Computers are parts of human beings' life and their power is becoming so higher that they seep into our practical life and try to control all the aspects of our life. Thinking about, human use them to buy books, clothes, and foods, to book flight, train and movie tickets, and to watch news, TV shows, movies, cartoons and even cyber lectures. Furthermore, as computers are installed in various devices such as smart phones, notebooks, or other electric devices, people can meet computers more frequently ever. Namely, computers equals our life. However, as computers are overwhelming human beings' life, negative sides of the computers are coming to the surface.The drawbacks are serious enough to affect the society itself negatively and hurt the internet-users intensely. So, recently, arguments about the revival of network real-name system has appeared as an effective solution. However, like the old saying : Overdone is worse than undone, the network system cannot solve the cyber problems but even make other problems. Thus, the network real-name system should not be revived as a key solution to current cyber problems.
2014년 9월 10일 수요일
2014년 9월 9일 화요일
Classical Argument Outline
1.The Introduction :
I will begin my paper with familiar sentence : Computers are parts of human beings' life and their power are getting higher and higher. Thinking about, human use computer in various way. They use them to buy books, clothes, foods, or to watch news, TV shows, movies, cartoon, lectures. In turn, I will move reader's attention mentioning 'cyber problems on the internet' and will mention that recently the revival of network real-name system on the cyber place has appeared. Then I will put my thesis statement : However, the network real name system should not be revived.
2. The Narration :
I will summarize relevant materials on my research and then I will mention Korean's thinking about the network real name system. Then, I will mention brief history of the network real-name system and some negative aspects according to a study <What’s in a name? Real name policies and social networks by Lilian Edwards and Derek McAuley> referring to Iranian "Twitter Revolution" in 2009.
3. The Confirmation :
I will start my confirmation by mentioning huge personal information leakage after exerting this system in 2009 arguing that this system can lead to serious personal information leakage easily. Then I will mention opinions of member of National Assembly. Subsequently, I will show the network real-name system's inefficiency by referring to a statistic about malicious comments. Lastly, I will examine the violation(freedom of expression) of the network real-name system on constitution. I will refer to a study that has been done by Hanyang university.
4. The Refutation and Concession
I will start this paragraph by conceding that the network real-name system play a role in protecting cyber place to some extent. Then I will use a research paper <The Influence of Network Real-name System on the Management of Internet Public Opinion by Son Guangxing and Yang Pingfang that dealt with positive aspects about the network real-name system. And I will use Google chairman's mention.
5. The Summation
I will close this paragraph with my previous points and then I will reconsider about the freedom of political expression and Iranian's political revolution. Then I will restate my thesis statement again at the end of this paragraph.
I will begin my paper with familiar sentence : Computers are parts of human beings' life and their power are getting higher and higher. Thinking about, human use computer in various way. They use them to buy books, clothes, foods, or to watch news, TV shows, movies, cartoon, lectures. In turn, I will move reader's attention mentioning 'cyber problems on the internet' and will mention that recently the revival of network real-name system on the cyber place has appeared. Then I will put my thesis statement : However, the network real name system should not be revived.
2. The Narration :
I will summarize relevant materials on my research and then I will mention Korean's thinking about the network real name system. Then, I will mention brief history of the network real-name system and some negative aspects according to a study <What’s in a name? Real name policies and social networks by Lilian Edwards and Derek McAuley> referring to Iranian "Twitter Revolution" in 2009.
3. The Confirmation :
I will start my confirmation by mentioning huge personal information leakage after exerting this system in 2009 arguing that this system can lead to serious personal information leakage easily. Then I will mention opinions of member of National Assembly. Subsequently, I will show the network real-name system's inefficiency by referring to a statistic about malicious comments. Lastly, I will examine the violation(freedom of expression) of the network real-name system on constitution. I will refer to a study that has been done by Hanyang university.
4. The Refutation and Concession
I will start this paragraph by conceding that the network real-name system play a role in protecting cyber place to some extent. Then I will use a research paper <The Influence of Network Real-name System on the Management of Internet Public Opinion by Son Guangxing and Yang Pingfang that dealt with positive aspects about the network real-name system. And I will use Google chairman's mention.
5. The Summation
I will close this paragraph with my previous points and then I will reconsider about the freedom of political expression and Iranian's political revolution. Then I will restate my thesis statement again at the end of this paragraph.
Research 7 :10/24 The Influence of Network Real-name System on the Management of Internet Public Opinion(page 4-5)
Sources :
file:///C:/Users/SEC/Downloads/09%20(4).pdf
My Topic :
The network real name system can protect our society and can make cleaner cyber place.
What I hope to learn from this source:
I hope I can learn network real-name system's positive effect on our society.
Notes :
1.By using network real-name system, we can encourage the netizens to restrict their actions more strictly, and to be more responsible for their network speeches and to act more rationally.
2.It is helpful for forming responsible citizen consciousness, raising the level of social
hazard, reducing network crimes, and finally purifying the environment of the Internet.
3.It is also helpful for lowering the expense of dealing with releasing false
information on the Internet and infringing on people's privacy.
Final Thoughts :
I didn't know that China also exerted this system too. It was so interesting. I will finish my research on my topic and move on to making outline.
Research 6 : 10/24 Naming Names on Internet(NYT)
Sources :
http://www.nytimes.com/2011/09/05/technology/naming-names-on-the-internet.html?_r=0
My Topic :
There are various arguments which oppose to my idea.
What I hope to learn from this source:
I hope I can know about the effective aspects of real-name system.
Notes :
1.Last month, Interior Minister Hans-Peter Friedrich of Germany said bloggers should disclose their true identities. He cited the case of the Norwegian terrorist suspect Anders Behring Breivik, who had professed admiration for a blogger who wrote under the pseudonym “Fjordman.”
2.The Internet would probably be more civilized if contributors to online discussions had to use their real names. Some people might even start to use spell check and proper punctuation.
3. It is true that cyberbullying is nasty. Perhaps anonymity ought not to be defended to every extreme.
4.Mr.Schmidt's support for the use of real identities has more to do with commerce than crime-fighting. Google wants to know more about its users because this information is valuable to advertisers and other business.
"If we knew that it was a real person, ten we could sort of hold them accountable, we could check them, we could give them tings, we could, you know, bill them; you know, we could have credit cards and so forth and so on, there are all sorts of reasons," he was quoted as saying in Edinburgh.
Final Thoughts :
I was so surprised that New York Times has focused on South Korea's situation and it was interesting that the chairman of Google accept the real-name system.
2.The Internet would probably be more civilized if contributors to online discussions had to use their real names. Some people might even start to use spell check and proper punctuation.
3. It is true that cyberbullying is nasty. Perhaps anonymity ought not to be defended to every extreme.
4.Mr.Schmidt's support for the use of real identities has more to do with commerce than crime-fighting. Google wants to know more about its users because this information is valuable to advertisers and other business.
"If we knew that it was a real person, ten we could sort of hold them accountable, we could check them, we could give them tings, we could, you know, bill them; you know, we could have credit cards and so forth and so on, there are all sorts of reasons," he was quoted as saying in Edinburgh.
Final Thoughts :
I was so surprised that New York Times has focused on South Korea's situation and it was interesting that the chairman of Google accept the real-name system.
Research 5 : 10/24 What’s in a name? Real name policies and social networks(page 2-3)
Sources :
http://www.cs.nott.ac.uk/~drm/papers/2013_NamesHavePower%20paris%20vn.pdf
My Topic :
Network real-name system will bring about negative consequences.
What I hope to learn from this source:
I want to make sure that the network real-name system has negative effects on public's lives through this source.
Notes :
1. The EFF recall that offline anonymity to foster political speech has been upheld as a constitutional right in McIntyre v. Ohio Elections Comm’n 514 U.S. 334, 357 (1995) with the resounding assertion that:
“Anonymity is a shield from the tyranny of the majority. It thus
exemplifies the purpose behind the Bill of Rights, and of the First
Amendment in particular: to protect unpopular individuals from
retaliation—and their ideas from suppression—at the hand of an
intolerant society. The right to remain anonymous may be abused
when it shields fraudulent conduct. But political speech by its
nature will sometimes have unpalatable consequences, and, in
general, our society accords greater weight to the value of free
speech than to the dangers of its misuse.”
2. At a personal level, many users find a real name policy is at best an annoyance, and at worst a potential bar on online participation.
1. The EFF recall that offline anonymity to foster political speech has been upheld as a constitutional right in McIntyre v. Ohio Elections Comm’n 514 U.S. 334, 357 (1995) with the resounding assertion that:
“Anonymity is a shield from the tyranny of the majority. It thus
exemplifies the purpose behind the Bill of Rights, and of the First
Amendment in particular: to protect unpopular individuals from
retaliation—and their ideas from suppression—at the hand of an
intolerant society. The right to remain anonymous may be abused
when it shields fraudulent conduct. But political speech by its
nature will sometimes have unpalatable consequences, and, in
general, our society accords greater weight to the value of free
speech than to the dangers of its misuse.”
2. At a personal level, many users find a real name policy is at best an annoyance, and at worst a potential bar on online participation.
3.At a practical level, real name policies worsen the consequences of security breaches without providing any guarantees of improving the social vices they are designed to combat.
Final thoughts :
It was so hard to find this research paper. I wanted to know aspects of foreigners. Now I accomplished it through this source. On the next research I will search on the opposition's opinions.
Research 4 : 10/24 Personal Information Leakage after exerting real-name system(Cyworld information leakage)
Sources :
http://www.koreaherald.com/view.php?ud=20110728000881
http://www.betanews.net/article/550098
http://www.betanews.net/article/550098
My Topic :
As the website which exerted network real-name system stored the users' personal information, the real-name system brought about huge personal information leakage.
What I hope to learn from this source:
I hope this source can make readers know that real-name system can bring about serious information leakage which damage not only themselves but their friends and families as well.
Notes :
1.Some of the personal information of 35 million Nate and Cyworld members have been leaked.
2.As websites must store the users' personal information which is necessary when they make ID, information leakage was really serious.
3.김을동, a member of National Assembly, criticized
"President Lee Myung Bak's personal information has been leaked and other members of National Assembly's personal information including mine have been revealed too."
4.전혜숙, a member of National Assembly, mentioned
"We introduced this system to prevent malicious comments on the cyber place,however, due to this system, all public's personal information is to be leaked. We have to think about abolishing it."
5. New York Times said that Korean Real-Name system is a "silly" system.
Final thoughts:
I was so surprised that I have had Nate ID but I remember that my older sister's personal information has been leaked at that time. This source was really interesting. On the next research, I will find American's aspect of network real-name system.
Research 3 : 10/24 Inefficiency of the internet real-name system
Sources :
http://times.uos.ac.kr/news/articleView.html?idxno=1371
http://news.khan.co.kr/kh_news/khan_art_view.html?artid=200910070301525&code=940100
http://blog.daum.net/kcc1335/4170
My Topic :
Even though the internet real-name system has been exerted, the percent of malicious comments has been increased.
What I hope to learn from these sources:
I hope I can strongly prove that the internet real-name system has no efficiency at all from these sources.
Notes :
1.According to the statistic behind about 64 percent of Korean responded that the real-name system cannot play a role in reducing malicious comments on the cyber place.
2. According to a statistic below, even though exerting the real-name, malicious comments on Agora, Moneyside and Dcinside has been increased.

Final thoughts :
These sources made me shocked by showing increased ratio of malicious comments. This system was to be generated particularly due to malicious comments, but this system increased the comments reversely. It was really shocking. On the next research, I will research on serious personal information leakage that happened after exerting the internet real-name system.
2. According to a statistic below, even though exerting the real-name, malicious comments on Agora, Moneyside and Dcinside has been increased.
Final thoughts :
Research 2 :10/24 Constitutional Research on real-name system
Sources :
http://www.hanyang.ac.kr/home_news/H5EAFA/0002/101/2008/1-1.pdf
My Topic :
The real-name system on the internet has constitutional problems that can bring about violation of freedom of expression.
What I hope to learn from this source:
I hope I can prove that the real-name system can violate both netizens' and internet press's freedom of expression from this source.
Notes :
"1. Public Election Act, the 82 number 6(In 2004)
1)If the internet-users want to update their comments a bout election on websites or cyber bulletin boards, they have to authenticate their identification, including their real name and registration number.
2)This act might be applied to websites that candidates make but since in this case it's just informal form one can avoid authenticating process.
3,4)The Ministry of Government Administration and people selected according to Home Affairs and the use and protection of credit information act will authenticate the internet-users' identification.
5) If the internet-users obey this act, their comments on websites will be eliminated and they will no longer update their ideas on the internet websites."
2.Public Election Act, the 261 number 1(In 2004)
"Unless the internet press take any step, the press will be punished with 10 million won penalty."
3.Public Election Act, the 82 number 6(In 2005)
"1)If the internet-users want to update their comments a bout election on websites or cyber bulletin boards, they have to authenticate their identification, including their real name and registration number.
2)This act might be applied to websites that candidates make but since in this case it's just informal form one can avoid authenticating process.
3)The Ministry of Government Administration and people selected according to Home Affairs and the use and protection of credit information act will authenticate the internet-users' identification.
4)Internet Press have to make system that if the internet-users authenticate their identification, "Authenticated Identification" has to be put next to the updated passage.
5)A passage without appearance of "Authenticated Identification" has to be eliminated."
4.Public Election Act, the 261 number 1(In 2005)
"Unless the internet press take any step, the press will be punished with 10 million won penalty."
"If the internet press don't eliminate a passage without "Authenticated Identification", they have to pay 3 million won penalty."
5. According to the law, the real-name system violates the freedom of expression, especially freedom of political expression.
6. According to the law, the real-system violates the internet press's freedom of expression and damage their business.
7. Public Election Act ,the 8 number 5
"Internet press is as similar as normal press. It has same right as normal press"
Final thoughts : It was really interesting source since I didn't know the constitutional controversy about the real-name system. In the next research I will move on to research about inefficiency of the real-name system.
1)If the internet-users want to update their comments a bout election on websites or cyber bulletin boards, they have to authenticate their identification, including their real name and registration number.
2)This act might be applied to websites that candidates make but since in this case it's just informal form one can avoid authenticating process.
3,4)The Ministry of Government Administration and people selected according to Home Affairs and the use and protection of credit information act will authenticate the internet-users' identification.
5) If the internet-users obey this act, their comments on websites will be eliminated and they will no longer update their ideas on the internet websites."
2.Public Election Act, the 261 number 1(In 2004)
"Unless the internet press take any step, the press will be punished with 10 million won penalty."
3.Public Election Act, the 82 number 6(In 2005)
"1)If the internet-users want to update their comments a bout election on websites or cyber bulletin boards, they have to authenticate their identification, including their real name and registration number.
2)This act might be applied to websites that candidates make but since in this case it's just informal form one can avoid authenticating process.
3)The Ministry of Government Administration and people selected according to Home Affairs and the use and protection of credit information act will authenticate the internet-users' identification.
4)Internet Press have to make system that if the internet-users authenticate their identification, "Authenticated Identification" has to be put next to the updated passage.
5)A passage without appearance of "Authenticated Identification" has to be eliminated."
4.Public Election Act, the 261 number 1(In 2005)
"Unless the internet press take any step, the press will be punished with 10 million won penalty."
"If the internet press don't eliminate a passage without "Authenticated Identification", they have to pay 3 million won penalty."
5. According to the law, the real-name system violates the freedom of expression, especially freedom of political expression.
6. According to the law, the real-system violates the internet press's freedom of expression and damage their business.
7. Public Election Act ,the 8 number 5
"Internet press is as similar as normal press. It has same right as normal press"
Final thoughts : It was really interesting source since I didn't know the constitutional controversy about the real-name system. In the next research I will move on to research about inefficiency of the real-name system.
Research 1 :10/23 What is real-name system?
1) Sources :
http://en.wikipedia.org/wiki/Real-name_system
http://en.wikipedia.org/wiki/Real-name_system
http://terms.naver.com/entry.nhn?docId=1222575&cid=40942&categoryId=32854
2) My Topic :
Real-name system is a system that once exerted in Korea to reduce cyber problems by forcing internet- users to certify their real identities.
3) What I hope to learn from this source:
I hope these sources can make me know accurately about what the real-name system is.
4) Notes :
1. A real-name system is a system in which when a user who wants to
register an account on a blog, website or bulletin board
system, is required to offer identification credentials(Credential is a kind of personal information) including their
legal name to the network service centre.
2. Korea had exerted this system before. This system had been first specified in <Public Election and Election Malpractice Prevention Act>.
3. South Korea was the first country that implemented this system.
4. Since June 28, 2009, thirty-five Korean websites have implemented a name-registration system pursuant to the newly amended Information and Communications Network Act of Korea.
5. The Information and Communications Network Act was enacted after the suicide of Choi Jin-si
l which was said to be related to malicious comments about her on Internet bulletin boards.
6. As a result, the so-called "Choi Jin-sil Law", under the deceased celebrity's name, is to be discarded. Until then, websites with more than 100 thousand visitors per day required users to authenticate their identities by entering their ID numbers when they used portals or other sites.
7. On August 23, 2012, however, the Constitutional Court of Korea ruled unanimously that the real-name requirements imposed on big portal service providers by a relevant law[2] is unconstitutional, citing such provision's violation of freedom of speech in cyberspace.
The Constitutional Court said,
Final Thoughts : These sources are just objective sources that show what the real-name system is. On the next research, I will focus on negative aspects of real-name system.
2. Korea had exerted this system before. This system had been first specified in <Public Election and Election Malpractice Prevention Act>.
3. South Korea was the first country that implemented this system.
4. Since June 28, 2009, thirty-five Korean websites have implemented a name-registration system pursuant to the newly amended Information and Communications Network Act of Korea.
5. The Information and Communications Network Act was enacted after the suicide of Choi Jin-si
l which was said to be related to malicious comments about her on Internet bulletin boards.
6. As a result, the so-called "Choi Jin-sil Law", under the deceased celebrity's name, is to be discarded. Until then, websites with more than 100 thousand visitors per day required users to authenticate their identities by entering their ID numbers when they used portals or other sites.
7. On August 23, 2012, however, the Constitutional Court of Korea ruled unanimously that the real-name requirements imposed on big portal service providers by a relevant law[2] is unconstitutional, citing such provision's violation of freedom of speech in cyberspace.
The Constitutional Court said,
The system does not seem to have been beneficial to the public. Despite the enforcement of the system, the number of illegal or malicious postings online has not decreased. Instead, users moved to foreign Websites and the system became discriminatory against domestic operators. It also prevented foreigners who didn’t have a resident registration number here from expressing their opinions online.
Final Thoughts : These sources are just objective sources that show what the real-name system is. On the next research, I will focus on negative aspects of real-name system.
Research Proposal
1.What is my current topic?
I want to research on real-name system on cyber place. My final persuasive essay will be about the needlessness of real-name system on current Korean cyber place.
2.What are my guiding questions?
-What is real-name system?
-Why people make real-name system?
-What are inefficiencies of real-name system on cyber place?
-Why has this system been halted?
-Are there any other researches about real-name system?
-What are the opposition's ideas?
3.What are my current thoughts?
The real-name system is a system that forces internet-users to approve their actual identification before they do various things in cyber place. This system is to make more secure cyber place. However, I think that this system isn't efficient and doesn't fit into Korean cyber place.
4.What is the opposition?
The opposition will argue that the real-name system will make the cyber place safer by reducing cyber problems and they will increase credibility around internet- users.
피드 구독하기:
덧글 (Atom)