• Title/Summary/Keyword: user roles

Search Result 273, Processing Time 0.022 seconds

Study on Media Adaptation from a Webtoon to Virtual Reality Content (웹툰의 가상현실 콘텐츠로의 매체 전환에 관한 연구)

  • Park, Hyung-Woong;Kim, Ki-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.308-315
    • /
    • 2017
  • This study aims to review the differences and distinctive characteristics between storytelling method of virtual reality contents and storytelling method of conventional contents instead of focusing on economic and industrial effects of virtual reality contents. As a specific target, this study discusses how existing storytelling method of webtoons as a single contents genre can be applied to virtual reality contents when webtoons are adapted into virtual reality contents. The purpose of this study is to find limitations and possibilities for the storytelling technique of virtual reality contents. The results of this study showed that the essence of storytelling in virtual reality contents is in three roles of the users of virtual reality. The users of virtual reality must play the roles of service user, audience of contents, and director of story. This is because the most important storytelling techniques in media contents like editing and change of camera viewpoint can no longer be forced in virtual reality contents. Storytelling techniques in virtual reality contents are much limited compared to the conventional contents in terms of user interaction, expansion of senses, and guarantee of freedom.

Access Control to XML Documents Based on Hierarchical Key Assignment Scheme (계층적 키 할당 기법을 기반으로 하는 XML 문서의 접근제어)

  • Ban, Yong-Ho;Kim, Jong-Hun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1520-1530
    • /
    • 2005
  • As XML is recognized as a prevalent standard for document representation and exchange in the Internet, the need for security of XML becomes very important issue. Until now researches on XML security have been focused on confidentiality or integrity like encryption and digital signature technology. But, as XML data becomes more massive and complicated, it requires managerial security that decided access permit or deny by the authority oi user who is using the XML data. Thus it requires models and mechanisms enabling the specification and enforcement of access control policies for XML documents. In this paper, we suggest the new access control model and mechanism that separate XML documents by access level, assign roles to each user by applying Role Based Access Control (RBAC) and perform access control to specific documents by encrypting each section with roles. The method, we suggested, has an advantage that it does not need to update the whole keys used in encryption process by updating only the relations between appropriate secure layers.

  • PDF

Database Security System supporting Access Control for Various Sizes of Data Groups (다양한 크기의 데이터 그룹에 대한 접근 제어를 지원하는 데이터베이스 보안 시스템)

  • Jeong, Min-A;Kim, Jung-Ja;Won, Yong-Gwan;Bae, Suk-Chan
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1149-1154
    • /
    • 2003
  • Due to various requirements for the user access control to large databases in the hospitals and the banks, database security has been emphasized. There are many security models for database systems using wide variety of policy-based access control methods. However, they are not functionally enough to meet the requirements for the complicated and various types of access control. In this paper, we propose a database security system that can individually control user access to data groups of various sites and is suitable for the situation where the user's access privilege to arbitrary data is changed frequently. Data group(s) in different sixes d is defined by the table name(s), attribute(s) and/or record key(s), and the access privilege is defined by security levels, roles and polices. The proposed system operates in two phases. The first phase is composed of a modified MAC (Mandatory Access Control) model and RBAC (Role-Based Access Control) model. A user can access any data that has lower or equal security levels, and that is accessible by the roles to which the user is assigned. All types of access mode are controlled in this phase. In the second phase, a modified DAC(Discretionary Access Control) model is applied to re-control the 'read' mode by filtering out the non-accessible data from the result obtained at the first phase. For this purpose, we also defined the user group s that can be characterized by security levels, roles or any partition of users. The policies represented in the form of Block(s, d, r) were also defined and used to control access to any data or data group(s) that is not permitted in 'read ' mode. With this proposed security system, more complicated 'read' access to various data sizes for individual users can be flexibly controlled, while other access mode can be controlled as usual. An implementation example for a database system that manages specimen and clinical information is presented.

A Study on Influence of Spatial Types Based on Public Library Spatial Characteristics (공공도서관 공간 특성에 따른 공간 유형 및 그 영향에 관한 연구)

  • Yook, Jihye;Kim, Giyeong
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.1
    • /
    • pp.111-137
    • /
    • 2016
  • The roles of public libraries have been diverse not only provision of information but also provision of cultural programs. According to this trend, the spatial composition of public libraries have been also changed to reflect the diverse roles. This study is conducted to explore the spatial characteristics in public libraries with two objectives: 1) to suggest spatial types in public libraries based on their physical characteristics, and 2) to explore the relationships between the spatial types and users' perception. To accomplish these objectives, we adopted observation and questionnaire survey as research methods. Consequently, three spatial types of public libraries are identified based on an investigation of several public libraries: divided, partially integrated, and integrated. Then, several statistical analyses, including one-way analysis of variance (ANOVA), are conducted with the questionnaire survey data. The results from the statical analyses show that there are significant differences in users' perceptions and behaviors between the spatial types. That is, the spatial type influences user's perceptions. This study is meaningful in terms of its first attempt to explore the relationships between spatial factors in libraries and users' perceptions. Based on this, it is suggested that libraries should consider their spatial structures for developing user's positive perception on the libraries.

User Satisfaction of Mobile Convergence Device: The Expectation and Disconfirmation Approach (모바일 복합 단말기 사용자 만족: 기대-불일치 접근)

  • Lee, Seung-Chang;Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.10 no.11
    • /
    • pp.89-99
    • /
    • 2012
  • Purpose - Mobile devices, especially mobile terminals capable of telecommunication and wireless connectivity, are leading the advancements in consumer electronics. Digital convergence drives the functions of various devices, such as cellular phones, MP3 players, personal digital assistants, and gaming, into a single device. This trend would continue and applications such as digital audio and video streaming (including personalized content delivery mechanisms) would soon be on a handheld device. As customers want mobile convergence devices, manufacturers are driving new initiatives in the emerging mobile device market. Given the roles played by device design and service content in user satisfaction of a mobile convergence device, this study focuses on identifying and measuring the constructs for the process by which user satisfaction is achieved. This study synthesizes the expectation-disconfirmation paradigm with empirical theories in user satisfaction. Device and service levels are separated, and nine key constructs for user satisfaction of mobile convergence devices are proposed. Insight into this process could help web-based businesses to improve user satisfaction, thus enhancing the effectiveness of e-commerce for sellers and buyers. Research design, data, methodology - This study draws on three users of mobile convergence devices as examples. To test there search model and hypotheses, survey questionnaires were sent to 607 mobile device users. Mobile device users were initially identified from several members, and subjects were randomly drawn. Data from 577 survey responses were finally analyzed. The unit of measurement and analysis in this research study is at a personal level. Results - The measurements for the constructs were developed and tested in a two-phase study. In the first phase, the device and service dimensions were identified, and instruments for measuring them were developed and tested. In the second phase, using the salient dimensions of the device and service as the formulating first-order factors, instruments were developed and empirically tested to measure satisfaction of the device and service. In measuring satisfaction of mobile convergence devices, the critical tasks are to identify the key constructs of such user satisfaction and to develop validated instruments to measure them. Hence, the results of this study have immediate implications for businesses and for research in user satisfaction of mobile convergence devices. Conclusions - This study provides reliable instruments for operationalizing key constructs in the analysis of user satisfaction of mobile convergence devices within the expectation-disconfirmation paradigm. Hence, convergence device makers will be able to examine whether their websites meet their customers' expectations by examining the device aspect of the mobile convergence device customers, and the service aspect expectations and disconfirmation. Moreover, the introduction of expectation and disconfirmation constructs brings the marketing aspect of convergence devices into focus for such retailers, an aspect crucial to the effective design of websites for online businesses. In addition,this study provides the metrics required to initiate future studies on user satisfaction of mobile convergence devices.

  • PDF

Understanding User Motivations and Behavioral Process in Creating Video UGC: Focus on Theory of Implementation Intentions (Video UGC 제작 동기와 행위 과정에 관한 이해: 구현의도이론 (Theory of Implementation Intentions)의 적용을 중심으로)

  • Kim, Hyung-Jin;Song, Se-Min;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.125-148
    • /
    • 2009
  • UGC(User Generated Contents) is emerging as the center of e-business in the web 2.0 era. The trend reflects changing roles of users in production and consumption of contents on websites and helps us to understand new strategies of websites such as web portals and social network websites. Nowadays, we consume contents created by other non-professional users for both utilitarian (e.g., knowledge) and hedonic values (e.g., fun). Also, contents produced by ourselves (e.g., photo, video) are posted on websites so that our friends, family, and even the public can consume those contents. This means that non-professionals, who used to be passive audience in the past, are now creating contents and share their UGCs with others in the Web. Accessible media, tools, and applications have also reduced difficulty and complexity in the process of creating contents. Realizing that users create plenty of materials which are very interesting to other people, media companies (i.e., web portals and social networking websites) are adjusting their strategies and business models accordingly. Increased demand of UGC may lead to website visits which are the source of benefits from advertising. Therefore, they put more efforts into making their websites open platforms where UGCs can be created and shared among users without technical and methodological difficulties. Many websites have increasingly adopted new technologies such as RSS and openAPI. Some have even changed the structure of web pages so that UGC can be seen several times to more visitors. This mainstream of UGCs on websites indicates that acquiring more UGCs and supporting participating users have become important things to media companies. Although those companies need to understand why general users have shown increasing interest in creating and posting contents and what is important to them in the process of productions, few research results exist in this area to address these issues. Also, behavioral process in creating video UGCs has not been explored enough for the public to fully understand it. With a solid theoretical background (i.e., theory of implementation intentions), parts of our proposed research model mirror the process of user behaviors in creating video contents, which consist of intention to upload, intention to edit, edit, and upload. In addition, in order to explain how those behavioral intentions are developed, we investigated influences of antecedents from three motivational perspectives (i.e., intrinsic, editing software-oriented, and website's network effect-oriented). First, from the intrinsic motivation perspective, we studied the roles of self-expression, enjoyment, and social attention in forming intention to edit with preferred editing software or in forming intention to upload video contents to preferred websites. Second, we explored the roles of editing software for non-professionals to edit video contents, in terms of how it makes production process easier and how it is useful in the process. Finally, from the website characteristic-oriented perspective, we investigated the role of a website's network externality as an antecedent of users' intention to upload to preferred websites. The rationale is that posting UGCs on websites are basically social-oriented behaviors; thus, users prefer a website with the high level of network externality for contents uploading. This study adopted a longitudinal research design; we emailed recipients twice with different questionnaires. Guided by invitation email including a link to web survey page, respondents answered most of questions except edit and upload at the first survey. They were asked to provide information about UGC editing software they mainly used and preferred website to upload edited contents, and then asked to answer related questions. For example, before answering questions regarding network externality, they individually had to declare the name of the website to which they would be willing to upload. At the end of the first survey, we asked if they agreed to participate in the corresponding survey in a month. During twenty days, 333 complete responses were gathered in the first survey. One month later, we emailed those recipients to ask for participation in the second survey. 185 of the 333 recipients (about 56 percentages) answered in the second survey. Personalized questionnaires were provided for them to remind the names of editing software and website that they reported in the first survey. They answered the degree of editing with the software and the degree of uploading video contents to the website for the past one month. To all recipients of the two surveys, exchange tickets for books (about 5,000~10,000 Korean Won) were provided according to the frequency of participations. PLS analysis shows that user behaviors in creating video contents are well explained by the theory of implementation intentions. In fact, intention to upload significantly influences intention to edit in the process of accomplishing the goal behavior, upload. These relationships show the behavioral process that has been unclear in users' creating video contents for uploading and also highlight important roles of editing in the process. Regarding the intrinsic motivations, the results illustrated that users are likely to edit their own video contents in order to express their own intrinsic traits such as thoughts and feelings. Also, their intention to upload contents in preferred website is formed because they want to attract much attention from others through contents reflecting themselves. This result well corresponds to the roles of the website characteristic, namely, network externality. Based on the PLS results, the network effect of a website has significant influence on users' intention to upload to the preferred website. This indicates that users with social attention motivations are likely to upload their video UGCs to a website whose network size is big enough to realize their motivations easily. Finally, regarding editing software characteristic-oriented motivations, making exclusively-provided editing software more user-friendly (i.e., easy of use, usefulness) plays an important role in leading to users' intention to edit. Our research contributes to both academic scholars and professionals. For researchers, our results show that the theory of implementation intentions is well applied to the video UGC context and very useful to explain the relationship between implementation intentions and goal behaviors. With the theory, this study theoretically and empirically confirmed that editing is a different and important behavior from uploading behavior, and we tested the behavioral process of ordinary users in creating video UGCs, focusing on significant motivational factors in each step. In addition, parts of our research model are also rooted in the solid theoretical background such as the technology acceptance model and the theory of network externality to explain the effects of UGC-related motivations. For practitioners, our results suggest that media companies need to restructure their websites so that users' needs for social interaction through UGC (e.g., self-expression, social attention) are well met. Also, we emphasize strategic importance of the network size of websites in leading non-professionals to upload video contents to the websites. Those websites need to find a way to utilize the network effects for acquiring more UGCs. Finally, we suggest that some ways to improve editing software be considered as a way to increase edit behavior which is a very important process leading to UGC uploading.

An Extended Role-Based Access Control Model with Multi-level Security Control (다단계 보안통제가 가능한 확장된 역할 기반 접근통제 모델)

  • Yim, Hwang-Bin;Park, Dong-Gue
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.90-96
    • /
    • 2002
  • RBAC(Role-Based Access Control) is an access control method based on the user's role and it provides more flexibility on the various computer and network security fields. But, RBAC models consider only users for roles or permissions, so for the purpose of exact access control within real application systems, it is necessary to consider additional subjects and objects. In this paper, we propose an Extended RBAC model, $ERBAC_3$, for access control of multi-level security system by adding users, subjects, objects and roles level to RBAC, which enables multi-level security control. 

Developing the Web Agent for Supporting and Facilitating Teaching and Learning on the Web (교수-학습 지원을 위한 웹 에이전트(web agent)의 개발)

  • Kang, Shin-Gheon;Han, Seung-Rok;Park, Jung-Whan
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.1
    • /
    • pp.87-94
    • /
    • 2003
  • Recently there are many tries and researches for using web agent in education. The agent is a computer program as a common name which takes a role like a proxy or a middle ware for accomplishing the given something on behalf of user. Lately the agent is being used in the various fields. The teaching and learning is the one of those. It is the web agent that support the teaching and learning on the web. It has a concept of the program or the engine is able to do teachers roles on the behalf of him on the web. Not only the web agent is able to do teachers roles on the behalf of him, but also it is a helper that helps learners on the web. The web based teaching and learning environment has the web agent offers the personal and the adaptive information, interface, or contents.

  • PDF

Extended Role Based Access Control Model (확장된 역할기반 접근통제 모델)

  • 김학범;홍기융;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.47-56
    • /
    • 1999
  • RBAC(Role Based Access Control) is an access control method based on the user's roles and it provides more flexibility and applicability on the various computer and network security fields than DAC(Discretionary Access Control) or MAC(Mandatory Access Control). In this paper, we newly propose ERBAC$_{0}$(Extended RBAC$_{0}$) model by considering subject's and object's roles additionally to REAC$_{0}$ model which is firstly proposed by Ravi S. Sandhu as a base model. The proposed ERBAC$_{0}$ model provides finer grained access control on the base of subject and object level than RBAC$_{0}$ model.

Reciprocal Job and Role Assessments of Planners, Designers, and System Developers of IT Services (IT서비스에 있어서 기획자, 디자이너, 개발자의 업무 및 역할 상호 평가 비교 연구)

  • Lee, Donghee;Lee, Jungwoo
    • Journal of Information Technology Services
    • /
    • v.21 no.1
    • /
    • pp.61-79
    • /
    • 2022
  • In the rapidly changing era of knowledge revolution, user-centered IT services are emerging as a very important component of modern business. However, in order to lead IT services into success, traditional capabilities and competences are not good enough. Development of IT services involve service planners and designers as well as traditional systems developers. This detailed segmentation of job and corresponding competences among involved in IT service development brings in new type of conflicts and contradictions that may require special attention for IT services to be properly development and implemented. This study aims to explore and define competences and roles of newly emerging job groups in IT services: planners, designers, and developers. In order to identify underlying competences of these emergeing groups, two stage interviews were conducted. At the first stage, general competence framework is developed across these groups with different skills for similar competence catogories. Using the categories developed at the first stage, members of each groups were asked to rate and assess the competences of other groups. Comparisons of these reciprocal assessment revealed the conceptual differences and biases across these groups. Detail differences are discussed and implications are discussed.