View
217
Download
0
Category
Tags:
Preview:
Citation preview
Theme 6Theme 6Two Faces of Our Two Faces of Our SocietySociety
Presented by Prof. Jin-Wan Seo, Ph.D.Former Member of the Presidential e-Government
CommitteeMember of Steering Committee, Asia-Pacific e-Government
Advisory BoardUniversity of Incheon
South Korea
1. Political Angle
Political Utilization of Information and ICTExclusive Possession of InformationControl, Abuse, and Manipulation of Information and ICTMagnification and Centralization of the National Power
_______________ Society
The Concept of _______________n Kangnam-Gu and CCTV
Resident Poll for Installation of CCTV - 88.7% for After 5 model installation (2003) – the number of crimes has been decreased by 41% 272 surveillance camera installed in 2004
Related to the issue of “Privacy”
2. Economic Angle
_______________ Society Commercialization of valuable information Access Way: Telephone (mobile phone), CATV, Internet Two classes?
Information Inequality and _______________ Economic, physical, geographical factors Bring about the enlarged economic gap
Centralization of Information The high-income bracket The densely populated areas (Metropolitan Areas)
3. Socio-cultural Angle
Abundance and Shortage Too many information and contents, but a few of valuable information The possibility of paid admission and use
4. Ethical Angle
Privacy Consumer privacy on the Internet Privacy rights at risk – the _______________
Violence of records and traces left The membership system “Information rape” – The Time Magazine
Infringement of Copy Right vs. Copy Left
_______________ in cyberspace and the digital dilemma Ownership vs. Right to use and to access
Freedom of expression and issue of control
Cases
Evaluation website for Teacher’s Performance managed by the studentsMarried couple nude website of the incumbent art teacher
Indecent and Violent Contents
Pornography and addiction
Nobody knows (anonymity), Easy and Confidentially to see and enjoy (convenience, safety, and stimulation) From absorption to addition
• Legal steps to regulate and effectiveness
_______________ (1996) – violation of the constitution “Indecent and apparently offensive”
_______________ (Child Online Protection Act, 1998) – became enforced after July, 2003.
Securing the electronic frontier Cyber-crime
Hacking/Cracking - trespass and unauthorized access in cyberspace Virus and spam mail Phishing (Private data + Sophisticated Fishing)
Voice Phishing Smishing (SMS + Phishing)
Typology of Cyber-crime in Korean Cyber Cop Type 1: _______________
Hacking, Virus and spam mail Type 2: General Cyber-crime
Internet Fraud, Illegal Site, Illegal Reproduction & Sale, Violating Privacy, Cyber-stalking, Sexual Violence, etc.
Donga.com(2007.06.02)
Voice Phishing
2006.6~2007.5 Financial Damages
No. of Reported Cases 3,648 3,300 billion Korean Won
2005 2006 2007
No. of Reported Cases 1,087 1,266 1,095
Smishing (SMS + Phishing)
KISA (2007)
New Cases of Cyber-crime
Cause of Cyber-crime• Lack of the sense of sin [guilt] & No compensation for damages• Minimum standard of conduct• Harm principle & Tolerance principle• Focus on the motive rather than result of conduct
5. Still Remained Issues… Internet and _______________
The invisible hand vs. the visible hand Internet and administrative response
Technology
10,000 mph
Organization &
management
1,000 mph
Public
policies
10 mph
Response to the Changed Civic Culture Cyber-Culture as Counter-Culture Bizarrerie and different way of thinking N-generation and radical deviation from longstanding values
Another Issue – Content Divide & _______________ Comprehensive capability to use ICT first and to solve the problems
Ability to solve the problems 1) to ________ the nature of problems 2) to ________ the location of information 3) to ________ information 4) to ________ information 5) to ________ the information for solving the problems
Recommended