• 제목/요약/키워드: Identification Key Management

검색결과 168건 처리시간 0.031초

The Effect of College Counselors' Authentic Leadership and Ethical Leadership on Students' School Satisfaction

  • Liu, Wenbin;Jin, Xiu
    • International Journal of Advanced Culture Technology
    • /
    • 제9권3호
    • /
    • pp.202-211
    • /
    • 2021
  • Teachers play a key role in influencing students' school lives, but many researchers have tried to improve school satisfaction in various aspects. And counselors are a special type of Chinese university teachers, and not only have the characteristics of university teachers, but also have daily administrative management functions related to students' school life. In this paper, we demonstrated the effect of college counselors' ethical leadership and authentic leadership on school satisfaction among Chinese university students. In addition, it also verified the mediating effect of organizational identification in this process. As a result of empirical analysis, ethical leadership have both positive effect on organizational identification and school satisfaction. Similarly, authentic leadership also have positive impact on organizational identity and school satisfaction. In addition, organizational Identification has a positive effect on school satisfaction. Furthermore, organizational identification has also been proven to mediate the relationship between both two types of leadership and school satisfaction. Finally, we found that authentic leadership was more influential than ethical leadership in increasing school satisfaction levels.

스마트 워치 터치스크린에서의 터치 키에 대한 사용성 연구 (Usability Evaluation of the Touch Keys for the Smart Watch)

  • 김수영;반기민;최재호;정의승
    • 대한산업공학회지
    • /
    • 제41권3호
    • /
    • pp.225-232
    • /
    • 2015
  • The smart watch is the most popular wearable computing device because it takes a form of wristwatch. Many smart watches have adopted the touch screen interface due to the limited size of display. This paper focuses on touch key size and spacing that affect the usability about the touch key of smart watch. The experiments were made for four touch key sizes (width${\times}$height; $5{\times}5$, $5{\times}7$, $7{\times}5$, $7{\times}7mm$) and nine touch key spacing (vertical${\times}$horizontal; $0{\times}0$, $0{\times}1$, $0{\times}3$, $1{\times}0$, $1{\times}1$, $1{\times}3$, $3{\times}0$, $3{\times}1$, $3{\times}3mm$). The completion time, error rate, control discomfort and identification discomfort were measured. The touch key size $7{\times}7$, $7{\times}5$ and the touch key spacing $3{\times}3$, $1{\times}3$ provided the best results in terms of the completion time and the control discomfort, while the square touch key ($7{\times}7$, $5{\times}5$) provided the best performance for the error rate measure. The result of this study can help ergonomically design the touch interface of the smart watch.

핵심 노드 선정을 위한 네트워크 기반 최적화 모델 (A Network-based Optimization Model for Effective Target Selection)

  • 이진호;이기현
    • 산업경영시스템학회지
    • /
    • 제46권4호
    • /
    • pp.53-62
    • /
    • 2023
  • Effects-Based Operations (EBO) refers to a process for achieving strategic goals by focusing on effects rather than attrition-based destruction. For a successful implementation of EBO, identifying key nodes in an adversary network is crucial in the process of EBO. In this study, we suggest a network-based approach that combines network centrality and optimization to select the most influential nodes. First, we analyze the adversary's network structure to identify the node influence using degree and betweenness centrality. Degree centrality refers to the extent of direct links of a node to other nodes, and betweenness centrality refers to the extent to which a node lies between the paths connecting other nodes of a network together. Based on the centrality results, we then suggest an optimization model in which we minimize the sum of the main effects of the adversary by identifying the most influential nodes under the dynamic nature of the adversary network structure. Our results show that key node identification based on our optimization model outperforms simple centrality-based node identification in terms of decreasing the entire network value. We expect that these results can provide insight not only to military field for selecting key targets, but also to other multidisciplinary areas in identifying key nodes when they are interacting to each other in a network.

스마트 카드에 적용 가능한 비밀분산법을 이용한 키 관리 시스템 (The Key Management System using the Secret Sharing Scheme Applicable to Smart Card)

  • 손영설;이동훈
    • 정보처리학회논문지C
    • /
    • 제11C권5호
    • /
    • pp.585-594
    • /
    • 2004
  • 다수의 사업자간에 공동키를 기반으로 서비스를 제공할 경우, 이에 사용되는 마스터키를 참여 사업자간에 적절하게 분배하여 관리할 필요가 있다. 본 논문에서는 하나의 비밀(secret)을 다수의 참가자에게 분배한 후, 비밀정보를 복원 필요시 참가자 전원 또는 참가자 집단 내에서의 특정 허가된 참가자만이 비밀을 복원할 수 있는 비밀분산법을 이용하여 마스터 키(master key)를 효율적이고 안전하게 관리할 수 있는 비밀분산 시스템을 제안한다. 제안한 시스템은 비밀정보의 안전한 저장과 참가자의 신원 인증을 위해 스마트카드(smart card) 매체를 이용하며, (t, t)과 (k, n)-임계치 비밀분산법을 조합하여 참가자의 소속 그룹(group) 또는 그룹 내에서의 보안권한(security level)에 따라 비밀정보를 분산 및 복원을 가능하도록 한다.

Novel Trusted Hierarchy Construction for RFID Sensor-Based MANETs Using ECCs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • ETRI Journal
    • /
    • 제37권1호
    • /
    • pp.186-196
    • /
    • 2015
  • In resource-constrained, low-cost, radio-frequency identification (RFID) sensor-based mobile ad hoc networks (MANETs), ensuring security without performance degradation is a major challenge. This paper introduces a novel combination of steps in lightweight protocol integration to provide a secure network for RFID sensor-based MANETs using error-correcting codes (ECCs). The proposed scheme chooses a quasi-cyclic ECC. Key pairs are generated using the ECC for establishing a secure message communication. Probability analysis shows that code-based identification; key generation; and authentication and trust management schemes protect the network from Sybil, eclipse, and de-synchronization attacks. A lightweight model for the proposed sequence of steps is designed and analyzed using an Alloy analyzer. Results show that selection processes with ten nodes and five subgroup controllers identify attacks in only a few milliseconds. Margrave policy analysis shows that there is no conflict among the roles of network members.

RFID를 이용한 전주 정보관리 시스템 (Pole Information Management System using RFID)

  • 이정구;김은주;배영철
    • 한국전자통신학회논문지
    • /
    • 제10권12호
    • /
    • pp.1367-1372
    • /
    • 2015
  • 본 논문에서는 기존에 사람의 눈으로만 인식하던 전주 번호찰 관리의 문제점을 해결하기 위하여 전주 번호찰에 RFID 태그를 내장하고 이 RFID 태그에 키 값을 저장한다. 저장된 키 값은 900MHz RFID 리더를 가지고 인식하며, 인식한 키 값은 블루투스를 이용하여 스마트폰으로 전송한다. 스마트 폰은 데이터 통신망을 통하여 키 값을 서버에 전송한 후 서버의 인증을 거쳐 필요한 정보를 다시 스마트 폰으로 전송받는 구조의 전주 정보 관리 시스템을 개발한다.

Risk Identification and Management Strategies for BIM Projects

  • Ng, Ron C.W.;Cheng, Jack C.P.;Das, Moumita
    • 국제학술발표논문집
    • /
    • The 8th International Conference on Construction Engineering and Project Management
    • /
    • pp.103-113
    • /
    • 2020
  • The construction industry is undergoing a digital transformation in which Building Information Modelling (BIM) is a key technology. The potential of BIM in several areas such as design optimization, time management, cost management, and asset management/facility management (AM/FM) is widely acknowledged by the AECO (Architecture, Engineering, Construction, and Operation) industry around the world. However, BIM implementation in construction projects is faced with problems such as project delay and cost overruns. The lack of identification of risks in BIM projects and standard guidelines on mitigation techniques furthers poor performance, dissatisfaction, and disputes between employers and project participants, which results in low BIM adoption rates. Therefore, the objective of this paper is to identify the potential risks in BIM implementation under the primary categories - (1) technical, (2) contractual, (3) management-related, and (4) personnel-related risks in BIM projects and present solutions to reduce, manage, and mitigate risks. To meet the objective of this paper, a survey was designed and conducted in the Hong Kong construction industry in which over 140 respondents from different disciplines, with experience in BIM projects, have participated. Based on the analysis of the survey data, the most severe and frequently occurring BIM risks and their potential mitigation strategies were identified and discussed in this paper.

  • PDF

스마트 폰 터치스크린에서의 작은 터치 키의 사용성 연구 (Usability Evaluation of the Size of Small Touch Keys for the Smart Phone)

  • 김보람;김태일;임영재;정의승
    • 대한산업공학회지
    • /
    • 제38권2호
    • /
    • pp.80-88
    • /
    • 2012
  • This paper focuses on small touch key size and spacing that affect the usability of the smart phones. The experiments examined thirty-six different touch key designs, combinations of four touch key sizes (width (mm) ${\times}$height (mm); $4{\times}4$, $4{\times}7$, $7{\times}4$, and $7{\times}7$), and nine spacings (horizontal (mm)${\times}$vertical (mm); $0{\times}0$, $0{\times}1$, $0{\times}3$, $1{\times}0$, $1{\times}1$, $1{\times}3$, $3{\times}0$, $3{\times}1$, and $3{\times}3$). Forty participants volunteered in the experiment. The completion time, error rate, identification discomfort, and control discomfort were measured. The results revealed that the touch key sizes of $7{\times}7$ and $7{\times}4$ provide the best performance in terms of the error rate measure, while the touch key size of $7{\times}7$ provides the best results for other measures. In addition, touch key spacings of $1{\times}1$, $1{\times}3$ and $3{\times}1$ are regarded as the best for all the measures. The results of this study suggest a practical approach for the small touch key design for the smart phones.

Towards a "better" University: the Use of the EFQM Model in a UK Higher Education Institution

  • Blackmore, Jacqueline;Douglas, Alex
    • International Journal of Quality Innovation
    • /
    • 제4권2호
    • /
    • pp.1-15
    • /
    • 2003
  • This paper examines the use of the EFQM Model in H.E. Institutions in the UK and offers a case study of how one University used the Excellence Model as a means to change the way it operated. It identifies and discusses the critical success factors for a university utilizing the Model, in particular Leadership (criteria 1), People Management, particularly with regard to performance evaluation (criteria 3), having key processes in place (criteria 5) and the identification of the correct key performance results for its various stakeholders (criteria 9).

OTP를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안 (Management Method to Secure Private Key of PKI using One Time Password)

  • 김선주;조인준
    • 한국콘텐츠학회논문지
    • /
    • 제14권12호
    • /
    • pp.565-573
    • /
    • 2014
  • 인터넷이 활성화되면서 우리는 PC나 스마트폰에서 온라인 뱅킹, 주식 거래, 쇼핑 등의 다양한 전자상거래를 한다. 인터넷 상에서 거래 당사자 간의 신원확인 및 부인방지를 위한 주요 수단으로 공인인증서를 주로 활용한다. 하지만, 2005년 이후로 공인인증서 사용자에 대한 공격이 증가하고 있다. 즉, 공격자는 사용자 PC로부터 탈취한 공인인증서와 개인키 파일을 가지고, 은행 계좌 조회/이체나 전자상거래에 정당한 사용자로 위장하여 사용하게 된다. 이때, 개인키 파일은 사용자의 비밀번호로 암호화되어 저장되고, 필요할 때마다 복호화 되어 사용한다. 만약, 사용자의 비밀번호가 공격자에게 노출된다면 암호화된 개인키 파일을 쉽게 복호화 할 수 있다. 이러한 이유로 공격자는 사용자 PC에 트로이목마, 바이러스 등의 악성코드를 설치하여 사용자 인증서, 개인키 파일, 비밀번호를 탈취하려고 한다. 본 논문에서는 개인키 파일을 OTP 인증기술을 이용하여 암호화함으로써 안전하게 관리할 수 있는 방안을 제안한다. 그 결과, 암호화된 개인키 파일이 외부에 노출되더라도 일회용 패스워드와 사용자 비밀번호가 노출되지 않으므로 암호화된 개인키 파일은 안전하게 보관된다.