• Title/Summary/Keyword: Cyber identity

Search Result 98, Processing Time 0.022 seconds

A study on DID self-sovereign identity for digital content management (디지털 콘텐츠 자기주권 신원 관리를 위한 DID 연구)

  • Baek, YeongTae;Min Youn, A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.395-396
    • /
    • 2020
  • 본 논문에서는 디지털 콘텐츠의 유통과정의 복잡함과 창작자에 대한 권리를 보장하기 위하여 블록체인 기반 플랫폼을 통하여 투명하고 무결성이 보장된 자기권한 관리가 가능하도록 DID(Decentralized Identity)의 적용을 연구하였다. DID의 효율적 적용을 위하여 DID문서와 Verifiable Credential과 presentation의 관리상 특징을 고려하고 DID를 통한 인증과정에서 발생하는 다양한 메타데이터에 대하여 차별화된 암호화 기법적용이 가능하도록 하였다. 본 논문의 연구를 통하여 디지털 콘텐츠에 대한 자기권한 관리가 보다 간단해지고 권리인증 과정 시 안정된 성능 제공이 가능할 것으로 사료된다.

  • PDF

The effect of job stress of system maintenance staff on emotion exhaustion: Focusing on the moderating effect of professional identity (정보시스템 운영인력의 직무 스트레스가 정서적 소진에 미치는 영향: 전문직 정체성의 조절효과를 중심으로)

  • Lee, Ji-Eun;Lim, Hee-Jeong
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.97-105
    • /
    • 2018
  • The fourth industrial revolution is expected to bring about great changes in information technology sector and create a variety of jobs. However, the psychological anxiety of IT staff is increasing due to stress and uncertainty created by the new technologies. Accordingly, researchers examined how professional identity moderate the effect of job stress of system maintenance staff on emotion exhaustion. For empirical studies, data was collected from 160 employees responsible for managing and supporting IS, and the hypothesis was verified using SPSS 21. The analysis results showed that role conflicts, role ambiguity, and qualitative work overload, which are components of job stress, have affected the emotion exhaustion. Professional identity had a moderating effect the relationship between qualitative work overload and emotion exhaustion. On the other hand, professional identity did not moderate the relationship between role conflict and emotion exhaustion, role ambiguity and emotion exhaustion. As professional identity lessen the psychological burden and emotion exhaustion of introducing new technologies, organizations need to provide support to enhance professional identity for system maintenance staff.

A study on the Development of Animated Graphic Chatting Program based on Facial Expression (표정과 제스처에 기반한 대화기법을 활용한 Animated Graphic Chatting 프로그램 개발 연구)

  • 안상혁;정진오
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.129-137
    • /
    • 1999
  • We see that the Interactive Entertainment Industry on the internet has a great potential to grow in the 21st century. There will be many kinds of internet content. Internet contents can be classified with six categories such as identity, entertainment, learning, shopping, community. However, we see that shopping and community have a higher market share among the six. Recently, community has become more important in making an internet business sucessful, because it is valuable in creating virtual society in cyber space. A chatting program has been an effective means to form community. So we developed the animation graphic chatting program that functions to express an emotion effectively compared to the text chatting.

  • PDF

An Analysis of Cyber Deviant Behaviors for the Practical Education of Information Ethics (실천적 정보통신윤리 교육을 위한 사이버 일탈행위 분석)

  • Yoo, Sang-Mi;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.51-70
    • /
    • 2010
  • The purpose of this article is twofold; first, investigates the relations between the cyber deviant behaviors and the reasons it causes in details and second discuss the measure to prevent cyber deviant behaviors and its recurrence. The findings of the study are; First, the factors which influence more to the cyber deviant behaviors are subjective norm, social identity, and self-control in a row. Second, identified such factors, anonymity (+), consciousness on public order (+), learning experience on information norms (-), and social identity have influences on the subjective norm that both factors of internet addiction (+) and anonymity (+) have significant impacts on self-control in negative perspectives. In conclusion, to prevent cyber deviant behaviors will provide a lot of opportunities to develop self-reflections and critical thinking and the ethics of accountability, and ability of sympathy. This study suggests the so-called reflexive practice-oriented process of education on Information as a strategic teaching-learning procedure. The process framework consists of four stages including problem identification, risk analysis, self-reflexive, and practice & evaluation that have a spiral structure, repeats a life-cycle.

  • PDF

Improvement of Digital Identify Proofing Service through Trend Analysis of Online Personal Identification

  • JongBae Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.1-8
    • /
    • 2023
  • This paper analyzes the trends of identification proofing services(PIPSs) to identify and authenticate users online and proposes a method to improve PIPS based on alternative means of resident registration numbers in Korea. Digital identity proofing services play an important role in modern society, but there are some problems. Since they handle sensitive personal information, there is a risk of information leakage, hacking, or inappropriate access. Additionally, online service providers may incur additional costs by applying different PIPSs, which results in online service users bearing the costs. In particular, in these days of globalization, different PIPSs are being used in various countries, which can cause difficulties in international activities due to lack of global consistency. Overseas online PIPSs include expansion of biometric authentication, increase in mobile identity proofing, and distributed identity proofing using blockchain. This paper analyzes the trend of PIPSs that prove themselves when identifying users of online services in non-face-to-face overseas situations, and proposes improvements by comparing them with alternative means of Korean resident registration numbers. Through the proposed method, it will be possible to strengthen the safety of Korea's PIPS and expand the provision of more reliable identification services.

The threats and responses of cyber-terrorism in a new security environment: Issues and propositions on strategic frameworks (새로운 안보환경을 둘러싼 사이버 테러의 위협과 대응방안: 쟁점들과 전략적 접근 틀에 대한 논의)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.109-145
    • /
    • 2014
  • Despite much discussions on cyber-terrorism in South Korea, several missing issues could be addressed. This paper attempts to deal with such missing but important issues. In South Korea, there has been little attentions on cyber-terrorism with the respects of national security strategy development under macro framework responding to future security environment. This article focuses on such issues. In other words, the purpose of this paper evaluates the meaning of national security threats raised from cyber-terrorism as a mode of security threats and proposes the matter of cyber-terrorism within the development of national security strategy in the future security environment. several issues in this discussion pass some important messages for the construction of national security strategic approach framework within the future security environment adding cyber-space. in the future environment, a new space called cyber is added as an important external condition which might determine the security of individuals, societies, and nations. Therefore, the fundamental strategic framework should be prepared. After that, the trend and direction of future technological advancement should be understood and the identity, nature, and types of threat should be analyzed. Also, after that, various responses and countermeasures are together constituted in the aspect of function and system regarding various anticipated threats of the future human society including cyber-terrorism.

  • PDF

A Study on the Improvement of Personal Identity Proofing Service Using an Alternative Method for Resident Registration Number Based on Electronic Signature (전자서명 기반의 주민등록번호 대체수단을 사용한 본인확인서비스 개선 방안에 대한 연구)

  • Kim, Jong Bae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.453-462
    • /
    • 2021
  • As the status of public certificates expired due to the recent revision of the Electronic Signature Act, electronic signature-based public certificates were also lost in the means of replacing resident registration numbers(RRN). As a result, public certification institutions have recently been designated by the Korea Communications Commission as identity verification service providers through a review of the designation of personal identity proofing agency based on alternative means of RRN. However, unlike existing RRN replacements such as i-PIN, mobile phones, and credit cards, the personal identity proofing process for applicants for certificates is different from existing alternatives. The proposed method shows that it is possible to protect users' personal information and provide universal, reasonable, and safe identification services by applying improvements to electronic signature-based personal identity proofing services.

The Aesthetic Consciousness of Cyberpunk in Fashion -Focused on Simulacres Concept- (사이버펑크 패션의 미의식 -시뮬라크르(Simulacres) 개념을 중심으로-)

  • 김현수;양숙희
    • The Research Journal of the Costume Culture
    • /
    • v.7 no.5
    • /
    • pp.104-121
    • /
    • 1999
  • The purpose of this paper is to make sure of identity as a paradigm of new fsahion to introduce the concept of Sumulacres by J. Baudrillard, For converting to new aesthetic value. To do this, we started observing the general concept of Simulacres, and examined Cyberpunk within thinking of Simulacres and Cyberpunk fashion at virtual space, and then divided aesthetic consciousness appeared at Cyberpunk fashion centering on the concept of Simulacres into inwards sense and outwards sense. Cyberpunk is understood to be one of tendency in the cyber cultures controlled by computer and electronic technology. It is not yet defined clearly and therefore ambiguous and still being elaborated. However, the form started changing our sense sinking into overall cultures in the World, including even movie, literature, music and fashion, and giving complex, deep cultural and artistic possibilities. Also, as a subculture, Cyberpunk is building its own cultural territory in cyber space and is experiencing more real Simulacres than that of it in the ordinary life.

  • PDF

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

Deokhu's culture in adolescent as a play space on Cyber (사이버상의 놀이 공간으로서 청소년의 덕후 문화)

  • Huh, Jeung-Kyeung
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.87-94
    • /
    • 2018
  • The purpose of this study is to explore the essential meaning of Deokhu's culture in adolescent as a play space on Cyber. A phenomenological research method guided data collection and analysis. Qualitative research methods collected from 18 in - depth interviews using semistructured question types for 13 to 17 year - old adolescents living in Seoul Jamsil. As a result, As a result, adolescent's Deokhu culture started by stress and social and emotional desire, and especially it was utilized as a play space on the cyber of purchase activity of fandom and goods around SNS activities. This has a positive effect on self-awareness as well as self-identity formation. Above all, the shortage of play time due to heavy school entrance and the lack of socially provided play space make the cyber space as another play space for the adolescents.