• Title/Summary/Keyword: international networks

Search Result 1,152, Processing Time 0.024 seconds

The Future and Prospects of NFT Art : On the basis of Actor-Network Theory (NFT 아트의 미래와 전망 : 행위자네트워크 이론을 중심으로)

  • Cheon, Mi Lim;Kim, Hong Kyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.397-405
    • /
    • 2022
  • NFT art is a new art formed based on NFT technology. This is attracting great attention in the existing art world and art market. Therefore, it is required to analyze whether NFT art can establish itself as a new area of art. Therefore, the formation and development process of NFT art is analyzed from the perspective of Actor-Network Theory of Science and Technology and Studies, and the case of NFT artist 'beeple' is a representative example. It also discusses the artistic value of NFT art and its relationship with traditional art networks based on the aesthetics of science and technology researcher Graham Harman. In particular, it analyzes the future and genre sustainability of NFT art through the case of NFT project "Cryptopunks" and "PUNKISM" advocating a new art genre. By analyzing NFT art with ANT, I would like to raise a technical, aesthetic, and philosophical questions and propose a positive prospect as a new art genre.

A Study on the Protection of Creators' Rights Using Social Media for Non-fungible Token Marketplaces (대체 불가능 토큰 마켓플레이스를 위한 소셜미디어를 활용한 창작자 권리 보호 방법에 대한 연구)

  • Lee, Eun Mi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.667-673
    • /
    • 2021
  • Unauthorized generations and sales of non-funable tokens (NFTs) without the consent of the creator is one of the biggest problems that arise in NFT Marketplaces. This study proposes a method to practically reduce the problem of NFT sales without the consent of the creator by means of authentication with social media accounts. Through the proposed method, creators who are already using social media as a means of communication and marketing for creative activities can authenticate with their own accounts. Creators who have difficulty authenticating with their own accounts will be provided with alternatives to authenticate using human networks. In addition, the proposed method of protecting creator rights was designed using a flowchart to enable development using only the public API (Application Programming Interface) provided by social media. The proposed method can protect creators' rights and reduce damage caused by NFT fraud by inducing buyers to trade NFTs of authorized sellers through social media.

Examining the Use of Geotags on Instagram: Motivation, Satisfaction, and Location-based Information Sharing in Hong Kong

  • Chan, Hiu Feng;Cho, Hee Jung;Lee, Hye Eun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.64-77
    • /
    • 2022
  • The advent of location-based social networks (LBSNs), and the pervasive use of smartphones have allowed individuals to easily inform their status through locational information. This led to a new trend in social media: to upload geotagged photos that illustrate the location of the images and then share them with others. In this circumstance, the current study aims to examine the use of geotags on Instagram. Further, the motivations for using geotags as well as the relationship among the motivation, satisfaction, and location information sharing behavior are analyzed. The online survey was conducted on 411 respondents of Hong Kong who are active Instagram users. Based on uses and gratification theory and goal theory, the users' motivations and goals for utilizing geotags were divided into mainly two categories; task-involved and self-involved goals. Then, four different motivations (contribution, memory aid, showing off, and reputation gaining) were further examined. The result indicated that contribution, memory aid, and reputation gaining were the goals and motivation for the users to utilize geotags on Instagram, having a positive impact on satisfaction. However, a positive relationship between showing off and geotag satisfaction was not supported. Among four different factors, memory aid was found to have the strongest influence on geotagging satisfaction. The result of testing the relationship between geotag satisfaction and further location information sharing behavior also turned out to have a positive relationship. The implications and limitations of findings are also discussed in the study.

A Case Study on Commercialization of Appropriate Technology in Lao PDR: Focusing on Lao-Korea Science and Technology Center (라오스 적정기술 사업화 사례연구: 라오스-한국 적정과학기술거점센터를 중심으로)

  • Baek, Doo-Joo;Yun, Chi-Young;Oh, Yong-Jun
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.225-234
    • /
    • 2021
  • The purpose of this paper is to examine commercialization model of appropriate technology through the case of the Lao-Korea Science and Technology Center (LKSTC). LKSTC has developed washing, water treatment, and sterilization technology in the agrifood sector and three types of pico-hydro generator, Pico-solar hybrid system, and energy remote monitoring technology in the renewable energy sector. Commercialization of appropriate technology was successfully carried out through the establishment of Kaipan community business, school enterprises, and social enterprise. The policy implications are as follows. First, the commercialization of appropriate technology in developing countries should enhance the linkage with the regional development policies of the recipient countries. Second, in order to minimize market risk, innovative technology development and local startup networks should be properly established. Finally, the mid and long term efforts are needed to increase the sustainability of the business.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

A Study on Improvement of Pension Operation and Management using Big Data Analysis Techniques (빅데이터 분석기법을 활용한 숙박업체 운영 개선 방안에 대한 연구)

  • Yoon, Sunhee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.815-821
    • /
    • 2021
  • The advantage of big data is to collect a large amount of data on the Internet and refine and use valuable data. That is, the unstructured data is processed so that the user can analyze and utilize it from a necessary point of view. This paper is a relatively small project and is based on unstructured data that can be closely applied to real life and used for marketing. The subjects of the experiment were modeled on lodging companies in the Seoul metropolitan area an hour away from Seoul, and analyzed for the increase in lodging rates before and after marketing using big data. As an experiment that shows the effects of increasing sales, reducing costs, and increasing returns by users, we propose a system to determine and filter whether data input in the process of analyzing big data such as social networks can be used as accommodation-related information.

Implementation of Public Address System Using Anchor Technology

  • Seungwon Lee;Soonchul Kwon;Seunghyun Lee
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.1-12
    • /
    • 2023
  • A public address (PA) system installed in a building is a system that delivers alerts, announcements, instructions, etc. in an emergency or disaster situation. As for the products used in PA systems, with the development of information and communication technology, PA products with various functions have been introduced to the market. PA systems recently launched in the market may be connected through a single network to enable efficient management and operation, or use voice recognition technology to deliver quick information in case of an emergency. In addition, a system capable of locating a user inside a building using a location-based service and guiding or responding to a safe area in the event of an emergency is being launched on the market. However, the new PA systems currently on the market add some functions to the existing PA system configuration to make system operation more convenient, but they do not change the complex PA system configuration to reduce facility costs, maintenance, and management costs. In this paper, we propose a novel PA system configuration for buildings using audio networks and control hierarchy over peer-to-peer (Anchor) technology based on audio over IP (AoIP), which simplifies the complex PA system configuration and enables convenient operation and management. As a result of the study, through the emergency signal processing algorithm, fire broadcasting was made possible according to the detection of the existence of a fire signal in the Anchor system. In addition, the control device of the PA system was replaced with software to reduce the equipment installation cost, and the PA system configuration was simplified. In the future, it is expected that the PA system using Anchor technology will become the standard for PA facilities.

Measuring the Impact of Supply Network Topology on the Material Delivery Robustness in Construction Projects

  • Heo, Chan;Ahn, Changbum;Yoon, Sungboo;Jung, Minhyeok;Park, Moonseo
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.269-276
    • /
    • 2022
  • The robustness of a supply chain (i.e., the ability to cope with external and internal disruptions and disturbances) becomes more critical in ensuring the success of a construction project because the supply chain of today's construction project includes more and diverse suppliers. Previous studies indicate that topological features of the supply chain critically affect its robustness, but there is still a great challenge in characterizing and quantifying the impact of network topological features on its robustness. In this context, this study aims to identify network measures that characterize topological features of the supply chain and evaluate their impact on the robustness of the supply chain. Network centrality measures that are commonly used in assessing topological features in social network analysis are identified. Their validity in capturing the impact on the robustness of the supply chain was evaluated through an experiment using randomly generated networks and their simulations. Among those network centrality measures, the PageRank centrality and its standard deviation are found to have the strongest association with the robustness of the network, with a positive correlation coefficient of 0.6 at the node level and 0.74 at the network level. The findings in this study allows for the evaluation of the supply chain network's robustness based only on its topological design, thereby enabling practitioners to better design a robust supply chain and easily identify vulnerable links in their supply chains.

  • PDF

A Study of Forensic on Eavesdropping from VoIP and Messenger through WiBro Network (WiBro 네트워크에서 메신저, VoIP 도청 및 포렌식 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.149-156
    • /
    • 2009
  • Korean WiBro becomes international standard to IEEE 802.16e, and We are carrying out a WiBro network business from capital regions. We executed eavesdropping about voices and messenger program and the VoIP which frequently happened in WiBro networks at these papers. We have a lot in common with the Wireshark which is a packet collection and an analyzer, and We execute eavesdropping, and We reproduce eavesdropping data with bases to a SIP, H.263, TCP, UDP protocol through packets. In time of a copy of a packet negative the VoIP which verify time with bases, and was eavesdropped on integrity packet and a X-Lite call record, be matched that a packet is counterfeit forgery did not work, and We demonstrate, and verify integrity. The data which integrity was verified put in a seaming envelope, and we prepare so as it is to a liver of investigator, and execute, and to be able to do use to proof data after seaming in courts in order to utilize as criminal investigation data.

The Impact of the User Characteristics of the VR Exhibition on Space Participation and Immersion

  • Wang, Minglu;Lee, Jong-Yoon;Liu, Shanshan
    • International Journal of Contents
    • /
    • v.18 no.1
    • /
    • pp.1-16
    • /
    • 2022
  • With the advent of the 5G, networks and information and communication technologies have been continuously developed. In the fields of art galleries, virtual reality (VR) exhibitions that can be visited online have emerged, innovating the way of human-computer interaction and creating new artistic experiences for users. This study explores the three-dimensionality, clarity, and innovative interactions that users experience when viewing a VR exhibit, which affects the exhibit's presence. Besides, in terms of research method, the research sets spatial participation and immersion as dependent variables, with three-dimensionality (high versus low), clarity (high versus low), and innovation (high versus low) in a 2×2×2 design as the base, and explores their interaction effects. The results show that three-dimensionality and innovative interactions affect spatial participation. First of all, in groups with high innovation and low three-dimensionality, spatial participation presents a higher positive factor. Secondly, with regard to immersion, three-dimensionality, clarity and innovation present a tripartite interaction. Groups with low three-dimensionality and high clarity have a higher positive effect on immersion when the level of innovation is low. When the degree of innovation is high, the positive effect on immersion is higher in groups with high three-dimensionality and low clarity. The above results show that in the production of VR exhibitions, it is necessary to increase the three-dimensionality and clarity of exhibited image contents, while taking into account the user's perception and innovativeness. On the other hand, this study puts forward suggestions for the design, content and future development of VR exhibitions, which has important reference significance for the improvement and innovation of future VR exhibitions.