• Title/Summary/Keyword: digital content

Search Result 2,359, Processing Time 0.034 seconds

A Study of the Effectiveness of Digital Signage: Importance of Customized Content (디지털 사이니지의 효과에 관한 연구: 맞춤식 콘텐츠의 중요성)

  • Cho, Jae-Yung
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.211-217
    • /
    • 2019
  • This study suggested the alternatives for improving consumers' engagement with digital signage (DS) by analyzing the researches of the effectiveness of DS in marketing and public areas, which is recognized as an essential communication tool for commercial or public matters. According to the results, affective DS ad content of DS resulted in positive shoppers' buying behaviors and perceiving buying environment; DS was also effective for public affairs, which how proper channel and message for the target public resulted in solving community problems. However, it was rare to measure precisely the level of consumers' engagement with DS content and what DS content aroused higher engagement in both areas. Thus, DS content should be more customized based on multiple converged contents for consumers' engagement and the research efforts of DS should be focused on the development of not only its device technology, but also creative content.

EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception

  • Li, Huanruo;Guo, Yunfei;Huo, Shumin;Ding, Yuehang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1891-1908
    • /
    • 2021
  • Cyber deception defense mitigates Advanced Persistent Threats (APTs) with deploying deceptive entities, such as the Honeyfile. The Honeyfile distracts attackers from valuable digital documents and attracts unauthorized access by deliberately exposing fake content. The effectiveness of distraction and trap lies in the enticement of fake content. However, existing studies on the Honeyfile focus less on this perspective. In this work, we seek to improve the enticement of fake text content through enhancing its readability, indistinguishability, and believability. Hence, an enticing deceptive-content generator, EDGE, is presented. The EDGE is constructed with three steps: extracting key concepts with a semantics-aware K-means clustering algorithm, searching for candidate deceptive concepts within the Word2Vec model, and generating deceptive text content under the Integrated Readability Index (IR). Furthermore, the readability and believability performance analyses are undertaken. The experimental results show that EDGE generates indistinguishable deceptive text content without decreasing readability. In all, EDGE proves effective to generate enticing deceptive text content as deception defense against APTs.

Design of shared digital content economic platform (shaRe:port) using blockchain (블록체인을 활용한 디지털콘텐츠 공유경제 플랫폼(shaRe:port) 설계)

  • Min, Youn-A;Lee, halim;Park, soyoung;Choi, inseon;Baek, Yeong-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.359-360
    • /
    • 2019
  • This paper proposes partial sharing and trading of digital content as a method of sharing blockchain idurium-based digital content. The platform has three characteristics and aims to improve the existing digital content sales platform. First, it increases the efficiency of sharing and trading through partial sharing and trading systems of digital content. Second, it will be built in the form of blockchain idurium-based smart contracts to ensure the accuracy of transactions. Third, it is possible to analyze the form factor of the comments by improving the grading system.

  • PDF

The Cryption Tool Transfer System for Digital Broadcasting Service (디지털 방송 서비스를 위한 암호화 툴 전송시스템)

  • Cao, Ke-Rang;Hwang, Kyung-Min;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1075-1081
    • /
    • 2008
  • The growth of digital content market inducted to develope consuming device of various content. And through this, digital content consuming is more Promoted. But digital content cryption tool need to handle to protect and consume digital content safely. Also, interoperability of cryption tool management is impossible, because of not standardized transfer protocol between device. In this paper, we defined transfer protocol of cryption tool for protecting and consuming digital content. And in this base, we designed and implemented transfer server/client system.

A Study on the Present Condition and Prospect of Architectural Cultural Heritage Content Applied to 3D Digital Technology (3차원 디지털기술 적용 건축문화재 콘텐츠 현황분석 및 전망에 관한 연구)

  • Jung, Sung Ju;Lee, Tae Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.188-198
    • /
    • 2021
  • Digital data was collected using modern three-dimensional digital technology. Current content-specific technologies were investigated through domestic and foreign cases so that three-dimensional digital technology could be applied to the utilization of various contents. First, the use of three-dimensional digital technology of architectural cultural assets has been changing from the restoration of cultural assets. Second, some of the contents produced were found to be underutilized. Third, the type of content has been changing in experience and exhibition, but the online approach was small. Fourth, digital restoration using domestic IT technology has been used as a technology to restore overseas cultural heritage. The fifth analysis of the relationship between the content types and 3D digital technologies shows the use of currently limited technologies. This study analyzed the status of digital architecture and the application of three-dimensional digital technologies to lay the foundation for the active development and utilization of content. Subsequent studies on various layers and digital technologies will be needed to revitalize digital architectural cultural assets in the future.

A Design and Implementation of DRM System by Applying System Authentication Method (시스템 인증기법을 적용한 DRM 시스템 설계 및 구현)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.177-184
    • /
    • 2009
  • The digital contents distribution system via network provides comfortability, usability, and diversified functions to content's users. However, for the characteristic of easy access of digital contents, the copyright infringements and indiscreet contents distribution are realized in this days. In other words, any users with the authentication key can access to copyright contents with any restrictions. To solve this problems, we proposed a user authentication mechanism which prevent indiscreet access to the digital content by using user system information. Also, to provide safe distribution of digital content, we used user's unique content authentication key.

A Study on Contents Preference Prediction Method using Tags based on Content-based Filtering (Tag를 이용한 CBF방식의 컨텐츠 선호도 예측 방법)

  • Um, Tae-Kwang;Choi, Sung-Hwan;Lee, Jae-Hwang
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.613-614
    • /
    • 2008
  • A content recommendation according to users preferences comes up in the Internet application due to contents overwhelming. This paper newly proposes a method to predict contents preference using tags in conjunction with Content-Based Filtering. By implementing this method, this paper cleans up the contents sparsity problem in Content-Based Filtering, and shows the outstanding improvements.

  • PDF

Design and Implementation of a Protection and Distribution System for Digital Broadcasting Contents (디지털 방송 콘텐츠 보호 유통 시스템 설계 및 구현)

  • Lee Hyejoo;Choi BumSeok;Hong Jinwoo;Seo Jongwon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.731-738
    • /
    • 2004
  • With the increase of digital content usages, the protection for digital content and intellectual property becomes more important. The DRM(digital rights management) technologies are applicable to protect not only any kind of digital contents but also intellectual property. Besides such techniques are required for recorded digital broadcasting contents due to introduction of digital broadcasting techniques and storage devices such as personal video recorder. The conventional protection scheme for broadcasting content is the CAS(conditional access system) by which the access of viewer is controlled on the specific channels or programs. The CAS prohibits the viewer from delivering the digital broadcasting content to other person, so it results in restriction of superdistribution on the digital broadcasting content. In this paper, for broadcast targeting unspecfic many people, we will design the service model of the protection and distribution of digital broadcasting content using encryption and license by employing the concept of DRM. The results of implementation are also shown to verify some functions of each component. An implemented system of this paper has some advantages that the recording of broadcast content is allowed on set-top-box and superdistribution is available by consumer. Hence it provides content providers and consumers with trustworthy environment for content protection and distribution.

A Study on the Development of Information Systems for Digital Contents Based on Standard Digital Identifier(SDI) (식별체계기반 디지털콘텐츠 유통체제 구축방안 연구)

  • Seok, Jung-Ho
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.4 s.50
    • /
    • pp.195-210
    • /
    • 2003
  • With the rapid development of information technology and internet in these days, resources of knowledge information have been digitalized and distributed on the internet, However, the location of digital content and a change of content have generated problems for users access and services. In line with this regard, the research on the identification of digital content utilizing standardized identification system and distribution system is necessary. This study intends to contribute to the implementation of information system based on standard digital identifier for the effective management and safe distribution of digital contents. This study first tries to survey SDI outline, practical application case and distributed business model and to analyze information distribution status Finally, this study tries to draw up a plan for the establishment of KISTI's SDI. content identification system, content distribution system.

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.