• Title/Summary/Keyword: Trust evaluation model

Search Result 95, Processing Time 0.025 seconds

A Study on Development of Technology Evaluation Model - Focus on Value Estimation for Presentation in the Transfer of Technology and a Trade Criterion- (개별기술 평가모델 개발에 관한 연구 - 기술 이전 .거래 기준 제시를 위한 가치평가를 중심으로 -)

  • 최락인;박종오
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.2
    • /
    • pp.130-142
    • /
    • 2000
  • A model of value estimation for Technology Evaluation refers to technology and trade criterion is Presented on this study. Technology evaluation will be recognized to immediately solve the problem in government, Policy executive organs, enterprises. There is a necessity for fixing of technology evaluation institution to objectify technology evaluation method and means, to train and accumulate specialist of technology evaluation, to specialize technology evaluation organ, to secure public-trust, to spread application of technology evaluation results. And there will be become established consideration is indispensable to organize and operate Technology Exchange.

  • PDF

The Determination of Trust in Franchisor-Franchisee Relationships in China (중국 프랜차이즈 시스템에서의 본부와 가맹점간 신뢰의 영향요인)

  • Shin, Geon-Cheol;Ma, Yaokun
    • Journal of Global Scholars of Marketing Science
    • /
    • v.18 no.2
    • /
    • pp.65-88
    • /
    • 2008
  • Since the implementation of economic reforms in 1978, the Chinese economy grows rapidly at an average annul growth rate of 9% over the post two decades. Franchising has been widely recognized as an important source of entrepreneurial activity. Trust is important in that it facilitates relational exchanges by permits partners to transcend short-run inequities or risks to concentrate on long-term profits or gains. In the relationship between the franchisors and franchisees, trust has been described as an important source of competitive advantage. However, little research has been done on the factors affecting trust in Chinese franchisor-franchisee relationships. The purpose of this study is to investigate what factors affect the trust in the franchise system in China, and to provide guidelines and insights to franchisors which enter Chinese market. In this study, according to Morgan and Hunt (1994), trust is defined as the extending when one party has confidence in an exchange partner's reliability and integrity. We offered a conceptual model of the empirical study. The model shows that the factors affecting the trust include franchisor's supports, communication, satisfaction with previous outcome and conflict. We also suggested the franchisor's supports and communication like to enhance the franchisee's satisfaction with previous outcome, and the franchisor's supports, communication and he franchisee's satisfaction with previous outcome tend to decrease conflict. Before the formal study, a pretest involving exploratory interviews with owners from three franchisees was conducted to make sure the questionnaire was relevant and clear to the respondents. The data were collected using trained interviewers to carry out personal interviews with the aid of an unidentified, muti-page, structured questionnaire. The respondents comprised of owners, managers, and owner managers of franchisee-owned food service franchises located in Beijing, China. Even though a total of 256 potential franchises were initially contacted, the finally usable sample consisted of 125 respondents. As expected, the sampling method was successful in soliciting respondents with waried personal and firm characteristics. Self-administrated questionnaires were used for all measures. And established scales were used to measure the latent constructs in this study. The measures tapped the franchisees' perceptions of the relationship with the referent franchisor. Five-point Likert-type scales ranging from "strongly disagree" (=1) to "strongly agree" (=7) were used throughout the constructs (trust, eight items; support, five items; communication, four items; satisfaction, six items; conflict, three items). The reliability measurements traditionally employed, such as the Cronbach's alpha, were used. All the reliabilities were greater than.80. The proposed measurement model was estimated using SPSS 12.0 and AMOS 5.0 analysis package. We conducted A series of exploratory factor analyses and confirmatory factor analyses to assess the convergent validity, discriminant validity, and reliability. The results indicate reasonable overall fits between the model and the observed data. The overall fit of measurement model were $X^2$= 159.699, p=0.004, d.f. = 116, GFI =.879, NFI =.898, CFI =.969, IFI =.970, TLI =.959, RMR =.058. The results demonstrated that the data reasonably fitted the model. We also examined construct reliability and reliability and average variance extracted (AVE). The construct reliability of each construct was greater than.80 and the AVE of each construct was greater than.50. According to the analysis of Structure Equation Modeling (SEM), the results of path model indicated an adequate fit of the model: $X^2$= 142.126, p = 0.044, d.f. = 115, GFI =.892, NFI =.909, CFI =.981, IFI =.981, TLI =.974, RMR =.057. As hypothesized, the results showed that it is strategically important to establish trust in a franchise system, and the franchisor's supports, communication and satisfaction with previous outcome tend to reinforce franchisee's trust. The results also showed trust seems to decrease as the experience of conflict episodes increases. And we also noticed that franchisor's supports and communication tend to enhance the franchisee's satisfaction with previous outcome, and communication tend to decrease conflict. If the trust between the franchisor and franchisee can be established in a franchise system, franchising offers many benefits and reduces many costs. To manage a mutual trust of relationship with their franchisees, franchisor's should provide support effectively to their franchisees. Effective assistant services have direct effect on franchisees' satisfaction with previous outcome and trust in franchisor. Especially, franchise sales process, orientation, and training in the start-up period are key elements for success of the franchise system. Franchisor's support is an accumulated separate satisfaction evaluation with different kind of service provided by the franchisor. And providing support definitely can improve the trustworthy image of the franchisor. In the franchise system, conflicts of interests and exertions of different power sources are very common. The experience of conflict episodes seems to negatively relate to trust. Therefore, it is important to reduce the negative side of the relationship conflicts. Communication actually plays a broader role in reducing conflict and establish mutual trust in franchisor-franchisee relationship. And effective communication between franchisors and franchisees can improve franchisees' satisfaction toward the franchise system. As the diversification of Chinese markets, both franchisors and franchisees must keep the relevant, timely, and reliable communication. And it is very important to improve the quality of communication. Satisfaction with precious outcomes seems to positively relate to trust. Franchisors and franchisees that are highly satisfied with the previous outcomes that flow from their relationship will perceive their partner as advancing their goal achievement. Therefore, it is necessary for both franchisor and their franchisees to make the welfare of partner with effort. Little literature has focused on what factors affect the trust between franchisors and their franchisees in China. This study developed the hypotheses regarding the factors affecting trust in the transaction relationship. The results of data analysis supported the hypotheses strongly. There are certain limitations in this study. First, we may point out that some other factors missed in this study could be significantly important. Second, the context of this study, food service industry, limits its potential generalizability for all franchise systems. More studies in different categories of franchise system are needed to broaden its generalizability. Third, the model was tested empirically in a sample in Beijing, more empirical tests of the proposed model in other Chinese areas are needed. Finally, the analysis in this study was solely based on the perception of franchisees and the opinions of franchisors were not included.

  • PDF

Development of The Korean Trust Index for Social Network Services (한국의 소셜네트워크서비스 신뢰지수 KTI 설계)

  • Kim, Yukyong;Jhee, Eun-Wha;Shin, Yongtae
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.35-45
    • /
    • 2014
  • Due to the spread of unreliable online information on the social network services, the users are faced with a difficult problem for determining if the information is trustworthy or not. At present, the users should make a decision by themselves throughly for the trustworthiness of the information. Therefore, we need a way to systematically evaluate the trustworthiness of information on the social network services. In this paper, we design a trust index, called KTI (Korean Trust Index for SNS), as a criterion for measuring the trust degree of the information on the social network services. Using KTI, the users are readily able to determine whether the information is trustworthy. Consequently, we can estimate the social trust degree based on the variation of KTI. This paper derives the various factors affecting trust from the properties of the social network services, and proposes a model to evaluate the trustworthiness of information that is directly produced and distributed over the online network. Quantifying the trust degree of the information on the social network services allows the users to make efficient use of the social network.

A Service Selection Method using Trust Evaluation in QoS based Web Services Composition (QoS 기반 웹서비스 조합에서 신뢰성 평가를 통한 서비스 선택 기법)

  • Kim, Yu-Kyong;Ko, Byung-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.1
    • /
    • pp.1-9
    • /
    • 2009
  • In heterogeneous and distributed computing environments, with an increasing number of Web services providing similar functionalities, the reliability of Web services is a critical decision factor. To fulfill the open business model such as cooperation among enterprises, several Web services can be composed into the upper level business transaction. In Web services composition, the reliability of services is more and more critical. Though each unit Web service can be reliable, the reliability of the composed service is not guaranteed. Thus a way to efficiently assess and select composed Web services is needed. In this paper, we define new metrics for measuring the trust value of Web services, and propose an evaluation method to predict the trustworthy degree of the composed services based on the metrics. We also define a conceptual framework to support optimal Web services selection based on the proposed trust evaluation method. By selecting using the quantitative measurement rather than intuitive selection of the service user, it allows the service users to select the high reliable service meeting their quality requirements well.

A Study on Antecedents of Online Trust in the Context of e-Government Services (전자정부 서비스 사용에 있어 온라인 신뢰에 관한 연구)

  • Moon, Chul-Woo;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.57-67
    • /
    • 2011
  • Trust is generally assumed to be an important precondition for people's adoption of e-government services. This study analyzes the direct and indirect impact of information privacy, interactivity, subjective norms and words-of-mouth on perceived trust of e-government services and trust toward government. The Partial Least Square(PLS) was applied to the citizen survey data for hypotheses testing. PLS permits the simultaneous testing of cause-effect hypotheses while also allowing evaluation of the measurement model. Statistical results indicate that interactivity, subjective norms and words-of-mouth positively affects perceived trust of e-government services, which in turn affects the level of political efficacy and the trust toward the government. Interactivity has been found to affect words-of-mouth as well. However, information privacy has no significant effect on the trust of e-government services.

The Study of Safety and Trust Certification Evaluation Model of Electronic Commerce System (안전하고 신뢰할 수 있는 전자상거래 정보시스템 인증.평가모델에 관한 연구)

  • 조영훈;김석우
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.117-120
    • /
    • 2002
  • 이 논문에서는 전자상거래에서의 안전하고 신뢰할 수 있는 이용여건을 마련하기 위해 자율규제로 추진되고 있는 국내외 인터넷 평가모델에 대한 분석과 효율적인 전자상거래 인증· 평가모델을 제시한다.

  • PDF

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.

The Design and Development of On-line Game Characteristic Evaluation System by a Heuristic Evaluation Item (사용성(Heuristics) 평가 항목을 통한 온라인 게임성 평가 시스템 설계 및 구현)

  • Kang, Ki-Ho;Choi, Hwan-Eon;Jung, Chool-Gon;Hong, Soo-Bong
    • Journal of Korea Game Society
    • /
    • v.9 no.1
    • /
    • pp.63-74
    • /
    • 2009
  • This paper mainly focused on research developing online game characteristic evaluation system based on game characteristic evaluation model design. Online game characteristic evaluation system is a system that evaluates game online in real-time using evaluation elements defined by model design. Game characteristic evaluation system uses heuristic evaluation method, which is used to execute evaluation in four parts, technical element, manage element, social element, and competitive element. To verify objectivity and validity of game characteristic evaluation, assessment was performed by three groups of beginners, intermediates, and professionals to increase the trust. And game characteristic evaluation forum was hosted to collect opinion from diverse classes.

  • PDF