• Title/Summary/Keyword: Service identity

Search Result 520, Processing Time 0.027 seconds

A Study on Future Direction and Improvement Plan of Museum Library: Focusing on National Museum of Korea Library (박물관 도서관의 미래 방향성 및 개선방안에 관한 연구 - 국립중앙박물관 도서관을 중심으로 -)

  • Park, Ok Nam;Cha, Sung-Jong;Kim, Sin-Young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.4
    • /
    • pp.5-33
    • /
    • 2018
  • The National Museum of Korea is a nation's representative museum library that provides collection development, organizes, and utilize museum collections. Considering the limited budget, staffing, and users' awareness of the museum libraries in general, the role of the National Museum of Korea is vital. The purpose of this study is to establish the identity and development plan of the National Museum of Korea library as a specialized library. For this purpose, the current states of the National Museum of Korea library, preliminary studies, domestic and overseas case studies, and user & expert interviews were conducted. As a result of the study, the study suggested future directions to secure the professional identity of library, and development plans for collection, service, and human resources by museum library, and also to increase the role of library in museum and to improve users' awareness.

Blockchain Technology and Application

  • Lee, Sae Bom;Park, Arum;Song, Jaemin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.89-97
    • /
    • 2021
  • Blockchain is designed to collect and store the data recorded on the network in one block unit, and is connected and stored back and forth, and its form is similar to how the blocks are connected, so it is called a blockchain. Many companies are trying to popularize blockchain-based services at home and abroad, and blockchains are used in various industries. This study introduces the technical characteristics of the blockchain and deals with application services utilizing the blockchain. Introducing 5 types of blockchain architecture and core technologies and introducing blockchain application services that are used in payment services, blockchain service networks, blockchain real estate platforms, identity verification, cryptocurrency, diamond distribution path tracking, and blog information recording. do. It is expected to increase the understanding of the blockchain and provide usefulness in future blockchain research and service development.

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.

A Study on the MIS curriculum directions and courses based on the MIS identity and IS core competency (MIS 정체성과 IS 핵심 역량 관점의 MIS 교육과정 방향 및 내용에 관한 연구)

  • Chang, Yun-Hee
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.253-270
    • /
    • 2012
  • In a rapidly changing IT and business management environment the demand for competent IS personnels is increasing. However, it is ironic that the number of IT and IS majors has sharply decreased as well as the widespread skepticism of IS identity. This research suggests directions to differentiate MIS to other IT majors, diversify IS core competency and make general improvements in MIS curriculum. The research recommend the courses of IS Strategy and policy, ITA/EA, Global IT Management, Emerging Technologies, DW/DM, BI, IT Service Science, Project Management, IT Consulting and integrated capstone which are few in Kore universities. This research also stress the course of soft skills like business communication, team building, analytic/logical thinking, rational problem solving and so on as a important IS competency. The pedagogy of course is important, so the research recommend the internship, mentoring programme, lecturers in industry according to industrial - educational cooperation.

A Study on the University Diary Design as an Effective Information Media (효율적 정보매체로서의 대학 다이어리 디자인에 관한 연구)

  • 박수진;이미영
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.151-162
    • /
    • 2003
  • Today's propensity to consume is described as a side view of distinct personality, which is different from others, and self-identity. While general enterprises understand the consumer's pattern and reflect it into the marketing, the university is based on conservative spirit and dose not cope with the needs of the times. Therefore the service provided by the university dose not make effective products that reflect the taste of the new generation who is the major customer. University diary, which is one of the typical brusher and costs ten millions won every year, is an example of the ineffective products. As compared with other university advertisements or public relations which the university is recently trying to improve, no interest is given to professional planning and cares for the design of the university diary. In this paper, we study the university identity and information to increase the usefulness of the university diary. To propose a practical improvement method of the design, we analyze real cases and examine the demands of students as a customer.

  • PDF

Policy-Based Identity Authentication and Transmission Architecture for Highly Reliable Emergency Bio-Data Management in Wireless Mesh Network for U-Healthcare (U-헬스케어를 위한 무선 매쉬 네트워크에서 고 신뢰성 있는 응급 생체 데이터 관리를 위한 정책기반의 신원 인증 및 전송 구조)

  • Chun, Seung-Man;Woo, Yeung-Kyung;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.21-29
    • /
    • 2013
  • This paper proposed the architecture of the authentication and the transmission for high reliable emergency data management based on U-healthcare wireless mesh networks. In U-healthcare monitoring service, the high reliable bio data management as well as the data transmission are required because the monitoring emergency bio data is related linked to life. More specifically, the technologies of the identity authentication of the measuring bio data, the personalized emergency status diagnosis who is authenticated the bio data and the emergency data transmission are important first of all. To do this, this paper presents the structure and protocol of the identity authentication management with using the extended IEEE 11073 PHD, the structure of policy-based management of the emergency bio data for the highly reliable management and the resilient routing protocol based on wireless mesh network for the reliable data transmission.

A proposal of assurance model based on i-PIN assurance level (아이핀 보증 등급에 기반한 보증 모델)

  • Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.287-299
    • /
    • 2016
  • The electronic transactions over the Internet are growing across the world recently. There have been a lot of identity theft incidents during these online transactions nowaday. Therefore, a high level of identity proofing shall be carried out when using online services to deal with these matter. To prevent this kind of incident, i-PIN was introduced in Korea, which is used as an Internet Personal Identification Number. The i-PIN is designated to provide an online identification of the Internet users. As such, the unique identification numbers are provided to the internet service providers. This paper is to analyze the capabilities that the i-PIN provides, to propose the assurance security model for i-PIN. Furthermore, the security analysis results are presented. The result of this paper can be applicable to improve the applicabilities of the i-PIN.

Deep Sequencing Analysis of Apple Infecting Viruses in Korea

  • Cho, In-Sook;Igori, Davaajargal;Lim, Seungmo;Choi, Gug-Seoun;Hammond, John;Lim, Hyoun-Sub;Moon, Jae Sun
    • The Plant Pathology Journal
    • /
    • v.32 no.5
    • /
    • pp.441-451
    • /
    • 2016
  • Deep sequencing has generated 52 contigs derived from five viruses; Apple chlorotic leaf spot virus (ACLSV), Apple stem grooving virus (ASGV), Apple stem pitting virus (ASPV), Apple green crinkle associated virus (AGCaV), and Apricot latent virus (ApLV) were identified from eight apple samples showing small leaves and/or growth retardation. Nucleotide (nt) sequence identity of the assembled contigs was from 68% to 99% compared to the reference sequences of the five respective viral genomes. Sequences of ASPV and ASGV were the most abundantly represented by the 52 contigs assembled. The presence of the five viruses in the samples was confirmed by RT-PCR using specific primers based on the sequences of each assembled contig. All five viruses were detected in three of the samples, whereas all samples had mixed infections with at least two viruses. The most frequently detected virus was ASPV, followed by ASGV, ApLV, ACLSV, and AGCaV which were withal found in mixed infections in the tested samples. AGCaV was identified in assembled contigs ID 1012480 and 93549, which showed 82% and 78% nt sequence identity with ORF1 of AGCaV isolate Aurora-1. ApLV was identified in three assembled contigs, ID 65587, 1802365, and 116777, which showed 77%, 78%, and 76% nt sequence identity respectively with ORF1 of ApLV isolate LA2. Deep sequencing assay was shown to be a valuable and powerful tool for detection and identification of known and unknown virome in infected apple trees, here identifying ApLV and AGCaV in commercial orchards in Korea for the first time.

A Digital ID Wallet User-oriented Mechanism in a Mobile Environment (모바일 환경에서 사용자 중심의 전자ID지갑 운용 메커니즘)

  • Song, Dong-Ho;Lim, Sun-Hee;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.57-64
    • /
    • 2007
  • As a ubiquitous environment approaches and the use of the wireless Internet using the mobile terminals is on the increase. Therefore, the users have to undergo the inconvenience of repeatedly input the same information for the user registration and the ID certification. The information the users have to put in to register in on-line services range from the basic personal information to the more other private information such as financial information. Accordingly the user can be in control of users personal information and safely manage the information by conveniently selecting from the Digital ID Wallet the Ticket that holds various information including the basic, financial or payment certification-related information. Consequently, we propose a digital identity management mechanism to control one's personal information in a mobile environment.

Is Robot Alive? : Young Children's Perception of a Teacher Assistant Robot in a Classroom (로봇은 살아 있을까? : 우리 반 교사보조로봇에 대한 유아의 인식)

  • Hyun, Eun-Ja;Son, Soo-Ryun
    • Korean Journal of Child Studies
    • /
    • v.32 no.4
    • /
    • pp.1-14
    • /
    • 2011
  • The purpose of this study was to investigate young children's perceptions of a teacher assistant robot, IrobiQ. in a kindergarten classroom. The subjects of this study were 23 6-year-olds attending to G kindergarten located in E city, Korea, where the teacher assistant robot had been in operation since Oct. 2008. Each child responded to questions assessing the child's perceptions of IrobiQ's identity regarding four domains : it's biological, intellectual, emotional and social identity. Some questions asked the child to affirm or deny some characteristics pertaining to the robot and the other questions asked the reasons for the answer given. The results indicated that while majority of children considered an IrobiQ not as a biological entity, but as a machine, they thought it could have an emotion and be their playmate. The implications of these results are two folds : firstly, they force us to reconsider the traditional ontological categories regarding intelligent service robots to understand human-robot interaction and secondly, they open up an ecological perspective on the design of teacher assistant robots for use with young children in early childhood education settings.