• 제목/요약/키워드: Identity management

검색결과 952건 처리시간 0.026초

The effect of self-identity on body shape management

  • Kim, Jung-ae
    • International Journal of Advanced Culture Technology
    • /
    • 제5권1호
    • /
    • pp.17-25
    • /
    • 2017
  • The purpose of this study was to investigate the effects of self-identity on body shape management for college students. This study used descriptive research to analyze the effects of self-identity, which has contained factors of Subjectivity, Self-acceptance, Future Confidence, Goal Orientation, Scrupulous. The subjects were 404 college students located in C province who were voluntarily agreed. Multiple regression analysis was conducted to verify the effects on self - identity and body shape management. As a result, self - acceptance of self - identity' subcomponents had no effect on body shape management, but future confirmation, goal orientation, Scrupulous, intimacy affects body shape management(P < 0.001). Based on these results, in order to manage the body shape of college students, it is considered effective to present the visible goals and apply the programs that students can do themselves. In addition, it can be seen that it is effective to start body shape management during college group life to enhance intimacy.

인터넷 Identity 관리 시스템을 위한 프라이버시 인가 (Privacy Authorization for Internet Identity Management System)

  • 노종혁;진승헌;이균하
    • 한국통신학회논문지
    • /
    • 제30권10B호
    • /
    • pp.648-659
    • /
    • 2005
  • 인터넷에 산재되어 있는 사용자 개인정보의 오남용은 더 이상 간과할 수 없는 문제이다. 개인정보의 유통은 반드시 소유자의 허가 하에서만 이루어져야 하고, 개인정보를 관리하는 사이트는 인터넷에 익숙하지 않은 사용자들에게 개인정보 유출에 관한 두려움을 없애줄 수 있는 환경을 제공하여야 한다. 본 논문은 인터넷 Identity 관리시스템에서 개인정보를 안전하게 관리하고 유통할 수 있는 기술을 소개한다. 개인정보의 소유자가 자신의 정보를 관리하는 방법, 정보 관리 시스템 차원에서 사용자 정보를 관리하기 위한 정책, 개인정보 접근을 제어하는 Privacy Controller 등 여러 관점에서의 프라이버시 인가 기술을 제안한다. 그리고, 정책 기반의 프라이버시 인가 기술을 인터넷 Identity 관리 시스템에 적용하기 위한 다양한 모델을 제시한다.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권4호
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

전문대학의 정체성 연구 (Identity of College in Korea)

  • 주광신
    • 경영과정보연구
    • /
    • 제13권
    • /
    • pp.189-219
    • /
    • 2003
  • Colleges are faced with crises. The nature of colleges lies in those of college's identity. The purpose of this research is to clarify college's identity and then to establish college's identity. An organizational identity reflects its central and distinguishing attributes, including core values, mission. The role & function, values and mission can be used to clarify college's identity. Colleges need to establish their own identity as follows. 1. Solidifing core forces 2. Making mission statement 3. Creating vision 4. Creating cultic culture 5. Appointing CEO who was grown up inner

  • PDF

블록체인 분산신원증명에 기반한 탈중앙화된 마스크 중복구매 확인 시스템 (A Decentralized Face Mask Distribution System Based on the Decentralized Identity Management)

  • 노시완;장설아;이경현
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제9권12호
    • /
    • pp.315-320
    • /
    • 2020
  • 신원인증은 오래전부터 사회에서 개인을 식별하고 그에 맞는 서비스 등을 제공하기 위해 사용되던 중요한 기술이다. 인터넷 인프라의 발전으로 사회의 많은 부분이 온라인 영역으로 전환되며 신원인증 기술 또한 온라인으로 확장되었다. 하지만 여전히 신원인증 기술은 정부와 같이 신뢰하는 제3의 기관에 전적으로 의존하고 있다는 한계가 있다. 중앙화된 신원관리체계는 서로 다른 신원관리체계를 운용하는 기관 사이의 신원인증 과정을 매우 복잡하게 만들고 비용·시간적으로도 매우 비효율적으로 만들고 있다. 특히 2020년 코로나 바이러스로 인한 마스크 품귀 사태에서 사용된 중복구매 방지 시스템의 구축과정에서 중앙화된 신원관리체계의 한계가 여실히 드러났다. 분산신원증명은 사용자 스스로 자신의 신원정보를 관리하는 방법으로 최근에는 블록체인기술을 사용한 분산신원증명 기술이 다수 제안되고 있다. 본 논문에서는 기존의 중앙화된 신원관리체계의 한계를 분석하고 차후 코로나 바이러스와 같은 국가적인 비상상황에서 사용가능한 분산신원증명 시스템을 제안한다.

성역할정체감에 따른 체면민감성과 외모관리행동 (Social Face Sensitivity and Appearance Management Behaviors according to Sex Role Identity)

  • 박은희
    • 패션비즈니스
    • /
    • 제16권5호
    • /
    • pp.164-177
    • /
    • 2012
  • The purpose of this study was to classify sex role identity into groups and analyze the difference of social face sensitivity and appearance management behaviors by sex role identity. Questionnaires were administered to 306 people in their twenties and thirties living in Daegu Metropolitan City and Kyoungbuk province. The data was analyzed by using frequency, factor analysis, credibility, ${\chi}^2$-test, ANOVA, Duncan-test, and t-test. The findings were as follows. Sex role identity were classified into four groups (androgyny, masculineness, feminineness, and undifferentiation). Men in androgyny group showed the highest rate of 41.3% followed by undifferentiation(24.7%), masculineness(21.3%), and feminineness(12.7%). Women in undifferentiation group showed the highest rate of 35.9% followed by feminineness(24.4%), androgyny(23.7%), and masculineness(16.0%). Social face sensitivity were composed of four factors (consciousness of being embarrassed, social formality, other consciousness, and prestige). Appearance management behaviors were composed of six factors (skin management, fashion image management, plastic surgery management, weight management, hair management, and health management). According to the result of a significant difference between social face sensitivity and appearance management behaviors by sex role identity, male showed significant difference between the sub-variables of social face sensitivity factors (consciousness of being embarrassed, social formality, and other consciousness). Both of the male and female showed a significance of difference in consciousness of being embarrassed, and social formality. Male showed significant difference between the sub-variables of appearance management behaviors factors (fashion image management, weight management, hair management, and health management). Both of the male and female showed a significance of difference in fashion image management. Gender of twenties and thirties showed distinction between the sub-variables of social face sensitivity factors (consciousness of being embarrassed, and prestige) and appearance management behaviors (skin management, fashion image management, plastic surgery management, weight management, and hair management).

A Study on Sociocultural Attitudes and Appearance Management Behavior in accordance with Gender Role Identity

  • Park, Eun-Hee
    • 패션비즈니스
    • /
    • 제16권3호
    • /
    • pp.107-124
    • /
    • 2012
  • The purpose of this study was to classify types in sense of gender role identity and to figure out the difference among sociocultural attitude, benefits of clothing pursuit, and appearance management behaviors by sense of gender role identity types. Questionnaires were administered to 455 people in their twenties and thirties living in Daegu and Kyoungbuk area. Data were analyzed by using frequency, factor analysis, credibility, $X^2$-test, ANOVA, Duncan-test, and t-test. The findings are as follows. First, Men of androgyny group showed the highest rate of 38.5% followed by undifferentiation(22.9%), masculineness(21.0%), and feminineness(17.6%). Women of undifferentiation group showed the highest rate of 33.2% followed by feminineness (25.2%), androgyny(22.0%), and masculineness(19.6%). Second, factors of sociocultural attitude were internalization and recognition. Benefits of clothing pursuit consists of the factors such as consciousness of others, personality, and vogue pursuit. Factors of appearance management behaviors were dressing, skin management, plastic surgery management, weight management, health management, and hair management. Third, the result from the difference between sociocultural attitude and benefits of clothing pursuit by sense of gender role identity types, men of androgyny and feminineness showed highest in recognition while women of androgyny showed highest in internalization and recognition. The result of the difference in benefits of clothing pursuit by sense of gender role identity shows that both men and women of androgyny group have high tendency for being conscious of others, personality pursuit, and vogue pursuit while men of undifferentiation and masculineness have low interest in dressing in relationship with others. Fourth, the examination of the difference in appearance management behavior by sense of gender role identity types found men of androgyny group managed dressing, skin, weight, health and hair most while women dress and health most. Men of undifferentiation group managed dressing and weight least, while men of masculineness health, and men of feminineness hair least.

The Asymmetric Effects of Identity Salience on Judgement: The Role of Valence and Attribute Congruence

  • DaHee Han;Claire Heeryung Kim
    • Asia Marketing Journal
    • /
    • 제25권2호
    • /
    • pp.84-98
    • /
    • 2023
  • A salient identity influences individuals' judgment on products. The current research investigates why identity salience sometimes produces asymmetric effects on an individual's judgment such that a salient identity often influences judgment on identity-congruent products only or identity-incongruent products only. Across two experiments, this research proposes and shows that the valence of identity-incongruent and identity-congruent attributes determines the direction of the asymmetric identity salience effects. Specifically, when an attribute of an identity-incongruent product is positively- (negatively-) valenced, identity salience influences judgment through a decreased (increased) preference for the identity-incongruent (identity-congruent) product.

인터넷 신원 관리 2.0에 대한 분석과 3.0에 대한 전망 (Analysis of Internet Identity Management 2.0 and Perspective of 3.0)

  • 박승철
    • 한국정보통신학회논문지
    • /
    • 제15권7호
    • /
    • pp.1501-1509
    • /
    • 2011
  • 재 인터넷의 서비스 제공자 중심적(service provider-centric)이고 고립형(isolated)의 선원 관리 1.0 모델(identity management 1.0 model)은 사용자 편의성 부족, 고비용 구조, 프라이버시 보호 어려움, 그리고 신뢰 인프라 부재 등의 여러 가지 문제를 안고 있다. 이러한 문제를 개선하기 위해 Passport/Live ID, Liberty Alliance/SAML(Security Assertion Markup Language), CardSpace, OpenID 등 SSO(Single Sign On) 서비스에 기초한 다양한 선원 관리 2.0 모델들이 개발되어 왔으나 실제 인터넷 환경에서 아직까지 신원 관리 1.0 모델을 대체할 수 있을 정도로 광범위하게 수용되지 못하고 있다. 본 논문은 현재 개발되고 있는 대표적인 신원관리 2.0 모델들을 비교분석하고, 분석 결과를 바탕으로 미래 인터넷을 위한 신원 관리 3.0 모델의 개발 방향을 제시하고자 한다.