• 제목/요약/키워드: identity information

검색결과 1,541건 처리시간 0.027초

독서요법이 대학생의 자아정체감 정립에 미치는 효과 (A study of the Effects of Bibliotherapy in Establishing Ego-Identity of the University Students)

  • 이희정;박옥화
    • 한국도서관정보학회지
    • /
    • 제32권3호
    • /
    • pp.331-351
    • /
    • 2001
  • 본 연구의 목적은 일생 중 자아정체감이 가장 많이 발달하는 시기에 있는 대학생들에게 독서요법을 실시하여 자아정체감 정립에 독서가 어떻게 작용하는가를 알아보고자 하는 것이다. 이를 위하여 첫째, 대학생들에게 독서요법이 자아정체감 정립에 효과가 있는지를 검증해 보았으며 둘째, 대학도서관에서 적극적인 참고봉사의 하나로서 독서지도가 필요함을 입증하였다.

  • PDF

Is Brand Identity Aligned with Brand Image on Instagram? An Empirics-First Investigation of the Indian Brands

  • Anand V;Daruri Venkata Srinivas Kumar
    • Asia pacific journal of information systems
    • /
    • 제33권3호
    • /
    • pp.768-791
    • /
    • 2023
  • Effective brand management using images has been a challenge for the brand managers. The brand identity-brand image alignment on the social media is an important yet mostly-overlooked phenomenon. We proposed a scalable Google Cloud Vision-based approach for measuring the alignment between brand identity and brand image, and understanding the brand positions. We analyzed 3247 images of 13 leading Indian brands on Instagram. Images containing wordy announcements by the firms are in stark contrast with the relatively more emotive images by the users. It leads to a noticeable disconnect between the brand identity and brand image. Also, the private sector brands do not always outperform the public sector brands in branding efforts. By offering practical guidance on how to measure and reduce the misalignment, this study paved a feasible path towards better visual branding on Instagram.

온라인게임 계정도용 탐지모델에 관한 연구 (Online Game Identity Theft Detection Model based on Hacker's Behavior Analysis)

  • 최화재;우지영;김휘강
    • 한국게임학회 논문지
    • /
    • 제11권6호
    • /
    • pp.81-93
    • /
    • 2011
  • 온라인상에서 사용자의 개인정보를 불법적으로 취득, 악용하는 계정도용 문제는 금전적인 이득을 얻을 수 있는 MMORPG(Massively Multi-player Online Role Playing Games)에서 특히 빈번하게 발생하고 있다. 많은 사람들이 게임을 이용하여 심각한 피해로 이어질 수 있기 때문에 이에 대한 대책마련이 시급함에도 불구하고, 이를 예방하거나 탐지하는 기법에 대한 연구가 많이 부족한 실정이다. 본 연구에서는 온라인게임에서 발생했던 실제 계정도용 사례 분석을 통해 계정도용의 유형을 체계적으로 정의하고, 유형별로 계정도용을 분류하는 자동화된 탐지모델을 제안한다. 실 계정도용 사례를 분석한 결과 속전속결형, 신중형, 대담무쌍형의 3가지로 구분되었으며 이 분류 체계와 탐지모델을 국내 주요 온라인게임회사 중 한 곳에 적용하였다. 본 연구에서 제시한 유형별 탐지모델은 해킹의 유무만을 판정하던 기존의 모델보다 탐지에 있어서 향상된 성능을 보였다.

The Effect of Self-Identity on Smart phone Addiction

  • Kim, Jung-ae
    • International Journal of Advanced Culture Technology
    • /
    • 제5권2호
    • /
    • pp.44-53
    • /
    • 2017
  • The purpose of this study was to investigate the relationship between self-identity and smart phone addiction among University students. This study used descriptive cross sectional study to analyze the relationship between self-identity and smart phone addiction. Study participants included 357 University students located in C province who selected through volunteered, but 10 missing data were excluded and finally 347 participants completed the study. The study data were collected using self-identity tool made by Park A chung in 1996 which was composed of Independence, Proprioception, Future conviction, Goal orientation, Initiate, and Intimacy and Smart phone addiction tool made by National information society agency. The self-identity's Cronbach's alpha was .937 and Smart phone was .670. All data analyses were performed using SPSS 18.0. Results showed that most students were not addicted(97.1%) in Smart phone using and middle level(73.2%) of self identity. Also, there was a difference in self - identity level according to gender and grade(the ratio of smart phone general users, not at all addicted, was 90.79% for males and 98.53% for females), and there was difference in Smart phone addiction level according to gender and residence type(the ratio of Smart phone general users, not at all addicted, is 99.32% for commute, 97.04% for dormitory, and 89.66% for self governing). Also there were strongly related with self-identity and Smart phone addiction(p < .001). This results reveled that self-identity affect to Smart phone addiction, therefore it is important to raise self-identity to prevent Smart phone addiction for University students.

정보활동을 통한 미래자서전 쓰기가 고등학생의 자아정체감에 미치는 영향 (The Effects of Writing Future Autobiography Using Information Activities on High School Student's Ego-identity)

  • 서행민;이병기
    • 한국도서관정보학회지
    • /
    • 제46권4호
    • /
    • pp.599-620
    • /
    • 2015
  • 본 연구는 학교도서관에서 정보활동을 통한 미래자서전 쓰기 프로그램을 전개한 후 고등학생의 자아정체감에 어떤 영향을 미치는지를 알아보는데 목적이 있다. 이 연구는 고등학교 2학년 198명을 대상으로 진행하였다. 정보활동을 통한 미래자서전 쓰기는 주 1회 50분씩 총 15차시에 걸쳐 학교도서관에서 이루어졌으며, 학생들은 자신과 자신의 삶에 대해 알아볼 수 있는 정보활동을 전개한 후, 이를 바탕으로 미래자서전을 쓰고 한 권의 책으로 만들어냈다. 사전-사후 대응표본 t-검증을 통해 미래자서전 쓰기 프로그램 적용 전후의 자아정체감 변화를 분석한 결과 유의미한 차이가 있는 것으로 나타났다.

온라인에서 주민등록번호 대체수단 기반의 본인확인서비스의 개선 방안 연구 (A Study on Improvement of Personal Identity Proofing Service(PIPS) Based on Alternative Methods of Resident Registration Number)

  • 김종배
    • 디지털산업정보학회논문지
    • /
    • 제15권2호
    • /
    • pp.29-42
    • /
    • 2019
  • As online services become more and more popular due to the development of IT, non-face-to-face transactions are continuously increasing rather than face-to-face transactions. The personal identity proofing service(PIPS) based on the alternative method of the resident registration number is used for the purpose of confirming the identity of the other party on the Internet. However, in the case of the current PIPS, the personal information of the PIPS user is excessively provided to the online service provider. As a result, privacy problems of online users, shortage of choice of information providing options, and lack of differentiation of authentication methods are becoming problems. Therefore, this paper proposes a method to improve the PIPS based on the current resident registration number alternative method and to provide a method to differentiate the provision of excessive personal information. In the proposed method, we analyze trends and current status of overseas online PIPS in order to provide a method of providing differentiation of personal information and proposes an effective improvement method applicable to domestic.

Application of Risk Information Seeking and Processing Model to the Health Preventive Behavior: How Risk Susceptibility and Political Identity affect Vaccination

  • SoYoung Lee;Seoyeon Hong;Bokyung Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제15권4호
    • /
    • pp.9-20
    • /
    • 2023
  • In the aftermath of the COVID-19 pandemic, the importance of collective efforts in promoting health preventive behaviors is accentuated, bringing sociopolitical factors into focus. To fully capture psychological drivers of health preventive behaviors in risk situations, anchored on the Model of Risk Information Seeking and Processing (RISP; Griffin, Dunwoody, and Neuwirth 1999), in retrospect of the recent COVID-19 pandemic, we explored whether and how individuals' vaccination behaviors are predicted by RISP-related variables (information insufficiency, affective responses, perceived information gathering capacity, subjective norms) and one's political identity. Findings from a survey of 705 adult participants in the U.S. showed that the effects of one's risk information insufficiency on his or her information seeking and affective response regarding the pandemic, which is also related to their risk susceptibility perceptions. More importantly, the impact of political identity on one's perceived risk susceptibility, and its association with vaccination behaviors are also identified. The findings of this study provide valuable insights for the development of effective health communication strategies for preventive health behaviors.

Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

  • Tan, Zuowen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권8호
    • /
    • pp.1982-1997
    • /
    • 2012
  • Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.

Research on Identity-based Batch Anonymous Authentication Scheme for VANET

  • Song, Cheng;Gu, Xinan;Wang, Lei;Liu, Zhizhong;Ping, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권12호
    • /
    • pp.6175-6189
    • /
    • 2019
  • To slove the security and efficiency problem of anonymous authentication in vehicular ad-hoc network (VANET), we adopt the bilinear pairing theory to propose an identity-based batch anonymous authentication scheme for VANET. The tamper-proof device in the on-board unit and the trusted authority jointly realize the anonymity of vehicle identity and the signature of messages, which further enhances the security of this scheme, as well as reduces the overhead of trusted authority. Batch authentication can improve the efficiency of anonymous authentication for VANET. Security and efficiency analyses demonstrate that this scheme not only satisfies such security properties as anonymity, non-forgeability and non-repudiation, but also has advantage in time and space complexity. Simulation results show that this scheme can achieve good performance in real-time VANET communication.

New Constructions of Identity-based Broadcast Encryption without Random Oracles

  • Zhang, Leyou;Wu, Qing;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권2호
    • /
    • pp.428-439
    • /
    • 2011
  • The main challenge in building efficient broadcast systems is to encrypt messages with short ciphertexts. In this paper, we present a new construction based on the identity. Our construction contains the desirable features, such as constant size ciphertexts and private keys, short public keys and not fixing the total number of possible users in the setup. In addition, the proposed scheme achieves the full security which is stronger than the selective-identity security. Furthermore we show that the proof of security does not rely on the random oracles. To the best our knowledge, it is the first efficient scheme that is full security and achieves constant size ciphertexts and private keys which solve the trade-off between the ciphertext size and the private key size.