• Title/Summary/Keyword: Trust Network

Search Result 508, Processing Time 0.03 seconds

A Study on the Relationship among Communication Competency, Social Network Centralities, Discussion Performance, and Online Boarding Activity in the Team Based Learning (팀 기반 토의 수업에서 의사소통능력, 사회연결망 중심도, 토론성과 및 온라인 게시활동의 관계 연구)

  • Heo, Gyun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.27 no.1
    • /
    • pp.108-114
    • /
    • 2015
  • The purpose of this study is to find the relationships among communication competency, social network centrality(trust centrality and knowledge sharing centrality), discussion performance, and online boarding activity in the team based learning situation. For investigating this topic, 44 students are participated in the classes of educational technology. In order to find out the relationships among communication competency, social network centrality, discussion performance, and online boarding activity, compared t-test and path analysis are used. Followings are the results of the research: (a) Communication competency is improved significantly after team based learning. (b) Trust centrality effects significantly on the knowledge sharing centrality. (c) Knowledge sharing effects significantly on discussion performance. (d) Trust centrality effects on the online boarding activity in the team based learning.

The Impact of Social Network Service, Trust and Cognition on Customer Loyalty in Internet Shopping

  • Sun, Han-Gil
    • Journal of Information Management
    • /
    • v.42 no.2
    • /
    • pp.211-234
    • /
    • 2011
  • The development of information technology improves the globalization of the world economy. This change was able to expand the cyber space, and the online community known as the cyber community is made within the existing offline community. From the cyber community's activity, the concept of social network services created, and recently developed social computing. Social computing is the current situation and the next step in the online community. Currently, most CIOs are using social computing for workplace empowerment. As online transactions become more active, the strategy to increase customer loyalty in Internet shopping is an effective tool to increase profit for the company, and as a method to maintain competitive. With the growth of electronic commerce, through insurance of customer loyalty on the Internet, a company can establish a long-term relationship with customers, so for this, it is important to have reliable relationship with customers. Also, through advertisement and commercial information, the cognition of Internet shopping looks can be effective in retaining customers. In this study, it explores how social computing and trust and cognition of Internet shopping are effective in maintaining customer loyalty. As the result of study, the trust and cognition of Internet shopping are significantly effective on customer loyalty, but the sense of social computing. Still, social computing has not matured enough to be as effective in retaining customer loyalty. However, it does indicate that social computing has significantly increased the trust and cognition in Internet shopping. In this study, as the concepts of the social network service and social computing are applied in Internet shopping, which are actively discussed by scholars, it is expected that the basis of the study could improve and present the idea of social shopping.

A Study on the Effects of Social Capital on Collaborative governance (사회적자본이 협력적거버넌스에 미치는 영향에 관한 연구)

  • Yu, Mi-Hyun;Na, Ju-Mong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.4
    • /
    • pp.37-46
    • /
    • 2017
  • In this research, we conducted an empirical study on the influence of social capital on cooperative governance for the Gwangju city social economy. The results of the study are as follows. First, the social capital factor commonly affecting cooperative governance is trust. Secondly, we were able to learn that there was a difference in the results of the hierarchical regression analysis to grasp the magnitude of the relative influence of detailed elements of social capital by cooperative governance factors in order. Network(4.843) exerted the most influence in Common Decision-making, followed by Trust(3.855). Trust(3.130) exerted the most influence on Management of Governance, followed by Network(2.936). Network(2.647) exerted the most influence on Cowork System, followed by Trust(2.244). Finally, Network(4.153) exerted the most influence on Partnership Building, followed by Trust(2.244). In particular, 'Participation' was an important factor in 'Co-work System'.

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

A Unified Trust Model for Pervasive Environments - Simulation and Analysis

  • Khiabani, Hamed;Idris, Norbik Bashah;Manan, Jamalul-Lail Ab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1569-1584
    • /
    • 2013
  • Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. Trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.

A study on the relationship between trust and innovative activities : focused on firms in regional innovation clusters (신뢰와 혁신활동간의 관계연구 클러스터내 기업활동 측면에서)

  • Hee, Han-Jung
    • Proceedings of the KAIS Fall Conference
    • /
    • 2008.05a
    • /
    • pp.361-364
    • /
    • 2008
  • A aim of this study is to show that trust formed among actors in clusters effects on the innovation for firms. This paper finds that trust is not enough formed. firms feel trust in relationship between firms and universities and between firms and research institutes. However, trust not to be formed in relationship between firm and public agencies and between firms and other firms. By mean of the finding, the various network types which can facilitate trust must be made by policy support.

  • PDF

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment

  • Liu, Zhiquan;Ma, Jianfeng;Jiang, Zhongyuan;Miao, Yinbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.914-934
    • /
    • 2016
  • In the mobile distributed environment, an entity may move across domains with great frequency. How to utilize the trust information in the previous domains and quickly establish trust relationships with others in the current domain remains a challenging issue. The classic trust models do not support cross-domain and the existing cross-domain trust models are not in a fully distributed way. This paper improves the outstanding Certified Reputation (CR) model and proposes a Lightweight Cross-domain Trust (LCT) model for the mobile distributed environment in a fully distributed way. The trust certifications, in which the trust ratings contain various trust aspects with different interest preference weights, are collected and provided by the trustees. Furthermore, three factors are comprehensively considered to ease the issue of collusion attacks and make the trust certifications more accurate. Finally, a cross-domain scenario is deployed and implemented, and the comprehensive experiments and analysis are conducted. The results demonstrate that our LCT model obviously outperforms the Bayesian Network (BN) model and the CR model in our cross-domain scenario, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities.

How Shipping Company Satisfies Shippers Through Service Quality in South Korea: The Mediation Role of Trust

  • Roh, Taewoo;Park, Keun-Sik;Oh, Yeeun;Noh, Jinho
    • Journal of Korea Trade
    • /
    • v.25 no.5
    • /
    • pp.19-38
    • /
    • 2021
  • Purpose - This study aims to verify the direct causal relationship between cost competitiveness and global network competitiveness, which are the tangible service quality factors determined by the shipping company, which in turn affect the shipper's customer satisfaction. Additionally, we empirically investigate the intangible, related service qualities determined by shipping companies, such as operational competitiveness and customer relationship quality, and how these then positively affect customer satisfaction through the formation of trust. Therefore, we examine the mediating effect of trust formation among different contractors for shipping services. Design/methodology - In order to examine the shipping company's tangible and intangible service-qualities perceived by the shipper on customer satisfaction and the process of trust formation between contractors, we collected valid data from 114 respondents out of 200 distributed questionnaires. The respondents consisted of domestic freight forwarders who engage with domestic and international shipping and logistics agencies. Descriptive statistics, confirmatory factor analysis, reliability, convergent and discriminant validities, common method bias, and PLS-SEM (partial least square-structural equation model) were analyzed using the program STATA 16. Findings - The findings of this study are as follows. First, our results showed that all hypotheses assumed in this study had statistically significant supporting evidence. Second, it was found that the mediating effect of trust was significant in affecting the quality of intangible service- qualities for customer satisfaction. Third, through supplementary analysis, we found that the global network competitiveness of domestic shipping companies will increase in importance in the future. In conclusion, the theoretical and practical implications of these findings are presented. Originality/value - This study reaffirmed the traditional causal relationship between customer satisfaction and tangible service quality. Additionally, we also contribute to the literature on the understanding of the causal relationship between trust formation and customer satisfaction through intangible interactions from a long-term perspective.

Study on Zero Trust Architecture for File Security (데이터 보안을 위한 제로 트러스트 아키텍처에 대한 연구)

  • Han, Sung-Hwa;Han, Joo-Yeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.443-444
    • /
    • 2021
  • Security threats to information services are increasingly being developed, and the frequency and damage caused by security threats are also increasing. In particular, security threats occurring inside the organization are increasing significantly, and the size of the damage is also large. A zero trust model has been proposed as a way to improve such a security environment. In the zero trust model, a subject who has access to information resources is regarded as a malicious attacker. Subjects can access information resources after verification through identification and authentication processes. However, the initially proposed zero trust model basically focuses on the network and does not consider the security environment for systems or data. In this study, we proposed a zero trust-based access control mechanism that extends the existing zero trust model to the file system. As a result of the study, it was confirmed that the proposed file access control mechanism can be applied to implement the zero trust model.

  • PDF