• Title/Summary/Keyword: Trust Mechanism

Search Result 165, Processing Time 0.025 seconds

Governance Mechanisms and Opportunism in Inter-firm Relational Exchanges

  • Kim, Sang-Hyun
    • Journal of Distribution Science
    • /
    • v.12 no.1
    • /
    • pp.5-12
    • /
    • 2014
  • Purpose - The general objective of this study is to explain the governance mechanisms of relational exchanges by considering both economic and relational factors. As regards the relationship between opportunism and governance mechanisms, opportunism was hypothesized as being positively related to the use of the authority mechanism, and negatively related with use of the trust mechanism. Research design, data, and methodology - Purchasing relationships between original equipment manufacturers (OEMs) and their component suppliers were chosen as the empirical setting. Purchasing specialists in each company, who interact regularly with suppliers and have the major responsibility for managing the exchange relationships with suppliers, were used as the respondents for this study. A mail survey methodology was employed to collect data in the final field survey. Results - As predicted, opportunistic behavior is found to be negatively related to the use of the trust mechanism and positively related to the use of the authority mechanism. Therefore, the result supports the proposed hypotheses. Conclusions - By integrating research streams, this study contributes to the marketing discipline by improving our understanding of when and why different mixtures of governance mechanisms are used.

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF

Eco-Friendly Behaviors and Trust Mechanism in Building Satisfaction and Loyalty (만족도와 충성도 구축에 있어서의 친환경 행동과 신뢰 메커니즘)

  • Debora, LEE
    • The Korean Journal of Franchise Management
    • /
    • v.14 no.1
    • /
    • pp.57-74
    • /
    • 2023
  • Purpose: As global interest in environmental issues increases, the demand for green products/services is increasing. Companies are establishing eco-friendly policies to meet the changing expectations of customers. Therefore, this study aims to analyze the effect of eco-friendly behavior and third-party certification on trust, satisfaction, and loyalty as well as the mediating role of satisfaction based on SOR and signaling theory. Research design, data and methodology: This study collected data from 501 respondents who visited restaurant and analyzed using measurement model with SPSS 28.0 and SmartPLS 4. Results: First, restaurants' eco-friendly behavior and third-party certification (TPC) positively influenced trust while these did not influence satisfaction. Second, trust positively influenced satisfaction. Third, trust and satisfaction positively influenced loyalty. Fourth, TPC had stronger impact on trust and satisfaction compared to eco-friendly behavior in female group while TPC had stronger impact on trust in male group. Conclusions: This study emphasized the importance of TPC over eco-friendly behavior. Restaurants should maintain pro-environmental behaviors such as reducing single-use items while obtaining TPC such as ISO and LEED certifications to increase customer trust. It also found the importance of trust and satisfaction in securing loyal customers. Restaurants should make efforts to build bonds with customers through authentic marketing such as events that encourage customer participation.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

A Study on the Impact of China's Agricultural Poverty Alleviation Labels on Consumer Purchase Intentions in the Context of Live E-commerce

  • Shuangyang YU;Han-Hsing YU
    • Journal of Distribution Science
    • /
    • v.22 no.3
    • /
    • pp.11-19
    • /
    • 2024
  • Purpose: Thisstudy aimsto explore the mechanism by which poverty alleviation labelsinfluence purchase intentionsin the e-commerce environment, as well as the role of mediating factors within this process. Research Design, Data, and Methodology: The research employs a questionnaire survey method, targeting a sample of 1668 consumers in Anhui Province, China. It focuses on understanding the impact of poverty alleviation labels on e-commerce platforms and the involvement of mediating factors like capability trust, benevolence trust, and honesty trust in this relationship. Results: The results indicate that poverty alleviation labels on e-commerce platforms significantly enhance consumers' purchase intentions. Regression analysis validates the positive impact of poverty alleviation labels on purchase intentions, capability trust, benevolence trust, and honesty trust, revealing the existence of mediating effects. Conclusions: The study provides empirical support for e-commerce poverty alleviation marketing, emphasizing the importance of focusing on and strengthening consumer trust in products. It offers profound insights for both academic research and practical operations in related fields. However, the research is limited to Anhui Province, and future studies could consider expanding the sample size to gain a deeper understanding of regional and cultural variations. Additionally, further research is encouraged to explore the applicability of the findings to other sales channels.

Information Systems Outsourcing: An Integrative Analysis on Contract and Trust from Contingency Perspective (정보시스템 아웃소싱: 상황관점에서 본 계약과 신뢰의 통합적 분석)

  • Lee, Jong-Man;Nam, Ki-Chan;Kim, Yong-Jin
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.133-163
    • /
    • 2007
  • Growth in the outsourcing market signals that firms of all sizes believe outsourcing will ultimately deliver many benefits and conveniences. But there are not many firms satisfied with the results of outsourcing. What is more, previous researches were fragmentary analyses focused on specific variables of outsourcing such as sourcing decisions, partnership rather than comprehensive analysis. Thus, they could not propose general systematic methodologies applicable to the real situation. To solve these problems, we developed an integrated theoretical framework that considered both contract with the hard side and trust with the soft side from a contingency viewpoint and tested this model using 143 data of Korean companies executing outsourcing. In addition, we examined how situational factors(outsourcing task complexity and outsourcing management competence) affects each path in the research model. The results of this study are as follows. First, it was proved the theory that trust is not a substitute for contract but its complement. Previous empirical studies on outsourcing success factors were focused on the establishment of successful partnership on the assumption that trust can replace contract in many situations. According to the results of our empirical analysis, however, contract and trust were in a mutually complementary relation with each other and their emphasis was different. Furthermore, different from previous researches, it was found effective to use trust as a supplementary tool and contract as a main means in outsourcing management strategy. Second, this study provided an integrated view that sees both contract and trust from a contingency viewpoint in theoretically reestablishing the relationship between contract and trust. Previous researches leaned to specific variables or theory-centered fragmentary analysis, but this study proposed a more practical and integrated research model and tested its effectiveness. Based on the results, with the model, decision makers are expected to scrutinize outsourcing situation more closely and to have a practical insight to the situation. Third, it was found that contract mechanism and trust building do not have a direct effect on outsourcing performance but relationship management intensity mediates the effect of contract mechanism and trust building. This is considered significantly meaningful to outsourcing partners who have believed that outsourcing would be successful if a contract is made properly or trust is built. Lastly, the path from trust building to relationship management intensity was moderated by informed buying, as the path coefficients from trust building to relationship management intensity varied by the degree of informed buying competence.

Trust Evaluation Metrics for Selecting the Optimal Service on SOA-based Internet of Things

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • In the IoT environment, there is a huge amount of heterogeneous devices with limited capacity. Existing trust evaluation methods are not adequate to accommodate this requirement due to the limited storage space and computational resources. In addition, since IoT devices are mainly human operated devices, the trust evaluation should reflect the social relations among device owners. There is also a need for a mechanism that reflects the tendency of the trustor and environmental factors. In this paper, we propose an adaptable trust evaluation method for SOA-based IoT system to deal with these issues. The proposed model is designed to minimize the confidence bias and to dynamically respond to environmental changes by combining direct evaluation and indirect evaluation. It is expected that it will be possible to secure trust through quantitative evaluation by providing feedback based on social relationships.

A Load Balancing and Security Scheme of Mobile Agents based on the mobile Trust Model (신뢰모델을 기반으로 한 이동 에이전트의 로드밸런싱과 에이전트 보호 기법)

  • Jung, Chang-Ryul;Lee, Sung-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2337-2344
    • /
    • 2013
  • Mobile Agent is an autonomous mobility technology is being applied in various fields. In particular, mobile agents execution in the Internet environment through the safe execution of the security must be guaranteed. Also, agent to run the agent, the agent's workload should be distributed. In this paper, a trust model based on the security mechanism of the agent execution is proposed. Proposed mechanism to ensure safe execution of the agent was not considered in existing relative researches for rational agent workload distribution and load balancing to improve throughput was. The proposed trust-based security mechanisms for agents to go through security analysis proved safe execution of the agent.

Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing

  • Zhao, Feng;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2067-2080
    • /
    • 2016
  • Cooperative spectrum sensing (CSS) for vacant licensed bands is one of the key techniques in cognitive radio networks. Currently, sequential probability ratio test scheme (SPRT) is considered as a powerful soft decision approach to improve the sensing result for CSS. However, SPRT assumes all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust mechanism. In this paper, we argue that powering SPRT with traditional trust mechanism is not enough. Dynamic SSDF attackers can maintain high trust in an alternant process of submitting honest or false sensing data, resulting in difficultly detecting them. Noting that the trust value of dymamic SSDF attackers behave highly volatile, a novel trusted SPRT scheme (VSPRT) based on volatility decay analysis is proposed in this paper to mitigate the harmful effect of dynamic SSDF attackers in the process of the soft-decision data fusion, and thus improving the accuracy of the final sensing result. Simulation results show that the VSPRT scheme outperforms the conventional SPRT schemes.

Investigating Relationship between Control Mechanisms, Trust and Channel Outcome in Franchise System

  • YI, Ho-Taek;FORTUNE, Amenuvor Edem;YEO, Chan-Koo
    • Journal of Distribution Science
    • /
    • v.17 no.9
    • /
    • pp.67-81
    • /
    • 2019
  • Purpose - The overarching aim of this study is to empirically test the effect of ex-post control mechanisms on multi-dimensional trust and channel performance in franchise systems. Although the franchise system is a vertical marketing channel based on trust between the franchisor and the franchisees, issues related to franchisee's opportunistic behavior have persisted and thus requires research into the effective control system of franchise headquarters. Research design, data, and methodology - In this study, data was collected from 150 franchises to identify the effect of two types of franchising headquarters' control system on the multi-dimensional trust and franchise channel outcome between franchisor and franchisee. To test the hypotheses intended to achieve this aim, structural equations modeling technique is utilized. Results - The results of this research reveal that among the two formal control systems studied (output and process control), output control positively and significantly affects multidimensional trust. Additionally, among the three dimensions of trust employed in this study, only expertise has a positive and significant effect on contract compliance. Equally, only expertise and integrity have a negative and significant effect on opportunistic behavior. Conclusions - The study provides managerial and theoretical insights into understanding ex-post control mechanisms, trust, compliance and opportunistic behaviors in franchise systems.