• Title/Summary/Keyword: identity information

Search Result 1,554, Processing Time 0.029 seconds

Confusion and Overcoming Plans of the Public Library Identity in Korea (공공도서관 정체성의 혼란과 극복방안)

  • Yoon, Hee-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.3
    • /
    • pp.1-20
    • /
    • 2017
  • The essential identity of public library is a local knowledge and information center that guarantees access and use of present generation and descendant. However recently the public library is being called with core space for lifelong learning, hub of cultural activities, information gateway, community center, local public goods, information commons, democracy cradle, the second living room, etc. The spectrum for the identity of the public library in Korea is not only very wide, but also is confused. The researcher who paid attention to such a reality analyzed laws and regulations, local administrative organizations, national and official statistics related public library, and suggested evidences of the identity confusion. Based on this result, researcher proposed the principles and plans to get over the identity confusion of the public library.

A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone (스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구)

  • Lee Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.

User Identity Module(UIM) for IMT-2000 systems

  • Chung, Bo-Hyun;Koh, Jong-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1141-1144
    • /
    • 2000
  • User Identity Module(UIM) is widely deployed in GSM(Global System for Mobile communications), Known as SIM(Subscriber Identity Module). We can expect that UIM will be also available for ANSI based third generation systems. Removable User Identity Module(R-UIM) is UIM for ANSI based third generation systems and Universal Subscriber Identity Module(USIM) is UIM for GSM based third generation systems. This paper identifies differences between R-UIM and USIM and studies global roaming in IMT-2000 systems.

  • PDF

Understanding Sexual Identity-related Concerns through the Analysis of Questions on a Social Q&A Site (소셜 Q&A 사이트의 질문 분석을 통한 청소년의 성 정체성(sexual identity) 고민에 대한 이해)

  • Zhu, Yongjun;Nam, Seojin;Yi, Dajeong;Yi, Yong Jeong
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.4
    • /
    • pp.101-119
    • /
    • 2020
  • The study aims to understand major topics and concerns of gender identity-related questions expressed by the users of the NAVER social Q&A site. To achieve this goal, we analyzed 2,120 questions created from 2010 to 2018 using natural language- and information retrieval-based methods. Results indicated that the major topics discussed by the users include interpersonal relationships, doubts about gender identity, sexual orientation, feelings and relationships, and concerns about gender identity. In addition, users mainly expressed concerns regarding general issues of gender identity; sexual orientation; negative cognition about gender identity; confession, coming-out, homosexuality; future, heterosexual relationships, military enlistment; and causes of gender identity confusion. The present study effectively derives information needs from real-world concerns about sexual identity by employing topic modeling techniques, and by comparing the advantages of exact match and tf-idf-based information retrieval methods extends methodology of Library and Information Science. Further, it has contributed to the academic maturity of the study of information behavior by observing the information needs or information-seeking behaviors of online community users with specific interests.

The Relationships among Occupational Identity, Occupation Satisfaction Job Commitment of Care Workers in Care Hospitals - Focusing on moderating effects of personal characteristics.

  • Park, Hwieseo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.179-185
    • /
    • 2017
  • The purpose of this study was to investigate the relationships between occupational identity, occupation satisfaction, and self-efficacy of care workers in care hospitals and to draw implications for improving the quality of care services. In order to accomplish the purpose of this study, the occupational identity of care workers in care hospitals as an independent variable, occupation satisfaction as a dependent variable of occupational identity, and self-efficacy as a moderating variable were selected. The causal relationships between occupational identity and occupation satisfaction and the moderating effect of self-efficacy were analyzed. As a result of the analysis, the occupational identity of care workers in care hospitals showed significant effects on occupation satisfaction and job commitment. Also, the effects of occupational identity on occupation satisfaction and job commitment differ depending on self-efficacy, which means that moderating effects of self-efficacy are significant. Based on this analytical results, the theoretical and policy implications of this study were suggested, and the directions and limitations of this study were suggested.

Designing and Producing Moving Identity for Dynamic Branding (Moving Identity를 설계 적용한 Dynamic Branding 연구)

  • Whang, Chris Inkyong;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.288-290
    • /
    • 2015
  • As well as companies such as Samsung Electronics and Hyundai Motor, which subject the summit of the International Conference on the UN personnel areemphasis on Moving Identity strongly appealing the goals and vision of the future for the current organization in the community and stakeholders. It is also an important part that how to relate Dynamic Branding in promotion and advertising method. In this paper, we are designing and producing ACM SIGCHI 2015 Conference opening animation utilizing Moving Identity Design concept as a promotional movie in Dynamic Branding perspective.

  • PDF

Efficient Fuzzy Identity-Based Encryption Scheme (효율적인 퍼지 아이디 기반 암호화 방법)

  • Lee, Kwang-Su;Lee, Dong-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.563-565
    • /
    • 2008
  • In this paper, we construct an efficient fuzzy identity-based encryption scheme in the random oracle model. The fuzzy identity-based encryption is an extension of identity-based encryption schemes where a user's public key is represented as his identity. Our construction requires constant number of bilinear map operations for decryption and the size of private key is small compared with the previous fuzzy identity-based encryption of Sahai-Waters. We also presents that our fuzzy identity-based encryption can be converted to attribute-based encryption schemes.

  • PDF

A New Construction of Fuzzy Identity Based Signature Scheme

  • Wang, Chang-Ji
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.24-29
    • /
    • 2009
  • Sahai and Waters first introduced the concept of Fuzzy Identity Based Encryption (FIBE) to provide an error-tolerance property for Identity Based Encryption (IBE) in 2005. Yang et al. extended this idea and introduced the concept of Fuzzy Identity Based Signature (FIBS) in 2008, and constructed a FIBS scheme based on Sahai and Waters's FIBE scheme. In this paper, we further formalize the notion and security model of FIBS scheme and propose a new construction of FIBS scheme based on bilinear pairing. The proposed FIBS scheme not only provide shorter public parameters, private key and signature, but also have useful structures which result in more efficient key extraction, signing and verification than that of Yang et al.'s FIBS scheme.

User Acceptance Enablers according to the types of identity on Virtual Community

  • Han, In-Goo;Kim, Min-Soo;Lee, Hyoung-Yong
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2004.11a
    • /
    • pp.375-383
    • /
    • 2004
  • Despite the fact that virtual communities on the Internet have been growing at an exponential rate in recent years, little research has been done on the characteristics of virtual communities. In order to better understand and manage the activities of virtual communities, a theoretical model is proposed in this paper. The objective of this paper is to clarify the factors as they are related to the Technology Acceptance Model. In particular the relationship among identities, trust, and other factors are hypothesized. Using the Technology Acceptance Model, this research showed that the importance of identity and trust in virtual communities. The members of virtual communities interact continuously and share an identity. According to the identity type, different ways of stimulating the members are necessary in order to facilitate participation in activities of virtual communities. The virtual communities of a more utilitarian identity are more sensitive to trust in members than trust in the service provider, and members of a more utilitarian identity are inclined to exchange information with each other.

  • PDF

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.