• Title/Summary/Keyword: Digital Access

Search Result 1,438, Processing Time 0.029 seconds

The Effect of Digital Divide on the Use of Online Services in the Severely Disabled People: Focusing on Online Accessibility (중증장애인의 온라인 서비스 이용에 대한 디지털 정보격차의 영향: 온라인 접근성을 중심으로)

  • Jang, Changki;Sung, WookJoon
    • Informatization Policy
    • /
    • v.27 no.3
    • /
    • pp.56-81
    • /
    • 2020
  • The purpose of this research is to empirically examine the effects of motivation and skill for digital devices and the Internet on the use of online services in the severely disabled people. In addition to the general effect of digital divide, particularly for the case of severely disabled people, the effects of physical and mental inconvenience of individuals were taken into account and the moderating effect was confirmed by classifying the groups that need help with online activities and those that do not. The 2018 Digital Divide Survey data of the National Information Society Agency was used for the study. As a research method, path analysis and multi-group analysis using a sequence access model to Internet use were performed. As a result, it was confirmed that even in the case of the disabled, the motivational factor affects the skill for digital device operation and Internet use, and this access skill sequentially affects the use of online services. In particular, it was found that the effect of strategic and technical skill for internet use is the most important for the use of online services for the disabled rather than the motivation or a simple operational skill for digital devices. In addition, it was found that even in the disabled group, those requiring help in using the Internet was more passive in using the online service than the rest in the group. The results of this study suggest the need for stronger capacity for physical access as well as support in building strategic and technical skills that enhance responsibilities and protect from risks in using the Internet among the people with disabilities.

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

Protect Digital Contents and Instant Player using PKI (공개키 기반의 디지털 콘텐츠 및 인스턴트 플레이어 보호방법연구)

  • Ryu, Seok
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.837-842
    • /
    • 2006
  • According to the development of the internet technology, many people can access many kind of digital contents. This approach can infringe the copyright and right owner-ship. Currently many people research the DRM(Digital Rights Management) for protect digital content after digital content downloaded. This paper propose the system that client player witch encrypted using PKI have symmetric key and CCI (copy control information), decrypt digital content witch encrypted when digital content created.

Access Right Assignment Mechanisms for Secure Home Networks

  • Kim, Tiffany Hyun-Jin;Bauer, Lujo;Newsome, James;Perrig, Adrian;Walker, Jesse
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.175-186
    • /
    • 2011
  • The proliferation of advanced technologies has been altering our lifestyle and social interactions-the next frontier is the digital home. Although the future of smart homes is promising, many technical challenges must be addressed to achieve convenience and security. In this paper, we delineate the unique combination of security challenges specifically for access control and consider the challenges of how to simply and securely assign access control policies to visitors for home devices and resources. We present a set of intuitive access control policies and suggest four access control settings based on our in-person interview results. Furthermore, we propose the automated Clairvoyant access right assignment (CARA) mechanism that utilizes home owners' social relationship to automatically deduce to which class a visitor belongs. The combination of CARA and the suggested mapping provides a promising first step for home policy assignment such that nonexpert home owners can let visitors use their home network with confidence. We anticipate that future research can build on our proposed mechanisms to provide confidence to non-expert home owners for letting visitors use their home network.

ISDN 교환기

  • Lee, Heon
    • ETRI Journal
    • /
    • v.9 no.4
    • /
    • pp.26-35
    • /
    • 1987
  • Switching system can be regarded as the key node of Integrated Services Digital Networks(ISDN) because it plays the Important role in realization of ISDN. As ISDN is evolved from the telephony Integrated Digital Network(IDN), the switching system for ISDN will be evolved from the function and structure of telephony digital switching system. At near future, ISDN switching system is expected to implement the integrated access and transparent switching functions for both voice and data. As final goals of switching system, advanced switching methods for information having various traffic characteristics such as voice, data, text and image should be considered. This paper considered. This paper will show some of the fundamental design challenges and architectural trends in ISDN switching system.

  • PDF

Digital Library Technologies and Information Infrastructure

  • Hyun, Soon-J.
    • Proceedings of the Korea Database Society Conference
    • /
    • 1998.09a
    • /
    • pp.101-114
    • /
    • 1998
  • Digital Library Definitions; A library that has been extended and enhanced by the application of digital technology. Contents and services accessible and deliverable via electronic networks to and from the worldwide libraries and commercial information resources. A large, organized collection of multimedia information for providing users of a community with coherent access to certain information services. A realistic means to build an Information Infrastructure for advanced Internet services of the future. more …(omitted)

  • PDF

Efficient Local Decoding Using Bit Stream Map for High Resolution Video (비트 스트림 지도를 이용한 고해상도 영상의 효율적인 지역복호화)

  • Park Sungwon;Won Jongwoo;Lee Sunyoung;Kim Wookjoong;Kim Kyuheon;Jang Euee S
    • Journal of Broadcast Engineering
    • /
    • v.9 no.4 s.25
    • /
    • pp.391-401
    • /
    • 2004
  • In this paper, we introduce a novel coding method to efficiently enable spatial random access for high resolution video. In terms of resolution and display size, standard display devices (such as cathode-ray tubes. monitors. PDAs, and LCDs) do not sufficiently support high resolution video such as digital cinema and panoramic video. Currently, users have no choice but to view video at lower resolution as a result of down-sampling, or only a partial region of the video due to display size limitations. Our proposed method. which we call the B-map, represents the set of starting locations of the coded segments in a picture frame. This information, or B-map, is first sent to the decoder prior to the coded data stream of the frame and is then used for fast local decoding. To test our method, we compare our B-map with JPEG tiling and the JPEG Resynchronization marker. Experimental results show that the proposed coding method requires less overhead than existing methods during the same decoding time. The results show promise for future panoramic or digital cinema applications.

Harvest and Providing System based on OAI for Science Technology Information (OAI 기반 과학기술정보 수집 제공 시스템)

  • Yoon, Jun-Weon
    • Journal of Information Management
    • /
    • v.38 no.1
    • /
    • pp.141-160
    • /
    • 2007
  • Many contents produced and provided as development of information technology on the internet. Especially discussion that collecting and storing of digital information resources, is expanded as growing dependence on academic information of research workers. Open Access is a new paradigm of information distribution that is opposite concept of high price distribution academic information. It is an OAI system that is intended to collect and automate open access data in good order. This paper constructs stOAI based on OAI that is a science and technology information providing system. This system provides international academic journal free of charge that collect and store through OAI protocol in OA(Open Access) of yesKISTI(science and technology information portal service). Also, It provides automate and centralize science technology information, that KISTI has, to external institution as a standard type.

Performance analysis of multiple access mechanism based on error adaptation in CDMA cellular system (CDMA 셀룰러 시스템용 오율 적응 다중 엑세스 기법의 성능분석)

  • 송상호;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.713-720
    • /
    • 1996
  • In recent, the demand of mobile communication system is increasing rapidly. However, since wireless resources is limitted, the protocol to utilize wireless resource efficiently is needed. Up to now, Slotted CDMA_ALOHA(S_CDMA_ALOHA) and Mini-Slotted CDMA_ALOHA(MS_CDMA_ALOHA) methods are proposed as a CDMA_ALOHA mechanism, and it is turned out that MS_CDMA_ALOHA offers betterperformance than S_CDMA_ALOHA mechanism. Also, IS-95 multiple access mechanism has been proposed as common air interface(CAI) protocol of CDMA digital cellular system. However, in former study, the performance evaluations were made without considertion of chnnel characteristics of wireless communication environment. In this paper, a new access mechanism for improring the performance in the DS/CDMA digital cellular environment is suggested. This mechanism is adaptive to the channel condition and based on the conventional MS_CDMA_ALOHA mechanism. Also, the performance of new access mechanism is compared with that of conventional mechanisms, through computer simulation. According tot h simulation results, it is shown that the proposed NA_CDMA_ALOHA(Noise-Adaptation CDMA_ALOHA) mechanism offers better performance than conventional three CDMA_ALOHA mechanisms in view of mean delay time and system throughput characteristics. This phenomenon is due to the fast that NA_CDMA_ALOHA mechanism controls the access attempts efficiently based on the channel condition in heavy traffic environments.

  • PDF

RDB-based XML Access Control Model with XML Tree Levels (XML 트리 레벨을 고려한 관계형 데이터베이스 기반의 XML 접근 제어 모델)

  • Kim, Jin-Hyung;Jeong, Dong-Won;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.10 no.1
    • /
    • pp.129-145
    • /
    • 2009
  • As the secure distribution and sharing of information over the World Wide Web becomes increasingly important, the needs for flexible and efficient support of access control systems naturally arise. Since the eXtensible Markup Language (XML) is emerging as the de-facto standard format of the Internet era for storing and exchanging information, there have been recently, many proposals to extend the XML model to incorporate security aspects. To the lesser or greater extent, however, such proposals neglect the fact that the data for XML documents will most likely reside in relational databases, and consequently do not utilize various security models proposed for and implemented in relational databases. In this paper, we take a rather different approach. We explore how to support security models for XML documents by leveraging on techniques developed for relational databases considering object perspective. More specifically, in our approach, (1) Users make XML queries against the given XML view/schema, (2) Access controls for XML data are specified in the relational database, (3) Data are stored in relational databases, (4) Security check and query evaluation are also done in relational databases, and (5) Controlling access control is executed considering XML tree levels

  • PDF