• Title/Summary/Keyword: Digital Information Society

Search Result 10,630, Processing Time 0.035 seconds

A Study on the Application Environment and Utility of Mulitimedia Contents in Digital Library (디지털 도서관에서의 멀티미디어 컨텐츠 응용환경과 활용에 관한 연구)

  • 문경화;남태우
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.2
    • /
    • pp.107-126
    • /
    • 2004
  • With the development of information technology and digitalization in these days, information network of library has been accomplished rapidly. The use and concern on Multimedia contents are increasing in the digital library based on information network. In this study I examined the definition of Multimedia contents and analysed the contents services and contents management for the use of Multimedia contents in digital library. As a result. the effect of information technology is important for changing of information environment. Moreover, the multimedia which are resources whose information demand of the user is various contents with it is changing the possibility of knowing it was with application.

E-pub player for K-POP (한류를 위한 In-Apps 방식의 e-pub player 개발)

  • Kim, SeeWoo;Kang, JiAe;Kim, YuJeong;Ban, SoJung;Lim, Yunam;Jung, JiYung;Kang, HyeLin;Yun, InHee;Chun, SunHwa
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.287-288
    • /
    • 2012
  • 본 논문에서는 소비자 스스로 검색하는 콘텐츠를 분석하여 그 중 인지도가 높은 콘텐츠를 제휴하여 서비스 를 제공한다. 인지도 높은 동영상 콘텐츠에 전자책을 제작하여 새로운 콘텐츠로 재제작 유료 서비스 추진 하고 인지도 높은 전자책 콘텐츠를 동영상과 함께 새로운 콘텐츠로 제작하여 유료 서비스 추진한다. 그리고 콘텐츠 보유 개인, 기업 및 단체와 제휴를 통한 서비스 추진할 수 있고 나아가 번역기를 통한 다국어서비스로 글로벌 콘텐츠 서비스 추진한다.

  • PDF

A Study on the Integrated Digital Signature System based on Digital Signature Standards (디지틀 서명방식 표준 ( 안 ) 에 기반을 둔 통합서명 시스템에 관한 연구)

  • Kim, Seung-Joo;Kim, Kyung-Shin;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.984-994
    • /
    • 1998
  • In the information society, all the information is transferred through the network, so it becomes an issue to protect the data on network. One of the fundamental cryptographic tools to protect the data on network, is digital signatures, and in many countries, cryptographers have been trying to make their own digital signature standard. Also, at Crypto'89 meeting, D.Chaum suggested an undeniable signature scheme. Undeniable signatures are verified via a protocol between the signer and the verifier, so the cooperation of the signer is necessary, So far, there have been several variants of undeniable signatures to obtain a signature scheme, which can control the abuse of ordinary digital signatures.

  • PDF

A Psychological Approach to Reducing the Digital Divide for the Elderly Consumer: From the Perspective of Socioemotional Selectivity Theory (노년층 소비자의 디지털 정보격차 완화를 위한 심리적 접근: 사회정서적 선택이론의 관점에서)

  • Min, Dongwon
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.133-138
    • /
    • 2020
  • The ability to use ICT is now a prerequisite for living in the information age, and digital literacy, which can access and utilize various digital information such as online banking, shopping, news, and health care, is more important. It is increasing. Accordingly, the social inequality, or digital divide, related to accessing and accepting digital information and knowledge is also an important social issue. In particular, the digital divide by age is becoming a major issue, not only in terms of resolving social imbalances but also in resolving the structural problems of the economy in addition to the survival of the elderly. This study aims to find ways to resolve the digital gap of the elderly in terms of socioemotional selectivity theory and suggests the reasons for the elderly's less access to digital information acquisition and the implications for the solution.

Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation (디지털 포렌식 조사에서 효율적인 파일 복구를 위한 레코드 파일 카빙 기법)

  • Park, Minsu;Park, Jungheum;Lee, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.93-102
    • /
    • 2013
  • These days digital data have become essential for digital investigation because most of the crime was occurred by using the digital devices. However, digital data is very easier to falsify or delete. If digital data was deleted, it is necessary to recover the deleted data for obtain digital evidence. Even though file carving is the most important thing to gather. digital evidence in digital forensic investigation, most of popular carving tools don't contemplate methods of selection or restoration for digital forensic investigation. The goal of this research is suggested files which can obtain useful information for digital forensic investigation and proposed new record file carving technique to be able to recover data effectively than before it.

A Method to Identify How Librarians Adopt a Technology Innovation, CBAM(Concern Based Adoption Model): Focusing on School Librarians' Concern about Digital Textbooks

  • Kang, Ji Hei
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.50 no.3
    • /
    • pp.5-23
    • /
    • 2016
  • As new technologies change a society, librarians need to understand and adapt to technology innovations. However, most innovations that librarians are supposed to adopt are government-driven or top-down changes; and there have been very few studies conducted to identify any patterns or consistencies in librarians' perceptions of innovation. This paper, therefore, has two research purposes. First, it introduces the Concern Based Adoption Model (CBAM) as one method to gain a deeper understanding of how librarians see such changes. Second, this study identifies school librarians' concerns regarding digital textbooks in South Korea applying the CBAM theory. The test signifies that school librarians present a typical non-user profile, and the pattern anticipates a potential resistance to digital textbooks. Also, it discovers the less experienced and innovator librarians had higher concerns across every stage. The findings underscore a need of various interventions. The CBAM theory suggests, in terms of intense Stage 0 and 1, it is required for school librarians to have events to gain information about digital textbook implementation. Regarding targeted interventions, since the biggest gaps occurs in Stage 4, Consequence and Stage 5, Collaboration, according to school librarians' experience and adoption style, new school librarians need stronger engagement with the community, which including associations, mentors or peer support, and collaborating with public libraries; innovator school librarians require opportunities to test and present their use of digital textbooks (Hall and Hord 1987).

A study on configuring deployment of digital repositories for the archives management systems (대량기록물 처리를 위한 영구기록물관리시스템의 디지털저장소 배치형상 연구)

  • Yim, Jin-Hee;Lee, Dae-Wook
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.177-217
    • /
    • 2012
  • The National Archives of Korea(NAK) has a mission to ingest large-scaled digital records and information from a number of different government agencies annually from 2015. There are important issues related to the digital records and information transfer between NAK and agencies, and one of them is how to configure deployment of digital repositories for the archives management systems. The purpose of this paper is to offer the way to design it by examining the checkpoints through the whole life cycle of digital records and information in the archives management systems and calculating the amount of ingested digital records and information to the systems in 2015 and deploying the digital repositories configured according to the amount the records and information. Firstly, this paper suggests that the archives management systems in NAK should be considered and examined into at least three different parts called Ingest tier, Preservation tier and Access tier in aspects to the characteristics of the flow and process of the digital records and information. Secondly, as a results of the calculation the amount of the digital records and information ingested to the archives management systems in 2015 is sum up to around 2.5 Tera bytes. This research draws several requirements related to the large-scaled data and bulk operations which should be satisfied by the database or database management system implemented on to the archives management systems. Thirdly, this paper configures digital repositories deployment according to the characteristics of the three tiers respectively. This research triggers discussion in depth and gives specific clues about how to design the digital repositories in the archives management systems for preparing the year of 2015.

A Study on Comparison Analysis of Digital Forensic Technology for Preventing Information Leakage (정보유출 방지를 위한 디지털 포렌식 기술 비교분석 연구)

  • Park, Gwangmin;Hong, Seungwan;Kim, Jongpil;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.93-100
    • /
    • 2016
  • Important evidence or clue in general crime as well as crime relevant to computer has been discovered in digital devices including computer with advance of information technology and turning into a information-oriented society. A leakage of industrial technology and confidential business information is related to digital devices such as computer, smart phone, USB, etc. This paper deal with a current state and comparison analysis of digital forensic technology for developing way of forensic field, so we seek for method of preventing information leakage.