• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.034 seconds

Social Phenomena and Challenges for Internet Fandom Culture (Be Focussed on the Method of Link Value and Scalability for Korea Wave Fandom) (인터넷 팬덤문화의 사회적 현상과 과제 (한류 팬덤 연결의 가치부여 방식과 확장성을 중심으로))

  • Kang, Jang-Mook;Song, You-Jin;Choi, Mi-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.235-241
    • /
    • 2013
  • This article examines the Internet fandom culture of YouTube and Facebook and Twitter for Korea Wave Fandom. This article the principle of shared network connection and re-mediated and looked at in terms of the spread and the value passed. Useful field of view which korea wave look forward to continue to release and Challenges. At the same time, Korea wave fandom optimized to analyze and understand the fundamental principles of the SNS, the new media and the spread of the wave, the need arises. Korea Wave fandom connection value granted, through the process of tracking. Watch for them through the propagation and spread of Korean culture and virtuous principles. Korea Wave fandom research this article in the future for fandom korea wave and dig into the more fundamental principles of deductive help understand expected.

A Study on the Structure of Research Domain for Internet of Things Based on Keyword Analysis (키워드 분석 기반 사물인터넷 연구 도메인 구조 분석)

  • Namn, Su-Hyeon
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.273-290
    • /
    • 2017
  • Internet of Things (IoT) is considered to be the next wave of Information Technology transformation after the Internet has changed the process of doing business. Since the domain of IoT ranging from the sensor technology to service to the users is wide, the structure of the research domain is not delineated clearly. To do that we suggest to use the Technology Stack Model proposed by Porter et al.(2014) to measure the maturity level of IoT in organizations. Based on the Stack Model, for the general understandings of IoT, we do keyword analyses on the academic papers whose major research issue is IoT. It is found that the current status of IoT application from the perspectives of cloud and big data analytics is not active, meaning that the real value of IoT has not been realized. We also examine the cases which deal with the part of cloud process which is crucial for value accrual. Based on these findings, we suggest the future direction of IoT research. We also propose that IT is to value chain what IoT is to the Stack Model to derive value in organizations.

  • PDF

A Study on Safe Electronic Commerce Activation Plan (안전한 전자상거래 활성화 방안에 관한 연구)

  • Park, Sun-Ae;Choi, Seong-Wook;Kim, Bong-Hyun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.741-744
    • /
    • 2006
  • The e-commerce introduction at the Internet in base accept the renovation dimension from the organised side because of follow of the business in order to the big change. So when I considering the e-commerce introducing the problem easy to originate from the efficiency and expectation without radical preparation. Each commodities over the dimension of Internet information search it is using the various transaction of service as a matter of bank, securities, education, game that many business on the alternation of e-commerce and commerce tool the essentiality. Therefore the transactions at the Internet e-commerce under hold specific gravity and rule in the future with the propection increase the interest concern about the security skill. A study on this paper presentation through the planning method about the analysis on the objective which e-commerce follow the inflection of efficiency strategy and induction the plan on the penetration's revitalization about Internet e-commerce.

  • PDF

Study on the Security R&R of OT-IT for Control System Network Boundaries (제어 네트워크 경계에 대한 OT-IT 책임 역할 연구)

  • WOO, Young Han;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.19 no.5
    • /
    • pp.33-47
    • /
    • 2020
  • In recent years, due to the demand for operating efficiency and cost reduction of industrial facilities, remote access via the Internet is expanding. the control network accelerates from network separation to network connection due to the development of IIoT (Industrial Internet of Things) technology. Transition of control network is a new opportunity, but concerns about cybersecurity are also growing. Therefore, manufacturers must reflect security compliance and standards in consideration of the Internet connection environment, and enterprises must newly recognize the connection area of the control network as a security management target. In this study, the core target of the control system security threat is defined as the network boundary, and issues regarding the security architecture configuration for the boundary and the role & responsibility of the working organization are covered. Enterprises do not integrate the design organization with the operation organization after go-live, and are not consistently reflecting security considerations from design to operation. At this point, the expansion of the control network is a big transition that calls for the establishment of a responsible organization and reinforcement of the role of the network boundary area where there is a concern about lack of management. Thus, through the organization of the facility network and the analysis of the roles between each organization, an static perspective and difference in perception were derived. In addition, standards and guidelines required for reinforcing network boundary security were studied to address essential operational standards that required the Internet connection of the control network. This study will help establish a network boundary management system that should be considered at the enterprise level in the future.

The study of Internet Electronic Voting of S. Korea with Spatial Information System analysed by the Application of Scenario Planning (공간정보시스템을 활용한 인터넷전자투표 연구: 시나리오플래닝을 중심으로)

  • Lee, Sang-Yun
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.3
    • /
    • pp.604-626
    • /
    • 2012
  • As a society of knowledge and information has been developed rapidly, because of changing from web environment to ubiquitous environment, a lot of countries across the world as well as S. Korea for e-Government have come to use the internet electronic voting for a variety of elections. So this research focused on the strategy consulting of the internet electronic voting of S. Korea with spatial information system analysed by the application of 'scenario planning' as a foresight method. And as a consequence, the strategy formulation of the electronic voting for the future S. Korea is to use the biometrics technology system as vein recognition and face recognition, using a part of the human body like a password, with spatial information system.

  • PDF

Demand Diffusion Pattern of Service with Market Structure & Technological Competition : A Case of Internet Access Service (기술경쟁과 시장구조를 고려한 서비스 수요확산패턴: 인터넷접속서비스를 중심으로)

  • Kim, Moon-Soo;Lee, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9B
    • /
    • pp.822-831
    • /
    • 2008
  • This paper examines the theoretical and empirical technology diffusion processes to understand the Korean success in the internet access service markets. In order to do this, first, we propose an integrated demand diffusion model in terms of competition of inter-and intra-technologies and market structure as represented by the number of operators in the market. Second, by using the proposed model, we analyze the dynamic diffusion processes of Korean internet access services such as Narrow-band technology including Dial modem vs. Broad-band technology including ISDN, xDSL and Cable modem. The competition of inter-and intra-technologies as well as the extent of market competition has made a positive effect on the diffusion patterns of internet access demand. And also we propose, based on the proposed model and its empirical results, several implications for diffusion strategies and policies in the future of ICT market in Korea.

A Study on the Internet Domain's Name Dispute Sdution Methods at EC times (EC시대(時代) 인터넷 도메인명(名) 분쟁(紛爭) 해결(解決) 방안(方案)에 관한 연구(硏究))

  • Park, Jong Sam;Park, Young Tae
    • Journal of Arbitration Studies
    • /
    • v.9 no.1
    • /
    • pp.291-322
    • /
    • 1999
  • The world of today faces a radical change, a new revolution, by the spread of the Internet. It is used not only for advertising but also for the exclusive rights in the field of information and communication, in add to the way of developing everyday our lives with world news, home-shopping, on-line education and so on. Actually, since the Internet Domain's Name(IDN) is unique over the world, the individual and the companies which provide information through the Internet have a keen competition to make a good IDN to memorize and organize all available information provided them. As a result, there are an increasing number of the cases where one company files suit against another for the validity of it's IDN so the policy to arbitrate and solute the cases is required. This paper is going to introduce the structure and the system of management for IDN. It will also discuss the efficient management of IDN, various case analysis of the dispute restraint and solutions, and the movement of improving the management procedure of IDN in WIPO. So we suggest to examine common disputes among IDN uses and solution methods for future problem at EC times. Therefore we have to establish the dispute solution system. Here are the two methods : one is that to establish a dispute solution organization. This organization which can conduct the new dispute solution procedure differs from the existing legislation system. The other is that to establish a dispute solution procedure i.e. the various dispute solution procedure for efficient dispute solution : council, inspection, mediation and arbitration. This procedure is conducted on-line due to features of the IDN disputes, also along with the current legislation system and the International dispute solution procedure. Because there is possibility the IDN disputes usually are connected with other countries. As there is no specific disputes solution procedure so far, we have to wait while development occurs that also striving to be coherent with and between the domestic and International solution procedure by helping to establish the International dispute solution procedure.

  • PDF

Proposition of System Algorithm for Implement Machine Socialization Environment (Machine Socialization 환경 구현을 위한 시스템 알고리즘 제안)

  • Kim, Wung-Jun;Im, Hyeok;Hwang, Jong-Seon;Jeong, Ji-O;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.595-597
    • /
    • 2015
  • In recent years, global Internet of Things is being fostered by strategic industry in major countries (IoT: Internet of Things) technology is the future Internet -based context-aware infrastructure capable of communication between objects and things. Existing technology was only a single device control via P2M (Puman to Machine) method and simple sensor data to someone directly control the devices down command. However, a kind of IoT Machine Socialization of devices, each device uses an internal feature information, and M2M (Machine to Machine) devices in ways that expand the overall scenario collaboration system through the Device Manager. In this paper, an algorithm of the whole system of the Machine Socialization for changing the system of the conventional system of P2M by M2M, and analysis.

  • PDF

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Development of the EPG Provider System based on DAB (DAB 기반의 EPG Provider 시스템 개발)

  • Jin Hyun-Joon;Park Nho-Kyung;Hwang Woon-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.12
    • /
    • pp.51-60
    • /
    • 2004
  • DAB(Digital Audio Broadcasting) is a new media service that can provide CD quality audio, various data service, interactive and high quality mobile communications through popular media such as terrestrial broadcasting, satellite, cable TV, and internet. In this paper, a new EPG(Electronic Program Guide) application model is proposed. The model is based on DAB and combines a DAB receiver and PCs so that it can take advantages of using various multimedia services and plenty of internet contents. The developed EPSD(EPG Provider System on DAB) has Web-based Server/Client structure and povides EPG functionalities to client PCs over internet. Therefore, the DAB receiver can be smaller and cheaper, and can develop abundant data services on internet. It can also provide high quality video services and be expected to become an important component in future home network systems.