• Title/Summary/Keyword: Cyber-space

Search Result 474, Processing Time 0.027 seconds

A Consideration for Intellectual Property Rights under Digital Environments (전자상거래에서의 지적재산권에 관한 문제점과 개선방안)

  • Kwon, Sang-Ro
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.249-265
    • /
    • 2004
  • In the current digital age, most of the countries in the world recognize the electronic business to be a very prospective area in the future and plan to activate for the preoccupation of the business. As a result, this led a rapid increase of the electronic business volume. Electronic business takes place in the cyber space, using internet. However, the intellectual property rights have a high degree of possibility of being infringed as the digitalized intellectual property is easy to receive, copy and transmit in the cyber space. The language structure on the web, represented by HTML, makes easier to copy the intellectual property. And, as the internet has no national boundary, the infringement of the intellectual property rights is easier regardless of country, which could lead to the commercial disputes between the concerned countries. There are in fact many legal disputes nowadays on the infringement of the intellectual property rights in such field as computer programming, infringement of the copyright, business model patent and infringement of the trademark right on the registered name of the domain. It is, therefore, time now to prepare a new theory or legal system to protect the intellectual property rights on copyright, patent and trademark right so as to comply with the digital environment together with such a splendid growth of "electronic business." USA and Germany are nowadays making a significant movement on the legislation of the electronic business, and this study will focus on the legislative contents, judicial precedents and interpretation of law in the above countries.

  • PDF

Development of a Web-based Learning Model for the Internet Ethics Using Multimedia (멀티미디어 매체를 이용한 웹 기반 인터넷 윤리 학습모형 개발)

  • Kang, Byeong-Do;Park, Jin-Suk;Kim, Sun-Kyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.71-85
    • /
    • 2007
  • In recent years, the need of the education for the Internet ethics is emphasized as the number of offenses committed by juveniles is increasing. So many researches on the methodologies about educating the Internet ethics have been being performed But, those are not competent to make young people inspire the sense of ethics in the cyber-space because they get trained by the cramming system of education with a textbook in their schools. In this paper, we developed a web-based learning model and an learning system including various multimedia materials that induce the learners for ethics to study actively. And then we applied our system to school education for the Internet ethics, and verified the effectiveness of our learning model and system.

  • PDF

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

Intelligent Home Control Interface based on 3D (3D기반 지능형 흠 통합 제어 인터페이스 구현)

  • Kim, Yong-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.540-543
    • /
    • 2008
  • User interface of intelligent home must control and manage information appliances connected to the home network. But there are properties that users are inconvenient and confused using user interface of intelligent home by reason of many appliances, different control way according to types of ones, and so on. This Paper proposes the new method taking the level of convenience up and the level of complexity down which is out of many obstacles to expand intelligent home system, and implements this. The proposed interface is designed and implemented that user could model cyber space on a living space of user, and arrange home appliances on cyber space as like doing real living space and control intelligent home system. It is possible for user to read the state and location of home appliance in home, and to select and control the information appliance as using the proposed interface.

  • PDF

The New Framework for Taxonomy of Business Caused by Cyber Space Marketization and Its Application (공간시장화에 따른 새로운 비즈니스 분류 프레임워크의 제안과 적용)

  • 이홍길;이재원;류형근
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2003.05a
    • /
    • pp.291-297
    • /
    • 2003
  • The aim of this research is to propose new framework for taxonomy of various business and its concept, due to the changes in market space. This framework is three-dimension cubic model, based on three concepts, business layer(BL), value chain(VC), and Real/Virtual(R/V) that symbolizes real environment and virtual(or cyber) space. And we showed that this framework is able to describe all expected(or existed) business types in certain industry by the combinations of BL-VC-R/V on three dimension. In addition, we suggested new definition of e-business and e-Logistics from view of BL-VC-R/V. In order to test availability, this framework was applied for logistics related business. and classified typical business types existed (or expected) in logistics area.

  • PDF

The New Framework for Taxonomy of Business Caused by Cyber Space Marketization and Its Application (공간시장화에 따른 새로운 비즈니스 분류 프레임워크의 제안과 적용)

  • Lee, Hong-Girl;Lee, Jae-Won;Ryu, Hyung-Geun
    • Journal of Navigation and Port Research
    • /
    • v.27 no.4
    • /
    • pp.389-395
    • /
    • 2003
  • The aim of this research is to propose new framework for taxonomy of various business and its concept. due to the changes in market space. This framework is three-dimension cubic model based on three concepts, business layer(BL), value chain(VC), and Real/Virtual(R/V) that symbolizes real environment and virtual (or cyber) space. We showed that this framework is able to describe all expected(or existed) business types in certain industry by the combinations of BL-VC-R/V on three dimension. In addition, we suggested new definition of e-business and e-Logistics from view of BL-VC-R/V. In order to test availability of framework, this framework was applied for logistics related business, and we classified typical business types existed (or expected) in logistics area.

Development of A Cyber Education Contents for the Ship Outfitting Basic Design (선박 의장 기본 모델링을 위한 사이버 교육 컨텐츠 개발)

  • Kim, Mi-Sun;Park, Yong-Suk;Lee, Sangdon;Seo, Jae-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.241-253
    • /
    • 2013
  • A Shipbuilding design program used in the shipbuilding industry tends to be shifted from the TRIBON software to the AM(AVEVA MARINE) software these days. Many large domestic shipbuilding companies have been using the AM instead of the TRIBON. New design software requires education programs for the necessary personnel. However the education programs for the AM are largely based on offline education. They suffer from constraints in space and time, and from high costs. This paper describes a development of online contents for the AM software that are focused for cyber education. It covers the applied process and the organization of the contents. The details of the development decisions including the security issue for the contents are described also.

A Study on the Image Make-up according to Theme (테마별 이미지 Make-up에 관(關)한 연구(硏究))

  • Kim, Hyo-Sook;Kang, In-Ae
    • Journal of Fashion Business
    • /
    • v.7 no.1
    • /
    • pp.72-83
    • /
    • 2003
  • The purpose of this study is to understand the history of 20th century fashion and make-up culture, analyze trend of the modern fashion and make-up, creat a cyber make-up model according to themes and also it will find out how to use make-up as a part of fashion genre. As a result of this study is 1. Looking over change-process in 20th century fashion and make-up history, we can find the popular make-up color and pattern reflecting the society and cultural environments. And also make-up culture reflecting their sense of values and way of thinkings. 2. Analyzing fashion and make up color trend of 2002 F/W, we can find a similarity between fashion and make-up color trend by comparing with hue&tone chart. All of theme have a tendency to be natural, veiled, feminine by neutral color and artifical highlighted, illuminate, transparant by clear-high saturation color. 3. Creating imagemaps, color palletes and cyber model of 4 trend themes by computer graphic, It can give more visual and interesting effect on the cyber space, and also it can help to expect make-up will be dizitalized, visualized and informationalized.

A study on the System for Online education by Mobile (모바일 기반의 온라인교육 시스템에 관한 연구)

  • Song Eun-Jee
    • Journal of Digital Contents Society
    • /
    • v.6 no.3
    • /
    • pp.149-155
    • /
    • 2005
  • The various kinds of contents have been developed with the explosive increase of the internet users. The advantage of the contents could be extended to the extension of education. For the reason of no limit on space, on-line education such as cyber lecture and cyber university is getting popular. On-line education, however, could be faced to the problem of the management for attendance, homework and the exam. Therefore the proper supervision is requested so that students may get all the information for the calendar of test and other program which are necessary for the lesson. This study is to propose the system of education by mobile which is able to promote the efficiency of the study for the on-line education. The information of the lesson for cyber lecture could be accessed regardless the place and time by using the mobile phone which is usually carried.

  • PDF

Fish Schooling Simulator Using Crowd Behavior Patterns (군중 행동 패턴을 이용한 Fish 군중 시뮬레이터)

  • Kim, Jong-Chan;Cho, Seung-Il;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.2 no.2
    • /
    • pp.106-112
    • /
    • 2007
  • Recently the crowd environment in the department of the animation is necessary to the digital industry. The goal of researching a proper crowd animation is to design character animation that is defined by the reality of scenes, performance of system and interaction with users to show the crowd vividly and effectively in cyber underwater. It is important to set up the crowd behavior patterns to represent for moving crowd naturally in cyber space. In the paper, we expressed the behavior patterns for flocks of fish in cyber underwater, and compared with the number of mesh, the number of fish, the number of frame, elapsed time, and resolution and analyzed them with the fish behavior simulating system.

  • PDF