• Title/Summary/Keyword: Identity management

Search Result 946, Processing Time 0.024 seconds

The Effect of Emotional Labor of Clinical Practice, Self-esteem and Clinical Practice Satisfaction on Professional Identity in Nursing Students (간호대학생의 임상실습 감정노동, 자아존중감, 실습만족도가 직업정체감에 미치는 영향)

  • Nam, Mun Hee;Lee, Mi-Ryon
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.22 no.4
    • /
    • pp.527-536
    • /
    • 2016
  • Purpose: This study was conducted to explore the factors affecting emotional labor, self-esteem and clinical practice satisfaction on professional identity in nursing students. Methods: A total of 262 nursing students participated in the study. Data were analyzed using SPSSWIN 18.0. Results: The mean scores for emotional labor, self-esteem, clinical practice satisfaction and professional identity were above-average. There were significant mean differences in professional identity according to ages, academic score, motivation for selecting nursing, satisfaction with college life and satisfaction with nursing majors. Professional identity correlated positively with self-esteem and clinical practice satisfaction, negatively with emotional labor. The significant predictors of professional identity included satisfaction with nursing majors, self-esteem, emotional labor and motivation for selecting nursing. The regression model explained 38.9% of professional identity. Conclusion: To enhance professional identity in nursing students, it is necessary to build effective strategic to focus on promoting their satisfaction with the nursing major, self-esteem and management of emotional labor.

An Effects of Network Externalities for Knowledge Sharing Intention in Social Networking Sites: Social Capital and Online Identity Perspective (소셜 네트워킹 사이트에서 네트워크 외부성이 지식공유 의도에 미치는 영향: 사회적 자본과 온라인 정체성 관점)

  • Lee, Jungmin;Chung, Namho
    • Knowledge Management Research
    • /
    • v.13 no.3
    • /
    • pp.1-16
    • /
    • 2012
  • Nowadays, many first-time Internet users start off heavily using SNSs (Social Network Sites), such as Cyworld, Facebook, and Twitter. The reason for the growth of SNS use is closely related to the various services of gaming, playing, using entertainment items, sharing knowledge etc., provided by the SNS; technically, the most important of the services provided would be the behavior of sharing knowledge among people connected and networked in the site. In sum, we assume that the users may communicate well with each other and pay attention to building a close social network using the abovementioned activities. However, researchers have just begun to focus on the issues explaining why Internet users rush into SNSs and enjoy their time there. Therefore, we investigated the reasons for posting and sharing knowledge voluntarily on the SNS and how others respond to the posted knowledge and are actually affected by the behavior. We applied social identity theory and social capital theory in this study to find which network externalities in SNSs may affect online identity-based attachment and cause them to produce a knowledge sharing generation. We found that people's online identity in SNSs is closely related to and influences knowledge sharing. This empirical study resulted in the importance of social relations in SNSs, which leads to sharing knowledge.

  • PDF

New Techniques for Anonymous HIBE with Short Ciphertexts in Prime Order Groups

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.968-988
    • /
    • 2010
  • Anonymous hierarchical identity based encryption (HIBE) is an extension of identity based encryption (IBE) that can use an arbitrary string like an e-mail address for a public key, and it additionally provide the anonymity of identity in ciphertexts. Using the anonymous HIBE schemes, it is possible to construct anonymous communication systems and public key encryption with keyword search. This paper presents an anonymous HIBE scheme with constant size ciphertexts under prime order symmetric bilinear groups, and shows that it is secure under the selective security model. Previous anonymous HIBE schemes were constructed to have linear size ciphertexts, to use composite order bilinear groups, or to use asymmetric bilinear groups that is a special type of bilinear groups. Our construction is the first efficient anonymous HIBE scheme that has constant size ciphertexts and that uses prime order symmetric bilinear groups. Compared to the previous scheme of composite order bilinear groups, ours is ten times faster. To achieve our construction, we first devise a novel cancelable random blinding technique. The random blinding property of our technique provides the anonymity of our construction, and the cancellation property of our technique enables decryption.

A Dynamic Trust Framework for Sharing Identity Authentication (신원 인증 공유를 위한 동적 신뢰 프레임워크)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2199-2206
    • /
    • 2012
  • Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.

A Study on Appearance Management Behavior of Male Consumers(III) - Focusing on the Gender Role Identity - (남성들의 외모관리행동에 관한 연구(III) - 성역할태도를 중심으로 -)

  • Ku, Yang-Suk;Lee, Young-Ju;Choo, Tae-Gue
    • Fashion & Textile Research Journal
    • /
    • v.13 no.2
    • /
    • pp.226-233
    • /
    • 2011
  • The purpose of this study was to examine the relationship of appearance management behavior, appearance management motives and body image perception according to males' gender role identities. A set of questionnaire was administered to 398 male consumers. Data were analyzed by utilizing frequency, factor analysis, ANONA, and Crosstabs. The results showed that four groups of male consumers according to the gender role identity were androgyny, unclassified, femininity, and masculinity. The androgyny oriented group showed more active and various appearance management behavior. And they were more conscious of their own body image and rated themselves high in body image perception. The masculinity oriented group were satisfied with their bodies and showed positive attitudes on their body figures and hair care. The femininity oriented group showed positive attitudes on skin care and plastic surgery for social life.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

Association Between the Addiction of SNS and Ego-Identity of Youth's in Both Reality and Cyber Space (청소년의 SNS중독과 현실공간 및 가상공간에서의 자아정체감의 관계)

  • Shin, Hye-Sun;Yun, Seok-Hee
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.225-234
    • /
    • 2017
  • This study was conducted with male/female teenagers to examine the interaction between their attachment to social media and their self-identity in both real space and cyberspace. Among the subjects, male teenagers tended to use social media more than female teenagers. Also, the more friends/followers they have, the more they would use the service itself. In the subordinate correlation of the subjects' self-identity in both cyberspace and real space, most areas showed positive correlation. And each subregion of the areas of real-space ego-identity and social media addiction showed positive correlation with them as well. On the other hand, in areas of social media addiction and cyberspace ego-identity, all areas showed negative correlation except the area of dominance. Through this experiment, it was proven apparent that there needs to be proper management of teenagers that are overusing and are addicted to social media, and that programs should be developed to mediate the subjects in regards to each subregion of real space and cyberspace ego-identity.

Priority for the Integrated Management of Infrastructure in Wirye New Town (위례신도시 기반시설 통합관리 우선순위에 관한 연구)

  • Choi, Sang-Hee;Kim, Ryoon-Hee;Kim, Doo-Hwan
    • Land and Housing Review
    • /
    • v.8 no.3
    • /
    • pp.113-121
    • /
    • 2017
  • Wirye New Town is constructed as a new complex city with three municipalities. Infrastructure must be managed by administrative districts, but integrated management is also needed when considering the planned identity and efficient management and operation aspects of a new town. The purpose of this study is to establish why the integrated management of infrastructure is needed, to form a consensus of stakeholders and to set priorities of integrated management considering characteristics of each facility. This thesis analyzes the order of priorities for integrated management of the infrastructures in Wirye New Town. The study includes an analytic hierarchy process (AHP) survey that asked 95 local city officials and experts in city planning about important values to consider, such as efficiency, equity, and identity, for the integrated management of infrastructures in Wirye New Town. Another survey requested these same people to identify the priorities for integrated management in terms of different infrastructure types. The results are as follows. Those who were surveyed considered efficiency(0.442) to be the most important value for integrated management. Equity was deemed to be the next most important(0.369), followed by identity(0.190). The second step in the AHP survey revealed that "efficiency of management governance" (0.202) was considered to be the most important, then "equity of infrastructure quality among the sub-regions" (0.155), and finally "efficiency for improvement of quality and quantity of services" (0.133). The results of the survey about the priority for integrated management among infrastructure types and AHP shows that 'specialized facilities', 'Space facilities located in more than two municipalities', and 'linear facilities located in more than two municipalities.' are important.

Internet ID Management System based on ID Federation: e-IDMS (ID 연계 기반의 인터넷 ID Management System: e-IDMS)

  • Cho Yeong-Sub;Jin Seung-Hun;Moon Phil-Joo;Chung Kyo-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.104-114
    • /
    • 2006
  • In order to use an Internet service, it is a general procedure that user subscribes to the service and then registers her or his id(identifier). As Internet has been more widely used, however, user has more and more ids than ever before. In this environments, whenever user uses an Internet service, she or he must authenticate to the service provider, which makes her or him inconvenient. As user's data is scattered and unmanaged on various web sites, user privacy has been revealed more often. This paper specifies e-IDMS which ETRI has been developing to solve such problems. e-IDMS is an Internet ID(IDentity) management system based on ID Federation Mechanism e-IDMS provides ID Federation-based facilities such as composite authentication, Internet SSG, ID information management, privacy protection and interactive query. e-IDMS is used in establishing integrated ill management system for public institutions.

The relationship between job characteristics and incremental innovation, and the moderating effect of tenure (직무특성이 점진적 혁신에 미치는 효과 및 재직 기간의 조절효과)

  • An, Gwan-Yeong
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2011.04a
    • /
    • pp.19-28
    • /
    • 2011
  • This paper reviewed the relationship between job characteristics and incremental innovation, and the moderating effect of tenure. The results of multiple regression analysis, based on the responses from 241 employees in service industry, showed that job variety, identity, importance, autonomy and feedback have positive relationships with incremental innovation. In moderating effects, tenure interacts with variety and identity to have positive effects on incremental innovation, but tenure interacts with job importance, autonomy and feedback to have negative effects on incremental innovation.

  • PDF