• Title/Summary/Keyword: Digital Access Paradigm

Search Result 39, Processing Time 0.021 seconds

Design and Implementation of User Location-based N-Screen Service System (사용자 위치 인식 기반 맞춤형 N-Screen Service 시스템 설계 및 구현)

  • Kim, Jung Jae;Ryu, Min Woo;Cha, Si Ho;Cho, Kuk Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.139-146
    • /
    • 2014
  • Through numerous mobile device technology advances, various multimedia contents is moving towards mobile devices from existing personal computer (PC). These paradigm has emerged taking into account these idea, the so-called N-Screen, N-Screen is user-centric service to provide running and sharing on everywhere via advanced smart system in C-P-N-T (Content, Platform, Network, Terminal). Therefore we must provide securing of various contents, openended platform, and user-centric service for efficient N-Screen service. For These characteristic of N-Screen, this paper propose design and implementation of user location-based N-Screen service system. The proposed system realize user location through user's smart phone and offer automatic streaming service to user. And also, we provide web service-based extended N-Screen service. Thus, user can access various device, such as laptop, tablet, and mobile device.

A Study on Designing Method of Framework for NGN QoS Management (NGN 운용과정의 QoS 관리를 위한 프레임워크 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.101-107
    • /
    • 2008
  • The level of transference of NGN is beginning as the operation of Access Gateway in korea at present, but NGN will keep developing continuously to the NGN integrated network until 2010. This research is finding the meaning and assignment of NGN QoS to deduct how to manage the control system and presenting the QoS control process and trial framework. The trial framework is the modeling of the QoS measurement metrics, the measurement time schedule, the section, hierarchy, instrument, equipment and method of measurement and the series of cycle & the methodology about analysis of the result of measurement. The objective standard of quality in communication service is guaranteed not by itself but by controlling and measuring continuously. Especially it's very important time to maintain the research about NGN QoS measurement and control because the big conversion of new network technology paradigm is now spreading.

  • PDF

A Design of Certificate Management Method for Secure Access Control in IoT-based Cloud Convergence Environment (IoT기반 클라우드 융합환경에서 안전한 접근제어를 위한 인증서 관리기법 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.7-13
    • /
    • 2020
  • IoT which is the core IT of the 4th industrial revolution, is providing various services from users in the conversion with other industries. The IoT convergence technology is leading the communication paradigm of communication environment in accordance with the increase of convenience for users. However, it is urgently needed to establish the security measures for the rapidly-developing IoT convergence technology. As IoT is closely related to digital ethics and personal information protection, other industries should establish the measures for coping with threatening elements in accordance with the introduction of IoT. In case when security incidents occur, there could be diverse problems such as information leakage, damage to image, monetary loss, and casualty. Thus, this paper suggests a certificate management technique for safe control over access in IoT-based Cloud convergence environment. This thesis designed the device/user registration, message communication protocol, and device renewal/management technique. On top of performing the analysis on safety in accordance with attack technique and vulnerability, in the results of conducting the evaluation of efficiency compared to the existing PKI-based certificate management technique, it showed about 32% decreased value.

A Study on the Behavior of the User according to the Distribution Development of Online Travel Agency

  • MIN, So-Ra;LEE, Sun-Mi
    • Journal of Distribution Science
    • /
    • v.18 no.6
    • /
    • pp.25-35
    • /
    • 2020
  • Purpose:Travel agencies have use digital tools in order to shift the paradigm in how business is conducted. Online travel agencies provide the same services as a normal travel agency, including hotels, transportation, guided tours, reservations, and related services, but using an "online platform. Travelers planning a trip can use a lot of forms to collect information and have access to a larger amount of information, so the factors that influence the user's behavioral intention are very important. This research has the conducted to find what factors lead to the attitudes of consumers in using OTA using the UTAUT model. Research design, data and methodology: The object of this study were respondents of a google survey using convenient sample extraction method, chosen among consumers who gathered information, or purchased a product. A total of 217 of the 235 questionnaires Google survey answered were used in the final analysis, excluding insincere responses. Using PSS v.21 and AMOS v.21, frequency analysis, feasibility and reliability analysis, path analysis was performed. Results: UTAUT affects OTA use satisfaction and trust, and OTA satisfaction and trust affect behavior intention. Conclusions: Research was conducted using the UTAUT model to explore factors that affect the attitudes of users of online travel agencies (OTA).

Case Study on User-Participatory Internet Advertising -Focused on the Game-Like Internet Banner Advertising (사용자 참여적 인터넷 광고의 사례연구 -게임성향 배너광고를 중심으로)

  • Seo, Mi-Ra
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.505-510
    • /
    • 2012
  • As games have been used throughout the advertisement design in diverse ways, the paradigm of the internet advertising has also been changed. At the same time, there has been a growing tendency among companies to maximize the purpose of advertising by using game-like internet banner advertising, which provides internet-users with the information of the advertisements by exposing specific information, brands, characters, or image. In spite of the quantitative expansion of the game-like internet banner ads, according to a survey with regard to their click-through rate(CTR), the result indicates the CTR is less than 0.5%. Therefore, this study aims to examine what types of displaying elements of the game-like banner ads gaining in popularity can leave the users with a strong impression, and also to explore what types of displaying elements need to be highlighted for the users' active and aggressive access to internet banner advertisements. Currently advertised game-like banner ads on the internet web sites in different fields are selected. Then, they are analyzed by using seven categories. The findings are expected to lay out systematic and practical guidelines for the future production of game-like banner ads.

A Study on Establishing a Strategy Model Through Analyzing Cases of Digitization of Photographs (사진기록의 디지털화 사례분석과 전략모델 제안에 관한 연구)

  • Kim, Jang-Hwan;Park, Ju-Seok
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.1
    • /
    • pp.121-150
    • /
    • 2009
  • This study reconfigures meanings of photographs for appearing of visual culture paradigm. By this, a strategy model for digitization could establish which needs when photographs are digitized. A strategy model for digitization is based on essential issues when digitized. Also, applying the project life-cycle and digitization chain model, the processes are suggested as a general reference model. Broadly, Three steps, Pre-project step, Production step, Post-project step, are divided and Specifically, Four steps, (1) Establishment and management of the whole project plans (2) Selecting the target for the digitization of photographs (3) Digital Conversion and Quality Control (4) Preservation and access, are separated. Substantial digitization strategy of photographs is built based on chain model of digitization to guarantee qualities of creating digital objects. Each step is constituted with basic processes, details and checklists.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Design of the Network Computer Architecture based on a Web Browser (웹 브라우저 기반의 네트워크 컴퓨터 아키텍쳐 설계)

  • Song, Min-Gyu
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.607-616
    • /
    • 2008
  • By the advancement of computer & network technology, the paridigm of 'Network Computer' has been realizing`. In what is called network computer, computer system and computing resource is incomparably seem to be expanded compared with conventional network technology[1]. Network connected computer system consitute a massive virtual computer, it is possible for people to use an enourmous amout of computing resource distributed widely through the network. It is also possible that we make client lightweight by the use of computer system & all shared computing resources on the network in our computer processing and we call this type of client system as thin-client. Thin-client and network computer are on and the same network paradigm in that both paradigm featuring the active use of computer system and resource on the network[2]. In network computer paragem, network itself is regarded as a basic platform for the transfer of application, so it is possible that client access remote serve system to run remote applications through the network[3]. In this paper, we propose the system architecture for the implementation of network computer by the use of Web browser, X window system and Pyjamas. By the use of network computer proposed in this paper, it is possible for people to run application on the server system as if he run local application, and it is expected to improve the security and maintenance efficiency.

  • PDF

A Study on the Improvement of Public Cloud Technology and Policy (공공 클라우드 기술과 정책의 개선방안에 대한 연구)

  • Kim, So Hui;Lee, Yu Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.11-20
    • /
    • 2021
  • Due to the Covid-19 Pandemic, the world is facing the most serious crisis since the Great Depression, and is facing a new paradigm of the Untact era. Korea has also announced various policies and legal systems, including the 'Korean version of the New Deal', but it is conflicting between the use of information and the protection of information. In this paper, we derive thresholds by analyzing policies, statutes and technologies in the public cloud. Based on this, we propose to introduce the "Building a Nationwide Public Virtual Machine" as a key task to secure the next-generation national growth engine so that all citizens can use digital services in a secure and reliable environment with equal access to information. Through this, all citizens can use various digital new technology services only with low-priced and low-specification terminals, and by establishing a dedicated center for information protection, we want to respond to rapidly increasing security threats. It also points out that the domestic cloud-related legal system only emphasizes the use of information while overlooking the importance of security, and suggests the right direction for the legal system to move forward.

A Case Study on Classification System Design for Public Sector Information Typology (공공데이터 유형화를 위한 분류체계 설계에 관한 사례 연구 -미래창조과학부 산하기관의 공공데이터를 중심으로-)

  • Kim, Dae-Gi;Joo, Won-Kyun;Kim, Eunjin;Lee, Yong-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.51-68
    • /
    • 2014
  • Today's public sector information is considered an important national asset that has social and economic value. Hence, developed countries are competitively promoting various policies to actively promote access to public sector information and the use of such information for private purposes. The Korean government is also boosting the Government 3.0 policy as a new governmental management paradigm that supports the creative economy. Despite these governmental efforts, since open public sector information is only classified from the supplier's perspective, it is difficult to have access to information for private application from the consumer's perspective and expand private applications because of the problems in identifying the information source. In this study, the concept of data from the user's perspective for the activation of private applications was defined by focusing on public sector information obtained by affiliated organizations of the Ministry of Science, ICT and Future Planning(MSIP). The new classification system was designed by analyzing the classification system of conventional open services of public sector information through investigation.