flattery heavily favors superiors ${\bullet}$ Non-linguistic acts of gift-giving and tipping are consistent with the examined social interactions As a result, all the benefits, emotional as well as material, are garnered by superiors. These facts may reflect the real Korea that people are used to being comfortable with, a pre-modern, feudalistic society, something akin to its kin in the north. We may proclaim that we aspire to a more democratic society. However, it appears Koreans, deep inside, may have been seeking a powerful dictator all along. These findings help provide a partial but insightful clue to the political puzzle: why Koreans grew uncomfortable with an egalitarian and democratic president and could not save him, but instead replaced him with a succession of a corrupted businessman and the authoritarian daughter of a former dictator. The flight to democracy has stalled in midair, not quite making the grade yet. There is plenty of linguistic evidence in Korean.

Addressing User Engagement in Social Media Platforms with Cultural Differences Based on Hofstede's Dimensions

  • Yoon Han;Hoang D. Nguyen;Tae Hun Kim
    • Asia pacific journal of information systems
    • /
    • v.34 no.1
    • /
    • pp.191-208
    • /
    • 2024
  • This paper proposes the presence and importance of cultural differences to address user engagement in worldwide social media platforms. Based on Hofstede's cultural dimensions, this paper addresses their new meanings in the context of user engagement in social media. Our propositions address two research questions: (1) how do cultural dimensions, displayed on social media platforms, differ across national cultures?; (2) what different preferences the social media platforms have in terms of which cultural dimensions promote or suppress user engagement? User engagement in social media platforms is explained by the cultural differences in terms of the four cultural dimensions: individualism vs. collectivism, uncertainty avoidance, power distance, and masculinity vs. femininity. Implications are also discussed for research and practice.

A Hybrid Prefix Cashing Scheme for Efficient IP Address Lookup

  • Kim, Jinsoo;Kim, Junghwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.45-52
    • /
    • 2015
  • We propose a hybrid prefix caching scheme to enable high speed IP address lookup. All prefixes loaded in a prefix cache should not be overlapped in address range for correct IP lookup. So, every non-leaf prefix needs to be expanded not so as to be overlapped. The shorter expanded prefix is more preferable because it can cover wider address range just as an single entry in a prefix cache. We exploits advantages of two dynamic prefix expansion techniques, bounded prefix expansion technique and bitmap-based prefix expansion technique. The proposed scheme uses dual bound values whereas just one bound value is used in bounded prefix expansion. Our elaborated technique make the dual bound values be associated with several subtries flexibly using bitmap information, rather than with fixed subtries. We evaluate the performance of the proposed scheme in terms of the average length of the expanded prefixes and cache miss ratio. The experiment results show the proposed scheme has lower cache miss ratio than other previous schemes including both bounded prefix expansion and bitmap-based expansion irrespective of the cache size.

Analysis of Threat Model and Requirements in Network-based Moving Target Defense

  • Kang, Koo-Hong;Park, Tae-Keun;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.83-92
    • /
    • 2017
  • Reconnaissance is performed gathering information from a series of scanning probes where the objective is to identify attributes of target hosts. Network reconnaissance of IP addresses and ports is prerequisite to various cyber attacks. In order to increase the attacker's workload and to break the attack kill chain, a few proactive techniques based on the network-based moving target defense (NMTD) paradigm, referred to as IP address mutation/randomization, have been presented. However, there are no commercial or trial systems deployed in real networks. In this paper, we propose a threat model and the request for requirements for developing NMTD techniques. For this purpose, we first examine the challenging problems in the NMTD mechanisms that were proposed for the legacy TCP/IP network. Secondly, we present a threat model in terms of attacker's intelligence, the intended information scope, and the attacker's location. Lastly, we provide seven basic requirements to develop an NMTD mechanism for the legacy TCP/IP network: 1) end-host address mutation, 2) post tracking, 3) address mutation unit, 4) service transparency, 5) name and address access, 6) adaptive defense, and 7) controller operation. We believe that this paper gives some insight into how to design and implement a new NMTD mechanism that would be deployable in real network.

A Parallel Multiple Hashing Architecture for IP Address Lookup (복수의 해쉬 함수를 이용한 병렬 IP 어드레스 검색 구조)

  • 정여진;이보미;임혜숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.158-166
    • /
    • 2004
  • Address lookup is one of the most essential functions of the Internet routers and a very important feature in evaluating router performance. Due to the facts that the Internet traffic keeps growing and the number of routing table entries is continuously growing, efficient address-lookup mechanism is indispensable. In recent years, various fast address-lookup schemes have been proposed, but most of those schemes are not practical in terms of the memory size required for routing table and the complexity required in table update In this paper, we have proposed a parallel IP address lookup architecture based on multiple hashing. The proposed scheme has advantages in required memory size, the number of memory accesses, and table update. We have evaluated the performance of the proposed scheme through simulation using data from MAE-WEST router. The simulation result shows that the proposed scheme requires a single memory access for the address lookup of each route when 203kbytes of memory and a few-hundred-entry TCAM are used.

Seamless Mobility Management in IP-based Wireless/Mobile Networks with Fast Handover

  • Park, Byung-Joo;Hwang, Eun-Sang;Park, Gil-Cheol
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.3
    • /
    • pp.266-284
    • /
    • 2009
  • The challenges of rapidly growing numbers of mobile nodes in IPv6-based networks are being faced by mobile computing researchers worldwide. Recently, IETF has standardized Mobile IPv6 and Fast Handover for Mobile IPv6(FMIPv6) for supporting IPv6 mobility. Even though existing literatures have asserted that FMIPv6 generally improves MIPv6 in terms of handover speed, they did not carefully consider the details of the whole handover procedures. Therefore, in conventional protocols, the handover process reveals numerous problems manifested by a time-consuming network layer based movement detection and latency in configuring a new care of address with confirmation. In this article, we study the impact of the address configuration and confirmation procedure on the IP handover latency. To mitigate such effects, we propose a new scheme which can reduce the latency taken by the movement detection, address configuration and confirmation from the whole handover latency. Furthermore, a mathematical analysis is provided to show the benefits of our scheme. In the analysis, various parameters are used to compare our scheme with the current procedures, while our approach is focused on the reduction of handover latency. Finally, we demonstrate total handover scenarios for the proposed techniques and discussed the major factors which contribute to the handover latency.

Improved LC-trie for Efficient IP Address Lookup (효율적인 IP 주소 검색을 위한 개선된 LC-trie)

  • Kim, Jin-Soo;Kim, Jung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.50-59
    • /
    • 2007
  • IP address lookup is one of the most important and complex functions in the router. In this paper, we propose an improved technique of LC-trie to increase the performance of IP address lookup in the high performance router. We effectively apply the prefix pruning method, which is used for the compression of the forwarding table in TCAM((Ternary Content Addressable Memory), to the LC-trie. This technique can decrease the number of memory accesses and upgrade the lookup speed. Moreover, through the real forwarding table and the real traffic distribution, we evaluate the performance of our scheme in terms of the lookup time and the number of memory access, comparing with that of the previous LC-trie.