• Title/Summary/Keyword: Virtual Asset

Search Result 40, Processing Time 0.032 seconds

A Gamer Perception Study of Analyzing by Ecological Psychology in Virtual Environment -Focus on Battleground- (생태학적 심리학관점에서 분석한 게이머의 가상환경 지각연구 -배틀그라운드 중심으로-)

  • Kim, Dae-Woo
    • Cartoon and Animation Studies
    • /
    • s.50
    • /
    • pp.239-273
    • /
    • 2018
  • There have been many topics in gamer research on gamers' game addiction, education, and psychological interest. This paper investigates how to perceive the virtual environment of gamers based on James Gibson 's theories of cognitive science. Gibson's theory is not a stimulus input through individual sensory receptors, but rather a learning process such as establishing a cognitive relationship between perceptual systems, external invariant property separation, behavioral learning, invariant property separation of events, selectiveism development. Based on this analysis tool, I collected and verified gamers' perception of game environment of by FGI survey method. The results of the analysis showed that Gibson 's perceptual learning process was perceived as a virtual environment as in reality, and there was also perceptual difference found only in games. Patterned perception develops in the direction of classifying invariant properties appearing in the game based on the purpose of the game. In this study, it can be seen as a result of the research that FGI interview can be summarized as patterning (typification) perception process based on the goal consciousness of gamers. But,The results of the study suggest that the psychological analysis of the gamer can not be presented by the FGI results alone. In the future, we need a model study to confirm the causality and the verification through statistical analysis.

Measuring the Economic Value of Open Government Data: A Consumer Utility Perspective (공공데이터의 경제적 가치 측정: 소비자 효용 관점)

  • Chihong Jeon;Jaeung Sim;Daegon Cho
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.1-19
    • /
    • 2018
  • In many countries, governments invest a substantial amount of budget in open government data (OGD) for governmental performance and transparency. To understand the actual performance of such policies, the governments should measure the realized value. Many organizations and researchers have attempted to assess the value of OGD. However, they have neglected a perspective of consumers who benefit from OGD. Moreover, little research has quantified the economic value. This research examines extant methods of intangible asset valuation to quantify the economic value of OGD in a citizen perspective. In consideration of the extant research methods and the characteristics of OGD, the contingent valuation method is the most appropriate because it effectively reflects various users and their purpose of use. We then conduct a survey of citizens living in Seoul, Korea and assess the economic value of OGD provided by the Seoul government. Findings show that citizens' willingness to pay (WTP) differs across respondents' prior experience, tax resistance, perceived benefit and perceived reality of virtual scenario, but it does not differ across their demographics. WTP also significantly varies across the question formats. We discuss the reliability of the results and implications for future research.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

3D Restoration of Cultural Remains for Exhibiting Augmented Reality (증강현실 활용 전시를 위한 문화 유물 디지털 3D 복원)

  • Zheng, mei-ying;Ryu, Seuc-Ho
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.549-554
    • /
    • 2017
  • In recent years, as the importance of history has increased through various social issues, media, and journalists in Korea, it has led to the value of 'right history' and 'teaching history that is right. History of a country is also a core asset in a country 's cultural contents industry, and historical relics are important to prove its value. As the interest in the historical and cultural heritage has increased, researches to develop it as cultural contents by restoring it as information and communication technology such as multimedia and virtual reality are active. In this paper, we propose convergence device and contents that can provide rich experience and various learning opportunities in artifact experience through restoration of artifacts using augmented reality. The study on the application effect of educational game contents which can add fun can be continued.

A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition (사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구)

  • Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.65-73
    • /
    • 2022
  • Since cyber operations are performed in a virtual cyber battlefield, the measurement indicators that can evaluate and visualize the current state of the cyber environment in a consistent form are required for the commander to effectively support the decision-making of cyber operations. In this paper, we propose a method to define various evaluation indicators that can be collected on the cyber battlefield, normalized them, and evaluate the cyber status in a consistent form. The proposed cyber battlefield status element consists of cyber asset-related indicators, target network-related indicators, and cyber threat-related indicators. Each indicator has 6 sub-indicators and can be used by assigning weights according to the commander's interests. The overall status of the cyber battlefield can be easily recognized because the measured indicators are visualized in time series on a single screen. Therefore, the proposed method can be used for the situational awareness required to effectively conduct cyber warfare.

AprilTag and Stereo Visual Inertial Odometry (A-SVIO) based Mobile Assets Localization at Indoor Construction Sites

  • Khalid, Rabia;Khan, Muhammad;Anjum, Sharjeel;Park, Junsung;Lee, Doyeop;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.344-352
    • /
    • 2022
  • Accurate indoor localization of construction workers and mobile assets is essential in safety management. Existing positioning methods based on GPS, wireless, vision, or sensor based RTLS are erroneous or expensive in large-scale indoor environments. Tightly coupled sensor fusion mitigates these limitations. This research paper proposes a state-of-the-art positioning methodology, addressing the existing limitations, by integrating Stereo Visual Inertial Odometry (SVIO) with fiducial landmarks called AprilTags. SVIO determines the relative position of the moving assets or workers from the initial starting point. This relative position is transformed to an absolute position when AprilTag placed at various entry points is decoded. The proposed solution is tested on the NVIDIA ISAAC SIM virtual environment, where the trajectory of the indoor moving forklift is estimated. The results show accurate localization of the moving asset within any indoor or underground environment. The system can be utilized in various use cases to increase productivity and improve safety at construction sites, contributing towards 1) indoor monitoring of man machinery coactivity for collision avoidance and 2) precise real-time knowledge of who is doing what and where.

  • PDF

Analysis of trends in information security using LDA topic modeling

  • Se Young Yuk;Hyun-Jong Cha;Ah Reum Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.99-107
    • /
    • 2024
  • In an environment where computer-related technologies are rapidly changing, cyber threats continue to emerge as they are advanced and diversified along with new technologies. Therefore, in this study, we would like to collect security-related news articles, conduct LDA topic modeling, and examine trends. To that end, news articles from January 2020 to August 2023 were collected and major topics were derived through LDA analysis. After that, the flow by topic was grasped and the main origin was analyzed. The analysis results show that ransomware attacks in 2021 and hacking of virtual asset exchanges in 2023 are major issues in the recent security sector. This allows you to check trends in security issues and see what research should be focused on in the future. It is also expected to be able to recognize the latest threats and support appropriate response strategies, contributing to the development of effective security measures.

Prospects & Issues of NFT Art Contents in Blockchain Technology (블록체인 NFT 문화예술콘텐츠의 현황과 과제)

  • Jong-Guk Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.1
    • /
    • pp.115-126
    • /
    • 2023
  • In various fields such as art, design, music, film, sports, games, and fashion, NFTs (Non-Fungible Tokens) are creating new economic value through trading platforms dedicated to NFT art and content. In this article, I analyze the current state of blockchain technology and NFT art content in the context of an expanding market for blockchain-based NFT art content in the metaverse. I also propose several tasks based on the economic and industrial logic of technological innovation. The first task proposed is to integrate cultural arts on blockchain, metaverse, and NFT platforms through digital innovation, instead of separating or distinguishing between creative production and consumption. Before the COVID-19 pandemic, there was a clear separation between creators and consumers. However, with the rise of Web 3.0 platforms, any user can now create and own their own content. Therefore, it is important to promote a collaborative and integrated approach to cultural arts production and consumption in the blockchain and metaverse ecosystem. The second task proposed is to align the legal framework with blockchain-based technological innovation. The enactment and revision of relevant laws should focus on promoting the development of the NFT trading platform ecosystem, rather than merely regulating it for user protection. As blockchain-based technology continues to evolve, it is important that legal systems adapt to support and promote innovation in the space. This shift in focus can help create a more conducive environment for the growth of blockchain-based NFT platforms. The third task proposed is to integrate education on digital arts, including metaverse and NFT art contents, into the current curriculum. This education should focus on convergence and consilience, rather than merely mixing together humanities, technology, and arts. By integrating digital arts education into the curriculum, students can gain a more comprehensive understanding of the potential of blockchain-based technologies and NFT art. This article examines the digital technological innovation such as blockchain, metaverse, and NFT from an economic and industrial point of view. As a limitation of this research, the critical mind such as philosophical thinking or social criticism on technological innovation is left as a future task.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.