• Title/Summary/Keyword: role model

Search Result 7,169, Processing Time 0.041 seconds

Current States and Effects of Role Model on the Expertise Development in Engineers (공학 분야 역할모델의 현황과 전문성 계발에 미치는 영향)

  • Park, Soowon;Cho, Eunbyul;Lee, ByungYoon;Shin, Jongho;Rhee, Shin Hyung
    • Journal of Engineering Education Research
    • /
    • v.19 no.3
    • /
    • pp.3-12
    • /
    • 2016
  • The purpose of this study was to examine the current states of role model and effects on the expertise development in engineers (i.e., undergraduate students and experts in the field of engineering). Based on the previous studies, role model was categorized into two domain, general role model and value sharing role model. A total of 257 participants (162 undergraduate students, 95 experts) answered survey questions about their role model (the number of their role model, the frequency of meeting with them, and the number of sharing value with them), major confidence, knowledge acquisition, and research performance. The results showed that engineers had 1 or 2 general role models and that the contents of role model were different between the two groups. The value-sharing role model significantly predicted major confidence and research performance in undergraduate students whereas the number of general role model was closely associated with major satisfaction in experts. These results suggest that it is important for engineering major students to have general role model and value-sharing role model in order to enhance expertise development. Establishing infrastructure for having and meeting with role models can facilitate the development of personal expertise in engineers.

A Role-Based Delegation Model Using Role Hierarchy with Restricted Permission Inheritance (권한상속제한 역할계층을 이용한 역할기반 위임 모델)

  • 박종순;이영록;이형효;노봉남;조상래
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.129-138
    • /
    • 2003
  • Role-Based Access Control(RBAC) model is becoming a promising model for enterprise environments with various organization structures. In terms of role hierarchy, each senior role inherits all the permissions of its junior roles in the role hierarchy, and a user who is a member of senior role is authorized to carry out the inherited permissions as well as his/her own ones. But there is a possibility for senior role members to abuse permissions. Since senior role members need not have all the authority of junior roles in the real world, enterprise environments require a restricted inheritance rather than a unconditional or blocked inheritance. In this paper, we propose a new role-based delegation model using the role hierarchy model with restricted inheritance functionality, in which security administrator can easily control permission inheritance behavior using sub-roles. Also, we describe how role-based user-to-user, role-to-role delegations are accomplished in the model and the characteristics of the proposed role-based delegation model.

Synthesis of the Fault-Causality Graph Model for Fault Diagnosis in Chemical Processes Based On Role-Behavior Modeling (역할-거동 모델링에 기반한 화학공정 이상 진단을 위한 이상-인과 그래프 모델의 합성)

  • 이동언;어수영;윤인섭
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.5
    • /
    • pp.450-457
    • /
    • 2004
  • In this research, the automatic synthesis of knowledge models is proposed. which are the basis of the methods using qualitative models adapted widely in fault diagnosis and hazard evaluation of chemical processes. To provide an easy and fast way to construct accurate causal model of the target process, the Role-Behavior modeling method is developed to represent the knowledge of modularized process units. In this modeling method, Fault-Behavior model and Structure-Role model present the relationship of the internal behaviors and faults in the process units and the relationship between process units respectively. Through the multiple modeling techniques, the knowledge is separated into what is independent of process and dependent on process to provide the extensibility and portability in model building, and possibility in the automatic synthesis. By taking advantage of the Role-Behavior Model, an algorithm is proposed to synthesize the plant-wide causal model, Fault-Causality Graph (FCG) from specific Fault-Behavior models of the each unit process, which are derived from generic Fault-Behavior models and Structure-Role model. To validate the proposed modeling method and algorithm, a system for building FCG model is developed on G2, an expert system development tool. Case study such as CSTR with recycle using the developed system showed that the proposed method and algorithm were remarkably effective in synthesizing the causal knowledge models for diagnosis of chemical processes.

Role Graph Security Management Model based on Lattice (격자기반 역할그래프 보안 관리 모델)

  • Choi, Eun-Bok;Park, Ju-Gi;Kim, Jae-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.109-121
    • /
    • 2006
  • In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.

  • PDF

Role-Based Delegation Model Using Available Time (가용 시간을 이용한 역할 기반 위임 모델)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.65-72
    • /
    • 2007
  • The existing RBAC models are not sufficient for managing delegations or separation of roles. Researches have been done on RBDM(Role Based Delegation Model) that deal with delegating role or permission to other users. In this paper, we divide the delegated roles into two groups: periodic and temporary delegation roles. When a role is delegated, a time period is assigned together, which is used to revoke the permission of delegated role automatically. In our model, the role of monotonic delegation by an original user can be revoked at any time in case of malicious use by the delegated user. The contribution of our model is that the malicious use of delegated role can be prohibited and security vulnerability in the role hierarchy due to role delegations can be alleviated. The proposed model, T RBDM(Time out Based RBDM) is analyzed and compared with the conventional models, such as RBDM0, RBDM1 and PBDM. Our model shows an advantage over other models in terms of security robustness.

Extended Role-Based Access Control with Context-Based Role Filtering

  • Liu, Gang;Zhang, Runnan;Wan, Bo;Ji, Shaomin;Tian, Yumin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1263-1279
    • /
    • 2020
  • Activating appropriate roles for a session in the role-based access control (RBAC) model has become challenging because of the so-called role explosion. In this paper, factors and issues related to user-driven role management are analysed, and a session role activation (SRA) problem based on reasonable assumptions is proposed to describe the problem of such role management. To solve the SRA problem, we propose an extended RBAC model with context-based role filtering. When a session is created, context conditions are used to filter roles that do not need to be activated for the session. This significantly reduces the candidate roles that need to be reviewed by the user, and aids the user in rapidly activating the appropriate roles. Simulations are carried out, and the results show that the extended RBAC model is effective in filtering the roles that are unnecessary for a session by using predefined context conditions. The extended RBAC model is also implemented in the Apache Shiro framework, and the modifications to Shiro are described in detail.

A Model of Role Hierarchies providing Restricted Permission Inheritance (권한상속 제한 기능을 제공하는 역할계층 모델)

  • 이용훈;김용민;이형효;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.37-45
    • /
    • 2003
  • Role-based Access Control(RBAC) model has advantage of easy management of access control with constraints such as permission inheritance and separation of duty in role hierarchy. However, previous RBAC studies could not properly reflect the real-world organization structure with its role hierarchy. User who is a member of senior role can perform all permissions because senior role inherits all permissions of junior roles in the role hierarchy. Therefore there is a possibility for senior role members to abuse permissions due to violation of the least privilege principle. In this paper, we present a new model of role hierarchy, which restricts the unconditional permission inheritance. In the proposed model, a role is divided into sub roles(unconditional inheritance. restricted inheritance, private role), keeping organization structure in corporate environment. With restricted inheritance, the proposed model prevents permission abuse by specifying the degree of inheritance in role hierarchy.

장기지향성과 자산특유성이 공급사슬관리 추진방식과 성과에 미치는 영향

  • Park, Jeong-Su;Kim, Su-Uk;Jang, Deok-Sin
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2006.11a
    • /
    • pp.346-361
    • /
    • 2006
  • We establish two models -'intermediate' role model and 'infra-structural' role model - to confirm what role the concepts of 'long-term orientation' and 'asset specificity' execute in the context of supply chain management practices affect on SCM performances. We confirm the model's statistical significance with empirical investigation about 167 manufacturing companies in all over the country. As a result, we find that real data fits to 'infra-structural' role model with added paths of concepts and variables rather to 'intermediate' role model. We prove these results with empirical method of confirmatory factor analysis and structural equation model with AMOS program.

  • PDF

Predictive Model of the Intent of Work-Family Multiple-Role Planning among Female University Students: Integration of Social Cognitive Career Theory and Theory of Planned Behavior (여대생의 일가정 다중역할계획의도 예측모형 연구: 사회인지진로이론과 계획행동이론의 통합)

  • Kim, Jieun;Park, Mee Sok
    • Human Ecology Research
    • /
    • v.58 no.4
    • /
    • pp.539-560
    • /
    • 2020
  • This study presents work-family multiple-role planning by female university students as a new approach to worklife balance. Accordingly, this study examines university years as a key time frame during which students establish their career paths. This study integrates the social cognitive career theory and the planned behavior theory to design and evaluate a model that explains the work-family multiple-role planning process; in addition, it develops an optimal model to predict the intentions of female university students in work-family multiple-role planning. This study has conducted a structural survey with 500 female university students. After inspecting the data, the responses of 435 participants were used in the data analysis (SEM) with SPSS 21.0 and AMOS 21.0. The findings include the following. First, suitability of predictive model presents a satisfying fit. The major factors in this study's model (parental support, subjective norms, attitudes toward multiple-role planning, career decision self-efficacy, and outcome expectations) are verified as direct and indirect predictors of the work-family multiple-role planning intent of female university students. Second, the strongest predictive factor for the work-family multiple-role planning intent is the social environment factor (subjective norms), indicating that the influence of social pressure on intent is relatively large. The predictive model formulated under this study's integrated theoretical framework supplements existing research that focused on attitudes toward multiple-role planning as well as provides a more profound theoretical foundation on which work-family multiple-role planning behaviors can be better understood.

The Performance Improvement by Using a Role Model (역할 모델(Role model)을 이용한 업무 개선 - 업무의 달인(達人)을 찾아라 -)

  • Jung, Woo-Young;Ryu, Jae-Kwang;Kim, Kyung-Sik
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.12 no.3
    • /
    • pp.199-207
    • /
    • 2008
  • Purpose: The purpose of a role model is to find a master or expert who conduct their business effectively and work as a model that helps staff in charge to conduct their works effectively. This process is an effort to find out the deviation of work performance capability among staffs in charge and settle the work process to be optimized to practical business, the standardization of protocol. Materials and Methods: Seoul Asan medical center nuclear department developed 6~7 role modeling items and has applied it to work. I report two operation improvement cases we had applied a role model to Seoul ASAN medical center. Result: By comparison with none application of a role model, we could improve operation efficiency. Conclusion: The main purpose of role modeling is to make the employees who do the business in their charge effectively as a role model and contribute to work performance of employees who are lack of work performance although they performed their works hard. Our team is going to develop role model items continuously and to make a use of it to practical work then improve work performance. We regard it as a useful tool to performance improvement. The performance improvement by using a role model was very useful instrument.

  • PDF