• Title/Summary/Keyword: Insider

Search Result 184, Processing Time 0.023 seconds

A Narrative Strategy of Storytelling Advertising Videos: Heineken's Case

  • Byun, Chan-Bok
    • Culinary science and hospitality research
    • /
    • v.22 no.1
    • /
    • pp.9-18
    • /
    • 2016
  • The purpose of this paper was to explore the narrative strategy of storytelling advertisement videos for a beer brand Heineken. Heineken was one of the most active advertisers who had made very impressive ad videos. The author selected five story driven advertisement videos which had been most frequently watched by Internet viewers. Those were "The Insider", "Odyssey 2011", "Heineken lip gross", "Italy Activation Milan AC vs. Real Madrid", "the Match". The five selected videos have 90 second running time. The target videos were repeatedly watched and the expected key image cuts and key verbal copies were captured as well. To categorize the narrative structure and key copies of each video, Fog, Budtz & Yakaboylu's four element model of storytelling and Gustav Freytag's three act structure or five stage model of a plot were exploited as underlying theories. Most of the ad videos had clear boundary between or among the stages of the plot and used emotional appeals including humor and sexual appeals. This paper found that the target videos used visual rhetorics to enhance the viewers' persuasion and comprehension. It also revealed that the target videos took advantage of football match as an emotional engagement to get ad viewers closely banded with Heineken.

An Efficient and Secure Authentication Scheme Preserving User Anonymity

  • Kim, Mi Jin;Lee, Kwang Woo;Kim, Seung Joo;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.69-77
    • /
    • 2010
  • Authentication and key establishment are fundamental procedures to establish secure communications over public insecure network. A password-based scheme is common method to provide authentication. In 2008, Khan proposed an efficient password-based authentication scheme using smart cards to solve the problems inherent in Wu-Chieu's authentication scheme. As for security, Khan claimed that his scheme is secure and provides mutual authentication between legal users and a remote server. In this paper, we demonstrate Khan's scheme to be vulnerable to various attacks, i. e., password guessing attack, insider attack, reflection attack and forgery attack. Our study shows that Khan's scheme does not provide mutual authentication and is insecure for practical applications. This paper proposes an improved scheme to overcome these problems and to preserve user anonymity that is an issue in e-commerce applications.

The Impacts of Trade Union on Wages and Employments in Korea (노동조합의 임금과 고용효과)

  • Ryoo, Jae-Woo
    • Journal of Labour Economics
    • /
    • v.28 no.1
    • /
    • pp.105-133
    • /
    • 2005
  • This paper attempts to verify that the economic gap between the workers in (large) firms with unions and those in (small and medium size) firms with no unions has recently been widened rapidly. A comparison of the wages of the workers belonging to the business establishments with and without trade union shows that the union premium has increased very sharply since 1997, after a relatively long periods with little changes. Also found is that union sector has witnessed a sharper decline in the share of the new entrants among workers as well as a faster increase of the average tenure of workers. These all indicate that the trade unions have forced a market equilibrium to move farther away from the competitive equilibrium in recent years.

  • PDF

Interpretation of the Nok-U-dang, Traditional Upper-Class Mansion in Haenam -with Dweller's Life and Agricultural Production- (상류(上流) 전통주거(傳統住居) 해남(海南) 녹우당(綠雨堂)의 해석(解釋) -거주자(居住者) 생활(生活)과 농업경영(農業經營)으로-)

  • Lee, Hee-Bong;Lee, Hyang-Mee
    • Journal of architectural history
    • /
    • v.11 no.1 s.29
    • /
    • pp.65-84
    • /
    • 2002
  • This study has main purpose to understand and interpret the house Nok-U-dang, an upper class built in Chosun dynasty, not by outsider researcher's view but insider dweller's view. To interpret correctly, dweller's everyday life in the space and form is examined on a microscale beyond the physical space and form of the house, main object of architectural history To understand the present form exactly, the study restore traditional life in past era, 1940s. Main method of restoration is the ethnographic interview, based on cultural anthropology. Like any other upper-class house, the house has been influenced under ruling Confucian ideology in Chosun dynasty: separation of man's and woman's quarters and hierachical arrangement by generation, and worshipping ceremony for ancestor. However, it is by practical management for agricultural production that every court and building of the Noku-Dang can be explained correctly; preparing seed for sowing, tool storing, preparing and serving meal for laborers, making manure, harvesting, threshing grain, storing grain and so on. Precedent studies interpreted the house by the Confucian principle too much and made conclusion of dignity and austerity of ritual: woman's quarter, is closed and serene space. However this study shows that the space is semi-opened and composite space by agricultural works. And the Sarangchae, master's quarter, is located properly at visual center to control every agricultural activity.

  • PDF

Improved User Anonymity Authentication Scheme using Smart Card for Traceability (추적 가능성을 위한 스마트카드 기반의 개선된 사용자 익명성 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.83-91
    • /
    • 2012
  • Authentication schemes preserving user anonymity have first been proposed by Das et al, and most of user anonymity schemes provide user anonymity against outside attacks in the communication channel. In this paper, according to the increasing of personal information exposure incidents by server attack, we propose a new authentication scheme that provides user anonymity against server as well as one against outside attacks in the communication channel. Furthermore, the proposed authentication scheme provides traceability that remote server should be able to trace the malicious user and it also solves the problem of increasing computational load of remote server by solving weakness of wrong password input by mistake.

How to Apply Ethnography Principles to Marketing Research in the Field (마케팅조사 현장에서 ethnography 원리의 적용방안에 관한 연구)

  • Yoo, Chang-Jo
    • Survey Research
    • /
    • v.11 no.3
    • /
    • pp.115-137
    • /
    • 2010
  • This article challenges necessity for applications of ethnography principles to marketing research in the field. Since ethnography collects in-depth data about consumers' experiences and behavioral patterns, it can provide useful informations for marketers' decision making. Therefore this study introduces ethnography principles that need to be applied to marketing research, summarizes its usage values in the fields, and introduces case projects that were conducted under the guideline of ethnography principles. Finally, this study identifies the reasons why marketers hesitate using ethnography when they conduct marketing research and provides suggestions for more active applications of ethnography in the field.

  • PDF

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.

The development and application of SMART Teaching-Learning Program about the unit of 'Earth and Moon' in the 5th grade of elementary school (초등학교 5학년 '지구와 달' 단원의 스마트 교수 학습 프로그램 개발 및 적용)

  • Han, Shin;Jeong, Jinwoo;Jeong, Sophia
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.8 no.1
    • /
    • pp.76-86
    • /
    • 2015
  • The purpose of this study is to take advantage of the smart teaching - learning programs about the unit of 'Earth and Moon' and find out how to apply the effect appears. Teaching-Learning program was conducted over eight lessons. And we analyzed the effect of the program at any time through the evaluation and interview. The results are as follows. First, this study proposed a method to assist in the teaching and learning of spatial ability for students' movement of the Earth and the Moon. The program takes advantage of N-Screen Applications were configured to allow both Earth observation insider perspective and the external multilateral perspective. This improves students' understanding qualitatively. Second, we applied the teaching and learning programs utilizing smart smart devices, and the result was a lot of low rank students' average score rises. In addition, we were able to see that many students' understanding and interest, self-confidence are improved.

A Study of Countermeasures for Advanced Persistent Threats attacks by malicious code (악성코드의 유입경로 및 지능형 지속 공격에 대한 대응 방안)

  • Gu, MiSug;Li, YongZhen
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.4
    • /
    • pp.37-42
    • /
    • 2015
  • Due to the advance of ICT, a variety of attacks have been developing and active. Recently, APT attacks using malicious codes have frequently occurred. Advanced Persistent Threat means that a hacker makes different security threats to attack a certain network of a company or an organization. Exploiting malicious codes or weaknesses, the hacker occupies an insider's PC of the company or the organization and accesses a server or a database through the PC to collect secrets or to destroy them. The paper suggested a countermeasure to cope with APT attacks through an APT attack process. It sought a countermeasure to delay the time to attack taken by the hacker and suggested the countermeasure able to detect and remove APT attacks.

  • PDF

The Extension of Social Insurances to the Nonstandard Workforce : Issues and Policy Options (비정규 근로자'에 대한 사회보험 확대 : 쟁점과 정책)

  • Kim, Yeon-Myung
    • Korean Journal of Social Welfare
    • /
    • v.45
    • /
    • pp.72-100
    • /
    • 2001
  • Despite the rapid expansion of social security coverage in the 1990s, many wage earners in Korea, especially the majority of the nonstandard workforce are excluded in the social insurance programs. In this regards, the purpose of this paper is to analyze causes of the exclusion of nonstandard workers to the social insurance scheme and to suggest the feasible policy options. Through this paper, four arguments are addressed as follows. First, the main issue for exclusion from coverage of those workers is that they have no entitlement to social insurance. This is not an issue of that they fall below hours or income thresholds for the entitlement Second, the top-down process of the extension in the Korean social insurances have divided the wage earners into two groups, the insider (the included) and the outsider (the excluded). Many nonstandard workers belong to the latter category. Third, the social insurance systems have been designed for the regular workers who were characterized by a full-time with some degree of stability. Reform designed to cope with the growth of nonstandard workers must build on the existing structure of social insurance. Finally, the governance capacity by social security administration body must be improved in order to provide a basic social protection for those workers. For that, four separated social insurance administration bodies could be unified to one administrative body, or tax and contribution of social insurance could be collected by one integrated administration body, the National Tax Service.

  • PDF