• Title/Summary/Keyword: User Network

Search Result 4,591, Processing Time 0.03 seconds

Analytical Framework for the Impact of Technical Change on Business Model Innovation (기술 변화의 영향을 고려한 비즈니스모델 혁신 분석 틀)

  • Lim, Hong-Tak;Han, Jeong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.139-148
    • /
    • 2019
  • The paper proposes an analytical framework for the impact of technical change on business model innovation. Based upon the examination of the relationship between the mission of business and technology, it introduces classification of technology-based business models such as problem-solving model, production model and network model, respectively employing intensive technology, interlinked technology and mediating technology as a key technology. The discussion of various cases of business model innovation shows that the impact of digital technology is first translated into the value generation in terms of efficiency or effectiveness. These new values then enable a new business model which is based on a different key technology through business model shift, expansion, unbundling, or platform. Quite often those business model changes involves system-wide innovation. The framework for the analysis of the impact of technical change on business model innovation is presented with directions for future research.

Study on Next Generation V2X System and Its Transmission Range (차세대 V2X 시스템과 그 전송 거리 분석)

  • Ahn, Jinsoo;Kim, Baik;Kim, Ronny Yongho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.1
    • /
    • pp.36-43
    • /
    • 2019
  • In this paper, a novel channel access scheme for the next-generation vehicle to anything (V2X) system based on IEEE 802.11p standard which is applied to recent connected car technologies is suggested and analyzed. The proposed scheme proposes a channel access method utilizing OFDMA multi-user transmission for IEEE 802.11p based system. In this paper, the authors examine geographical distance and network area performance of IEEE 802.11p system and the proposed scheme. Results of this research show that the proposed scheme is quite suitable for improving conventional V2X standards and systems. This paper also provides mathematical analysis and simulation results of the conventional IEEE 802.11p system and the proposed scheme.

A Study on the Influencing Factors on Social Media Use Intensity and Fatigue, and the Moderating Effect of Process Incentive Expectations (소셜 미디어 사용 강도 및 피로감에 미치는 영향 요인과 성과기대의 조절 효과 연구)

  • Park, Kiho
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.215-227
    • /
    • 2021
  • This study empirically studied the factors affecting the intensity of use of mobile social media and fatigue. Theories for the research framework were based on the theory of planned behavior, the theory of private information protection, the theory of flow, and the theory of process incentives. As a result of data analysis, it was found that self-efficacy, user habits, and flow experience positively influence the intensity of mobile social media use. This study assumed that personal information protection issues negatively affect the intensity of mobile social media use, but have little influence on the use intensity. The intensity of media use had a positive effect on media fatigue. In other words, when the intensity of using mobile social media increased, the feeling of fatigue increased. The expected process incentives variable did not show a moderating effect between media use intensity and social media fatigue. The findings will have implications for social media-related companies and organizations that want to use social media tools for business and public services.

Blockchain-based Copyright Management System Capable of Registering Creative Ideas (창의적인 아이디어를 등록할 수 있는 블록체인 기반의 저작권 관리시스템)

  • Hwang, Jung-sik;Kim, Hyun-gon
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.57-65
    • /
    • 2019
  • Creative works such as webtoon and web novel are part of property rights. However, illegal copies of them are distributed on the internet easily, which raises social issues in today's society. In order to tackle these problems, this paper proposes and presents a blockchain based copyright management system that ensures forgery prevention, robust security features, improving trading performance, cost-effective, and enhanced visibility. The system allows a user to register creative works formally just the same as before registration and also to register simple creative ideas just anytime. In the latter case, if an idea or a thought flashes across through somebody's mind, he or she can register it to the system immediately without formal registration process and afterward, can utilize a way to prove its originality through the system. Regarding large size images and video files of creative works, the system reduces data size and storage volume sharply to be processed by network entities by storing original creative works separately and including only the hash result of creative works to the transactions.

Web Server Hacking and Security Risk using DNS Spoofing and Pharming combined Attack (DNS 스푸핑을 이용한 포털 해킹과 파밍의 위험성)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1451-1461
    • /
    • 2019
  • DNS spoofing is an attack in which an attacker intervenes in the communication between client and DNS server to deceive DNS server by responding to a fake IP address rather than actual IP address. It is possible to implement a pharming site that hacks user ID and password by duplicating web server's index page and simple web programming. In this paper we have studied web spoofing attack that combines DNS spoofing and pharming site implementation which leads to farming site. We have studied DNS spoofing attack method, procedure and farming site implementation method for portal server of this university. In the case of Kyungsung Portal, bypassing attack and hacking were possible even though the web server was SSL encrypted and secure authentication. Many web servers do not have security measures, and even web servers secured by SSL can be disabled. So it is necessary that these serious risks are to be informed and countermeasures are to be researched.

SAD : Web Session Anomaly Detection based on Bayesian Estimation (베이지언 추정을 이용한 웹 서비스 공격 탐지)

  • 조상현;김한성;이병희;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.115-125
    • /
    • 2003
  • As Web services are generally open for external uses and not filtered by Firewall, these result in attacker's target. Web attacks which exploit vulnerable web-applications and malicious users' requests cause economical and social problems. In this paper, we are modelling general web service usages based on user-web-session and detect anomal usages with Bayesian estimation method. Finally we propose SAD(Session Anomaly Detection) for detection unknown web attacks. To evaluate SAD, we made an experiment on attack simulation with web vulnerability scanner, whisker. The results show that the detection rate of SAD is over 90%, which is influenced by several features such as size of window or training set, detection filter method and web topology.

Authenticated Handoff with Low Latency and Traffic Management in WLAN (무선랜에서 낮은 지연 특성을 가지는 인증유지 핸드오프 기법과 트래픽 관리 기법)

  • Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.81-94
    • /
    • 2005
  • Recently, wireless LAN circumstance is being widely deployed in Public spots. Many People use Portable equipments such as PDA and laptop computer for multimedia applications, and also demand of mobility support is increasing. However, handoff latency is inevitably occurred between both APs when clients move from one AP to another. To reduce handoff latency. in this paper, we suggest WFH(Weighted Frequent Handoff) using effective data structure. WFH improves cache hit ratio using a new cache replacement algorithm considering the movement pattern of users. It also reduces unessential duplicate traffics. Our algorithm uses FHR(Frequent Handoff Region) that can change pre-authentication lesion according to QoS based user level, movement Pattern and Neighbor Graph that dynamically captures network movement topology.

A WLAN Pre-Authentication Scheme Based on Fast Channel Switching for 3G-WLAN Interworking (3G-WLAN Interworking 환경에서의 빠른 채널스위칭 기반의 무선랜 선인증 기법)

  • Baek, Jae-Jong;Kim, Hyo-Jin;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.57-66
    • /
    • 2011
  • The current trend of the handover authentication delay time is gradually increased according to the interworking between 3G cellular network and WLANs. Therefore, authentication mechanism minimized in delay is required to perform the seamless handover and support the inter-subnet and inter-domain handover. In this paper, we propose a novel pre-authentication scheme based on the fast channel switching which directly performs the authentication with the next access point in advance. In addition, the proposed scheme is efficient in the inter-domain handover and can be easily implemented in current WLANs since it just modifies the client side of user. To analysis and evaluate our scheme, we compare the packet loss ratio and the delay time with the two standard 802.11 authentication schemes. The analytical results show that our scheme is approximate 10 times more effective than the standard schemes in packet loss and the delay time is minimized down to 0.16 msec.

Proposal of a Mutual Authentication and Key Management Scheme based on SRP protocol (SRP 기반의 DCAS 상호인증 및 키 관리 기법의 제안)

  • Choi, Hyun-Woo;Yeo, Don-Gu;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.53-65
    • /
    • 2010
  • Conditional Access System (CAS) is a core security mechanism of IPTV SCP (Service and Content Protection) which enables only authenticated user to be able to watch the broadcasting contents. In the past, it was general that CAS was built in Set-Top Box (STB) as hardware or as a detachable cable card. However, numerous researches in Downloadable CAS (DCAS), where users can download CAS code in their STB through their network, have been recently conducted widely due to the lack of security and scalability problem. In this paper, the security requirements of OpenCable based DCAS which is typical example of downloadable IPTV SCP will be derived, the novel authentication and key management scheme will be proposed by using the Authentication Proxy (AP) which is the core DCAS. Also, the benefits of the proposed system will be evaluated by comparison and analysis with preceding research.

The global response to K-POP idol group's New Hanbok: The case of Black Pink Fashion (K-POP 아이돌 그룹 신한복 스타일에 대한 글로벌 반응: 블랙핑크 패션 사례)

  • Choi, Yeong-Hyeon;Chen, Tianyi;Lee, Kyu-Hye
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.533-541
    • /
    • 2020
  • This study aims for investigating the consumers' reaction to the New Hanbok Style of K-pop idol groups. We collected YouTube videos and user comments that include 'Black Pink New Hanbok' as a keyword, applying social network analysis and sentiment analysis. First, the New Hanbok of Black Pink was designed as a mini-dress to make it easier to dance and turned out that it reinterpreted traditional elements modernly. Second, the issue about revealing costumes appeared as a keyword in domestic reactions, it did not appear in international reaction. Third, as a result of sentiment analysis, international audience viewed New Hanbok outfit more positively than domestic audience. This study is significant in that it suggests the direction to which New Hanbok should head to by investigating extensive consumers' reaction and finding out the positive and negative elements of New Hanbok.