• Title/Summary/Keyword: Digital IP

Search Result 411, Processing Time 0.024 seconds

The Strategy of Transmedia Storytelling using the Game IP (게임 IP를 활용한 트랜스미디어 스토리텔링 전략 연구 <워크래프트>를 중심으로 -)

  • Lee, Dong-Eun
    • Journal of Korea Game Society
    • /
    • v.17 no.5
    • /
    • pp.143-150
    • /
    • 2017
  • As digital technology evolved, digital paradigm emerged and storytelling began to evolve. Especially, since digital storytelling is the core of the digital game, it is a tendency to develop content in consideration of the strategy of transmedia storytelling at the planning stage even for IP expansion. By fusing media in a variety of ways and expanding the story, players can experience meaningful storytelling in a new media environment and game loyalty allows game developers to expand and innovate their businesses. In this study, we analyzed the case of , a proven powerful IP that has been expanding its story to various media for more than 20 years in order to investigate the transmedia storytelling strategy based on game media. I would like to take a look at the strategy of using the transmedia storytelling.

IP브랜드 네이밍과 카피라이팅을 잘해야 성공

  • Kim, Cheol-Gyu
    • Digital Contents
    • /
    • no.10 s.65
    • /
    • pp.74-77
    • /
    • 1998
  • 브랜드 네이밍의 중요성이 점점 부각되는 지금, 체계적인 브랜드 네이밍을 통해 적은 비용으로 큰 광고효과를 보길 원하는 IP업체들이 많이 생겨나고 있다. 21세기 마케팅 경쟁환경은 시장이 아니라 소비자의 머리속을 꿰뚫어 봐야한다. IP브랜드네임을 통해 PC통신 소비자의 머리속에 떠오르는 연상은 바로 그 IP상품의 브랜드 이미지로 직결되며, 그 이미지에 따라 IP상품의 성공여부가 결정되기 때문이다. 이번호에는 IP네이밍 브랜드와 카피라이팅 방법에 대해 알아 보려고 한다.

  • PDF

SOHO-IP 사업

  • Kim, Cheol-Gyu
    • Digital Contents
    • /
    • no.5 s.60
    • /
    • pp.94-99
    • /
    • 1998
  • IP사업을 처음하는 사람들은 맨처음 고민하는 것이 많이 있을 것이다. 선배 IP는 어떤 형식으로 했을까? 자신이 직접 체험하지 못했다하더라도 간접적으로 배울 수 있는 KNOW-HOW가 있다면 초보자 IP에게는 많은 도움이 될 것이다.

  • PDF

The Gateway for Internet Server Implementation using Dynamic IP Address (동적 IP Address를 사용하는 인터넷 서버 구축을 위한 게이트웨이)

  • Kim, Won-Jung;Yang, Hyeon-Taek
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.145-152
    • /
    • 2002
  • Recently most of the home and small-size company use ADSL(Asymmetric Digital subscriber Line) or Cable Modem for using Internet Services. The number of Internet IP Address in current Internet IP Address System(IPv4) that is consisted of 4byte is almost empty, so generally the IP Address assigned dynamically is used. This way is just OK in general uses, but not OK in Internet Servers operation. This paper designed the gateway(Gate-D) system which is enable any system that get IP Address assigned dynamically to serve Internet Server Services(Telnet, FTP, HTTP, Mail, etc …), and made sure the worth by using Telnet Server.

Curriculum model plans to extend the IP training base (IP(지식재산권) 교육 저변확대를 위한 교과운영모델 방안)

  • Jo, Jaeshin;Song, Yosoon
    • Journal of Digital Contents Society
    • /
    • v.17 no.5
    • /
    • pp.329-338
    • /
    • 2016
  • As the creative economy is considered important recently, learner-centered IP(Intellectual Property) education has proliferated rapidly to universities, and there are greater attention and demand on IP education. On the other hand, there are lack of curriculums and an accreditation for IP education. This paper is to propose IP education module and emphasize the need of the accreditation for IP education and its authentication plan. This paper will also show the need of specialists and educational curriculum in the field of IP, the current status and the analyse of the IP education, and the trend of IP courses in intellectual-property-leading universities. It subsequently examines the domestic education accreditation system and the National Competency Standard(NCS) curriculum and suggests the IP education 8 courses model as a curriculum management model, the standard curriculum of the IP educational system, and the instructional module.

An Experimental study on the Method of Detection and Blocking against SIP Flooding (SIP 플러딩 탐지 차단 실험방법에 대한 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • Privacy IP hacking problems such as invasion of privacy, password cracking, voice wiretapping and internet over charged occurred, because VoIP internet voice phone service gradually spread. This thesis attempted to attack the VoIP service network by application. First use application to spoof IP address then attempted wiretap the VoIP service and sends a lot of messages to disturb service movement. At this point, we connected VoIP soft terminal, so we can operate real-time filtering operator to block the SIP Flooding offence by monitor the traffic and detect the location where it got attacked. This thesis used experiment to prove it is possible to detect the offence and defend from SIP Flooding offence.

A Study on the Secure Authentication Method using SIP in the VoIP System (VoIP 시스템에서 SIP를 이용한 보안 인증기법에 관한 연구)

  • Lee, Young Gu;Kim, Jeong Jai;Park, Chan Kil
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.31-39
    • /
    • 2011
  • VoIP service uses packet network of ip-based because that has eavesdropping, interception, illegal user as vulnerable elements. In addition, PSTN of existing telephone network is subordinate line but VoIP service using the ip packet provide mobility. so The user authentication and VoIP user's account service using VoIP has emerged as a problem. To solve the vulnerability of SIP, when you use VoIP services with SIP, this paper has made it possible to authenticate user's terminal by using proxy server and proxy server by using authentication server. In conclusion, sender and receiver are mutually authenticated. In the mutual authentication process, the new session key is distributed after exchanging for the key between sender and receiver. It is proposed to minimize of service delay while the additional authentication. The new session key is able to authenticate about abnormal messages on the phone. This paper has made it possible to solve the vulnerability of existing SIP authentication by using mutual authentication between user and proxy server and suggest efficient VoIP service which simplify authentication procedures through key distribution after authentication.

A Study on the Utilization of Intellectual Property Rights Convergence in Mobile Games through Market Analysis (시장분석을 통한 모바일게임 융복합 지식재산권 활용 연구)

  • Lee, Hyun-Ku;Kim, Tae-Gyu
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.309-314
    • /
    • 2020
  • In this study, look into the future prospects of mobile games produced using IP, in the domestic market and to present more effective IP selection criteria when producing new mobile games using IP. To this end, classified IP-enabled mobile games and analyzed IPs used for IP-enabled mobile games by each type for games that are located in the top 200 in sales ranking of Google Play Store. According to the analysis, the mobile game using IP has shown significant performance in terms of sales performance, and the trend will continue in 2020. It was analyzed that 'Game' types of IP using games(based on domestic games) can achieve the highest sales results. Since the success of a game affects a variety of factors other than IP, further research is needed in more diverse ways on the impact of IP on the success.

A Design of PC Power-Saving System Security Using IP Address Restriction (IP 주소 제한을 이용한 PC 절전 시스템 보안 설계)

  • Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.49-57
    • /
    • 2013
  • Power-saving PC software enables the inexpensive power control, but the installation of the power-saving software in all computers in the organization is not an easy task. Computer users in the organization are usually not cooperative as they do not think the power-saving cost is directly related to themselves. The PC power-saving system provides advantage to driving active participation in which users installs the power saving software by restricting IP address through the power management server. However, the problem with this approach is the security vulnerability to IP spoofing attacks, therefore we need to solve the problem that disrupt the entire network system rather than saving electric power. This paper proposes the security authentication system that can implement the efficiency saving power by providing high security for the members' computer system of the public institutions based on the PC power-saving system. Also, by analyzing it in comparison with other method, it is possible to check that the prospects of safety and efficiency are strengthened.