Preview

The Discussion of South Korean Network Real Name System

Powerful Essays
Open Document
Open Document
1218 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Discussion of South Korean Network Real Name System
The Discussion of South Korean Network Real Name System Abstract: The Internet is developing rapidly in recent years, but it also brings us many problems like network violence. It seems that the real name system is an ideal method to solve the problems and maintain the social stability. However, the failure of network real-name system in South Korea shows that the real-name system limits the freedom of speech and increases the risk of leaking personal information.
Key Words: Network real name system; South Korea; freedom of speech; network violence.

1. Introduction
"On the Internet, nobody knows you 're a dog" is a famous saying from The New Yorker. It illustrates the anonymity of the Internet. People can express their ideas freely through the Internet. However, it also brings some problems like rumors and network violence. Some experts put forward the idea of the real name-system which causes a heated debate among people. The South Korean government decided to implement the network real-name system in 2005. Instead of reducing the malicious slander, this system brings some bad side effects to the society.

2. Event review
South Korea is the first country which establishes network real-name system. "Because of the notorious event Dog Poop Girl which happened in June, 2005, the South Korean government decided to put the network real-name system into practice in the legislative form. In 2008, a popular Korean actress, Choi Jin Sil committed suicide after a series of online rumors and threats. This event prompted the government to expand the application range of the network real-name system." (Wei, 2012) People in South Korea have to offer their identification credentials including real name and ID to the network service center. Otherwise, they cannot use emails, post on internet forum and release resources.
South Korean network real-name system was aimed to reduce rumors and defamations, invasion of privacy,



References: Gao, Ronglin. (2012). The reflection of the abolition of the network real-name system in South Korea. Media Observer ,17-19. Wei, Wuhui. (2012). Why South Korean network real-name system went to bankruptcy? [Electronic version]. The Economic Observer. Retrieved December 22, 2013 , from: http://www.chinanews.com/gj/2013/07-03/4996506.shtml Wu, Shaoshan. (2010). Network Real Name system: confrontation between freedom and order. Theory And Reform, 133-136. Yael Onn, et al., Privacy in the Digital Environment (Haifa Center of Law & Technology, Niva Elkin-Koren, Michael Birnhack, eds., 2005)

You May Also Find These Documents Helpful

  • Good Essays

    The Domain Name System creates it likely to allocate domain terms to crowds of Internet users in an expressive way, liberated of each user's physical site. Because of this, World-Wide Web hyperlinks and Internet contact info can continue reliable and endless smooth if the present Internet direction-finding preparations change or the member uses a portable device. Internet domain names are at ease to recall than IP addresses. Persons take benefit of this once they narrate expressive URLs and e-mail addresses without having to see how the mechanism will really find them.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    LAW 723 Course Ouline

    • 3305 Words
    • 125 Pages

    Games E-­‐mail / Domain Names Internet Regulation Materials posted on McInnes Chapter Cyber warfare BlackBoard 19 SPAM / Net Neutrality Internet cont. Materials posted on McInnes Chapter Torts / Reputational Harm / BlackBoard 19 Defamation & the Net ANNOTATED BIBLIOGRAPHY DUE You must process the paper through Turnitin AND submit a hard copy into Dr. Benda’s mailbox, TRS 1, Staff Mail Room; (bottom shelf on the right, 3 from the back.) You are encouraged to submit your paper earlier. Failure to Submit the Assignment is an automatic course F or Fail.…

    • 3305 Words
    • 125 Pages
    Powerful Essays
  • Better Essays

    Since the dawn of civilization, man has sought to further communication and interaction with his fellow man. The motivation behind this pursuit has been many fold: Some sought and seek this interaction for economic purposes, some for cultural purposes, and some still for educational purposes. Regardless of the incentive, different people in different times have sought to enhance the technology so as to further this pursuit. From the advent of writing in pre-bronze age Mesopotamia to the creation of the printing press in Renaissance Germany to more modern inventions like the radio and telegraph, much of human history has been devoted to making this large world smaller and smaller and furthering our communication and interaction. In this vain, society invented the internet, possibly the most revolutionary piece of technology in human history. Like the other aforementioned innovations, the internet provided man a medium to communicate with his fellow man. Yet, the internet furthered the pursuit of shrinking the world so much that thanks to it, physical distance is a small hindrance in the free exchange of ideas and opinions. One of the major disciplines constructing internet based communication is social networking. During the recent years, social networking has been the victim of ethical issues concerning vigilance and safeguard of privacy for the members and their personal data. The invasion of personal information is a cause of distress for many individuals and organizations. Moreover, it has become an issue that requires constant effort from the concerned parties who are striving to create a safe and comfortable environment for everyone to communicate on these social sites. During the course of this paper some ethical issues regarding the social networking sites such as Facebook will be discussed and the decision making process will be implemented to explore alternatives and implement the solutions.…

    • 1126 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Children and young people can be in danger when they use technology such as internet which can present a threat to their safety. The internet is a powerful source of technology which is sometimes dangerous for children and young people to use because there are many different kinds of people on networking sites that don’t show their identity.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Internet is defined as "A global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols". The modern world is connected and supported by the use of the internet, it has become a dependent tool in the workplace, an essential key to sourcing information and sharing it. In some cases, the internet can become subject to misuse by individuals.…

    • 1321 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Humanities Course Paper

    • 1596 Words
    • 7 Pages

    Smith, R. J. (2010). How the internet has evolved in the past 10 years. Retrieved November 14, 2012 from…

    • 1596 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Boyd challenges Zhuo because she argues that there should still be anonymity while Zhuo disagrees that anonymity should be stopped. Both authors find their own position of online incivility is an invasion of privacy. Zhuo argues that anonymity invades people’s privacy through trolling. She includes a case of Nicole Catsouras who died in a car accident, then anonymous trolls “set up fake tribute pages” and even sent pictures to her parents with the subject titled “‘Hey, Daddy, I’m still alive’” (para 5). The online trolls not only invades the girl’s privacy, but also her parents as well. Boyd challenges when she adds a woman’s experience of using real names resulted in her coworkers invading her privacy or people track her from being online (para. 2). Because the woman had her named revealed online, Boyd argues that real names put her safety in danger, which counters Zhuo’s…

    • 2069 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Good Internet Censorship

    • 2008 Words
    • 9 Pages

    Tsui, L., 2003. The panopticon as the antithesis of a space of feedom: Control and regulation of the Internet in China. Chinese Information, 17(2), pp. 65-82.…

    • 2008 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    On-line social community is a medium that allow people to connect with their friends and share information, it is a way of networking but it is a social based relationship among its users. People join the social community by creating personal profile which can be set to private or made public, this network is primarily to connect with friends and share information ranging from photos, videos, comments, contact details, etc. However, many users have made their details public without carefully considering the consequence, hence; the on-line social communities have become a danger zone where people fear to tread on due to privacy policies being breached.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    In “Douse the Online Flamers” Andrew Keen writes about individuals who choose to hide behind a façade in cyber crime. He goes on to speak of the unlawful acts inflicted upon innocent individuals of cyber space. Keen reflects on three major cases where cyber criminals are protected under the freedom of speech act while the innocent are left vulnerable. In all three cases, the judges failed the victims of unidentified slander. In his article, Keen forcefully expresses his opinion on why he believes we, as Americans, should take a stand against the anonymity of today’s internet tormenters because too many innocent lives are destroyed due to the cruel intentions of anonymous speech.…

    • 428 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The universe of brands was strongly impacted for soon 15 years by the development of the Internet, through the emergence of domain names.…

    • 2165 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    cyber crime

    • 6338 Words
    • 26 Pages

    Bibliography: FAQ: The Anti-cyber squatting Consumer Protection Act, by Richard Keyt, April 20, 2001, Keyt Law:…

    • 6338 Words
    • 26 Pages
    Powerful Essays
  • Good Essays

    Rep. of Korea is one of those best e-government services providing countries in the world with the vision of “The world’s best digital government for the people”. Korea ranked first among all UN member countries in 2010 and 2012 in the "e-Government Development Index" and "e-Government Participation Index" of the United Nations e-Government assessment. And by 2006, Rep. of Korea established 100% of government services online.…

    • 1390 Words
    • 6 Pages
    Good Essays
  • Good Essays

    In public life communication technology serve more advantages than disadvantages. We can find friends through social media or online game sites, we can even find suitable partner through dating sites. The disadvantages are that people can provide false information and exploit the advantages of social media on people public life and cause misunderstanding, loss of properties or sometimes even lives. In private life, the disadvantages are more than the advantages. The advantages are that we can communicate and stay connected with our family or friends online, but it is also easy for hackers to access our personal profile online. Many cases have been reported that…

    • 1087 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Uses of Internet

    • 9531 Words
    • 39 Pages

    This article is about the public worldwide computer network system. For other uses, see Internet (disambiguation).…

    • 9531 Words
    • 39 Pages
    Powerful Essays