• Title/Summary/Keyword: Service identity

Search Result 517, Processing Time 0.026 seconds

A Study On User-centric Identity Information Management Model In Internet Environment (인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구)

  • Rhy, Hae-Gyu;Shin, Hyeon-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.37-50
    • /
    • 2009
  • With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

Influence of Occupational Therapist's Professional Identity on Empowerment and Burn Out (작업치료사의 전문직업성이 임파워먼트와 소진에 미치는 영향)

  • Ji-Hoon Kim
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.12 no.1
    • /
    • pp.73-81
    • /
    • 2024
  • Purpose : The purpose of this study was to identify the degree of occupational therapists' professional identity and examine the correlation between empowerment and burn out. We also investigated the effects of the occupational therapists' professional identity on empowerment and burn out. Through these assessments, we aimed to highlight the importance of professional identity and find methods to improve empowerment and reduce burn out in occupational therapists. Methods : The study was conducted from October 19 to from November 11, 2023. General characteristics, professional identity, empowerment, and burn out were examined using frequency analysis and descriptive statistics. The correlation between these factors was analyzed using Pearson's correlation coefficient. Multiple regression analysis was used to identify factors influencing empowerment and burn out. An α value =.05 was used to verify statistical significance. Results : First, Professional identity was an average 3.24±.37. Second, a significant correlation was found between professional identity and empowerment (r=.417, p<.01) and burn out (r=-.377, p<.01). As a result of the relationship between professional identity sub-factors and empowerment in professional organization (r=.270, p<.01),, belief in self-regulation (r=.258, p<.01), vocational consciousness (r=.348, p<.01), and belief in autonomy (r=.308, p<.01) showed a statistically significant correlation. Professional identity sub-factors were significantly correlated with burnout, professional organization (r=-.199, p<.05), belief in public service (r=-.153, p<.05), belief in self-regulation (r=-.334, p<.01), vocational consciousness (r=-.250, p<.01), and belief in autonomy (r=-.293, p<.01) showed a significant correlation. Third, professional identity sub-factors influencing empowerment were vocational consciousness (β=.154, p<.05) and belief in autonomy (β=.135, p<.05), and those influencing burnout were belief in self-regulation (β=-.389, p<.01) and belief in autonomy (β=-.244, p<.01). Conclusion : The study findings demonstrated that professional identity affects empowerment and burn out. Therefore, continuous study on the professional identity of occupational therapists is warranted.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

An Analytical Approach to One-Person-Library (ONE-PERSON-LIBRARY의 의미론적 해석)

  • Chung, Jun-Min
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.3
    • /
    • pp.25-47
    • /
    • 2013
  • The cognitive approaches on library and librarianship are being questioned. These are led from what the identity of the librarian is and from what the library is. This revealed that the perception of the library should not be acquired by interpreting its appearances but by interfering its nature. In conclusion, the information service is disclosed virtually as the essence of the library. On realizing the library virtually, even a person could be entitled as the library on the underlying assumption of information service (one-person-library).

An analysis of the relationship between Sex-role-identity and life adjustment among adult patients perceives (성인환자가 지각한 성역할 정체감과 생활적응과의 관계분석)

  • 모경빈
    • Journal of Korean Academy of Nursing
    • /
    • v.18 no.3
    • /
    • pp.245-256
    • /
    • 1988
  • The purpose of this study was to examne the relationship between sex-role-identity and life adjustment which adult patients perceive by means of the analysis of the relationship between the sex-role-identity and life adjustment which are perceived by adult patients who are hospitalized. The primary purpose of this study is to investigate how the adult patients describe their own Sex role-identity. Sceondary purpose is to find out whether their Sex role-identity is related to life adjustment and which life circumstances. If any are associated with Sex role identity. 207 adult patients who were older than 30 years living under 65 years were admitted to the hospital in Seoul. Were interviewed with measures including the Bem Sex Role Inventory short Form. Life adjustment and current life situation. For data analysis, X$^2$-test, ANOVA, and Scheffe test were used. The results are summarized as follows ; (1) Most adult patients described androgynous Sex role-identity. (2) Sex role-identity differentiated significantly life adjustment. (3) Perceived Sex role identity was related to the Several dimension of life sityation such as marital status family construction activity. By the result of this study, the present writer is to suggest as follows ; Firstly, in the aspect of the study of nursing the many -sided and desirable study on the relation between the sex-role-identity life ajustment, and the study which a nurse can control and prevent the anxiety of adult patients by means of examining the measure and the cause of the emotional support on a patient must be accomplished. Secondly, in the aspect of the aspect of the practical affairs of nursing the practical effort which puts emphasis on the whole personal nursing in the performance of the duty, and the institutional support in the nursing administration must be planned in order to increase the efficiency of the nursing service by promoting the whole -personal nursing role of a nurse.

  • PDF

Study on Development of Technology Standards for Batch Conversion of CI between Private and Personal Identity Proofing Organizations for Safe Mobile Electronic Notification Service (모바일전자고지서비스를 위한 민간기관과 공인전자문서중계사업자 간 연계정보 활용방안에 관련 연구)

  • JongBae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.483-491
    • /
    • 2023
  • Due to the spread of mobile devices, the use of mobile electronic notification services is increasing. For the mobile electronic notification service, the connecting information is required to identify the owner of the mobile device and the recipient of the notification. The connecting information is an online resident registration number, and safe management is essential. Therefore, in this paper, the processing flow, interconnecting standard, and management plan are proposed when a mobile electronic notification requesting agency requests the identity verification agency to convert the resident registration number of the recipient of the electronic notification to connecting information. In the proposed method, it is suggested that a safe mobile electronic notification service is possible by defining the process of collective conversion of connecting information between private organizations and personal identity proofing agency, information transmission and reception methods, and interworking standards.

A Study on the Development of Technology Standards for the Batch Conversion of CI between Private and Personal Identity Proofing Organizations for Safe Mobile Electronic Notification Service (안전한 모바일 전자고지서비스를 위한 민간기관과 본인확인기관 간의 연계정보 일괄변환 기술기준 개발에 관한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.559-569
    • /
    • 2022
  • Due to the spread of mobile devices, the use of mobile electronic notification services is increasing. For the mobile electronic notification service, the connecting information is required to identify the owner of the mobile device and the recipient of the notification. The connecting information is an online resident registration number, and safe management is essential. Therefore, in this paper, the processing flow, interconnecting standard, and management plan are proposed when a mobile electronic notification requesting agency requests the identity verification agency to convert the resident registration number of the recipient of the electronic notification to connecting information. In the proposed method, it is suggested that a safe mobile electronic notification service is possible by defining the process of collective conversion of connecting information between private organizations and personal identity proofing agency, information transmission and reception methods, and interworking standards.

A Research on Gender-role Identity, Gender Discriminative Consciousness and Attitudes toward Military Service of Korean College Students (한국 대학생의 성역할정체감과 성차별의식 및 군대에 대한 태도에 관한 연구)

  • Mihye SHIM ;Yumi ENDO
    • Korean Journal of Culture and Social Issue
    • /
    • v.17 no.1
    • /
    • pp.1-17
    • /
    • 2011
  • The purpose of this research is to analyze male oriented military culture and gender discrimination. It examined whether the experience of military service would affect the attitude of Korean college students, gender role identity, and sexism by classifying 317 college students into three groups; males who have completed military service, males who haven't completed military service, and a female group. Research results are as follows: First, in general military experience did not enhance awareness of gender identity nor affect attitudes toward gender discrimination, but significantly enhanced masculinity in some males who completed military service was a major factor in strengthening masculinity and benevolent sexism. Second, males who completed military service and women had a more positive view of the military than males who had yet to serve in the military. Third, regardless of military experience and gender, military experience was perceived to enhance benevolent sexism towards women. Fourth, all three groups showed a strikingly positive correlation in hostile sexism and benevolent sexism. However, they did not show a significant difference in the correlation of groups. Tough these results indicate that deep-rooted gender discrimination in Korean society is enhanced by military experience, it also confirms the significance and impact of the reality of the military ideology.

  • PDF

The Impact of Consumer's Ethical Self-Identity and Service Utility based on Sharing Economy Service on Service Satisfaction and Intention to Recommendation (공유경제서비스에 대한 소비자의 윤리적 자아정체성과 서비스효용이 서비스만족도와 추천의도에 미치는 영향)

  • Lee, Yun-Sun
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.103-109
    • /
    • 2020
  • As part of the sharing economy service, the present study is not only about the positive aspects of O2O services, but also about the consumer ethical perceptions of recent conflicts with existing business and labor markets, trust of platform, and service utility on consumer satisfaction and intention to recommend O2O services. To test hypotheses, data were collected and analyzed for 149 samples, focusing on the car sharing service, an example of the sharing economy service, which is becoming an issue. As a result, the ethical self-identity of the consumer, the trust of the platform, and the service utility, all affected the service satisfaction, whereas only the hedonic utility and trust of the platform had a positive effect on the intention to recommendation. This study is meaningful in that it examines the influence of service utility focusing on ethical consciousness and social perspective of consumers, rather than on the point of consumption such as ethical consumption position and trust of platform based on sharing economy service.