• Title/Summary/Keyword: Trust Mechanism

Search Result 165, Processing Time 0.024 seconds

Enhancing E-commerce Security: A Comprehensive Approach to Real-Time Fraud Detection

  • Sara Alqethami;Badriah Almutanni;Walla Aleidarousr
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.1-10
    • /
    • 2024
  • In the era of big data, the growth of e-commerce transactions brings forth both opportunities and risks, including the threat of data theft and fraud. To address these challenges, an automated real-time fraud detection system leveraging machine learning was developed. Four algorithms (Decision Tree, Naïve Bayes, XGBoost, and Neural Network) underwent comparison using a dataset from a clothing website that encompassed both legitimate and fraudulent transactions. The dataset exhibited an imbalance, with 9.3% representing fraud and 90.07% legitimate transactions. Performance evaluation metrics, including Recall, Precision, F1 Score, and AUC ROC, were employed to assess the effectiveness of each algorithm. XGBoost emerged as the top-performing model, achieving an impressive accuracy score of 95.85%. The proposed system proves to be a robust defense mechanism against fraudulent activities in e-commerce, thereby enhancing security and instilling trust in online transactions.

Access Control Mechanism for Industrial Control System Based Smart Contract (스마트 컨트랙트 기반의 산업제어시스템 접근 제어 메커니즘)

  • Cho, Minjeong;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.579-588
    • /
    • 2019
  • Industrial control systems consist of various physical devices such as sensors, actuators. Security Infringement such as waterworks facilities Remote Access Infringement and power control systems Infection have been occured by vulnerability of Access Control. Access control to physical devices must be fulfilled with a reliable system. However, Having a single access control system inside company can not guarantee reliability. In addition, when single access control is struggled with error or infringement, access control system is totally unavailable. so system requires a additional access control method or system. In this paper, we proposed access control mechanism for reliable and stable operation using blockchain and smart contract. Proposed Mechanism using trust score to consider resources to be consumed depending on each industrial environment in consideration of the industrial control system where availability is more important than integrity and confidentiality. Unlike other blockchain-based access control system, proposed system is designed for the currently operating industrial control system.

A study on the impact of host's personalized offline services and platform ease of use on shared homestay consumers' purchase intention

  • Zou, Ji-kai;Yoon, Sung-joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.109-118
    • /
    • 2021
  • Different from previous studies, this study focuses on accommodation providers' personalization services and platform convenience variables, identifying how these prior factors affect perceived value and trust in accommodation services on a shared homestay platform, and how consumers' innovation plays a role in the process. Through this, we would like to identify the mechanism of interaction between accommodation service providers and consumers mediated by the shared homestay platform and present implications for a more customer-centered platform operation strategy. This study has an extended meaning for prior research, empirically confirming that the increase in personalized offline service quality of personalized hosts in shared economic models has a positive impact on perceived value and platform trust of consumers. At the same time, we confirm that under the shared economy model, consumers' innovation propensity plays an important positive role in regulating their perceived value aspects as well as their confidence in the platform.

An Exploratory Study of Biotechnology Scientists' Research Data Sharing Intention: The Moderating Effects of Academic Reputation (생명공학 분야 연구자의 연구데이터 공유 의도에 영향을 미치는 요인에 관한 연구: 학술적 평판의 조절효과를 중심으로)

  • Kim, Sun
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.1
    • /
    • pp.45-68
    • /
    • 2022
  • The objective of this study is to investigate the factors which influence biotechnology scientists' data sharing intention. This study employed Ostrom's theory of collective action. The target population of this study includes scientists and students of biotechnology field in South Korea. A total of 411 responses which collected by e-mail were used for the final data analysis. The summary of this study is as follows. First, norm of data sharing and academic reciprocity were found to have significant positive influences on data sharing intention directly. Second, perceived community trust was found to have significant positive influences on data sharing intention when academic reciprocity was the mediator. Third, academic reputation showed the moderating effects on the relationship between norm of data sharing and academic reciprocity, and between norm of data sharing and data sharing intention. These findings show that researchers can approach the data sharing behaviors by using the mechanism of trust, norms, reciprocity, and reputation and indicate necessity for a development of academic reputation system to promote more data sharing behaviors of researchers.

The Effects of Organization Characteristics and Relationship Characteristics on Relational Performance: Focused on Mediating Effects of the Dimensions of Trust and Commitment (조직특성과 관계특성이 관계성과에 미치는 영향: 신뢰 차원과 결속 차원의 매개효과를 중심으로)

  • Sung, Min;Oh, Se-Jo
    • Journal of Distribution Research
    • /
    • v.12 no.1
    • /
    • pp.1-31
    • /
    • 2007
  • While trust and commitment are core mediating variables for the purpose of maintaining the long-term relationship, in the context of the characteristics of company and the relationship performance of its members, there have been limited studies which explore as to how each of the dimensions has affects differently. The basic purpose of this study is to examine the relationship between an automobile manufacturer and its agencies. The main purpose of this study is to examine how each different dimension of trust and commitment on the automobile manufacturer has different mediating effects between the characteristics of company(organization characteristics, relationship characteristics) and relationship performance perceived by its agents. Another purpose is to investigate the mechanism by which the relationship performance of the agencies is improved. An empirical study surveying 115 sales office managers at a leading automobile manufacturer in Korea was conducted. An analysis of the collected data indicates that while the characteristics of company have a positive influence on the agencies' relational performance through the mediating role of both trust of benevolence and commitment, agencies' trust of their headquarter's benevolence has a different influence on the dimensions of commitment. Finally, the authors discussed some theoretical contributions and managerial implications. And then, they presented limitations of this study and the future research directions.

  • PDF

Biometric Information and OTP based on Authentication Mechanism using Blockchain (블록체인을 이용한 생체정보와 OTP 기반의 안전한 인증 기법)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.3
    • /
    • pp.85-90
    • /
    • 2018
  • Blockchain technology provides distributed trust structure; with this, we can implement a system that cannot be forged and make Smart Contract possible. With blockchain technology emerging as next generation security technology, there have been studies on authentication and security services that ensure integrity. Although Internet-based services have been going with user authentication with password, the information can be stolen through a client and a network and the server is exposed to hacking. For the reason, we suggest blockchain technology and OTP based authentication mechanism to ensure integrity. In particular, the Two-Factor Authentication is able to ensure secure authentication by combining OTP authentication and biometric authentication without using password. As the suggested authentication applies multiple hash functions and generates transactions to be placed in blocks in order for biometric information not to be identified, it is protected from server attacks by being separate from the server.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

A Study of an Airfoil for Optimal Aerodynamic Performance of Flapping Motion (Flapping운동의 최적공력성능을 위한 익형 연구)

  • Lee J. S.;Kim C.;Rho O. H.
    • Journal of computational fluids engineering
    • /
    • v.8 no.2
    • /
    • pp.24-32
    • /
    • 2003
  • In this work, we propose a new idea of flapping airfoil design for optimal aerodynamic performance from detailed computational investigations of flow physics. Generally, flapping motion which is combined with pitching and plunging motion of airfoil, leads to complex flow features such as leading edge separation and vortex street. As it is well known, the mechanism of thrust generation of flapping airfoil is based on inverse Karman-vortex street. This vortex street induces jet-like flow field at the rear region of trailing edge and then generates thrust. The leading edge separation vortex can also play an important role with its aerodynamic performances. The flapping airfoil introduces an alternative propulsive way instead of the current inefficient propulsive system such as a propeller in the low Reynolds number flow. Thrust coefficient and propulsive efficiency are the two major parameters in the design of flapping airfoil as propulsive system. Through numerous computations, we found the specific physical flow phenomenon which governed the aerodynamic characteristics in flapping airfoil. Based on this physical insight, we could come up with a new kind of airfoil of tadpole-shaped and more enhanced aerodynamic performance.

Secure OS Technical Development Trend (안전한 운영체제 기술개발 동향)

  • 김재명;이규호;김종섭;김귀남
    • Convergence Security Journal
    • /
    • v.1 no.1
    • /
    • pp.9-20
    • /
    • 2001
  • In the 3rd Wave of information revolution, technical research & development for more rapid and safe information exchange take a sudden turn currently According to a step up in importance and efficiency value of information, it's necessary to research technical development in various field altogether. Especially information security is the very core of essential technology. However most System attacks are based on the weakness of OS, it is difficult to achieve the security goal in the only application level. For the solution of this problem, so many technology researches to serve secure, trust information security in OS itself are activated. Consequently we introduce the tendency of current secure OS development projects of security kernel all over world in this report and inquire into security mechanism of the File Griffin which prevents file system forgery, modification perfectly by performing digital signature certificate on kernel level.

  • PDF

Potential Benefit of Metformin as Treatment for Colon Cancer: the Evidence so Far

  • Abdelsatir, Azza Ali;Husain, Nazik Elmalaika;Hassan, Abdallah Tarig;Elmadhoun, Wadie M;Almobarak, Ahmed O;Ahmed, Mohamed H
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.18
    • /
    • pp.8053-8058
    • /
    • 2016
  • Metformin is known as a hypoglycaemic agent that regulates glucose homeostasis by inhibiting liver glucose production and increasing muscle glucose uptake. Colorectal cancer (CRC) is one of the most common cancers worldwide, with about a million new cases diagnosed each year. The risk factors for CRC include advanced age, smoking, black race, obesity, low fibre diet, insulin resistance, and the metabolic syndrome. We have searched Medline for the metabolic syndrome and its relation to CRC, and metformin as a potential treatment of colorectal cancer. Administration of metformin alone or in combination with chemotherapy has been shown to suppress CRC. The mechanism that explains how insulin resistance is associated with CRC is complex and not fully understood. In this review we have summarised studies which showed an association with the metabolic syndrome as well as studies which tackled metformin as a potential treatment of CRC. In addition, we have also provided a summary of how metformin at the cellular level can induce changes that suppress the activity of cancer cells.