• Title/Summary/Keyword: identity problem

Search Result 444, Processing Time 0.024 seconds

Transnational Identity and Regional Integration

  • Lamasheva, Yulia
    • Asia-Pacific Journal of Business
    • /
    • v.1 no.1
    • /
    • pp.73-95
    • /
    • 2010
  • European integration is characterized by the development of a transnational European identity, which is considered an integral part of the process. Northeast Asia has no similar projects to address the common identity issue, although cooperation is highly valued there as well. Identity and cooperation both require interdisciplinary approaches combining social psychology, international relations theory and international economics. This article considers the problems of applying existing studies on cooperation and identity as well as the European experience (with the Baltic Sea example) to the case of Northeast Asia. Transnational identities promote cooperation beyond the limits of rationalistic game theory, if countries of the region can define their identities and interests, commit to common goals, create shared discourses and reach a balance between nationalism and internationalism. In view of proposed negotiations on the free trade area between China, Korea and Japan and ongoing discussions about a possibility of introducing a common currency (ACU) it can be crucial to consider the importance of identity building as early as possible, before regional integration meets a stumbling block of egoistic rationality that is a problem in any model of cooperation.

  • PDF

IDENTITIES PRESERVED UNDER EPIS OF PERMUTATIVE POSEMIGROUPS

  • Shah, Aftab Hussain;Bano, Sakeena;Ahanger, Shabir Ahmad
    • Korean Journal of Mathematics
    • /
    • v.30 no.2
    • /
    • pp.283-296
    • /
    • 2022
  • In 1985, Khan gave some sufficient conditions on semigroup identities to be preserved under epis of semigroups in conjunction with the general semigroup permutation identity. But determination of all identities which are preserved under epis in conjunction with the general permutation identity is an open problem in the category of all semigroups and hence, in the category of all posemigroups. In this paper, we first find some sufficient conditions on an identity to be preserved under epis of posemigroups in conjunction with any nontrivial general permutation identity. We also find some sufficient conditions on posemigroup identities to be preserved under epis of posemigroups in conjunction with the posemigroup permutation identity, not a general permutation identity.

Accountable Authority Revocable Identity-Based Encryption (사용자 폐기를 지원하는 책임 기관 ID 기반 암호)

  • Choi, Suri;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1281-1293
    • /
    • 2017
  • In 2001, Boneh and Franklin proposed Identity-Based Encryption(IBE) that does not require a certificate like Public Key Infrastructure(PKI) by using user's Identity as a public key. However, IBE has a key escrow problem because the Private Key Generator(PKG), who is a trusted authority, generates a secret key of every user. Also, it does not support efficient revocation when the user's secret key is exposed or the system needs to revoke the user. Therefore, in order to use IBE as PKI that currently used, it is necessary to solve the key escrow problem and the revocation problem. In this paper, to solve those two problems, we suggest Accountable Authority Revocable IBE(A-RIBE) based on Accountable Authority IBE that mitigates the key escrow problem and Revocable IBE that solves the revocation problem. Also, we define the security model suitable foe A-RIBE, and analyze the principle of designing A-RIBE according to based A-IBE and RIBE and their advantage and disadvantage.

A Study on the Identity of News in the Web (인터넷 신문 사이트의 Web Identity에 관한 연구)

  • 김윤경
    • Archives of design research
    • /
    • v.14 no.3
    • /
    • pp.165-176
    • /
    • 2001
  • A corporate identity is an expression of a company's personality and philosophy. From Trademarks to Letterheads, most of companies are eager to show up themselves to the audience. Nowadays the Web has quid(Iy emerged as the most influential communications media for the public. In aspects of this situation, traditional corporate identity program has to change to accord with the new media. Especially print media news has broaden their line to the Web, but most of them are lacking in the express their Identity, Therefore, it is an urgent problem to find their Identity on the Web site. In this paper, I am going to analyze the new aspects of identity in the news site on the web.

  • PDF

Sex Role Identity and Health Behavior among University Student (대학생의 성역할정체감과 건강행위)

  • Park, Eun-Ok;Park, Young-Sook
    • Women's Health Nursing
    • /
    • v.5 no.3
    • /
    • pp.362-378
    • /
    • 1999
  • This study is to investigate sex role identity and health behavior among university students in Seoul, during the late of 1999. The instruments for data obtainment were KSRI of Kim(1994), and Health Style : A Self-Test provided by ODPHP National Health Information Center. These instrument were reliable, showing Cronbach $\alpha$ .98 and .77. Frequency, t-test, $x^2$-test, stepwise regression were conducted for data analysis, using SAS 6.12 program. The major findings were as follows : 1. For female student. Androgeny(34.0%)type was most common and subjects of feminity type were 28.7%. In contrast, Masculinity type(41.8%) was most prevalent. and undifferentiated type was 30.1% among male students. There were significant difference between male and female student in the type of sex role identity. 2. 89.6% of all subjects were included in risk group for exercise and physical activity, 86.4% for diet habit, 43.2% for alcohol drinking and drug use, 35.6% for stress control, 32.8% for safety behavior, 24.8% for smoking. The big health risk behavior problem of male students were smoking, drinking, diet habit, and exercise. The important health risk behavior problem were diet habit and exercise. There were significant difference in smoking, drinking, exercise between sex. 3. Analysis of the distribution by sex role identity type and health behavior revealed that subjects who were undifferentiated typed group had high risk behavior in stress control, safety, exercise, drinking. Smoking and drinking were more problematic for masculinity typed group had high risk behavior in diet and exercise. The data showed that androginy typed group had more healthy behavior, compared with other sex role identity typed group for all of health behavior. Further research is need to understand the role of sex role identity in health behavior, the variables associated with them. And sex role identity has to be considered in research and practice about health promotion.

  • PDF

Effects of Nursing Education using a TBL on Self efficacy and Self Identity among Nursing students

  • Kim, Jung-ae
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.26-43
    • /
    • 2017
  • This study investigated the effects of TBL nursing education(for the care of congestive heart failure patients) on self identity and self efficacy among nursing students. A one-group, pre-post design was utilized with 28 nursing students as the participants. The scenario of TBL nursing education was created based on PBL, and consisted of four states(1) Present a problem, (2) Problem Follow-Up Steps,(3) Present the results including presentation, and(4) Problem Conclusion and after resolution. And then In-depth interviews were conducted with volunteers on program experiences. The data were analyzed using descriptive statistics, Pearson's correlation coefficients and paired t-tests and Giorgi phenomenology analysis method was performed. The TBL program was effective in self - efficacy and self - identity (p<0.01) increased significantly after the education intervention and The meaning of the TBL experience is four (meaning that the learners embarrassed TBL, aggressive learning attitude change, effective collaboration for problem solving in a free learning environment, university classes imagined in high school), and 67 sub-components appeared as an element. The TBL program is an effective teaching method for nursing education and it can be used as basic data for the development of nursing education based on this research.

Properties of integral operators in complex variable boundary integral equation in plane elasticity

  • Chen, Y.Z.;Wang, Z.X.
    • Structural Engineering and Mechanics
    • /
    • v.45 no.4
    • /
    • pp.495-519
    • /
    • 2013
  • This paper investigates properties of integral operators in complex variable boundary integral equation in plane elasticity, which is derived from the Somigliana identity in the complex variable form. The generalized Sokhotski-Plemelj's formulae are used to obtain the BIE in complex variable. The properties of some integral operators in the interior problem are studied in detail. The Neumann and Dirichlet problems are analyzed. The prior condition for solution is studied. The solvability of the formulated problems is addressed. Similar analysis is carried out for the exterior problem. It is found that the properties of some integral operators in the exterior boundary value problem (BVP) are quite different from their counterparts in the interior BVP.

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Diaspora and National policy - Focusing on Russian Diaspora and chinese Diaspora (디아스포라와 국가정책 - 러시안 디아스포라와 차이니즈 디아스포라를 중심으로)

  • Chun, Byung Kuk
    • Cross-Cultural Studies
    • /
    • v.26
    • /
    • pp.123-144
    • /
    • 2012
  • In the modern society in which globalization and localization proceed simultaneously, diversified and rapid migration of diaspora makes a new from of boundary off the frame of the state and the nation. This new border accompanies cultural change and racial mixture; retains ethnic conflict, the gap between rich and poor, alienation and discrimination, as well as power conflict; and extends its influence. Nowadays, the countries all over the world including Korea face problem of Diaspora in numerous forms. And each country takes an approach to the problem of the diaspora in the aspects of their society, culture and political technology. This implies that most countries, without understanding the new form of border which is alive and dynamic, define and conceptualize the diaspora in the frame of one state and one nation to carry forward the policies accordingly, resulting in inequal, incomplete and awkward homogenization. This study aimed to explore the identity of the diaspora, the core for the problem solving. Of course, studies about the identity of the diaspora have been continued until today and many great outcomes have been achieved. Nevertheless, this study aimed to explore the identity of the diaspora and the national policies which have a close interrelationship with it. It is because the study ultimately aimed to highlight the interrelationship between the destination countries, Russia and China, and the diaspora, through the definition and the classification of Russian diaspora and Chinese diaspora and the analysis of the national policies about that. However, the intention was not to distinguish superiority through the comparison of the polices about the diaspora between two countries, but to focus on the diversity of the identity of the diaspora through defining each different diaspora and paralleling the policies. Second, the reason for looking into the diaspora policies of these two countries is because it is judged the changes in the diaspora policies of each country is one of the active factors for the changes in the identify of the diaspora of each country and it is the basic research for the study on the identity of the diaspora. New migration of diaspora changes the identity of the state, and the state makes the policies and enforce the policies, resulting in the influence on the diaspora. This interaction acts as the growth factor for the new boundary. The causes of Russian diaspora and Chinese diaspora show apparent 'differences'. In parallel with this, the policies about the diaspora in Russia and China arouse 'differences' to the diaspora. The variation of the identity of the diaspora made by these differences will suggest other viewpoints on the diaspora, and these viewpoints will become the foundation for solving the problem of the diaspora in the present times.

Efficient Signature Scheme with Batch Verifications in Identity-Based Framework

  • Gopal, P.V.S.S.N.;Vasudeva Reddy, P.;Gowri, T.
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.397-404
    • /
    • 2016
  • In group-oriented applications, it is often required to verify a group of signatures/messages. The individual verification of signed messages in such applications comes at a high cost in terms of computations and time. To improve computational efficiency and to speed up the verification process, a batch verification technique is a good alternative to individual verification. Such a technique is useful in many real-world applications, such as mail servers, e-commerce, banking transactions, and so on. In this work, we propose a new, efficient identity-based signature (IDS) scheme supporting batch verifications. We prove that the proposed IDS scheme and its various types of batch verifications is tightly related to the Computational Diffie.Hellman problem under a random oracle paradigm. We compare the efficiency of the proposed scheme with related schemes that support batch verifications.