• Title/Summary/Keyword: Game Security

Search Result 252, Processing Time 0.021 seconds

Physical activity convergence contents for health care of the elderly (융합형 노인건강관리 신체활동 콘텐츠)

  • Kang, Sunyoung;Kang, Seungae
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.63-68
    • /
    • 2015
  • In rapid aging society, the disease prevention and management for healthy life of the elderly is very important. Regular physical activity is known to be a useful intervention for the physical and mental health of the elderly. In this study, we explore the convergence contents using IT technology as the intervention for encouraging the regular physical activity in the elderly. There are u-Healthcare and serious game as the convergence of health care and IT technology, and the serious game which is added special purpose such as education, training, and treatment to the fun-one of the game element- can be suitable to provide a variety of contents that leads to physical activity in the elderly. The contents inducing physical activities are "Puffer(ATARI, USA)", "WiiFit(Nintendo, JAPAN)", "Age Invaders(MXR Lab, SINGAPORE)", "Xbox $360^{\circ}$+kinect(Microsoft, USA)", "Tangible bicycle game(Donsin Univ., KOREA)", and "3D Gateball game(Soongsil Univ., KOREA)", and these contents can help health care of the elderly. By increasing physical activity through the use of these contents, it will be able to promote physical fitness and body function required in daily life, disease prevention, and maintain health in the elderly.

Potential Risks Associated with eSportsmen Activities: an Empirical Study

  • Bonkalo, Tatyana I.;Stepanova, Olga N.;Latushkina, Elena N.;Kozlyatnikov, Oleg A.;Kumancova, Elizaveta S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.280-284
    • /
    • 2022
  • The purpose of the study was to identify the level of development of gaming disorder among e-sportsmen as a potential risk of their activity. Three groups were formed for the study. The first group consisted of 102 e-sportsmen aged between 18 and 32; the second group consisted of boys of the same age who, according to preliminary questionnaires, played computer games fairly frequently - at least once a week (n = 102); the third group consisted of individuals of the same gender and age, but who did not share a passion for computer games (n = 102). The study was performed using semi-structured interview during which the respondents filled out the Computer gaming disorder questionnaire developed and tested by O.M. Vidova under our supervision. Our study showed that among 102 e-sportsmen, 82,3% did not have any computer gaming disorder, only some tendency thereto. While 17,6% of e-sportsmen were characterized by a pronounced gaming disorder. E-sportsmen who prefer strategies, less than all other e-sportsmen, tend to escape from reality and accept the game role, to express their emotions through the game, and in general have the lowest level of dependence on games. Additionally, strategic e-sportsmen are most likely to study the game thoroughly and to develop themselves with it. Many Starcraft e-sportsmen tend to explore the possibilities of the game in detail and, at the same time, protect themselves from escaping into virtual reality. The risk of computer gaming disorder among e-sportsmen is largely determined by their sports achievements, the type of sports activity (individual or team), and genre of the preferred computer game.

Why Should I Ban You! : X-FDS (Explainable FDS) Model Based on Online Game Payment Log (X-FDS : 게임 결제 로그 기반 XAI적용 이상 거래탐지 모델 연구)

  • Lee, Young Hun;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.1
    • /
    • pp.25-38
    • /
    • 2022
  • With the diversification of payment methods and games, related financial accidents are causing serious problems for users and game companies. Recently, game companies have introduced an Fraud Detection System (FDS) for game payment systems to prevent financial incident. However, FDS is ineffective and cannot provide major evidence based on judgment results, as it requires constant change of detection patterns. In this paper, we analyze abnormal transactions among payment log data of real game companies to generate related features. One of the unsupervised learning models, Autoencoder, was used to build a model to detect abnormal transactions, which resulted in over 85% accuracy. Using X-FDS (Explainable FDS) with XAI-SHAP, we could understand that the variables with the highest explanation for anomaly detection were the amount of transaction, transaction medium, and the age of users. Based on X-FDS, we derive an improved detection model with an accuracy of 94% was finally derived by fine-tuning the importance of features that adversely affect the proposed model.

온라인게임 분야의 Data-driven Security

  • Kim, Huy Kang
    • Review of KIISC
    • /
    • v.30 no.5
    • /
    • pp.101-109
    • /
    • 2020
  • 온라인게임은 부정로그인 및 게임봇 (Game BOT) 탐지 등 서비스에 악영향을 주는 이상징후를 조기에 탐지해야 하는 서비스 분야이다 보니, 데이터기반 보안 (Data-Driven Security)이 상당히 오랜 기간 자생적으로 구축이 되어왔다. 온라인 게임은 초당 동시접속이 800만~1천만에 육박하는 게임도 시장에 빈번히 존재하기 때문에, 게임유저들의 로그데이터를 빅데이터 기술을 접목한 데이터 분석이 필수적이다. 본고에서는 온라인게임 분야에 존재하는 다양한 위협요소 중 하나인 게임봇 및 작업장 탐지에 적용된 데이터기반 보안 기술들에 대해 조사하고 향후 온라인게임분야에서의 데이터기반 보안의 연구 방향을 제시해 보고자 한다.

A Meta-analysis of Korean Gamification Research Trends for Security Education Design (보안 교육 설계를 위한 국내 게이미피케이션 연구동향 메타분석)

  • Kim, Jong Wan;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.81-95
    • /
    • 2021
  • This study is to design a security game to proceed in the future based on the results of analyzing 105 research trends on gamification from 2018 to 2021 according to research period, research purpose, research subject, research topic, research method, game method, and emphasis factors. was trying to find an answer to Gamification showed a trend of increasing research related to 2021 due to the increase in the importance of non-face-to-face education in 2020, and there were not many studies targeting middle and high school students, colleges, and adults. Security-related research was a relatively incomplete and limited field, as only a small number of studies on raising awareness were conducted due to access restrictions. In the future, by referring to various research cases and statistics analyzed in this study, we will try to actually implement security education cases through gamification.

A Security Assessment on the Designated PC service

  • Lee, Kyungroul;Yim, Kangbin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.61-66
    • /
    • 2015
  • In this paper, we draw a security assessment by analyzing possible vulnerabilities of the designated PC service which is supposed for strengthening security of current online identification methods that provide various areas such as the online banking and a game and so on. There is a difference between the designated PC service and online identification methods. Online identification methods authenticate an user by the user's private information or the user's knowledge-based information, though the designated PC service authenticates a hardware-based unique information of the user's PC. For this reason, high task significance services employ with online identification methods and the designated PC service for improving security multiply. Nevertheless, the security assessment of the designated PC service has been absent and possible vulnerabilities of the designated PC service are counterfeiter and falsification when the hardware-based unique-information is extracted on the user's PC and sent an authentication server. Therefore, in this paper, we analyze possible vulnerabilities of the designated PC service and draw the security assessment.

Skeleton Game Development Using Script (스크립트를 이용한 스켈레톤 게임 개발)

  • Choi Han-Yong;Kim Gui-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.55-58
    • /
    • 2005
  • The existing game development way is adopting a direct engine design way. It was hard to learn game development, but it can learn the process that uses a script an abstraction. And it improves productivity and convenience anger because modeling does not do an engine directly and reduce a development cost and can solve a problem of a development human power security. The representative characteristic of this paper was able to change a development environment into an abstract script language with modeling having done an engine in the existing game development environment directly.

  • PDF

Hyper-parameter Optimization for Monte Carlo Tree Search using Self-play

  • Lee, Jin-Seon;Oh, Il-Seok
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.36-43
    • /
    • 2020
  • The Monte Carlo tree search (MCTS) is a popular method for implementing an intelligent game program. It has several hyper-parameters that require an optimization for showing the best performance. Due to the stochastic nature of the MCTS, the hyper-parameter optimization is difficult to solve. This paper uses the self-playing capability of the MCTS-based game program for optimizing the hyper-parameters. It seeks a winner path over the hyper-parameter space while performing the self-play. The top-q longest winners in the winner path compete for the final winner. The experiment using the 15-15-5 game (Omok in Korean name) showed a promising result.

On Securing Web-based Educational Online Game Using SSL Protocol (SSL 프로토콜을 이용한 안전한 웹기반 교육용 온라인 게임)

  • Yani, Kadek Restu;Priyana, Yoga;Rusmin, Pranoto H.;RHEE, Kyung-Hyune
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.3
    • /
    • pp.790-798
    • /
    • 2016
  • Currently, web-based online games is becoming popular in supporting learning process due to their effective and efficient tool. However, online games have lack of security aspect, in particular due to increase in the number of personal information leakage. Since the data are transmitted over insecure channel, it will be vulnerable of being intercepted by attackers who want to exploit user's identity. This paper aims to propose an online web-based educational game, Vidyanusa which allows the students to register their personal information using a unique code, a user name and a password. It manages the users according to their schools, subject teachers and class levels. In addition, by adopting a unique code, the confidentiality of the user identity can be kept away from attackers. Moreover, in order to provide a secure data communication between client and server, Secure Socket Layer (SSL) protocol is adopted. The performance of the system after implementing SSL protocol is examined by loading a number of requests for various users. From the experiment result, it can be concluded that the SSL protocol can be applied to web-based educational system in order to offer security services and reliable connection.

MMOG User Participation Based Decentralized Consensus Scheme and Proof of Participation Analysis on the Bryllite Blockchain System

  • Yun, Jusik;Goh, Yunyeong;Chung, Jong-Moon;Kim, OkSeok;Shin, SangWoo;Choi, Jin;Kim, Yoora
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4093-4107
    • /
    • 2019
  • Proof of Work (PoW) based blockchains have limitations in throughput, time consumption, and energy efficiency. In these systems, a miner will consume significant time and resources to obtain a reward for contributing to the blockchain. To overcome these limitations, recent research on blockchains are focused on accelerating the speed, scalability, and enhancing the security level. By enhancing specific procedures of blockchain system, the level of data integrity supported by the blockchain can become more robust, and efficient. In this paper, a new blockchain consensus model based on the Bryllite Consensus Protocol (BCP) is proposed to support a hyper-connected massively multiplayer online game (MMOG) ecosystem. The BCP scheme enables users to participate directly in new consensus processes through a Proof of Participation (PoP) algorithm. In this model, the consensus algorithm has a simpler form while maintaining high security level. In addition, because the BCP scheme gives users an equal chance to make a contribution to the blockchain, rewards are distributed in an equal fashion, which motivates user participation. The analysis of the proposed scheme is applied to the Bryllite consortium blockchain system (homed in Hong Kong), which is a new blockchain network developed for international game industries, gamers, and game events.