• 제목/요약/키워드: Knowledge information factor

검색결과 593건 처리시간 0.024초

영지식을 활용한 블록체인 기반 개인정보 인증 기법 (Blockchain-based Personal Information Authentication Method using Zero Knowledge Proofs)

  • 이광규
    • 스마트미디어저널
    • /
    • 제10권3호
    • /
    • pp.48-53
    • /
    • 2021
  • 인증 프로세스는 사용자가 합법적인지 확인하는 데 사용되어야 하는 주요 단계이며, 사용자가 합법적인 사용자인지 확인하고 해당 사용자에게만 액세스 권한을 부여하는 데 사용되어야 한다. 최근에는 로그인 프로세스에 보안 계층을 추가하여 인증에 하나의 요소만 사용하는 취약점을 해결하기 위해 대부분의 애플리케이션에서는 이중인증과 OTP체계를 사용하고 있지만, 이 방법도 허가 없이 사용자 계정에 액세스할 수 있는 방법이 알려져 보안에 취약하다. 본 논문에서는 최소한의 개인정보만을 노출 조건으로 사용자를 인증하는 블록체인의 Smart Contract 기반으로 영지식(ZKP:Zero Knowledge Proofs)개인정보 인증 기법을 제안한다. 이는 블록체인 기술을 기반으로 인증 프로세스에 많은 보안 기술을 제공하고, 개인정보 인증을 기존의 인증방식보다 안전하게 수행할 수 있다는 장점이 있다.

A Latent Factor (PLS-SEM) Approach: Assessing the Determinants of Effective Knowledge Transfer

  • ANJUM, Reham;KHAN, Hadi Hassan;BANO, Safia;NAZIR, Sidra;GULRAIZ, Hira;AHMED, Wahab
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권2호
    • /
    • pp.851-860
    • /
    • 2021
  • The Knowledge Transfer (KT) for higher education institutions (HEIs) is boundless. Still and all, the members of the staff affiliated with these institutions do recognize an array of hitches in relation to KT practices. The study in question underscores social interactions, training, and Information and Communication Technology (ICT) as the primary barriers and treats them as the independent variables of the study. The study posits that inadequate management of the above-mentioned barriers would impact effective KT unfavorably. Besides, putting forth some striking solutions needed to fix the obstructions that hamper the adequate management of the KT exercises is another aim of the study. For data collection purposes, the study picks out higher education institutions (public) of the Quetta district. The reckoned sample size is 317 subjects. The research type that has been used is cross-sectional research and, in this context, the cross-sectional explanatory sequential design has been used. Concerning the findings of the paper, the results of PLS-SEM show positive and significant relationships of social interaction and training with knowledge transfer, while ICT shows an insignificant positive relationship with the knowledge transfer. The most influencing factor for the knowledge transfer is social interaction as suggested by social interaction theory.

영아기 및 걸음마기 자녀를 둔 어머니의 양육정보 습득과 양육지식 (The Acquisition of Parenting Information and Knowledge Levels of Mothers with Infants and Toddlers)

  • 이주연;이석호
    • 아동학회지
    • /
    • 제31권4호
    • /
    • pp.179-197
    • /
    • 2010
  • The present study investigated how mothers with infants and toddlers obtain information about parenting and examined the nature of maternal parenting knowledge in order to evaluate the quality of the information. The mothers' age and educational level were included in the analysis as a influential factor on parenting knowledge. Four hundred and twenty-nine mothers with infants and toddlers completed the questionnaires issued regarding the source and content of parenting information and parenting knowledge. The results indicated that the mothers with only one child preferred to utilize their friends and relatives as their primary source of information and the mothers with more than one child acquired parenting information from their own previous experience. Second, the subjects were most interested in acquiring information related to physical development and medical problems. Third, the main effects of all independent variables were found. In addition, the interactional effects between the educational level and source of parenting information for the mother with only one child and the interactional effects between age and source of parenting information for the mother with more than one child were determined as a result of this study. These results indicate that there are some high-risk groups when it comes to the acquisition of parenting knowledge and we suggest providing valid and reliable information to these most vulnerable groups.

기억회상과 지식추론에 따른 감정 상태 변화의 추이 (The Changing Trace of Emotional state by Memory retrieval and Knowledge Reasoning process)

  • 심정연
    • 전자공학회논문지
    • /
    • 제50권4호
    • /
    • pp.83-88
    • /
    • 2013
  • 최근 들어 뇌과학적인 연구가 활발해짐에 따라 두뇌기능을 공학적으로 응용하려는 연구가 많아지고 있다. 두뇌 기능 중 기억과 감정을 담당하는 부분을 살펴보면 기억을 담당하는 해마체와 감정중추인 편도체가 긴밀히 협조하고 있는 것을 알 수 있다. 실제적으로 지식은 감정에 영향을 미치고 감정은 지식에 영향을 미친다. 인간의 모든 판단과 결정에 있어서 감정요소는 배제할 수 없는 아주 중요한 영향을 미친다. 보다 정교한 지능 시스템을 구축하려면 감정이 결합된 지식베이스를 설계하여야 한다. 따라서 본 논문에서는 해마체와 편도체의 공조 시스템에 착안하여 지식과 감정이 결합된 지식감정 결합 시스템을 설계하고 기억회상과 추론 과정에서 변화하는 감정 상태의 추이를 감지하는 메커니즘을 제안하고자 한다.

정보교과 교수내용지식(PCK) 수준 측정 문항 개발 및 타당화 (Development and Validation of Items for the PCK Assessment about Informatics Subject)

  • 김자미;윤일규;이원규
    • 컴퓨터교육학회논문지
    • /
    • 제13권6호
    • /
    • pp.23-34
    • /
    • 2010
  • 정보사회에서 필수과목으로 고려되는 정보교과에 대한 교사들의 교수내용지식은 향후 학교에서 학생들에게 무엇을 어떻게 가르칠 수 있을 것인가와 관련 있는 것으로 교과의 측면에서 매우 중요한 의미를 갖는다. 그러나 정보사회에서 정보교과의 중요성에 대한 논의는 있었으나, 실제적으로 교사들의 정보교과에 대한 PCK 수준을 측정하기 위한 문항 개발은 이루어지지 않았다. 이에 본 연구는 초등 예비교사를 대상으로 정보교과의 PCK수준을 가늠할 수 있는 도구를 개발하고 타당화를 진행하였다. 최종적으로 교육과정에 관한 지식, 표현에 관한 지식, 내용에 관한 지식, 평가에 관한 지식, 그리고 교수법에 관한 지식의 5개 요인에서 39개의 문항을 확정하였다.

  • PDF

The Structure Model of Service Performance Influence in Knowledge Based Service Business

  • Ahn, Yeon S.
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권12호
    • /
    • pp.195-201
    • /
    • 2018
  • This study is attempted to demonstrate the structure of the influencing factors on the performance of services of knowledge based service firms. In the model presented, the structure is that service performance in knowledge-based services are affected by the strategic utilization of knowledge resources and service orientation factors of the service organization. And the service performance are also affected in which the systemization of service processes and customer satisfaction play a mediating role. As an analysis result of examining 148 practitioners engaged in the knowledge service industry, it is necessary to increase the satisfaction of external customers in order to improve service performance in a knowledge-based service organizations. This can be achieved by increasing the satisfaction of internal customers. In addition, for this structure to be successful, the service production process to be provided to the customer must be enhanced. The service production process has been found to be an important factor influencing the internal customer satisfaction and service delivery process, especially in the use of knowledge resource, and customer oriented service among service orientation factors.

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

의류 상품에 대한 소비자 지식과 관여가 정보처리양식에 미치는 영향 (The Effect of Consumer Knowledge and Involvement of Apparel Products on Information Processing Style)

  • 이지연;박재옥
    • 한국의류학회지
    • /
    • 제29권9_10호
    • /
    • pp.1329-1339
    • /
    • 2005
  • The purpose of this study was to investigate the effect of consumer knowledge and involvement of apparel products on information processing style. The subjects of this study were female adults who lived in Seoul, Kyunggi or Incheon areas and Quota sampling using age and residential areas was employed. The data were obtained from 603 questionnaires. Data were statistically analyzed using SPSS 10 and LISREL 7.0. Major statistical methods were factor analysis, Cronbach's a coefficient, multiple regression analysis, and structural equation model analysis. The results were as follows: 1. Consumer knowledge significantly influenced information processing styles. Rational processing style was significantly influenced by objective knowledge, while experiential processing style was significantly influenced by subjective knowledge. 2. Involvement was related to the subjective knowledge more than objective knowledge. Consumers who had higher interest, social importance and followed latest fashion trends tended to process information more experientially.

소셜 러닝 커뮤니티에서 심리적 요인, 지식소싱 행태, 지식활용 성과 간의 영향관계에 관한 연구 (A Study on the Effects among Psychological Factors, Knowledge Sourcing Behavior and Knowledge Utilization Outcomes in Social Learning Community)

  • 한상우
    • 한국문헌정보학회지
    • /
    • 제48권4호
    • /
    • pp.267-295
    • /
    • 2014
  • 본 연구에서는 소셜 러닝 커뮤니티에서 학습자의 심리적 요인, 지식소싱 행태, 지식활용 성과 간의 영향 관계 및 소셜 러닝과 구성원간 관계 요인이 갖는 매개효과를 실증적으로 분석하고, 일부 학습자를 대상으로 심층 면접 인터뷰를 실시하여 소셜 러닝 및 지식소싱에 영향을 미치는 심층적 요인을 살펴보고자 하였다. 이를 위해 2013년 1학기에 수도권 소재 대학교의 사회과학분야 학부생을 대상으로 연구를 진행하였다. 본 연구의 결과, 첫째, 학습자의 자기효능감은 소셜 러닝 활동참여에 영향을 미치고, 목표지향성은 그룹 지식소싱, 소셜 러닝 활동참여에 영향을 미치는 것으로 나타났다. 소셜 미디어의 이용경험은 그룹 지식소싱, 소셜 러닝 활동참여와 소셜 러닝 상호작용에 영향을 미치는 것으로 나타났다. 지식활용의 측면에서 문서 지식소싱은 지식재이용, 지식응용, 지식혁신에 영향을 미치고, 개인 지식소싱은 지식재이용에 영향을 미치며, 그룹 지식소싱은 지식응용, 지식혁신에 영향을 미치는 것으로 나타났다. 둘째, 소셜 러닝 활동참여는 목표지향성이 그룹 지식소싱에 영향을 미치는 관계와 소셜 미디어의 이용경험이 그룹 지식소싱에 영향을 미치는 관계에 모두 완전매개 효과를 갖고, 상호호혜성은 문서 지식소싱이 지식재이용에 영향을 미치는 관계와 문서 지식소싱이 지식혁신에 영향을 미치는 관계에 완전매개 효과를 갖는 것으로 나타났다. 셋째, 심층 면접 인터뷰 결과 학습자들은 전반적으로 소셜 네트워크 서비스를 통해 습득하는 정보가 신뢰할만하고 정보 습득에 용이하며, 여러 사람의 의견을 듣고, 그룹 활동을 통해 많은 지식을 습득하고 있는 것으로 나타났다.

페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로 (Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory)

  • 유재호;이애리;김경규
    • 지식경영연구
    • /
    • 제17권1호
    • /
    • pp.17-47
    • /
    • 2016
  • People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privacy concerns about inappropriate collection and use of personal information increase in SNSs (e.g., Facebook). Although people have privacy concerns in SNSs, they behave in a contradictory way, voluntarily presenting themselves and disclosing personal information. This phenomenon is called 'privacy paradox'. Using dual factor theory, this study investigates the phenomenon of privacy paradox by looking into enablers (e.g., self-presentation) and inhibitors (e.g., information privacy concern) for continuous use of Facebook that can co-exist independently of each other. It also includes antecedents of self-presentation (i.e., narcissism, need for affiliation, involvement, and self-efficacy) and those of information privacy concern (i.e., previous experience of privacy infringement, privacy awareness, and privacy control). The results show that most hypothesized relationships were supported. These findings provide strategic implications for SNS providers who want to promote continuous use of SNS. Under the current circumstances in which enhanced privacy policies are required, this study would be a useful reference for future research on information privacy issues in SNSs.

  • PDF