• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.028 seconds

Development of Fuzzy-based Trust Measuring Framework for Blog Contents Using Social Networking Services (소셜 네트워킹 서비스를 활용한 블로그 컨텐츠의 퍼지 기반 신뢰도 측정 방법론 개발)

  • Yang, Kun-Woo
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.1
    • /
    • pp.33-44
    • /
    • 2014
  • Recently, blogs have attracted much attention as personal media. The power of blogs as a way to provide valuable resources on Internet is so tremendous because of the high speed of information dissemination and the huge influence of the circulated information on Internet users even when the information itself is not true. Especially, contents on blogs that attract a lot of public attention are sometimes reproduced or magnified in an inappropriate way. In this paper, a method to measure the trust level of contents posted on personal blogs is proposed to reduce the damage of wrong information circulated along with blog networks. Trust variables such as relationship data in SNS are used to measure the comparative trust level of blog contents. The structure of the prototype system is also designed to apply this framework to blogsphere.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

An effect of using internet health information of University students according to their internal and external health control (일부 대학생들의 내·외적 건강컨트롤에 따른 인터넷 건강정보 이용효과)

  • Kim, Seung-Dae;Kim, Myung-Gwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3069-3073
    • /
    • 2014
  • It's now time for adopting u-Health according to development of internet. It is judged that it needs to research on effect of using internet health information targeting University students who are the most sensitive of internet health information. So we analyzed effect of using internet health information according to internal and external health control materials with 300 University students. As a result, If a rate of investment to the health is high, an effect of internet health information also increases as B=.004, rate of internal health control is high, it decreases as B=-.027 and rate of external health control is high, it increases as B=.037. For a University student who has steady faith about health and can control their internal health more easily, the effect of using internet health information has decreased. And for a University student who has high inclination of external dependence about health and can control their external health more easily, the effect of using internet health information has increased. So it needs to raise credibility, accuracy and accessibility of internet health information.

A Dynamic Trust Framework for Sharing Identity Authentication (신원 인증 공유를 위한 동적 신뢰 프레임워크)

  • Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2199-2206
    • /
    • 2012
  • Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.

Integration of Fuzzy-based Trust Measuring System for Online Auction (온라인 경매를 위한 퍼지 기반 신뢰 측정 시스템의 통합)

  • Yang, Kun-Woo;Huh, Soon-Young
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.05a
    • /
    • pp.399-407
    • /
    • 2003
  • 인터넷을 이용한 거래가 활발해지면서 개인 정보 누출, 사기 피해 등 이와 관련한 문제점들도 크게 증가하고 있다. 이러한 문제를 예방하기 위한 연구와 연구 결과의 활용이 활발한 가운데 특정 거래에 참여하는 거래 당사자에 대한 신뢰도를 측정하는 방법도 거래 위험도를 줄이는 방안의 하나로 연구되고 있다. 특히, 다수의 판매자와 구매자가 동시에 수 많은 거래에 참여하게 되는 온라인 경매의 경우 거래에 참여하는 거래 상대방에 대한 신뢰도를 측정하고 이를 제공함으로써 경매와 관련한 사기 거래의 위험성을 어느 정도 줄일 수 있게 된다. 본 연구에서는 온라인 경매 시스템에서 활용할 수 있는 퍼지 기반의 신뢰 측정 시스템의 기본 구조를 설계하고 그 작동 원리를 소개하고자 한다. 이를 위해 인맥형 커뮤니티 시스템으로부터 새로운 신뢰 측정 변수들을 도입하게 되며 이러한 신뢰 변수를 이용한 신뢰도 측정 과정을 자세히 소개한다.

  • PDF

Effective Association Rule Method for Personalized Recommender System (개인화 추천시스템을 위한 효율적 연관 규칙 방법)

  • Ko, Byoung-Jin;Yu, Young-Hoon;Jo, Ceun-Sik
    • Annual Conference of KIPS
    • /
    • 2002.11c
    • /
    • pp.2133-2136
    • /
    • 2002
  • 인터넷 특성상 방대한 양의 정보와 상품 등으로 사용자들이 원하는 정보를 찾기 위해서 많은 시간을 낭비하고 있는 실정이다. 이러한 사용자의 시간 소모를 중이기 위해서 추천 시스템이 개발되었다. 현재 인터넷 상의 추천 기술 중에서 가장 많이 사용하는 기법으로는 협력적 여과(Collaborative filtering) 방법이다. 그러나, 협력적 추천 방법으로 추천 받기 위해서는 특정수 이상의 아이템에 대한 평가가 필요하며, 또한 비슷한 성향을 가지는 일부 사용자 정보에 근거하여 추천함으로써 나머지 사용자 정보를 무시하는 경향이 있다. 이러한 문제점이 발생되므로 최근에는 데이터 마이닝(Data Mining) 기법 중 연관 규칙(Association Rule)을 이용한 추천 시스템이 개발되고 있다[1,10]. 그러나, 연관 규칙 기법은 개인별 사용자의 성향을 반영하지 못하는 단점이 있다[4]. 연관 규칙은 단지 대용량 데이터 베이스에서 아이템간의 지지도(Support)와 신뢰도(Confidence)에 근거하여 규칙을 발견하는 특징을 가지고 있기 때문이다. 즉 개인성향을 무시하고 아이템간의 연관성만을 근거로 하여 아이템을 추천하기 때문이다. 본 논문에서는 효율적인 연관 규칙을 이용한 개인화 추천 시스템을 구현하기 위해서 연관 규칙과 여과 방법을 통합한 시스템을 제안한다. 본 시스템에 대하여 성능 비교 실험을 수행함으로써 제안한 방법의 타당성을 제시한다.

  • PDF

An Empirical Study of User Resistance Factors to Internet Banking (인터넷뱅킹의 사용자 저항요인에 관한 연구)

  • Park, Byung-Kwon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.5
    • /
    • pp.86-97
    • /
    • 2007
  • For continuous growth and diffusion of internet banking, it is important to investigate user resistance factors to internet banking. This study investigates the effects of individual characteristics, characteristics of internet banking and service quality factors on user resistance to internet banking. Individual characteristics include self-efficacy of computer, self-efficacy of internet banking, attitude to change, and innovative attitude. Characteristics of internet banking include relative advantage, compatibility, complexity, and perceived risk. Service quality was classified as 5 dimensions of SERVQUAL. The results of this study showed that self-efficacy of computer, self-efficacy of internet banking, compatibility, responsiveness, complexity, perceived risk, reliability and empathy had a significant effect on user resistance to internet banking.

  • PDF

The Research on Hopelessness Affecting the Internet Addiction of Teenagers (무망감이 청소년 인터넷 중독에 미치는 영향에 관한 연구)

  • Park, Sun-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.875-878
    • /
    • 2007
  • This research is to identify the effects of Hopelessness, as a single latter among intermediary factors causing depression, on the Internet addiction of teenagers. This research measured the teenager students' state of hopelessness using Hopelessness Depression Symptom Questionnaire (HDSQ), which demonstrates the extent of hopelessness depression symptom, and Beck Hopelessness Scale (BHS), which exhibits Beck's hopelessness scale, after conducting the analyses on the reliability of those questionnaires, and question factors. Correlations between the group in hopelessness state and the user group via the Internet Addiction Self-Test (K-scale) was comparatively analyzed. The study result reveals that reliability and validity of the questionnaire were high. As a result of the comparative analysis between the hopelessness state group and the Internet addicted user group through sub-factors of the questions, all the sub-factors showed statistically significant differences. In particular, the average score of the high risk Internet addicted user group was highest in both HDSQ and BHS. Consequently, these results imply that hopelessness affects the Internet addicted users.

  • PDF

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Development of Trust Management with Personal Preferences on E-Commerce (전자상거래에서 개인적 성향을 고려한 신뢰성 관리구조 개발)

  • Hong, Seong-Jun;Gu, Tae-Wan;Jung, Yeon-Jin;Lee, Sung-Ryong;Lee, Kwang-Mo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.419-424
    • /
    • 2007
  • 인터넷 사용자가 기하급수적으로 증가하고 컴퓨터 및 통신 기술이 발전하면서 전자상거래(electronic commerce)가 일반인에게 급속하게 확산되고 있으나 기존의 신뢰성 관리구조는 판매자(seller)와 구매자(buyer)의 개인적 성향을 충분히 반영하지 못한다는 문제가 있다. 하지만 전자상거래 주체들의 개인적 성향은 전자상거래에서 발생하는 트랜잭션들의 위험성을 감소시키는 매우 중요한 요소 중 하나이다. 그러므로 본 논문에서는 판매자와 구매자들의 개인적 성향에 근거한 신뢰성 관리구조를 제안한다. 제안된 구조는 기존의 신뢰성 관리구조에서 무시되었던 개인 성향 정보들을 활용하기 때문에 기존 구조에 비해 정확하고, 효율적인 신뢰성 관리를 수행할 수 있도록 한다. 또한 본 논문에서는 설문조사를 통해 개인적 성향이 반영되어 평가된 신뢰값에 의해 전자상거래 서비스들의 품질이 개선됨을 보이도록 한다.

  • PDF