• Title/Summary/Keyword: Network Assets

Search Result 166, Processing Time 0.028 seconds

Virtual Assets as the Newest Object of Property Rights

  • Davydova, Iryna;Zhurylo, Serhii;Tserkovna, Olena;Herasymchuk, Lidiia;Tokareva, Vira
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.115-120
    • /
    • 2022
  • New realities of social relations are changing the understanding of certain phenomena, including the emergence of new concepts among the objects of property rights, such as: virtual assets, and the circulation of virtual assets. The rapid development of the virtual assets market involves the legislative consolidation of the status of such assets, changes in taxation, their circulation, and so on. These circumstances increase the interest in the study of virtual assets as the latest object of property rights and necessitate the study of this topic. The work aims to explore the theoretical developments and regulations on virtual assets in the modern world, as well as to summarize the conclusions about virtual assets as the latest object of property rights. The object of research is the content of the concept of "virtual asset" and its legal status. The methodology of work is represented by a set of methods and techniques that were used to achieve this goal, namely: hermeneutic, historical, extrapolation, comparative law, generalization, analysis, synthesis, and deduction. The study analyzed different approaches to understanding virtual assets, analyzed the characteristics of virtual assets, and concluded that in today's conditions there is no single unified legal regulation of virtual assets, although many countries are moving towards consolidating the status of virtual assets.

A Design of Platform of Portable Cultural Assets Surveillance System (이동형 문화재 감시시스템의 플랫폼 설계)

  • Jung, Moo Kyung;Choi, Chang Yong;Lee, Ho Cheol;Lee, Dong Myung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.599-600
    • /
    • 2013
  • In this paper, a platform of portable cultural assets surveillance system is designed in order to prevent the theft of cultural assets. The platform was designed to take into account the characteristics of the cultural assets for minimizing of the damage of cultural assets. The platform is composed of the portable cultural assets surveillance system and the collaboration network protocol among th surveillance system. If an intruder steals the cultural assets and moves according to the scheduled route, it is expected that the platform has a great role because the platform of portable cultural assets surveillance system can performs the continuous tracking by the collaboration network.

  • PDF

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.

Study on Technology Value Evaluation & Contribution of Technology Using Analytic Network Process (네트워크분석과정(ANP) 기법을 이용한 기술기여도 산정 및 기술가치 평가)

  • Seo, Jang-Hoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.3
    • /
    • pp.193-201
    • /
    • 2008
  • As The development and commercialization of advanced technologies will depend increasingly on efficient technology transfer and technology trading systems and the knowledge economics grows rapidly, the value of intangible assets is more emphasized in business nowadays. Intangible assets include intellectual capital and intellectual property. This requires the development of technology markets or exchanges and hence a reliable technology valuation methodology. Our focus is on the business aspects of technology' contribution and we propose an objective scoring system, which is implemented by ANP, for Technology valuation of enterprise. As a result, This study intends to evaluate the contribution of an individual technology in intangible assets by the Analytic Network Process(ANP).

Web 3.0 Business Model Canvas of Metaverse Gaming Platform, The Sandbox

  • Song, Minzheong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.119-129
    • /
    • 2024
  • We look at Web 3.0 business model canvas (BMC) of metaverse gaming platform, The Sandbox (TS). As results, the decentralized, blockchain-based platform, TS benefits its creators and players by providing true ownership, tradability of decentralized assets, and interoperability. First, in terms of the governance and ownership, The SAND functions a governance token allowing holders to participate in decision and SAND owners can vote themselves or delegate voting rights to other players of their choice. Second, in terms of decentralized assets and activities, TS offers three products as assets like Vox Edit as a 3D tool for voxel ASSETS, Marketplace as NFT market, and Game Maker as a visual scripting toolbox. The ASSETS made in Vox Edit, sold on the Marketplace, can be also utilized with Game Maker. Third, in terms of the network technology, in-game items are no longer be confined to a narrow ecosystem. The ASSETS on the InterPlanetary File System (IPFS) are not changed without the owner's permission. LAND and SAND are supported on Polygon, so that users interact with their tokens in a single place. Last, in terms of the token economics, users can acquire in-game assets, upload these assets to the marketplace, use for paying transaction fees, and use these as governance token for supporting the foundation.

A study on School Assets Management System based on Ubiquitous Sensor Network (유비쿼터스 센서네트워크를 활용한 학교자산관리시스템)

  • Park, Min-Sik;Jeon, Tae-Hyun
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.05a
    • /
    • pp.277-280
    • /
    • 2009
  • In this paper, the method to apply the RFID technology to schools will be presented in order to effectively integrate and manage various assets in school. The proposed system may be seemed to be very useful of individual school to grasp the status of their assets and also the central government to control and manage the assets scattered far and wide around the country. We also propose the OSN/PMS server based on EPC global standard could be appropriate especially in schools. In addition the proposed system can acquire simultaneously the information from several RFID readers at real time so that it is possible and easy to track the position, the path of moving and the status of assets in the school. To show the usefulness of the proposed system, the prototype of the system has been implemented and conducted. The proposed system seems to be applicable to various fields such as factories, farms, or homes as well as school.

  • PDF

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

The Future of Science Parks and Areas of Innovation: Science and Technology Parks Shaping the Future

  • Parry, Malcolm
    • World Technopolis Review
    • /
    • v.7 no.1
    • /
    • pp.44-58
    • /
    • 2018
  • The successful development of science parks is dependent on the relevance and delivery of a range of value propositions they offer to their stakeholders. Experience has shown that the benefits of these value propositions are 'place based' and 'time dependent', influenced by the prevailing technology, social and business environments in which they operate, and the relationship that is developed between entrepreneurs, corporates, academia and government in creating these projects, and their performance is dependent on economic, physical and networking assets they create and deploy. This paper looks at some of the history that has influenced the development of parks, lessons learnt from their planning, development and operation. It reviews these details in the context of delivering value propositions in the context of temporal, spatial, technology and entrepreneurial profile of the new idea of 'innovation districts', influencing 'city planning' and supporting 'smart specialisation strategies'.

A Blockchain Framework for Investment Authorities to Manage Assets and Funds

  • Vinu Sherimon;Sherimon P.C.;Jeff Thomas;Kevin Jaimon
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.128-132
    • /
    • 2023
  • Investment authorities are broad financial institutions that carefully manage investments on behalf of the national government using a long-term value development approach. To provide a stronger structure or framework for In-vestment Authorities to govern the distribution of funds to public and private markets, we've started research to create a blockchain-based prototype for managing and tracking numerous finances of such authorities. We have taken the case study of Oman Investment Authority (OIA) of Sultanate of Oman. Oman's wealth is held in OIA. It is an organization that oversees and utilizes the additional capital generated by oil and gas profits in public and private markets. Unlike other Omani funds, this one focus primarily on assets outside the Sultanate. The operation of the OIA entails a huge number of transactions, necessitating a high level of transparency and administration among the parties involved. Currently, OIA relies on various manuals to achieve its goals, such as the Authorities and Responsibilities manual, the In-vestment Manual, and the Code of Business Conduct, among others. In this paper, we propose a Blockchain based framework to manage the operations of OIA. Blockchain is a part of the Fourth Industrial Revolution, and it is re-shaping every industry. The main components of every blockchain are assets and participants. The funds are the major assets in the proposed study, and the participants are the various fund shareholders/recipients. The block-chain's transactions are all safe, secure, and immutable, and it's part of a trustless network. The transactions are simple to follow and verify. By replacing intermediary firms with smart contracts, blockchain-based solutions eliminate any middlemen in the fund allocation process.