• Title/Summary/Keyword: Social ID

Search Result 76, Processing Time 0.022 seconds

A Research on the Use of DID Using a Private Blockchain (프라이빗 블록체인을 사용한 DID 활용 연구)

  • Park, Jong-Gyu;Kwon, Seong-Geun;Kwon, Ki-Ryong;Lee, Suk-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.6
    • /
    • pp.760-767
    • /
    • 2021
  • The identity verification is one of the most important technologies in online services. Many services in society are provided online, and the service is provided after confirming the user's identity. Users can do a lot of things online, but they also have side effects. Online digital information is easily manipulated and it is difficult to verify its authenticity, causing social confusion. Accordingly, there has been a movement for individuals to directly manage their identity information using DID. In this paper, we propose a system that can authenticate identity by directly adding own personal information and issuing an identifier using DID technology based on a private blockchain. Then, to verify the proposed system, the scenario is executed and verified.

Dynamic Sensitivity Level Measurement for Privacy Protection (개인정보보호 강화를 위한 동적 보안수준 결정)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.137-150
    • /
    • 2012
  • For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property information consisting of private information, this article suggests Dynamic-Security-Level-Measurement for property information. DSLM adopts the variable characteristics of property information as the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.

A study of major characteristics of buying cigarettes in adolescent smokers in Korea (흡연청소년의 담배구매 관련 주요 특성에 관한 연구)

  • Shin, Sun-Mi;Lee, Hee-Woo;Kang, Se-Won
    • Journal of the Korean Society of School Health
    • /
    • v.21 no.2
    • /
    • pp.97-105
    • /
    • 2008
  • Purpose : To investigate major characteristics influencing on adolescent smoking in Korea. Method : The subjects were 431 students (298 male and 133 female) enrolled in the non smoking program at Seoul School Health Promotion Center from March 2006 to February 2007. The survey was done about motivation of smoking, the way of getting cigarettes and frequency, chi-square test, and t-test by SAS package 8.1 were used to analyze the data. Result : Total 431 subjects were composed of 49.2% middle school students, 50.8% high school students. The middle school students who smoke 1 to less than 10 cigarettes per day were 56.1% and 10 to less than 20 cigarettes per day 26.7%, while high school students were 46.8% and 44.1%. 73.1% of male, and 76.9% of female students selected the cigarettes depending on taste and fragrance. The places of buying cigarettes were supermarkets 67%, convenience stores 19.4%, small stores 11.8%. A high percentage of students answered they did not have to show ID when they bought cigarettes(“rarely checked the ID” 25.2% of male and 30.8% of female, ”did not checked at all” was 10.9% male and 9.6% female). The ratio of spending money on buying cigarettes was 38.8% and 35.6% in male and female middle school, and 37.9% and 27.2% in male and female high school. Conclusion : Findings of this study suggests the constituting of strong social regulations to protect youth from smoking.

An Investigation of Technical Methods to Solve the Internet Negative-Function (인터넷 역기능을 해결키 위한 기술적 방법론에 대한 검토)

  • 조동욱;신승수
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.4
    • /
    • pp.40-45
    • /
    • 2002
  • The network community provides people a new area which is called a cyber area, not physical area. However, today in the cyber area, the negative function has been causing social problem. In fact, it has not been causing by original function. Specifically speaking, main reason why it's leading to the negative function is that teenagers are logging into inappropriate sites (such as: violent, adult sites) to unnecessary sites (such as: e-mails with unknown signs combined with words, inappropriate language used in certain web board). Not only that, private password and ID's are being used by unknown user to accomplish illegal access. If this problem does not get solved through immediate development of technologies method, the cyber crime will increase in short period of time. The purpose of this paper is to understand each analyzed method which can cope with negative internet function, to discuss suitable management in certain web board an to check with fuzzy intercommunication mood.

  • PDF

A Study on the Electronic Voting Scheme Suitable for Large Scale Election (대규모 선거에 적합한 전자 선거 기법에 관한 연구)

  • Yun, Seong-Hyeon;Kim, Tae-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.543-551
    • /
    • 1997
  • Many areas of human activities are computerized with the wide spread use of computers and communication networks.Electrinic voting is an important social activity in democtatic society.The realization of electronic democracy is based on the sectrity of edectronic voting scheme.Therefore, it is necessary to use the cryto-graphic technique for secure electronic voting scheme.Therefore, it is necessary to use the cryto-graghic technique for secure election.In this stusy, an dedctronic voting scheme sutiable for large election is proposed.In order to make practi-cal volting scheme, we assume that the voting authorization center is trustful and the chaum's anonymous com-munication channel[6] prepared before the election day.The center authorizes the ballot of eligible voter by using the ID based digital signature scheme in the registeation stage.During the voting stage, undeniable chal-lenge/ response prorocol is performed between the center and the boters to ensure that the intemediate voting results should not affect the entire.The proprsed scheme fully conforms to the requirments of large scale election such as privacy of the voters, fairness, unresuability, unforgeability and eligbility.

  • PDF

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

Authorship and Inappropriate Authorship from an Ethical Publication Perspective (출판 윤리적 관점에서의 저자됨과 부적절한 저자됨)

  • Sung Hun Kim;Jung Im Jung
    • Journal of the Korean Society of Radiology
    • /
    • v.83 no.4
    • /
    • pp.752-758
    • /
    • 2022
  • Authorship is important for research integrity and publication ethics, acting as the basis for credit and academic achievement. Moreover, publication achievements have a significant impact on research grants and academic careers. Inappropriate authorship has been reported for several reasons, including complex interests and competitive environments. One form of this is representative authorship misuse, which includes honorary and ghost authorships. Kin co-authorship, such as parent-children authorship, is another form of inappropriate authorship that has recently emerged as a social problem in Korea. To address these issues, the International Committee of Medical Journal Editors (ICMJE) has established criteria for authorship. Similarly, many journals use the Contributor Roles Taxonomy (CRediT) and Open Researcher and Contributor ID (ORCID) systems to prevent authorship misuse and systematically evaluate author credit and responsibility. Herein, this article reviews authorship and inappropriate authorship, as well as introduces methods to avoid authorship misuse.

Visualizing the Results of Opinion Mining from Social Media Contents: Case Study of a Noodle Company (소셜미디어 콘텐츠의 오피니언 마이닝결과 시각화: N라면 사례 분석 연구)

  • Kim, Yoosin;Kwon, Do Young;Jeong, Seung Ryul
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.89-105
    • /
    • 2014
  • After emergence of Internet, social media with highly interactive Web 2.0 applications has provided very user friendly means for consumers and companies to communicate with each other. Users have routinely published contents involving their opinions and interests in social media such as blogs, forums, chatting rooms, and discussion boards, and the contents are released real-time in the Internet. For that reason, many researchers and marketers regard social media contents as the source of information for business analytics to develop business insights, and many studies have reported results on mining business intelligence from Social media content. In particular, opinion mining and sentiment analysis, as a technique to extract, classify, understand, and assess the opinions implicit in text contents, are frequently applied into social media content analysis because it emphasizes determining sentiment polarity and extracting authors' opinions. A number of frameworks, methods, techniques and tools have been presented by these researchers. However, we have found some weaknesses from their methods which are often technically complicated and are not sufficiently user-friendly for helping business decisions and planning. In this study, we attempted to formulate a more comprehensive and practical approach to conduct opinion mining with visual deliverables. First, we described the entire cycle of practical opinion mining using Social media content from the initial data gathering stage to the final presentation session. Our proposed approach to opinion mining consists of four phases: collecting, qualifying, analyzing, and visualizing. In the first phase, analysts have to choose target social media. Each target media requires different ways for analysts to gain access. There are open-API, searching tools, DB2DB interface, purchasing contents, and so son. Second phase is pre-processing to generate useful materials for meaningful analysis. If we do not remove garbage data, results of social media analysis will not provide meaningful and useful business insights. To clean social media data, natural language processing techniques should be applied. The next step is the opinion mining phase where the cleansed social media content set is to be analyzed. The qualified data set includes not only user-generated contents but also content identification information such as creation date, author name, user id, content id, hit counts, review or reply, favorite, etc. Depending on the purpose of the analysis, researchers or data analysts can select a suitable mining tool. Topic extraction and buzz analysis are usually related to market trends analysis, while sentiment analysis is utilized to conduct reputation analysis. There are also various applications, such as stock prediction, product recommendation, sales forecasting, and so on. The last phase is visualization and presentation of analysis results. The major focus and purpose of this phase are to explain results of analysis and help users to comprehend its meaning. Therefore, to the extent possible, deliverables from this phase should be made simple, clear and easy to understand, rather than complex and flashy. To illustrate our approach, we conducted a case study on a leading Korean instant noodle company. We targeted the leading company, NS Food, with 66.5% of market share; the firm has kept No. 1 position in the Korean "Ramen" business for several decades. We collected a total of 11,869 pieces of contents including blogs, forum contents and news articles. After collecting social media content data, we generated instant noodle business specific language resources for data manipulation and analysis using natural language processing. In addition, we tried to classify contents in more detail categories such as marketing features, environment, reputation, etc. In those phase, we used free ware software programs such as TM, KoNLP, ggplot2 and plyr packages in R project. As the result, we presented several useful visualization outputs like domain specific lexicons, volume and sentiment graphs, topic word cloud, heat maps, valence tree map, and other visualized images to provide vivid, full-colored examples using open library software packages of the R project. Business actors can quickly detect areas by a swift glance that are weak, strong, positive, negative, quiet or loud. Heat map is able to explain movement of sentiment or volume in categories and time matrix which shows density of color on time periods. Valence tree map, one of the most comprehensive and holistic visualization models, should be very helpful for analysts and decision makers to quickly understand the "big picture" business situation with a hierarchical structure since tree-map can present buzz volume and sentiment with a visualized result in a certain period. This case study offers real-world business insights from market sensing which would demonstrate to practical-minded business users how they can use these types of results for timely decision making in response to on-going changes in the market. We believe our approach can provide practical and reliable guide to opinion mining with visualized results that are immediately useful, not just in food industry but in other industries as well.

The Current State and Implementation of Music Therapy for Adults With Intellectual Disabilities (국내 성인지적장애인 음악치료 중재 현황)

  • Oh, Ji Eun
    • Journal of Music and Human Behavior
    • /
    • v.13 no.2
    • /
    • pp.17-30
    • /
    • 2016
  • This study aimed to examine the current state of music therapy for adults with intellectual disabilities (ID) by conducting a survey of music therapists. Completed surveys from 32 certified music therapists were included for analysis. The questionnaire was composed of 38 items that asked about the participants' background, work environment and music therapy implementation experience (including assessment, goal establishment, intervention strategy and difficulties). The results of the study showed that music therapy for adults with ID was practiced in diverse facilities. Enhancing social interaction was the most frequently set goal by music therapists, whereas facilities mostly required the music therapy services for emotional stability. Also, instrument playing was used most among music activities, and musical structure was considered most when choosing music for therapy. Among the influential institutional factors, characteristics of the facility were considered most frequently, and the level of functioning was the most considered in terms of client-related factors. To advance the effective use of music therapy interventions with adults with ID, development of music therapy assessment tools and more active communication with facility staff were also suggested when working with this population.

A study on the development of hydrocortisone certified reference material in cosmetic cream using isotope dilution-mass spectrometry (동위원소희석-질량분석법을 이용한 화장품 크림 중 히드로코르티손 인증표준물질 개발 연구)

  • Chae-Hong Lee;Ji-Sun Huh;Eun-Ji Jeong;Hyun-Ah Kim;Min-Young Eom
    • Analytical Science and Technology
    • /
    • v.37 no.3
    • /
    • pp.166-173
    • /
    • 2024
  • Steroids have a temporary skin improvement and whitening effect by controlling vasodilation, but they also cause side effects when used for a long time. Therefore, steroids were designated and managed as raw materials that cannot be used in cosmetics in Korea. However, steroids are continuously being detected in cosmetics, causing social issues. In this study, we developed a certified reference material (CRM) for the determination of steroids such as hydrocortisone in cosmetics. A cream-type cosmetic CRM was manufactured and subsequently certified following the guidelines outlined in ISO Guide 35. Homogeneity, short-term stability, and long-term stability were evaluated using isotope dilution mass spectrometry (ID-MS). The certified values were determined by using NIST's primary reference material to ensure traceability. From now on, we intend to supply the certified reference material as a cosmetic CRM to national and international companies, as well as research institutes after certification as certified reference material from KOLAS and registering on COMAR.