• Title/Summary/Keyword: Service identity

Search Result 517, Processing Time 0.024 seconds

A Study for the Perception of Job Identity, Public Service Motivation and Organizational Committment focusing on Airport Security Agents (고용형태에 따른 직무정체성, 공직봉사동기 및 조직충성도에 대한 연구 : 공항 특수경비원들의 인식을 중심으로)

  • Park, Sung-Sik;Cho, Sung-Hwan;Kim, Kwang-Ok;Jung, Ju-Yong
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.4
    • /
    • pp.31-43
    • /
    • 2017
  • Airport security staff are outsourced workers, whose status is a special security agent under the security service law in Republic of Korea, who are subject to persuing both profitability and public concern at the same time. This paper has chosen the sample of security staff working at Incheon airport. This is because airport security staff is being outsourced, this paper had made an empirical research such areas as the perception of job identity, public service motivation and organizational commitment through job satisfaction. According to statistical research, it was found the perception on job identity by airport security staff had a significant negative effect on both job satisfaction and organizational commitment. The more they have perceived their status as non-permanent status, the less they had job satisfaction and commitment at the same time as a special security agent at airport. Their perception of job identity had a significant effect on such public service motivation factors as 'absorbing public concern' and 'a solicitude'. Lastly, their motivation factors had also significant positive effect on job satisfaction and organizational commitment.

A Study on Improvement of Personal Identity Proofing Service(PIPS) Based on Alternative Methods of Resident Registration Number (온라인에서 주민등록번호 대체수단 기반의 본인확인서비스의 개선 방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.29-42
    • /
    • 2019
  • As online services become more and more popular due to the development of IT, non-face-to-face transactions are continuously increasing rather than face-to-face transactions. The personal identity proofing service(PIPS) based on the alternative method of the resident registration number is used for the purpose of confirming the identity of the other party on the Internet. However, in the case of the current PIPS, the personal information of the PIPS user is excessively provided to the online service provider. As a result, privacy problems of online users, shortage of choice of information providing options, and lack of differentiation of authentication methods are becoming problems. Therefore, this paper proposes a method to improve the PIPS based on the current resident registration number alternative method and to provide a method to differentiate the provision of excessive personal information. In the proposed method, we analyze trends and current status of overseas online PIPS in order to provide a method of providing differentiation of personal information and proposes an effective improvement method applicable to domestic.

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service

  • Chen, Liqing;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1523-1545
    • /
    • 2019
  • Cloud computing is now a widespread and economical option when data owners need to outsource or share their data. Designing secure and efficient data access control mechanism is one of the most challenging issues in cloud storage service. Anonymous broadcast encryption is a promising solution for its advantages in the respects of computation cost and communication overload. We bring forward an efficient anonymous identity-based broadcast encryption construction combined its application to the data access control mechanism in cloud storage service. The lengths for public parameters, user private key and ciphertext in the proposed scheme are all constant. Compared with the existing schemes, in terms of encrypting and decrypting computation cost, the construction of our scheme is more efficient. Furthermore, the proposed scheme is proved to achieve adaptive security against chosen-ciphertext attack adversaries in the standard model. Therefore, the proposed scheme is feasible for the system of data access control in cloud storage service.

Impact of Economic Value in the O2O Distribution Channel on Brand Attractiveness and Performance

  • Seok-Beom, CHOI;Hye-Young, JOO;Hokey, MIN;Qaiser Farooq, DAR;Young-Hyo, AHN
    • Journal of Distribution Science
    • /
    • v.21 no.2
    • /
    • pp.7-20
    • /
    • 2023
  • Purpose: With the unique feature of O2O, consumers are now able to check the profile of the services and products online and then consume them in offline venues or vice versa. This study provides motivation and practical implications about online-to-offline (O2O) distribution channels and investigates the relationship between economic values, service consistency and brand identity attractiveness in the O2O distribution channel. Then identify the impact of brand identity attractiveness on the performance (reputation and reuse intention). Research design, data, and methodology: Structural equation modeling (SEM) has been used to investigate the relationship between economic value and brand identity attractiveness, which affects the reputation and reuse intention of services in O2O. Results: Empirical results show the positive and significant impact of economic value and service consistency on brand identity attractiveness which results the positive and significant impact on performance (reputation and reuse intention) in O2O. Conclusion: In the O2O distribution channel, economic value is an important aspect for the attractive image and brand identity. On the other side, brand identity attractiveness is important for the bright future of O2O services, continuous growth, achieving the distinct goal, keeping good promises with customers, and a better reputation of O2O services in distribution channels.

A Study on Strengthening Personal Information Sovereignty through Analysis of Domestic Service Cases and Research Projects of Self-Sovereign Identity Technology (자기주권신원기술의 국내 서비스 사례 및 연구 과제 분석을 통한 개인정보 주권 강화 방안연구)

  • Lee, Jeong-Hyeon;Kim, Ji-Won;Kim, Chul-Soo;Yang, Jin-hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.575-589
    • /
    • 2020
  • Along with the exponential growth of data businesses, the importance of data containing personal information of use have also increaseing. Particularly, in Korea, as the Data 3 Act was implemented, companies can use personal information more actively through regulatory improvement and stipulation in case of using data containing personal information. In this situation as per the service use, self-sovereign identity technology has emerged that can minimize the provision of personal information in relation to real name authentication and provision of personal information. Recently, services and studies using blockchain have been actively conducted in case of using the self-sovereign identity function for clarity and verification of records according to the use of personal information. In this thesis, by analyzing the characteristics of domestic self-sovereign identity service and the current status and contents of research related to blockchain-based self-sovereign identity technology and we suggest a research direction based on self-sovereign identity technology to reinforce the sovereignty of personal information in the era of the 3rd Data Act do.

Privacy Controller using XACML for Internet Identity Management System (인터넷 Identity 관리 시스템 환경에서 XACML을 이용한 프라이버시 컨트롤러)

  • Roh, Jong-Hyuk;Jin, Seung-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.7B
    • /
    • pp.438-447
    • /
    • 2007
  • In the Internet, an identity service must to obtain permission from a user to allow them to share data with requesting service. For that, the privacy policy, which reflects legal regulations and preferences made by the user, is needed. Also, the management interface that aids the user to make the privacy policy and the PDP system that makes admission control and policy decisions in response to a request from an entity wanting to access the personal information are needed. In this paper, the privacy controller system model handled under the internet Identity management system environment is proposed. The system has the easy interface of policy generation and the efficient policy decision process. The system applies and modifies to the XACML of OASIS group. We propose that the privacy policy is divided into the three policies, which are the user policy, the domain policy and the basic offering policy. To resolve the collision between the policies, we also propose the collision resolution policy.

Discussion on the Establishment of Identity of Fisheries Cooperatives as Solution of the Problems of Comprehensive Measures for a Soft Landing of Household Debts (가계부채 연착륙 종합대책의 문제점과 그 해법으로써 수산업협동조합의 정체성 확립에 관한 논의)

  • Jeon, Hyeong-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.42 no.3
    • /
    • pp.95-107
    • /
    • 2011
  • The Comprehensive Measures for a soft landing of Household Debts affecting the credit service of Fisheries Cooperative (FC) have been known to the public in June 2011. Its essential points are as follows: 1) Abolition of Tax-free Regulation, 2) Set limit of loans, etc. per person, 3) Introduce leverage regulations for credit-specialized financial sector i. e. FC, 4) Gradually strengthen loan-loss reserve requirements for card-loan and other credit loans. However, the Financial Policy Measures seem to pay no attention to the Cooperative's Values, Principles and Identity. In this paper, emphasis is be placed on the task of the regulators i. e. Financial Services Commission and Financial Supervice Service to lift the Financial Measures negatively affecting the operation of fund of FCs, and on the establishment of Cooperative identity in order to further develop FCs.