• Title/Summary/Keyword: Personal Identity

Search Result 402, Processing Time 0.03 seconds

Tar Baby: Search for Identity in Commodity Culture

  • Talukdar, Susmita
    • Cross-Cultural Studies
    • /
    • v.32
    • /
    • pp.63-79
    • /
    • 2013
  • Tar Baby, Toni Morrison's fourth novel re examines the problem that black characters face in negotiatiating a place for themselves within a dominant culture, with respect to their own history and culture. The novel critiques the dominant socio economic and commodifying cultural space from which the black woman seems to have no escape. Jadine is a colonized subject, for as a fashion model she has surrendered to an aesthetics of commodification, and as a student of art history, she has internalized the capitalist ethic of the white culture industry. Though she has ensured her freedom, Morrison's critique of her separation from her family and culture is unmistakable. Interwoven with her narrative is Son's predicament, the stereotype of a black racist and her 'lover'. The novel ends with him at the crossroads of culture, yet signaling his passage to freedom through resistance. The paper arguments how Toni Morrison has envisioned the welfare of African American community by reconstructing the role of new black generation, as represented by Jadine and Son, whose new journey towards their self fulfillment just not only bring their personal freedom but also regenerates African American community by resisting dominant commodifying cultural.

Framework for Secure User Authentication of Internet of Things Devices (사물인터넷 기기의 안전한 사용자 인증 방안에 관한 프레임워크)

  • Song, Yongtaek;Lee, Jaewoo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.217-228
    • /
    • 2019
  • In the 4th Industrial Revolution, the Internet of Things emerged and various services and convenience improved. As the frequency of use increases, security threats such as leakage of personal information coexist and the importance of security are increasing. In this paper, we analyze the security threats of the Internet of things and propose a model for enhancing security through user authentication using Fast IDentity Online (FIDO). As a result, we propose to implement strong user authentication by introducing second authentication through FIDO.

ID-Based Cryptosystem and Digital Signature Scheme Using Discrete Logarithm Complexity (이산대수 문제를 이용한 ID 기본 암호시스템과 디지틀 서명방식에 관한 연구)

  • 염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.3-15
    • /
    • 1991
  • in 1984 Shamir proposed the concept of ID(identity)-based cryptosystem and digital signature scheme wich does not require any public file for storing the user' s public keys. In this paper, the concept of the ID-based cryptosystem based on discrete logarithm problem using the conven-tional public-key cryptosystems is described, and the implementation method of the ID-based cryptosystem is also presented. The new digital signaturw schme based on the ID-based crypto-system is proposed and possible atacks are considered and analyzed for the security of digital signature scheme. The proposed ID-based schemes are particularrly useful for smart card and personal identification card application.

Transnational Allegories of Image and Likeness in Louisa May Alcott's "Behind a Mask, or A Woman's Power"

  • Jin, Seongeun
    • American Studies
    • /
    • v.43 no.1
    • /
    • pp.83-97
    • /
    • 2020
  • "Behind a Mask" (1866) marks the new direction of Louisa May Alcott's artistic and personal life. Her European trip solidified her identity as a mature woman, most importantly as a mature American woman, one whose independence from Victorian stereotypes would, from now on, make her fortune and fame. Her sensational stories, especially "Behind a Mask," would tell truths that readers recognized but had rarely seen written. These truths would free them, and the author herself, to explore their talents as individuals. Henceforth, Alcott would embody the successful American artistic entrepreneur as one who shed the European domination of false titles and inherited wealth. These motifs of the transnational connection pervade the story, in the form of images and likenesses. Just as Alcott would soon, in two years, reach astonishing financial success with the publication of Little Women, her meteoric ascent parallels America's rise to power in the world's economy, which came about with almost alarming speed after the conclusion of the American Civil War.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

Factors Influencing Turnover Intentions among the Newcomers in the Construction of Landscape Architecture (조경시공분야 신입사원들의 이직의도에 영향을 미치는 요인)

  • Kim, Do-Gyun;Ryu, Il
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.43 no.2
    • /
    • pp.73-86
    • /
    • 2015
  • This study aimed to identify influencing factors such as job environment, job characteristics, and job competency as they are related to newcomer turnover intentions in the construction of landscape architecture, Korea. The results based on statistical analyses are follows as: The turnover experience of newcomers in the field of landscape architecture construction was 54.5%, about 1.6 times higher than in other fields. The influencing factors among newcomer turnover intentions in the construction of landscape architecture were workload(p<0.01), job suitability, and personal relations(p<0.01), while in job autonomy, work conditions, job competency, job identity, job variety, and job compensation were not statistically significant. This study found that key important factors of dependent variables that conceptually explain the influence of turnover intentions among newcomers differed between the construction of landscape architecture and other fields. The most important factors in turnover intention were workload>personal relationship>job suitability among independent factors. This study implied that efforts for improvement are needed in areas of workload, personal relations, and job suitability to mitigate newcomer turnover intentions so as to establish common and personal goals in the field of landscape architecture construction because turnover intention could lead losses in human resources, time, economy, and psychological health. In conclusion, this study suggested the importance of efforts for human resource management to reduce turnover intentions among newcomers in the field of landscape architecture construction.

A Study of Self-Checklist for Personal Information Protection of FinTech Service: For the Simple Payment Service (핀테크 서비스의 개인정보보호 자가평가항목 개발에 관한 연구: 간편결제 서비스 중심)

  • Kang, Min Soo;Back, Seung Jo;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.77-102
    • /
    • 2015
  • FinTech service industry has been growing rapidly around the world. It has driven innovation in financial and payment service industry with different channels such as mobile based on Information and Communications Technology (ICT). However, FinTech service is vulnerable to different security threats due to use the valuable data such as personal information and financial information. It is undeniable that collection and use of those information may increase the possibility of identity theft or privacy breach. In this paper will develop a self-checklist for the Simple Payment service users (Privacy Pragmatists) who want to make a rational decision to protect their personal information. The checklist is going to let the users assess the personal information protection by performing the assessment themself when they use the service. The body of this paper is going to analyze the items of the checklist and through the analysis, will suggest a security policy for personal information protection of FinTech service.

A Case Study on Approaches to Supporting Medical Students with Burnout Experience (의과대학 학생의 소진에 대한 지도사례 분석)

  • Chung, Eun-Kyung;Chay, Kee-Oh;Han, Eui-Ryoung
    • Korean Medical Education Review
    • /
    • v.16 no.2
    • /
    • pp.88-91
    • /
    • 2014
  • Medical students often need high levels of specialized institutional and personal support to recover from a burnout experience and to prevent student failure. This study aimed to present approaches to supporting medical students who had experienced burnout using case studies. The study subjects were 45 burnout cases who had been supported by the student support system and committee in one medical school. The factors associated with burnout include poor social network: the lack of belongingness, immature sense of identity, poor mental health, a lack of intrinsic motivation and aptitude, or a major personal crisis. We summarized some tips according to the factors associated with burnout. These tips should provide guidance to organizations and individual support providers to encourage the best quality support for medical students with burnout experiences.

Determinants Affecting Intention to Campus SNS in China

  • Hou, Jie;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2009.10a
    • /
    • pp.176-181
    • /
    • 2009
  • Social networking service (SNS), which is based on the "six degree separation" theory, has gained its popularity in recent years. SNS creates a new way for maintaining relationship and sharing information over the virtual space. As a major branch, campus SNS provides a new platform for student to study as well as build and maintain inter-personal relationships. The highly realness of personal information and relatively strong group cohesion of campus SNS has turned it into an inevitable tool in students' daily life. The rapid growth of SNS in campus is creating huge academic and commercial benefits. However, little comprehensive research reveals what are determinant factors in driving students' intention to participate in campus SNS. In this paper, we conceptualize the participation of campus SNS as a social behavior and evaluate the impact made by social factors such as subjective norms and identity, as well as the impact of perceived reality and playfulness through an extended technology acceptance model.

  • PDF

A Study on the Adoption Factors and Performance Effects of Mobile Sales Force Automation Systems (모바일 SFA(mSFA) 시스템의 수용 요인 및 도입 성과에 관한 연구)

  • Kim, Dong-Hyun;Lee, Sun-Ro
    • Korean Management Science Review
    • /
    • v.24 no.1
    • /
    • pp.127-145
    • /
    • 2007
  • This study attempts to examine the acceptance factors of mSFA systems based on the innovation diffusion and technology acceptance model, and to measure the performance effects of mSFA systems using BSC metrics. Results show that (1) the characteristics of mobility and interactivity have positive impacts on perceived usefulness, ease of use, and professional fit. But the characteristics of personal identity were not perceived as useful due to users' negative feelings about privacy infringement and surveillance. (2) Job fit has positive impacts on perceived usefulness and professional fit. (3) Perceived usefulness, ease of use, and professional fit positively influence the degree of users' dependence on mSFA systems, which have positive impacts on users' performance measured by the personal BSC metrics including perspectives of finance, customer, internal process, and learning and growth.