• 제목/요약/키워드: Service identity

검색결과 520건 처리시간 0.025초

전자상거래에서의 인증 알고리즘에 관한 연구 (A Study of Authentication Algorithm in Electronic Commerce)

  • 김영선
    • 경영과정보연구
    • /
    • 제6권
    • /
    • pp.1-19
    • /
    • 2001
  • Partial transactions which use computer networks are formed in the cyberspace due to rapid progress of communication and computer technology. Electronic business transactions have security problems according to the special quality of opening networks, while it can be approached easily by anyone without being tied to time and places through Internets. To revitalize the electronic business transactions, security technology which can establish its security and trust is the prior task and both safe information communication and better information security service offer are essential factors. The method to exchange information through Internets must be made after confirming one another's exact connection in the mutual identity certification to prevent a lot of threat which can occur in the use of password techniques. To satisfy these electronic business transactions, we intend to increase understanding of authentication algorithm provided with authentication function of messages and users as well to plan safety and trust of business information and contents in the electronic business transactions.

  • PDF

English Teachers' Responses to Doing Action Research

  • Yang, Tae-Sun
    • 영어어문교육
    • /
    • 제15권2호
    • /
    • pp.245-259
    • /
    • 2009
  • The purpose of this study was to investigate English teachers' perceptions about doing their own action research to find out the benefits of involvement in action research. I believe that teachers should engage in curriculum research and development because it relates to their own classrooms and because a primary aim for teacher education program is to give teachers ways of exploring their own classrooms. I focused on 17 graduate students who had undertaken action research during the fall semester of 2007 and administered a questionnaire about their perceptions of doing action research. The results revealed that their perceptions of doing action research fell into the following two categories, positive and negative aspects. For positive aspects, they experienced a sense of personal and professional growth and they underwent identity transformation from passive, etic-oriented, and uncritical to active, emic-oriented, and critical teachers. However, many of them expressed that major obstacles to doing action research were time constraints and lack of skills or training in conducting action research. Thus, it is suggested that both pre- and in-service teachers should consider conducting a language teaching diary study, doing collaborative action research, and acquiring all the necessary skills for conducting action research.

  • PDF

Action-Based Audit with Relational Rules to Avatar Interactions for Metaverse Ethics

  • Bang, Junseong;Ahn, Sunghee
    • 스마트미디어저널
    • /
    • 제11권6호
    • /
    • pp.51-63
    • /
    • 2022
  • Metaverse provides a simulated environment where a large number of users can participate in various activities. In order for Metaverse to be sustainable, it is necessary to study ethics that can be applied to a Metaverse service platform. In this paper, Metaverse ethics and the rules for applying to the platform are explored. And, in order to judge the ethicality of avatar actions in social Metaverse, the identity, interaction, and relationship of an avatar are investigated. Then, an action-based audit approach to avatar interactions (e.g., dialogues, gestures, facial expressions) is introduced in two cases that an avatar enters a digital world and that an avatar requests the auditing to subjects, e.g., avatars controlled by human users, artificial intelligence (AI) avatars (e.g., as conversational bots), and virtual objects. Pseudocodes for performing the two cases in a system are presented and they are examined based on the description of the avatars' actions.

A Study on the Characteristics of the Summer Olympic Games Mascots

  • Choi, Hwa Yeol;Lee, Hyuk Jin
    • Journal of Sport and Applied Science
    • /
    • 제6권2호
    • /
    • pp.1-7
    • /
    • 2022
  • Purpose: This study began with an interest in the meaning and importance of Olympic mascots, and this paper aimed to analyze the types and features of mascots by comparing the Summer Olympics mascots from Munich 1972 to Tokyo 2020 and ultimately to understand the attributes of the Summer Olympic mascots. Research design, data, and methodology: The approach of this study is the exploratory approach by literature reviews. This study carried out exploratory research on thinking about understanding the characteristics of the Summer Olympic Games Mascots. Results: First, the Munich 1972 mascot, Waldi is known as the first official mascot. Second, many mascots are designed the most in animal form. But the process of change according to the material of the Olympic mascot changed from a simple animal form to a finely expressed hybrid mascot, and multiple mascots appeared in the 2000s. Conclusions: The Olympic mascot is a representative symbol of the Olympic Games, representing the identity of the host country. Five attributes of the Olympic mascots were identified: friendliness, a symbolic meaning, originality, diversity, and value. Further implications were discussed.

메타버스 상호연동 표준화 동향 (Standardization Trends in Interoperability between Metaverse Platforms)

  • 정희영;강신각
    • 전자통신동향분석
    • /
    • 제38권3호
    • /
    • pp.78-85
    • /
    • 2023
  • This paper presents a review of standardization activities toward the interoperability between different metaverse platforms, which is a research hotspot in the metaverse. The metaverse is often considered as the evolution of the current mobile Internet. Like for the Internet, interoperability is essential to provide continuous user experiences over different metaverse service environments. However, current metaverses have limitations in providing interoperability in terms of portability of services, digital objects, such as identity and avatars, and economic systems. To address these limitations, the metaverse industry and open-source communities have recently begin to develop metaverse interworking standards. We describe activities conducted by various representative standardization bodies such as the Metaverse Standardization Forum, W3C (World Wide Web Consortium) Open Metaverse Interoperability, Open Metaverse Foundation, Open Metaverse Alliance for Web3, and Metaverse Alliance. In addition, we discuss how to counteract interoperability issues from the Korean perspective.

IAM 서비스를 이용한 블록체인에서의 개인정보보호 시스템 설계 (Design of Personal Information Protection System in Blockchain using IAM Service)

  • 강명조;김미희
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.250-252
    • /
    • 2023
  • 본 논문에서는 인터넷으로 블록체인 플랫폼 및 서비스를 제공하는 BaaS 환경에서 IAM 서비스를 이용한 개인정보 보호 시스템을 설계했다. 서비스 사용자는 API를 통해 클라우드에 데이터를 요청하는데, 사용자와 클라우드 사이에 API 미들웨어를 두어 클라우드 데이터에 직접 접근하지 못하도록 한다. 또한, 미들웨어의 역할을 하는 서버는 IAM(Identity & Access Management) 서비스에서 생성한 역할 및 정책, 권한에 따라 허가된 데이터에만 접근하며 사용자의 데이터 요청 전/후로 인증 절차를 진행해 시스템의 기밀성 및 무결성을 만족할 수 있도록 한다.

Analysis of Indonesia's Digital Industry and the Case of Gojek

  • Namjae Cho;Firti January Anindya
    • Journal of Information Technology Applications and Management
    • /
    • 제28권5호
    • /
    • pp.17-39
    • /
    • 2021
  • Indonesia's industrial application of digital technology is growing fast, especially in the application of mobile technology. About 1,700 digital startups are sprouting. PT Aplikasi Karya Anak Bangsa is one of those digital startups founded in 2010. This company is widely known, especially in Southeast Asia, for its products and services called 'Gojek' which was launched initially in 2015. Gojek began as a ride-hailing mobile-based application that later evolved into a Super App providing more than 20 different services in one single mobile application. After becoming Indonesian first unicorn company in 2016, Gojek now has become the first decacorn company in Indonesia, worth more than USD 10 billion since 2019. This paper aims to analyzes the technology industry in Indonesia and analyzes Gojek's background and history, its competitive status, and critical success factors. As a conclusion, we provide some advices for future development of Gojek in Indonesia and other countries in Southeast Asia's market. The advices include rebranding its overseas presence and the use of consistent brand identity across countries.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권1호
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

디지털 사진행위를 어떻게 이해할 것인가? -협업적 자기민속지학 연구를 바탕으로 (How to Understand the Digital Photography -A Cooperative Autoethnographic Study)

  • 김지영;주형일
    • 한국언론정보학보
    • /
    • 제67권
    • /
    • pp.62-87
    • /
    • 2014
  • 이 연구는 현재의 디지털기술과 연결된 사진행위를 이해하기 위한 협업적 연구이며 동시에 자기민속지학 방법을 이용해 연구의 자기 치료적 효과와 지식의 권력관계를 엿볼 수 있는 기회도 제공한다. 두 연구자는 디지털 카메라, SNS, 스마트폰과 같은 디지털미디어를 이용하는 사진행위가 갖는 의미를 개인의 정체성 구성, 개인적 삶의 다큐멘터리 만들기라는 관점에서 접근했다. 그 결과, 디지털 사진을 다큐멘트가 아닌 아카이브로 볼 수 있으며 디지털 사진행위를 ANT의 관점에서 인간과 비인간 행위자들의 네트워크 형성과 변화의 과정이라고 이해할 수 있다는 것을 발견했다.

  • PDF

A Secure and Efficient Identity-Based Proxy Signcryption in Cloud Data Sharing

  • Hundera, Negalign Wake;Mei, Qian;Xiong, Hu;Geressu, Dagmawit Mesfin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.455-472
    • /
    • 2020
  • As a user in modern societies with the rapid growth of Internet environment and more complicated business flow processes in order to be effective at work and accomplish things on time when the manager of the company went for a business trip, he/she need to delegate his/her signing authorities to someone such that, the delegatee can act as a manager and sign a message on his/her behalf. In order to make the delegation process more secure and authentic, we proposed a secure and efficient identity-based proxy signcryption in cloud data sharing (SE-IDPSC-CS), which provides a secure privilege delegation mechanism for a person to delegate his/her signcryption privilege to his/her proxy agent. Our scheme allows the manager of the company to delegate his/her signcryption privilege to his/her proxy agent and the proxy agent can act as a manager and generate signcrypted messages on his/her behalf using special information called "proxy key". Then, the proxy agent uploads the signcrypted ciphertext to a cloud service provider (CSP) which can only be downloaded, decrypted and verified by an authorized user at any time from any place through the Internet. Finally, the security analysis and experiment result determine that the proposed scheme outperforms previous works in terms of functionalities and computational time.