• Title/Summary/Keyword: Internet Personal Broadcasting

Search Result 206, Processing Time 0.017 seconds

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

The Effect of the Technical and Virtual Creator Characteristics of Vtuber's Personal Broadcasting on Pleasure, Satisfaction, and Paid Sponsorship Intention: Based on the S-O-R Model (브이튜버(Vtuber) 개인방송의 기술적 특성과 가상 크리에이터 특성이 즐거움, 시청만족도 및 유료후원의도에 미치는 영향: S-O-R 모델을 기반으로)

  • Jin, Chengjun;Yang, Sung-Byung;Yoon, Sang-Hyeak
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.107-127
    • /
    • 2022
  • Personal broadcasting utilizing Vtuber, a virtual creator made of 2D or 3D avatars, has recently appeared and is growing in popularity. Vtuber is a virtual person who broadcasts on the Internet using 2D or 3D avatars with real-time motion capture and computer graphics technologies. While the personal broadcasting industry utilizing Vtuber is proliferating, related studies have mainly concentrated on technical issues. Therefore, in this study, the antecedent factors that form the technical characteristics and virtual creator characteristics of Vtuber personal broadcasting are derived using the Stimulus-Organism-Response (S-O-R) model. Then the effect of these factors on viewer pleasure and satisfaction, which lead to increased paid sponsorship is to be examined. Furthermore, we investigate how this influencing mechanism fluctuates based on the avatar type (2D vs. 3D). This study contributes to empirical examinations of viewers' paid sponsorship intention in Vtuber personal broadcasting through the S-O-R model. It also offers insights that technological or virtual creator characteristics could improve viewers' pleasure, satisfaction, and even paid sponsorship.

An Analysis of the Preference Type of Internet Personal Game Broadcasting in China - focused on Player-Unknown's Battlegrounds Streaming (중국의 1인 게임 방송의 선호 유형 분석 - 배틀그라운드 1인 게임 방송을 중심으로)

  • Seo, Ryung;Kihl, Taesuk
    • Journal of the Korean Society for Computer Game
    • /
    • v.31 no.4
    • /
    • pp.81-89
    • /
    • 2018
  • The purpose of this study is to classify the types of internet personal game broadcasting in China and to examine viewers' preferences type of it. By targeting top 100 creators of Player-Unknown's Battleground streaming as a personal game broadcaster with over 100,000 followers, the game types were classified based on the purpose and characteristic of game broadcasting such as game play, entertainment, and audience participation. As a result, the type of internet personal game broadcasting in China was classified into progamer type, cooperative playing type, storytelling type, and reciprocal entertainment type. The progamer type was 38% and it was the highest proportion of Player-Unknown's Battlegrounds streaming. Next came storytelling type, cooperative playing type and reciprocal entertainment type with 25%, 19% and 18% respectively. In sum, progamer type and storytelling type which shows relatively low real - time communication with audiences accounted for a high percentage of 63%. This implies that the characteristics of the broadcast media focused on 'showing' have influenced the production and planning of personal game broad casting. The interactive characteristics of the platform of personal game broad casting can be expected to gradually change the conventional customs of broadcasting media.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Personal Information Protection System for Web Service (인터넷 웹에서의 개인정보보호 시스템 구현)

  • Hwang, Ho-Young;Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.261-266
    • /
    • 2011
  • Recently, Internet web services including bulletin board of companies, public intuitions, or governments became the main ways of personal information leakage. However, it is hard to succeed to detect personal information and protect it from leakage manually by system administrators, because the number of web boards and attached files is so huge. Therefore, automatic scanning and filtering methods are needed to protect personal information like resident registration numbers from unexpected exposure. To do this, we developed a novel and advanced web security system for automatic personal information scanning and filtering.

A Study on the Automated Design of Business Card for Personal Information Leakage Prevention Using IT-based Convergent Service

  • Park, Jong-Youel
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.25-30
    • /
    • 2018
  • When producing a business card, there is always a risk for exposing personal information as the information from the business card application is saved in the computer of the printing agency. The information that goes into the business card application file, such as name, mobile phone number, and e-mail address is not encrypted, which makes it easy to access. This study was conducted in order to find a way to automatize the business card application process by encrypting the information entered into the business card application file, simplifying the business card application process, minimizing the workload and by directly linking to the print shop to remove the print file after completing the printing of the business card.

Testing the Mediating Role of Perceived Risk of COVID-19 and the Moderating Role of Age in the Relationship between COVID-19 related Information Sensitivity and Personal Preventive Behaviors

  • Hong, Kyung-Wan;Kim, Hyeon-Cheol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • The influence of information sensitivity during the COVID-19 pandemic on perceived risk and personal preventive behaviors of consumers in China had been investigated. The participants were Chinese individuals experiencing the pandemic as it happened. Participants voluntarily completed an online questionnaire to provide their COVID-19 information sensitivity, their perceived COVID-19 risk, preventive behavior and their respective age. Our study discovered that COVID-19 information sensitivity positively influence perceived risk and preventive behavior. Moreover, young individuals show higher levels of online information sensitivity, which influenced their personal protective behavior when compared to that of middle-aged and elderly participants. Furthermore, Perceived risk significantly affected preventive behaviors. The results of this study may assist the government and marketeers in comprehending information sensitivity which can affect consumers' protective behavior toward reducing COVID-19 infections.

A Study on Development Plan, Comparison & Analysis of Digital CATV and IPTV (디지털 CATV와 IPTV의 수신제한시스템 비교분석 및 발전방안 연구)

  • Park, Jiun;Shin, Seung-Jung;You, Hee-kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.6
    • /
    • pp.173-178
    • /
    • 2008
  • With the discontinuation of analog broadcasting in 2012, the cable broadcasters are investing in the conversion to DCATV (Digital Cable TV). DCATV is providing various broadcast of high quality to audiences through paid broadcasting called PPV (Pay Per View). Such services are using various kinds of CASs (Conditional Access System) in order to verify the viewing rights of subscriber. In addition, to respond to the fast changing environment of digital broadcast, not only simple digitalization of broadcast but also services such as PVR (Personal Video Recorder) and VOD (Video On Demand) are provided to subscribers. Because these additional services have many difficult areas to cover with traditional CAS alone, a new plan has become necessary. With the improvement of related regulations in 2008, the test service of IPTV (Internet Protocol TV) which is a broadcast service through the internet started. Because like DCATV, IPTV also sets the real time broadcast and the VOD service as the basic services, the use of appropriate CAS is required. In this study, the CASs for DCATV and IPTV undergo comparative analysis, and the development direction which will benefit both subscribers and broadcasting companies is suggested.

  • PDF

A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services (온라인 서비스의 본인확인 요구사항 분석 기반의 차등화된 본인확인서비스 적용 방안)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.201-208
    • /
    • 2020
  • Recently, the application of personal proofing service based on social security number(SSN) replacement means for verifying identity in non-face-to-face transactions is increasing. In this paper, we propose a method of applying differentiated personal proofing service on whether identity verification is necessary in the online service provided by ISP and if it is appropriate to apply a certain level of assurance. By analyzing the requirements related to personal proofing required by current ISPs, we analyze the risks for each of the requirements and propose a method of applying differentiated personal proofing service according to the level of identity assurance guarantee to minimize the risks. In applying the proposed method to online service provision, it is possible to reduce user's unnecessary authentication cost by minimizing the application of personal proofing service based on alternative means, and to help protect user personal information by minimizing excessively collected personal information.