• Title/Summary/Keyword: CyberIdentity

Search Result 99, Processing Time 0.025 seconds

Deokhu's culture in adolescent as a play space on Cyber (사이버상의 놀이 공간으로서 청소년의 덕후 문화)

  • Huh, Jeung-Kyeung
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.87-94
    • /
    • 2018
  • The purpose of this study is to explore the essential meaning of Deokhu's culture in adolescent as a play space on Cyber. A phenomenological research method guided data collection and analysis. Qualitative research methods collected from 18 in - depth interviews using semistructured question types for 13 to 17 year - old adolescents living in Seoul Jamsil. As a result, As a result, adolescent's Deokhu culture started by stress and social and emotional desire, and especially it was utilized as a play space on the cyber of purchase activity of fandom and goods around SNS activities. This has a positive effect on self-awareness as well as self-identity formation. Above all, the shortage of play time due to heavy school entrance and the lack of socially provided play space make the cyber space as another play space for the adolescents.

A Study on Course Preference according to Application of Web Identity in e-Learning (이러닝에서의 웹 아이덴티티 적용에 따른 과목 선호도 연구)

  • Hwang, Jung-Hye;Lee, Hyung-Ju
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.200-205
    • /
    • 2007
  • 본 연구에서는 컴퓨터를 이용해 시간과 공간에 구애 받지 않고 교사와 학생, 학생과 학생이 쌍방향으로 대화할 수 있는 첨단의 교육환경인 이러닝의 콘텐츠에 대한 연구를 진행하였다. 이러닝에서의 콘텐츠 디자인은 교육의 효율성과 수월성의 측면에서 많은 연구가 필요하다. 본 연구에서는 이러닝에서 교육 콘텐츠의 제작에 있어 웹 아이덴티티 적용의 필요성과 그 개념 및 효율성에 대한 연구를 수행하였다. 이론 고찰을 통해 이러닝에서 웹 아이덴티티가 학습에 미치는 효율적 작용을 연구하였고, 실증적 조사연구를 통해, 이러닝에서의 웹 아이덴티티 구현과 과목 선호의 상관관계를 규명하였다. 조사 방법으로는 가설을 세우고 이를 검증하는 방식으로 이루어졌으며, 가설은 '웹 아이덴티티가 적용된 이러닝 콘텐츠는 과목 선호에 영향을 주어 학습동기유발 및 학업 성취에 긍정적인 영향을 준다'로 설정하였으며, 사이버대학교 재학생을 대상으로 웹을 통한 이러닝에서 학습 콘텐츠에 웹 아이덴티티 적용 유무에 따른 과목 선호를 조사하였다. 이 조사를 통해 이러닝 콘텐츠에서 웹 아이덴티티 구현이 과목 선호도에 긍정적인 영향을 준다는 것이 확인되었다.

  • PDF

A Study on Digital Identity Guidelines of NIST (온라인상에서 디지털 사용자 신원 확인 가이드에 대한 연구)

  • Kim, Jong-Bae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.160-163
    • /
    • 2019
  • 본 연구는 미국 상무부 소속 국립표준기술연구소(NIST)에 의해 제시된 온라인상에서 디지털 신원 지침(digital identity guidelines)에 대한 내용을 살펴보고, 디지털 신원 서비스를 구현하기 위한 기술적인 요구사항들에 대해 검토 후 국내 본인확인서비스에 적용이 가능한 방안을 제시한다. 온라인상에서 사용자의 신원을 확인하기 위해 다양한 방안이 제시되고 있으며 현행 국내 본인확인서비스의 경우 과도한 개인정보 제공으로 사생활 침해 이슈가 제시되고 있다. 따라서 NIST의 디지털 신원지침에서 제시하는 차등화된 서비스 제공 방안에 대해 검토하고 국내 본인확인서비스에 적용 가능한 방안을 모색한다. 제시한 방안에서 획일화된 본인확인서비스에서 본인확인수단, 인증, 정보제공에 대한 차별적인 방안을 제시함으로써 보다 안전하고 건전한 본인확인서비스의 실현이 가능함을 알 수 있다.

Security analysis of Chang-Lee-Chiu's anonymous authentication scheme (Chang-Lee-Chiu 익명 인증 기법의 취약성 분석)

  • Youn, Taek-Young;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.191-194
    • /
    • 2009
  • Recently, an anonymous authentication scheme has been proposed by Chang, Lee, and Chiu. In this paper, we show the insecurity of the scheme. To prove the insecurity of the scheme, we describe some attacks that can be used to recover an user's identity.

A study on DID for enhanced digital learning data security (안전한 디지털 학습데이터 처리를 위한 DID 연구)

  • Yeong tae Baek;Min Youn-A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.335-336
    • /
    • 2023
  • 스마트 디바이스 발전과 다양한 환경적 요인에 의해 온라인 학습에 대한 요구가 증가함에 따라 온라인 학습환경에서 발생하는 개인의 학습이력에 대한 투명하고 안전한 관리에 대한 요구가 증가하고 있다. 본 논문에서는 안전한 디지털 학습이력관리를 위한 방법으로 블록체인 DID처리 방법을 연구한다.

  • PDF

A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services (온라인 서비스의 본인확인 요구사항 분석 기반의 차등화된 본인확인서비스 적용 방안)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.201-208
    • /
    • 2020
  • Recently, the application of personal proofing service based on social security number(SSN) replacement means for verifying identity in non-face-to-face transactions is increasing. In this paper, we propose a method of applying differentiated personal proofing service on whether identity verification is necessary in the online service provided by ISP and if it is appropriate to apply a certain level of assurance. By analyzing the requirements related to personal proofing required by current ISPs, we analyze the risks for each of the requirements and propose a method of applying differentiated personal proofing service according to the level of identity assurance guarantee to minimize the risks. In applying the proposed method to online service provision, it is possible to reduce user's unnecessary authentication cost by minimizing the application of personal proofing service based on alternative means, and to help protect user personal information by minimizing excessively collected personal information.

The Relation between Social Networking Sites and Depression by Gender: Mediating effects of Collective Identity, Perceived Social Support, and Negative Comparison (성별에 따른 SNS사용유형이 우울감에 미치는 영향연구: 집단소속감, 지각된 사회지지, 부정적 사회비교의 매개효과)

  • Lee, Seunguk;Choi, Younyoung;Lee, Hyunwoo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.205-215
    • /
    • 2019
  • The purpose of this study aimed to investigate the gender differences in the mediating effects of perceived social support and negative comparison in the relation between social networking sites and depression. For this analysis, 483 samples were collected and conducted by multi-group structural equation model. The findings of this study were as follows: (1) Collective identity was observed both in Facebook and in Internet Cafe activities. (2) Collective identity was positively related to perceived social support, but perceived social support was negatively related to depression. Also, negative comparison was positively related to depression. (3) In terms of gender differences, the Facebook activities were negatively related to depression for male while the internet cafe activities were positively related to depression for female. Lastly, (4) The collective identity was positively related to negative comparison for female.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

A Study on Web Identity of Online Education Contents for Foreign Languages -Focused on Foreign Language Education in English, Japanese and Chinese) (온라인 외국어 교육 콘텐츠의 웹 아이덴티티 연구 -영어, 일어, 중국어 교육을 중심으로)

  • Kim, Mirea;Hwang, Jung-Hye
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.493-498
    • /
    • 2006
  • 본 연구에서는 온라인 상에서 대학학위 과정 교육을 목적으로 제작된 외국어 콘텐츠의 웹 아이덴티티 규명의 필요성과 규명된 웹 아이덴티티와 학습동기유발간의 상관관계를 연구하는데 중점을 둔다. 본 연구에서 채택된 외국어 교육 콘텐츠는 타 교육 분야보다 각 민족 언어의 아이덴티티가 시각적으로 재현되는 방식이 다양하다는 점에서 연구대상으로 부각되었다. 본 연구는 기존에 제시된 바 있는 웹 아이덴티티 분석 기준에서 출발하여 온라인 교육 콘텐츠 측면에서 이를 적용 및 재해석하고, 온라인 교육 콘텐츠 의 웹 아이덴티티 기준을 추가하였다. 따라서, 본 연구는 4년제 학사 학위를 수여하는 국내 0 사이버대학교의 외국어 교육 콘텐츠(영어, 일어, 중국어)의 사례를 웹 아이덴티티를 구현하는 세부 요소--시각디자인측면, 사운드측면, 인터페이스측면--에 맞추어 분석을 시도하였다. 또한 웹 아이덴티티가 적용된 각 외국어 교육 콘텐츠의 교육 효과 획득을 위한 학습동기유발 효과와의 상관관계를 알기 위하여 웹 아이덴티티가 적용, 제작된 외국어 교육 콘텐츠와 웹 아이덴티티가 적용되지 않은 채 제작된 외국어 교육 콘텐츠 간의 주의력, 관련성, 자신감, 만족감 등 학습동기유발 효과를 비교하는 설문 조사를 진행하였다. 이를 통해 온라인 외국어 교육 콘텐츠에 있어서 웹 아이덴티티의 개발과 적용이 외국어 교육 효과를 높이는 학습동기유발에 유의미한 역할을 한다는 것이 확인되었다.

  • PDF