• 제목/요약/키워드: science identity

검색결과 1,772건 처리시간 0.036초

기업환경 조성을 통한 한국 문헌정보학의 정체성 확립방안 (Identity Establishment of Korean library & Information Science through Promoting of Business Environment)

  • 이경호;김상진
    • 한국도서관정보학회지
    • /
    • 제34권2호
    • /
    • pp.317-343
    • /
    • 2003
  • 이 연구는 문헌정보학의 정체성 확립을 위한 연구이다. 정체성 확립의 방안으로 문헌정보학의 기업환경 조성의 필요성을 제기한다. 이를 위해 한국에서 문헌정보학의 정체성이 훼손되고 있는 사례를 조사하고, 정체성 훼손의 사례가 왜 발생하고 있으며, 이것이 문헌정보학의 기업환경 조성에 어떠한 영향을 미치는지 분석한다. 또한 문헌정보학의 기업환경 조성으로 사서의 전문성과 일자리 창출 등 정체성 확립의 가능성에 대해 진단한다.

  • PDF

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

Purchase Intention of Certified Coffee: Evidence from Thailand

  • UT-THA, Veenarat;LEE, Pai-Po;CHUNG, Rebecca H.
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권8호
    • /
    • pp.583-592
    • /
    • 2021
  • This study examines social identity and self-identity as the antecedents of the theory of planned behavior (TPB) model in predicting purchase intention of certified coffee, whereas perceived trustworthiness (PT) is evaluated whether it directly affects intention and/or indirectly through attitude. In addition, ethics and luxury are investigated as the salient beliefs affecting attitude formation in this regard. A face-to-face survey was conducted with 727 coffee consumers in Thailand. Confirmatory factor analysis is applied to assess the adequacy of the model, followed by structural equation modeling to evaluate the hypotheses proposed for the relationships between constructs in an extended TPB model. The results confirm that self-identity is the most influential antecedent on attitude when compared to social identity, and attitude, in turn, is the strongest determinant in predicting purchase intention. PT has a direct positive effect on purchase intention, meanwhile, ethical, luxury beliefs, and PT are confirmed to portrait the attitude formation. As such the marketing campaigns can address manipulating consumers' beliefs on both ethical and luxury aspects as well as PT, along with consumers' social identity and self-identity to fortify a positive attitude toward certified coffee. Then the actual purchase behavior can be foreseen based on empirical evidence.

간호학생의 진로정체감 영향요인 (Factors Affecting Career Identity of Nursing Students)

  • 권경남;최은희
    • 한국보건간호학회지
    • /
    • 제24권1호
    • /
    • pp.19-28
    • /
    • 2010
  • Objectives: The purpose of this study was to investigate factors affecting the career identity of nursing students. Method: Subjects were 313 nursing students in Daegu. Consent from teachers and students were arbitrarily obtained. Mean, standard deviation, and regression determinations utilized SPSS version 12.0. Results: Career identity score of subjects was $31.79{\pm}5.78$ on basis of 56. Factors identified to be influential to career identity included time of career decision, self-evaluated career performance, satisfaction with clinical practice and college admittance. The influence of the factors on career identity was rated as 64.1% that is high value. Conclusions: The identified factors are important in determining career identity of nursing students. Further studies are needed to generalize these results and examine widely affecting variables of career identity.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.