• Title/Summary/Keyword: science identity

Search Result 1,764, Processing Time 0.037 seconds

Identity Establishment of Korean library & Information Science through Promoting of Business Environment (기업환경 조성을 통한 한국 문헌정보학의 정체성 확립방안)

  • 이경호;김상진
    • Journal of Korean Library and Information Science Society
    • /
    • v.34 no.2
    • /
    • pp.317-343
    • /
    • 2003
  • This study focuses on the identity establishment of library and information science. It suggests, as a way of establishing the identity, the necessity of promoting of business environment in library and information science. For this purpose, the study examines Korean cases that have damaged the identity, and analyzes why such damage has been done and how it affects the fostering of business environment in library and information. It also diagnoses the possibility of identity establishment such as, for example, professionalism of the librarian and creation of jobs through the fostering of business environment in library and information science.

  • PDF

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

Purchase Intention of Certified Coffee: Evidence from Thailand

  • UT-THA, Veenarat;LEE, Pai-Po;CHUNG, Rebecca H.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.583-592
    • /
    • 2021
  • This study examines social identity and self-identity as the antecedents of the theory of planned behavior (TPB) model in predicting purchase intention of certified coffee, whereas perceived trustworthiness (PT) is evaluated whether it directly affects intention and/or indirectly through attitude. In addition, ethics and luxury are investigated as the salient beliefs affecting attitude formation in this regard. A face-to-face survey was conducted with 727 coffee consumers in Thailand. Confirmatory factor analysis is applied to assess the adequacy of the model, followed by structural equation modeling to evaluate the hypotheses proposed for the relationships between constructs in an extended TPB model. The results confirm that self-identity is the most influential antecedent on attitude when compared to social identity, and attitude, in turn, is the strongest determinant in predicting purchase intention. PT has a direct positive effect on purchase intention, meanwhile, ethical, luxury beliefs, and PT are confirmed to portrait the attitude formation. As such the marketing campaigns can address manipulating consumers' beliefs on both ethical and luxury aspects as well as PT, along with consumers' social identity and self-identity to fortify a positive attitude toward certified coffee. Then the actual purchase behavior can be foreseen based on empirical evidence.

Factors Affecting Career Identity of Nursing Students (간호학생의 진로정체감 영향요인)

  • Kwon, Kyung-Nam;Choi, Eun-Hee
    • Journal of Korean Public Health Nursing
    • /
    • v.24 no.1
    • /
    • pp.19-28
    • /
    • 2010
  • Objectives: The purpose of this study was to investigate factors affecting the career identity of nursing students. Method: Subjects were 313 nursing students in Daegu. Consent from teachers and students were arbitrarily obtained. Mean, standard deviation, and regression determinations utilized SPSS version 12.0. Results: Career identity score of subjects was $31.79{\pm}5.78$ on basis of 56. Factors identified to be influential to career identity included time of career decision, self-evaluated career performance, satisfaction with clinical practice and college admittance. The influence of the factors on career identity was rated as 64.1% that is high value. Conclusions: The identified factors are important in determining career identity of nursing students. Further studies are needed to generalize these results and examine widely affecting variables of career identity.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.