• Title/Summary/Keyword: Game Security

Search Result 252, Processing Time 0.028 seconds

Analysis of Reviews from Metaverse Platform Users Based on Topic Modeling

  • Jung Seung Lee
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.3
    • /
    • pp.93-104
    • /
    • 2024
  • This study conducts an in-depth analysis of user reviews from three leading metaverse platforms - Minecraft, Roblox, and Zepeto - using advanced topic modeling techniques to uncover key factors for business success. By examining a substantial dataset of user feedback, we identified and categorized the main themes and concerns expressed by users. Our analysis revealed that common issues across all platforms include technical functionality problems, user engagement and interest, payment concerns, and connection difficulties. Specifically, Minecraft users highlighted the importance of adventure and creativity, Roblox users expressed significant concerns about security and fraud, and Zepeto users focused heavily on the fairness of the in-game economy. The findings suggest that for metaverse platforms to achieve sustained success, they must prioritize the resolution of technical issues, enhance features that foster user engagement, ensure reliable connectivity, and address platform-specific concerns such as security for Roblox and payment fairness for Zepeto. These insights provide valuable guidance for developers and business strategists, emphasizing the need for robust technical infrastructure, engaging and diverse content, seamless user access, and transparent and fair economic systems. By addressing these key areas, metaverse platforms can improve user satisfaction, build a loyal user base, and secure long-term success in an increasingly competitive market.

A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment (스마트폰 환경에서 신뢰기관을 이용한 이동 통신사 AP 접속 인증에 관한 연구)

  • Lee, Gi-Sung;Min, Dae-Gi;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5496-5505
    • /
    • 2012
  • As the IT industry develops, the smart-phone technology and functions which are actively being studied at the moment greatly influence the entire living environment. With the smart-phone technology and functions, people's interest for the wireless LAN which can be used to get access to the Internet anytime anywhere is gradually increasing. However, since the malicious attacker can easily carry out hacking or approach the contents due to the characteristics of the wireless radio wave, the personal information with a high level of importance for data security is easily exposed due to Spoofing, Denial of Service attack and Man in the Middle attack. Therefore, the demand for security is gradually increasing. In this paper, the safe wireless network service environment is provided by supplementing the vulnerability in regard to Spoofing, Session Hijacking and Man in the Middle attack after executing the client's authentication process, the AP authentication process and the Mobile Agency authentication process with the client's information in the USIM, the AP information and the Mobile Agency information when the client uses the wireless Internet through the Mobile Agency AP access in the smart phone environment.

A Mobile OS Integrity Verification Using Bootloader & Physically Independent Storage Device (부트로더와 물리적으로 독립된 저장장치를 이용한 모바일 운영체제 무결성 검증)

  • Park, Jae-Kyung;Lee, Sang-Hun;Kwon, Mi-Young;Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.123-132
    • /
    • 2014
  • In this paper, we study the verification techniques for OS integrity that can be more fatal than applications in case of security issues. The dissemination of smartphones is rapidly progressing and there are many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are active researches on a system that can comprehensively respond to this. As a way to prevent these risks, integrity checking method on operation system is being researched. As most integrity checking algorithms are classified by verification from the levels before booting the OS and at the time of passing on the control to the OS, in which, there are minor differences in the definitions of integrity checking or its methods. In this paper, we suggests the integrity verification technique of OS using a boot loader and a physically independent storing device in the mobile device.

Multiple Method Authentication System Using Embedded Device (임베디드 기기를 활용한 다중 방식 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.7-14
    • /
    • 2019
  • Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.

RFID Mutual Authentication Protocol Providing Improved Privacy and Resynchronization (개선된 프라이버시와 재동기화를 제공하는 RFID 상호인증 프로토콜)

  • Kim, Young-Jae;Jeon, Dong-Ho;Kwon, Hye-Jin;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.57-72
    • /
    • 2010
  • Hash based RFID protocols proposed by Ha and M.Burmester is a scheme that tag's ID is updated using hash function to provide forward secrecy after session end. But this protocols have a problem both privacy and efficiency. This paper analyze a problem for privacy to apply a privacy game model proposed by Vaudenay. we analyze the cause that these scheme is difficult with tag's cheap implementation and efficient resynchronization. To solve these problems, we proposed a new hash based mutual authentication protocol which apply only two protocol's advantages. this protocols is based of resynchronization algorithm for Ha et al.'s protocol and added a new simple counter to record the numner of continuous desynchronization between tag and reader secret informations. this counter is more simple than cyclic counter proposed by M. Burmester's protocol. Also, we prove that proposal protocol improve a privacy against a privacy attack which is executed for Ha and M. Burmester's protocols.

The Development of Artificial Intelligence-Enabled Combat Swarm Drones in the Future Intelligent Battlefield (지능화 전장에서 인공지능 기반 공격용 군집드론 운용 방안)

  • Hee Chae;Kyung Suk Lee;Jung-Ho Eom
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.65-71
    • /
    • 2023
  • The importance of combat drones has been highlighted through the recent outbreak of the Russia-Ukraine war. The combat drones play a significant role as a a game changer that alters the conventional wisdom of traditional warfare. Many pundits expect the role of combat swarm drones would be more crucial in the future warfare. In this regard, this paper aims to analyze the development of artificial intelligence-enabled combat swarm drones. To transform the human-operated swarm drones into fully autonomous weaponry system our suggestions are as follows. Developments of (1) AI algorithms for optimized swarm drone operations, (2) decentralized command and control system, (3) inter-drones' mission analysis and allocation technology, (4) enhanced drone communication security and (5) set up of ethical guideline for the autonomous system. Specifically, we suggest the development of AI algorithms for drone collision avoidance and moving target attacks. Also, in order to adjust rapidly changing military environment, decentralized command and control system and mission analysis allocation technology are necessary. Lastly, cutting-edging secure communication technology and concrete ethical guidelines are essential for future AI-enabled combat swarm drones.

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare

  • Kim, Eun-Jin;Lee, Byeong-Tae
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.141-146
    • /
    • 2007
  • The importance of the net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of a well-implemented the net-based customer service are enhanced customer loyalty and higher lock-in of customers, and the resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such the net-based customer service. This is partly due to the e-commerce divide, and partly due to privacy and security concerns of the customer for sharing personal information with firms. The limited level of customer adoption of the net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We find that an increase in adoption of the net-based customer service by the customer base is not always desirable for firms. and that customers who utilize such services are better off only when the overall adoption is limited.

  • PDF

A Study on a technology of extraction of motion objects (3차원 동작객체 추출기술에 관한 연구)

  • 오영진;박노국
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.3
    • /
    • pp.21-27
    • /
    • 1999
  • This paper introduces the research and development of automatic generation technology to develop the character agent. The R&D of this technology includes three major elements-body model generation, automatic motion generation and synthetic human generation. Main areas of application would by cyber space- 3D game, animation, virtual shopping, on line chatting, virtual education system, simulation and security system.

  • PDF

Battlefield Ontology for Communication Unit Mission (통신부대 임무수행을 위한 전장온톨로지)

  • Lee, Yujin;Lee, Kyong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.667-672
    • /
    • 2020
  • Defense M&S (Modeling&Simulation) is a tool that creates a virtual battle situation similar to the real world, measuring and evaluating the effects of war or combat elements. However, it is very challenging to consider all the possible outcomes on the battlefield. To solve this problem, we propose a battlefield ontology, which conceptualizes the data of battlefield situation with tactical considerations. The proposed battlefield ontology is evaluated based on various communication posts in war game scenarios. The battlefield ontology is expected to assist the process of quick and accurate command decisions in convoluted battlefield situations.

Development of Infants Music Education Application Using Augmented Reality

  • Yeon, Seunguk;Seo, Sukyong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.1
    • /
    • pp.69-76
    • /
    • 2018
  • Augmented Reality (AR) technology has rapidly been applied to various application areas including e-learning and e-education. Focusing on the design and development of android tablet application, this study targeted to develop infant music education using AR technology. We used a tablet instead of personal computer because it is more easily accessible and more convenient. Our system allows infant users to play with teaching aids like blocks or puzzles to mimic musical play like game. The user sets the puzzle piece on the playground in front of the tablet and presses the play button. Then, the system extracts a region of interest among the images acquired by internal camera and separates the foreground image from the background image. The block recognition software analyzes, recognizes and shows the result using AR technology. In order to have reasonably working recognition ratio, we did experiments with more than 5,000 frames of actual playing scenarios. We found that the recognition rate can be secured up to 95%, when the threshold values are selected well using various condition parameters.