• Title/Summary/Keyword: 인증효과

Search Result 566, Processing Time 0.035 seconds

The Effect of Hallmark of the Environment Friendly Agricultural Products on the Consumer Value and Purchase Intention - Centering around the Moderating Effect of Regulatory Focus and Construal Level (친환경농산물의 인증마크가 소비자가치와 구매의도에 미치는 영향 - 조절초점과 해석수준의 조절효과를 중심으로)

  • Lee, Seung-Hee;Han, Sang-Bak;Do, Hyeon-Ok;Seo, Kyeong-Do
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.143-156
    • /
    • 2011
  • To accomplish these purposes, First, this research divided hallmark of the environment friendly agricultural products into organic products and pesticide-free products and participants are classified as having promotion or prevention regulatory focus. In addition, consumer value type is categorized into value of social psychology and functional value. Second, construal level divided into high and low on the relationships between the consumer value and purchase intention. The main factors of the consumer value such as value of social psychology and functional value were found from the previous studies. This study is meaningful that the fit of regulatory focus between hallmark of organic products and pesticide-free products in environment friendly agricultural products. The regulatory relevance could moderate the level of persuasion knowledge activation. Also, This research is meaningful that the fit of construal level theory between Consumer value and purchase intention by person's psychological personality. The construal level relevance could moderate the level of marketing activation.

A Study on the Effective Managerial Schemes of an Accredited Engineering Program (공학교육인증 프로그램의 효과적인 운영방안에 관한 연구)

  • Yu, In-Keun
    • Journal of Engineering Education Research
    • /
    • v.10 no.2
    • /
    • pp.62-72
    • /
    • 2007
  • Since the ABEEK has been launched in 2000, many educational programs have been accredited by the ABEEK so far, and lots of programs nationwide are under preparation for the accreditation. However, most of institutes are suffering from the new accreditation system that requires some novel concepts of engineering education, so called, outcomes-based and demand-driven education processes. In this paper, the effective managerial schemes obtained from several years experiences of an accredited program are summarized. Especially, specific contents of the 7 accreditation criteria those need to be periodically documented are recommended and the effective processes for each item are described in detail.

A Study on Multi_Kerberos Authentication Mechanism based on Certificate (인증서기반의 Multi_Kerberos 인증시스템에 관한 연구)

  • Shin, Kwang-Cheul;Cho, Sung-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.57-66
    • /
    • 2006
  • In this paper. proposes Multi_Kerberos certification mechanism that improve certification service of based on PKINIT that made public in IETF CAT Working Group. This paper proposed to a certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, to get public key from DNS server by chain (CertPath) between realms by certification and key exchange way that provide service between realms applying X.509, DS/DNS of based on PKINIT, in order to provide regional services. This paper proposed mechanism that support efficient certification service about cross realm including key management. the path generation and construction of Certificate using Validation Server, and recovery of Session Key. A Design of Multi_Kerberos system that have effects simplify of certification formality that reduce procedures on communication.

  • PDF

A Study on the Management of Reading Certification System by Elementary School Libraries in Gapyeong, Gyeonggi-do (경기도 가평지역 초등학교 도서관의 독서인증제 운영에 관한 연구)

  • Ryu, Yeon-Yi;Kang, Soon-Ae
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.1
    • /
    • pp.235-255
    • /
    • 2012
  • The Reading Certification System is a form of reading education, a program in which homeroom teachers or librarians certify and reward students' reading and reading activities in order to raise motivation for reading. This study investigates and analyzes the management of the Reading Certification System in elementary school libraries in Gapyeong County, indicating problems and providing ways to resolve them by examining theories on school libraries' reading education and the Reading Certification System through a documentary survey and by conducting a survey of librarians and students on the categories of management, effectiveness, satisfaction levels, reading activities and reading motivation factors. An analysis of the survey results yielded the following suggestions for improvement: there should be a recommended books selection, a separate budget for a diverse reward system and more reading activities for students with low participation levels. I hope the results of this paper will be used as a reference when implementing the Reading Certification System in elementary schools, and that it will be an opportunity in changing perspective when applying the system.

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.

A Protection Technique for Screen Image-based Authentication Utilizing the WM_INPUT message (WM_INPUT 메시지를 활용한 이미지 기반 인증 보호방안 연구)

  • Lee, Kyungroul;Yim, Kangbin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.177-178
    • /
    • 2018
  • 키보드 정보가 노출되는 취약점이 발견되면서 키보드를 통하여 아이디 및 비밀번호를 입력하는 인증의 보안성 결여 문제가 대두되었다. 이를 대응하기 위하여 마우스를 통하여 비밀번호를 입력하는 이미지 기반 인증이 등장하였으며, 이 인증방식은 인터넷 뱅킹 및 결제 서비스와 같이 중요도가 높은 서비스에 도입되어 사용자가 입력하는 비밀번호를 안전하게 보호한다. 하지만 키보드와 동일하게 사용자가 입력하는 마우스 데이터가 노출되는 취약점이 발견되고 있으며, 본 논문에서는 WM_INPUT 메시지를 활용하여 노출되는 마우스 데이터를 보호하는 방안을 제시한다. 제시하는 방안은 WM_INPUT 메시지를 활용하는 공격을 효과적으로 방지하며, 이를 통하여 이미지 기반 인증방식의 안전성을 강화할 수 있을 것으로 사료된다.

  • PDF

Management of Digital Media Broadcasting Contents Users Based on Group Signature Scheme (그룹 인증 기법을 이용한 이동 멀티미디어 방송 콘텐츠 사용자 관리 방안)

  • Shin, Ki-Woo;Park, Young-Hoon;Seo, Seung-Woo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.155-158
    • /
    • 2010
  • 급증하고 있는 이동 멀티미디어 방송 콘텐츠 서비스의 수요에 발맞추어 이 서비스를 이용하는 사용자들을 효율적으로 관리하는 방안에 대해 관심이 집중되고 있다. 1991년 Chaum과 van Heyst에 의해 소개된 그룹 인증 관리 기법은 익명성의 보장이나, 관리상의 편의로 인해 앞에서 언급된 문제를 해결하는 데 중요한 역할을 할 것으로 예상되었다. 하지만, 이후 소개된 몇개의 그룹 인증 관리 기법들이 실제로는 익명성을 보장하지 못 하거나, 외부 그룹에 의해 악용될 수 있다는 점이 증명되어, 그룹 인증 관리 기법을 실제로 응용하기 이전에 안전성 보장을 위해 요구되는 적합한 기준들을 선정하고, 이 기준에 부합하는지를 살펴보는 일이 더욱 시급한 문제로 대두되었다. 이에 본 논문은 이동 멀티미디어 방송 콘텐츠 서비스를 이용하는 사용자들을 그룹 인증 기법으로 관리하는 데 있어, 요구되는 안전성 조건과 이에 적합한 그룹 인증 기법을 소개하고, 실제로 소개한 그룹 인증 기법이 본 논문에서 선정한 안전성 조건에 부합하는지를 증명하였다. 더불어, 그룹 인증 기법을 실제 효과적으로 응용할 수 있는 비즈니스 모델을 제안하여 그룹 인증 기법의 효용 및 앞으로의 개발 방향을 제시하였다.

  • PDF

A study on an Efficient Kerberos Authentication based on X.509 (X.509 인터넷 공개키 기반구조에서 Kerberos 인증에 관한 연구)

  • 김철현;신광철;김창원
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.5
    • /
    • pp.641-652
    • /
    • 2002
  • In this paper, proposes Kerberos certification mechanism that improve certification service of PKINIT base that announce in IETF CAT Working Group. Bid to certificate other realm because search position of outside realm through DNS and apply X.509 directory certification system, acquire public key from DNS server by chain (CertPath) between realms by certification and Key exchange way that provide service between realms applying X.509, DS/DNS of PKINIT base. In order to provide regional services, Certification and key exchange between realms use Kerberos symmetric method and Session connection used Directory service to connection X.509 is designed using an asymmetric method. By efficient TGT (Ticket Granting Ticket) exchange and reusability of ticket, A Design of Kerberos system that have effect and simplification of certification formality that reduce overload on communication.

  • PDF

Development of Genuine Product Authentication Framework and Genuine Distinction Algorithm Using Design QR Code (디자인 QR코드 기반 정품인증 프레임워크 및 정품판별 알고리즘 개발)

  • Heo, Gyeongyong;Lee, Imgeun;Park, Some Sick;Woo, Young Woon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.6
    • /
    • pp.13-20
    • /
    • 2015
  • A genuine product authentication framework and genuine distinction algorithm based on design QR code is proposed in this paper. The proposed framework consists of design QR code, a smart phone application for authentication, and a server system. Design QR code is a shape-modification of conventional QR code according to manufacturer's and/or product's need. In the design QR code, information about manufacturer and product is written. The written information can be read with general QR code reader, however, the content is transformed with authentication code, used in the first step authentication, and the meaning cannot be inferred. The application conducts the first step authentication and sends the resulting information to the server system for the second step authentication. The server system decides the genuinity using look-up history. The proposed framework can improve the authentication effect while minimizing the additional costs by managing the history through the server system. The proposed framework has proven to be effective in actual use, such as that used for the management of garbage bags in Ansan city.

An Empirical Study on Expectation Factors and Certification Intention of ISMS (ISMS 인증 기대 요인 및 인증 의도에 관한 연구)

  • Park, Kyeong-Tae;Kim, Sehun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.375-381
    • /
    • 2015
  • In the past few years, data leakage of information assets has become prominent issue. According to the NIS in South Korea, they found 375 cases of data leakage from 2003 to 2013, especially 49 of cases have been uncovered in 2013 alone. These criminals are increasing as time passes. Thus, it constitutes a reason for establishment, operation and certification of ISMS, even for private enterprises. The purpose of this study is to examine the factors influencing the certification intention of ISMS using EFA (Exploratory Factor Analysis) and regression analysis. We identified expectation factors for certification of ISMS from 13 elements using EFA (Strengthening practical ability & economic effect factor and Improvement of security level & handling incident factor). Next, we examined that the certification intention of ISMS using regression analysis. As a result of regression analysis, Strengthening practical ability & economic effect factor is not significant for the certification intention of ISMS (p<.05). Also, Improvement of security level & handling incident factor have a significant and positive effect on the certification intention of ISMS (p<.05).