• Title/Summary/Keyword: Personal Identity

Search Result 402, Processing Time 0.02 seconds

A Philosophical Inquiry into Caring in Nursing - Based on Ricoeur's Narrative Ethics - (간호에서의 보살핌에 대한 철학적 탐구 -리쾨르(Ricoeur)의 이야기 윤리에 기초하여-)

  • Kong Byung-Hye
    • Journal of Korean Academy of Nursing
    • /
    • v.35 no.7
    • /
    • pp.1333-1342
    • /
    • 2005
  • Purpose: This paper was aimed to inquire into Ricoeur's self -hermeneutics and narrative ethics, and apply it to personal identity constituting caring and care ethics in the practice of nursing. Its purpose is to provide a philosophical foundation for caring in nursing. Method: According to Ricoeur's narrative identity, ontological caring was interpreted as personal identity constituting caring. His ethics were described as care ethics, which contributed to preserving and promoting the personal dignity of the client, as self in search for the good life in the nursing practice. Results: Narrative understanding of the client pointed to the ontological role of care in the constitution of personal identity. From an ethical aspect of the narrative, respect for personal identity and personal dignity of the client was crucial to an ethical caring attitude, promoting self-esteem in the nursing practice. Conclusion: This paper suggested that Ricoeur's ethics could provide a philosophical basis for understanding ontological and ethical caring in nursing. This contributed to protection of the client from the threat of personal identity, as well as respecting their personal dignity.

A Study on the Quantified Point System for Designation of Personal Identity Proofing Service Provider based on Resident Registration Number

  • Kim, JongBae
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.20-27
    • /
    • 2022
  • In this paper, we propose to improve the designation examination criteria of agencies that provide personal identity proofing based on the resident registration number (RRN), a 13-digit number uniquely assigned by the government to identify Korean citizens. In online commerce, etc., the personal identity proofing agency (PIPA) is a place where online users can prove their personal identity by presenting an alternative means instead of their RRN. The designation examination criteria for PIPAs established in 2012 is a revision of the relevant current laws, and there is a problem in applying the designation examination for alternative means of RRN as the current examination standard. Therefore, in this paper, we propose a method to make the current examination criteria applicable to the newly designated examination of the personal identity proofing service provider based on the current RRN alternative method. According to the current designation examination criteria, only those who satisfy all the examination criteria are designated as the PIPA. However, in reality, it is not in line with the purpose of regulatory reform to require that all examination criteria be satisfied. In the proposed method, it is proposed to apply the standard score system for designation of PIPAs, to make the law current, to secure legal compliance, and to establish a new examination standard to provide a new alternative means of personal identity proofing service. By applying the proposed method to the PIPA designation examination, various alternative means of RRN can be utilized in the online commerce service market.

A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone (스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구)

  • Lee Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.

A Study on Strengthening Personal Information Sovereignty through Analysis of Domestic Service Cases and Research Projects of Self-Sovereign Identity Technology (자기주권신원기술의 국내 서비스 사례 및 연구 과제 분석을 통한 개인정보 주권 강화 방안연구)

  • Lee, Jeong-Hyeon;Kim, Ji-Won;Kim, Chul-Soo;Yang, Jin-hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.575-589
    • /
    • 2020
  • Along with the exponential growth of data businesses, the importance of data containing personal information of use have also increaseing. Particularly, in Korea, as the Data 3 Act was implemented, companies can use personal information more actively through regulatory improvement and stipulation in case of using data containing personal information. In this situation as per the service use, self-sovereign identity technology has emerged that can minimize the provision of personal information in relation to real name authentication and provision of personal information. Recently, services and studies using blockchain have been actively conducted in case of using the self-sovereign identity function for clarity and verification of records according to the use of personal information. In this thesis, by analyzing the characteristics of domestic self-sovereign identity service and the current status and contents of research related to blockchain-based self-sovereign identity technology and we suggest a research direction based on self-sovereign identity technology to reinforce the sovereignty of personal information in the era of the 3rd Data Act do.

The Impact of Green Corporate Identity and Green Personal-Social Identification on Green Business Performance: A Case Study in Thailand

  • ONPUTTHA, Suraporn;SIRIWICHAI, Chalermporn
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.157-166
    • /
    • 2021
  • This study aims to investigate the impact of green corporate identity and employees' green identification on green business performance of international automobile manufacturers in Thailand. It involves 400 employees from the target study area, using questionnaires to collect data from January to February 2021, with purposive and convenient sampling methods. Data analysis employed structural equation modeling (SEM). The results show that green corporate identity has a significant impact on employees' green personal-social identification and green business performance; meanwhile, employees' green social identification has a significant impact on green business performance. However, employees' green personal identification has a significant impact on green business performance only through employees' green social identification. Green corporate identity can increase the corporate' green business performance via economic, environmental and social aspects through employees' green personal-social identification. The findings suggest that green corporate communication through visual identity, employee behaviors, culture, policy products and services in response to environmental forces and drivers to create the green corporate identity is deemed to systematically work. Furthermore, the findings also suggest that employees' green identification on both personal and social levels can be a significant issue that the managers in automobile manufacturers should pay attention as well.

The effects of perception toward cyber identity on loyalty and purchase intention

  • Kim, Su-Yeon;Hwang, Hyun-Seok
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.135-138
    • /
    • 2005
  • Many aspects of the way we work and live in the twenty-first century will be determined by the vast web of Internet. Virtual environments open the door to new identity experiences. Having the possibility to enter in a new community, where any personal information is directly shown to others, is a possibility to experiencing different self and thus to show and build new identities. This paper aims to identify how to relate the perception of cyber identity, loyalty and purchase intention. First, we classified cyber identity into two types, personal and social, and analyzed perception of each identity type. Then we conducted a survey using pre-designed questionnaire and found out factors consisting personal and social identity. Finally we analyzed the effects of these factors on loyalty and purchase intention using Structural Equation Model.

  • PDF

The Influences of Identity and Disclosure on Use Intentions in Social Network Services: Focusing on Interpersonal Process Model of Intimacy (정체성과 개방성이 소셜 네트워크 서비스 사용의도에 미치는 영향 : 친밀감 대인관계 과정 모델을 중심으로)

  • Joun, Youhee;Lee, Daeyong;Chung, Namho;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.15 no.2
    • /
    • pp.1-21
    • /
    • 2014
  • In this study we adopted Interpersonal Process Model of Intimacy to study SNS use intention. First, we investigated the effects of personal identity, social identity and intimacy. Second, we tested the influences of self-disclosure, partner disclosure on perceived partner responsiveness. Third, we measured the relationship between perceived partner responsiveness and intimacy. Lastly, we investigated the effects of intimacy, perceived partner responsiveness and use intention. A total of 232 final respondents were collected from users of Social Network Services in 2011. The results revealed several important findings. First, we found that social identity had a significant and positive effect on intimacy. However, personal identity showed insignificant effect toward intimacy. Moreover, self-disclosure and partner disclosure had a positive effects on perceived partner responsiveness. perceived partner responsiveness showed a positive effect on both intimacy and use intention. Lastly, intimacy had significant effect on use intention.

  • PDF