• Title/Summary/Keyword: Trust Evaluation

Search Result 299, Processing Time 0.024 seconds

The Reliability Evaluation of User Account on Facebook (페이스북 사용자 계정의 신뢰도 평가에 대한 연구)

  • Park, Jeongeun;Park, Minsu;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1087-1101
    • /
    • 2013
  • Most people are connected to Social Network Services (SNS) through smart devices. Social Network Services are tools that transport information fast and easily. It does not care where he or she comes from. A lot of information circulates and is shared on Social Network Services. but Social Network Services faults are magnified and becoming a serious issue. For instance, malicious users generate multiple IDs easily on Facebook and he can use personal information of others on purpose, because most people tend to undoubtedly accept friend requests. In this paper, we have specified research scope to Facebook, which is one of most popular Social Network Services in the world. We propose a way of minimizing the number of malicious actions on Facebook from malignant users and malicious bots by setting criteria and applying reputation system.

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

A Study on Scalable Federated ID Interoperability Method in Mobile Network Environments (모바일 환경으로 확장 가능한 federated ID 연동 방안에 관한 연구)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.27-35
    • /
    • 2005
  • While the current world wide network offers an incredibly rich base of information, it causes network management problem because users should have many independent IDs and passwords for accessing different sewers located in many places. In order to solve this problem users have employed single circle of trust(COT) ID management system, but it is still not sufficient for clearing the problem because the coming ubiquitous network computing environment will be integrated and complex networks combined with wired and wireless network devices. The purpose of this paper is to describe the employment and evaluation of federated ID interoperability method for solving the problem. The use of the proposed model can be a solution for solving network management problem in the age of mobile computing environment as well as wired network computing environment.

A Method of Device Validation Using SVDD-Based Anormaly Detection Technology in SDP Environment (SDP 환경에서 SVDD 기반 이상행위 탐지 기술을 이용한 디바이스 유효성 검증 방안)

  • Lee, Heewoong;Hong, Dowon;Nam, Kihyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1181-1191
    • /
    • 2021
  • The pandemic has rapidly developed a non-face-to-face environment. However, the sudden transition to a non-face-to-face environment has led to new security issues in various areas. One of the new security issues is the security threat of insiders, and the zero trust security model is drawing attention again as a technology to defend against it.. Software Defined Perimeter (SDP) technology consists of various security factors, of which device validation is a technology that can realize zerotrust by monitoring insider usage behavior. But the current SDP specification does not provide a technology that can perform device validation.. Therefore, this paper proposes a device validation technology using SVDD-based abnormal behavior detection technology through user behavior monitoring in an SDP environment and presents a way to perform the device validation technology in the SDP environment by conducting performance evaluation.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

An exploratory study on the factors influencing credibility of television news and portal news

  • Najin Jun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.31-43
    • /
    • 2023
  • News credibility is on a decline for many democratic countries. Among the countries, South Korea is currently witnessing one of the steepest declining curves. Since people obtain news from various media, for example, television and portals, news credibility can be measured for each of the media separately. Most often, television news credibility is much higher than portal news credibility because people tend to trust traditional media more than online ones. To understand the discrepancy between news credibility of the two media in specific relation to South Koreans' everyday news use and overall news credibility evaluation, this exploratory study examined how the factors that influence television news credibility and portal news credibility differ from each other by examining the relations of news credibility of the two media to credibility of news I use and of news in general. Drawing from previous research on partisan news use, it assumed that normative beliefs for television as a traditional medium work for television news credibility in the similar way as the mechanisms of selective exposure and bias perception do. It also assumed that the experiences dimension of news trust works for credibility of portal news and of news in general similarly. To verify these assumptions, a regression analysis was conducted from a sample of 58,936 South Koreans collected in 2022. As assumed, results revealed a greater relation between credibility of television news and of news I use, and between credibility of portal news and of news in general respectively. The findings suggest that measurement of credibility should be revised in the way that reflects media characteristics and the differing expectations held by news users.

Utilization of Generative Artificial Intelligence Chatbot for Training in Suicide Risk Assessment of Depressed Patients: Focusing on Students at a College of Korean Medicine (우울증 환자의 자살 위험 평가의 훈련을 위한 생성형 인공지능 챗봇의 의학적 교육 활용 사례: 일개 한의과대학 학생을 중심으로)

  • Chan-Young Kwon
    • Journal of Oriental Neuropsychiatry
    • /
    • v.35 no.2
    • /
    • pp.153-162
    • /
    • 2024
  • Objectives: Among OECD countries, South Korea has been having the highest suicide rate since 2018, with 24.1 deaths per 100,000 people reported in 2020. The objectie of this study was to examine the use of generative artificial intellicence (AI) chatbots to train third-year Korean medicine (KM) students in conducting suicide risk assessments for patients with depressive disorders to train students for their clinical practice skills. Methods: The Claude 3 Sonnet model was utilized for chatbot simulations. Students performed mock consultations using standardized suicide risk assessment tools including Ask Suicide-Screening Questions (ASQ) tool and ASQ Brief Suicide Safety Assessment. Experiences and attitudes were collected through an anonymous online survey. Responses were rated on a 1~5 Likert scale. Results: Thirty-six students aged 22~30 years participated in this study. Their scores for interest and appropriateness (4.66±0.57), usefulness (4.60±0.61), and overall experience (4.63±0.60) were high. Their evaluation of the usability of artificial intelligence chatbot was also high at 4.58±0.70 points. However, their trust in chatbot responses (Q12) was lower (3.86±0.99). Common issues related to dissatisfaction included conversation disruptions due to token limits and inadequate chatbot responses. Conclusions: This is the first study investigating generative AI chatbots for suicide risk assessment training in KM education. Students reported high satisfaction, although their trust in chatbot accuracy was moderate. Technical limitations affected their experience. These preliminary findings suggest that generative AI chatbots hold promise for clinical training, particularly for education in psychiatry. However, improvements in response accuracy and conversation continuity are needed.

An Approach to Credibility Enhancement of Automated Collaborative Filtering System through Accommodating User's Rating Behavior

  • Sung, Jang-Hwan;Park, Jong-Hun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.576-581
    • /
    • 2007
  • The purpose of this paper is to strengthen trust on the automated collaborative filtering system. Automated collaborative filtering system is quickly becoming a popular technique for recommendation system. This elaborative methodology contributes for reducing information overload and the result becomes index of users' preference. In addition, it can be applied to various industries in various fields. After it collaborative filtering system was developed, many researches are executed to enhance credibility and to apply in various fields. Among these diverse systems, collaborative filtering system which uses Pearson correlation coefficient is most common in many researches. In this paper, we proposed new process diagram of collaborative filtering algorithm and new factors which should improve the credibility of system. In addition, the effects and relationships are also tested.

  • PDF

A Study on The Possibility of BIM(Building Information Modeling) Application of Construction Management (건설사업관리의 BIM(Building Information Modeling) 적용 가능성에 관한 연구)

  • Shim, Jin-Kyu;Yi, Hye-In;Kim, Jae-Jun
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.10 no.2
    • /
    • pp.49-60
    • /
    • 2010
  • The production process of construction industry is different from thing of the general manufacturing, likewise various participants make temporary teamwork for success of the project through sharing of information. But the each role of participants is individually changed to step in construction process stage and moreover it has complicated, entangled interests. The Construction Management was inducted for the effective management and operation of construction project. The Key of the Construction Management success depends on the cooperative relationship relation to major participants. The domestic construction system is difficult with many trial and errors for the frequent plan change. As the building are more bigger and complicated, Building Information Modeling is demanded design and maintenance. This evaluation was done by the trust on the system as well as Construction Management. And then it applies the BIM it analyzes the example of construcrion project.

Applying Ubi-SERVQUAL to Assessing the Quality of Ubiquitous Service Scenarios (Ubi-SERVQUAL을 활용한 시나리오상의 유비쿼터스 서비스 품질 평가)

  • Kwon, Oh-Byung;Kim, Ji-Hoon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.1
    • /
    • pp.1-13
    • /
    • 2007
  • Nowadays, ubiquitous computing services begin to be suggested from a few domains such as supply chain, logistics, and location-based services. However, to what extent the services will be successful is hard to be estimated, mainly because a sophisticated service evaluation method focusing on the ubiquitous computing perspective has not been supplied. Hence, this paper alms to build a model to assess the quality of ubiquitous computing service. To do so, an amended model, Ubi-SERVQUAL, is applied to assess the service quality mentioned in ubiquitous computing scenarios. According to the Ubi-SERVQUAL, we found that an actual service with higher quality should consider reliability. responsiveness, assurance and empathy in order to increase customer satisfaction, computer system's intimacy with users and trust.