• Title/Summary/Keyword: Personal Identity

Search Result 402, Processing Time 0.025 seconds

The Effects of Types of Self-Identity on Quasi-social Interactions and Information Sharing Intentions with Facebook Opinion Leaders (자아정체성의 유형이 페이스북 의견 지도자와의 준사회적 상호작용 및 정보공유 의도에 미치는 효과)

  • Park, Sunkyung;Kang, Yoon Ji
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.225-232
    • /
    • 2021
  • Nowadays, opinion leaders influence the formation of public opinion on various issues in social network services. There has been a lack of research on the personal characteristics that inspire users to interact with opinion leaders and show intent to act. This paper verifies how the disposition of Facebook users' self-identity affects the quasi-social interaction with opinion leaders on Facebook and the intention to share information. As the perception and behavior of users on social media platforms differ depending on the type of issue, an online survey was conducted by classifying issue types into life culture and political sectors. Research found that personal identity had a significant positive effect on quasi-social interactions in the life culture and politics sectors, while group identity negatively affected quasi-social interactions. In addition, the intention to share information was confirmed to have a significant effect only in the life and culture areas of self-identity (social and group identity). Quasi-social interaction was confirmed to have a significant positive effect on all issue areas. The results of this study suggest the need to consider variations in opinion leader marketing strategies based on the types of self-identity of Facebook users in the future. In addition, the study shows that raising the level of quasi-social interaction at the corporate level without distinction of issue types can lead to effective results.

A Study on Improvement method of designation criteria for Personal Proofing Service Based on Resident Registration Number (주민등록번호 기반의 온라인 본인확인서비스 기관 지정기준 개선방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.13-23
    • /
    • 2020
  • Currently, online means of replacing resident registration numbers(RRN) include I-Pin, mobile phone, credit card, MyPin, and general-purpose certificate. In order to issue alternative means based on the RRN, it must be designated through the designation review by the Korea Communications Commission(KCC) through a designation review by personal proofing agency and be subject to annual management. However, the criteria for designation and follow-up of the designation of the personal proofing agency carried out by KCC have been used in 2010 without revision, and there are problems that do not conform to the evaluation standards of various alternative means. Therefore, in this paper, we propose a method for improving the designation criteria and management system of the personal proofing service agency. The proposed method analyzes the characteristics of the alternative identification-based personal proofing service and proposes a follow-up management standard that can appropriately evaluate the analyzed characteristics and improves the designation criteria according to the emergence of new alternatives. Through the proposed method, it can be seen that it is possible to strengthen the safety of the personal proofing service based on the alternative means of RRN provided online and face-to-face and to protect the user's personal information.

Vision-based Authentication and Registration of Facial Identity in Hospital Information System

  • Bae, Seok-Chan;Lee, Yon-Sik;Choi, Sun-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.59-65
    • /
    • 2019
  • Hospital Information System includes a wide range of information in the medical profession, from the overall administrative work of the hospital to the medical work of doctors. In this paper, we proposed a Vision-based Authentication and Registration of Facial Identity in Hospital Information System using OpenCV. By using the proposed security module program a Vision-based Authentication and Registration of Facial Identity, the hospital information system was designed to enhance the security through registration of the face in the hospital personnel and to process the receipt, treatment, and prescription process without any secondary leakage of personal information. The implemented security module program eliminates the need for printing, exposing and recognizing the existing sticker paper tags and wristband type personal information that can be checked by the nurse in the hospital information system. In contrast to the original, the security module program is inputted with ID and password instead to improve privacy and recognition rate.

Exploring a Researcher's Personal Research History through Self-Citation Network and Citation Identity (자기 인용 네트워크와 인용 정체성을 이용한 연구자의 연구 이력 분석에 관한 연구)

  • Lee, Jae-Yun
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.1
    • /
    • pp.157-174
    • /
    • 2012
  • This paper compares two recent methods for exploring a scientist's research history: citation identity and self-citation network. The former is proposed by White(2000), while the latter is suggested by Hellsten et al.(2007). An experimental citation analysis was carried out on the research output of Young Mee Chung, a renouned Korean information scientist. The result shows that the two methods divided the research period into two sub-periods in the same way. They also identified the major research themes very similarly. In the analysis of each method's performance in depth, the two methods revealed different functions to understand a researcher's history. Citation identity was useful to identify authors who have affected Chung's research in terms of research topics. whereas, self-citation network was successful to identify the core papers and leading papers of the research sub-periods. This study indicates the combination of two methods can provide rich information on a scientist's research history.

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.

Analysis of Zero-Knowledge Protocols for Verifiable Computation and Its Applications (연산을 검증하기 위한 영지식 증명 프로토콜의 기법 및 응용 사례 분석)

  • Ju, Chanyang;Lee, Hyeonbum;Chung, Heewon;Seo, Jae Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.675-686
    • /
    • 2021
  • According to the recent revision of Privacy Policy and the emerging importance of personal information, cooperations must verify customer identity (Know Your Costomer, KYC) while processing and managing this information so that it does not violate the Privacy Policy. One of the solution of this problem is zero-knowledge proof (ZKP). The use of the ZKP enables to verify the identity without exposing the identity information directly, thereby reducing the burden on the management of personal information while fulfilling the obligation of the cooperations to verify the identity. The ZKP could be employed to many other applications. In this paper, we analyze the ZKP technique and its applications currently being actively studied.

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

A Study on the Educational Meaning of an Undergraduate Student's Environmental Club Experience (대학생 환경동아리 활동의 교육적 의미)

  • Joo, Hyung-Seon;Kim, Jong-Wook
    • Hwankyungkyoyuk
    • /
    • v.18 no.2 s.27
    • /
    • pp.66-75
    • /
    • 2005
  • This study investigates an undergraduate student's environmental club experience by employing a biographical research method. The informant has been member of the environmental club since he is a freshman. The purpose of this study is three points. First, which theoretical framework is suitable to explain the characteristics of environmental club experience ? Second, what is the characteristics of the informant's environmental club experience analysed by means of the theoretical framework ? Finally, what is the educational meaning of environmental club experience ? As a result, I find that environmental identity is very powerful framework to explain the characteristics of environmental club experience. Also, I explain the informant's environmental club experience as the formation of environmental identity by changes in three aspects. In the informant's life, cultural world of environment/environmental movement becomes salient which is closely connected with development of agency in the world and understanding how environmental problems can be solved. It is argued that environmental club experience has educational meaning in the studies and practices of environmental education, as follows. Environmental club experience has implications of redefining the goals of environmental education, and improving environmental problem solving learning. Finally, the informant's environmental identity is considered as reflexive identity which is formed through personal reflection of his experience.

  • PDF

How of Improve an identity of mobile device interface and usability? (모바일 디바이스의 인터페이스 아이덴티티 개선 및 사용성 증대방안)

  • Song, Sang-Gon;Kim, Young-Sun;Choo, Hee-Jeong;Kang, Tae-Young;Hong, Noh-Kyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.140-145
    • /
    • 2008
  • Mobile device has a constraint such as a small physical display size and interaction. One of the most important issues in mobile devices is the express an identity of one's products company. It can be appeal to the user in side of consistency. Thus, we integrate and extract an identity element from user experience including, Graphical User Interface, Information Architecture and Audio User Interface. The study was conducted by a task force team with User Interface practitioners of managing divisions of each product. In this study, methods and processes that were attempted in order to establish consistency principles of user experiences, enhancing the various characteristics of each product, are described. The results and practical experiences obtained through the processes are introduced.

  • PDF

Design Identity of Givenchy Fashion House (지방시 패션 하우스의 디자인 정체성 연구)

  • Wei, Fei;Park, Eun Kyung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.41 no.2
    • /
    • pp.306-325
    • /
    • 2017
  • This study analyzed how a time-honored fashion house has harmonized its design identity over a sustained period with its successor designers. Givenchy Fashion House was selected as the subject of this study. This study focused on literary research, analyzed design features and fashion images based on photos of Huber de Givenchy's collections (1952-1995) and collections by Riccardo Tisci (2006-2016), the creative director of the house. Photos were gathered from books and fashion websites; in addition design was analyzed based on a review by experts on collections. The results are as follows. Hubert de Givenchy won fame for simplified modern elegance that presented a new beauty for modern women and reached the peak of his career from the 1950s to the 1960s. Riccardo Tisci respected the couture tradition of the Givenchy Fashion House. He successfully revitalized the house by simultaneously emphasizing his personal design features and reinterpreting the design identity as well as tried to establish new house signatures. In conclusion, the original design identity of the Givenchy Fashion House is based on Hubert de Givenchy's timeless modern elegance that has been reformed by Riccardo Tisci as romantic goth and sensual elegance.