• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.026 seconds

A Study of Influencing Factors in Internet Shopping of the Consumer's Purchase Intention (인터넷 쇼핑의 구매의도 영향요인)

  • Lee, Dong-Cheol;Lee, Eun-Ju;Kim, Byung-Sook;Jin, Geum-Ok
    • Management & Information Systems Review
    • /
    • v.30 no.1
    • /
    • pp.211-226
    • /
    • 2011
  • This study was intended to investigate the attributes of the Internet shopping mall and to examine the effects of each attribute on the consumer purchase intention. 279 valid responses of total 300 questionnaire were used for the analysis of this study. Both the exploratory factor analysis and reliability analysis were conducted to evaluate the conceptual validity and internal coherence of the determining variables and the use intention. The factor analysis resulted in identifying the five factors of the Internet shopping mall and on the multiple regression analysis, three of the five identified factors were found to affect significantly the purchase intention. According to the verified results interactivity(t=4.384) was found to affect positively the use intention, while privacy risk(t=-2.985) and delivery risk(t=-2.257) were found to affect negatively the purchase intention. Managerial suggestions are recommended as the results of analysis. It is urgently necessary for decreasing countermeasures delivery risk and privacy risk to enhance purchase intention of customers in internet shopping malls. Especially obtaining more information on consumers gives short-term advantages to marketers, perceived slackness in privacy will hinder purchase intention in internet shopping malls in the long run by causing distrust of consumers. Other limitations and future research directions are also mentioned.

  • PDF

Analysis of Wikipedia Citations in Peer-Reviewed Journal Articles (학술논문에서의 위키피디아 인용에 관한 연구)

  • Shim, Wonsik;Byun, Jeayeon;Kim, Minjung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.47 no.2
    • /
    • pp.247-264
    • /
    • 2013
  • Wikipedia represents a revolutionary experiment in the sense that it allows anonymous Internet users to contribute, change, and edit Encyclopedia contents used by tens of millions of people. While a very popular information source on the Internet, because of its questionable information credibility and accuracy, citing Wikipedia articles is being regarded as a risky behavior for scholars. The present study identified 282 scholarly articles from Thomson Reuters' Web of Science citation database that cite Wikipedia at least once. Out of the millions of articles indexed in Web of Science, the proportion of articles citing Wikipedia is extremely small. On the other hand, the numbers are showing a marked increase since 2011. Wikipedia citing articles are distributed in subject areas, such as library and information science, business, psychology, education, and communication more often than in other areas. The distribution of a total of 577 citations from 267 articles for which we were able to obtain full texts shows that Wikipedia is being cited mainly in studies of Wikipedia (139 citations, 24.1%) or as a ready reference source (331 citations, 57.4%). At the same time, about 15% of total citations turned out to be cases of potentially risky behaviors in which Wikipedia is being cited as a crucial basis or data source for study.

An Illegally-copied App Detecting Method by Using Odex File in Android Platform (안드로이드 플랫폼에서 odex 파일을 이용한 불법 복제 앱 탐지 방법)

  • Cho, Dueckyoun;Choi, Jaeyoung;Kim, Eunhoe;Gang, Gi-Du
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.67-75
    • /
    • 2015
  • According to the changes of the mobile environments, the usage and interest of the Android apps have been increased. But the usage of illegally-copied apps has been also increased. And the transparency and dependability of the app markets has been decreased. Therefore there are many cases for the copyright infringement of app developers. Although several methods for preventing illegally-copied apps have been studied, there may exist possible ways to bypass the methods. Since it is difficult to find out the first distributors of the illegally-copied apps, it is not easy to punish them legally. This paper proposes the method of detecting illegally-copied apps. The proposed detector can detect the illegally-copied apps using odex file, which is created when the app is installed. The detector can also find out the information of the first distributors based on forensic watermark technique. Since the illegally-copied app detector is running as a service on the system server, it is granted that the detector hides from the users. As an experiment result, the illegally-copied app detector takes on average within 0.2 seconds to detect and delete an illegally-copied app.

Private Blockchain and Biometric Authentication-based Chronic Disease Management Telemedicine System for Smart Healthcare (스마트 헬스케어를 위한 프라이빗 블록체인과 생체인증기반의 만성질환관리 원격의료시스템)

  • Young-Ae Han;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2023
  • As the number of people with chronic diseases increases due to an aging society, it is urgent to prevent and manage their diseases. Although biometric authentication methods and Telemedicine Systems have been introduced to solve these problems, it is difficult to solve the security problem of medical information and personal authentication. Since smart healthcare includes personal medical information of subjects, the security of personal information is the most important field. Therefore, in this paper, we tried to propose a Telemedicine System using a smart wearable device ECG in the form of a wristband and face personal authentication in a private blockchain environment. This system targets various medical personnel and patients with chronic diseases in all regions, and uses a private blockchain that can increase data integrity and transparency, ECG and face authentication that are difficult to forge and alter and have high personal identification to provide a system with high security and reliability. composed. Through this, it is intended to contribute to increasing the efficiency of chronic disease management by focusing on disease prevention and health management for patients with chronic diseases at home.

Analysis of Users' Sentiments and Needs for ChatGPT through Social Media on Reddit (Reddit 소셜미디어를 활용한 ChatGPT에 대한 사용자의 감정 및 요구 분석)

  • Hye-In Na;Byeong-Hee Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.2
    • /
    • pp.79-92
    • /
    • 2024
  • ChatGPT, as a representative chatbot leveraging generative artificial intelligence technology, is used valuable not only in scientific and technological domains but also across diverse sectors such as society, economy, industry, and culture. This study conducts an explorative analysis of user sentiments and needs for ChatGPT by examining global social media discourse on Reddit. We collected 10,796 comments on Reddit from December 2022 to August 2023 and then employed keyword analysis, sentiment analysis, and need-mining-based topic modeling to derive insights. The analysis reveals several key findings. The most frequently mentioned term in ChatGPT-related comments is "time," indicative of users' emphasis on prompt responses, time efficiency, and enhanced productivity. Users express sentiments of trust and anticipation in ChatGPT, yet simultaneously articulate concerns and frustrations regarding its societal impact, including fears and anger. In addition, the topic modeling analysis identifies 14 topics, shedding light on potential user needs. Notably, users exhibit a keen interest in the educational applications of ChatGPT and its societal implications. Moreover, our investigation uncovers various user-driven topics related to ChatGPT, encompassing language models, jobs, information retrieval, healthcare applications, services, gaming, regulations, energy, and ethical concerns. In conclusion, this analysis provides insights into user perspectives, emphasizing the significance of understanding and addressing user needs. The identified application directions offer valuable guidance for enhancing existing products and services or planning the development of new service platforms.

Implementation of an Extended Service Data Aggregator Service Component-based on OGSA (서비스 데이터 수집기를 확장한 OGSA 기반 서비스 컴포넌트 구현)

  • Cho Kwang-Moon;Kang Kyung-Woo;Kang Yun-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.4
    • /
    • pp.99-106
    • /
    • 2004
  • This paper describes main characteristics of Grid Services based on OGSA and a service component for aggregating service data element. In order to build a Grid Service for SOA, it needs to consider a systematic approach from the high-level software architecture of a system that describes the main system components and their interactions. The purpose of this paper is to design and implement an extended service data aggregator service. To provide reliable aggregating service for service data elements, which is running under wide area environment like Internet, the aggregator service is operated asynchronously by notification mechanism.

  • PDF

The Study of Power Quality measuring using Network (네트워크를 이용한 전력품질 계측에 관한 연구)

  • Seo, Yong-Won;Kim, Ki-Chul;Kim, Tae-Eung;Kim, Jea-Eon
    • Proceedings of the KIEE Conference
    • /
    • 2006.07d
    • /
    • pp.1793-1794
    • /
    • 2006
  • 네트워크 전력계측 장치는 전국의 수용가 측에 설치되며 전력품질을 감시할 수 있는 단말기와 표준화된 이더넷망(유무선)을 사용한 네트워크 환경과 전국의 전력품질 데이터를 수집할 수 있는 서버로 크게 구성된다. 본 논문에서는 128 샘플링으로 계측되는 전력품질계측 단말기를 구현하고 전력품질 분석 알고리즘을 고안하였으며 이더넷망을 이용하여 전력품질 데이터를 수집하고 수집데이터를 분석하여 전력 품질에 대한 분석을 하였다. 뿐만아니라 전력품질에 영향을 주는 고조파신호들과 OVER/UNDER 전압과 전류 및 주파수, SAG, SWELL, INTERRUPT등을 인식하여 해당 데이터를 메모리에 저장하는 일련의 알고리즘을 연구하였으며 이렇게 저장된 정보를 이더넷망에서 무결성과 신뢰성이 있게 고속으로 전송받을 수 있는 통신 프로토콜에 관한 연구가 수행하였다. 뿐만 아니라 응용프로그램에서 소프트에웨어적인 필터링 기법과 분석알고리즘을 연구하여 이상신호에 대한 원인 판단이 가능하도록 연구한다. 본 논문은 네트워크(인터넷/이더넷)와 전력품질계측 관련 방법론과 SERVER개념을 도입한 유비쿼터스에서 센서네트워크 기법을 전력산업에 융합하려는 연구에 그 요점이 있다.

  • PDF

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF

Recent Trend Analysis of Certificate Revocation Mechanism (인증서 폐기 메커니즘의 최근 동향 분석)

  • 황원섭;김자영;정수민;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.77-82
    • /
    • 2004
  • The notion of a certificate was introduced by Kohnfelder in his 1978 MIT bachelor's thesis. The idea, now common, was that a certificate is a digitally signed statement binding the key-holder's name to a public key. With the increasing acceptance of digital certificate, there has been a gaining impetus for methods to nullify the compromised digital certificates and enable the end user to receive this information before be trusts a revoked certificate. The problem of certificate revocation is getting more and more crucial with the development of wide spread PKIs. In this paper, we investigate recent trend of certificate revocation mechanism.

  • PDF

The Antecedents of Trust Building and its Effects on Purchase Intention for Internet Used-car Transaction (품질위험 지각 정도에 따른 인터넷 중고차 사이트의 신뢰형성 요인과 구매의도에 미치는 영향에 관한 연구)

  • Lee, Ho-Geun;Lee, Seung-Chang;Seong, Dae-Won
    • Asia pacific journal of information systems
    • /
    • v.13 no.2
    • /
    • pp.119-143
    • /
    • 2003
  • Trust has been identified as a key component in many e-Commerce studies. The purpose of this study is to find out which factors play a major role in building trust and how the built-up trust affect consumer's purchase intention in Internet used-car transactions. Based on the information asymmetry, TAM(Technology Acceptance Model), and the trust theory, our research model includes factors such as a buyer's propensity-to-trust, institutional characteristics(inspection and warranty policy), word-of-mouth referral, perceived size, and perceived benefits as independent variables. The model also includes trust as a mediate variable, intention to purchase as a dependent variable and perceived quality risk as a moderate variable. The research model is tested by analyzing 787 sample data gathered from Internet used-car transaction sites. The result shows that the trust has significant effects on the online purchase intention, and institutional characteristics has been identified as the most significant factor for the trust of Internet used-car sites. The independent factors influencing trust vary depending on the level of perceived quality risk. For users who perceive the quality risk low, the perceived benefits explain a little portion of the purchase intention. However, those who perceive quality risk high would purchase used-cars only when they have trust on the Internet sites, indicating that trust play an important role as a mediate variable. This study suggests that enhancing the trust in Internet used-car sites is important to increase online transactions.