우리말 통신언어의 생성방법에 대한 연구
저자
발행사항
순천시 : 순천대학교, 2010
학위논문사항
학위논문(석사)-- 순천대학교 교육대학원 : 국어교육전공 2010.02
발행연도
2010
작성언어
한국어
KDC
714 판사항(4)
발행국(도시)
전라남도
기타서명
(A) Study on Word-formation Patterns in the Korean Cyber Language
형태사항
vi, 79 장 ; 26 cm.
일반주기명
부록: 생성방법을 기준으로 한 자료분석 결과.
참고문헌: 장 71-77
소장기관
The purpose of this study is to offer a description of the word formation patterns of Korean cyber language. As the cyber environment is developed, the range of cyber language widens. This study highlights the word formation patterns of cyber language as a basis to describe the aforementioned language, which is expected to show complex development; The study was also begun to help identify the synchronic speaker's word formation patterns.
This study was carried out with 8,836 words as targets, comprising terms from two dictionaries of cyber language as well as from material collected by the author from the internet. The method of study was as follows: Through a primary examination of the above-mentioned material, a hypothetical system of word formation patterns was set forth, and based on the hypothetical system, the rest of the material was examined closely, leading to evaluation of the hypothesis.
Before exploring the word formation patterns of cyber language, in chapter 2 the concept and the properties of cyber language were clarified. First of all, the concept was divided into two types: the broader sense and the narrower sense. The broader concept was defined as "all spoken or written language used for communication in a cyber environment" and the narrow sense, as subject of linguistic works, The definition of "From among written language used for communication in a cyber environment, terms that were phonologically or morphologically transformed, neologism coined on the cyber platform, terms with new meanings put upon them through cyber communications" was used.
The characteristics of cyber language were presented as: duality, non-confrontation, economicality, and popularity. Duality defines cyber language as possessing elements of both written language and spoken language. Non-confrontation is a refined version of the term ‘anonymity’, which means communication in a cyber environment is made without speaking face-to-face. popularity means that cyber language is fun, simple, used by many people, user-friendly, and pursues unique expressions that depart from daily life. ‘economicality’ is a concept that encompasses market economy and linguistic economy; It means such phenomena as: the abbreviation and disregard for word spacing in cellular phones, and the formation of cyber language in the direction of reducing keyboard input.
In chapter 3, the key topic of word formation patterns of cyber language was addressed, based on the concept and characteristics presented in chapter 2. For this, the primary material of cyber language collected beforehand was examined, to set eight hypotheses of word formation patterns: fusion, extraction, compound, derivation, blending, shift, variation, and symbol. In each hypothesis, details were explored along with examples.
As in ‘myan(??)←mi-an(미안)’, ‘seol(설)←seoul(서울)’, ‘eoke(어케)←eo-tteo-ke(어떻게)’, fusion is defined as a pattern of restructuring existing words and creating abbreviated words through reduction and omission. Here, to restructure means to deconstruct the form of the original word and break down the boundaries between syllables. Extraction is an additional way of generating abbreviated words in a cyber environment, defined as a pattern of putting together either parts, or phonemes or syllables of the forms of existing words, phrases and sentence. Compound refers to a pattern of creating new words based on the combination of two or more word bases. Derivation refers to the creation of new words combining word base and suffixes, or word formation elements. As in ‘jummatainer(줌마테이너)’, a mixture of ‘ajumma(아줌마)’ and ‘entertainer(엔터테이너)’, blending refers to a method of forming new meanings and new morphology from combination of parts of two words. One of the characteristics of blending is that in the mixing process, clipping is made. Shift means a pattern of using existing words with changed meaning, retaining unchanged forms, based in similarities of meanings of existing words and phenomena in a cyber environment. Variation is defined as a pattern of replacing or adding phonemes to basic word forms for variation in the taste of the words. In variation forms, if all of the relevant forms possess a common semantic unit, they should possess a single form, but in a cyber environment, each form is spelled differently; This has turned out to be because of dependence on function. Symbol is a pattern in which words imitate phonemic signs of audio or visual images in a rather inevitable relationship. Along with variation, this is a necessary tool for communicating non-linguistic elements. Symbols are not formed based on existing words like other generative methods for cyber language, but are formed by themselves; thus a separate fundamental signification process must be set forth for this method, which uses natural voice and not transformation, reduction or combination of existing words.
Above, I presented each word formation pattern of cyber language in a separate category. However, in the formation of actual cyber language, these methods applied in combination. In the formation of cyber language, environmental concerns as well as linguistic formative process were also influencing factors.
In chapter 4, an overall summary of this study was made, and a brief mention was made of the limits of this study's scope as well as future directions to be hoped.
서지정보 내보내기(Export)
닫기소장기관 정보
닫기권호소장정보
닫기오류접수
닫기오류 접수 확인
닫기음성서비스 신청
닫기음성서비스 신청 확인
닫기이용약관
닫기학술연구정보서비스 이용약관 (2017년 1월 1일 ~ 현재 적용)
학술연구정보서비스(이하 RISS)는 정보주체의 자유와 권리 보호를 위해 「개인정보 보호법」 및 관계 법령이 정한 바를 준수하여, 적법하게 개인정보를 처리하고 안전하게 관리하고 있습니다. 이에 「개인정보 보호법」 제30조에 따라 정보주체에게 개인정보 처리에 관한 절차 및 기준을 안내하고, 이와 관련한 고충을 신속하고 원활하게 처리할 수 있도록 하기 위하여 다음과 같이 개인정보 처리방침을 수립·공개합니다.
주요 개인정보 처리 표시(라벨링)
목 차
3년
또는 회원탈퇴시까지5년
(「전자상거래 등에서의 소비자보호에 관한3년
(「전자상거래 등에서의 소비자보호에 관한2년
이상(개인정보보호위원회 : 개인정보의 안전성 확보조치 기준)개인정보파일의 명칭 | 운영근거 / 처리목적 | 개인정보파일에 기록되는 개인정보의 항목 | 보유기간 | |
---|---|---|---|---|
학술연구정보서비스 이용자 가입정보 파일 | 한국교육학술정보원법 | 필수 | ID, 비밀번호, 성명, 생년월일, 신분(직업구분), 이메일, 소속분야, 웹진메일 수신동의 여부 | 3년 또는 탈퇴시 |
선택 | 소속기관명, 소속도서관명, 학과/부서명, 학번/직원번호, 휴대전화, 주소 |
구분 | 담당자 | 연락처 |
---|---|---|
KERIS 개인정보 보호책임자 | 정보보호본부 김태우 | - 이메일 : lsy@keris.or.kr - 전화번호 : 053-714-0439 - 팩스번호 : 053-714-0195 |
KERIS 개인정보 보호담당자 | 개인정보보호부 이상엽 | |
RISS 개인정보 보호책임자 | 대학학술본부 장금연 | - 이메일 : giltizen@keris.or.kr - 전화번호 : 053-714-0149 - 팩스번호 : 053-714-0194 |
RISS 개인정보 보호담당자 | 학술진흥부 길원진 |
자동로그아웃 안내
닫기인증오류 안내
닫기귀하께서는 휴면계정 전환 후 1년동안 회원정보 수집 및 이용에 대한
재동의를 하지 않으신 관계로 개인정보가 삭제되었습니다.
(참조 : RISS 이용약관 및 개인정보처리방침)
신규회원으로 가입하여 이용 부탁 드리며, 추가 문의는 고객센터로 연락 바랍니다.
- 기존 아이디 재사용 불가
휴면계정 안내
RISS는 [표준개인정보 보호지침]에 따라 2년을 주기로 개인정보 수집·이용에 관하여 (재)동의를 받고 있으며, (재)동의를 하지 않을 경우, 휴면계정으로 전환됩니다.
(※ 휴면계정은 원문이용 및 복사/대출 서비스를 이용할 수 없습니다.)
휴면계정으로 전환된 후 1년간 회원정보 수집·이용에 대한 재동의를 하지 않을 경우, RISS에서 자동탈퇴 및 개인정보가 삭제처리 됩니다.
고객센터 1599-3122
ARS번호+1번(회원가입 및 정보수정)