• Title/Summary/Keyword: digital environments

Search Result 1,185, Processing Time 0.029 seconds

An exploratory study on the interaction between luxury brands and customers in service encounters (서비스 접점에서 럭셔리 브랜드와 고객과의 상호작용에 관한 탐색적 연구)

  • Minjung, Cho;Eunju, Ko
    • Journal of Fashion Business
    • /
    • v.26 no.5
    • /
    • pp.49-61
    • /
    • 2022
  • Advancements in technology and the proliferation of digital services have highlighted the importance of luxury brands in service environments. Based on the social exchange theory, this study investigated the interaction between customers and luxury brands in a traditional offline service encounter and a digital online service encounter. The interaction area was classified into three parts: human-human, human-digital, and human-physical environments. We qualitatively investigated the practitioners' working experiences with luxury brands. The study determined that both online and offline service encounter interactions between luxury brands and customers have become diverse. First, forming a special relationship with customers and frontline employees in traditional service encounters is important. Second, luxury brands should focus on the interaction among customers. Third, various digital tools should be considered to provide information about the brand to customers. Fourth, the exclusive benefits of offline service encounters should be maximized to stimulate positive experiences. The findings provide valuable insight to scholars and marketers on the new interaction phase between customers and luxury brands in the digital age.

A Study to Suggest a Method to Evaluate Light Environment Energy Performance based on Actual Residence Environments (실거주환경 기반 빛환경 에너지 성능평가 방법 제안 연구)

  • Gim, Sang-Hoon;Lee, Heang-Woo;Kim, Yong-Seong
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.13 no.4
    • /
    • pp.33-39
    • /
    • 2013
  • As lighting energy consumption in buildings occupies high ratio, technical researches to solve it have been constantly carried out. However, basic studies on light environment performance evaluation is actually deficient and only at a level of a simple illumination monitoring. Thus, this study has suggest a light environment energy performance evaluation based on actual residence environments to allow setting lighting interoperation and user required illumination. Conclusions from the study are as follows: 1) As the performance evaluation suggested by this study has not only derived lighting energy usage as well as monitored simple indoor illumination distribution, it is quantitative and allows derivation of visual results. 2) The performance evaluation suggested by this study allows inputs of user required illumination through the performance evaluation server, which is able to support for performance evaluations for various works and users. 3) This study has verified validity of the performance evaluation method by analyzing results of lighting energy reduction by executing performance evaluation on changes of light shelf that is a natural lighting system through the suggested performance evaluation method. This study is significant from a viewpoint that it has suggested a quantitative performance evaluation method on the basis of actual residence environments. Those researches concerned on the energy performance evaluation should be constantly progressed from an aspect that they are another solution of the energy problems.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

Intergrating Security Model for Mobile-Grid (Mobile-Grid 환경에서의 통합 보안 모델)

  • Kang, Su-Youen;Lee, Sung-Young
    • Proceedings of the KIEE Conference
    • /
    • 2002.11c
    • /
    • pp.585-588
    • /
    • 2002
  • Grid provides integral ing system that enables to use distributed computing resource and services as adapts traditional infrastructures to overcome the distributed computing environments. But, computing today is moving away from a restriction of the desktop, becoming diffused into our surrounding and onto our personal digital devices. In such mobile computing environments, users expects to access resource and services at any time from anywhere in such Mobile-Grid computing. This expectation results security issues, since the computing environments is expanded. This paper describes the security challenges in Mobile-Grid computing, explaining why traditional security mechanism fail to meet the demands of these environments. This paper describes policy driven security mechanism enabled entity to use service and data in trust Mobile-Grid environments and a set of security service module that need to be realized in the Mobile-Grid security architecture presents a set of use pattern that show hew these modules can be used for billing service in a secure Mobile-Grid environments.

  • PDF

Implementation of Digital Contents Safety Trade System using Encryption Technology (암호 기술을 이용한 디지털 콘텐츠 안전 거래 시스템 구현)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.119-125
    • /
    • 2013
  • The amount of digital content grows exponentially by the development of the internet and the change of computing environments and the target also is getting wider. The industry using this digital content has been growing greatly. However, the distribution of pirated digital content is increasing using internet because digital content is easy to store and transmit and the damage is growing. In this paper, we propose safety trading system which can conceal the author's information safely in digital content in order to block illegal distribution of digital content. ARIA encryption algorithm is used to protect the concealed information of author in digital content and it is a help to track the illegal traders by doing fingerprinting of buyer information to digital content and managing the transaction information. The technical support for copyright dispute is to allow by providing the capability to verify illegal edit to original digital contents.

Blockchain Evaluation Indexes and Methods to Vitalize a Blockchain-based Digital Sharing Economy (블록체인 기반 디지털 공유경제 활성화를 위한 블록체인 평가지표 및 평가방법에 대한 연구)

  • Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.193-200
    • /
    • 2018
  • Recently, there are high expectations of a society benefitting from a digital sharing economy. However, to establish a digital sharing economy, one needs to first create a reliable social structure. Transparency is recognized as the most important measure of value in not just politics or economics, but also in all domains of our lives. Although all nations strive to create "societies based on credit and trust," in truth, rigidity, irregularity, corruption, and inefficiency are widespread in all aspects of society. Thus, there is a growing interest in blockchain technology, also called the "second Internet revolution," seeking trust in digital environments, although it is difficult to obtain trust in such environments. However, the principles and methods of evaluating blockchain technologies are still unclear and not standardized. This study addresses the evaluation indexes such as transaction per second, maximum data size per one transaction, accuracy and blockchain technology application methods in the digital sharing economy and suggest ways to safely vitalize a blockchain-based digital sharing economy.

An Emergency Alert Message Broadcasting System using Null-Packet on Digital TV Broadcasting

  • Kim, Yoo-Won;Park, Seung-Bo;Hong, Myung-Duk;Jo, Geun-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.12
    • /
    • pp.1767-1777
    • /
    • 2010
  • In digital TV broadcasting, such as terrestrial, cable, satellite, and IPTV, the head-end of digital TV broadcasting has a more complicated transmission structure than that of analog TV broadcasting. Furthermore, digital TV broadcasting has a feature that supports multiplex models, such as Multiple Program Transport Stream (MPTS). Therefore, the purpose of our work was to design and examine a more efficient new system of emergency alert message transmission to support the digital TV broadcasting environments. Digital TV broadcasting is the IP generation or RF transmission of 8-VSB, QAM, and QPSK modulated through a multiplexer or re-multiplexer multiplexed stream as a MPEG-2 Transport Stream after content encoding. The new system proposed in this paper transmits an emergency alert message without scrambling after replacing the PID and payload of the -packet with the message prototype in the TS stream from the multiplexer. If we need to transmit an emergency alert message under digital TV broadcasting services, then the receiver first checks the PID of each packet in the TS stream for the emergency alert message. Next, if a packet is determined to be an emergency alert message, then the set-top box displays the message on the TV screen using its function of On Screen Display, or the PC based software displays the message on the monitor screen using its function of overlay with user interface if the packet is found to be an emergency alert message. We have designed an emergency alert message protocol and a system model. By experiments and analysis of the system, we concluded that the system achieved efficiency and the ability to send and receive emergency alert messages using the system under different digital TV broadcasting service environments.

Merging Features and Optical-NIR Color Gradient of Early-type Galaxies

  • Kim, Du-Ho;Im, Myeong-Sin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.1
    • /
    • pp.41.2-41.2
    • /
    • 2012
  • It has been suggested that merging plays an important role in the formation and the evolution of early-type galaxies (ETGs). Optical-NIR color gradients of ETGs in high density environments are found to be less steep than those of ETGs in low density environments, hinting frequent merger activities in ETGs in high density environments. In order to examine if the flat color gradients are the result of dry mergers, we studied the relations between merging features, luminosities, environments and color gradients of 196 low redshift ETGs selected from Sloan Digital Sky Survey (SDSS) Stripe82. Near Infrared (NIR) images are taken from UKIRT Infrared Deep Sky Survey (UKIDSS) Large Area Survey (LAS). Color (r-K) gradients of ETGs with tidal features are a little flatter than relaxed ETGs, but not significant. We found that massive (> 10^11.3 solar masses) ETGs have -40% less scattered color gradients than less massive ETGs. The less scattered color gradients of massive ETGs could be evidence of dry merger processes in the evolution of massive ETGs. We found no relation between color gradients of ETGs and their environments.

  • PDF