• 제목/요약/키워드: Trust Mechanism

검색결과 165건 처리시간 0.043초

정보시스템 아웃소싱에서 관계 관리의 조합 : 신뢰 관점 (Combinations of Relationship Management in Information Systems Outsourcing : Trust Perspective)

  • 이종만;남기찬
    • Journal of Information Technology Applications and Management
    • /
    • 제13권4호
    • /
    • pp.181-195
    • /
    • 2006
  • In recent years, increasing attention has been paid on how to manage a successful relationships between the receiver and provider of the Information Systems(IS) outsourcing services. This study explores the sources of influence for successful outsourcing relationships. Based on the Jaworski's control combination model for marketing, we (1) propose a management combination model of outsourcing relationships where trust is introduced as an intervening variable and outsourcing compleyity as a moderating variable, (2) test this model using a sample of 94 outsourcing projects in 36 organizations that have outsourced there IS functions to external service providers. The results indicated several significant findings. First, the deployment of management mechanism such as contract mechanism and trust building has a significant effect on the outsourcing success through trust only. Second, complexity of outsourcing activities has a moderating effect on relationship management combinations.

  • PDF

IT 서비스 상황에서의 심리적 기제 : 갈등, 만족, 신뢰 그리고 몰입 (Explicating Moderating Effects of Conflict in the Psychological Mechanism in IT Service Engagement)

  • 박준기;이혜정;이정우
    • 한국IT서비스학회지
    • /
    • 제13권1호
    • /
    • pp.1-21
    • /
    • 2014
  • In IT service quality research, the relationship between the service quality and clients' satisfaction was the focus of many studies while in relationship quality research, the influence of trust and conflict on relationship commitment seems to be the focus. In this study, these two research streams are integrated and a theoretical research model is proposed consisting of IT service quality, satisfaction, trust and relationship commitment with conflict as a moderator for the overall psychological mechanism. As satisfaction represents emotional response while trust cognitive response, this research model integrated both emotional and cognitive aspects of relationship maintenance in the IT service context. Analysis of data collected from 262 employees of global IT service firm revealed the differential effects of reliability, responsiveness, assurance and empathy on satisfaction and trust. Also, depending upon the level of conflict, the effects of reliability and assurance were found to be moderated. Further analysis revealed more profound mechanism at work relating emotional and cognitive aspects in the psychology of relationship maintenance in IT service context. Practical implications are further discussed in the conclusion.

Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권3호
    • /
    • pp.1119-1143
    • /
    • 2014
  • Lightweight trust mechanism with lightweight cryptographic primitives has emerged as an important mechanism in resource constraint wireless sensor based mobile devices. In this work, outlier detection in lightweight Mobile Ad-hoc NETworks (MANETs) is extended to create the space of reliable trust cycle with anomaly detection mechanism and minimum energy losses [1]. Further, system is tested against outliers through detection ratios and anomaly scores before incorporating virtual programmable nodes to increase the efficiency. Security in proposed system is verified through ProVerif automated toolkit and mathematical analysis shows that it is strong against bad mouthing and on-off attacks. Performance of proposed technique is analyzed over different MANET routing protocols with variations in number of nodes and it is observed that system provide good amount of throughput with maximum of 20% increase in delay on increase of maximum of 100 nodes. System is reflecting good amount of scalability, optimization of resources and security. Lightweight modeling and policy analysis with lightweight cryptographic primitives shows that the intruders can be detection in few milliseconds without any conflicts in access rights.

구매자와 공급자 간 협력활동이 신뢰 및 성과에 미치는 영향: 거버넌스의 조절효과를 중심으로 (Impacts of Buyer-Supplier Cooperation on Trust and Performance: Moderating Role of Governance Mechanism)

  • 김경태;량훼;이정승
    • 유통과학연구
    • /
    • 제14권8호
    • /
    • pp.113-121
    • /
    • 2016
  • Purpose - This paper aims to examine the impact of buyer-supplier cooperation on suppliers' trust on buyers and the moderating role of buyers' governance mechanism between the sharing activities and trust. Research design, data, and methodology - An integrated research model is designed to materialize the research hypotheses. First, the impact of buyer-supplier cooperation is empirically analyzed by looking into how the sharing activities, in the field of information, resource, and knowledge, of buyer with supplier will affect the trust of supplier on buyer. Second, the moderating effect of contract-based governance mechanism of buyer is empirically analyzed. Third, the influence of trust on innovation performance of suppler is empirically analyzed. Results - Our findings provide supporting evidence for some of our hypotheses. First, all of the sharing activities are significantly influential, but in different degree, to trust of supplier. Second, contract-based governance mechanism of buyer have a moderating effect on the relationship between sharing activities and trust, positively in resource-sharing activities, negatively in information-sharing activities, not significant in knowledge-sharing activities. Third, supplier's trust on buyer positively affects supplier's own innovation performance. Conclusions - The strategies applied in supply chain management have become important as the competition among firms has shifted from competition between individual firms to competition between supply chains. A customer's sharing activities with its supplier may contribute to an increase in innovation performance. The supplier's information-sharing activity with its customer could affect its information-sharing activities with its main supplier. Cooperative activity with a partner in the supply chain is cultivated and amassed into relationship knowledge, and this study shows that the cooperative relational knowledge related to information-sharing activities enables firms to participate in sharing activities with their main suppliers. Increasing evidence shows that sharing various activities between buyer and supplier improves trust and performance outcomes, and enables firms to maintain competitive advantage. From the perspective of knowledge theory, external knowledge is becoming more important in firms' innovation activities, because innovative knowledge is acquired primarily through interaction with another organization. In addition, relationship learning could be an important tool in absorbing the supplier's core technology, information, expertise, and core competencies, increasing relational value.

전자상거래 신뢰서비스를 활성화시키기 위한 선진국들의 정책에 관한 비교 연구 (A Comparative Study on Policies Related To Trust Services in e-Business)

  • 이정우;이종성
    • 디지털융복합연구
    • /
    • 제1권1호
    • /
    • pp.213-234
    • /
    • 2003
  • "Trust" becomes a focal issue in e-business. Unlike traditional business environment, virtual situation requires new trust-ensuring mechanism other than face-to-face meetings and other related means of confirmation. Many countries are trying to foster trust services industry in order to increase e-business transactions and activities. This paper compares and contrasts these countries' policies on trust services. Conclusions of this comparative research includes: (1) trust services industry will be tightly integrated horizontally and increase their scope vertically towards trust in business sense over and beyond the mere technical level trust, (2) necessity of reciprocal trust authentication exchange is calling for an international standard in a near future, and (3) two different types of policies are under development: government-led and industry-led. Advantages and disadvantages of different approaches are presented with details of legal implications and structures of operations.

  • PDF

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.

무선 센서 네트워크에서 False-Praise 공격 대응을 위한 합의 알고리즘 기반의 신뢰 메커니즘 연구 (A Trust Mechanism with Consensus Algorithm against False-Praise Attacks in WSNs)

  • 서태석;조영호
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2019년도 제59차 동계학술대회논문집 27권1호
    • /
    • pp.115-118
    • /
    • 2019
  • 무선 센서 네트워크(Wireless Sensor Network)는 낮은 배터리, 짧은 통신거리 등의 제한된 센서들의 성능에 기인하여 내부자공격(insider attacks)에 취약한 것으로 알려져 있는데, 내부자 공격에 대응하기 위한 대표저인 방법으로 노드들의 행위 관찰하여 신뢰도를 평가하고 낮은 신뢰도를 갖는 노드들을 제거하는 신뢰메커니즘(Trust Mechanism: TM)이 있다. TM은 평가노드 자신의 직접관찰 정보뿐만 아니라 이웃노드의 간접관찰 정보를 함께 고려하도록 발전되어 왔는데, False-Praise 공격은 의도적으로 거짓 관찰 정보를 평가노드에게 제공하여 TM의 신뢰도 평가 프로세스의 신뢰성을 훼손하는 지능적 공격이다. 본 논문에서는 False-Praise 공격에 대응을 위한 합의 알고리즘을 기반의 개선된 TM 제안하고, 실험을 통해 제안 체계의 성능과 효과를 검증한다.

  • PDF

Trust based Mutual Authentication Mechanism for Cloud Computing

  • Mandeeep Kaur;Prachi Garg
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.81-90
    • /
    • 2023
  • Cloud computing is an emerging business model popularized during the last few years by the IT industry. Providing "Everything as a Service" has shifted many organizations to choose cloud-based services. However, some companies still fear shifting their data to the cloud due to issues related to the security and privacy. The paper suggests a novel Trust based Mutual Authentication Mechanism using Secret P-box based Mutual Authentication Mechanism (TbMAM-SPb) on the criticality of information. It uses a particular passcodes from one of the secret P-box to act as challenge to one party. The response is another passcode from other P-box. The mechanism is designed in a way that the response given by a party to a challenge is itself a new challenge for the other party. Access to data is provided after ensuring certain number of correct challenge-responses. The complexity can be dynamically updated on basis of criticality of the information and trust factor between the two parties. The communication is encrypted and time-stamped to avoid interceptions and reuse. Overall, it is good authentication mechanism without the use of expensive devices and participation of a trusted third party.

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments

  • Wu, Xu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권5호
    • /
    • pp.2396-2413
    • /
    • 2018
  • Trust management is one of the most challenging issues for the highly heterogeneous Internet of Things (IoT). In the context of the IoT, it is difficult to evaluate the node's trustworthiness in the same trust model when a node provides different services. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of IoT environments. With these issues in mind, this paper propose a robust and adaptive trust management system for the IoT that is able to measure the trustworthiness of nodes based on feedbacks collected from participants in a specific context and ensure the availability of trust management services. The main contributions of our system are: 1) Proposing a partly decentralized trust management framework, which improves the resiliency of the trust mechanism; 2) Proposing an adaptive trust evaluation scheme and a three-dimensional context representation makes trust evaluation more accurate and specific; 3) Enhancing the adaptive trust evaluation scheme by incorporating a bad behavior factor in trust estimation, which efficiently distinguishes misleading feedbacks from On-Off attacks. Simulation results show the good performance of the proposed system and especially show effectiveness against On-Off attacks compared to other trust mechanisms.

파일 공유 시스템에서 서비스 차별화를 위한 피어 행동 기반의 인센티브 메커니즘 (Incentive Mechanism Based on the Behavior of Peer for Service Differentiation in File Sharing System)

  • 신정화;김태훈;탁성우
    • 한국멀티미디어학회논문지
    • /
    • 제12권5호
    • /
    • pp.717-727
    • /
    • 2009
  • P2P(Peer-to-Peer) 네트워크는 피어간의 협력에 상당히 의존한다. 그러나 일부 피어는 자신의 파일을 전혀 공유하지 않고 필요한 파일의 다운로드만 수행하거나, 질이 낮은 파일이나 다른 피어로부터 요청 횟수가 적은 파일을 공유한다. 피어의 이와 같은 이기적인 행동을 '무임승차(free riding)'라 하고, 피어의 무임승차는 다른 피어의 활발한 참여나 시스템의 성능을 감소시킬 수 있다. 이에 본 논문에서는 신뢰 피어를 이용하여 인센티브 기법의 올바른 사용을 제공하고, 피어의 행동을 참조하여 기여도를 계산하고 인센티브를 할당하는 인센티브 기법 IcMFS(Incentive Mechanism for File Sharing System)를 제안한다. 제안 기법은 대역폭과 TTL(Time-To-Live)을 인센티브로 할당하여 피어의 서비스 이용을 차별화한다. 실험을 통해 피어의 기여도에 따른 서비스 차별화와 신뢰 피어를 이용하여 인센티브 기법의 올바른 사용과 신뢰 피어를 이용함으로써 얻을 수 있는 이점을 살펴보았다. 또 제안 기법의 안정성을 확인하기 위해 인센티브 기법의 부당한 사용으로 피어가 얻는 불이익을 살펴보았다.

  • PDF