Search : [ author: Jihwan Kim ] (3)

Non-Fungible Token-based Virtual Avatar for User Identification in the Metaverse: Methodology and User Study for Virtual Reality Social Interaction

Jihwan Kim, Kwanguk (Kenny) Kim

http://doi.org/10.5626/JOK.2022.49.11.1032

Anonymity in the metaverse is a property that allows users to act freely in the virtual world, but it also causes several problems, including reliability with socially interactive partners. These problems can be partially addressed by traditional methodologies, but also require a more advanced method. To address this issue, we proposed a non-fungible token (NFT)-based avatar with the user"s appearance and personal information. A user study of 31 participants was also conducted to compare the proposed NFT-based avatar and traditional avatars in a socially interactive context. We found that higher interpersonal trust, higher co-presences, and positive emotional responses were formed when a user interacted with NFT-based avatars. This study has contributions in that we proposed an NFT-based virtual avatar methodology with user attributes and verified its usability in a socially interactive context.

Continuous-authentication Method based on the Risk Profile associated with Context-awareness to Lock Smart Devices

Jihwan Kim, Younho Lee

http://doi.org/

In order to block the access of the information in the smartphone of a user by other users, it is checked if the current user is the owner or not in the smartphone authentication process, whenever a user begins to use a smartphone. This makes smartphone users in front of frequent smartphone authentications, which leads significant inconvenience to them. Because of such inconvenience, users tend not to use the smartphone authentication anymore. Finally, their smartphones become very vulnerable against malicious access. This paper proposes a progressive authentication method on the android-platform in order to solve the problem described above. With the proposed method, smartphones can identify relevant risks based on users" past experiences and determine whether an authentication is needed. Because authentication occurs only when the identified risk level is high, it can achieve both a high-level of security in the high-level risk situation and user convenience in the low-level risk situation.

Risk Analysis on Various Contextual Situations and Progressive Authentication Method based on Contextual-Situation-based Risk Degree on Android Devices

Jihwan Kim, SeungHyun Kim, Soo-Hyung Kim, Younho Lee

http://doi.org/

To prevent the use of one’s smartphone by another user, the authentication checks the owner in several ways. However, whenever the owner does use his/her smartphone, this authentication requires an unnecessary action, and sometimes he/she finally decides not to use an authentication method. This can cause a fatal problem in the smartphone’s security. We propose a sustainable android platform-based authentication mode to solve this security issue and to facilitate secure authentication. In the proposed model, a smartphone identifies the current situation and then performs the authentication. In order to define the risk of the situation, we conducted a survey and analyzed the survey results by age, location, behavior, etc. Finally, a demonstration program was implemented to show the relationship between risk and security authentication methods.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr