272 research outputs found

    1982–2021λ…„ κΈ°κ°„ λŒ€ν•œν•΄ν˜‘ μ €μΈ΅λƒ‰μˆ˜μ˜ μž₯κΈ° 변동성

    Get PDF
    ν•™μœ„λ…Όλ¬Έ(석사) -- μ„œμšΈλŒ€ν•™κ΅λŒ€ν•™μ› : μžμ—°κ³Όν•™λŒ€ν•™ μ§€κ΅¬ν™˜κ²½κ³Όν•™λΆ€, 2023. 8. λ‚˜ν•œλ‚˜.The Korea Strait serves as an inlet of the East Sea since the Tsushima Warm Current, a branch of the Kuroshio Current, flows into it through the Korea Strait. The major water masses in the Korea Strait include the Tsushima Warm Water (with temperatures above 10Β°C and salinity exceeding 34.3 psu), transported by the Tsushima Warm Current, and the Korea Strait Bottom Cold Water (KSBCW) characterized by temperatures below 10Β°C, predominantly found at greater depths in the western channel of the Strait. In this study, long-term variations of the KSBCW were analyzed using in situ temperature data obtained from the Korea Oceanographic Data Center from 1982 to 2021. The vertical temperature section of the Korea Strait exhibits an interannual variation of the KSBCW as its primary mode of variability on time scales longer than the seasonal cycle. The second most significant mode reflects an enhancement of both the KSBCW and the Tsushima Warm Water since the mid-1990s, implying a strengthening of vertical stratification. The first mode shows a significant relationship with the upper-layer water temperature variability in the southwestern part of the East Sea. The regression analysis using the ERA5 wind fields targeting the first mode reveals that the KSBCW is strengthened, associated with basin-scale counterclockwise wind-stress curl anomalies. The second mode, however, is suggested to be related to clockwise wind-stress curl anomalies. The relationship between the KSBCW variability and the basin-scale wind variations suggests future works exploring the link with larger-scale climate variations in the broader North Pacific.λŒ€ν•œν•΄ν˜‘μ€ μΏ λ‘œμ‹œμ˜€ ν•΄λ₯˜μ˜ 지λ₯˜μΈ μ“°μ‹œλ§ˆ λ‚œλ₯˜κ°€ λ™ν•΄λ‘œ μœ μž…λ˜λŠ” ν†΅λ‘œμ΄λ‹€. λŒ€ν•œν•΄ν˜‘μ˜ μ£Όμš” μˆ˜κ΄΄λ‘œλŠ” μ“°μ‹œλ§ˆ λ‚œλ₯˜κ°€ μˆ˜μ†‘ν•˜λŠ” μ“°μ‹œλ§ˆ μ˜¨λ‚œμˆ˜(수온 10℃ 이상, μ—ΌλΆ„ 34.3 psu 이상)와, 주둜 μ„œμˆ˜λ„ κΉŠμ€ μˆ˜μ‹¬μ—μ„œ λ°œκ²¬λ˜λŠ” 수온 10℃ μ΄ν•˜μ˜ λŒ€ν•œν•΄ν˜‘ μ €μΈ΅λƒ‰μˆ˜κ°€ μžˆλ‹€. 이 μ—°κ΅¬μ—μ„œλŠ” 1982λ…„λΆ€ν„° 2021λ…„κΉŒμ§€μ˜ κΈ°κ°„ λ™μ•ˆ ν•œκ΅­ν•΄μ–‘μžλ£Œμ„Όν„°μ—μ„œ μ œκ³΅ν•˜λŠ” μ •μ„ ν•΄μ–‘κ΄€μΈ‘ 수온 자료λ₯Ό μ‚¬μš©ν•˜μ—¬ λŒ€ν•œν•΄ν˜‘ μ €μΈ΅λƒ‰μˆ˜μ˜ μž₯κΈ° 변동을 λΆ„μ„ν•˜κ³ , 동해 λ‚¨μ„œμͺ½ μšΈλ¦‰λΆ„μ§€ 상측 수온 λ³€λ™κ³Όμ˜ 관계λ₯Ό μ‚΄νŽ΄λ³΄μ•˜λ‹€. λ˜ν•œ ERA5 λ°”λžŒ 자료λ₯Ό μ‚¬μš©ν•˜μ—¬ λΆ„μ§€κ·œλͺ¨ λ°”λžŒμž₯과의 상관관계λ₯Ό λΆ„μ„ν•˜μ˜€λ‹€. 208 μ •μ„  λŒ€ν•œν•΄ν˜‘ 수온 수직 단면 뢄석 κ²°κ³Ό κ³„μ ˆ 변동보닀 κΈ΄ μ£ΌκΈ°μ—μ„œ κ°€μž₯ μ£Όμš”ν•œ λͺ¨λ“œκ°€ λŒ€ν•œν•΄ν˜‘ μ €μΈ΅λƒ‰μˆ˜μ˜ κ²½λ…„ 변동인 κ²ƒμœΌλ‘œ λ‚˜νƒ€λ‚¬λ‹€. 이 λͺ¨λ“œμ— νšŒκ·€λΆ„μ„ν•œ λ°”λžŒμ€ 뢄지 규λͺ¨μ—μ„œ λ°˜μ‹œκ³„ λ°©ν–₯의 νšŒμ „ 성뢄을 λ³΄μ˜€λ‹€. λ‘λ²ˆμ§Έλ‘œ μ£Όμš”ν•œ λͺ¨λ“œλŠ” 1990λ…„λŒ€ 이후 λŒ€ν•œν•΄ν˜‘ μ €μΈ΅λƒ‰μˆ˜μ™€ μ“°μ‹œλ§ˆ μ˜¨λ‚œμˆ˜κ°€ λͺ¨λ‘ κ°•ν™”λ˜λŠ” 수직 성측이 κ°•ν™”λ₯Ό λ‚˜νƒ€λƒˆλ‹€. 이 λͺ¨λ“œμ— νšŒκ·€λΆ„μ„ν•œ λ°”λžŒμ€ 뢄지 규λͺ¨μ—μ„œ μ‹œκ³„ λ°©ν–₯의 νšŒμ „ 성뢄을 λ³΄μ˜€λ‹€. μ΄λŸ¬ν•œ 뢄지 규λͺ¨ λ°”λžŒμž₯과의 상관성을 λ°”νƒ•μœΌλ‘œ, μ•žμœΌλ‘œμ˜ μ—°κ΅¬μ—μ„œλŠ” λŒ€ν•œν•΄ν˜‘ μ €μΈ΅λƒ‰μˆ˜μ˜ μž₯κΈ° 변동이 λΆνƒœν‰μ–‘ κΈ°ν›„ 변동과 μ–΄λ– ν•œ 상관성을 κ°€μ§€λŠ”μ§€μ— λŒ€ν•œ 뢄석이 ν•„μš”ν•  κ²ƒμœΌλ‘œ μƒκ°λœλ‹€.Abstract i Table of Contents iii List of Figures iv 1. Introduction 1 1.1. Background 1 1.2. Objectives 7 2. Data and Methods 8 2.1. Data 8 2.2. Methods 9 3. Results 13 3.1. Climatology 13 3.2. KSBCW in Summer 15 3.3. First EOF mode 16 3.4. Second EOF mode 21 3.5. Relationship with wind variability 26 4. Discussion and Conclusion 30 Bibliography 36 Abstract in Korean 39석

    ν•΄λ§ˆ ν•˜μœ„ μ˜μ—­ CA1κ³Ό CA3의 μž₯λ©΄ μžκ·Ήμ— κΈ°λ°˜ν•œ μž₯μ†Œ ν‘œμƒ ν˜•μ„± 연ꡬ

    Get PDF
    ν•™μœ„λ…Όλ¬Έ (박사) -- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : μžμ—°κ³Όν•™λŒ€ν•™ λ‡ŒμΈμ§€κ³Όν•™κ³Ό, 2021. 2. 이인아.When we recall the past experiences, we usually think of a scene which is a combination of what we saw, the sounds we hear, and the feeling we felt at that moment. Since the scene is an essential component of episodic memory, studying how scene stimuli are represented and stored in the brain is important in understanding the processes of formation, storage, and retrieval of our memories. One of the brain regions important for episodic memory is the hippocampus. It has been reported that patients or animals with damage to the hippocampus have trouble with retrieving past experiences or forming new memories. The hippocampus is involved not only in episodic memory but also in the formation of a cognitive map. In particular, the place cells observed in the rodent hippocampus play a key role in these functions. However, research on place cells has mainly focused on the firing patterns of cells during foraging in a space, and it has not been clear how hippocampal cells represent and make use of visual scenes for behavior. To find how scene stimuli are represented in place cells, I measured spiking activities of single neurons in the CA1, one of the subregions of hippocampus, and the subiculum, a major output of the hippocampus. Neuronal spiking activity was monitored when the rat performed a task of selecting right or left associated to the scene stimulus presented on monitors. As a result, I found that the place cells in the CA1 and subiculum showed rate modulation according to the scene stimulus. In addition, I also conducted an experiment using a virtual reality system to investigate the neural mechanisms of the formation of a place field based on visual scenes. In this experiment, the rat ran on a virtual linear track as visual cues were added one by one to make a scene-like environment. Neuronal activities of place cells were recorded in the CA1 and CA3 simultaneously to study the neural mechanisms of the development of a place field on the basis of external visual stimuli. Place fields appeared in the CA1 even with a single visual cue, whereas in the CA3, place fields only emerged when a sufficient number of visual cues were collectively arranged in a scene-like fashion. The results suggest that that scene is one of the key stimulus that effectively recruits the hippocampus.μš°λ¦¬λŠ” 과거의 κ²½ν—˜μ„ λ– μ˜¬λ¦΄ λ•Œ κ·Έ λ•Œλ₯Ό λ¬˜μ‚¬ν•˜λŠ” λ¬Έμž₯을 λ– μ˜¬λ¦¬λŠ” 것이 μ•„λ‹ˆλΌ κ²½ν—˜ ν•œ μˆœκ°„μ— λ³΄μ•˜λ˜ 것, λ“€λ Έλ˜ μ†Œλ¦¬, 느꼈던 감정 등이 λ³΅ν•©μ μœΌλ‘œ μ–΄μš°λŸ¬μ§„ μž₯면을 λ– μ˜¬λ¦¬κ²Œ λœλ‹€. μ΄λ ‡κ²Œ μž₯면은 일화 기얡을 κ΅¬μ„±ν•˜λŠ” μ€‘μš”ν•œ μš”μ†ŒλΌ ν•  수 μžˆκΈ°μ— μž₯λ©΄ 자극이 λ‡Œμ—μ„œ μ–΄λ–»κ²Œ ν‘œμƒλ˜λ©° μ €μž₯λ˜λŠ”μ§€λ₯Ό μ—°κ΅¬ν•˜λŠ” 것은 우리 κΈ°μ–΅μ˜ ν˜•μ„±κ³Ό μ €μž₯, 재인 과정을 μ΄ν•΄ν•˜λŠ”λ° μžˆμ–΄ 맀우 μ€‘μš”ν•˜λ‹€κ³  λ³Ό 수 μžˆλ‹€. λ‡Œμ—μ„œ 일화 기얡을 λ‹΄λ‹Ήν•œλ‹€κ³  μ•Œλ €μ§„ μ˜μ—­μ€ ν•΄λ§ˆλ‘œμ¨, ν•΄λ§ˆμ— 손상을 μž…μ€ ν™˜μžλ“€ λ˜λŠ” 동물듀이 과거의 기얡을 μΈμΆœν•˜κ±°λ‚˜ μƒˆλ‘œμš΄ 기얡을 ν˜•μ„±ν•˜λŠ”λ° μžˆμ–΄ 어렀움을 κ²ͺλŠ”λ‹€λŠ” 것이 μ—¬λŸ¬ μ‹€ν—˜μ„ 톡해 보고 된 λ°” μžˆλ‹€. ν•΄λ§ˆλŠ” 일화 κΈ°μ–΅λΏλ§Œ μ•„λ‹ˆλΌ 곡간에 λŒ€ν•œ 지도λ₯Ό ν˜•μ„±ν•˜λŠ” 데에도 κ΄€μ—¬ν•˜λŠ”λ°, 특히, μ„€μΉ˜λ₯˜ ν•΄λ§ˆμ—μ„œ κ΄€μ°° λ˜λŠ” μž₯μ†Œ 세포가 μ΄λŸ¬ν•œ ν•΄λ§ˆμ˜ κΈ°λŠ₯듀을 μˆ˜ν–‰ν•˜λŠ”λ° 핡심적인 역할을 ν•˜λŠ” κ²ƒμœΌλ‘œ μ•Œλ €μ Έ μžˆλ‹€. ν•˜μ§€λ§Œ μž₯μ†Œ μ„Έν¬λŠ” 주둜 μ₯κ°€ 곡간을 νƒμƒ‰ν•˜λŠ” κ³Όμ •μ—μ„œμ˜ λ°œν™” νŒ¨ν„΄μ„ κ΄€μΈ‘ν•œ 연ꡬ가 μ£Όλ₯Ό μ΄λ£¨μ—ˆμœΌλ©° μž₯λ©΄ 자극이 κ°œλ³„ μž₯μ†Œ μ„Έν¬μ˜ λ°œν™” νŒ¨ν„΄μ„ 톡해 μ–΄λ–»κ²Œ ν‘œμƒμ΄ λ˜λŠ”μ§€μ— λŒ€ν•œ μ—°κ΅¬λŠ” λ―Έλ―Έν•œ μˆ˜μ€€μ΄λ‹€. 이 λ…Όλ¬Έμ—μ„œ λ‚˜λŠ” μž₯λ©΄ 자극이 ν•΄λ§ˆμ˜ μž₯μ†Œ μ„Έν¬μ—μ„œ μ–΄λ–»κ²Œ ν‘œμƒλ˜λŠ”μ§€λ₯Ό μ•Œμ•„λ³΄κ³ μž μ₯κ°€ λͺ¨λ‹ˆν„°μ— μ œμ‹œ 된 μž₯λ©΄ μžκ·Ήμ„ 보고 였λ₯Έμͺ½μ΄λ‚˜ μ™Όμͺ½μ„ 선택해야 ν•˜λŠ” 과제λ₯Ό μˆ˜ν–‰ ν•  λ•Œ ν•΄λ§ˆμ˜ ν•˜μœ„ μ˜μ—­μΈ CA1κ³Ό ν•΄λ§ˆμ˜ 정보λ₯Ό 전달 λ°›μ•„ λ‡Œμ˜ λ‹€λ₯Έ μ˜μ—­μœΌλ‘œ 정보λ₯Ό μ „λ‹¬ν•˜λŠ” ν•΄λ§ˆμ΄ν–‰λΆ€μ˜ 단일 세포 ν™œλ™μ„ μΈ‘μ •ν•˜μ˜€λ‹€. κ·Έ κ²°κ³Ό CA1κ³Ό ν•΄λ§ˆμ΄ν–‰λΆ€μ—μ„œ κ΄€μ°° 된 μž₯μ†Œ 세포듀이 μž₯λ©΄ μžκ·Ήμ— λ”°λ₯Έ λ°œν™”μœ¨ λ³€ν™”λ₯Ό λ³΄μΈλ‹€λŠ” 것을 확인 ν•  수 μžˆμ—ˆλ‹€. 이에 λ”ν•˜μ—¬ λ‚˜λŠ” ν•΄λ§ˆμ˜ μž₯μ†Œ 세포듀이 μž₯μ†Œμž₯을 ν˜•μ„±ν•˜κΈ° μœ„ν•΄μ„œ ν•„μš”ν•œ μ‹œκ° 자극이 무엇이며, 이에 μž₯λ©΄ 자극이 μ–΄λ–€ 역할을 ν•˜λŠ”μ§€ ν™•μΈν•˜κΈ° μœ„ν•΄ 가상 ν™˜κ²½μ„ μ΄μš©ν•œ μ‹€ν—˜μ„ μˆ˜ν–‰ν•˜μ˜€λ‹€. 이 μ‹€ν—˜μ—μ„œλŠ” μ₯κ°€ μ„ ν˜• νŠΈλž™μ„ 달릴 λ•Œ, 빈 κ³΅κ°„μ—μ„œ μ‹œμž‘ν•˜μ—¬ μž₯λ©΄ μžκ·Ήμ„ ν˜•μ„± ν•  λ•ŒκΉŒμ§€ μ‹œκ° μžκ·Ήμ„ ν•˜λ‚˜μ”© μΆ”κ°€ν•˜λ©΄μ„œ ν•΄λ§ˆμ˜ ν•˜μœ„ μ˜μ—­μΈ CA1κ³Ό CA3의 μž₯μ†Œ 세포 ν™œλ™μ„ μΈ‘μ • ν•˜λŠ” 과정을 톡해 μ–΄λ–€ μ‹œκ° 자극이 μž₯μ†Œ μ„Έν¬μ˜ μž₯μ†Œμž₯ ν˜•μ„±μ— κ°€μž₯ 큰 영ν–₯을 λ―ΈμΉ˜λŠ” 것인지 μ•Œμ•„λ³΄μ•˜λ‹€. κ·Έ κ²°κ³Ό CA1의 μž₯μ†Œ μ„Έν¬λŠ” κ°„λ‹¨ν•œ μ‹œκ° 자극의 좔가에도 μž₯μ†Œμž₯을 잘 ν˜•μ„±ν•˜λŠ” λͺ¨μŠ΅μ„ 보인 반면 CA3의 μž₯μ†Œ 세포듀은 μΆ©λΆ„ν•œ μ‹œκ° 자극이 λͺ¨μ—¬μ„œ μž₯λ©΄ μžκ·Ήμ„ ν˜•μ„± ν•œ κ²½μš°μ— μž₯μ†Œμž₯을 ν˜•μ„±ν•˜λŠ” 것이 κ΄€μ°°λ˜μ—ˆλ‹€. μ΄λŸ¬ν•œ 일련의 μ‹€ν—˜μ„ ν†΅ν•˜μ—¬ λ‚˜λŠ” μž₯λ©΄ 자극이 ν•΄λ§ˆμ˜ μž₯μ†Œ 세포 λ°œν™”λ₯Ό 톡해 ν‘œμƒλ˜λ©°, ν•΄λ§ˆμ˜ ν•˜μœ„ μ˜μ—­μ΄ λͺ¨λ‘ μž₯λ©΄ 자극 μ²˜λ¦¬μ— κ΄€μ—¬ν•˜μ§€λ§Œ κ·Έ μ€‘μ—μ„œλ„ 특히 CA3κ°€ μž₯λ©΄ μžκ·Ήμ„ 처리 ν•  λ•Œμ— ν•œν•˜μ—¬ 큰 ν™œμ„±μ„ λ³΄μΈλ‹€λŠ” 것을 λ°ν˜”λ‹€.Abstract i Table of Contents iii List of Figures iv Background 1 Scene processing in the hippocampus 2 Anatomical connections of CA1 and CA3 4 Properties of place cell activity 7 Chapter 1. Visual scene representation of CA1 and subiculum in the visual scene memory task 10 Introduction 11 Materials and methods 14 Results 31 Discussion 60 Chapter 2. Role of the visual scene stimulus for place field formation in CA1 and CA3 65 Introduction 66 Materials and methods 68 Results 80 Discussion 107 General Discussion 118 Bibliography 124 ꡭ문초둝 140Docto

    Exploring Neighborhood Ranges through Walking Big Data: An Empirical Study based on WalkOn Data in Jamsil Area

    Get PDF
    ν•™μœ„λ…Όλ¬Έ (석사)-- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : κ³΅κ³ΌλŒ€ν•™ 건좕학과, 2018. 8. μ΅œμž¬ν•„.μƒν™œκΆŒμ€ μ£Όλ―Όλ“€μ˜ μΌμƒμƒν™œ, 즉 톡학, 톡근, μ‡Όν•‘, 였락 등이 μ΄λ£¨μ–΄μ§€λŠ” 곡간적 μ˜μ—­μœΌλ‘œ, μ†Œμœ„ μ‚΄κΈ° 쒋은 동넀λ₯Ό λ§Œλ“€κ³ μž κ±΄μΆ•β‹…λ„μ‹œ λΆ„μ•Όμ—μ„œ μ˜€λž«λ™μ•ˆ μ‚¬μš©λœ κ³„νš κ°œλ…μ΄λ‹€. μš°λ¦¬λ‚˜λΌμ˜ 경우, λŒ€κ·œλͺ¨ 개발둜 μ§„ν–‰λœ 곡동주택 단지 κ³„νšμ„ 톡해 μƒν™œκΆŒ κ³„νšμ΄ 적극적으둜 μ‹œλ„λ˜μ—ˆμœΌλ©°, μ—¬λŸ¬ μ°¨λ‘€ 단지 κ³„νšμ„ 거치며 μƒν™œκΆŒ κ³„νš κ°œλ…μ΄ 점차 λ°œμ „λ˜μ—ˆλ‹€. κ·ΈλŸ¬λ‚˜ μˆ˜μ‹­ 년에 걸쳐 μ§„ν–‰λœ μˆ˜λ§Žμ€ μƒν™œκΆŒ κ³„νš 사둀가 κ΅­λ‚΄ λ„μ‹œ 곳곳에 μžˆμ§€λ§Œ, μš°λ¦¬κ°€ κ³„νšν•œ 동넀가 κ³Όμ—° μƒν™œκΆŒμœΌλ‘œμ¨ 적절히 κΈ°λŠ₯ν•˜κ³  μžˆλŠ”μ§€μ— λŒ€ν•œ 싀증적 κ²€ν† λŠ” 아직 λΆ€μ‘±ν•œ 싀정이닀. λ”°λΌμ„œ λ³Έ μ—°κ΅¬λŠ” μž μ‹€ 거주민의 μƒν™œμ˜μ—­μ„ 싀증적 데이터λ₯Ό 톡해 μΈ‘μ •ν•¨μœΌλ‘œμ¨, 70λ…„λŒ€ λŒ€ν‘œμ μΈ μƒν™œκΆŒ κ³„νš 사둀인 μž μ‹€ μ§€κ΅¬μ˜ μƒν™œκΆŒμ΄ ν˜„μž¬ μ–΄λ–»κ²Œ κΈ°λŠ₯ν•˜λŠ”μ§€λ₯Ό κ²€ν† ν•˜κ³ μž ν•˜μ˜€λ‹€. μ§€κΈˆκΉŒμ§€ μƒν™œκΆŒμ— λŒ€ν•œ 싀증적 연ꡬ가 λΆ€μ‘±ν–ˆλ˜ κΉŒλ‹­μ€, μ£Όλ―Όλ“€μ˜ μƒν™œμ˜μ—­μ„ μΈ‘μ •ν•˜κΈ° μœ„ν•΄μ„œ λ§Žμ€ λΉ„μš©μ΄ ν•„μš”ν–ˆκΈ° λ•Œλ¬Έμ΄λ‹€. νŠΉμ • 지역에 κ±°μ£Όν•˜λŠ” μ‚¬λžŒλ“€μ˜ μƒν™œμ˜μ—­μ„ μΈ‘μ •ν•˜κΈ° μœ„ν•΄μ„œλŠ” μ—¬λ €λͺ…μ˜ μ£Όλ―Όλ“€μ˜ 이동 νŒ¨ν„΄μ„ κ΄‘λ²”μœ„ν•œ μ‹œκ°„μ , 곡간적 λ²”μœ„μ—μ„œ μˆ˜μ§‘ν•΄μ•Όν•œλ‹€. μ΄λŠ” 기쑴의 이동 νŒ¨ν„΄ μˆ˜μ§‘ λ°©μ‹μœΌλ‘œλŠ” ν˜„μ‹€μ μœΌλ‘œ μ–΄λ €μ› λ‹€. ν•˜μ§€λ§Œ μ΅œκ·Όμ— ν™œμš© κ°€λŠ₯해진 λͺ¨λ°”일 빅데이터λ₯Ό ν†΅ν•΄μ„œ, λ§‰λŒ€ν•œ μ–‘μ˜ 데이터λ₯Ό μš©μ΄ν•˜κ²Œ μˆ˜μ§‘ν•  수 있게 λ˜μ—ˆμœΌλ©° 이λ₯Ό 톡해 거주민의 μƒν™œμ˜μ—­μ— λŒ€ν•œ μΈ‘μ • λ˜ν•œ κ°€λŠ₯ν•΄μ‘Œλ‹€. λ³Έ μ—°κ΅¬μ—μ„œλŠ” μŠ€μ™ˆλΌλΉ„γˆœμ˜ λͺ¨λ°”일 μ–΄ν”Œλ¦¬μΌ€μ΄μ…˜ WalkOn μ‚¬μš©μžμ˜ λ³΄ν–‰κ²½λ‘œ 데이터λ₯Ό 기반으둜 μž μ‹€μ§€μ—­ 거주민의 μƒν™œμ˜μ—­μ„ μΈ‘μ •ν•˜μ˜€λ‹€. μƒν™œμ˜μ—­ 츑정을 μœ„ν•΄μ„œ, 야생동물 μ—°κ΅¬μ—μ„œ μ•Όμƒλ™λ¬Όμ˜ Home Range 좔정에 μ‚¬μš©λ˜λŠ” Kernel Methodλ₯Ό ν™œμš©ν•˜μ˜€λ‹€. Kernel MethodλŠ” λ‹€λŸ‰μ˜ κ±°μ£Όλ―Ό μœ„μΉ˜ 데이터λ₯Ό 톡해 ꡬ체적인 경계λ₯Ό κ°–λŠ” μƒν™œμ˜μ—­μ„ μΈ‘μ •ν•  수 μžˆλŠ” 톡계 κΈ°λ²•μœΌλ‘œ, 이λ₯Ό 기반으둜 μž μ‹€ 지역 거주민듀에 λŒ€ν•˜μ—¬ 곡톡적인 κΈ°μ€€μœΌλ‘œ μƒν™œμ˜μ—­μ„ μΈ‘μ •ν•˜κ³  μƒν™œμ˜μ—­μ˜ 면적 및 ν˜•νƒœμ— λŒ€ν•œ ꡬ체적인 뢄석을 μ‹œν–‰ν•  수 μžˆμ—ˆλ‹€. 연ꡬ λŒ€μƒμ§€λ‘œ μž μ‹€μ§€κ΅¬μ˜ `12개 주거지 블둝λ₯Ό μ„ μ •ν•˜μ˜€μœΌλ©°, ν•΄λ‹Ή λΈ”λ‘μ˜ κ±°μ£Όλ―Όλ“€μ˜ μƒν™œμ˜μ—­ 츑정을 μœ„ν•΄ 2016λ…„ 9, 10, 11μ›”μ˜ WalkOn μ–΄ν”Œλ¦¬μΌ€μ΄μ…˜ 보행 ν–‰νƒœ 데이터λ₯Ό ν™œμš©ν•˜μ˜€λ‹€. μ΅œμ’…μ μœΌλ‘œ 연ꡬ λŒ€μƒμ§€μ— κ±°μ£Όν•˜λŠ” 총 140λͺ…μ˜ WalkOn μœ μ €μ™€ 3κ°œμ›”κ°„ κ·Έλ“€μ˜ κ·Όλ¦° λ‚΄ λ³΄ν–‰κ²½λ‘œ 데이터 31376κ°œκ°€ 뢄석에 μ‚¬μš©λ˜μ—ˆλ‹€. 데이터 처리 및 μƒν™œμ˜μ—­ μΈ‘μ • κ³Όμ •μ—μ„œ, WalkOn λ°μ΄ν„°μ˜ μ „μ²˜λ¦¬ 및 보정을 μœ„ν•΄μ„œλŠ” Excel 2016λ₯Ό μ‚¬μš©ν•˜μ˜€μœΌλ©°, Kernel Methodλ₯Ό ν†΅ν•œ μƒν™œμ˜μ—­ 츑정을 μœ„ν•΄μ„œλŠ” ArcGIS 10.2.2와 곡간뢄석 ν”„λ‘œκ·Έλž¨μΈ GME 0.7.3.0을 μ‚¬μš©ν•˜μ˜€λ‹€. Kernel Methodλ₯Ό 톡해 μ΅œμ’…μ μœΌλ‘œ μΈ‘μ •λœ 140λͺ… 거주민의 μƒν™œμ˜μ—­μ˜ 뢄석을 톡해 λ‚˜νƒ€λ‚œ μ£Όμš” 연ꡬ κ²°κ³ΌλŠ” λ‹€μŒκ³Ό κ°™λ‹€. 첫째, μƒν™œμ˜μ—­μ˜ μœ ν˜• λΆ„λ₯˜ 기쀀을 μ œμ‹œν•˜μ˜€λ‹€. 이동성과 μ‹œκ°„μ„±μ„ κ³ λ €ν•˜μ—¬ μƒν™œμ˜μ—­μ˜ μœ ν˜•μ„ λ„€ κ°€μ§€λ‘œ ꡬ뢄할 수 μžˆμ—ˆλ‹€. μœ ν˜• κ΅¬λΆ„μ˜ κΈ°μ€€μœΌλ‘œ 이동성은 거주민이 ν•΄λ‹Ή μƒν™œμ˜μ—­μ— 보행을 톡해 μ ‘κ·Όν–ˆλŠ”μ§€, 보행 μ™Έ κ΅ν†΅μˆ˜λ‹¨μ„ 톡해 μ ‘κ·Όν–ˆλŠ”μ§€λ₯Ό μ˜λ―Έν•˜λ©°, μ‹œκ°„μ„±μ€ 거주민이 일반적으둜 μƒν™œμ„ μ˜μœ„ν•˜λŠ” 곡간(Kernel 90% μ˜μ—­)인 μΌλ°˜μƒν™œκΆŒμΈμ§€, 거주민의 μΌμƒμƒν™œμ΄ μ§‘μ€‘λ˜λŠ” 곡간(Kernel 50% μ˜μ—­)인 μ§‘μ€‘μƒν™œκΆŒμΈμ§€μ˜ ꡬ뢄을 μ˜λ―Έν•œλ‹€. μ΄λŸ¬ν•œ 기쀀을 톡해 보행 μ ‘κ·Ό μƒν™œμ˜μ—­μ΄λ©΄μ„œ μΌλ°˜μƒν™œκΆŒμΈ κ·Όλ¦°μƒν™œμ˜μ—­, 보행 μ ‘κ·Ό μƒν™œμ˜μ—­μ΄λ©΄μ„œ μ§‘μ€‘μƒν™œκΆŒμΈ κ·Όλ¦°μ§‘μ€‘μƒν™œμ˜μ—­, 보행 μ™Έ κ΅ν†΅μˆ˜λ‹¨ μ ‘κ·Ό μƒν™œμ˜μ—­μ΄λ©΄μ„œ μΌλ°˜μƒν™œκΆŒμΈ μ§€μ—­μƒν™œμ˜μ—­, 보행 μ™Έ κ΅ν†΅μˆ˜λ‹¨ μ ‘κ·Ό μƒν™œμ˜μ—­μ΄λ©΄μ„œ μ§‘μ€‘μƒν™œκΆŒμΈ μ§€μ—­μ§‘μ€‘μƒν™œμ˜μ—­μ˜ 4가지 μœ ν˜•μœΌλ‘œ μƒν™œμ˜μ—­μ„ κ΅¬λΆ„ν•˜μ˜€λ‹€. λ‘˜μ§Έ, μž μ‹€ κ±°μ£Όλ―Ό μƒν™œμ˜μ—­μ˜ 면적과 이와 κ΄€λ ¨ν•œ μš”μ†Œλ₯Ό λ„μΆœν•˜μ˜€λ‹€. λ¨Όμ € μƒν™œμ˜μ—­μ˜ 면적을 μ‚΄νŽ΄λ³΄λ©΄, κ·Όλ¦°μƒν™œμ˜μ—­ 평균 면적은 49.0ha, κ·Όλ¦°μ§‘μ€‘μƒν™œμ˜μ—­ 평균 면적은 9.1ha, μ§€μ—­μƒν™œμ˜μ—­μ˜ 평균 면적은 5.0ha, μ§€μ—­μ§‘μ€‘μƒν™œμ˜μ—­μ˜ 면적은 1.5ha둜 λ‚˜νƒ€λ‚¬λ‹€. μ΄λŸ¬ν•œ μƒν™œμ˜μ—­μ˜ 면적 뢄포λ₯Ό ν†΅ν•΄μ„œ 일반적인 μž μ‹€μ§€κ΅¬ κ±°μ£Όλ―Όλ“€μ˜ μƒν™œμ˜μ—­μ„ μ •λŸ‰μ μœΌλ‘œ νŒŒμ•…ν•  수 μžˆμ—ˆλ‹€. μƒν™œμ˜μ—­μ˜ 면적과 κ΄€λ ¨μžˆλŠ” 첫 번째 μš”μ†ŒλŠ” κ±°μ£Όλ―Ό 개인 νŠΉμ„±μΈ μ—°λ ΉλŒ€μ΄λ‹€. 40λŒ€ μ΄ν•˜ κ±°μ£Όλ―Όκ³Ό 50λŒ€ 이상 κ±°μ£Όλ―Όκ°„μ˜ 차이가 λ‚˜νƒ€λ‚¬λŠ”λ°, 40λŒ€ μ΄ν•˜ 거주민은 50λŒ€ 이상 거주민에 λΉ„ν•΄ κ·Όλ¦°μƒν™œμ˜μ—­ 면적이 μž‘κ³ , μ§€μ—­μƒν™œμ˜μ—­μ΄ 크게 λ‚˜νƒ€λ‚¬λ‹€. 두 번째 μš”μ†ŒλŠ” 지역적 νŠΉμ„±μΈ 거주지와 쀑심지ꡬ κ°„μ˜ 거리이닀. 거주지와 쀑심지ꡬ κ°„ 거리가 κ°€κΉŒμšΈμˆ˜λ‘ κ±°μ£Όλ―Ό κ·Όλ¦°μƒν™œμ˜μ—­μ˜ 면적이 μ»€μ§€λŠ” κ²½ν–₯을 확인할 수 μžˆμ—ˆλ‹€. μ…‹μ§Έ, κ°„μ„ λ„λ‘œμ˜ λ„μ‹œν˜•νƒœμ  κΈ°λŠ₯에 λŒ€ν•˜μ—¬ κ³ μ°°ν•˜μ˜€λ‹€. κ·Όλ¦°μƒν™œμ˜μ—­μ˜ ν˜•νƒœλ₯Ό λΆ„μ„ν•œ κ²°κ³Ό, μƒν™œμ˜μ—­μ˜ ν˜•νƒœλŠ” 거주블둝 λ‚΄λΆ€μ˜ 면적인 ν˜•νƒœμ™€ κ°„μ„ λ„λ‘œλ₯Ό 톡해 거주블둝 μ™ΈλΆ€λ‘œ ν™•μž₯ν•˜λŠ” 선적인 ν˜•νƒœλ₯Ό λͺ¨λ‘ κ°–λŠ” 것을 μ•Œ 수 μžˆμ—ˆλ‹€. μ΄λŠ” κ°„μ„ λ„λ‘œλΌλŠ” λ„μ‹œν˜•νƒœμ  μš”μ†Œκ°€ μƒν™œκΆŒμ„ κ΅¬λΆ„ν•˜λŠ” κ²½κ³„λ‘œμ˜ κΈ°λŠ₯κ³Ό μƒν™œμ˜μ—­μ΄ ν™•μž₯ν•˜λŠ” ν†΅λ‘œλ‘œμ˜ κΈ°λŠ₯을 λͺ¨λ‘ μ§€λ‹Œλ‹€λŠ” 것을 μ˜λ―Έν•œλ‹€. λ„·μ§Έ, μž μ‹€μ§€κ΅¬μ˜ μ•„νŒŒνŠΈ λ‹¨μ§€μ˜ μžμ‘±μ„±κ³Ό 폐쇄성에 λŒ€ν•˜μ—¬ κ³ μ°°ν•˜μ˜€λ‹€. λ¨Όμ € μžμ‘±μ„±μ˜ 경우, κ·Όλ¦°μƒν™œμ˜μ—­μ˜ ν˜•νƒœλ₯Ό λ‚΄λΆ€ν˜•, 근거리 ν™•μž₯ν˜•, 원거리 ν™•μž₯ν˜•μœΌλ‘œ κ΅¬λΆ„ν•˜μ—¬ λΆ„μ„ν•œ κ²°κ³Ό, μž μ‹€μ§€κ΅¬μ˜ μ•„νŒŒνŠΈ 단지 거주민의 μƒν™œμ˜μ—­μ€ μ €μΈ΅ 주거지 거주민의 μƒν™œμ˜μ—­μ— λΉ„ν•˜μ—¬ λ‚΄λΆ€ν˜•μ΄ 적고 근거리 ν™•μž₯ν˜•μ΄ 많이 λ‚˜νƒ€λ‚˜, μ•„νŒŒνŠΈ λ‹¨μ§€μ˜ μžμ‘±μ„±μ΄ μ €μΈ΅ 주거지에 λΉ„ν•΄ 떨어짐을 μ•Œ 수 μžˆμ—ˆλ‹€. 그리고 νμ‡„μ„±μ˜ 경우, κ·Όλ¦°μƒν™œμ˜μ—­ ν™•μž₯ νŒ¨ν„΄μ„ μ‚΄νŽ΄λ³΄μ•˜μ„ λ•Œ, μ•„νŒŒνŠΈ 단지가 μ™ΈλΆ€μΈλ“€μ˜ ν™•μž₯ν˜• μƒν™œμ˜μ—­μ— ν¬ν•¨λ˜μ§€ μ•ŠλŠ” κ²½ν–₯이 λ‚˜νƒ€λ‚˜, μ•„νŒŒνŠΈ 단지가 μ™ΈλΆ€μΈλ“€μ—κ²Œ 폐쇄적인 성격을 μ§€λ‹Œλ‹€λŠ” 것을 확인할 수 μžˆμ—ˆλ‹€. 이λ₯Ό μ’…ν•©ν•˜λ©΄ μž μ‹€μ§€κ΅¬μ˜ μ•„νŒŒνŠΈ λ‹¨μ§€λŠ” μ €μΈ΅ 주거지에 λΉ„ν•˜μ—¬ μžμ‘±μ μ΄μ§€ λͺ»ν•˜λ©°, μ™ΈλΆ€μΈλ“€μ—κ²Œ 폐쇄적인 속성을 κ°–λŠ”λ‹€κ³  ν•  수 μžˆλ‹€. μ§€κΈˆκΉŒμ§€ μž μ‹€μ§€κ΅¬ 거주민의 μƒν™œμ˜μ—­μ„ 개인 νŠΉμ„± 및 λ„μ‹œν˜•νƒœμ  νŠΉμ„±κ³Ό 연관지어 κ³ μ°°ν•΄λ³΄μ•˜λ‹€. λ³Έ μ—°κ΅¬μ˜ κ²°κ³ΌλŠ” κ±°μ£Όλ―Ό μƒν™œμ˜μ—­ 츑정을 μœ„ν•΄ μƒˆλ‘œμ΄ μ‹œλ„ν•œ 연ꡬ방법둠에 κΈ°λ°˜ν•œλ‹€. λͺ¨λ°”일 빅데이터λ₯Ό 톡해 얻어진 κ±°μ£Όλ―Ό 보행 ν–‰νƒœ 데이터λ₯Ό Kernel Methodλ₯Ό ν™œμš©ν•˜μ—¬ μƒν™œμ˜μ—­μ„ μΈ‘μ •ν•¨μœΌλ‘œμ¨ μƒν™œμ˜μ—­μ„ ꡬ체적이고 μž…μ²΄μ μœΌλ‘œ μΈ‘μ •ν•  수 μžˆμ—ˆλ‹€. μ΄λŸ¬ν•œ μ‹œλ„λŠ” 기쑴의 μƒν™œμ˜μ—­ μΈ‘μ • λ°©λ²•μ˜ ν•œκ³„λ₯Ό κ·Ήλ³΅ν•˜κ³ , μƒν™œκΆŒ 연ꡬ에 λͺ¨λ°”일 빅데이터λ₯Ό ν™œμš©ν•˜λŠ” 방법둠을 μ œμ‹œν•œλ‹€λŠ”λ° κ·Έ μ˜μ˜κ°€ μžˆλ‹€.1. μ„œ λ‘  1 1.1 μ—°κ΅¬μ˜ λ°°κ²½κ³Ό λͺ©μ  1 1.2 μ—°κ΅¬μ˜ λ²”μœ„μ™€ 방법 3 2. 이둠적 κ³ μ°° 8 2.1 κ·Όλ¦° μƒν™œκΆŒ κ³„νšκ³Ό μž μ‹€μ§€κ΅¬ 8 2.1.1 κ΅­λ‚΄ 주거지 μƒν™œκΆŒ κ³„νšμ˜ 흐름 8 2.1.2 μž μ‹€ μ§€κ΅¬μ˜ μƒν™œκΆŒ κ³„νšκ³Ό κΈ°μ‘΄ 해석 10 2.2 맀핑을 ν†΅ν•œ μƒν™œμ˜μ—­ μΈ‘μ • 13 2.2.1 λ§€ν•‘μ˜ 방법둠적 κ°€λŠ₯μ„±κ³Ό ν•œκ³„ 13 2.2.2 맀핑을 ν†΅ν•œ μž μ‹€μ˜ μƒν™œμ˜μ—­ 뢄석 15 2.3 μœ„μΉ˜ 데이터λ₯Ό ν†΅ν•œ μƒν™œμ˜μ—­ μΈ‘μ • 17 2.3.1 μ΄λ™κ²½λ‘œ μΈ‘μ •λ°©μ‹μ˜ 흐름 17 2.3.2 μœ„μΉ˜λ°μ΄ν„°λ₯Ό ν†΅ν•œ μƒν™œμ˜μ—­ μΆ”μ • 연ꡬ 19 2.4 μ—°κ΅¬μ˜ 차별성 및 ν•„μš”μ„± 23 3. λΆ„μ„μ˜ ν‹€ 25 3.1 λŒ€μƒμ§€ 25 3.1.1 λŒ€μƒμ§€ λ²”μœ„ 및 κ°œμš” 25 3.1.2 λŒ€μƒμ§€ 뢄석 27 3.2 WalkOn 데이터 속성 및 ν•œκ³„ 31 3.2.1 λ°μ΄ν„°μ˜ 속성과 νŠΉμ§• 31 3.2.2 λ°μ΄ν„°μ˜ ν•œκ³„ 및 보정 33 3.3 데이터 선별 및 κ°œμš” 36 3.3.1 κ±°μ£Όλ―Ό 선별 κ³Όμ • 36 3.3.2 블둝별 κ±°μ£Όλ―Ό 인원 및 νŠΉμ„± 37 3.4 Kernel Methodλ₯Ό ν†΅ν•œ μƒν™œμ˜μ—­ μΆ”μ • 40 3.4.1 컀널밀도좔정(Kernel Density Estimation) 40 3.4.2 Kernel Methodλ₯Ό ν†΅ν•œ 거주민의 μƒν™œμ˜μ—­ μΆ”μ • 42 4. μž μ‹€ κ±°μ£Όλ―Ό μƒν™œμ˜μ—­ 양상 46 4.1 μƒν™œμ˜μ—­ μœ ν˜• 및 μœ ν˜•λ³„ 뢄포, 면적 46 4.1.1 μƒν™œμ˜μ—­ μœ ν˜• 46 4.1.2 μƒν™œμ˜μ—­ μœ ν˜• 및 면적 뢄포 52 4.2 μƒν™œμ˜μ—­μ˜ ν˜•νƒœμ  νŠΉμ„± 60 4.2.1 κ·Όλ¦°μƒν™œμ˜μ—­ ν˜•νƒœ μœ ν˜• 60 4.2.2 κ·Όλ¦°μƒν™œμ˜μ—­ μœ ν˜•λ³„ ν˜•νƒœ νŠΉμ„± 67 4.3 μ‹œμ„€μ΄μš© 양상 74 4.3.1 κ·Όλ¦°μ§‘μ€‘μƒν™œμ˜μ—­ λ°”νƒ•μ˜ κ±°μ£Όλ―Ό μ‹œμ„€μ΄μš© 뢄석 74 4.3.2 μ§€μ—­μ§‘μ€‘μƒν™œμ˜μ—­ λ°”νƒ•μ˜ κ±°μ£Όλ―Ό μ‹œμ„€μ΄μš© 뢄석 81 4.4 뢄석결과 μ’…ν•© 83 4.4.1 μƒν™œμ˜μ—­ 면적 뢄석 83 4.4.2 μƒν™œμ˜μ—­μ˜ ν˜•νƒœ 및 κ°„μ„ λ„λ‘œμ˜ κΈ°λŠ₯ 85 4.4.3 λΈ”λ‘μ˜ μžμ‘±μ„±κ³Ό 폐쇄성 86 5. κ²°λ‘  90 μ°Έκ³ λ¬Έν—Œ 95 Abstract 98Maste

    λ―Έλ“€λ°•μŠ€μ™€ μ—£μ§€μ»΄ν“¨νŒ…μ„ μœ„ν•œ 전솑 λ³΄μ•ˆ 계측 ν™•μž₯ 연ꡬ

    Get PDF
    ν•™μœ„λ…Όλ¬Έ (박사) -- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : κ³΅κ³ΌλŒ€ν•™ 컴퓨터곡학뢀, 2020. 8. κΆŒνƒœκ²½.인터넷 νŠΈλž˜ν”½μ΄ HTTPS둜 μ•”ν˜Έν™”λ˜λ©΄μ„œ μ›Ή μΊμ‹œλ‚˜ λ°©ν™”λ²½ 같은 λ―Έλ“€λ°•μŠ€λŠ” νŠΉλ³„ν•œ μ‘°μΉ˜κ°€ μ—†μ΄λŠ” λ™μž‘ν•˜κΈ° μ–΄λ €μš΄ μƒνƒœκ°€ λ˜μ—ˆλ‹€. κ·ΈλŸ¬λ‹€λ³΄λ‹ˆ ν˜„μ—…μ—μ„œλŠ” λ―Έλ“€λ°•μŠ€λ₯Ό μ•”ν˜Έν™”λœ μ„Έμ…˜μ—μ„œ ν™œμš©ν•˜κΈ° μœ„ν•΄ κ³΅κ°œν‚€ 인증 ꡬ쑰의 μ‹ λ’° 방식을 μ˜€μš©ν•˜μ—¬ SplitTLS라고 ν•˜λŠ” TLSλ₯Ό κ°€λ‘œμ±„λŠ” 기법을 μ‚¬μš©ν•˜κ³  μžˆλ‹€. κ·Έλ ‡μ§€λ§Œ μ§€λ‚œ λͺ‡ λ…„κ°„ λ°œν‘œλœ μ—¬λŸ¬ λ…Όλ¬Έμ—μ„œλŠ” λ―Έλ“€λ°•μŠ€κ°€ 잘λͺ» κ΅¬ν˜„λ˜μ—ˆκ±°λ‚˜ λ―Έλ“€λ°•μŠ€ 섀정이 잘λͺ»λ˜μ–΄ SplitTLSλ₯Ό μˆ˜ν–‰ν•˜λŠ”λ° μžˆμ–΄ μ—¬λŸ¬ λ³΄μ•ˆ λ¬Έμ œκ°€ λ°œμƒν•˜κ³  μžˆλ‹€λŠ” 것이 λ°ν˜€μ‘Œλ‹€. 이 논문은 λ―Έλ“€λ°•μŠ€κ°€ TLS μ„Έμ…˜μ— μ•ˆμ „ν•˜κ³  μ‹ λ’°μ„±μžˆκ²Œ μ°Έμ—¬ν•˜κΈ° μœ„ν•œ 방법을 μ„€κ³„ν•˜κ³ μž ν•œλ‹€. 이λ₯Ό μœ„ν•΄ μš°λ¦¬λŠ” λ¨Όμ € λ―Έλ“€λ°•μŠ€λ₯Ό μ€‘κ°„μž 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€μ™€ 쒅단점 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λ‘œ κ΅¬λΆ„ν•˜μ˜€λ‹€. μ€‘κ°„μž 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λž€ 톡신 μ‹œκ°„μ— μ„œλ²„μ™€ ν΄λΌμ΄μ–ΈνŠΈ κ°€μš΄λ°μ„œ λ™μž‘μ„ μˆ˜ν–‰ν•˜λŠ” μ€‘κ°œμžμ΄λ©°, 쒅단점 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λž€ μ„Έμ…˜μ΄ ν™œμ„±ν™”λœ λ™μ•ˆ λ―Έλ“€λ°•μŠ€κ°€ μ„œλ²„μ²˜λŸΌ λ™μž‘ν•˜λŠ” 개체λ₯Ό μ˜λ―Έν•œλ‹€. μ „μžμ˜ μ˜ˆλ‘œλŠ” μΉ¨μž… 탐지 μ‹œμŠ€ν…œμ΄ 있으며 ν›„μžμ˜ μ˜ˆλ‘œλŠ” μ›Ή μΊμ‹œκ°€ μžˆλ‹€. 이 ꡬ뢄 ν•˜μ—μ„œ μš°λ¦¬λŠ” λ―Έλ“€λ°•μŠ€λ₯Ό TLS μ„Έμ…˜μ— μ°Έμ—¬μ‹œν‚€κΈ° μœ„ν•œ 23개의 ν”„λ‘œν† μ½œμ— λŒ€ν•΄ κ²€ν† ν•˜μ˜€λ‹€. 23개 쀑 14κ°œλŠ” μ€‘κ°„μž 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λ₯Ό μœ„ν•œ ν”„λ‘œν† μ½œμ΄λ©°, 9κ°œλŠ” 쒅단점 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λ₯Ό μœ„ν•œ ν”„λ‘œν† μ½œμ΄λ‹€. μš°λ¦¬λŠ” μ„ ν–‰ 연ꡬλ₯Ό κ²€ν† ν•˜λ©΄μ„œ λ‹€μŒμ˜ κ΅ν›ˆμ„ μ–»μ—ˆλ‹€. μš°μ„  μ€‘κ°„μž 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λ₯Ό μœ„ν•œ ν”„λ‘œν† μ½œμ„ μ„€κ³„ν•˜λŠ”λ° μžˆμ–΄μ„œ λ¨Όμ € κ³ λ €ν•΄μ•Ό ν•  점은, λ―Έλ“€λ°•μŠ€κ°€ κ³Όλ„ν•œ νΌλ―Έμ…˜μ„ 갖지 μ•Šλ„λ‘ μ΅œμ†Œ κΆŒν•œμ„ 쀄 수 μžˆλŠ” 방법을 μ°Ύμ•„μ•Ό ν•œλ‹€λŠ” κ²ƒμ΄μ—ˆλ‹€. λ˜ν•œ, μ„œλ²„κ°€ μ„Έμ…˜μ— μ°Έμ—¬ν•˜κΈ° λ•Œλ¬Έμ—, μ„œλ²„κ°€ μ•”ν˜Έν•™μ  방법을 ν†΅ν•΄μ„œ ν΄λΌμ΄μ–ΈνŠΈμ—κ²Œ λ―Έλ“€λ°•μŠ€μ— λŒ€ν•œ 정보λ₯Ό 쀄 수 μžˆλ‹€λŠ” 점도 κ³ λ €ν•  수 μžˆλ‹€λŠ” 것을 μ•Œκ²Œ λ˜μ—ˆλ‹€. λ‹€μŒμœΌλ‘œ 쒅단점 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λ₯Ό μœ„ν•œ ν”„λ‘œν† μ½œμ„ μ„€κ³„ν•˜λŠ”λ° μžˆμ–΄μ„œ μ€‘μš”ν•˜κ²Œ κ³ λ €ν•΄μ•Ό ν•  점은 μ„œλ²„κ°€ μ„Έμ…˜μ— μ°Έμ—¬ν•˜μ§€ μ•ŠκΈ° λ•Œλ¬Έμ—, μ„œλ²„λ‘œμ˜ 톡신이 μΆ”κ°€λ˜λŠ” 것은 λ°”λžŒμ§ν•˜μ§€ μ•Šλ‹€λŠ” 점과 ν‚€ 관리에 μžˆμ–΄μ„œ μ„œλ²„μ—κ²Œ λΆ€ν•˜κ°€ 가지 μ•Šλ„λ‘ λ˜μ–΄μ•Ό ν•˜λ©° κΈ°λ°€ ν‚€μ˜ κ°œμˆ˜λŠ” μ΅œμ†Œν™”ν•  수 μžˆμ–΄μ•Ό ν•œλ‹€λŠ” μ μ΄μ—ˆλ‹€. 이 λ…Όλ¬Έμ—μ„œλŠ” μœ„ κ΅ν›ˆμ μ„ λ°”νƒ•μœΌλ‘œ maTLS와 TLS-SEEDλΌλŠ” 두 개의 ν”„λ‘œν† μ½œμ„ μ œμ•ˆν•˜μ˜€λ‹€. λ¨Όμ €, maTLS ν”„λ‘œν† μ½œμ€ μ€‘κ°„μž 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λ₯Ό μœ„ν•œ ν”„λ‘œν† μ½œμ΄λ‹€. ν˜„μž¬ λ―Έλ“€λ°•μŠ€λ₯Ό λ³΄μ•ˆ μ„Έμ…˜μ— μ°Έμ—¬μ‹œν‚€κΈ° μœ„ν•œ SplitTLSλΌλŠ” ν”„λ‘œν† μ½œμ€ 맀우 λ§Žμ€ λ³΄μ•ˆ 문제점이 발견 λ˜μ—ˆλ‹€. μ—¬λŸ¬ μ„ ν–‰ 연ꡬ듀이 TLS와 λ―Έλ“€λ°•μŠ€λ₯Ό κ²°ν•©ν•˜λ©΄μ„œ μΈμ¦μ„œ 검증 μ‹€νŒ¨λ‚˜ 였래된 μ•”ν˜Έ 기법을 μ‚¬μš©ν•˜κ±°λ‚˜ μ›μΉ˜ μ•ŠλŠ” μˆ˜μ •μ„ ν•œλ‹€λŠ” 것을 λ°ν˜€ λ‚΄μ—ˆλ‹€. μ΄λŸ¬ν•œ λ³΄μ•ˆ 취약점을 ν•΄κ²°ν•˜κΈ° μœ„ν•΄ μš°λ¦¬λŠ” maTLS ν”„λ‘œν† μ½œμ„ μ œμ•ˆν•˜μ˜€λ‹€. 이 ν”„λ‘œν† μ½œμ€ λ―Έλ“€λ°•μŠ€κ°€ TLS μ„Έμ…˜μ— μžμ‹ μ„ λ“œλŸ¬λ‚΄λ©΄μ„œ 감독될 수 μžˆλŠ” ν˜•νƒœλ‘œ μ°Έμ—¬ν•˜λ„λ‘ ν•œλ‹€. TLS μ„Έμ…˜μ— μ°Έμ—¬ν•˜λŠ” λͺ¨λ“  λ―Έλ“€λ°•μŠ€λ“€μ€ μ„Έμ…˜μ„ 두 개의 μ„Έκ·Έλ¨ΌνŠΈλ‘œ λΆ„ν• ν•˜λ©° 각 μ„Έκ·Έλ¨ΌνŠΈλŠ” ν•΄λ‹Ή μ„Έκ·Έλ¨ΌνŠΈλ₯Ό μœ„ν•œ λ³΄μ•ˆ νŒŒλΌλ―Έν„°λ₯Ό κ°–λŠ”λ‹€. maTLS ν”„λ‘œν† μ½œμ€ λ―Έλ“€λ°•μŠ€λ₯Ό μΈμ¦ν•˜κ³  각 μ„Έκ·Έλ¨ΌνŠΈλ“€μ˜ λ³΄μ•ˆ νŒŒλΌλ―Έν„°λ₯Ό κ²€μ¦ν•˜λ©°, λ―Έλ“€λ°•μŠ€μ˜ μ“°κΈ° 연산을 κ°λ…ν•˜λ„λ‘ μ„€κ³„λ˜μ—ˆλ‹€. μ΄λ ‡κ²Œ ν•˜μ—¬ 전체 μ„Έμ…˜μ˜ λ³΄μ•ˆμ„±μ΄ 보μž₯λœλ‹€.이 λ³΄μ•ˆμ„±μ΄ μ‹€μ œ λ‹¬μ„±λœλ‹€λŠ” 것을 보이기 μœ„ν•΄ μš°λ¦¬λŠ” μ΅œμ‹  λ³΄μ•ˆμ„± 검증 도ꡬ인 Tamarin을 ν™œμš©ν•˜μ—¬ 증λͺ…ν•˜μ˜€μœΌλ©° μ‹€μ œ ν…ŒμŠ€νŠΈλ² λ“œ μ‹€ν—˜μ„ 톡해 maTLSκ°€ μ•½κ°„μ˜ μ˜€λ²„ν—€λ“œλ₯Ό κ°€μ§€λ©΄μ„œ μœ„ λ³΄μ•ˆμ„± λͺ©ν‘œλ₯Ό λ‹¬μ„±ν•œλ‹€λŠ” 것을 λ³΄μ˜€λ‹€. λ‹€μŒμœΌλ‘œ TLS-SEEDλŠ” 쒅단점 역할을 μˆ˜ν–‰ν•˜λŠ” λ―Έλ“€λ°•μŠ€λ₯Ό μœ„ν•œ ν”„λ‘œν† μ½œμ΄λ‹€. νŠΉλ³„νžˆ μš°λ¦¬λŠ” 엣지 μ»΄ν“¨νŒ… μ‹œλ‚˜λ¦¬μ˜€λ₯Ό κ³ λ €ν•˜λ©΄μ„œ 이 ν”„λ‘œν† μ½œμ„ μ„€κ³„ν•˜μ˜€λ‹€. 엣지 μ»΄ν“¨νŒ…μ΄λž€ 계산과 μ €μž₯ λ…Έλ“œλ₯Ό ν΄λΌμ΄μ–ΈνŠΈμ— κ°€κΉκ²Œ μœ„μΉ˜μ‹œμΌœμ„œ ν΄λΌμ΄μ–ΈνŠΈμ—κ²ŒλŠ” λΉ λ₯Έ 응닡을 μ œκ³΅ν•˜κ³  μ„œλ²„μ—κ²ŒλŠ” λŒ€μ—­ν­ λΆ€ν•˜λ₯Ό 쀄이도둝 ν•œλ‹€. 일반적으둜 엣지 μ»΄ν“¨νŒ… ν”Œλž«νΌμ€ μ• ν”Œλ¦¬μΌ€μ΄μ…˜ μ œκ³΅μžλ‚˜ ν΄λΌμ΄μ–ΈνŠΈμ—κ²Œ μ„œλ“œ νŒŒν‹°μ΄κΈ° λ•Œλ¬Έμ— 이 두 κ°œμ²΄λŠ” λͺ¨λ‘ 높은 μˆ˜μ€€μ˜ λ³΄μ•ˆμ„±μ„ μš”κ΅¬ν•  것이닀. 이에 따라 μš°λ¦¬λŠ” \tlsλ₯Ό μ œμ•ˆν•˜μ˜€μœΌλ©°, 이λ₯Ό 톡해 μœ„ν—˜ν•œ κ°œμΈν‚€ 곡유 λ¬Έμ œμ™€ λΉ„νš¨μœ¨μ μΈ 원격 μž…μ¦ 문제λ₯Ό ν•΄κ²°ν•˜κ³ μž ν•˜μ˜€μœΌλ©°, λ™μ‹œμ— 엣지 μ»΄ν“¨νŒ…μ˜ μž₯점인 μ„±λŠ₯ ν–₯상을 μœ μ§€ν† λ‘ ν•˜κ³ μž ν•˜μ˜€λ‹€. TLS-SEEDλŠ” μ• ν”Œλ¦¬μΌ€μ΄μ…˜ μ„œλΉ„μŠ€ μ œκ³΅μžκ°€ i) μžμ‹ μ˜ κ°œμΈν‚€λ₯Ό κ³΅μœ ν•˜μ§€ μ•ŠμœΌλ©΄μ„œλ„ 엣지 μ• ν”Œλ¦¬μΌ€μ΄μ…˜μ„ λ„μž…ν•  수 μžˆλ„λ‘ λ§Œλ“€μ–΄μ£Όκ³ , ii) 원격 μž…μ¦μ„ μˆ˜ν–‰ν•˜μ—¬ 엣지 μ• ν”Œλ¦¬μΌ€μ΄μ…˜μ„ μΈκ°€ν•˜κ±°λ‚˜ 비인가할 수 μžˆλ„λ‘ ν•΄μ€€λ‹€. λ˜ν•œ μ• ν”Œλ¦¬μΌ€μ΄μ…˜ μ„œλΉ„μŠ€ μ œκ³΅μžκ°€ ν΄λΌμ΄μ–ΈνŠΈμ—κ²Œ 엣지 μ• ν”Œλ¦¬μΌ€μ΄μ…˜μ— λŒ€ν•œ μΆ©λΆ„ν•œ 정보λ₯Ό μ œκ³΅ν•˜μ—¬ ν΄λΌμ΄μ–ΈνŠΈκ°€ μž…μ¦ μ„œλΉ„μŠ€μ— μ˜μ‘΄ν•˜μ§€ μ•Šλ”λΌλ„ 엣지 μ• ν”Œλ¦¬μΌ€μ΄μ…˜μ— λŒ€ν•΄ 이해할 수 μžˆλ„λ‘ ν•΄μ€€λ‹€. TLS-SEEDλ₯Ό μœ„ν•œ 핡심 자료 κ΅¬μ‘°λŠ” CrossCredential (CC)이며, μ΄λŠ” ν΄λΌμ΄μ–ΈνŠΈμ—κ²Œ μ• ν”Œλ¦¬μΌ€μ΄μ…˜ μ œκ³΅μžμ™€ μ‹ λ’°ν•  수 μžˆλŠ” κΈ°κΈ° μ‚¬μ΄μ˜ μ‹ λ’° 관계λ₯Ό λͺ…μ‹œμ μœΌλ‘œ 보여쀀닀. CCλŠ” λ˜ν•œ ν΄λΌμ΄μ–ΈνŠΈκ°€ 엣지 μ• ν”Œλ¦¬μΌ€μ΄μ…˜μ˜ 무결성을 검증할 수 μžˆλ„λ‘ μΆ©λΆ„ν•œ 정보λ₯Ό μ œκ³΅ν•œλ‹€. TLS-SEEDλ₯Ό μˆ˜ν•™μ μœΌλ‘œ 증λͺ…ν•˜κΈ° μœ„ν•΄, μš°λ¦¬λŠ” ACCE-SEEDλΌλŠ” TLS-SEEDλ₯Ό μœ„ν•œ λ³΄μ•ˆ λͺ¨λΈμ„ λ„μž…ν•˜μ˜€λ‹€. 이 λͺ¨λΈμ€ TLSλ₯Ό μœ„ν•œ ACCE λͺ¨λΈμ„ TLS-SEED에 μ ν•©ν•˜λ„λ‘ ν™•μž₯ν•œ 것이닀. 이 λͺ¨λΈμ„ λ°”νƒ•μœΌλ‘œ μš°λ¦¬λŠ” TLS-SEEDκ°€ ACCE-SEED μ•ˆμ „ν•˜λ‹€λŠ” 것을 λ³΄μ˜€λ‹€. λ§ˆμ§€λ§‰μœΌλ‘œ, ν…ŒμŠ€νŠΈ λ² λ“œ 기반 μ‹€ν—˜μ„ 톡해 μš°λ¦¬λŠ” TLS-SEEDκ°€ λ¬΄μ‹œν• λ§Œν•œ λΆ€ν•˜λ§Œ μΌμœΌν‚€κΈ° λ•Œλ¬Έμ— μ‹€ν˜„ κ°€λŠ₯ν•˜λ‹€λŠ” 것을 증λͺ…ν•˜μ˜€λ‹€.Internet traffics are getting encrypted with HTTPS, which makes middleboxes blind. To introduce middleboxes in the encrypted session, the TLS interception schemes (\aka \splittls) that abuse the public key infrastructure (PKI) are widely used in practice. Several papers, however, demonstrate that the SplitTLS practice is risky due to incorrect implementation or misconfiguration of middleboxes. This dissertation aims to design secure and trustworthy methods to introduce middleboxes in the TLS session. To this end, we first classify middleboxes into two types called a middlebox-as-a-middlebox and a middlebox-as-an-middlebox. A middlebox-as-a-middlebox is an intermediary between a client and a server at communication time, while a middlebox-as-an-endpoint is an intermediary that takes on the role of a server during the session. An example of the former is an intrusion detection system and that or the latter is a web cache. Then we conduct literature reviews over 23 protocols (14 protocols for a middlebox-as-a-middlebox and 9 protocols for a middlebox-as-an-endpoint) that make middleboxes participate into TLS sessions. From our reviews, we have learned the following lessons. For a protocol with a middlebox-as-a-middlebox, we should consider the least privilege of a middlebox to limit it not to perform functionality with excessive permission in design. Also, since a server is involved into the session, we can use a server to help a client to understand a middlebox. For a protocol with a middlebox-as-an-endpoint, we should consider a method not to add further round-trips to a server. In addition, the number of secrets should be minimal and the overhead for the key management should not be placed on a server. In this disseration, we propose two protocols called maTLS and TLS-SEED, based on our learnings. The maTLS protocol is a protocol for a middlebox-as-a-middlebox. Existing solutions, such as SplitTLS, which intercepts TLS sessions, often introduce significant security risks by installing a custom root certificate or sharing a private key. Many studies have confirmed security vulnerabilities when combining TLS with middleboxes, which include certificate validation failures, use of obsolete ciphersuites, and unwanted content modification. To address these issues, we introduce a middlebox-aware TLS protocol, dubbed maTLS, which allows middleboxes to participate in the TLS session in a visible and auditable fashion. Every participating middlebox now splits a session into two segments with their own security parameters in collaboration with the two endpoints. The maTLS protocol is designed to authenticate the middleboxes to verify the security parameters of segments, and to audit the middleboxes' write operations. Thus, security of the session is ensured. We prove the security model of maTLS by using Tamarin, a state-of-the-art security verification tool. We also carry out testbed-based experiments to show that maTLS achieves the above security goals with marginal overhead. The TLS-SEED protocol is a protocol for a middlebox-as-an-endpoint, especially considering a scenario of edge computing. Edge computing is an emerging technology to bring computation and data storage closer to clients, to provide fast responses and to reduce the bandwidth usage in cloud servers. An edge computing platform is typically a third party to an application service provider and a client, both of which require high security assurance. Therefore, we propose TLS-SEED, a TLS extension that addresses risky private key sharing and inefficient remote attestation on the third party, while preserving performance in edge computing. TLS-SEED allows an application service provider (i) to deploy its edge application without sharing its private keys, (ii) to authorize/deauthorize its edge application by performing remote attestation, while presenting sufficient information for a client to verify the edge application without relying on an attestation service. A central data structure of TLS-SEED is a Cross Credential (CC) that shows a client the trust relation between an application service provider and a trusted device. The CC also gives the client the ability to verify the integrity of the edge application. To formally analyze TLS-SEED, we introduce ACCE-SEED, a formal model for TLS-SEED, by extending the ACCE model for TLS, and show TLS is ACCE-SEED secure. Furthermore, testbed-based experiments show that TLS-SEED can be substantiated with a negligible performance overhead.Chapter 1 Introduction 1 1.1 Motivation 1 1.2 Background 2 1.2.1 Types of Middleboxes 3 1.2.2 Transport Layer Security 4 1.2.3 X.509 Certificates 5 1.2.4 Certificate Transparency 5 1.2.5 TLS Interception 6 1.2.6 Problems of SplitTLS 7 Chapter 2 Literature Review 11 2.1 Middlebox-as-a-Middlebox 11 2.1.1 Types of Protocols 11 2.1.2 Takeaways 16 2.2 Middlebox-as-an-Endpoint 16 2.2.1 Types of Protocols 16 2.2.2 Takeaways 21 Chapter 3 maTLS: How to Make TLS middlebox-aware 22 3.1 Introduction 22 3.2 Trust and Threat Models 26 3.3 Auditable Middleboxes 27 3.3.1 Middlebox Certificates 27 3.3.2 Middlebox Transparency 28 3.3.3 Properties of Auditable Middleboxes 28 3.4 Middlebox-aware TLS (maTLS) 30 3.4.1 Security Goals 30 3.4.2 maTLS Design Overview 32 3.4.3 maTLS Handshake Protocol 38 3.4.4 maTLS Record Protocol 40 3.5 Security Verification 41 3.5.1 Protocol Rules 42 3.5.2 Adversarial Model 42 3.5.3 Security Claims 43 3.6 Evaluation 45 3.6.1 Experiment Settings 45 3.6.2 HTTPS Page Load Time 46 3.6.3 Scalability of Three Audit Mechanisms 48 3.6.4 CPU Processing Time 50 3.7 Discussions 51 3.7.1 Incremental Deployment 51 3.7.2 Abbreviated Handshake 51 3.7.3 Mutual Authentication 52 3.7.4 TLS 1.3 Compatibility 52 3.7.5 Mobility Support 52 3.7.6 P2P Communication 53 3.8 Conclusion 53 Chapter 4 TLS-SEED: How to SEcurely Communicate with EDge Computing Platforms 55 4.1 Introduction 55 4.2 Preliminary 58 4.2.1 Edge Computing 59 4.2.2 Trusted Execution Environment 61 4.2.3 TLS on the Third Party 63 4.3 SEED Overview 66 4.4 SEED Design 68 4.4.1 Security Goals 68 4.4.2 Cross Credential (CC) 69 4.4.3 TLS-SEED:TLS extensions for SEED 70 4.4.4 Implications of Cross Credential 75 4.5 Security Analysis 76 4.5.1 Overview of ACCE 76 4.5.2 ACCE-SEED Protocol Execution Environment 77 4.5.3 ACCE-SEED Security 80 4.5.4 Security Result 82 4.6 Evaluation 86 4.6.1 SEED Implementation 86 4.6.2 Experiment Settings 87 4.6.3 Performance Evaluation 88 4.7 Discussions 92 4.7.1 Incremental Deployment Scenario 92 4.7.2 Mobility Support 92 4.7.3 Dependency on TEEs 92 4.8 Conclusion 93 Chapter 5 Conclusion 94 Bibliography 96 Chapter A Cryptographic Definitions 105 A.1 Cryptographic Definitions 105 A.2 Oracles 109 ꡭ문초둝 110 Acknowledgements 113Docto

    The New Millennium Shakespeare in Korea

    No full text

    ν”„λ‘œμŠ€ν¬μΈ  ꡬ단과 팬의 κ΄€κ³„μ˜ 질이 심리적 μ•ˆλ…•κ°μ— λ―ΈμΉ˜λŠ” 영ν–₯ :

    No full text
    ν•™μœ„λ…Όλ¬Έ (석사)-- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : 체윑ꡐ윑과, 2016. 8. 졜의창.ν˜„λŒ€μΈλ“€μ΄ μ‚΄μ•„κ°€λŠ”λ° μžˆμ–΄μ„œ 행볡은 μ€‘μš”ν•œ μš”μ†Œ 쀑 ν•˜λ‚˜μ΄λ‹€. μš°λ¦¬λŠ” κ°€μ‘±, 친ꡬ, λ™λ£Œμ™€ 같은 μ‚¬νšŒ ꡬ성원듀과 ν•¨κ»˜ 슀포츠λ₯Ό ν•˜κ³ , ν…”λ ˆλΉ„μ „, 인터넷 λ“±κ³Ό 같은 맀체λ₯Ό 톡해 μ‹œμ²­ν•˜λŠ” λ“± λ‹€μ–‘ν•œ λ°©λ²•μœΌλ‘œ 슀포츠λ₯Ό 톡해 삢을 즐기고 μžˆλ‹€. 특히 ν”„λ‘œ 슀포츠 산업이 λ°œμ „ν•˜λ©΄μ„œ νŠΉμ • ꡬ단을 μ‘μ›ν•˜λ©° νŒ¬μœΌλ‘œμ„œ 야ꡬ, 좕ꡬ, 농ꡬ, 배ꡬ λ“± λ‹€μ–‘ν•œ 슀포츠λ₯Ό κ΄€λžŒν•˜λŠ” 인ꡬ가 λŠ˜κ³ μžˆλ‹€. μžμ‹ λ“€μ΄ μ’‹μ•„ν•˜λŠ” νŒ€μ„ μ‘μ›ν•˜κ³ , κ΄€λ ¨λœ 정보λ₯Ό μ‚¬νšŒκ΅¬μ„±μ›κ³Ό κ³΅μœ ν•˜λŠ” ν˜„μƒμ€ ν˜„λŒ€μΈλ“€μ—κ²Œ μ—¬κ°€ μƒν™œμ„ λ„˜μ–΄ ν˜„λŒ€ μ‚¬νšŒμ— μƒˆλ‘œμš΄ μ‚¬νšŒ λ¬Έν™”λ‘œ μžλ¦¬μž‘μ€ 것이닀. μš°λ¦¬κ°€ 연고지역 νŒ€μ„ μ‘μ›ν•˜λ©° μ†Œμ†ν•œ 집단에 λŒ€ν•΄ κ°–κ²Œ λ˜λŠ” 애착심과 λ™μΌμ‹œλŠ” 팬의 행볡과 관계가 μžˆλ‹€. λ§Žμ€ μ„ ν–‰μ—°κ΅¬λ“€μ—μ„œ ν”„λ‘œ 슀포츠 νŒ€ λ™μΌμ‹œκ°€ μ—°κ³  지역 λ„μ‹œ μ£Όλ―Όκ³Ό 팬의 행볡에 긍정적인 영ν–₯을 μ€€λ‹€κ³  λ³΄κ³ ν•˜μ˜€λ‹€. ν•˜μ§€λ§Œ 슀포츠 κ΄€λžŒκ³Ό μΈκ°„μ˜ μ‚Άμ˜ μ§ˆμ— λŒ€ν•œ ꡬ체적인 관계에 λŒ€ν•΄μ„œλŠ” 연ꡬ가 λ―Έν‘ν•œ 상황이닀. μ΄λŸ¬ν•œ λ§₯λ½μ—μ„œ λ³Έ μ—°κ΅¬μ—μ„œλŠ” 관계 λ§ˆμΌ€νŒ… 이둠에 κ·Όκ±°ν•˜μ—¬ ꡬ단과 팬의 관계가 팬의 행볡에 μ–΄λ– ν•œ 영ν–₯을 μ£ΌλŠ”μ§€ μ•Œμ•„λ³΄κ³ μž ν•œλ‹€. ꡬ체적으둜 ν”„λ‘œ 슀포츠 νŒ€μ˜ κ΄€κ³„μ˜ 질의 5개(진싀성, ν˜Έν˜œμ„±, λͺ°μž…μ„±, μΉœλ°€κ°, μžμ•„μ—°κ΄€) ν•˜μœ„ μš”μΈμ΄ 팬의 심리적 μ•ˆλ…•κ°μ— λ―ΈμΉ˜λŠ” 영ν–₯을 κ²€μ¦ν•˜κ³ μž ν•œλ‹€. 이λ₯Ό 톡해 ν•™μˆ μ μœΌλ‘œ κ΄€λžŒ μŠ€ν¬μΈ μ™€ 개인의 μ‚Άμ˜ 질 κ΄€λ ¨ 연ꡬ λΆ„μ•Όμ˜ 심측적인 λ°œμ „μ— κΈ°μ—¬ν•˜κ³ μžν•˜λ©°, μ‹€λ¬΄μ μœΌλ‘œλ„ μƒˆλ‘œμš΄ 관계 λ§ˆμΌ€νŒ… νŒ¨λŸ¬λ‹€μž„ λ“± 싀증 자료λ₯Ό μ œμ‹œν•˜κ³ μž ν•˜λŠ” 것이 λ³Έ μ—°κ΅¬μ˜ λͺ©μ μ΄λ‹€. 이λ₯Ό μœ„ν•΄ λ³Έ μ—°κ΅¬μ—μ„œλŠ” νŽΈμ˜ν‘œλ³Έ μΆ”μΆœλ°©λ²•μœΌλ‘œ μΆ”μΆœν•œ ν•œκ΅­ ν”„λ‘œμ•Όκ΅¬ νŒ¬μ„ λŒ€μƒμœΌλ‘œ 온라인 섀문쑰사λ₯Ό μ‹œν–‰ν•˜μ˜€μœΌλ©°, 총 300λΆ€μ˜ 자료λ₯Ό μˆ˜μ§‘ν•˜μ˜€λ‹€. 이 쀑 45개의 λΆˆμ„±μ‹€ν•œ 응닡을 μ œμ™Έν•œ 285λΆ€μ˜ 자료λ₯Ό 톡계 뢄석에 μ‚¬μš©ν•˜μ˜€λ‹€. 연ꡬ가섀을 κ²€μ¦ν•˜κΈ° μœ„ν•˜μ—¬ SPSS 23을 μ‚¬μš©ν•˜μ—¬ κΈ°μˆ ν†΅κ³„λΆ„μ„, 신뒰도뢄석, 닀쀑 νšŒκ·€λΆ„μ„μ„ μ‹œν–‰ν•˜μ˜€μœΌλ©°, AMOS 2.0을 μ‚¬μš©ν•˜μ—¬ 확인적 μš”μΈλΆ„μ„μ„ μ‹œν–‰ν•˜μ˜€λ‹€. 연ꡬ κ²°κ³Ό, ν”„λ‘œ 슀포츠 νŒ€κ³Ό 팬 κ°„μ˜ ν˜Έν˜œμ„±κ³Ό μΉœλ°€κ°μ€ 팬의 심리적 μ•ˆλ…•κ°μ— ν†΅κ³„μ μœΌλ‘œ μ •(+)적 영ν–₯을 λ―ΈμΉ˜λŠ” 것을 ν™•μΈν•˜μ˜€λ‹€. 반면, ν”„λ‘œ 슀포츠 νŒ€κ³Ό 팬 κ°„μ˜ μ‹ λ’°μ„±, λͺ°μž…μ„±, μžμ•„μ—°κ΄€μ€ 팬의 심리적 μ•ˆλ…•κ°μ— ν†΅κ³„μ μœΌλ‘œ μœ μ˜λ―Έν•œ 관계가 μ—†λŠ” κ²ƒμœΌλ‘œ λ‚˜νƒ€λ‚¬λ‹€. λ§ˆμ§€λ§‰μœΌλ‘œ μ‹œν–‰λœ 쑰절 νš¨κ³ΌλΆ„μ„μ—μ„œλŠ” κ²½κΈ°μž₯ λ‚΄ μ„œλΉ„μŠ€ 질이 팬의 심리적 μ•ˆλ…•κ°μ— 관계에 λ―ΈμΉ˜λŠ” 영ν–₯이 μ—†λŠ” κ²ƒμœΌλ‘œ λ‚˜νƒ€λ‚¬λ‹€.For human beings, happiness or well-being is one of the most important elements in their life. For many, good quality of life is the ultimate goal of human life. People everywhere enjoy sports through participating and watching at home or stadiums with their social members such as friends and family. Through involvement in sports, people can attain an enjoyable life and happiness. Previous studies have proved that participating in physical and leisure activities has a positive effect on human happiness or well-being. Moreover, spectator sports have a positive influence on human happiness. For example, self-identification as a fan for a particular team is a factor that affects a fans psychological well-being. However, there is not much existing research indicating which specific factors in spectator sports affect quality of life. This study applied relationship marketing theory to professional sports context and linked it with human psychological well-being. The purpose was to examine the influence of relationship quality between professional sports teams and fans on the fans psychological well-being in order to find how much the 5 factors of relationship quality impact the fans psychological well-being, and then to show how the findings from this research can lead to practical developments in both practical and academic sectors. This study conducted an online survey and collected 330 completed survey samples from professional baseball fans in Korea. From the 330 collectged samples, 285 samples were ultimately used for data analysis. SPSS 21.0 was applied for descriptive, reliability, and multiple regression analysis. Confirmatory factor analysis was performed through using AMOS 20.0. The result of this study found that reciprocity and intimacy between a sports team and its fan has a positive effect on the fans psychological well-being, even though there are no positive effects in trust, commitment, and self-connection. In addition, service quality was measured as a moderator variable and proved that there is no moderated effect on or between two variables: relationship quality and psychological well-being. The findings of this study determined that relationship marketing in professional sports context can enhance peoples psychological well-being. With this theoretical evidence, sports managers can better understand the importance of relationship marketing regarding consumers happiness. The expected potential result is the creation of better effective marketing strategies.Chapter 1. Introduction 1 1.1 Background 1 1.2 Research Objective 6 1.3 Research Questions 7 1.4 Definition of Terminology 7 1.4.1 Relationship Quality 7 1.4.2 Psychological Well-Being 7 1.4.3 Service Quality 7 Chapter 2. Literature Review 8 2.1 Social Identity Theory 8 2.1.1 Influence of Social Identity Theory on Human Well-Being 10 2.2 Relationship Marketing 13 2.3 Relationship Quality 18 2.3.1 Trust 23 2.3.2 Commitment 26 2.3.3 Intimacy 27 2.3.4 Self-Connection 29 2.3.5 Reciprocity 31 2.4 Psychological Well-being 33 2.5 Research Model & Hypothesis 39 2.5.1 Research Model 39 2.5.2 Hypothesis 40 Chapter 3. Method 49 3.1 Participants and Procedures 49 3.2 Instrumentation 50 3.2.1 Item Development 50 3.2.2 Independent Variable 51 3.2.3 Dependent Variable 52 3.2.4 Moderator Variable 52 3.2.5 Control Variable 52 3.2.6 Pilot Study 53 3.3 Measurement 54 3.3.1 Descriptive Analysis 54 3.3.2 Confirmatory Factor Analysis 54 3.3.3 Reliability Analysis 55 3.3.4 Multiple Regression Analysis 55 Chapter 4. Results 56 4.1 Descriptive Statistics 56 4.2 Confirmatory Factor Analysis 58 4.3 Reliability Analysis 61 4.4 Hypothesis Verification 71 Chapter 5. Discussion & conclusion 78 5.1 Discussion 78 5.2 Implication 80 5.2.1 Theoretical Implication 80 5.2.2 Managerial Implication 82 5.3 Limitation & Future Research 83 5.4 Conclusion 85 REFERENCES 86 κ΅­λ¬Έ 초둝 95 APPENDIX 98Maste

    A Constitutional Study on the Current Law Regulating Child Pornography in Korea

    No full text
    ν•™μœ„λ…Όλ¬Έ (석사)-- μ„œμšΈλŒ€ν•™κ΅ λŒ€ν•™μ› : 법학과, 2015. 2. μ†‘μ„μœ€.ν—Œλ²• 제21μ‘°κ°€ 보μž₯ν•˜λŠ” ν‘œν˜„μ˜ μžμœ λŠ” λ―Όμ£Όμ‚¬νšŒ λ°œμ „μ— ν•„μˆ˜λΆˆκ°€κ²°ν•œ κΈ°λ³ΈκΆŒμœΌλ‘œμ„œ μš°λ¦¬λ‚˜λΌλ₯Ό λΉ„λ‘―ν•œ 세계 κ°κ΅­μ—μ„œ 맀우 μ€‘μš”ν•˜κ²Œ 닀루고 μžˆλŠ” κ°€μΉ˜λ‹€. ν‘œν˜„μ˜ μžμœ μ— μ˜ν•˜μ—¬ λ³΄ν˜Έλ˜λŠ” ν‘œν˜„μ€ λ°˜λ“œμ‹œ 높은 μ •μΉ˜μ Β·μ˜ˆμˆ μ  κ°€μΉ˜ 등을 지녀야 ν•˜λŠ” 것은 μ•„λ‹ˆλ©° μΈκ°„μ˜ μ„±(性)을 닀룬 ν‘œν˜„λ¬Ό μ—­μ‹œ ꡬ체적인 보호 λ²”μœ„μ— λŒ€ν•œ λ…Όλž€μ€ μ‘΄μž¬ν•  수 μžˆλ”λΌλ„ μ΅œμ†Œν•œ 일정 λ²”μœ„ 이상은 ν‘œν˜„μ˜ μžμœ μ— μ˜ν•˜μ—¬ 보호될 수 μžˆλ‹€. ν˜„ν–‰ μ•„λ™Β·μ²­μ†Œλ…„μ˜ μ„±λ³΄ν˜Έμ— κ΄€ν•œ 법λ₯ μ€ μ•„λ™μ˜ ꢌ읡 보μž₯ 및 아동에 λŒ€ν•œ 성범죄 μ˜ˆλ°©μ΄λΌλŠ” 기치 ν•˜μ— μ•„λ™μ˜ μ„±(性)에 κ΄€ν•˜μ—¬ 닀룬 ν‘œν˜„λ¬Ό, 즉 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ 규제λ₯Ό κ°•ν™”ν•˜λŠ” λ°©ν–₯으둜의 κ°œμ •μ΄ μ§€μ†λ˜κ³  μžˆλ‹€. 이에 λŒ€ν•˜μ—¬ λ…Όλž€μ΄ κ°€μ—΄λ˜κ³  μžˆλŠ” ν˜„μž¬ μ‹œμ μ—μ„œ ν˜„ν–‰λ²•μ΄ ν‘œν˜„μ˜ 자유λ₯Ό λΉ„λ‘―ν•œ 기본ꢌ μ œν•œμ˜ κ΄€μ μ—μ„œ κ³ μ°°ν•  λ•Œ ν—Œλ²•μƒ ν—ˆμš©λ  수 μžˆλŠ” ν•œκ³„λ₯Ό μ€€μˆ˜ν•˜κ³  μžˆλŠ” 것인지 ν•œλ²ˆμ―€ κ²€ν† ν•˜μ—¬ λ³Ό ν•„μš”κ°€ μžˆλ‹€. 이 논문은 μ„±(性) ν‘œν˜„κ³Ό ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ— κ΄€ν•œ λ…Όμ˜λ₯Ό μ„ κ²°μ μœΌλ‘œ κ²€ν† ν•œ ν›„ μ΄λŸ¬ν•œ ν—Œλ²•μ  μ°¨μ›μ—μ„œμ˜ 고찰을 μ „μ œλ‘œ ν•˜μ—¬ ν˜„ν–‰λ²•μƒμ˜ 아동 포λ₯΄λ…Έκ·Έλž˜ν”Ό κ΄€λ ¨ κ·œμ •μ˜ μœ„ν—Œμ„± μ—¬λΆ€λ₯Ό κ³ μ°°ν•œλ‹€. λ¨Όμ €, ν˜„ν–‰λ²•μ€ μ„± ν‘œν˜„μ˜ μ œν•œκ³Ό κ΄€λ ¨ν•˜μ—¬ λ¬Έν™”μ Β·μ‚¬νšŒν•™μ  κ°œλ…μΈ 포λ₯΄λ…Έκ·Έλž˜ν”ΌλΌλŠ” μš©μ–΄ λŒ€μ‹ μ— 일λ₯ μ μœΌλ‘œ μŒλž€μ΄λΌλŠ” μš©μ–΄λ₯Ό μ‚¬μš©ν•˜κ³  μžˆλ‹€. ν‘œν˜„μ˜ 자유의 ν™•λŒ€λΌλŠ” κ΄€μ μ—μ„œ μ΅œμ†Œν•œ 온라인 κ³΅κ°„μ—μ„œμ˜ ν‘œν˜„μ„ κ·œμœ¨ν•˜λŠ” 정보톡신망 μ΄μš©μ΄‰μ§„ 및 μ •λ³΄λ³΄ν˜Έ 등에 κ΄€ν•œ 법λ₯ μƒμ˜ μŒλž€μ˜ λ²”μœ„λŠ” ν—Œλ²•μž¬νŒμ†Œκ°€ νŒμ‹œν•œ λ°”μ²˜λŸΌ μΆ•μ†Œ 해석함이 νƒ€λ‹Ήν•˜λ‹€. λ˜ν•œ λ―Έμ—°λ°©λŒ€λ²•μ›μ˜ κ²½μš°μ™€λŠ” 달리, μŒλž€ ν‘œν˜„μ΄λΌλ„ 일단 ν—Œλ²• 제21쑰의 ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ— ν•΄λ‹Ήν•œλ‹€κ³  보고 이λ₯Ό ν—Œλ²• 제37μ‘° 제2항에 μ˜ν•˜μ—¬ μ œν•œν•  수 μžˆμ„ 뿐이라고 νŒμ‹œν•œ 우리 ν—Œλ²•μž¬νŒμ†Œμ˜ νƒœλ„λŠ” νƒ€λ‹Ήν•˜λ‹€. μ΄λŸ¬ν•œ λ…Όλ¦¬λŠ” 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ κ²½μš°μ—λ„ λ§ˆμ°¬κ°€μ§€λ‘œ 적용될 수 μžˆμœΌλ‚˜, 18μ„Έ 미만의 μ‹€μ œ μ•„λ™μœΌλ‘œ ν•˜μ—¬κΈˆ μ‹€μ œμ˜ ν˜Ήμ€ κ°€μƒμ˜ μ„±ν–‰μœ„λ₯Ό ν•˜λ„λ‘ ν•˜λŠ” 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ κ²½μš°μ—λŠ” λ‹Ήν•΄ μ•„λ™μ—κ²Œ λ―ΈμΉ˜λŠ” 인격적 μΉ¨ν•΄κ°€ 맀우 μ€‘λŒ€ν•˜λ―€λ‘œ μ˜ˆμ™Έμ μœΌλ‘œ ν—Œλ²•μƒ ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ—μ„œ λ°°μ œν•˜μ—¬μ•Ό ν•  것이닀. μ΄λŸ¬ν•œ λ…Όμ˜λ“€μ„ λ°”νƒ•μœΌλ‘œ ν•˜μ—¬ 본격적으둜 μ•„λ™Β·μ²­μ†Œλ…„μ˜ μ„±λ³΄ν˜Έμ— κ΄€ν•œ 법λ₯ μƒ 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όλ₯Ό κ·œμ œν•˜κ³  μžˆλŠ” μ‘°ν•­λ“€μ˜ μœ„ν—Œμ„±μ„ κ²€ν† ν•˜μ—¬ λ³Έλ‹€. λ¨Όμ €, κ΅­λ‚΄μ˜ λ―Έμ„±λ…„μž κ΄€λ ¨ 법체계 μ „λ°˜κ³Ό ν—Œλ²•μƒ λ³΄ν˜Έμ˜μ—­κ³Όμ˜ 관계 등을 μ’…ν•©μ μœΌλ‘œ κ³ μ°°ν•  λ•Œ μ•„λ™Β·μ²­μ†Œλ…„μ˜ μ„±λ³΄ν˜Έμ— κ΄€ν•œ 법λ₯ μ—μ„œ μ‚¬μš©ν•˜κ³  μžˆλŠ” κ°œλ…μΈ μ•„λ™Β·μ²­μ†Œλ…„μ΄μš©μŒλž€λ¬Όμ— κ΄€ν•œ 연령을 18μ„Έλ‘œ ν•˜ν–₯ μ‘°μ •ν•  ν•„μš”κ°€ μžˆλ‹€. λ˜ν•œ μ•„λ™Β·μ²­μ†Œλ…„μ΄μš©μŒλž€λ¬Ό 제2μ‘° 제5호의 μ •μ˜ μ‘°ν•­ 쀑 μ•„λ™Β·μ²­μ†Œλ…„μœΌλ‘œ λͺ…λ°±ν•˜κ²Œ 인식될 수 μžˆλŠ” μ‚¬λžŒ λΆ€λΆ„ 및 ν‘œν˜„λ¬Ό λΆ€λΆ„ μ—­μ‹œ ν‘œν˜„μ˜ 자유λ₯Ό μΉ¨ν•΄ν•˜λŠ” κ³Όλ„ν•œ κ·œμ œμ΄λ―€λ‘œ μ‚­μ œκ°€ μš”μ²­λœλ‹€. 뿐만 μ•„λ‹ˆλΌ μ•„λ™Β·μ²­μ†Œλ…„μ΄μš©μŒλž€λ¬Όμ˜ λ‹¨μˆœ μ†Œμ§€λ₯Ό μ²˜λ²Œν•˜λŠ” 동 법 제11μ‘° 제5ν•­ μ—­μ‹œ κ³Όμž‰κΈˆμ§€μ›μΉ™μ— μœ„λ°˜ν•˜μ—¬ ꡭ민의 κΈ°λ³ΈκΆŒμ„ μΉ¨ν•΄ν•˜λ―€λ‘œ μ‚­μ œκ°€ μš”κ΅¬λœλ‹€. 아동 성범죄 μ˜ˆλ°©μ΄λΌλŠ” 곡읡도 μ†Œμ€‘ν•˜μ§€λ§Œ μ΄λŸ¬ν•œ κ°€μΉ˜λ₯Ό μΆ”κ΅¬ν•˜λŠ” κ³Όμ •μ—μ„œ ν‘œν˜„μ˜ 자유λ₯Ό λΉ„λ‘―ν•œ ν—Œλ²•μƒ κΈ°λ³ΈκΆŒμ„ 보μž₯ν•˜μ—¬μ•Ό ν•œλ‹€λŠ” μš”μ²­κ³Όλ„ μ‘°ν™”λ₯Ό 이루도둝 ν•˜μ—¬μ•Ό ν•œλ‹€. 이λ₯Ό μœ„ν•˜μ—¬ ν˜„ν–‰ μ•„λ™Β·μ²­μ†Œλ…„μ˜ μ„±λ³΄ν˜Έμ— κ΄€ν•œ 법λ₯ μ€ κ°€λ²Œμ„±μ„ μΆ•μ†Œν•˜λŠ” λ°©ν–₯으둜의 κ°œμ •μ΄ ν•„μš”ν•˜λ‹€.제 1 μž₯ μ„œλ‘  1 제 1 절 μ—°κ΅¬μ˜ λͺ©μ  1 제 2 절 μ—°κ΅¬μ˜ 방법과 λ²”μœ„ 3 제 2 μž₯ μŒλž€μ΄ ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ— ν•΄λ‹Ήν•˜λŠ”μ§€ μ—¬λΆ€ 5 제 1 절 μš°λ¦¬λ‚˜λΌμ™€ λ―Έκ΅­μ—μ„œμ˜ ν‘œν˜„μ˜ 자유의 의의 5 1. μš°λ¦¬λ‚˜λΌμ˜ 경우 5 κ°€. ν‘œν˜„μ˜ 자유의 의의 및 λ‚΄μš© 5 λ‚˜. μ–Έλ‘ β€€μΆœνŒμ˜ 자유의 λ³΄ν˜Έμ˜μ—­κ³Ό μ œν•œ 6 2. 미ꡭ의 경우 – μˆ˜μ •ν—Œλ²• 제1쑰의 νƒœλ„ 7 제 2 절 포λ₯΄λ…Έκ·Έλž˜ν”Όμ™€ μŒλž€λ¬Όμ˜ 의의 9 1. 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ μ •μ˜ 및 λΆ„λ₯˜ 9 2. μŒλž€ κ°œλ…μ— κ΄€ν•œ κ³ μ°° 12 κ°€. ν˜„ν–‰λ²•μƒμ˜ μŒλž€ κ°œλ… 12 λ‚˜. λŒ€λ²•μ› νŒλ‘€μ˜ 동ν–₯ 14 λ‹€. ν—Œλ²•μž¬νŒμ†Œ νŒλ‘€μ˜ νƒœλ„ 15 라. κ²€ν†  – 정보톡신망 μ΄μš©μ΄‰μ§„ 및 μ •λ³΄λ³΄ν˜Έ 등에 κ΄€ν•œ 법λ₯ μƒμ˜ μŒλž€ κ°œλ…μ„ μ€‘μ‹¬μœΌλ‘œ 17 3. μ†Œκ²° 21 제 3 절 μŒλž€μ΄ ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ— ν•΄λ‹Ήν•˜λŠ”μ§€ μ—¬λΆ€ 22 1. ν—Œλ²•μž¬νŒμ†Œμ˜ νƒœλ„ 22 κ°€. λ³€κ²½ μ „ 95ν—Œκ°€16 κ²°μ •μ˜ μš”μ§€ 22 λ‚˜. λ³€κ²½ ν›„ 2006ν—Œλ°”109 κ²°μ •μ˜ μš”μ§€ 22 λ‹€. νŒλ‘€ 변경에 λŒ€ν•œ 찬반둠 24 2. λ―Έμ—°λ°©λŒ€λ²•μ›μ˜ νƒœλ„ – Miller v. California νŒκ²°μ„ μ€‘μ‹¬μœΌλ‘œ 26 κ°€. Miller v. California 판결의 μš”μ§€ 26 λ‚˜. 판결의 평석 26 3. κ²€ν†  28 제 4 절 μ†Œκ²° 33 제 3 μž₯ 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ—μ˜ ν•΄λ‹Ή μ—¬λΆ€ 34 제 1 절 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ 의의 및 ν•΄μ•… 34 1. 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ 의의 34 2. 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ ν•΄μ•… 36 κ°€. 아동에 λŒ€ν•œ 성적 ν•™λŒ€μ˜ μ•ΌκΈ° 36 λ‚˜. 아동 μ„±λ²”μ£„μ˜ 유발 및 λ°©μ‘° 38 3. μ†Œκ²° 40 제 2 절 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ ν—Œλ²•μƒ ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ—μ˜ ν•΄λ‹Ή μ—¬λΆ€ 40 1. ν—Œλ²•μž¬νŒμ†Œ νŒλ‘€μ˜ νƒœλ„ 40 κ°€. νŒμ‹œμ‚¬ν•­ 40 λ‚˜. λŒ€μƒ νŒλ‘€μ˜ 평석 41 2. λ―Έκ΅­ νŒλ‘€μ˜ νƒœλ„ – New York v. Ferber νŒκ²°μ„ μ€‘μ‹¬μœΌλ‘œ 43 κ°€. 사싀관계 43 λ‚˜. νŒμ‹œμ‚¬ν•­ 43 3. 우리 ν—Œλ²•μƒ 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ ν‘œν˜„μ˜ μžμœ μ— μ˜ν•œ 보호 κ°€λŠ₯μ„± 여뢀와 λ…Όκ±° 44 4. ν—Œλ²•μƒ ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ—μ„œ λ°°μ œλ˜λŠ” 아동 포λ₯΄λ…Έκ·Έλž˜ν”Όμ˜ λ²”μœ„μ— κ΄€ν•œ κ³ μ°° 48 κ°€. μ‹€μ œ 아동인지 여뢀에 따라 ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ—μ˜ ν•΄λ‹Ή μ—¬λΆ€κ°€ λ‹¬λΌμ§€λŠ”μ§€ μ—¬λΆ€ 48 λ‚˜. μ•„λ™μ˜ λ²”μœ„ μ„€μ • 문제 49 λ‹€. λ¬˜μ‚¬μ˜ λ…Έκ³¨μ„±μ˜ 정도 52 제 3 절 μ†Œκ²° 54 제 4 μž₯ ν˜„ν–‰λ²•μƒ μ•„λ™μŒλž€λ¬Ό κ·œμ •μ— κ΄€ν•œ 쟁점 55 제 1 절 ν˜„ν–‰ μ•„λ™β€€μ²­μ†Œλ…„μ˜ μ„±λ³΄ν˜Έμ— κ΄€ν•œ 법λ₯ μƒ μ•„λ™μŒλž€λ¬Ό κ΄€λ ¨ κ·œμ •μ˜ κ³ μ°° 55 1. ν˜„ν–‰λ²•μƒ μ•„λ™μŒλž€λ¬Ό κ΄€λ ¨ κ·œμ •μ˜ μ‹€νƒœ 55 2. μ•„λ™μŒλž€λ¬Ό κ΄€λ ¨ κ·œμ •μ˜ κ°œμ • μ—°ν˜ 58 3. ν˜„ν–‰λ²•μ˜ ν—Œλ²•μ  κ΄€μ μ—μ„œμ˜ κ³ μ°° 60 제 2 절 λ™μ•ˆ(η«₯ι‘”) 성인 λ“±μž₯ ν‘œν˜„λ¬Όμ— κ΄€ν•œ 쟁점 62 1. μ•„λ™β€€μ²­μ†Œλ…„μœΌλ‘œ λͺ…λ°±ν•˜κ²Œ 인식될 수 μžˆλŠ” μ‚¬λžŒ λΆ€λΆ„μ˜ 해석에 κ΄€ν•œ νŒλ‘€μ˜ νƒœλ„ 62 κ°€. 지방법원 νŒλ‘€μ˜ νƒœλ„(μˆ˜μ›μ§€λ°©λ²•μ› 2013. 2. 20. μ„ κ³  2012고단3926 판결) 62 λ‚˜. λŒ€λ²•μ› νŒλ‘€μ˜ νƒœλ„(λŒ€λ²•μ› 2014. 9. 24. μ„ κ³  2013도4503 판결) 63 2. ν˜„ν–‰ 아청법상 μ•„λ™β€€μ²­μ†Œλ…„μœΌλ‘œ λͺ…λ°±ν•˜κ²Œ 인식될 수 μžˆλŠ” μ‚¬λžŒ 뢀뢄에 λŒ€ν•œ ν—Œλ²•μ  νŒλ‹¨ 66 κ°€. λ§‰μ—°ν•˜κΈ° λ•Œλ¬Έμ— 무효의 원칙에 λΉ„μΆ”μ–΄ λ³Έ ν˜„ν–‰λ²•μ˜ μœ„ν—Œμ„± 66 λ‚˜. κ³Όμž‰κΈˆμ§€μ›μΉ™μ˜ μœ„λ°˜ μ—¬λΆ€ 68 3. μ†Œκ²° 71 제 3 절 가상 아동(virtual child) 포λ₯΄λ…Έκ·Έλž˜ν”Ό κ·œμ œμ— κ΄€ν•œ 쟁점 71 1. λ…Όμ˜μ˜ μ „μ œ 71 2. μš°λ¦¬λ‚˜λΌμ˜ λ²•μ œ 및 ν•™μ„€κ³Ό νŒλ‘€μ˜ 동ν–₯ 73 κ°€. ν˜„ν–‰λ²•μ˜ νƒœλ„ 73 λ‚˜. 가상 아동 포λ₯΄λ…Έκ·Έλž˜ν”Ό 처벌의 타당성에 κ΄€ν•œ κ²¬ν•΄μ˜ λŒ€λ¦½ 73 λ‹€. ν—Œλ²•μž¬νŒμ†Œ νŒλ‘€μ˜ νƒœλ„ 75 3. μ™Έκ΅­μ˜ 사둀 76 κ°€. ꡭ제 ν˜‘μ•½μ˜ νƒœλ„ 76 λ‚˜. 미ꡭ의 νƒœλ„β€“ Ashcroft v. Free Speech Coalition νŒκ²°μ„ μ€‘μ‹¬μœΌλ‘œ 78 λ‹€. 일본의 νƒœλ„ 80 라. κ²€ν†  80 4. 가상 아동 포λ₯΄λ…Έκ·Έλž˜ν”Ό 처벌의 μœ„ν—Œμ„± 81 κ°€. ν‘œν˜„μ˜ 자유의 λ³΄ν˜Έμ˜μ—­μ—μ˜ ν•΄λ‹Ή μ—¬λΆ€ 81 λ‚˜. κ³Όμž‰κΈˆμ§€μ›μΉ™μ˜ μœ„λ°˜ μ—¬λΆ€ 82 5. μ†Œκ²° 85 제 4 절 μ•„λ™μŒλž€λ¬Ό λ‹¨μˆœ μ†Œμ§€μž 처벌 κ·œμ •μ— κ΄€ν•œ 쟁점 86 1. 처벌 λŒ€μƒμΈ μ•„λ™μŒλž€λ¬Ό λ‹¨μˆœ μ†Œμ§€μ˜ 의의 86 κ°€. μ‹€μ •λ²•μ˜ νƒœλ„ 86 λ‚˜. 경찰청의 μ•„λ™μŒλž€λ¬Ό μ†Œμ§€μ˜ 단속 κΈ°μ€€ 86 λ‹€. μ†Œμ§€μ˜ κ°œλ…μ— λŒ€ν•œ κ³ μ°° 88 2. μ•„λ™μŒλž€λ¬Όμ˜ λ‹¨μˆœ μ†Œμ§€λ₯Ό μ²˜λ²Œν•˜λŠ” κ²ƒμ˜ μœ„ν—Œμ„±μ˜ κ³ μ°° 89 κ°€. μ•„λ™μŒλž€λ¬Ό λ‹¨μˆœ μ†Œμ§€ μ²˜λ²Œμ— λŒ€ν•œ κ²¬ν•΄μ˜ λŒ€λ¦½ 89 λ‚˜. κ²€ν†  – κ³Όμž‰κΈˆμ§€μ›μΉ™μ˜ 관점을 μ€‘μ‹¬μœΌλ‘œ 91 3. μ†Œκ²° 96 제 5 절 μ†Œκ²° 97 제 5 μž₯ κ²°λ‘  99 μ°Έκ³  λ¬Έν—Œ 103 Abstract 107Maste

    On the Semantic Oppositions in The Bronze Horseman

    No full text
    There has been many reputes on the theme of The Bronze Horseman(1833) which is one of the finest works of A. Pushkin, but the riddle of the discrepancy between the image of Peter the Great in introduction and that of the Bronze Horseman of the main story about a 'little man' named Evgeny who lost his fiancee by flood has not been solved. According to A. Blok, Pushkin was a poet of harmony and he always tried to find middle way in conflicting situation in his time through his writings. As a poet he recognize the importance and the greatness of Peter the Great who built the Petersburg, but he could not reconcile with the surplus-repression of Nicholas who was a descendent of Peter and a personal censor of him. So the ambiguous attitude of Pushkin to Peter results in the dual oppositions in The Bronze Horseman, which has made readers embarrass in finding the real or secret message of this work. This paper argues that the real opposition on the semantic and thematic level in the work lies not in the opposition between Peter and Evgeny, but in the opposition between Peter and the Bronze Horseman implying Nicholas. That was a technique for Pushkin to satisfy the conflicting demands from inside and outside
    • …
    corecore