• Title/Summary/Keyword: Trust Cluster

검색결과 70건 처리시간 0.024초

인터넷쇼핑 및 TV홈쇼핑 위험지각에 따른 의복쇼핑성향, 구매의도, 구매행동 (The internet and TV home-shopping perceived risk segments: Shopping orientations, purchase intention, and purchase behavior)

  • 황진숙;정정현
    • 한국의류학회지
    • /
    • 제29권5호
    • /
    • pp.637-648
    • /
    • 2005
  • The purpose of this study was to investigate the differences among internet and TV home-shopping perceived risk segments in regard to clothing shopping orientations and purchase intention. The subjects used for the study were 290 female consumers aged from 20 to 40 living in Seoul. The study used factor analysis, cluster analysis, ANOVA, Duncan test, and $\chi^2-test$. The results showed that the Internet and TV home-shopping perceived risks consisted of 9 factors: Products uncertainty risk, Internet shopping mall trust risk, account-related risk, delivery risk, social risk, size risk, exchange/return risk, TV watching-related risk, and price risk. The cluster analysis showed that there were five groups segmented: Size risk/TV watching risk group, Social risk/Internet trust risk group, Return risk/TV watching low-risk group, Delivery risk/product trust group, and Product risk group. The clothing shopping orientations were classified by 5 factors: Planned shopping, pleasure shopping, sales/fashion oriented shopping, time saving shopping, and credit card preference/in-store oriented shopping. The results showed that the five segmented perceived risk groups differed in regard to clothing shopping orientations, purchase intention, and demographics. Further group differences and implications of the results were discussed.

조직간 관계 유형별 정보교류 행태와 적합한 전자상거래 전략 (Forms of Inter-organizational Relationships, Patterns of Inter-organizational Information Flow, and Relevant E-commerce Strategies)

  • 최종민
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제24권2호
    • /
    • pp.97-116
    • /
    • 2015
  • Purpose This study suggested the four forms of inter-organizational relationships(IORs): partnerships, inter-dependence relationship, trust relationship, and market relationship. The purposes of this study include the demonstration of four forms of IORs and the investigation of the relationships among forms of IORs, inter-organizational information flow(IOIF), kinds of e-commerce strategies, and the supply-chain performance of a firm. Design/methodology/approach The empirical data were collected through post-survey. 92 survey data were collected. With a cluster analysis, we confirmed four types of IORs, and the relationships among critical variables. Findings The results of cluster analysis showed that according to the types of IORs, the frequency and quality of IOIF are different. Appropriate kinds of e-commerce strategies were examined under the each types of IORs, which cause specific patterns of IOIF. It was found that the adoption of e-procurement strategy can improve the supply-chain performance of a firm in trust relationship. It was also observed that under partnerships, the use of e-partnerships strategy can contribute to the improvement of supply-chain performance.

무선 센서네트워크를 위한 신뢰성 있는 2-모드 인증 프레임워크 (A Reliable 2-mode Authentication Framework for Wireless Sensor Network)

  • 후엔뉴엔;허의남
    • 인터넷정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.51-60
    • /
    • 2009
  • 본 논문은 다양한 공격들(헬로우 플러딩공격, 위치배치공격, 웜홀 공격, 싱크홀 공격, 중간포획공격)로부터 안전한 방어를 보장해야 하는 무선센서네트워크상에서 확률적 키 사전분배를 위한 신뢰성있는 2-모드 인증 프레임워크를 제안한다. 신뢰하는 이웃 노드의 ID를 저장하는 본 기법은 클러스터 헤드에서의 의존성을 감소시키며, 그 결과로 인증처리를 위한 단대단 전송을 제공할 뿐 아니라 소모되는 전력 에너지도 절약한다.

  • PDF

Dynamic Cloud Resource Reservation Model Based on Trust

  • Qiang, Jiao-Hong;Ning, Ding-Wan;Feng, Tian-Jun;Ping, Li-Wei
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.377-395
    • /
    • 2018
  • Aiming at the problem of service reliability in resource reservation in cloud computing environments, a model of dynamic cloud resource reservation based on trust is proposed. A domain-specific cloud management architecture is designed in which resources are divided into different management domains according to the types of service for easier management. A dynamic resource reservation mechanism (DRRM) is used to test users' reservation requests and reserve resources for users. According to user preference, several resources are chosen to be candidate resources by fuzzy cluster analysis. The fuzzy evaluation method and a two-way trust evaluation mechanism are adopted to improve the availability and credibility of the model. An analysis and simulation experiments show that this model can increase the flexibility of resource reservation and improve user satisfaction.

인터넷 오픈마켓에서의 소비자 불만유형에 따른 공정성지각 효과의 비교 (The Effects of Perceived Justice According to Type of Consumer Complaints in the Internet Open Market)

  • 임정은;이진화
    • 한국의류학회지
    • /
    • 제34권4호
    • /
    • pp.563-574
    • /
    • 2010
  • This study focused on the consumer post-complaint behavior in the Internet open market due to the rapid growth of Internet fashion markets and increased consumer dissatisfaction that has increased post complaint behavior. This study identifies the effect of perceived justice on consumer trust and repurchase intention, it then compares the effects of perceived justice on consumer trust and repurchase intention among the different types of dissatisfied groups. The respondents were 369 consumers who experienced dissatisfaction in the Internet open market. The data were analyzed by factor analysis, path analysis, ANOVA, cluster analysis using SPSS win 12.0 and Amos 7.0. In the research model, three components of perceived justice: distributive justice, procedural justice, and interactional justice have significant effects on trust. Trust has a positive effect on repurchase intention. Dissatisfied consumers were clustered into three types of those dissatisfied with 1) shopping mall/shipping, 2) service, and 3) products. The consumer groups classified by the types of dissatisfaction showed different effects of perceived justice on trust and repurchase intention in the Internet open market.

대규모 복잡 정보에서 신뢰 클러스터를 이용한 추천 정확도 향상기법 설계 (Design a Method Enhancing Recommendation Accuracy Using Trust Cluster from Large and Complex Information)

  • 노기섭;오하영;이재훈
    • 한국정보통신학회논문지
    • /
    • 제22권1호
    • /
    • pp.17-25
    • /
    • 2018
  • 최근 ICT기술의 발전과 스마트 기기의 급격한 보급으로 엄청난 양의 정보가 생성되고 있다. 추천 시스템은 과도한 정보제공(information overload)으로부터 정보 수용자의 적절한 판단을 도와주고, 정보 제공자에게는 기업의 이윤과 업체홍보 효과를 증대 시킬 수 있는 해결책으로 등장하였다. 추천 시스템은 다양한 접근법으로 구현이 가능하지만, 소셜 네트워크 정보로 성능을 향상시킬 수 있는 방법으로 제시되었다. 그러나 추천 시스템 내의 사용자간에 형성되는 신뢰 클러스터의 정보를 활용하는 방안은 연구되지 못하였다. 본 논문에서는 온라인 리뷰에서 생성되는 클러스터에서 클러스터 내부 객체 간 영향성과 트러스터-트러스티 간 정보를 이용하여 추천 시스템의 성능을 향상시키는 방식을 제안하였다. 제안하는 방식을 구현하고 실제 데이터를 활용하여 실험한 결과 기존의 방식들보다 예측 정확도가 향상됨을 확인하였다.

클러스터 기반에서의 인증을 통한 안전한 키 관리 기법 (Secure Key Predistribution Scheme using Authentication in Cluster-based Routing Method)

  • 김진수;최성용;정경용;류중경;임기욱;이정현
    • 한국콘텐츠학회논문지
    • /
    • 제9권9호
    • /
    • pp.105-113
    • /
    • 2009
  • 클러스터 기반의 라우팅 기법에서의 안전한 데이터 통신을 위해서는 기존의 키 관리 방식은 적합하지 않다. 왜냐하면 클러스터 기반에서는 매 라운드 마다 클러스터 헤드가 변경되기 때문에, 안전한 통신을 위해 각 멤버 노드들과 인증이나 공유키 설정 단계를 거쳐야 한다. 또한 기존의 키 관리 메커니즘에서는 대부분 센서 네트워크 안의 모든 노드에 대해 이동성을 부여하지 않았기 때문에, 노드의 이동성을 고려하게 되면 안전한 통신을 위한 커다란 오버 헤드가 발생한다. 따라서 본 논문에서는 이동성과 새로운 노드의 삽입이 빈번한 경우에도 안전하고 효율적인 클러스터 기반에 적합한 키 관리 메커니즘을 제안한다.

MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구 (A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

사이버쇼핑 이용자의 소비자특성에 따른 가상점포 평가기준 (Evaluative Criteria of Cyber Store based on Consumer Character of Cyber Stove Shoppers)

  • 박재옥;안민영
    • 한국의류학회지
    • /
    • 제27권3_4호
    • /
    • pp.441-451
    • /
    • 2003
  • The purpose of this study was to find out evaluative criteria of cyber store toward shopping orientation, purchasing experience and demographic factors of consumers to visit cyber store. This study surveyed consumers who have an experience of using cyber store and judgment sampling was used. The respondents were 240 men and women living in the metropolitan area of Seoul and Gyeonggi province. Research method was measured by clothing shopping orientation (utilitarian and hedonic factors), cyber store evaluation criteria (convenience, quality & trust and product character factors), purchasing experience(existent and nonexistent) and demographic factors. For data analysis, descriptive statistics, factor analysis, cluster analysis, ANOVA, t-test, Duncan test, and reliability analysis were conducted. The results were as follows: 1. Evaluative criteria of cyber store were considered importantly in order of possibility of exchange and refund, stability of personal information security, substance of quality degree of product and service and store. 2. Among shopping orientation groups, there were significant differences in all evaluative criteria of cyber store: convenience, quality & trust and product character of store. 3. Among groups toward existence and nonexistence in a purchasing experience, there were significant differences in convenience and quality & trust of store. 4. Among Demographic factors(gender, job, education and income) there were significant differences in convenience and quality & trust of store.

A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud

  • Prasad, Aluri V.H. Sai;Rajkumar, Ganapavarapu V.S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2060-2073
    • /
    • 2022
  • Cloud Computing permits users to access vast amounts of services of computing power in a virtualized environment. Providing secure services is essential. There are several problems to real-world optimization that are dynamic which means they tend to change over time. For these types of issues, the goal is not always to identify one optimum but to keep continuously adapting to the solution according to the change in the environment. The problem of scheduling in Cloud where new tasks keep coming over time is unique in terms of dynamic optimization problems. Until now, there has been a large majority of research made on the application of various Evolutionary Algorithms (EAs) to address the issues of dynamic optimization, with the focus on the maintenance of population diversity to ensure the flexibility for adapting to the changes in the environment. Generally, trust refers to the confidence or assurance in a set of entities that assure the security of data. In this work, a dynamic optimization technique is proposed to find an optimal trust weights in cloud during scheduling.