• Title/Summary/Keyword: Network Assets

Search Result 170, Processing Time 0.022 seconds

Virtual Assets as the Newest Object of Property Rights

  • Davydova, Iryna;Zhurylo, Serhii;Tserkovna, Olena;Herasymchuk, Lidiia;Tokareva, Vira
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.115-120
    • /
    • 2022
  • New realities of social relations are changing the understanding of certain phenomena, including the emergence of new concepts among the objects of property rights, such as: virtual assets, and the circulation of virtual assets. The rapid development of the virtual assets market involves the legislative consolidation of the status of such assets, changes in taxation, their circulation, and so on. These circumstances increase the interest in the study of virtual assets as the latest object of property rights and necessitate the study of this topic. The work aims to explore the theoretical developments and regulations on virtual assets in the modern world, as well as to summarize the conclusions about virtual assets as the latest object of property rights. The object of research is the content of the concept of "virtual asset" and its legal status. The methodology of work is represented by a set of methods and techniques that were used to achieve this goal, namely: hermeneutic, historical, extrapolation, comparative law, generalization, analysis, synthesis, and deduction. The study analyzed different approaches to understanding virtual assets, analyzed the characteristics of virtual assets, and concluded that in today's conditions there is no single unified legal regulation of virtual assets, although many countries are moving towards consolidating the status of virtual assets.

A Design of Platform of Portable Cultural Assets Surveillance System (이동형 문화재 감시시스템의 플랫폼 설계)

  • Jung, Moo Kyung;Choi, Chang Yong;Lee, Ho Cheol;Lee, Dong Myung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.599-600
    • /
    • 2013
  • In this paper, a platform of portable cultural assets surveillance system is designed in order to prevent the theft of cultural assets. The platform was designed to take into account the characteristics of the cultural assets for minimizing of the damage of cultural assets. The platform is composed of the portable cultural assets surveillance system and the collaboration network protocol among th surveillance system. If an intruder steals the cultural assets and moves according to the scheduled route, it is expected that the platform has a great role because the platform of portable cultural assets surveillance system can performs the continuous tracking by the collaboration network.

  • PDF

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.

Study on Technology Value Evaluation & Contribution of Technology Using Analytic Network Process (네트워크분석과정(ANP) 기법을 이용한 기술기여도 산정 및 기술가치 평가)

  • Seo, Jang-Hoon
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.3
    • /
    • pp.193-201
    • /
    • 2008
  • As The development and commercialization of advanced technologies will depend increasingly on efficient technology transfer and technology trading systems and the knowledge economics grows rapidly, the value of intangible assets is more emphasized in business nowadays. Intangible assets include intellectual capital and intellectual property. This requires the development of technology markets or exchanges and hence a reliable technology valuation methodology. Our focus is on the business aspects of technology' contribution and we propose an objective scoring system, which is implemented by ANP, for Technology valuation of enterprise. As a result, This study intends to evaluate the contribution of an individual technology in intangible assets by the Analytic Network Process(ANP).

Universal Description of Access Control Systems

  • Karel Burda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.43-53
    • /
    • 2024
  • Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.

Web 3.0 Business Model Canvas of Metaverse Gaming Platform, The Sandbox

  • Song, Minzheong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.119-129
    • /
    • 2024
  • We look at Web 3.0 business model canvas (BMC) of metaverse gaming platform, The Sandbox (TS). As results, the decentralized, blockchain-based platform, TS benefits its creators and players by providing true ownership, tradability of decentralized assets, and interoperability. First, in terms of the governance and ownership, The SAND functions a governance token allowing holders to participate in decision and SAND owners can vote themselves or delegate voting rights to other players of their choice. Second, in terms of decentralized assets and activities, TS offers three products as assets like Vox Edit as a 3D tool for voxel ASSETS, Marketplace as NFT market, and Game Maker as a visual scripting toolbox. The ASSETS made in Vox Edit, sold on the Marketplace, can be also utilized with Game Maker. Third, in terms of the network technology, in-game items are no longer be confined to a narrow ecosystem. The ASSETS on the InterPlanetary File System (IPFS) are not changed without the owner's permission. LAND and SAND are supported on Polygon, so that users interact with their tokens in a single place. Last, in terms of the token economics, users can acquire in-game assets, upload these assets to the marketplace, use for paying transaction fees, and use these as governance token for supporting the foundation.

A study on School Assets Management System based on Ubiquitous Sensor Network (유비쿼터스 센서네트워크를 활용한 학교자산관리시스템)

  • Park, Min-Sik;Jeon, Tae-Hyun
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.05a
    • /
    • pp.277-280
    • /
    • 2009
  • In this paper, the method to apply the RFID technology to schools will be presented in order to effectively integrate and manage various assets in school. The proposed system may be seemed to be very useful of individual school to grasp the status of their assets and also the central government to control and manage the assets scattered far and wide around the country. We also propose the OSN/PMS server based on EPC global standard could be appropriate especially in schools. In addition the proposed system can acquire simultaneously the information from several RFID readers at real time so that it is possible and easy to track the position, the path of moving and the status of assets in the school. To show the usefulness of the proposed system, the prototype of the system has been implemented and conducted. The proposed system seems to be applicable to various fields such as factories, farms, or homes as well as school.

  • PDF

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.

The Future of Science Parks and Areas of Innovation: Science and Technology Parks Shaping the Future

  • Parry, Malcolm
    • World Technopolis Review
    • /
    • v.7 no.1
    • /
    • pp.44-58
    • /
    • 2018
  • The successful development of science parks is dependent on the relevance and delivery of a range of value propositions they offer to their stakeholders. Experience has shown that the benefits of these value propositions are 'place based' and 'time dependent', influenced by the prevailing technology, social and business environments in which they operate, and the relationship that is developed between entrepreneurs, corporates, academia and government in creating these projects, and their performance is dependent on economic, physical and networking assets they create and deploy. This paper looks at some of the history that has influenced the development of parks, lessons learnt from their planning, development and operation. It reviews these details in the context of delivering value propositions in the context of temporal, spatial, technology and entrepreneurial profile of the new idea of 'innovation districts', influencing 'city planning' and supporting 'smart specialisation strategies'.