DOI QR코드

DOI QR Code

A Review of IPTV Threats Based on the Value Chain

  • Lee, Hong-Joo (College of Business Administration, Seoul National University)
  • Published : 2009.04.25

Abstract

The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.

Keywords

References

  1. M. Philpott, “IPTV: challenges and opportunities,” OVUM, 2007.
  2. G. O'Driscoll, “Next Generation IPTV Services and Technologies,” Wiley-Interscience, 2008.
  3. G. Held, “Understanding IPTV,” Taylor & Francis Group, 2007.
  4. ITU-T,“Security Architecture for Systems Providing End-to-end Communications Recommendation X.805,” ITU, 2003.
  5. W. Copper and G. Lovelace, “IPTV Guide,” Informitv and Lovelace Consulting Limited, 2006.
  6. S. Nicoletti et al, “Regulation of the IPTV Value Chain,” OVUM, 2007.
  7. HanaroTelecom, “Business Strategy of IPTV,” in Proceedings of IPTV Conference, 2007.
  8. KISA, “A study on Analysis of Privacy Invasion and Protection in IPTV,” KISA, 2007.
  9. J. H. Jeon et al, “Information Security Essential,” Scitech Media, 2009
  10. Bumsuk Jung et al, “Security threats to Internet: a Korean Multi-Industry Investigation,” Information & Management, vol.38, pp.487-498, 2001. https://doi.org/10.1016/S0378-7206(01)00071-4
  11. A. J. Bayle, “Security in Open system network: a tutorial survey,” Information Age, vol.10, no.3, pp.131-145, 1988.
  12. R. K. Rainer, C. A. Snyder, and H. H. Carr, “Risk analysis for information technology,” Journal of Management Information System, vol.5, no.1, pp.129-147, 1991.
  13. L. S. Rutledge and L. J. Hoffman, “A survey of issues in computer network security,” Computer and Security, pp.296-308, 1986.
  14. C. P. Pfleeger, “Security in Computing,” Prentice Hall, 2006.
  15. ITU, FG IPTV-DOC-0155, “Working Document : IPTV Security Aspects,” ITU, 2007.
  16. J. Y. Park et al, “The Standardization Issue for ITV-T FG IPTV Security Aspects,” ETRI, 2007.
  17. F. Stajano, “Security for Ubiquitous Computing,” John Wiley& Sons, 2002.
  18. D. G. Firesmith, “Analyzing Specifying Reusable Security Requirements,” Carnegie Mellon SEI, 2006.
  19. M. Swanson et al, “Security Metrics Guide for Information Technology Systems,” National Institute of Standards and Technology, 2003.
  20. Pauline Bowen et al, “Information Security Guide For Government Executives,” National Institute of Standards and Technology, 2007.
  21. United States Government Accountability Office, “INFORMATION SECURITY-FBI Needs to Address Weaknesses in Critical Network,” United States Government Accountability Office, 2007.
  22. D. G. Firesmith, “Security Use Cases,” Journal of Object Technology, vol.2, no.3, 2003.
  23. P. Bellavista, “An integrated management environment for network resources and services,” IEEE Journal on Selected Areas in Communications, vol.18, no.5, 2000.
  24. R. J. Boncella, “Web Services and Web Service Security,” in Proceedings of the Americas Conference in Information Systems, NY, 2004.
  25. T. Ojanpera and R. Mononen, “Security and Authentication in the Mobile World,” Wireless Personal Communications, 2002.
  26. T. Longstaff et al, “Security of the Internet,” The Froechlish/Kent Encyclopedia of Telecommunication, vol.15, pp.231-255, 1997.
  27. International Organization for Standardization, “International Electro technical Commission Informational Technology- open distributed processing,” ISO/IEC, 1996.
  28. National Research Council Committee on Information Systems Trustworthiness, “Trust in Cyberspace,” National Academy Press, 1999.
  29. U.S .Government office for Civil Rights (OCR)- http://www.hhs.gov/ocr/
  30. National Security Agency, “National Security Research Center Trusted Network Interpretation,” NSA, Vol.1.7/31/87 NCSC-TG-005(Red Book), 1987
  31. ISO, “International Organization for Standardization 27001,” ISO, 2005
  32. H. F. Tipton and M. Krause, “Information Security Management Handbook,” CRC Press LLC, 2008.

Cited by

  1. The role of public services in the convergence era: IPTV case vol.12, pp.1, 2009, https://doi.org/10.1108/14636691011015376