• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Review of IPTV Threats Based on the Value Chain

Vol. 3, No.2, April 25, 2009
10.3837/tiis.2009.02.003, Download Paper (Free):

Abstract

The demand for services using digital technology is constantly increasing as new developments in digital consumer electronics and the Internet are made. This is especially true in terms of the demand for IPTV utilizing high speed Internet networks. Research on IPTV threats is important for facilitating financial transactions via IPTV and preventing illegal use or copying of digital content. Thus, this paper analyzes IPTV threats via the IPTV value chain. That is, the distribution system for IPTV service is analyzed along with the components of the value chain and corresponding IPTV security requirements or security technologies, in order to perform a threat analysis and research suitable for the IPTV service environment. This paper has a greater focus on the value chain of the IPTV business than the approach in previous research, in order to analyze security requirements and technologies that are more applicable to the business environment.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Hong Joo Lee, "A Review of IPTV Threats Based on the Value Chain," KSII Transactions on Internet and Information Systems, vol. 3, no. 2, pp. 163-177, 2009. DOI: 10.3837/tiis.2009.02.003

[ACM Style]
Lee, H. J. 2009. A Review of IPTV Threats Based on the Value Chain. KSII Transactions on Internet and Information Systems, 3, 2, (2009), 163-177. DOI: 10.3837/tiis.2009.02.003