• Title/Summary/Keyword: Digital ID

Search Result 212, Processing Time 0.024 seconds

A Study on Improvement for Identification of Original Authors in Online Academic Information Service (온라인 학술정보 서비스 상 원저작자 식별 개선 방안 연구)

  • Jung-Wan Yeom;Song-Hwa Hong;Sang-Hyun Joo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.133-138
    • /
    • 2024
  • In the modern academic research environment, the advancement of digital technology provides researchers with increasingly diverse and rich access to information, but at the same time, the issue of author identification has emerged as a new challenge. The problem of author identification is a major factor that undermines the transparency and accuracy of academic communication, potentially causing confusion in the accurate attribution of research results and the construction of research networks. In response, identifier systems such as the International Standard Name Identifier (ISNI) and Open Researcher and Contributor ID (ORCID) have been introduced, but still face limitations due to low participation by authors and inaccurate entry of information. This study focuses on researching information management methods for identification from the moment author information is first entered into the system, proposing ways to improve the accuracy of author identification and maximize the efficiency of academic information services. Through this, it aims to renew awareness of the issue of author identification within the academic community and present concrete measures that related institutions and researchers can take to solve this problem.

A Study on Non-Fungible Token Platform for Usability and Privacy Improvement (사용성 및 프라이버시 개선을 위한 NFT 플랫폼 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.11
    • /
    • pp.403-410
    • /
    • 2022
  • Non-Fungible Tokens (NFTs) created on the basis of blockchain have their own unique value, so they cannot be forged or exchanged with other tokens or coins. Using these characteristics, NFTs can be issued to digital assets such as images, videos, artworks, game characters, and items to claim ownership of digital assets among many users and objects in cyberspace, as well as proving the original. However, interest in NFTs exploded from the beginning of 2020, causing a lot of load on the blockchain network, and as a result, users are experiencing problems such as delays in computational processing or very large fees in the mining process. Additionally, all actions of users are stored in the blockchain, and digital assets are stored in a blockchain-based distributed file storage system, which may unnecessarily expose the personal information of users who do not want to identify themselves on the Internet. In this paper, we propose an NFT platform using cloud computing, access gate, conversion table, and cloud ID to improve usability and privacy problems that occur in existing system. For performance comparison between local and cloud systems, we measured the gas used for smart contract deployment and NFT-issued transaction. As a result, even though the cloud system used the same experimental environment and parameters, it saved about 3.75% of gas for smart contract deployment and about 4.6% for NFT-generated transaction, confirming that the cloud system can handle computations more efficiently than the local system.

Reinterpretation on Propertiness of Online Game Item (온라인게임 아이템의 재물성에 대한 재검토)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.153-160
    • /
    • 2013
  • Online game provides a kind of cyber money aden and game instruments, items in order to attract game users. Game users want stronger, better and higher-leveled items with competition. Demands and supplies on items are formed and the transactions are made. The problem is there happen frequently illegal behaviors in the process of transactions. Among these illegal behaviors, for using other's id and password without authorization and stealing items, rejecting to return assigned items, providing stolen item to other who knows the fact or destroying others' items, it is difficult to apply provisions on properties in the criminal code on them. Because the criminal code has a duty to prevent separation between substantial criminal behavior and regulations, it should reflect substantial cultures and values of the times. Therefore, property like items in cyber space can be considered as new property to need to be protect under the criminal code and it may be not an interpretation of expansion. The reason is it is practical and reasonable to judge whether propertiness can be established considering cyber space's unique characteristics. It is time to review propertiness of Article No. 346 according to the request of times of the digital age.

A Study on Features Analysis for Retrieving Image Containing Personal Information on the Web (인터넷상에서 개인식별정보가 포함된 영상 검색을 위한 특징정보 분석에 관한 연구)

  • Kim, Jong-Bae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.91-101
    • /
    • 2011
  • Internet is becoming increasingly popular due to the rapid development of information and communication technology. There has been a convenient social activities such as the mutual exchange of information, e-commerce, internet banking, etc. through cyberspace on a computer. However, by using the convenience of the internet, the personal IDs(identity card, driving license, passport, student ID, etc.) represented by the electronic media are exposed on the internet frequently. Therefore, this study propose a feature extraction method to analyze the characteristics of image files containing personal information and a image retrieval method to find the images using the extracted features. The proposed method selects the feature information from color, texture, and shape of the images, and the images as searched by similarity analysis between feature information. The result which it experiments from the image which it acquires from the web-based image DB and correct image retrieval rate is 89%, the computing time per frame is 0.17 seconds. The proposed method can be efficiently apply a system to search the image files containing personal information and to determine the criteria of exposure of personal information.

Accuracy Improvements of DAM-Reservoir Storage Volume Estimation based on GIS (GIS기반에서 댐 저수량 산정의 정확도 향상)

  • Jeong, InJu;Moon, DooYoul;Jung, BeomSeok
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.2
    • /
    • pp.136-144
    • /
    • 2005
  • GIS analyzes various topographic feature in three dimensions using triangulated irregular network (TIN). This paper proposed a method that can analyze topographic features effectively in three dimensions. Method developed in this study can calculate earth-volume, the inundation volume, storage volume etc, effectively. We could reduce error than existing volume calculation methods in computing volume in addition to water level's change about each. Also, the develop method can improve accuracy in measuring the storage of reservoirs. Main result of this paper id to develop a efficient calculation method using contour and elevation data on digital map.

  • PDF

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A Study of Smart Convergence Design of English Vocabulary Learning Contents Applying the Periodic Repetitive Method (주기적 반복법을 적용한 영단어 학습콘텐츠 스마트 융합 설계 연구)

  • Kim, Young-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.133-140
    • /
    • 2016
  • This paper suggests designing how to acquire English vocabularies on the smart devices based on the research that a ground-breaking English Vocabulary Learning Contents needs developing. The method makes it possible to develop the contents which helps the learners to master English vocabularies effectively on the smart phone. The core idea of this paper is as in the following: 1) English learners learn 30 vocabularies for three minutes 10 times (one is for a new learning and the other nine ones are for reviews about the first learning) a day. 2) Considering Ebbinghaus Forgetting Curve, the reflection study proposes to provide the learners with three times' reviews: one day, 10days, and 30days later from which they learn the first 30 vocabularies. This contents is mainly made up of 5 developing sections (1)to generate App ID, (2)to access App, (3)to set up Alarm, (4)to process Word learning, and (5)to monitor the result of learning. This proposed idea is optimized to enhance the memory by Ebbinghaus Periodic Repetitive Method, which makes the learners satisfied with their English vocabulary learning.

The System Developing Social Network Group by Using Life Logging Data (라이프로깅 데이터를 이용한 소셜 네트워크 그룹 생성 시스템)

  • Jo, Youngho;Woo, Jincheol;Lee, Hyunwoo;Cho, Ayoung;Whang, Mincheol
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.2
    • /
    • pp.13-19
    • /
    • 2017
  • Various life-logging based on cloud service have developed social network according to the advanced technology of smartphone and wearable device. Daily digital life on social networks has been shared information and emotion and developed new social relationships. Recent life-logging has required social relationships beyond extension of personal memory and anonymity for privacy protection. This study is to determine social network group by using life-logging data obtained in daily lives and to categorize emotion behavior with anonymity guarantee. Social network group was defined by grouping similar representative emotional behavior. The public's patterns and trends was able to be inferred by analyzing representative emotion and behavior of the social groups network.

A Study on the Empowerment of Mobile Services using Barcodes and RFID(Radio-Frequency Identification) in Korean Libraries (국내 도서관에서 바코드와 RFID를 이용한 모바일 서비스 증진에 관한 연구)

  • Gu, Jung-Eok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.2
    • /
    • pp.309-331
    • /
    • 2010
  • In this study, the characteristics and types of 1D, 2D barcodes were examined. It is necessary to provide mobile services by making full use of the advantages of the technologies, such as 1D, 2D barcodes, and RFID, and by complementing the disadvantages of them mutually in Korea. Especially, in a mobile environment where the spread of smart phones and mobile networks are expanding, barcodes and RFID (Radio-Frequency Identification) were analyzed as a very useful information media which is able to connect offline analogue media and online digital media. In addition, library automation systems and the cases of mobile student ID services using barcodes and RFID in Korean libraries were analyzed. The cases of mobile services using barcodes in foreign countries were also analyzed. With these cases, we propose a method to empower mobile services using barcodes in Korean libraries.

The Improved UCI Identifier Syntax for Convergence Digital Contents (융합 디지털콘텐츠에 적합한 UCI 식별자 구문구조 개선)

  • Kang, Sang-ug;Park, Sanghyun;Lim, Gyoo Gun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.82-88
    • /
    • 2016
  • The proposed new UCI syntax is compatible with the existing identifier and defines fixed length in such cases as printable ID, bar code and QR code which may entail better usage of identifier itself. For the compatibility, the identifiable metadata "key" is used for the existing UCI identifier and "UCI" element of metadata is defined for the new UCI identifier. The new UCI identifier plays roles of the resolution service and representation, and the old UCI identifier plays a role of internal DB management. Also, the object code has two types, meaningless and meaningful. The meaningful object code type can be used according the content classification standards in various field as comics, games, advertisement etc. The standardization activities can be supported by the root agency of UCI.