Skip to main content

and
  1. No Access

    Article

    Aksumite Settlement Patterns: Site Size Hierarchies and Spatial Clustering

    Settlement pattern analysis offers a range of insights about social, economic, and political relationships of Aksumite civilization. Two common approaches involve analyzing site size distributions and the spat...

    Michael J. Harrower, Joseph C. Mazzariello in Journal of Archaeological Research (2023)

  2. No Access

    Article

    Identification of future signal based on the quantitative and qualitative text mining: a case study on ethical issues in artificial intelligence

    To foresee the advent of new technologies and their socio-economic impact is a necessity for academia, governments and private enterprises as well. In the future studies, the identification of future signal is...

    Young-Joo Lee, Ji-Young Park in Quality & Quantity (2018)

  3. No Access

    Chapter

    Unmarked Plurality and Specificity in Korean and Japanese Plural Nouns: A Preliminary Study

    This study examines the plural suffixes of Korean –tul and Japanese –tachi. In the two languages, countable nouns do not have to be obligatorily marked for plurality despite the existence of plural markers. It is...

    Kiri Lee, Young-mee Yu Cho, Min-Young Park in International Perspectives on Translation,… (2018)

  4. No Access

    Article

    Longitudinal dynamics of the cultural diffusion of Kpop on YouTube

    This study takes a longitudinal perspective towards the early stage of social-media-based cultural diffusion. Based on the case of Korean artist Psy’s viral video Gangnam Style, the study reveals the temporal cha...

    Weiai Wayne Xu, Ji-young Park, Han Woo Park in Quality & Quantity (2017)

  5. No Access

    Article

    Estimating the Prevalence Rate of Child Physical and Psychological Maltreatment in South Korea

    In Korea, an amendment to the Child Welfare Act was made in 2008 that required a national study estimating the occurrence rate of child abuse and neglect every 5 years. The present study reports the major find...

    Jae** Ahn, Bong Joo Lee, Sang Kyoung Kahng, Hye Lan Kim in Child Indicators Research (2017)

  6. No Access

    Chapter and Conference Paper

    An E-mail Monitoring System for Detecting Outflow of Confidential Documents

    E-mails are widely used communication tool with their convenience and efficiency. In spite of their usefulness, they are difficult to control in that e-mails are easily used as outflow path of confidential doc...

    Bogju Lee, Youna Park in Intelligence and Security Informatics (2003)