• Title/Summary/Keyword: Service identity

Search Result 517, Processing Time 0.025 seconds

A Narrative Inquiry of Medical Students' Experiences of Expulsion and Military Service (의과대학 과정 중 제적과 군복무를 경험한 학생들에 대한 내러티브 연구)

  • Lee, Won Kyoung;Park, Kyung Hye
    • Korean Medical Education Review
    • /
    • v.21 no.2
    • /
    • pp.92-99
    • /
    • 2019
  • The aim of this study was to use narrative inquiry to explore the experiences of medical students who faced expulsion, military service, and readmission, and their journeys of identity formation. Three medical students were recruited via snowball sampling, and each participant was interviewed twice. According to the sequence of experiences, their stories were summarized as follows: the process of being expelled, the military service experience and readmission process, and the present. Before all three students were expelled, they lived dissolute lives free of concern from the entrance examination and failed to cope well with dropping out. They felt that military experience had helped them develop interpersonal skills in the clinical setting and the strength to withstand a difficult crisis. Two students were motivated to become doctors after military service, but the other was not. They had reflected deeply over their unique experiences. The scars imprinted from their experiences became a means of stimulation, and they ultimately acquired the resilience and ability to accommodate for and counteract their weaknesses. This appears to have been an important influence on their identity formation. The narrations of their rare experiences can help medical educators more fully understand and support medical students through difficulties, specifically with regard to academic failure or expulsion. These findings may prompt medical professors to think about the kind of guidance or motivation that could help students before expulsion, rather than assuming that they are simply lacking academic ability.

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

Proposal for a Custody and Federated Service Model for the Decentralized Identity (분산 ID 보관 및 연계 서비스 모델 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.513-525
    • /
    • 2020
  • Until today, the personal information of subjects has been centralized in many companies or institutions. However, in recent days, the paradigm has gradually changed in the direction that subjects control their personal information and persue their self-sovereignty. Globally, individual data sovereignty is strengthened by the European Union's General Data Protection Regulation(GDPR) and the US California Consumer Privacy Act(CCPA). In Korea, a few alliances consist of various companies are creating technology research and service application cases for decentralized ID service model. In this paper, the current decentralized ID service model and its limitations are studied, and a improved decentralized ID service model that can solve them is proposed. The proposed model has a function of securely storing decentralized ID to the third party and a linkage function that can be interoperated even if different decentralized ID services are generated. In addition, a more secure and convenient model by identifying the security threats of the proposed model and deriving the security requirements, is proposed. It is expected that the decentralized ID technology will be applied not only to the proof of people but also to the device ID authentication management of the IoT in the future.

The Effect of Social Network Service Functional Characteristics and Individual Psychological Motivation Factors on User's Intention of Information Sharing (소셜네트워크서비스의 기능적 속성과 개인의 심리적 동기요인이 사용자의 정보공유 의도에 미치는 영향)

  • Kim, Hanbum;Kim, Yonghee;Jang, Miho;Choi, Jeongil
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.145-164
    • /
    • 2013
  • With the rapidly expanding social network service, the distribution of information shows that social networks have evolved into platforms of communication and new information sharing among users. Previous studies are focused on the motivational factors of information sharing through social networking service. However, in this study, we focus on the factors that affect intention to share information in terms of both user's psychological motivation and functional characteristics of social network service. This study shows that factors such as enjoyfulness, image, identity and communication positively affect the attitude and intention of information sharing.

Mobile Commerce Brand Identity Strategy by SNS Text mining

  • Yeo, Hyun-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.255-260
    • /
    • 2020
  • In this paper, I propose an efficient brand identity strategy by topic modeling the Instagram posts, one of SNS(Social Network Service) having more than 1billion world-wide and 500 million daily users. Since the 92% age groups of the Instagram is 18~50 years old (59% 18~29y and 33% 30~49), I set research analysis target three mobile commerce sites to dress and cosmetics sales sites that sale apparels cosmetics and gadgets that recently opened and have operated marketing on diverse channel including SNS. By topic modeling SNS posts for 6 months after launching the site that tagged each m-commerce site brand name or company name, I validate companies' brand identity strategy works effectively and suggest moderation of strategy for brand image. As a result, I found one of three mobile commerce site has different brand image by users and need different identity set up.

Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall (지문인식 모듈 기반의 FIDO 사용자 인증기술을 이용한 쇼핑몰에서 블록체인 활용 설계)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, a USB module with fingerprint recognition was designed as a distributed node of blockchain on distributed ID (DID, distributed ID) for user identification. This biometric-linked fingerprint recognition device was verified for the real-time authentication process of authentication transaction with FIDO(Fast IDentity Online) server. Blockchain DID-based services were proposed like as a method of individual TV rating survey, and recommending service for customized shopping channels, and crypto-currency, too. This DID based remote service can be improved by recognizing of channel-changing information through personal identification. The proposed information of production purchase can be shared by blockchain. And customized service can be provided for the utilization of purchase history in shoppingmall using distributed ID. As a result, this blockchain node-device and Samsung S10 Key-srore with FIDO service can be certified for additional transactions through various biometric authentication like fingerprint, and face recognition.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

Power Support Device (PSD) Based Authentication Protocol for Secure WiBro Services (안전한 WiBro 서비스를 위한 PSD(Power Support Device) 기반 인증 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.3
    • /
    • pp.727-733
    • /
    • 2008
  • An authentication between a user's terminal and a Access Control Router (ACR) is preceded so that a user receives secure WiBro services. Otherwise they can be exposed from many attack risks. So the Telecommunications Technology Association (TTA) constituted a mechanism of the mutual authentication for WiBro service. In mechanism a user executes the mutual authentication between a Portable Equipment (PE) and the ACR by using Portable Internet Subscriber Identity Module (PISIM). But this standard needs many message to authenticate the ACR and the users cann't use wireless Internet service. Therefore in this paper we propose the key agreement protocol between the PSS and the ACR to authenticate the PSS to ACR. At this time Power Support Device (PSD) fer supporting the calculated quantity of the PSS is participated in the key agreement protocol. The ACR sends a generated key to Key Authentication Server (KAS) via secure IPsec tunnel and then it preserves the identity of the PSS and the value of key after it enciphered them. In conclusion we analyze the security and efficiency of the proposed protocol.

Taxonomic identity of Dioscorea coreana (Prain & Burkill) R. Kunth

  • JEONG, Dae-Hui;KIM, Jae-Young;JO, Hyeong-Jun;PARK, Hong-Woo;LEE, Kang-Hyup;JI, Seong-Jin;CHUNG, Gyu-Young
    • Korean Journal of Plant Taxonomy
    • /
    • v.50 no.2
    • /
    • pp.232-238
    • /
    • 2020
  • The identity of Dioscorea coreana (Prain & Burkill) R. Kunth is recognized during the re-identification process of Korean Dioscorea specimens. Given the relatively few pieces of information, including few descriptions and research papers, this species has been misidentified as D. tokoro, which has a similar leaf shape, but D. coreana is distinguished from D. tokoro by the absence of a pedicel in the male flower, the green color of the tepal, and the shapes of the fruit and seed. Thus, detailed descriptions, illustrations, and photographs of D. coreana and a key to the Korean Dioscorea, including this species, are presented.

Epizootiologic Surveys on Canine Parvovirus Infections of Dogs Kyungbuk West Area (경북서부지역에서의 개 파보바이러스 감염상황 조사)

  • 김성국;이정아;오강희;박영구
    • Korean Journal of Veterinary Service
    • /
    • v.17 no.3
    • /
    • pp.174-180
    • /
    • 1994
  • The disease syndrome characterized by the acute vomiting and diarrhea with high mortality had been greatly epidemic in Kyungbuk West Area since March 1990 and it was followed serologically for the classification of the agent. The agent present in feces of dogs associated with this syndrome had characteristic feature in agglutinating pig red blood cells that was specifically inhibited by anti-CPV reference dog serum. This also showed the serological identity with the reference CPV antigen in Hemagglutinating inhibition test. The result obtained were summarized as follows : 1. During 5 years(March. 1990∼September. 1994), 1,470 dogs were investigated on the actual condition of CPV infections. The Infection rate of CPV from dogs was 62.5% and mortality rate was 59.8%. 2. Among 24 fecal samples collected from the dogs with enteric disease, all showed the hemagglutinating activity to porcine erythrocyte ranging from 40 to 5,120 of HA titers. 3. Among 12 sera samples collected from the dogs with enteric disease, all showed the serological identity with the reference CPV antigen from 5 to 5,120 of HI titers. 4. Bacteriologic examination of fecal specimens resulted in the isolation of pathogeric bacteria such as Staphylococcus sp, Streptococcus sp, Escherichia coli and Bacillus. Cultures for salmonella sp and Clostridium remaind negative. 5. The prevalence and identification of internal parasites were determined by fecal examination using the floatation methods. From 20 fecal samples 12(60.0%) were isolated and their species were Toxacara canis, Toxascaris leonina, and coccidium.

  • PDF