• Title/Summary/Keyword: identity management

Search Result 941, Processing Time 0.029 seconds

The effect of self-identity on body shape management

  • Kim, Jung-ae
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.17-25
    • /
    • 2017
  • The purpose of this study was to investigate the effects of self-identity on body shape management for college students. This study used descriptive research to analyze the effects of self-identity, which has contained factors of Subjectivity, Self-acceptance, Future Confidence, Goal Orientation, Scrupulous. The subjects were 404 college students located in C province who were voluntarily agreed. Multiple regression analysis was conducted to verify the effects on self - identity and body shape management. As a result, self - acceptance of self - identity' subcomponents had no effect on body shape management, but future confirmation, goal orientation, Scrupulous, intimacy affects body shape management(P < 0.001). Based on these results, in order to manage the body shape of college students, it is considered effective to present the visible goals and apply the programs that students can do themselves. In addition, it can be seen that it is effective to start body shape management during college group life to enhance intimacy.

Privacy Authorization for Internet Identity Management System (인터넷 Identity 관리 시스템을 위한 프라이버시 인가)

  • Roh Jong-Hyuk;Jin Seung-Hun;Lee Kyoon-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.648-659
    • /
    • 2005
  • One's identity on the Internet has been disclosed and abused without his consent. Personal information must be protected by appropriate security safeguard. An Individual should have the right to know whether his personal details have been collected and stored. This paper proposes various conceptual models for designing privacy enabling service architecture in the Internet identity management system. For the restriction of access to personal information, we introduce the owner's policy and the management policy The owner's policy should provide the user with enough information to manage easily and securely his data. To control precisely and effectively all personal information in the Identity provider, we propose the privacy management policy and the privacy authorization model.

A Hybrid Blockchain-Based Approach for Secure and Efficient IoT Identity Management

  • Abdulaleem Ali Almazroi;Nouf Atiahallah Alghanmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.11-25
    • /
    • 2024
  • The proliferation of IoT devices has presented an unprecedented challenge in managing device identities securely and efficiently. In this paper, we introduce an innovative Hybrid Blockchain-Based Approach for IoT Identity Management that prioritizes both security and efficiency. Our hybrid solution, strategically combines the advantages of direct and indirect connections, yielding exceptional performance. This approach delivers reduced latency, optimized network utilization, and energy efficiency by leveraging local cluster interactions for routine tasks while resorting to indirect blockchain connections for critical processes. This paper presents a comprehensive solution to the complex challenges associated with IoT identity management. Our Hybrid Blockchain-Based Approach sets a new benchmark for secure and efficient identity management within IoT ecosystems, arising from the synergy between direct and indirect connections. This serves as a foundational framework for future endeavors, including optimization strategies, scalability enhancements, and the integration of advanced encryption methodologies. In conclusion, this paper underscores the importance of tailored strategies in shaping the future of IoT identity management through innovative blockchain integration.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

Identity of College in Korea (전문대학의 정체성 연구)

  • Joo Kwang-Shin
    • Management & Information Systems Review
    • /
    • v.13
    • /
    • pp.189-219
    • /
    • 2003
  • Colleges are faced with crises. The nature of colleges lies in those of college's identity. The purpose of this research is to clarify college's identity and then to establish college's identity. An organizational identity reflects its central and distinguishing attributes, including core values, mission. The role & function, values and mission can be used to clarify college's identity. Colleges need to establish their own identity as follows. 1. Solidifing core forces 2. Making mission statement 3. Creating vision 4. Creating cultic culture 5. Appointing CEO who was grown up inner

  • PDF

A Decentralized Face Mask Distribution System Based on the Decentralized Identity Management (블록체인 분산신원증명에 기반한 탈중앙화된 마스크 중복구매 확인 시스템)

  • Noh, Siwan;Jang, Seolah;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • Identity authentication is an important technology that has long been used in society to identify individuals and provide appropriate services. With the development of the Internet infrastructure, many areas have expanded into online areas, and identity authentication technologies have also expanded online. However, there is still a limit to identity authentication technology that relies entirely on trusted third parties like the government. A centralized identity management system makes the identification process between agencies with different identity management systems very complex, resulting in a waste of money and time for users. In particular, the limits of the centralized identity management system were clearly revealed in the face mask shortage in the 2020 COVID-19 crisis. A Decentralized Identity (DID) is a way for users to manage their identity on their own, and recently, a number of DID platform based on blockchain technology have been proposed. In this paper, we analyze the limitations of the existing centralized identity management system and propose a DID system that can be utilized in future national emergency situations such as COVID-19.

Social Face Sensitivity and Appearance Management Behaviors according to Sex Role Identity (성역할정체감에 따른 체면민감성과 외모관리행동)

  • Park, Eunhee
    • Journal of Fashion Business
    • /
    • v.16 no.5
    • /
    • pp.164-177
    • /
    • 2012
  • The purpose of this study was to classify sex role identity into groups and analyze the difference of social face sensitivity and appearance management behaviors by sex role identity. Questionnaires were administered to 306 people in their twenties and thirties living in Daegu Metropolitan City and Kyoungbuk province. The data was analyzed by using frequency, factor analysis, credibility, ${\chi}^2$-test, ANOVA, Duncan-test, and t-test. The findings were as follows. Sex role identity were classified into four groups (androgyny, masculineness, feminineness, and undifferentiation). Men in androgyny group showed the highest rate of 41.3% followed by undifferentiation(24.7%), masculineness(21.3%), and feminineness(12.7%). Women in undifferentiation group showed the highest rate of 35.9% followed by feminineness(24.4%), androgyny(23.7%), and masculineness(16.0%). Social face sensitivity were composed of four factors (consciousness of being embarrassed, social formality, other consciousness, and prestige). Appearance management behaviors were composed of six factors (skin management, fashion image management, plastic surgery management, weight management, hair management, and health management). According to the result of a significant difference between social face sensitivity and appearance management behaviors by sex role identity, male showed significant difference between the sub-variables of social face sensitivity factors (consciousness of being embarrassed, social formality, and other consciousness). Both of the male and female showed a significance of difference in consciousness of being embarrassed, and social formality. Male showed significant difference between the sub-variables of appearance management behaviors factors (fashion image management, weight management, hair management, and health management). Both of the male and female showed a significance of difference in fashion image management. Gender of twenties and thirties showed distinction between the sub-variables of social face sensitivity factors (consciousness of being embarrassed, and prestige) and appearance management behaviors (skin management, fashion image management, plastic surgery management, weight management, and hair management).

A Study on Sociocultural Attitudes and Appearance Management Behavior in accordance with Gender Role Identity

  • Park, Eun-Hee
    • Journal of Fashion Business
    • /
    • v.16 no.3
    • /
    • pp.107-124
    • /
    • 2012
  • The purpose of this study was to classify types in sense of gender role identity and to figure out the difference among sociocultural attitude, benefits of clothing pursuit, and appearance management behaviors by sense of gender role identity types. Questionnaires were administered to 455 people in their twenties and thirties living in Daegu and Kyoungbuk area. Data were analyzed by using frequency, factor analysis, credibility, $X^2$-test, ANOVA, Duncan-test, and t-test. The findings are as follows. First, Men of androgyny group showed the highest rate of 38.5% followed by undifferentiation(22.9%), masculineness(21.0%), and feminineness(17.6%). Women of undifferentiation group showed the highest rate of 33.2% followed by feminineness (25.2%), androgyny(22.0%), and masculineness(19.6%). Second, factors of sociocultural attitude were internalization and recognition. Benefits of clothing pursuit consists of the factors such as consciousness of others, personality, and vogue pursuit. Factors of appearance management behaviors were dressing, skin management, plastic surgery management, weight management, health management, and hair management. Third, the result from the difference between sociocultural attitude and benefits of clothing pursuit by sense of gender role identity types, men of androgyny and feminineness showed highest in recognition while women of androgyny showed highest in internalization and recognition. The result of the difference in benefits of clothing pursuit by sense of gender role identity shows that both men and women of androgyny group have high tendency for being conscious of others, personality pursuit, and vogue pursuit while men of undifferentiation and masculineness have low interest in dressing in relationship with others. Fourth, the examination of the difference in appearance management behavior by sense of gender role identity types found men of androgyny group managed dressing, skin, weight, health and hair most while women dress and health most. Men of undifferentiation group managed dressing and weight least, while men of masculineness health, and men of feminineness hair least.

The Asymmetric Effects of Identity Salience on Judgement: The Role of Valence and Attribute Congruence

  • DaHee Han;Claire Heeryung Kim
    • Asia Marketing Journal
    • /
    • v.25 no.2
    • /
    • pp.84-98
    • /
    • 2023
  • A salient identity influences individuals' judgment on products. The current research investigates why identity salience sometimes produces asymmetric effects on an individual's judgment such that a salient identity often influences judgment on identity-congruent products only or identity-incongruent products only. Across two experiments, this research proposes and shows that the valence of identity-incongruent and identity-congruent attributes determines the direction of the asymmetric identity salience effects. Specifically, when an attribute of an identity-incongruent product is positively- (negatively-) valenced, identity salience influences judgment through a decreased (increased) preference for the identity-incongruent (identity-congruent) product.

Analysis of Internet Identity Management 2.0 and Perspective of 3.0 (인터넷 신원 관리 2.0에 대한 분석과 3.0에 대한 전망)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1501-1509
    • /
    • 2011
  • Current identity management 1.0 model, which is service provider-centric and isolated, has several problems such as low usability, high cost structure, difficulty in privacy protection, and lack of trust infrastructure. Though various SSO-based identity management 2.0 models including Passport/Live ID, Liberty Alliance/SAML, CardSpace, and OpenID have been recently developed in order to overcome those problems, they are not widely accepted in real Internet environment so as to replace the existing identity management 1.0 model. This paper firstly analyzes the widely-known identity 2.0 models in a comparative way, and then presents a perspective on the development direction of identity management 3.0 model for future Internet.