Design of DRM-LMS Model in M-Learning Environment
The development of the wireless Internet and digital contents is activating Internet business and, in this situation, most online contents providers are supplying diverse contents attracting users’ attention. These contents include not only texts but also multimedia such as music, images and videos. Various multimedia data are being applied to numerous areas like Internet broadcasting, education, news, sports, tourist information and experts’ consulting and creating new services in the virtual space. The present study examined M-learning, which is e-learning system in wireless Internet environment, and analyzed DRM technology for contents protection in M-learning. We planned a DRM-LMS system focused on contents protection, which has been insufficient until now, by designing basic components of e-learning user registration, course registration, report evaluation, personal learning schedule and classroom platform as well as course contents service using DRM to support mobile systems in wireless environment.
KeywordsDigital Content Copyright Protection Content Service Tourist Information Content Protection
Unable to display preview. Download preview PDF.
- 1.Kim, H.-y., Kim, J.-w.: An Empirical Research on Important Factors of Mobile Internet Usage. The Korea Society of Management Information Systems 12(3) (2002)Google Scholar
- 2.Yong-gyu, L.: A study on mobile DRM system technology in wireless internet service platform. Master’s thesis (2005) Google Scholar
- 3.Eun-mi, Im.: Design Strategies for the Tutorial Module to construct Intelligent Tutoring System. Master’s thesis (1999) Google Scholar
- 4.Lee, J.: Learning Content Management System based e-Learning Development and Application. Korean Association for Educational Information & Media 8(2) (2002)Google Scholar
- 5.Digital Rights Management Candidate Version 2.0., Open Mobile Alliance DRM W/G (2004)Google Scholar
- 6.Platform technique of wireless Internet. KTF technique education data, 5 (2003)Google Scholar
- 7.Korea Institute of Information Security & Cryptology: Next a generation network security technique. Korea Information Security Agency (2002)Google Scholar
- 8.DRM Content Format Candidate Version 2.0., Open Mobile Alliance DRM W/G (2004)Google Scholar