• Title/Summary/Keyword: Personal Key

Search Result 596, Processing Time 0.025 seconds

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

A Proposal for a Personal Branding Support Service in Social Media Times

  • Kawano, Yoshihiro;Obu, Yuka
    • Journal of Contemporary Eastern Asia
    • /
    • v.12 no.2
    • /
    • pp.49-59
    • /
    • 2013
  • Social media such as Twitter and Facebook have become popular. In the age of social media, many people have become more active online. For example, about half of all global active Internet users are on Facebook (Perry 2012). Personal branding is a very important strategy to build on an individual's strengths, and this kind of branding is expected to contribute to self-actualization. Therefore, the presence of mentors who advise users to discover their own strong points for self-actualization is necessary. In this paper, we propose a personal branding support service, Mentors, which connects mentors and mentees. The core concept is: "Everyone has the face of both a mentor and mentee." The key function is sharing stages of self-analysis in human life design: Determining value, creating a mission, and forming a strategy. From this function, a good match between a mentor and mentee can be found. The program aims to improve human life by understanding the client's strengths and using social media effectively. Future work includes launching Mentors and evaluating its service.

A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context (유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구)

  • Jeon Seok-Won;Jang Youn-Sun;Kim Jin-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF

Interoperating Methods of Heterogeneous Networks for Personal Robot System (퍼스널 로봇을 위한 이기종 네트웍 운용 방안)

  • Choo, Seong-Ho;Li, Vitaly;Lee, Jung-Bae;Park, Tai-Kyu;Jang, Ik-Gyu;Jung, Ki-Deok;Choi, Dong-Hee;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.86-88
    • /
    • 2004
  • Personal Robot System in developing, have a module architecture, each module are connected through variety network system like ethernet, WLAN (802.11), IEEE 1394 (firewire), bluetooth, CAN, or RS-232C. In developing personal robot system. We think that the key of robot performance is interoperablity among modules. Each network protocol are well connected in the view of network system for the interoperability. So we make a bridging architecture that can routing converting, and transporting packets with matching each network's properties. Furthermore, we suggest a advanced design scheme for realtime / non-realtime and control signal (short, requiring hard-realtime) / multimedia data (large, requiring soft-realtime).

  • PDF

Analysis of Reputation Factors for the Personal Branding of Journalists in Thailand

  • Rodgunphai, Cholticha;Kheokao, Jantima
    • Asian Journal for Public Opinion Research
    • /
    • v.8 no.4
    • /
    • pp.453-477
    • /
    • 2020
  • This research is a combination of qualitative and quantitative methods. It analyzed reputation factors for the personal branding of journalists in Thailand. Research tools were in-depth interviews and an online questionnaire with 33 variables. Eleven journalists and informed sources were interviewed. A total of 1,262 survey respondents were divided into three groups including 586 recipients, 416 news people, and 260 academics. Data were analyzed using content analysis and factor analysis. It was found that the reputation factors for the personal branding of journalists in Thailand consisted of 1) the professionalism in rich and reliable news reporting, 2) the ability to use communication technology that increases prominence and career opportunities 3) the social responsibility in reporting news events, 4) the key opinion leaders who speak up for people to monitor in the government for peace in society, and 5) the use of experience in developing news reporting capabilities.

An Exploratory Research on Hierachical Causality of Personal Value, Benefits Sought and Clothing Product Attributes (의류 구매자의 가치관-추구혜택-제품 속성간의 게층적 인과관계에 관한 탐색적 연구)

  • 안소현;서용한;서문식
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.24 no.5
    • /
    • pp.652-662
    • /
    • 2000
  • Most of established study about consumer behavior was directly connected abstract value with concrete purchase behavior, nevertheless several recognizable process is intervened between abstract concept and concept behavior. Of course researchers suggest hierarchical causality through means-end chain model. However empirical study is insufficient. And it's not certain whether the consumer's personal value affects actual evaluation about product attributes. Thus the purpose of this paper was to explore hierarchical causality of personal value, benefits sought and clothing product attributes and to suggest an alternative approach method. For the empircial study the data sets were collected through 150 female consumers living in Pusan and SAS and LISREL VIII were used for statistical analysis. As the result, hierarchical causality suggested by means-end chain model was positively substantiated. That is, benefits sought is differentiated according to personal value, and actual product attributes are indirectly influenced by personal value through benefits sought. Benefits sought are found to be key mediating variables.

  • PDF

A Study on Influencing Factors on User's Adoption Resistance to Personal Cloud Computing Service (개인용 클라우드 컴퓨팅 서비스 수용저항에 영향을 미치는 요인에 관한 연구)

  • Jo, In-Jea;Kim, Sun-Kyu;Yang, Sung-Byung
    • Knowledge Management Research
    • /
    • v.16 no.1
    • /
    • pp.117-142
    • /
    • 2015
  • Recently, the personal cloud computing service has been being spotlighted as an individual tool of productivity enhancement. However, compared to the rosy forecast, its diffusion rate in the domestic (Korean) market is much slower than expected. In order to find the reason for the slow growth of personal cloud computing service, we attempt to identify influencing factors on user's adoption resistance, while most prior research has focused on the factors affecting its adoption. Based on both the person-technology fit model and the privacy calculus model, we propose technostress and perceived value as key antecedents of adoption resistance. In addition, we identify (1) technical (pace of change and complexity) and personal (self-efficacy) influencing factors on technostress, and (2) beneficial (perceived mobility and perceived availability) and harmful (perceived vulnerability) influencing factors on perceived value. To validate our research model, 133 individual samples were gathered from undergraduate and graduate students who had actual experience of using at least one of personal cloud computing services. The results of the structural equation modeling confirm that both technostress and perceived value have significant effects on adoption resistance, but they have different influencing mechanisms to different types of adoption resistance (indifference, postponement, and rejection). Theoretical and practical contributions are discussed in the conclusion.

The Standardization Modeling concerning Organizational Composition and a Management System for the Protection of Personal Information (개인정보 보호를 위한 조직구성과 관리체계에 관한 표준화 모델링)

  • Seo, Woo Seok;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.33-39
    • /
    • 2012
  • Since the passing of the Personal Information Act in March 2011 and its initial introduction in September, over the one year to date diverse security devices and solutions have been flowing into the market to enable observance of the relevant laws. Beginning with security consulting, corporations and institutions have focused on technology-based business in order to enable observance of those laws competitively in accordance with 6-step key procedures including proposal, materialization, introduction, construction, implementation, and execution. However there has not been any investment in human resources in the field of education such as technology education and policy education relative to the most important human resources field nor investment in professionals in the organization for the protection of personal information or in human resources for operating and managing IT infrastructure for actual entire personal information such as special sub-organizations. In this situation, as one process of attracting change from the nature of the technology-based security market toward a professional human resource-based security infrastructure market, it is necessary to conduct research into standardization modeling concerning special organizational composition and a management system for the protection of personal information.

The Role and Issue analysis of the ADR's Committee in the Revision of Personal Information Protection Act (데이터 3법 개정에 따른 분쟁조정위원회 역할과 이슈분석)

  • Yoon, Duck Joong;Jee, Yoon Seok;Kim, Youngae;Shin, Yongtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.279-286
    • /
    • 2020
  • On February 4, 2020, the Personal Information Protection Act ("Privacy Act") was amended to facilitate the convergence and utilization of data, a key resource of the Fourth Industrial Revolution, and to support the development of the data industry. As the scope of the law applies to telecommunications operators, financial operators, and personal information processing providers, the scope of related dispute settlement is expected to increase. Therefore, this paper first introduces the role and function of the Personal Information Dispute Committee and the institutional standards for personal information dispute mediation, and researches the roles and issues that the Personal Information Dispute Mediation Committee should play in accordance with the revision of the Data 3 Law. In this study, For efficient operation of personal information dispute mediation, expert deliberation by field, new adjustment criteria for new industrial technologies, way to secure business continuity between the Personal Information Dispute Committee and the Personal Information Committee, Secure the link between the mediation decision and courts, and Suggested the strengthening of the operational standards for collective dispute mediation.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF