• Title/Summary/Keyword: Online identity

Search Result 217, Processing Time 0.025 seconds

A Study upon Online Measurement techniques of Corporate Reputation (기업의 디지털 평판 측정 기법 연구)

  • Kim, Seung-Hee;Kim, Woo-Je;Lee, Kwang-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.139-152
    • /
    • 2013
  • Although a series of studies shows the fact that a company's reputation could affect its sales rate and stock price, due to the increased use of SNS, the research related to the online measurement method for the corporate reputation has been relatively insufficient. This study explores a design for a method to quantify the corporate reputation value by reconstructing the discussions in literature review. Concretely, this study divides the corporate reputation value into the corporate identity information and the corporate awareness information, which includes the following five sub-categories: (1) the quality of product and service; (2) the employment environment; (3) the corporate vision; (4) the social responsibility; and (5) the business achievement. Additionally, for the corporate identity assessment, this study considers the following six factors: (1) Agreeableness (Goodness), (2)Capability (Ability), (3)Enterprise (Rise), (4)Chic (Class), (5) Ruthlessness (Authority), and (6)Informality. Based on these categories and factors, this study develops a technique quantifying the corporate reputation value by selecting 'word items' for the reputation search, and after conducting a frequency analysis in a survey. Also, to verify the result, this study exemplifies the reputation of three SI companies in Korea which could be utilized by using the commercialized reputation service. This study firstly attempts the corporate reputation measurement by classifying the identity and the awareness (corporate image and communication) upon a company in detail and enables its real applicabilities by proposing a formula to measure the reputation scores which can be utilized by verified word items from a frequency analysis.

Website Homepage Design and Service Design of USATODAY.com Analysis (유에스에이투데이닷컴의 웹사이트 홈페이지디자인과 서비스디자인 분석)

  • Han, Qing-Bo;Kim, Eun-Ju;Lee, Ji-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.423-430
    • /
    • 2016
  • The purpose of this paper is to explore and analyze design of USATODAY.COM aimed at being helpful for Chinese online news industry to search for the way forward. USATODAY.COM which converges print and online newsrooms is regarded as a pioneer in the online communication media. It engages interaction with users and their demand, and provides the best level of website and service design. This paper conducted through both theoretical works and design analyses by randomly visiting USATODAY.COM from May 23 to June 5, 2016. USATODAY.COM maintains consistent and high quality of a visual identity system on its homepage, and it is strongly linked to that of USA TODAY. Also, USATODAY.COM provides unique content provision methods, interactive features, advertisement and payment functions through service design considering the user experiences and needs. Based on its results, it is expected to contribute to Chinese online newspaper market which has an astonishing chance to grow.

Qualitative Assessment of web quality and web-activities (웹사이트 품질과 웹활동에 따른 질적성과연구)

  • Lee, Jiwon;Kang, Inwon
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.41-65
    • /
    • 2015
  • Online firms collect consumers' private information, which serves as a valuable database for marketing activities. In order to encourage consumers to provide their private information, online firms offer high quality websites for consumers who provide private information. However, identity theft, phishing, and pharming, become critical social issues, consumers started to avoid providing their private information to online firms. Thus, consumers often provide false or limited information, which lacks value for practical use for the online firms. The main issue raised in this study is to discuss how online marketing activities has influence on consumers attitude and information providing behavior. From the result, this paper found that websites reputation had greatest impact on willingness of providing information. Also this study revealed that unauthorized use is the key factor for increasing distrust and avoidance of providing information.

  • PDF

The Effects of Types of Self-Identity on Quasi-social Interactions and Information Sharing Intentions with Facebook Opinion Leaders (자아정체성의 유형이 페이스북 의견 지도자와의 준사회적 상호작용 및 정보공유 의도에 미치는 효과)

  • Park, Sunkyung;Kang, Yoon Ji
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.225-232
    • /
    • 2021
  • Nowadays, opinion leaders influence the formation of public opinion on various issues in social network services. There has been a lack of research on the personal characteristics that inspire users to interact with opinion leaders and show intent to act. This paper verifies how the disposition of Facebook users' self-identity affects the quasi-social interaction with opinion leaders on Facebook and the intention to share information. As the perception and behavior of users on social media platforms differ depending on the type of issue, an online survey was conducted by classifying issue types into life culture and political sectors. Research found that personal identity had a significant positive effect on quasi-social interactions in the life culture and politics sectors, while group identity negatively affected quasi-social interactions. In addition, the intention to share information was confirmed to have a significant effect only in the life and culture areas of self-identity (social and group identity). Quasi-social interaction was confirmed to have a significant positive effect on all issue areas. The results of this study suggest the need to consider variations in opinion leader marketing strategies based on the types of self-identity of Facebook users in the future. In addition, the study shows that raising the level of quasi-social interaction at the corporate level without distinction of issue types can lead to effective results.

A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse (메타버스 환경에서의 효율적인 사용자 인증을 위한 다중 서명 기법 연구)

  • Jae Young Jang;Soo Yong Jeong;Hyun Il Kim;Chang Ho Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.27-35
    • /
    • 2023
  • Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of "meta," which means virtual and transcendent, and "universe," means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.

Narrative Inquiry on Student Teacher Searching for Identity as a Teacher (교사로서의 정체성을 형성해가는 교육실습생에 대한 내러티브 탐구)

  • Jin, Hyung Ran;Yoo, Tae Myung
    • Journal of Korean Home Economics Education Association
    • /
    • v.26 no.1
    • /
    • pp.81-99
    • /
    • 2014
  • Student teaching is equivalent to an egg just before oviposition. There is a growing acting voice that teaching profession is not necessarily required as the years go by. I developed a process that 55 student teachers search for their identity as a teacher during four-week student teaching program according to Clandinin and Connelly(2000)'s narrative inquiry. The procedure consisted of three stages such as access to the field, field text writing, and research text writing. The student teachers wrote journals by week to search for their identity as a teacher with a focus on what they observed in the field and what they were motivated by teachers and students. Free and truthful 220 stories conducted in a student teaching online cafe were collected as a field text. And the research text was reliving and retelling through poetic writing on each week's themes of exploration, growth, reflection, and pledge to complete the narrative inquiry. Student teachers, an absolute majority, including home economics student teachers aimed for the teaching profession and waited for their hatching.

  • PDF

Social Motivational Factors Influencing the Intention to Use of Blog (블로그 사용의도에 영향을 미치는 사회 동기적 요인)

  • Hong, Seok-In;Choi, Hee-Jae;Lee, Zoon-Ky
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.122-137
    • /
    • 2010
  • Blogs are a new type of media that have recently become popular on the World Wide Web and have influence throughout society. The purpose of this study is to examine social motivations influencing intention of blog usage. Based on Technology Acceptance Model and Motivation Theory, this study considered perceived usefulness, perceived ease of use, reputation, reciprocity, enjoyment of helping, social identity as the determinants of influencing the intention to use of blog. The suggested model was empirically evaluated using online survey data collection from 342 users of popular blog site in Korea (NAVER Blog, Cyworld minihompy, Daum Blog, and Yahoo Blog). The results revealed that perceived usefulness, perceived ease of use, reciprocity, and social identity affect directly the intention of blog usage. Furthermore, social identity has moderate effect via reciprocity and enjoyment of helping on blog usage. This study contributes to a theoretical understanding of the factors as social motivation that affects the usage of blogs. Also, the results of this study provide blog service providers useful strategic insights and service guidelines to enhance user's intention of blogs practically.

Design of Military Information System User Authentication System Using FIDO 2.0-based Web Browser Secure Storage (FIDO 2.0 기반의 웹 브라우저 안전 저장소를 이용하는 군 정보체계 사용자 인증 시스템 설계 및 구현)

  • Park, Jaeyeon;Lee, Jaeyoung;Lee, Hyoungseok;Kang, Jiwon;Kwon, Hyukjin;Shin, Dongil;Shin, Dongkyoo
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.43-53
    • /
    • 2019
  • Recently, a number of military intranet infiltrations suspected of North Korea have been discovered. There was a problem that a vulnerability could occur due to the modification of user authentication data that can access existing military information systems. In this paper, we applied mutual verification technique and API (Application Programming Interface) forgery / forgery blocking and obfuscation to solve the authentication weakness in web browsers that comply with FIDO (Fast IDentity Online) standard. In addition, user convenience is improved by implementing No-Plugin that does not require separate program installation. Performance tests show that most browsers perform about 0.1ms based on the RSA key generation rate. In addition, it proved that it can be used for commercialization by showing performance of less than 0.1 second even in the digital signature verification speed of the server. The service is expected to be useful for improving military information system security as an alternative to browser authentication by building a web secure storage.

User Authentication Method using EEG Signal in FIDO System (FIDO 시스템에서 EEG 신호를 이용한 사용자 인증 방법)

  • Kim, Yong-Ki;Chae, Cheol-Joo;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.465-471
    • /
    • 2018
  • Recently, biometric technology has begun to be used as a fusion of IT technology and financial system. Using this biometric technology, FIDO(Fast Identity Online) technology, Samsung and Apple started Samsung Pay and Apple Pay service. FIDO authentication technology replaces existing authentication methods such as passwords. Among the biometric technologies, fingerprint recognition technology is attracting attention because it can minimize the device and user rejection at a relatively low price. However, fingerprint information has a limited number of users and it can not be reused if fingerprint information is leaked by an external attacker. Therefore, in this paper, we propose a method to authenticate a user using EEG signal which is one of biometrics technologies. W propose a method to use EEG signal measurement value in FIDO system by using convenience channel by using short channel EEG device. And propose a method to utilize EEG signal when the user recognizes a specific entity by measuring the EEG signal before and after recognizing a specific entity.

Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall (지문인식 모듈 기반의 FIDO 사용자 인증기술을 이용한 쇼핑몰에서 블록체인 활용 설계)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, a USB module with fingerprint recognition was designed as a distributed node of blockchain on distributed ID (DID, distributed ID) for user identification. This biometric-linked fingerprint recognition device was verified for the real-time authentication process of authentication transaction with FIDO(Fast IDentity Online) server. Blockchain DID-based services were proposed like as a method of individual TV rating survey, and recommending service for customized shopping channels, and crypto-currency, too. This DID based remote service can be improved by recognizing of channel-changing information through personal identification. The proposed information of production purchase can be shared by blockchain. And customized service can be provided for the utilization of purchase history in shoppingmall using distributed ID. As a result, this blockchain node-device and Samsung S10 Key-srore with FIDO service can be certified for additional transactions through various biometric authentication like fingerprint, and face recognition.