• Title/Summary/Keyword: internet users

Search Result 4,159, Processing Time 0.029 seconds

Comparison and Analysis of FPS Mobile Game Interaction Design (FPS타입모바일게임의 인터랙션 디자인 비교 분석에 관한 연구)

  • Wang, Shi-Yu;Pan, Young-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.12
    • /
    • pp.31-37
    • /
    • 2020
  • The rapid development of the mobile internet has gradually changed the carrier of electronic games from PC to mobile. mobile games have become an excellent choice for many people to spend their spare time and enjoy life. Among many types of mobile games, Number of users of FPS games has increased rapidly in recent years. Based on the 《Emotional Design》 proposed by Donald Norman, this article compares the interaction design of China's most popular FPS game 《Game for peace》 and Korea's most popular FPS game 《PUBG》, and analyzes their similarities and differences, and then use that as a basis to summarize the three levels of emotional design-Visceral level, Behavior level, and Reflection level, which is the user interface, interaction mode, and interaction experience in interaction design Emotional expression on the two games. This theory provides suggestions for interactive design in the information industry such as mobile games.

Attractiveness Valuation of Phenomenal Architectural Aesthetic by Mixing the Fuzzy Logic with Contingent Valuation - Availing the Use Fares of Facility within Nodle Islet Cultural Center as Valuation Scale - (퍼지논리와 가상가치법 혼합을 통한 현상적 건축미의 매력가치 - 노들섬 문화센터 시설이용료를 가치 척도로 -)

  • Lee, Dong-Joo;Ko, Eun-Hyung
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.5
    • /
    • pp.3-10
    • /
    • 2018
  • The purpose of this study is to estimate the attractiveness value according to the preference level on architectural aesthetic. This research starts from the concept that aesthetic is phenomenon and from the viewpoint of 'attraction value' which affects goods. Interactive internet surveys were conducted for 500 citizens of Seoul metropolitan city who are potential users of the Nodle Islet Cultural Center. Based on the scenarios and questionnaires with fuzzy models, we have examined the evaluation of architectural aesthetic and monetary willing-to-payment, and estimated the economic value by preference level of architectural aesthetic through linear regression analysis. The main results of the study are as follows: First, the economic value of the Nodle Islet Cultural Center was estimated at ?15,683.43/person. Residents of Seoul metropolitan city were willing to accept the increase in the above-mentioned amount of the facility fares when their preferred works (average 86.81 points) were constructed. (P <0/05) Second, it is confirmed that the economic value increases dramatically as the preference level of architectural aesthetic increases. Third, it is presumed that the infinite valuation of architectural aesthetic and the problem of free riding coexist in the estimation of economic valuation of architectural aesthetic for public buildings. Fourth, by mixing the fuzzy logic with contingent valuation method, starting point bias and no response biases that happened in contingent valuation could be disappeared. bias elimination must be considered seriously because another bias could be happened in full process of the research. The results of this study will serve as a basis for spreading architectural aesthetic value-oriented research from the vague and obscure aesthetic-centered discussion on the existing architectural aesthetic. In addition, it will be an opportunity to draw institutional application and utilization strategy of architectural aesthetic through architectural aesthetic value research.

DDoS traffic analysis using decision tree according by feature of traffic flow (트래픽 속성 개수를 고려한 의사 결정 트리 DDoS 기반 분석)

  • Jin, Min-Woo;Youm, Sung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.1
    • /
    • pp.69-74
    • /
    • 2021
  • Internet access is also increasing as online activities increase due to the influence of Corona 19. However, network attacks are also diversifying by malicious users, and DDoS among the attacks are increasing year by year. These attacks are detected by intrusion detection systems and can be prevented at an early stage. Various data sets are used to verify intrusion detection algorithms, but in this paper, CICIDS2017, the latest traffic, is used. DDoS attack traffic was analyzed using the decision tree. In this paper, we analyzed the traffic by using the decision tree. Through the analysis, a decisive feature was found, and the accuracy of the decisive feature was confirmed by proceeding the decision tree to prove the accuracy of detection. And the contents of false positive and false negative traffic were analyzed. As a result, learning the feature and the two features showed that the accuracy was 98% and 99.8% respectively.

Data Privacy Law and International Human Rights Regime: An Event History Analysis on the Diffusion of Data Privacy Law(1960~2011) (정보보호법의 전 세계적인 확산에 관한 연구: 국제인권레짐 효과를 중심으로)

  • Yoo, Eunhye
    • 한국사회정책
    • /
    • v.20 no.3
    • /
    • pp.117-140
    • /
    • 2013
  • This research focuses on the effects of international and national factors on the legislation of data privacy law in 117 countries from 1960 to 2011. Previous research on data privacy law usually put its emphasis on the contents of data privacy law, legal interpretation of data privacy law or legal cases; yet it lacks academic approaches from human rights perspectives. This paper points out the diffusion of data privacy law in nation states and analyzes the effects of national international factors affecting the legislation of data privacy law using an event history analysis. It turns out that the increasing number of internet users and international human rights regime are positively associated with the likelihood of having data privacy law. Contrary to our hypotheses, FDI, internal human rights practices, and the level of high technology do not show any effects on the likelihood of having a data privacy law.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.

Anonymous Remote User Authentication Scheme with Smart Card (익명성을 제공하는 스마트카드 사용자 인증 프로토콜)

  • Kim, Se-Il;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.139-144
    • /
    • 2007
  • Due to the increasing use of Internet and spread of ubiquitous environment the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users. In the study of authentication system using a smart card which is one of the methods for protecting private information, the main idea is to offer user anonymity. In 2004, Das et al. suggested an authentication system that guarantees anonymity by using a dynamic ID for the first time. However, this scheme couldn't guarantee complete anonymity as the identity of the user became revealed at log-in phase. In 2005, Chien at al. suggested a authentication system that guarantees anonymity, but this was only safe to the outsider(attacker). In this paper, we propose a scheme that enables the mutual authentication between the user and the sewer by using a smart card. For the protection of the user privacy, we suggest an efficient user authentication system that guarantees perfect anonymity to both the outsider and remote server.

Performance Evaluation of VoIP Security Protocols (VoIP를 위한 보안 프로토콜 성능 평가)

  • Shin, Young-Chan;Kim, Kyu-Young;Kim, Min-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.109-120
    • /
    • 2008
  • VoIP utilizes the Internet for the services, and therefore it is vulnerable to intrusions and attacks. Because provided services deal with information related to privacy of users, it requires high level security including authentication and the confidentiality/integrity of signaling messages and media streams. However, when such a protocol is implemented in a VoIP phone, the implementation can have limitations due to the limited resources. The present study purposed to implement VoIP security protocols and to evaluate their performance in terms of connection quality and voice quality by applying them to SIP proxy and UA (User Agent). In the result of performance evaluation, the application of the security protocols did not lower voice quality, but connection quality was high in the DTLS based security protocol. As the protocol was applicable to signaling and media paths based on DTLS, we found that it can be a solution for the limited resources of VoIP phone.

Cognitive Approach to Anti-Phishing and Anti-Pharming (피싱 및 파밍 방지를 위한 인지 기반의 접근 방법)

  • Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.113-124
    • /
    • 2009
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser, but they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or pharming is presented, using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or pharming, but observes if there were HTML code changing between plug-ins and a server.

One-Time Virtual Card Number Generation & Transaction Protocol using Integrated Authentication Center (통합인증센터를 활용한 일회용 가상카드번호 생성 및 결제서비스 프로토콜)

  • Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.9-21
    • /
    • 2010
  • Recently, famous online shopping websites were hit by hacking attack, and many users' personal information such as ID, password, account number, personal number, credit card number etc. were compromised. Hackers are continuing to attack online shopping websites, and the number of victims of these hacking is increasing. Especially, the exposure of credit card numbers is dangerous, because hackers maliciously use disclosed card numbers to gain money. In 2007 Financial Cryptography Conference, Ian Molly et al. firstly proposed dynamic card number generator, but it doesn't meet reuse resistant. In this paper, we analyzed security weaknesses of Ian Molly's scheme, and we proposed a new one-time virtual card number generator using a mobile device which meets security requirements of one-time virtual card numbers. Then, we propose one-time credit card number generation and transaction protocol using Integrated Authentication Center for user convenience and security enhancement.

An Evaluation Management System Using Blockchain

  • Lee, Su-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.229-235
    • /
    • 2021
  • Blockchain, recognized as one of the core technologies of the 4th industrial revolution, is an Internet-based distributed data management system which does not require centralized control. Blockchain is characterized by the integrity and reliability of information, and blockchains can be used where such characteristics are required. Typical applications of blockchain include finance, transaction, and evaluation management. In this paper, we designed a blockchain-based evaluation management system that allows users to freely create and manage evaluation instances. Evaluation managers can create an evaluation instance according to their purpose and allocate evaluation items and evaluators. When the evaluators finish evaluating the evaluation items, the evaluation manager can aggregate the evaluation results for the instance. Someone, who want to perform evaluation for various purposes but do not have an evaluation system, can implement the evaluation system relatively simply by using this system. In addition, due to the characteristic of the blockchain, evaluators cannot modify the evaluation scores they have already recorded, and neither the system administrator nor the evaluation administrator can modify the evaluation scores. For this reason, the reliability of the evaluation increases.