• Title/Summary/Keyword: web identity

Search Result 129, Processing Time 0.024 seconds

A Study on Visual Identity of Professional Baseball Uniforms in Korea, America, and Japan - Focused on Color - (한·미·일 프로야구 유니폼의 비주얼 아이덴티티 연구 - 색채를 중심으로 -)

  • Lim, Songmi;Lee, Misuk
    • Journal of Fashion Business
    • /
    • v.17 no.2
    • /
    • pp.117-135
    • /
    • 2013
  • With the growth of mass media, professional baseball teams have strived to keep up team's tradition and individuality and build a distinctive image through sports marketing using visual identity. Among others, a baseball uniform is used as a sports marketing tool more than an uniform. Uniform color acts as a distinctive element in team's uniform design and is effective to raise attention, manifest a positive image to spectators, and increase trust and affinity. This study aims to compare and analyze color characteristics and images of professional baseball uniforms in America, Japan, and Korea as visual identity. For this, literature review was made on the history of baseball, uniforms, sports marketing, and visual identity, and then color characteristics and images were analyzed on professional baseball away uniforms in Korea, America, and Japan collected in Internet and official web sites. The results are as follows. First, for color characteristics of professional baseball uniforms, the most frequently used color was R(V) color in Korea, ltGy color in America, and Bk color in Japan. Second, for color images of professional baseball uniforms, the most frequently used image was a casual image in Korea, a dandy image in America, and a modern image in Japan.

Technique of Information Security for Users against Phishing Attacks (피싱 공격에 대한 사용자 정보보호 방안)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.736-739
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attacks. To this end, AntiPhish tracks the sensitive information of a user and generates warnings whenever the user attempts to give away this information to a web site today requires only the server to be hat is considered untrusted.

  • PDF

Color Strategies for SPA Brand Identity -Focused on 2013 S/S- (SPA 브랜드 아이덴티티를 위한 컬러 활용 전략 -2013년 S/S 시즌을 중심으로-)

  • Park, SYoojeong;Ha, Jisoo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.5
    • /
    • pp.672-682
    • /
    • 2015
  • SPA brands have quickly expanded in domestic fashion markets as native SPA brands enter markets that foreign SPA brands previously occupied. It is important that each SPA brand establish its own brand identity to differentiate itself from other brands when SPA brand competition in fashion markets increases. This study investigates how SPA brands express brand identities through colors due to their importance for visualization strategies and brand identity. This study conducted a simultaneous literature study and case study. First, this study reviewed the theoretical background of brand identity and its relationship with colors as well as SPA brands by studying relevant literature and cases of domestic academic theses and data on Internet web sites. After reviewing the theoretical background of SPA brands, this study selected 4 stores of SPA brands (8SECONDS, H&M, UNIQLO, and ZARA) as case study targets and analyzed the stores' external appearance, interior and product colors. Store analysis divided colors into identity colors and trend colors with each SPA company expressing its own brand identity through: the store's external appearance (logo color), painted interior colors (ceiling, floor, walls, mannequins, hangers, equipment, and store-carrier bag), or trend colors (reflected in the store's main display hall or products). The results consider that each SPA brand sets the mass market as their target, and chooses the commercialization of latest fashion by selecting the latest trends in the fashion trend cycle, so its products do not reflect characteristics symbolizing the company's uniqueness and brand.

Open Research Problem for effective IoT Authentication

  • Mihir Mehta;Kajal Patel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.174-178
    • /
    • 2024
  • IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.

Change Acceptable In-Depth Searching in LOD Cloud for Efficient Knowledge Expansion (효과적인 지식확장을 위한 LOD 클라우드에서의 변화수용적 심층검색)

  • Kim, Kwangmin;Sohn, Yonglak
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.171-193
    • /
    • 2018
  • LOD(Linked Open Data) cloud is a practical implementation of semantic web. We suggested a new method that provides identity links conveniently in LOD cloud. It also allows changes in LOD to be reflected to searching results without any omissions. LOD provides detail descriptions of entities to public in RDF triple form. RDF triple is composed of subject, predicates, and objects and presents detail description for an entity. Links in LOD cloud, named identity links, are realized by asserting entities of different RDF triples to be identical. Currently, the identity link is provided with creating a link triple explicitly in which associates its subject and object with source and target entities. Link triples are appended to LOD. With identity links, a knowledge achieves from an LOD can be expanded with different knowledge from different LODs. The goal of LOD cloud is providing opportunity of knowledge expansion to users. Appending link triples to LOD, however, has serious difficulties in discovering identity links between entities one by one notwithstanding the enormous scale of LOD. Newly added entities cannot be reflected to searching results until identity links heading for them are serialized and published to LOD cloud. Instead of creating enormous identity links, we propose LOD to prepare its own link policy. The link policy specifies a set of target LODs to link and constraints necessary to discover identity links to entities on target LODs. On searching, it becomes possible to access newly added entities and reflect them to searching results without any omissions by referencing the link policies. Link policy specifies a set of predicate pairs for discovering identity between associated entities in source and target LODs. For the link policy specification, we have suggested a set of vocabularies that conform to RDFS and OWL. Identity between entities is evaluated in accordance with a similarity of the source and the target entities' objects which have been associated with the predicates' pair in the link policy. We implemented a system "Change Acceptable In-Depth Searching System(CAIDS)". With CAIDS, user's searching request starts from depth_0 LOD, i.e. surface searching. Referencing the link policies of LODs, CAIDS proceeds in-depth searching, next LODs of next depths. To supplement identity links derived from the link policies, CAIDS uses explicit link triples as well. Following the identity links, CAIDS's in-depth searching progresses. Content of an entity obtained from depth_0 LOD expands with the contents of entities of other LODs which have been discovered to be identical to depth_0 LOD entity. Expanding content of depth_0 LOD entity without user's cognition of such other LODs is the implementation of knowledge expansion. It is the goal of LOD cloud. The more identity links in LOD cloud, the wider content expansions in LOD cloud. We have suggested a new way to create identity links abundantly and supply them to LOD cloud. Experiments on CAIDS performed against DBpedia LODs of Korea, France, Italy, Spain, and Portugal. They present that CAIDS provides appropriate expansion ratio and inclusion ratio as long as degree of similarity between source and target objects is 0.8 ~ 0.9. Expansion ratio, for each depth, depicts the ratio of the entities discovered at the depth to the entities of depth_0 LOD. For each depth, inclusion ratio illustrates the ratio of the entities discovered only with explicit links to the entities discovered only with link policies. In cases of similarity degrees with under 0.8, expansion becomes excessive and thus contents become distorted. Similarity degree of 0.8 ~ 0.9 provides appropriate amount of RDF triples searched as well. Experiments have evaluated confidence degree of contents which have been expanded in accordance with in-depth searching. Confidence degree of content is directly coupled with identity ratio of an entity, which means the degree of identity to the entity of depth_0 LOD. Identity ratio of an entity is obtained by multiplying source LOD's confidence and source entity's identity ratio. By tracing the identity links in advance, LOD's confidence is evaluated in accordance with the amount of identity links incoming to the entities in the LOD. While evaluating the identity ratio, concept of identity agreement, which means that multiple identity links head to a common entity, has been considered. With the identity agreement concept, experimental results present that identity ratio decreases as depth deepens, but rebounds as the depth deepens more. For each entity, as the number of identity links increases, identity ratio rebounds early and reaches at 1 finally. We found out that more than 8 identity links for each entity would lead users to give their confidence to the contents expanded. Link policy based in-depth searching method, we proposed, is expected to contribute to abundant identity links provisions to LOD cloud.

Color Image Analysis of Cosmetic Web-Site for Color Marketing

  • Lee, Jeongman;An, Jongsuk
    • Journal of Fashion Business
    • /
    • v.16 no.6
    • /
    • pp.127-143
    • /
    • 2012
  • This study aims to derive the sensitive image analysing the color tones based on the web-sites of cosmetic brand and to know how the web-site color tones and the color tone image as visual factor for information transfer do influence the effective communication. 10 cosmetic brand web-sites are selected based on the pre survey, and the main page color tones of cosmetic brand web-site are analyzed by Color Catch and Munsell Conversion program, whereas the composition of color tones and color image such as the main trend colors, secondary colors, accent colors and etc are analyzed by a graphic professional program 'Adobe Photoshop'. 5 color tone groups are classified as Black&White, Green&White, Blue&White, Purple&White and Red&White according to the color distribution chart, and the emotional language is derived applying them to the pre research and IRI image scale. The color association is empirically analyzed by a survey method. The study results finally show Black&White is proper for expression of high quality and modern image, Green&White for pure and clean image, Blue&White for cool and transparent image, Purple&White for mysterious and elegant image respectively. This study results are necessary for plan of color delivering the strong transferring power of visual information the time when to make the effective web-sites, and it hopefully will be utilized as the basic data for the color marketing to actively express the brand identity and to satisfy the consumers' sensitivity.

Self-esteem of Adolescents and Web Cyber Culture Style - the Users' Avatars of Online Game - (청소년의 자아존중감과 웹 사이버문화 - 온라인 게임의 아바타 사용자 중심으로 -)

  • Lee, Hyang-Jai;Han, Ji-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.197-204
    • /
    • 2009
  • This study aims to examine the realistic self-esteem of adolescents and perception of adolescents toward avatar in an attempt to understand basic aspects of their distinctive lifestyle fundamentally relative to the cyber culture on the web, given that the adolescent which is significant in forming self-esteem period plays an important role in the psychological aspect of adolescents. As for method of research, this study analyzed the self-esteem of users, their preference for avatar, and the perception toward avatar, in order to understand their psychological and social maturity. The result of study indicated that the increased self-esteem in reality among the adolescents led to the increased preference for avatar relative to the cyber culture on the web, which in turn increased the recognition of others' avatars. Those findings suggest that adolescents tend to assign self-esteem to avatar as great as themselves. Thus, it may be important to help adolescents form their self identity from the perspective psychological maturity, so that a sound and healthy web culture can be formed depending on the formation and level of self-esteem among adolescents.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Study on the Web Novel Writer's Identity as a Media Content Producer: An In-Depth Interview and Self-description (미디어 콘텐츠 생산자로서 웹소설 작가의 정체성 연구: 심층 인터뷰와 자기기술지를 중심으로)

  • Kim, Mi-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.658-675
    • /
    • 2022
  • With the advent of the OTT platform, the world has become an era in which the same media content is shared and reacted in real time by being grouped into one culture. This study attempts a producer study of web novel writers, who are producers of the web novel market that is expanding into webtoons, dramas, and movies with IP (intellectual property rights) of the original story at a time when Korean K-content such as "Squid Game" and "Weird Lawyer Woo Young-woo" leads the global market. In this study, web novel writers were viewed as producers of commercial media content, not just 'Novelist', and their identities and characteristics of the labor process were examined. Web novel writers began writing web novels as a side job or two jobs, and cited the fact that they can make profits alone without barriers to entry and without incurring capital or facility costs. Although there is no barrier to entry, most writers experience severe failure in their first work, which is attributed to the misunderstanding that the word "writer" is someone who writes what they want in any genre. Web novels are different, so writers go through the process of realizing that in order to succeed by writing web novels, they must be thoroughly in the audience's shoes and write them according to the trends and codes they want. Web novel writers expressed their identity as "story sellers," "story producers," "people who can produce IP alone," and "people who satisfy fantasies that cannot be achieved in reality," and in common, there was a strong sense of being a person who provides stories and makes profits or sales. Regarding the burden of writing a huge amount of web novels, the writer with a high income expressed a generous position that "the income is higher than the effort," but ordinary writers complained of difficulties in the hard work, saying, "It seems like I am working hard on writing that I have to write constantly.

Digital Camera Consumers' Self-Expression and Communication in Cyberspace Using Ethnographic Interviews (가상공간에서의 디지털 카메라 소비자의 자기표현과 의사소통 :문화기술적 방법을 이용하여)

  • Lee, Mee-Hye;Yoon, Jung-Hai
    • Journal of Families and Better Life
    • /
    • v.25 no.2 s.86
    • /
    • pp.71-87
    • /
    • 2007
  • It is necessary to understand a self-expression and communication in cyberspace using digital photography We have studied the digital camera consumer's self-expression and communication skills and strategy through ethnographic interviews. In this study, we have used ethnographic interviews of 7 informants who had personal web site and are using digital cameras. As a result, It has turned out that informants expressed their self taking pictures of their daily life, friends, and family. Also they imply meaning and feeling in the pictures that had been taken to express their lives. The communication in cyberspace has turned out that informants communicate with other people with digital pictures to show their life. They communicated each other and give information. It means that they made information by themselves to give and share with other people as prosumer. Digital photography to express themselves and communicate in cyberspace enhanced human relationship that had made in cyber space. And it helps to form their self identity. They express their cyber identity with digital photography and it is similar to their self identity that expresses in real life.