• Title/Summary/Keyword: Security Environment Contents

Search Result 209, Processing Time 0.023 seconds

IPTV and User Scenario-Based Interface in Home Network Service (홈 네트워크 환경에서 사용자 중심 시나리오를 활용한 IPTV 인터페이스 분석)

  • Lee, Jee-Hee;Kim, So-Hyun;Kim, Hyun-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.92-100
    • /
    • 2010
  • Due to the development of digital appliance, role of TV causes both-way by introducing IPTV, and SNS service causes big change of watching environment and residence environment. There are good conditions on the role of integrated control because it is arranged in the living room which secures movement most effectively and because family members can easily use, and the degree of use is high. Therefore, we infer user's needs by analyzing user scenario and current role of TV in home network environment. Primarily, we collect surveys of development scenario and technology which companies suggest TV applied by home network service, and secondly, we comparatively study scenario which the companies mentioned above suggest through observing user scenario, and study the role of IPTV in the future through actual scenario-based experiment by ethnography. After analyzing user scenario through case study and experiment, there are integrated device studies mainly in company study because it can be made up inside home, security and entertainment. On the other hand, there are patterns of user behavior by scenario experiment mainly in auto-tainment, security, and it showed that it is insufficient for interaction between TV and home media peripheral. Through this paper, we analyze context of home user, and based on this, we could suggest effective use of service development. Also after analyzing user form, we could know it also should be considered of ratio between activity inside home and activity outside home.

Development of VR Fire-extinguishing Experience Education Contents Using UX Design Methodology (UX 디자인 방법론을 적용한 VR 소방체험 교육콘텐츠 개발)

  • Chung, Yoo-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.3
    • /
    • pp.222-230
    • /
    • 2017
  • The Ministry of Public Safety and Security plans to expand fire safety education infrastructure to provide customized fire safety education, spread fire safety culture and develop a tailored fire safety education system as a part of the 2016 Citizens' Safety Improvement Policy. This study has also been designed to improve safety problems in the Republic of Korea. Even though safety education has been given, citizens aren't still able to experience a close-to-real situation. In addition, their understanding and satisfaction with the curriculum are very low. Therefore, this study offers VR fire-extinguishing experience education contents as an effective alternative. With a goal of having the participants experience fire extinguishing and evacuation drill in a virtual space, this program has the following advantages: i) safe fire-extinguishing experience; ii) UI to create fun ; iii) useful in fire-extinguishing education; iv) budget saving. we configure the VR fire experience system structure and hardware by applying UX design methodology. We also develop for VR-specific motion recognition plug-in and controller that can be feeling in HMD environment.

A Study on User's Acceptance of Blockchain-based Copyright Distribution Platforms and Its Usage (소비자의 블록체인 기반 저작권 유통 플랫폼 수용의도와 이용행위에 관한 연구)

  • Yoo, Young-Hwan;Park, Hyeon-Suk
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2019
  • Purpose - Blockchain technology, which has the characteristics of credibility, security, integrity and decentralization, has brought innovation to internet platforms that mediate peer to peer transactions, as well as changes to the contents distribution services. Blockchain-based copyright distribution platforms can solve problems which have been articulated on prior internet social networks: increased market dominance of platform business because of centralization with no reward to creators who upload on platforms, and lack of fairness, such as unfair profit distribution between the copyright holder and businesses. With this background, the current research confirmed the factors that affect the intention of usage and behaviors, targeting potential users of blockchain-based copyright distribution platforms. Research design, data, and methodology - Centered around the UTAUT2 Model, the research model was designed with 'Perceived Security' added as Construct, and 'Age' and 'Knowledge Level' added as moderating variables. For data, 607 responses were collected by an online survey, and 601 responses were included in the final analysis. We analyzed the research model and sample by using SPSS 23.0 and AMOS 23.0 on the collected responses. Results - First, results of research on whether Constructs make positive effects on Intention of use is: social influence, facilitating conditions, habit, and perceived security had positive effects on intention of use, and performance expectancy, effort expectancy, hedonic motivation, and economic value did not. Second, results of the research on whether facilitating condition, habit, and intention of use made an impact on using behaviors, it was shown that only habit and intention of use made positive effects. Third, in two groups divided by age above or under 40, group effort expectancy, intention of use, habit, and intention of use had controlling effects, and facilitating condition, intention of use, perceived security, and intention of use had effects in both groups. Conclusions - The research shows that no matter how great a blockchain-based platform is, if advantages of blockchain are not proved in various industries and utilized in real life like the internet, blockchain-based distribution systems will develop slowly. Rather than a short-term inducement emphasizing technology, there is a need for a strategic approach that can foster the environment.

Expanding the User Authentication Scheme in SIP (SIP에서의 강화된 사용자 인증 방식)

  • Go, Yun-Mi;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.88-93
    • /
    • 2011
  • Due to vulnerable authentication scheme of SIP, intruders can easily impersonate legitimate user. HTTP Digest authentication scheme or private key issued by trust third parties has been used to prevent impersonation attack. However, these methods have suffered security vulnerability or service delay due to computation overhead. In this paper, we propose new authentication method to generate automatically one-time password using the pre-shared password and time information of messages exchanged between SIP UA(User Agent) and SIP Registrar. This method protects against impersonation attack without significant modification of exiting SIP authentication procedure to build securer SIP environment.

A Study on Streaming Service for Content Protection (컨텐츠 보호를 위한 스트리밍 서비스 방안 연구)

  • 박지현;윤기송;전경표
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.198-201
    • /
    • 2003
  • Changes in internet and network environment make it possible to provide high-quality content services in real time. As demand for digital content is increased, problems related to intellectual property rights are getting more important. Streaming service like video-on-demand solved this problem by preventing content from being saved. But, as the advent of several tools able to save streamed content, the streamed content is not free from these problems any more. So, with security countermeasure like access control, new technologies to control and manage rights for content are needed. One of the solutions is DRM In this paper, we describe a DRM-based streaming service that can send the ASF stream which is the multimedia file format of Microsoft.

  • PDF

New Terrorism and National Crisis Management (뉴테러리즘과 국가위기관리)

  • Kim, Boum-Joong;Cho, Ho-Dae
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.10
    • /
    • pp.284-291
    • /
    • 2009
  • Changes in the environment of the 21st century, national crisis, national security threats taempoga yimyeonseo type of fast, flexible and diverse, principal, resulting in a diagnosis of a threat far greater than in the past and deal with uncertainty in the features have done. That this study, the traditional concept of terrorism and to examine the characteristics of new terrorism, terrorism by analyzing the actual conditions of, any country to be a target of terrorism, and terrorism, people also can become the target of a real national crisis management in situations In contrast with the policy dimensions of terrorism is to the recommendations.

The Effects of Service Factors of Electronic Catalogue Systems on User Satisfaction (전자카탈로그 시스템의 서비스 요인이 사용자만족에 미치는 영향)

  • Ko, Il-Sang;Choi, Su-Jeong;Kim, Jeong-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.107-131
    • /
    • 2007
  • Due to an increase of the importance of E-catalogue on electronic commerce, E-catalogue systems have been prevailing for their production and efficient management around Web environment. In this study, we categorize service factors off-catalogue systems into three aspects contents-providing, user participation, and system management, and we measure their impacts on user satisfaction. The results of the study show that richness, design, trust, interaction, function of transaction management, system extensibility, system stability, and security have been found out to be significant factors to affect user satisfaction.

  • PDF

Countermeasure of SIP Impersonation Attack Using A Location Server (위치 정보 서버를 이용한 SIP 위장공격 대응 방안)

  • Go, Yun-Mi;Kwon, Kyung-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.17-22
    • /
    • 2013
  • Impersonation attack, based on vulnerable security of SIP, facilitate a intruder to take malicious actions such as toll fraud and session hijacking. This paper suggests a new technique for a countermeasure. When receiving a register request message, registrar checks whether the value of Form header or the value of Call-ID header is stored in location server or not. If the record containing either of them are stored and periodically updated, we regard that message as impersonation attack and discard it. Since this technique uses the information stored in server instead of adding encryption mechanism for user authentication, it can easily build securer SIP environment.

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

A Study on the Effect of Online Travel Distribution's Brand Community Characteristics on Product Purchase Intention

  • LU, Lianghui;KANG, Min-Jung;SUN, Pengchang
    • Journal of Distribution Science
    • /
    • v.21 no.1
    • /
    • pp.107-117
    • /
    • 2023
  • Purpose: This study attempted to confirm the mediating effect of brand experience and to travel brand community satisfaction in the relationship between the characteristics of brand community contents and travel product purchase intention. This study also investigated the moderating role of consumer characteristics. Research design, data and methodology: Based on a total of 381 bytes of data, hypothesis verification was conducted using Smart-PLS 3.2.8 statistical package programs. Results: First, the content community travel brand attributes, personal affordability and creativity are a lingering fragrances on the intended consumers ' shopping trip. Second, information provision, interaction, and creativity, which are the characteristics of travel brand community content, influenced consumers' intention to purchase travel products through brand community satisfaction. Third, playfulness, vitality, and creativity, which are the characteristics of travel brand community content, influenced consumers' intention to purchase travel products through double mediation of the experience and community satisfaction of brand. Conclusions: Tourism industry managers should be able to market content by forming their own brand community. It is necessary to create an environment in which tourism industry managers can use social media travel brand community content to give discounts to consumers, provide creative, playful and vivid travel information.