• Title/Summary/Keyword: 사적 네트워크

Search Result 32, Processing Time 0.023 seconds

A Development Direction of Information Security Technology for IT839 Strategies (IT839 전략 추진을 위한 정보보호 기술개발 방향)

  • Seo, D.I.;Kim, K.S.;Jang, J.S.;Sohn, S.W.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.1-8
    • /
    • 2005
  • 세계 최고의 정보통신 인프라를 바탕으로 다져온 정보통신 강국의 위상은 IT839 전략을 통해 유비쿼터스 및 컨버전스로의 진행이 가속화되고 있다. 특히, 광대역 통합망의 구축을 통해 이종망간 끊김없는 멀티미디어 서비스 제공이 가능해짐에 따라 언제, 어디서나, 누구든지 편리하게 이용할 수 있는 환경으로진화 발전되고 있다. 이는 곧 개인의 사적인 정보들과 공적인 정보들이 네트워크를 통하여 유통된다는것을 의미하며, 이러한 정보들에 대한 보호 활동은 그 무엇보다도 중요해질 것이다. 본 기고문에서는 IT839 전략 추진에 따른 정보보호 환경을 분석하여 보고, 향후 중점적으로 개발하여야 할 정보보호 기술의 개발 방향을 살펴본다.

특허 분쟁 사례를 통한 기업 경영과 특허 전략

  • Park, Seong-Taek;Lee, Seung-Jun;Kim, Yeong-Gi
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.299-309
    • /
    • 2006
  • 현대의 정보시스템은 법의 존재와 사적, 지식 재산권을 보호하는 사회적 관습과 심각하게 대립해 왔다. 지식재산권은 개인이나 사회에 의해 만들어진 무형의 자산이다. 정보 기술은 컴퓨터화 된 정보가 매우 쉽게 복사되거나 네트워크에서 배포될 수 있도록 만들어졌기 때문에 지식재산권 보호를 어렵게 만들었다. 그리하여 오늘에는 선진국뿐만 아니라 전 세계 국가들이 특허제도를 갖추고 발명자를 독점적으로 보호하는 한편, 일반인들을 위해서 발명의 공개와 이용을 장려하게 되었다. 오늘날 특허나 컴퓨터 프로그램 등의 지식재산권의 무기화 경향은 세계적으로 확산됨에 따라 수출 주도형 성장 전략을 택해온 한국의 주력 기업들에게는 단순한 문제가 아닌 기업의 사활이 걸린 문제로 번져가고 있다. 우리나라는 선진국에 비하여 아직 특허에 대한 역사가 짧고 그 내용이 뒤떨어진다 할 수 있다. 본 연구에서는 기업과 개인은 특허에 대한 정확한 이해와 대응 방안에 대한 정보를 체계적으로 정리함으로써 발명을 충분히 활용하고, 외국과의 권리 경쟁에서 전략적으로 대처할 수 있어야 할 것이다. 국제 특허 분쟁 사례를 조사함으로써 기업 경영 전략을 수립하는데 도움을 주고자 한다

  • PDF

A Qualitative Case Study on the Development of Network as Communities of Practice in Welfare Network of S District in Seoul, Korea (실천공동체로서의 네트워크 발달에 대한 질적 사례연구 : 서울시 S구 재가복지연합회 사례를 중심으로)

  • Kim, Young-Sook;Lim, Hyo-Yeon
    • Korean Journal of Social Welfare
    • /
    • v.62 no.3
    • /
    • pp.299-321
    • /
    • 2010
  • The purpose of this study was to analyze the development of social welfare network. The qualitative case study method was utilized from a communities of practice perspective. Depth interviews were conducted among 10 social workers of community welfare agencies who have practiced network activities. Data were analyzed with constant-comparative methods(Strauss and Corbin(1990)). The result are the followings; In incubation stage, the core theme was "collaboration for surmount overcoming difficulties from the bottom". In intergration stage, "acquirement of normative value basement" was emerged. "Reinforcement of solidarity" and "reconfirmation of identity" were drawn as core themes in muturation stage. There were core themes "construction of original image" and "shifting from private connection to public connection" in maintenance stage. Lastly stage a care theme of "qualitative transition" was emerged in transformation.

  • PDF

A Study on the License Management Model for Secure Contents Distribution in Ubiquitous Environment (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.550-558
    • /
    • 2009
  • In ubiquitous environment, more small, lightweight, cheap and movable device is used than one device used in wired network environment. Multimedia service which is anytime, anywhere, is provided by device. However, it does not ensure the fair use of multimedia contents and causes damage to the contents providers because of illegal copy and distribution and indiscriminate use of digital contents. For solving this problems, DRM is applied to wired network but it has the problems does not protect stored license and manage license completely because of depending on simple protection such as device authentication and cryptographic algorithm. This paper proposes the license management model using digital forensic and DRM that prevents contents and licenses from distributing illegally and also enables the creation of evidence for legal countermeasure and the protection of license in whole life cycle.

  • PDF

A Study on the Structure and Characteristics of Social Games (소셜 게임의 구조와 특징에 대한 연구)

  • Jeon, Gyong-Ran
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.13-22
    • /
    • 2011
  • In the digital media environment, the convergence is in the progress creating the new service and contents by users and developing the new needs of users by the service and contents as well. Social games are actualizing the new meaning of convergence. shows not only a new situation blurring the boundary of work and leisure, labor and playing and private and public sector, but how meaningful it is to make connection of social interactions and social assets a solid network. As the most popular social game text, reveals how the personal connections and personal networks constructs the social capital by making the ritual communication more interesting and flexible to the social gamers.

Curatorial Methods of Net Art (넷아트 큐레토리얼 방법론)

  • Lim, Shan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.155-160
    • /
    • 2022
  • This paper intends to focus on the practical activities and historical significance of network art, that is, 'net art' as an artistic form that depends on network technology. This is because the appearance of net art, which constructs a new interactive art that cooperates and exchanges with each other beyond the boundaries of time and space, can be a contemporary alternative in overcoming the limitations of traditional art. Another important research area to be considered in this paper is net art curating, as well as considering the significance of net art in art history. As new media art that is defined as a 'process' rather than a complete object, net art is a digital art that requires functions such as aesthetic appropriation, dissemination, and mediation performed online, unlike physical presentations with high perfection in exhibition halls. It is accompanied by a new social and cultural curatorial. This appearance requires both artists and curators to reorganize the strategy that net art curating in technoculture should have. Therefore, this paper attempts to question the creative strategies of net art in the wave of globalization in the 21st century, and to examine the artistic meaning and critical value of the experimental net art curatorial method that emerged through the realm of new technology and media. For this purpose, this paper demonstrated key examples of net art works and exhibition projects that started with Fluxus in the 1960s and are spreading all over the world in the 2000s.

Study on Life History of an Elderly Female North Korean Defector (북한이탈여성의 생애사 연구)

  • Yang, Min-Sook;Lee, Dong-Hun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.10
    • /
    • pp.120-139
    • /
    • 2017
  • The purpose of this research was to explore life history of an elderly woman who fled from North Korea and to understand and provide interventions for female North Korean Defector. The participant of this research is an 81-year-old woman who escaped from North Korea and has lived in South Korea for over 14 years. This life history study followed the analysis of Mandel baum(1973) pointing three perspectives of life: dimensions, turnings, and adaptations. This study concluded that the participant of the research study had no protection while staying in China and North Korea and had experience of Homo Sacer. And even after arriving to South Korea the participant had to live her life with the past negative experiences in North Korea and China. Based on the research results discussions and implications were suggested.

Epistemological Study of the Spatial Experience by Use of Mobile Wearable Device (모바일 웨어러블 디바이스에 의한 공간경험의 인식론적 연구)

  • Cho, Byung Chul
    • Journal of Broadcast Engineering
    • /
    • v.21 no.5
    • /
    • pp.704-713
    • /
    • 2016
  • Recently, the value and the status of the body that are due to the mobile wearable device have attracted attention globally confusing in media convergence age. The mobile wearable device connect worldwide that are networked to overcome the limitations of space and time, also it provide a great opportunity to be able to us to open a new cultural experience and value to the populace. In this study, spatial information acquired by the virtual reality 360 degrees camera around the Gangnam station. Also, extended spatial experience performed by use of virtual reality headset, smart phone connected to the Youtube platform. Sense of body can also lose its value due to voyeurism, it is facing the transformational period in civilization. In conclusion, through deep research into the intersections of technology and a human being for the future, maintaining the proper balance is the key. Therefore, this study identified the need for interdisciplinary research.

USN Secure Communication Design Using Chaotic System Feedback Synchronization (혼돈계의 피드백 동기화를 이용한 USN 보안통신 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1011-1016
    • /
    • 2018
  • Ubiquitous services for the convenience and safety of human beings along with the development of society are being realized through RFID technology and sensor network, and its application range of fields is also broaden. However, since the USN contains all the information of individuals and things, all of its private spaces can be attacked by external attacks; so, that the problem of security continues to arise. We designed a one-way chaotic feedback synchronization method as a secure communication method to fit the USN composed of one sync node and n number of sensor nodes. We designed the method by which the sensor node is synchronized in one direction of the sync node. This method solves the problem that all sensor nodes need to be resynchronized when the sync node is changed, which is shown in bidirectional synchronization. This is a security method that can be effectively applied to 1:n communication such as USN.

Development of IoT Device Management System Using Blockchain DPoS Consensus Algorithm (블록체인 DPoS 합의 알고리즘을 활용한 IoT 장치 관리 시스템 개발)

  • Kim, Mihui;Kim, Youngmin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.508-516
    • /
    • 2019
  • Smart home with various IoT devices provides convenient and efficient services. However, security is important because sensitive information such as private video and audio can be collected and processed, as well as shared over the Internet. To manage such smart home IoT devices, we use blockchain technology that provides data integrity and secure management. In this paper, we utilize a PoS(Proof of Stake) method that verifies the block through the accumulated stake in the network rather than the computation power, out of the PoW(Proof of Work) block chain, in which the computation for the existing verification must be continuously performed. Among them, we propose a blockchain based system with DPoS(Delegated Proof of Stake) method to actively solve the scalability part, for security that is suitable for smart home IoT environment. We implement the proposed system with DPoS based EOSIO to show realization, and we show performance improvement in terms of transaction processing speed.