• Title/Summary/Keyword: Trust Mechanism

Search Result 165, Processing Time 0.023 seconds

The Realities and Characteristics of Trade Network at the Industrial Community in a Metropolis (대도시 산업지역사회의 거래 네트워크의 실태와 특성)

  • Park, Soon-Ho;Kwone, Kyoung-Hee
    • Journal of the Korean association of regional geographers
    • /
    • v.10 no.4
    • /
    • pp.787-799
    • /
    • 2004
  • The industrial community in a metropolis has played an essential role to keep business in a large city. This paper aims to analyze the realities of trade network among enterprises at Buksungro Tools Commercial Cooperative in Daegu. The urban style industrial community is found at Buksungro in Daegu. There are more than one hundred small-sized enterprises. Major trades among enterprises are occurred within and/or by the area. The long-term trade networks within the Buksungro Tools Commercial Cooperative have played the key role to maintain the industrial community. The trade relationship has depended on business networks based on social capital rather than commercial mechanism. The trade networks have been established through credit transactions as well as handling troublesome orders. The trade networks help to transfer technology and to learn the tacit knowledge among firms. The long-term trade networks are more influenced by the social accessibility than spatial accessibility.

  • PDF

A Plain Language Policy Institutionalized in the U.S. and Implications for Korea (미국의 쉬운 언어정책의 제도화와 한국에의 시사점)

  • Kim, MyungHee
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.242-251
    • /
    • 2015
  • This paper is to analyse statutes and execution system on 'plain language policy' of the U.S. in the process of policy was instituted, and to suggest the meaningful implications for Korean easy public language improvement project based on the conclusions drawn. The summarized conclusion is as follows. First, the continuous interests of Presidents and taking the lead of federal agencies played important roles until the U.S. plain language policy has been established as a system. Second, in executing the U.S. plain language policy, laws legislated by period contributed to elicit mandatory compliances from the federal agencies. Third, a propelling agent of plain language policy, PLAIN, is not an administrative department but a community consisted of federal employees and experts. Fourth, plain language policy was unexpectedly given wholehearted support and assistance by Presidents and their administrations from the reform-minded Democratic party. Fifth, during the 2000s most federal departments and agencies held self-managed websites and programs related to plain language. To conclude the current U.S. plain language policy surely performs a mechanism to improve communication and a role as a ladder of trust between the public and government.

Fail-over Mechanisms based on Anycast for Stable IPv6 Recursive DNS Services (안정적인 IPv6 리커시브 DNS 서비스를 위한 애니캐스트 기반의 실패 복구 방안 연구)

  • Suh, Yu-Hwa;Kim, Kyung-Min;Shin, Yong-Tae;Song, Kwang-Ho;Kim, Weon;Park, Chan-Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2B
    • /
    • pp.108-117
    • /
    • 2007
  • Recursive DNS is configured as primary or secondary DNS on user PC and performs domain name resolution corresponding user's DNS query. At present, the amount of DNS traffic is occupied high rate in the total internet traffic and the internet traffic would be increased by failure of IPv6 DNS queries and responses as IPv6 transition environment. Also, existing Recursive DNS service mechanisms is unstable on malicious user's attack same as DoS/DDoS Attack and isn't provide to user trust DNS service fail-over. In this paper, we propose IPv6 Recursive DNS service mechanisms for based on anycast for improving stability. It is that fail-over Recursive DNS is configured IPv6 Anycast address for primary Recursive DNS's foil-over. this mechanisms increases reliability and resiliency to DoS/DDoS attacks and reduces query latency and helps minimize DNS traffic as inducing IPv6 address.

Understanding Offline Channel Expansion for Online Fashion Retailers and Channel Integration (온라인 패션 유통업체의 오프라인 채널 확장에 대한 소비자 평가와 채널 통합 수준)

  • Park, Shin Young;Lee, Yuri;Choi, Yun Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.42 no.6
    • /
    • pp.909-923
    • /
    • 2018
  • Online retailers' offline channel expansion is rapidly growing as an important consumer incentive strategy, despite the enormous initial costs of establishing a store. This study focuses on the offline channel operation of online shopping malls, and examines the effects and influencing factors of the channel expansion strategy from a consumer perspective. In-depth interviews were conducted with ten customers in their 20s and 30s who had visited online retailers' stores or purchased products. Major issues were extracted based on the framework of a channel effect mechanism proposed by Cao and Li (2015). Subsequently, it was found that existing online retailers could enhance brand image and perception by expanding their channels to offline stores. It was also emphasized that the consumer trust on the quality of the product in offline stores is a key variable, and it has a significant influence on consumer's continuous purchase and revisit intention. This study showed that borderless channel integration was the most important task when expanding channels of online retailers. So it will be necessary to strive for an omni-channel strategy so that channel integration can be strategically executed and consumers can interact regardless of channels.

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.307-314
    • /
    • 2020
  • The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.

Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA)

  • Sathya, V.;Kannan, Dr. S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1224-1248
    • /
    • 2022
  • In various sensor network applications, such as climate observation organizations, sensor nodes need to collect information from time to time and pass it on to the recipient of information through multiple bounces. According to field tests, this information corresponds to most of the energy use of the sensor hub. Decreasing the measurement of information transmission in sensor networks becomes an important issue.Compression sensing (CS) can reduce the amount of information delivered to the network and reduce traffic load. However, the total number of classification of information delivered using pure CS is still enormous. The hybrid technique for utilizing CS was proposed to diminish the quantity of transmissions in sensor networks.Further the energy productivity is a test task for the sensor nodes. However, in previous studies, a clustering approach using hybrid CS for a sensor network and an explanatory model was used to investigate the relationship between beam size and number of transmissions of hybrid CS technology. It uses efficient data integration techniques for large networks, but leads to clone attacks or attacks. Here, a new algorithm called SBEA (Snowball Endurance Algorithm) was proposed and tested with a bow. Thus, you can extend the battery life of your WSN by running effective copy detection. Often, multiple nodes, called observers, are selected to verify the reliability of the nodes within the network. Personal data from the source centre (e.g. personality and geographical data) is provided to the observer at the optional witness stage. The trust and reputation system is used to find the reliability of data aggregation across the cluster head and cluster nodes. It is also possible to obtain a mechanism to perform sleep and standby procedures to improve the life of the sensor node. The sniffers have been implemented to monitor the energy of the sensor nodes periodically in the sink. The proposed algorithm SBEA (Snowball Endurance Algorithm) is a combination of ERCD protocol and a combined mobility and routing algorithm that can identify the cluster head and adjacent cluster head nodes.This algorithm is used to yield the network life time and the performance of the sensor nodes can be increased.

Blockchain Interoperability Mechanism (블록체인 상호호환성 메커니즘)

  • Zhou, Qing;Lee, Young-seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1676-1686
    • /
    • 2021
  • In this paper, we propose a general cross-chain solution based on the idea of modularity, abstraction, and layering, which decoupling the cross-chain function from the consensus algorithm and specific application logic, and utilize a Merkle proof to ensure the validity and legality of cross-chain operations. Since the underlying implementations of homogeneous and heterogeneous blockchains are different, we treat them separately. For homogeneous blockchains, we suggest a TCP-like cross-chain transport protocol (CCTP). While for heterogeneous blockchains, we present a method to construct the relay chain to realize the cross-chain function. The proposed scheme can enable the correct, effective, reliable, orderly, and timely transmission of cross-chain data. However, the essential difference between the operations within a single blockchain and the interoperability between different blockchains is that the trust domain is different. Cross-chain interoperation itself breaks the completeness of the blockchain, therefore, some efficiency and safety must sacrifice to trade-off.

The Effects of Global Entrepreneurship and Social Capital Within Supply Chain on the Export Performance (글로벌 기업가정신과 공급사슬 내 사회적 자본이 수출성과에 미치는 영향)

  • Yoon, Heon-Deok;Kwak, Ki-Young;Seo, Ri-Bin
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.3
    • /
    • pp.1-16
    • /
    • 2012
  • Under the international business circumstance, global supply chain management is considered a vital strategic challenge to small and medium-sized enterprises(SMEs) suffering from deficient resources and capabilities to exploit overseas markets comparing with large corporations. That is because they can expand their business domains into overseas markets by establishing strategic alliances with global supply chain partners. Although a wide range of previous researches have emphasized the cooperative networks in the chain, most are ignoring the importance of developing relational characteristics such as trust and reciprocity with the partners. Besides, verifying the relational factors influencing firms' export performances, some studies proposed different and inconsistent factors. According to the social capital theory, which is the social quality and networks facilitating close cooperation of inter-individual and inter-organization, provides the integrated view to identify the relational characteristics in the aspects of network, trust and reciprocal norm. Meanwhile, a number of researchers shows that global entrepreneurship is the internal and intangible resource necessary to promote SMEs' internationalization. Upon closer examination, however, they cannot explain clearly its influencing mechanism in the inter-firm cooperative relationships. This study is to verify the effect of social capital accumulated within global supply chain on SMEs' qualitative and quantitative export performance. In addition, we shed new light on global entrepreneurship expected to be concerned with the formation of social capital and the enhancement of export performances. For this purpose, the questionnaires, developed through literature review, were collected from 192 Korean SMEs affiliated in Korean Medium Industries Association and Global Chief Executive Officer's Club focusing on their memberships' international business. As a result of multi-regression analysis, the social capital - network, trust and reciprocal norm shared with global supply chain partner - as well as global entrepreneurship - innovativeness, proactiveness and risk-taking - have positive effect on SMEs' export performances. Also global entrepreneurship affects positively social capital which has mediating effect partially in the relationship between global entrepreneurship and performances. These results means that there is a structural process - global entrepreneurship(input), social capital(output), and export performances(outcome). In other words, a firm should consistently invest in and develop the social capital with global supply chain partners in order to achieve common goals, establish strategic collaborations and obtain long-term export performances. Furthermore, it is required to foster the global entrepreneurship in an organization so as to build up the social capital. More detailed practical issues and discussion are made in the conclusion.

  • PDF

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

A Study on the Factors of Satisfaction & WOM Regarding to Financial Institutions Internet and Smartphones Application On-line Usage of Financial Customers (금융소비자의 인터넷, 스마트폰 어플리케이션 등 금융기관 온라인 시스템 이용에 따른 만족과 구전에 미치는 효과 요인 연구)

  • Jeon, Seong-Ki;Kwon, Man-Woo;Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.8
    • /
    • pp.183-194
    • /
    • 2020
  • Recently, in Korea, financial institutions such as banks are most severely affected by the universalization of the Internet and smartphones. On the other hand, the use of online systems by financial institutions keeps increasing; the convenience of online services has a significant influence on the attraction and the retention of financial customers; consumer needs are also diversely expressed. This paper deduces from the precedent researches a mechanism that online financial system enhances the trust of customers -the medium of the online system and other customers- and its perceived easiness affects its perceived effectiveness and then all these internal variables induce satisfaction. Plus, this paper aims at verification of the hypothesis in terms of an extended technology acceptance model, based on the hypothesis that word of mouth and repurchase are significantly linked to this mechanism. Through this study, the researchers tried to check how the online service quality and emotional factors of financial institutions affect the users in accordance with the trend of changes in the service usage method of financial institutions, and confirmed that the hypothesis was not rejected.