• Title/Summary/Keyword: Digital Assets

Search Result 214, Processing Time 0.034 seconds

A Study on Critical Success Factors for Implementing Information Security Governance (정보보호 거버넌스 구현을 위한 핵심성공요인에 관한 연구)

  • Kim, Kun-Woo;Kim, Jung-Duk
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.97-108
    • /
    • 2010
  • Nowadays, information security governance which is an integral part of corporate governance has become an important issue in protecting valuable business information assets. However, there are few organizations which have implemented information security governance because of its abstract concept. The objective of this paper is to develop CSFs for implementing information security governance. Ten CSFs were developed based on the ISO/IEC 27014 Information Security Governance Framework.

  • PDF

A Study on the Factors Affecting the Intention to Purchase Digital Items (디지털 아이템 구매의 영향요인 연구)

  • Byun, Wan Soo;Park, Seong-Taek;Kim, Tae Ung
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.243-251
    • /
    • 2012
  • Digital items, considered as virtual assets, include avatars, accessories for the avatars, digital wallpapers, and game items, etc. The objective of this study is to examine the factors influencing the purchase of digital items. Factors, based upon Uses and Gratifications theory, including image making, self-expression, social awareness and fun-seeking, are introduced as salient variables for purchasing digital items. In addition, social identification and flow are also considered as key motivators. Statistical results indicates that social identification affects both flows and the intension to purchase digital items, and then flow next influences intension to purchase. It was also found that motives based upon Uses and Gratifications theory influences social identification, but have no impact on flow. As a conclusion, the academic and practical implications of these findings are also discussed.

Personal Information Protection Using Digital Twins in the Fourth Industrial Revolution (4차 산업혁명 시대의 디지털트윈을 활용한 개인정보보호)

  • Kim, Yong-Hun
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.279-285
    • /
    • 2020
  • In the era of the Fourth Industrial Revolution, there are many sensors around. People and things are connected to these sensors to the internet. Numerous connected sensors produce the latest data in seconds, and these data are stacked with big data of unimaginable size. Because personal information can be contained in any place of data produced, device and system protection are needed. Digital twins are virtual models that accurately reflect the status information of physical assets and systems that utilize them. The characteristic of digital twin is that digital twin itself has temporal and structural identity enough to represent the object of reality. In the virtual environment the reproduced reality, it continuously simulates and it virtuals of the point of time or the future, the replica can be created. Therefore, this study cited factors threatening personal information in the era of the Fourth Industrial Revolution. And proposed using digital twin technology that can simulate in real-time to overcome the risk of personal information hacking.

The Effect of Rice Co-Brand Assets, Trust, and Attachment on Loyalty (쌀 공동브랜드의 자산, 신뢰, 애착이 충성도에 미치는 영향)

  • Kim, Shine
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.401-410
    • /
    • 2022
  • This study deals with the relationship among trust, attachment and brand loyalty of agricultural products' rice co-brands, which are the staple food of the people. The research method established the hypothesis of the study under the foundation of prior research and developed the survey. The subjects of the study were distributed, retrieved, and analyzed the survey of 163 rice farmers in Buyeo-gun, Chungcheongnam-do. The empirical analysis results show that: First, hypothesis 1 of the brand awareness and image that "rice brand assets will be a positive relationship to trust" were statistically adopted. In particular, statistical t values showed a difference in consumer confidence over recognition>images. Second, hypothesis 2 of the trust of agricultural rice brands will be a positive influence on attachment and loyalty' statistically supported. In this regard, brand trust was higher in loyalty than attachment. Third, the attachment of agricultural products to rice brands will be a positive influence on loyalty,' was statistically supported. The strategic implications of this study are as follows. First, consumers should be given clues of trust(ex, GAP of Natioanl Approval Licesing, Fam Tour) as they distrust the perceived quality of the rice in the market. Second, the effect of the origin of rice is questionable, so the spread of the production power system should prevent the mixing of rice varieties, that is the spread of the production history systems.

A Case analysis of NFT digital art works (NFT 디지털아트 작품 사례분석)

  • Yoon, Heesun;Chung, Jeanhun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.55-61
    • /
    • 2022
  • With the rapid development of information technology, Metaverse and Non-Fungible Token (hereinafter referred to as NFT) technology will not only create new supply and demand markets for digital art creators, but also for existing art writers. As interest in and trading of virtual assets and coins increases, so does the demand for digital art trading in the NFT market. This study examines the theoretical content of NFTs, blockchains, and Metaverse, and analyzes various expressions of NFT art that are currently popular. As the case study, 100 projects were selected and analyzed in the overall OpenSea ranking, which included 2D graphics, 3D graphics and motion graphics works. Then, from the perspective of creators, the graphic styles of NFT digital art are divided into 4 types: 2D graphics, 3D graphics, 2D dynamic graphics, 3D dynamic graphics, and analyzed and studied. It is hoped that in the future, this study can suggest the direction of creating graphic styles to digital art NFT creators.

A Study on the Functional Elements for Long-term Preservation of Electronic Records (전자기록물의 장기보존을 위한 기능요소 연구)

  • Kim, Myeong-Ok;Lee, Sang-Yong
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.10 no.2
    • /
    • pp.101-126
    • /
    • 2010
  • This study proposes the functional elements for long-term preservation of electronic records, which are parts of nation's important records and information assets. For this purpose, We compared the international standard ISO 14721 with international research projects and digital archives systems from multi-nations. We identified 18 functional elements for long-term preservation of electronic records. They can be used as the basis to strengthen authenticity and usability when building new digital archive systems or upgrading existing systems at the Archival Institutions.

Probabilistic safety assessment-based importance analysis of cyber-attacks on nuclear power plants

  • Park, Jong Woo;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.51 no.1
    • /
    • pp.138-145
    • /
    • 2019
  • With the application of digital technology to safety-critical infrastructures, cyber-attacks have emerged as one of the new dangerous threats. In safety-critical infrastructures such as a nuclear power plant (NPP), a cyber-attack could have serious consequences by initiating dangerous events or rendering important safety systems unavailable. Since a cyber-attack is conducted intentionally, numerous possible cases should be considered for developing a cyber security system, such as the attack paths, methods, and potential target systems. Therefore, prior to developing a risk-informed cyber security strategy, the importance of cyber-attacks and significant critical digital assets (CDAs) should be analyzed. In this work, an importance analysis method for cyber-attacks on an NPP was proposed using the probabilistic safety assessment (PSA) method. To develop an importance analysis framework for cyber-attacks, possible cyber-attacks were identified with failure modes, and a PSA model for cyber-attacks was developed. For case studies, the quantitative evaluations of cyber-attack scenarios were performed using the proposed method. By using quantitative importance of cyber-attacks and identifying significant CDAs that must be defended against cyber-attacks, it is possible to develop an efficient and reliable defense strategy against cyber-attacks on NPPs.

The Antecedents of Need for Self-Presentation and the Effect on Digital Item Purchase Intention in an Online Community (온라인 커뮤니티에서 자기표현욕구의 영향요인과 디지털 아이템 구매의도에 미치는 효과)

  • Koh, Joon;Shin, Seon-Jin;Kim, Hee-Woong
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.117-144
    • /
    • 2008
  • Lots of virtual communities and online businesses presently derive their primary sources of revenues through advertising, but nevertheless are plagued with marginal profitability though they might possess a significant user base. In the light of the need for an efficacious business model, there have been recent insights of an online community in particular reaping profits through an innovative and lucrative revenue generation method that earns by selling digital items. There have been some obvious evidences (e.g., Cyworld, SecondLife, Habo Hotel, etc.) that online communities can be profitable through their unique business model of selling digital items. However, there is lack of understanding about the motivation of purchasing digital items. This study tries to identify the main motivators of digital item purchases based on social/individual identity theory and self-presentation theory. "Digital items", otherwise known as "virtual assets", may include online avatars, accessories for the avatars, decorative ornaments like furniture, digital wallpapers, skins, background music and virtual weapons used for Internet games. These digital items are employed by users for representation and articulation in the online space, especially to create and enhance their online profiles in web pages and games. Prices for digital items typically range from a few cents to a few dollars each. Based on the theoretical framework like social identity theory and self-presentation theory, we developed the research model and proposed seven hypotheses. An analysis of 225 members of Cyworld found that digital item purchase intention in virtual world is affected by both members' need for self-presentation and need for affiliation. We also found that the need for self-presentation is significantly increased by innovativeness of members, community group norm, and community involvement. We concluded that the need for self-presentation could be a key variable for profitable business model in online community service industry. However, neither individual self-efficacy nor the need for affiliation significantly influenced the need for self-presentation which triggers purchase intention of digital items. In term of the theoretical and practical contribution, this study can be a pioneering empirical research that investigates the purchase intention of digital items based on social identity theory and self-presentation theory in the online context. Also, the findings of our study are valuable and practical for practitioners in the market who wish to adopt or improve the business model of selling digital items in an online community. From the findings, it can be seen that innovativeness of users, community group norm, and community involvement are three significant factors that influence need for self-presentation of users which ultimately leads to their intentions to buy digital items. These findings put forth that virtual community providers and online businesses selling digital items should prioritize their efforts and focus on these three factors if they want to increase the sales of these digital items and generate greater revenues. This study provides important implications for academic researchers and practitioners to understand why the community members pay money for their digital items in virtual world and how the practitioners can increase the sales of digital items in an online community. A couple of limitations of the study and future research directions are also discussed.

Utilization of Smart Farms in Open-field Agriculture Based on Digital Twin (디지털 트윈 기반 노지스마트팜 활용방안)

  • Kim, Sukgu
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2023.04a
    • /
    • pp.7-7
    • /
    • 2023
  • Currently, the main technologies of various fourth industries are big data, the Internet of Things, artificial intelligence, blockchain, mixed reality (MR), and drones. In particular, "digital twin," which has recently become a global technological trend, is a concept of a virtual model that is expressed equally in physical objects and computers. By creating and simulating a Digital twin of software-virtualized assets instead of real physical assets, accurate information about the characteristics of real farming (current state, agricultural productivity, agricultural work scenarios, etc.) can be obtained. This study aims to streamline agricultural work through automatic water management, remote growth forecasting, drone control, and pest forecasting through the operation of an integrated control system by constructing digital twin data on the main production area of the nojinot industry and designing and building a smart farm complex. In addition, it aims to distribute digital environmental control agriculture in Korea that can reduce labor and improve crop productivity by minimizing environmental load through the use of appropriate amounts of fertilizers and pesticides through big data analysis. These open-field agricultural technologies can reduce labor through digital farming and cultivation management, optimize water use and prevent soil pollution in preparation for climate change, and quantitative growth management of open-field crops by securing digital data for the national cultivation environment. It is also a way to directly implement carbon-neutral RED++ activities by improving agricultural productivity. The analysis and prediction of growth status through the acquisition of the acquired high-precision and high-definition image-based crop growth data are very effective in digital farming work management. The Southern Crop Department of the National Institute of Food Science conducted research and development on various types of open-field agricultural smart farms such as underground point and underground drainage. In particular, from this year, commercialization is underway in earnest through the establishment of smart farm facilities and technology distribution for agricultural technology complexes across the country. In this study, we would like to describe the case of establishing the agricultural field that combines digital twin technology and open-field agricultural smart farm technology and future utilization plans.

  • PDF

A Research on the Digital Information of the Deceased (사자(死者)의 디지털 정보에 관한 연구)

  • Kim, Young-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.247-253
    • /
    • 2010
  • The demand that needs 'Digital Legacy', a notion that an Internet user can transfer his private blogs, e-mail and financial assets to inheritors and party interested when he died suddenly in the accident, has been growing recently. This issue has become a social hot potato since Justine Ellsworth's father in USA sued Yahoo for the right to access his son's Yahoo e-mail account after Justine Ellsworth had died in Iraq, in November, 2004 and the problems happened to deal with suicide-related blogs and homepages when great entertainers in Korea committed suicide and soldiers' parents in the situation of warship Chonan tragedy in Korea demanded access to soldiers' homepages and e-mail accounts. The point at issue focuses on the property matters about the digital information of the deceased and the relationship between the deceased and the Internet Service Provider(ISP). This research looks into the trend of judicial precedents and laws related to the digital information of the deceased and suggests the preliminary data of the next research.