• Title/Summary/Keyword: Trust Evaluation

Search Result 299, Processing Time 0.022 seconds

Perception of Inequality and Societal Health: Analysis on Social Trust and Social Mobility

  • Hwang, Sun-Jae
    • Asian Journal for Public Opinion Research
    • /
    • v.6 no.1
    • /
    • pp.1-17
    • /
    • 2018
  • As societal interest in inequality increases in Korea, both public and academic discussion on inequality is also on the rise. In order to more effectively discuss the problems of rising inequality, however, it is essential to study the consequences and implications of inequality. This study examines one of the consequences of inequality, particularly on individuals - the relationship between an individual's perception of inequality and his/her evaluation of societal health, such as social trust and social mobility. According to a statistical analysis of the Korean Academic Multimode Open Survey for Social Sciences (KAMOS), those who perceive the level of income and wealth inequality in Korea as more unequal tend to have a lower level of trust toward Korean society and Korean people, as well as a lower expectation for both intra- and intergenerational social mobility. This study, which shows that rising inequality could have a negative impact at the individual level, not only extends the scope of the consequence-of-inequality studies from the society-oriented toward the individual-oriented, but it also has significant implications for the field, suggesting a new direction for future studies.

An exploratory study of applying SNS to lecture and professor trust (SNS 활용한 강의와 교수신뢰에 대한 탐색적 연구)

  • Han, Dong-Wook;Kang, Min-Chae
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.531-539
    • /
    • 2014
  • This is an exploratory study to verify the impact of applying SNS to lecture on the professor trust and students achievement. The subject of the study is two groups which consist of SNS applied class and the group using legacy online class supporting system and the contents, material, activities of class are same. We verified the differences between two groups with the professor trust divided into 4 constructs such as intimacy, expertise, teaching ability, leadership based on the literature review and students achievement classified into midterm and final. The results shows that intimacy and final evaluation are statistically significant between two groups.

Evaluative Criteria of Cyber Store based on Consumer Character of Cyber Stove Shoppers (사이버쇼핑 이용자의 소비자특성에 따른 가상점포 평가기준)

  • 박재옥;안민영
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.3_4
    • /
    • pp.441-451
    • /
    • 2003
  • The purpose of this study was to find out evaluative criteria of cyber store toward shopping orientation, purchasing experience and demographic factors of consumers to visit cyber store. This study surveyed consumers who have an experience of using cyber store and judgment sampling was used. The respondents were 240 men and women living in the metropolitan area of Seoul and Gyeonggi province. Research method was measured by clothing shopping orientation (utilitarian and hedonic factors), cyber store evaluation criteria (convenience, quality & trust and product character factors), purchasing experience(existent and nonexistent) and demographic factors. For data analysis, descriptive statistics, factor analysis, cluster analysis, ANOVA, t-test, Duncan test, and reliability analysis were conducted. The results were as follows: 1. Evaluative criteria of cyber store were considered importantly in order of possibility of exchange and refund, stability of personal information security, substance of quality degree of product and service and store. 2. Among shopping orientation groups, there were significant differences in all evaluative criteria of cyber store: convenience, quality & trust and product character of store. 3. Among groups toward existence and nonexistence in a purchasing experience, there were significant differences in convenience and quality & trust of store. 4. Among Demographic factors(gender, job, education and income) there were significant differences in convenience and quality & trust of store.

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

Machine Learning Methods for Trust-based Selection of Web Services

  • Hasnain, Muhammad;Ghani, Imran;Pasha, Muhammad F.;Jeong, Seung R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.38-59
    • /
    • 2022
  • Web services instances can be classified into two categories, namely trusted and untrusted from users. A web service with high throughput (TP) and low response time (RT) instance values is a trusted web service. Web services are not trustworthy due to the mismatch in the guaranteed instance values and the actual values achieved by users. To perform web services selection from users' attained TP and RT values, we need to verify the correct prediction of trusted and untrusted instances from invoked web services. This accurate prediction of web services instances is used to perform the selection of web services. We propose to construct fuzzy rules to label web services instances correctly. This paper presents web services selection using a well-known machine learning algorithm, namely REPTree, for the correct prediction of trusted and untrusted instances. Performance comparison of REPTree with five machine learning models is conducted on web services datasets. We have performed experiments on web services datasets using a ten k-fold cross-validation method. To evaluate the performance of the REPTree classifier, we used accuracy metrics (Sensitivity and Specificity). Experimental results showed that web service (WS1) gained top selection score with the (47.0588%) trusted instances, and web service (WS2) was selected the least with (25.00%) trusted instances. Evaluation results of the proposed web services selection approach were found as (asymptotic sig. = 0.019), demonstrating the relationship between final selection and recommended trust score of web services.

Trustworthy Service Selection using QoS Prediction in SOA-based IoT Environments (SOA기반 IoT환경에서 QoS 예측을 통한 신뢰할 수 있는 서비스 선택)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.123-131
    • /
    • 2019
  • The Internet of Things (IoT) environment must be able to meet the needs of users by providing access to various services that can be used to develop diverse user applications. However, QoS issues arise due to the characteristics of the IoT environment, such as numerous heterogeneous devices and potential resource constraints. In this paper, we propose a QoS prediction method that reflects trust between users in SOA based IoT. In order to increase the accuracy of QoS prediction, we analyze the trust and distrust relations between users and identify similarities among users and predict QoS based on them. The centrality is calculated to enhance trust relationships. Experimental results show that QoS prediction can be improved.

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.

A Study on Shopping Mall Quality, Satisfaction, Trust, Commitment and Purchase Intention According to Shopping Propensity of Chinese Consumer (중국 패션소비자의 쇼핑성향에 따른 인터넷 쇼핑몰 품질지각, 만족, 신뢰, 몰입 및 구매의도에 관한 연구)

  • Hong, Byung-Sook;Na, Youn-Kue;Xu, Dan Dan
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.4
    • /
    • pp.622-633
    • /
    • 2009
  • I need to study variations which affect Chinese internet shopping-mall vendor and Chinese buyer's long term relationship and utilize that insight on marketing strategy. For that, I studied effect of shopping propensity, internet shipping-mall quality on satisfaction, trust, commitment and purchase intention of fashion products, mainly fashion goods consumers in their 20s-30s at Shanghai and Beijing. 453 respondents' survey was used for this study by random sample selection and analyzed through frequency analysis, factor analysis, regression analysis, cross-tab, ANOVA test with SPSS12.0. Through this study, I found out that Chinese fashion goods consumer can be categorized as information seeker, variety seeker and innovation seeker. Among them, innovation seeker was most sensitive on shopping mall's quality, satisfaction, trust, commitment and purchase intention and Chinese consumer's evaluation on internet shopping-mall' perceived quality affect satisfaction, absorption, trust and fashion goods purchase intention. Based on that, I need to understand more about target consumer before enter the market, because there is difference of shopping-mall quality, satisfaction, trust, absorption and purchase intention according to shopper's propensity and demographic factors.

Trust Discrimination Scheme Considering Limited Resources in Mobile P2P Environments (모바일 P2P환경에서 제한적인 자원을 고려한 신뢰성 판별 기법)

  • Choi, Minwoong;Ko, Geonsik;Jeon, Hyeonnwook;Kim, Yeonwoo;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.662-672
    • /
    • 2017
  • Recently, with the development of mobile devices and near field communication, mobile P2P networks have been actively studied to improve the limits of the existing centralized processing system. A peer has limited components such as batteries, memory and storage spaces in mobile P2P networks. The trust of a peer should be discriminated in order to share reliable contents in mobile P2P networks. In this paper, we propose a trust discrimination scheme considering limited resources in mobile P2P environments. The proposed scheme discriminates the trust of a peer by direct rating values using the rating information of the peer and indirect rating values by the other peers. The recent update time is included in the rating information. The proposed scheme reduces the redundant rating information by comparing the recent update times of the rating information. It is shown through performance evaluation that the proposed scheme reduces the number of messages and improves the accuracy of trust over the existing scheme.

The Evaluation Model for Natural Resource Conservation Areas - Focused on Site Selection for the National Trust - (자연자원 보전지역의 평가모형 - 내셔널 트러스트 후보지 선정을 중심으로 -)

  • 유주한;정성관
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.39-49
    • /
    • 2002
  • The purpose of this study is to propose an objective and rational methodology for the selection of proposed sites far the National Trust(NT), which is the new alterative proposal far the conservation of natural environments destroyed by injudicious land development and economic growth. That is to enforce many analysis for the effective estimation of rare ecological and landscape resources and to propose a model based on estimation and united indicators. Using the estimative model, we apply it to the selection of the proposed site in micro scale and simultaneously offer the basic methodology of effective and systematic land conservation in macro scale. The results of this study are as follows: 1) The results of analysis for the reliability of estimative items and indicators, presented no problem in that the coefficient of reliability was over 0.7. 2) The correlation measure of the estimative indicator indicated that 'succession'and 'regenerating restorability' were highly correlative in the item of plants. Another three items showed a tendency to be alike. 3) The results of factor analysis on the characteristics of indicators, classified plants into four categories including a stable factor. The item of animals was classified as a stable and rare factor. The item of landscape was classified as a physical and mental factor and the environment as a pollutional and conditional factor. 4) The model of estimation created through factor analysis was valid for the approval of the regression model because significant probability was 0.00. When we consider the NT proposed site as a complex body that is composed of diverse natural and manmade resources, certainly the synthetic methodology of estimation is needed. If these studies are carried out, NT sites will be selected more rationally and effectively than at present. Consequently, they have the potential to play a core role of natural ecosystem conservation in Korea.