• Title/Summary/Keyword: Trust Cluster

Search Result 70, Processing Time 0.023 seconds

Analysis of Contentment of Residential Environment among the Downtown Residents, the Aged: Taking Cheonan City for example (도심거주 고령자의 주거환경 만족도 분석: 천안시를 사례로)

  • Im, Jun-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.3
    • /
    • pp.114-122
    • /
    • 2015
  • This study aims to analyze the satisfaction of seniors living in Cheonan City downtown as to their residential environment. Also, this study intends to identify which factors should be improved first to make downtown a favorable residential area. To that end, 'social indicators of Chungnam' was used. The collected data was analyzed through a statistical analysis method using ANOVA (analysis of variance) and a cluster analysis. It led to the following findings. First, 6.9% of the elderly residents expressed their wish to move from their downtown residence. Thus, the majority of the residents do not want to move. Second, the satisfaction of the elderly residents in their downtown residence scored 6.09. The score is higher than those of other regions. Thus, it is highly possible to develop downtown into a senior-friendly area. Third, as for satisfaction in downtown residence, it was higher among the following groups: men; those with high school or higher level of education; those earning at least a million won a month; family of one generation. Fourth, satisfaction in the following factors was relatively low: culture and education; interaction with neighbors and trust in them; car accidents. Thus, those factors should be improved for downtown residents. Above all, community-faced facilities should be expanded to increase exchanges with neighbors and trust in them. To attract women dissatisfied with downtown residence. it is imperative to increase daily safety by reducing car accidents and crime.

IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment (WSN의 에너지 효율적 운영을 위한 신뢰성이 보장된 IDE-LEACH 프로토콜)

  • Cho, Young-Bok;Woo, Seng-Hee;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.10
    • /
    • pp.801-807
    • /
    • 2013
  • WSN consists of hundreds to thousands of sensor nodes. In order to solve the problem of energy consumption imbalance cluster head is reelected in every round, while node authentication scheme is utilized for secure communication. However, re-clustering increases the overhead of sensor nodes and during the node authentication phase the frequent AREQ/AREP message exchange also increases the overhead. Therefore, a secure and energy efficient protocol, by which overhead of sensor nodes is reduced and long time communication is achieved, is required for wireless sensor network. In this paper, an energy efficient and reliable IDE-LEACH protocol for WSN is proposed. The proposed protocol is prolongs networks lifetime about average 20% compared to the LEACH-based protocols and all attending nodes in communication form BS authentication consisted of trusted nodes.

Institutional Milieu of High-Tech Venture Business Cluster in a Metropolitan Area: the Case of Daegu City in Korea (지방대도시 벤처생태계의 제도적 및 문화적 환경: 대구지역을 사례로)

  • 이철우;이종호
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.7 no.1
    • /
    • pp.1-27
    • /
    • 2004
  • In this paper we attempt to explore the institutional and clutural milieu of high-tech venture business cluster in Daegu City and provide policy implications for creating sustainable high-tech venture businesses cluster. Although since 1998 the Korean government has made explicitly a great deal of efforts to help attract and create high-tech new start-ups in non-capital cities such as the support of business incubating centers and the establishment of real service centres, it reveals that such policies are not so successful in creating a sustainable venture ecology. One of the most critical resions is that such policies are centred simply on building physical infrastructure such as incubating space and service centre with less concern with promoting venture business cluster reflecting cultural and institutional specificities in a given region. In this respect we argue that the focus of industrial policies to support promoting high-tech venture business clusters in non-capital cities urgently need to move towards to make it for firms to encourage entrepreneurship driving innovation and to create social capital incucing trust and networks amongst firms, universities, public &privite supporting agencies, together with the building up of physical infrastructure the existing policies have done.

  • PDF

An Analysis on the Impact of Information Technology Usage on the Social Capital and Innovation Performance in an Industrial Cluster: Based on the PanGyo Technovalley (정보기술 활용이 사회적 자본과 산업 클러스터 혁신성과에 미치는 영향 분석: 판교 테크노벨리를 중심으로)

  • Yeonsoon Kim;Seonyoung Shim
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.43-62
    • /
    • 2017
  • This study investigates the effect of bonding and bridging social capital on the technological innovation performance in the Pangyo Techno Valley. In particular, we consider the information technology (IT) usage in industrial cluster as an antecedent of social capital. IT instigates the intra and extra communication and information sharing between employees, thereby promoting the formation of a network of various members. Results show that the IT usage factor positively affects both bridging and bonding social capital, but an evident difference exists among the effects of social capital on the technological innovation performance. In case of Pangyo industrial cluster, bridging social capital exerts significant effect on the technological innovation performance, whereas bonding social capital shows insignificance. Bridging social capital is composed of the interactions of various networks. Bonding social capital is based on the strong tie from trust and internal cooperation. Results are related with the characteristics of Pangyo Techno Valley, where various IT ventures need active communication and information sharing with other organizations for technological innovation performance.

An Adaptive Regional Clustering Scheme Based on Threshold-Dataset in Wireless Sensor Networks for Monitoring of Weather Conditions (기상감시 무선 센서 네트워크에 적합한 Threshold-dataset 기반 지역적 클러스터링 기법)

  • Choi, Dong-Min;Shen, Jian;Chung, Il-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.10
    • /
    • pp.1287-1302
    • /
    • 2011
  • Clustering protocol that is used in wireless sensor network is an efficient method that extends the lifetime of the network. However, when this method is applied to an environment in which collected data of the sensor node easily overlap, sensor nodes unnecessarily consumes energy. In the case of clustering technique that uses a threshold, the lifetime of the network is extended but the degree of accuracy of collected data is low. Therefore it is hard to trust the data and improvement is needed. In addition, it is hard for the clustering protocol that uses multi-hop transmission to normally collect data because the selection of a cluster head node occurs at random and therefore the link of nodes is often disconnected. Accordingly this paper suggested a cluster-formation algorithm that reduces unnecessary energy consumption and that works with an alleviated link disconnection. According to the result of performance analysis, the suggested method lets the nodes consume less energy than the existing clustering method and the transmission efficiency is increased and the entire lifetime is prolonged by about 30%.

A Study on Attack Detection Technique based on n-hop Node Certification in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 n-hop 노드 인증 기반 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.3-8
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

The study of the relationship among perceived risk of apparel purchase, control, and impulse buying - Focusing on internet shopping mall consumers - (의류구매위험지각, 통제, 충동구매 간의 관계 연구 - 인터넷쇼핑몰 소비자를 중심으로 -)

  • Chung, Mi Sil
    • Korean Journal of Human Ecology
    • /
    • v.23 no.5
    • /
    • pp.873-890
    • /
    • 2014
  • The purpose of this study was to examine the relationship among consumer's perceived risk of apparel purchase in internet shopping mall, control, and impulse buying. The subjects were 319 female college students in Gyeongsang provinces. The obtained data were analyzed by reliability analysis, analysis of frequency, factor analysis, cluster analysis, one-way ANOVA, Duncan's multiple range test, correlation analysis, and t-test. The major results of this study were as follows: First, three factors of consumer's perceived risk of apparel purchase in internet shopping mall were identified: size risk, trust risk, and social/psychological risk. Second, the subjects were categorized into three different types of groups according to perceived risk: high perceived risk type, middle perceived risk type, and low perceived risk type. Third, three control(self-control, goal-control, and desire for control) and three impulse buying(impulsive buying for showing off, impulsive buying for excitement, and impulsive buying due to memory) were identified. Fourth, there was significant difference between strong control group and weak control group on three factors of impulse buying. Fifth, a significant positive correlation was found size risk and three factors of control and a significant negative correlation was found self-control and three factors of impulse buying.

Trustworthy Mutual Attestation Protocol for Local True Single Sign-On System: Proof of Concept and Performance Evaluation

  • Khattak, Zubair Ahmad;Manan, Jamalul-Lail Ab;Sulaiman, Suziah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2405-2423
    • /
    • 2012
  • In a traditional Single Sign-On (SSO) scheme, the user and the Service Providers (SPs) have given their trust to the Identity Provider (IdP) or Authentication Service Provider (ASP) for the authentication and correct assertion. However, we still need a better solution for the local/native true SSO to gain user confidence, whereby the trusted entity must play the role of the ASP between distinct SPs. This technical gap has been filled by Trusted Computing (TC), where the remote attestation approach introduced by the Trusted Computing Group (TCG) is to attest whether the remote platform integrity is indeed trusted or not. In this paper, we demonstrate a Trustworthy Mutual Attestation (TMutualA) protocol as a proof of concept implementation for a local true SSO using the Integrity Measurement Architecture (IMA) with the Trusted Platform Module (TPM). In our proposed protocol, firstly, the user and SP platform integrity are checked (i.e., hardware and software integrity state verification) before allowing access to a protected resource sited at the SP and releasing a user authentication token to the SP. We evaluated the performance of the proposed TMutualA protocol, in particular, the client and server attestation time and the round trip of the mutual attestation time.

The Effect of Relationship Commitment on the Customer's Future Behavioral Intention Related to the Criteria of Evaluating Cyber Stores in Internet Shopping Malls (인터넷 쇼핑몰 이용자의 가상점포 평가기준에 따른 관계몰입이 미래행동의도에 미치는 영향)

  • Ko, Eun-Kyung;Lee, Sun-Jae
    • Journal of the Korean Home Economics Association
    • /
    • v.43 no.11 s.213
    • /
    • pp.153-164
    • /
    • 2005
  • The purpose of this study was to examine the effect of relationship commitment on the female customer's future behavioral intention in relation to the criteria of evaluating cyber stores in internet shopping malls. This study used questionnaire and judgment sampling to survey consumers who have bought product in internet shopping malls. The respondents were 329 women from their twenties to fifties. The data were analyzed by factor analysis, cluster analysis, ANOVA, regression and Duncan test. The results were as follows: 1. The evaluative criteria of cyber stores were product characteristics of the store, convenience and trust, and promotion and information provision. 2. There were significant differences in relationship commitment among groups according to differences of cyber store evaluation criteria. 3. The dimensions of relationship commitment were affective commitment, calculus commitment and normative commitment. 4. Relationship commitment was found to have a significant effect on the customer's future behavioral intention. Especially, affective commitment was shown to have a significant effect on the future behavioral intention.

The Effects of Food Safety Accident on the Consumption of Eggs : Focusing on the Pesticide-related Accident (식품안전사고가 계란 소비에 미치는 영향: 계란의 살충제검출사고를 중심으로)

  • Han, Byeol;Yang, Sung-Bum
    • Korean Journal of Organic Agriculture
    • /
    • v.27 no.1
    • /
    • pp.17-32
    • /
    • 2019
  • The objective of this study is to investigate the effect of pesticide-related accident on prices and sales of eggs and the perception of food safety accidents among consumers. For this, we analyzed the impact of the pesticide incident on consumers' purchases by separating large discount stores and eco-friendly specialty stores with econometrics methods. In addition, the value changes for each egg certification were analyzed after the accident. Perception of food safety accidents was conducted through a survey to investigate the awareness of the pesticide-related accidents, changes in purchases, and the causes of the pesticide accidents. Furthermore, the risk analysis was conducted. This results show the importance of trust and communication in food safety accidents between distributors, consumers and concerned authorities. Also, after the accident, consumers' interest and premium exist in the breeding process such as animal welfare, not only in the final product. Therefore in order to actively respond to food safety accidents such as pesticides-related accident, response and improvement are necessary considering various aspects such as risk assessment, risk management, and risk communication.