• Title/Summary/Keyword: Agent Identity

Search Result 82, Processing Time 0.021 seconds

A Study for the Perception of Job Identity, Public Service Motivation and Organizational Committment focusing on Airport Security Agents (고용형태에 따른 직무정체성, 공직봉사동기 및 조직충성도에 대한 연구 : 공항 특수경비원들의 인식을 중심으로)

  • Park, Sung-Sik;Cho, Sung-Hwan;Kim, Kwang-Ok;Jung, Ju-Yong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.31-43
    • /
    • 2017
  • Airport security staff are outsourced workers, whose status is a special security agent under the security service law in Republic of Korea, who are subject to persuing both profitability and public concern at the same time. This paper has chosen the sample of security staff working at Incheon airport. This is because airport security staff is being outsourced, this paper had made an empirical research such areas as the perception of job identity, public service motivation and organizational commitment through job satisfaction. According to statistical research, it was found the perception on job identity by airport security staff had a significant negative effect on both job satisfaction and organizational commitment. The more they have perceived their status as non-permanent status, the less they had job satisfaction and commitment at the same time as a special security agent at airport. Their perception of job identity had a significant effect on such public service motivation factors as 'absorbing public concern' and 'a solicitude'. Lastly, their motivation factors had also significant positive effect on job satisfaction and organizational commitment.

The Proposals of Identity Escrow Scheme to Control User's Anonymity (사용자의 익명성을 제어하는 신원 위탁 방식 제안)

  • 황보성;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.617-624
    • /
    • 2000
  • We introduce the concept of a Identity Escrow Scheme, an application of key escrow ideas to solve the problem of authentication. In the Identity Escrow Scheme, the User escrows a own real identity to the Issuer and receives a Authentication Information. In authentication step, between the User to the Service Provider, the User only gives a Authentication Information to the Service Provider. Therefore, the Service Provider don't know a real identity of user's. However, when the User does unlawful actions, the Lawful Agent is called by the Service Provider, and his anonymity is revoked by cooperation of the Issuer and the Lawful Agent. We propose new Identity Escrow Schemes and analyze these.

  • PDF

An efficient ID-based authentication scheme based on the rth -residuosity problem in wireless environment (무선통신 환경에서 사용 가능한 고차잉여류 문제에 기반을 둔 자체 인증방식)

  • 이보영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.73-82
    • /
    • 1999
  • In an open network computing environment a host cannot to identity its users correctly to network services. In order to prevent this thing we present the design of a authentication scheme 솟 using the notion of rth -residuosity problem and discrete logarithm problem which is proposed by S. J. Park et al. The proposed scheme described here is efficient method for mutual authentication without leakage of users identity in mobile communication system that ensure user anonymity and untraceability.

Is Moral Identity theory a post-kohlbergian? - The function of the reflective reasoning in the moral identity theory and it's implication (도덕적 정체성 이론은 탈 콜버그주의인가?)

  • Son, Kyung-Won
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.395-432
    • /
    • 2011
  • The purpose of this study is (i) to explore arguments of post-kohlbergian approach in moral psychology and; (ii) to analyze Blasi's and Lapsley's positions regarding the relationship between moral philosophy and psychology in terms of reflective reasoning and; (ⅲ) to suggest their's implication concerning the future development of moral identity theory. Moral identity theory has emerged as an alternative approach of the Kohlberg's moral development theory. Theorists of moral identity theory commonly criticize Kohlberg's theory as a philosophical psychology and insist the autonomy of moral psychology. However, one can find different positions within this trend, especially concerning he meaning and role of the reflection in moral functioning. Blasi emphasizes the importance of the reflective reasoning of moral agent, while Lapsley supports moral automacy contrary to Kohlberg's phenomenalism. Although Blasi had been negative about building moral psychology based on the moral philosophy, he has articulated the moral identity theory based on the concept of free will by Frankfurt. However, recently he criticizes intuitionist theory of Haidit and suggests the notion of the moral agent with the skill of reflective reasoning, or post-conventional thinking in Kohlberg's terms. Blasi's perspective of moral identity has two version. The one emphasizes the moral understanding which means strong evaluation, while the other refers to reasoning with weak evaluation. This leads to an inevitable inner contradiction within his theory of moral identity. Lapsley considers moral identity as a heuristic idea and suggests moral chronic as a new model of moral identity. This model is based on the social cognitive theory. His social cognitive model of moral personality provides the account for implicit, tacit, and automatic of moral functioning, while reflecting the core of moral identity. Lapsley suggests that moral function involves conscious and unconscious processes. The former occurs in normal situations of life, while the latter in rare and unusual situations. He does not highlight reasoning in moral functioning as Blasi do. In consequence, I will argue the notion of the moral agent with the skill of reflective reasoning, or post conventional thinking in Kohlberg's terms in the moral functioning like Gibbs and Turiel positions in the Journal of Moral Education' s 2008 special issue. Moral philosophy and psychology should be in complementary relations. It means we explore not only more interdisciplinary researches on the moral functioning, but also researches based on the moral philosophy.

A Study of Culture Marketing Shown in window Display Area - Focused on Brand Identity in Department Store and Fashion Brand - (윈도우 디스플레이 공간에 나타난 문화마케팅 - 백화점 및 패션 브랜드 브랜드 아이덴티티를 중심으로 -)

  • Kwon, Yang-Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.2
    • /
    • pp.140-149
    • /
    • 2008
  • The purpose of this study is to consider the present situation and cases of culture marketing as brand identity shown in Window Display Area, focusing on department store and fashion brand, one of the recent cultural trends. Display in windows of existing department store and fashion brand has represented ultimate goal of sales by coordination of products, seasons and themes based on profits. However, display has recently become brand identity which department store and fashion brand create by correlating art and commercialism since the era of various lifestyles and emotional consumption. Through identity in department store and fashion brand, cultural marketing shown in show window display space cooperates with customers, corporations, artists and culture and art foundations. The result of this research is the following : First, corporations result in improvement in their image and brand perception with a distinctive marketing strategy. Second, as an agent of art customers form a positive relation with corporations and can feel emotional values and enjoy culture through cultural marketing contents, which are shown by department store and brand. Third, we can expect that artists, culture and art foundations form the best partnership by creative activities with department store and brand and cultural marketing activities make a great contribution towards society.

Users' Perception and Behavioral Differences Depending on Chatbot Agent Identities (챗봇 에이전트 정체성(identity)에 따른 사용자의 인식 및 행동 차이에 대한 연구 개인, 기관, 기계 에이전트의 차이를 중심으로)

  • Kim, Yoojung;Han, Sang Kyu;Yoon, Zongmuk;Heo, Eunyoung;Kim, Jeong-Whun;Lee, Joongseek
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.45-55
    • /
    • 2017
  • In recent years, some service providers have introduced chatbot agents to provide engagement in the healthcare field. However, current research on chatbot agents is still limited to designing various chatbot identities for healthcare services. By contrast, this study aims to investigate how various agent identities affect users' perceptions and behaviors differently. We developed three chatbot agents with different identities: a doctor (an individual), a hospital (an institution), and a virtual agent (a machine). Then, we recruited 36 users and divided them into three groups, each using a different chatbot agent. They were asked to track their behaviors and review advice from the chatbot agent for six days. Post-hoc surveys and interviews were conducted in order to investigate users' perceptions. The findings are as follows: participants felt more trusting and intimate with the doctor and hospital agents than with the virtual agent. Many of the participants preferred the hospital agent due to its higher reliability. However, all three agents did not lead the participants to change their behaviors. This study contributes to providing practical guidelines for designing chatbots in the healthcare field by studying users' perceptions and behaviors depending on chatbot identities.

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing

  • Hundera, Negalign Wake;Mei, Qian;Xiong, Hu;Geressu, Dagmawit Mesfin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.455-472
    • /
    • 2020
  • As a user in modern societies with the rapid growth of Internet environment and more complicated business flow processes in order to be effective at work and accomplish things on time when the manager of the company went for a business trip, he/she need to delegate his/her signing authorities to someone such that, the delegatee can act as a manager and sign a message on his/her behalf. In order to make the delegation process more secure and authentic, we proposed a secure and efficient identity-based proxy signcryption in cloud data sharing (SE-IDPSC-CS), which provides a secure privilege delegation mechanism for a person to delegate his/her signcryption privilege to his/her proxy agent. Our scheme allows the manager of the company to delegate his/her signcryption privilege to his/her proxy agent and the proxy agent can act as a manager and generate signcrypted messages on his/her behalf using special information called "proxy key". Then, the proxy agent uploads the signcrypted ciphertext to a cloud service provider (CSP) which can only be downloaded, decrypted and verified by an authorized user at any time from any place through the Internet. Finally, the security analysis and experiment result determine that the proposed scheme outperforms previous works in terms of functionalities and computational time.

Epizootiologic Surveys on Canine Parvovirus Infections of Dogs Kyungbuk West Area (경북서부지역에서의 개 파보바이러스 감염상황 조사)

  • 김성국;이정아;오강희;박영구
    • Korean Journal of Veterinary Service
    • /
    • v.17 no.3
    • /
    • pp.174-180
    • /
    • 1994
  • The disease syndrome characterized by the acute vomiting and diarrhea with high mortality had been greatly epidemic in Kyungbuk West Area since March 1990 and it was followed serologically for the classification of the agent. The agent present in feces of dogs associated with this syndrome had characteristic feature in agglutinating pig red blood cells that was specifically inhibited by anti-CPV reference dog serum. This also showed the serological identity with the reference CPV antigen in Hemagglutinating inhibition test. The result obtained were summarized as follows : 1. During 5 years(March. 1990∼September. 1994), 1,470 dogs were investigated on the actual condition of CPV infections. The Infection rate of CPV from dogs was 62.5% and mortality rate was 59.8%. 2. Among 24 fecal samples collected from the dogs with enteric disease, all showed the hemagglutinating activity to porcine erythrocyte ranging from 40 to 5,120 of HA titers. 3. Among 12 sera samples collected from the dogs with enteric disease, all showed the serological identity with the reference CPV antigen from 5 to 5,120 of HI titers. 4. Bacteriologic examination of fecal specimens resulted in the isolation of pathogeric bacteria such as Staphylococcus sp, Streptococcus sp, Escherichia coli and Bacillus. Cultures for salmonella sp and Clostridium remaind negative. 5. The prevalence and identification of internal parasites were determined by fecal examination using the floatation methods. From 20 fecal samples 12(60.0%) were isolated and their species were Toxacara canis, Toxascaris leonina, and coccidium.

  • PDF

A Trust Management Model for PACS-Grid

  • Cho, Hyun-Sook;Lee, Bong-Hwan;Lee, Kyu-Won;Lee, Hyoung
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.144-149
    • /
    • 2007
  • Grid technologies make it possible for IT resources to be shared across organizational and security domains. The traditional identity-based access control mechanisms are unscalable and difficult to manage. Thus, we propose the FAS (Federation Agent Server) model which is composed of three modules: Certificate Conversion Module (CCM), Role Decision Module (RDM), and Authorization Decision Module (ADM). The proposed FAS model is an extended Role-Based Access Control (RBAC) model which provides resource access capabilities based on roles assigned to the users. FAS can solve the problem of assigning multiple identities to a shared local name in grid-map file and mapping the remote entity's identity to a local name manually.

The Khitans: Corner Stone of the Mongol Empire

  • LANE, GEORGE
    • Acta Via Serica
    • /
    • v.6 no.1
    • /
    • pp.141-164
    • /
    • 2021
  • The Khitans were a Turco-Mongol clan who dominated China north of the Yangtze River during the early mediaeval period. They adopted and then adapted many of the cultural traditions of their powerful neighbours to the south, the Song Chinese. However, before their absorption into the Mongol Empire in the late 13th century they proved pivotal, firstly in the eastward expansion of the armies of Chinggis Khan, secondly, in the survival of the Persian heartlands after the Mongol invasions of the 1220s and thirdly, in the revival and integration of the polity of Iran into the Chinggisid Empire. Da Liao, the Khitans, the Qara Khitai, names which have served this clan well, strengthened and invigorated the hosts which harboured them. The Liao willingly assimilated into the Chinggisid Empire of whose formation they had been an integral agent and in doing so they also surrendered their identity but not their history. Recent scholarship is now unearthing and recognising their proud legacy and distinct identity. Michal Biran placed the Khitans irrevocably and centrally in mediaeval Asian history and this study emphasises their role in the establishment of the Mongol Empire.