• Title/Summary/Keyword: Trust in Other Users

Search Result 90, Processing Time 0.024 seconds

Personal Information Disclosure Control in Context-aware Healthcare Applications (컨텍스트 인식 헬스케어 어플리케이션을 위한 개인화된 정보 공개 기법)

  • Rashid, Umar;Choi, Ah-Young;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.970-975
    • /
    • 2006
  • There is a tradeoff between user's privacy and utility of context-aware services in ubiquitous computing environments. Many privacy models have been proposed to support the disclosure of personal information at different levels of detail, in ubiquitous computing environments. However, most of these models do not allow for explicit criteria to assess the benefit users are likely to reap by disclosing their personal information. In this paper, we propose an automated decision making mechanism that evaluates the "benefit of disclosure" for the users based on trust relationships between users and information requesters and manages the disclosure of user's personal information accordingly. Unlike other trust models, we do not regard the reputation of an information requester as sufficient to determine his/her trustworthiness. Instead, we represent trustworthiness as a function of information requester's reputation in the eyes of the user and his/her competence in a given context. To validate our mechanism, we apply it to context-aware healthcare application that monitors physiological condition of a user.

  • PDF

A Quantitative Trust Model based on Empirical Outcome Distributions and Satisfaction Degree (경험적 확률분포와 만족도에 기반한 정량적 신뢰 모델)

  • Kim, Hak-Joon;Sohn, Bong-Ki;Lee, Seung-Joo
    • The KIPS Transactions:PartB
    • /
    • v.13B no.7 s.110
    • /
    • pp.633-642
    • /
    • 2006
  • In the Internet environment many interactions between many users and unknown users take place and it is usually rare to have the trust information about others. Due to the lack of trust information, entities have to take some risks in transactions with others. In this perspective, it is crucial for the entities to be equipped with functionality to accumulate and manage the trust information on other entities in order to reduce risks and uncertainty in their transactions. This paper is concerned with a quantitative computational trust model which takes into account multiple evaluation criteria and uses the recommendation from others in order to get the trust for an entity. In the proposed trust model, the trust for an entity is defined as the expectation for the entity to yield satisfactory outcomes in the given situation. Once an interaction has been made with an entity, it is assumed that outcomes are observed with respect to evaluation criteria. When the trust information is needed, the satisfaction degree, which is the probability to generate satisfactory outcomes for each evaluation criterion, is computed based on the empirical outcome outcome distributions and the entity's preference degrees on the outcomes. Then, the satisfaction degrees for evaluation criteria are aggregated into a trust value. At that time, the reputation information is also incorporated into the trust value. This paper also shows that the model could help the entities effectively choose other entities for transactions with some experiments in e-commerce.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

Information Verification Practices and Perception of Social Media Users on Fact-Checking Services

  • Rabby Q., Lavilles;January F., Naga;Mia Amor C., Tinam-isan;Julieto E., Perez;Eddie Bouy B., Palad
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.1-13
    • /
    • 2023
  • This study determines how social media users (SMUs) verify the information they come across on the Internet. It determines SMUs' perception of online fact-checking services in terms of their ease of use, usefulness, and trust. By conducting a focus group discussion and key informant interviews, themes were derived in determining fact-checking practices while a survey was further conducted to determine such perceived ease of use, usefulness, and trust in fact-checking services. The thematic analysis revealed major information verification practices, such as cross-checking and verifying with other sources, inspecting comments and reactions, and confirming from personal and social networks. The results showed that SMUs considered fact-checking services easy to use. However, a concern was raised about their usefulness stemming from the delayed action in addressing the information issues that need to be verified. As to perceived trust, it was found that SMUs have reservations about fact-checking services. Finally, it is believed that fact-checking services are expected to be credible and need to be promoted to mitigate any form of fake news, particularly on social media platforms.

PGP Certification System in Blockchain Environments (블록체인 환경에서의 PGP 인증 시스템)

  • Kim, Daehan;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.658-666
    • /
    • 2020
  • PGP is an encryption software designed to provide information protection, security and authentication services for online communication systems. The characteristic of behavior done on the Internet is that you don't know the other person. It is very important to protect information from someone you cannot trust. So identification of the other person is an important task. PGP uses an digital signature algorithm to verify the identity of the other party. However, it is not accurate to check the other party's credibility. PGP increases trust as other users sign more on public keys of user. In other words, credibility is not perfect. In this paper, PGP certification system that key management in Ethereum blockchain, one of the blockchain platforms, is proposed. Key management in blockchain ensures data integrity, transparency and reliability.

The Effect of Trust and Distrust on the Purchase Intention at Internet Shopping Malls - Focusing on the Chinese Users - (인터넷 쇼핑몰에서 신뢰와 불신이 구매의도에 미치는 영향 - 중국 인터넷 쇼핑몰 사용자를 중심으로 -)

  • Park, Hye-Ryung
    • Fashion & Textile Research Journal
    • /
    • v.11 no.5
    • /
    • pp.741-752
    • /
    • 2009
  • As a major obstacle to active online purchase at the level of consumer in China, distrust is raised in this study. Most of previous studies showed that trust is a major variable to cause a relational unity between company and consumer, on the other hand, this study attempts to show that according to the two dimensional point of view regarding trust each dimension of both trust and distrust distinctly contributes to marketing achievement. Interaction, perceived popularity, information usefulness, perceived security risk and perceived dealing risk were created as preceding variable, trust and distrust were constituted as parameter and relation absorption and purchase intention as consequential variable. These variables were analyzed with structural equation modeling (SEM) in LISREL 8.3 program. The results for this study are as follows. First, relation between exchange actors in marketing is divided into two concepts of trust and distrust differently from the previous studies. On the assumption that trust and distrust might exist simultaneously and they would distinctly have an influence on marketing consequency such as relation absorption and repurchase intention, it is identified that trust and distrust are a different dimension in online context. Second, the formative factor of online trust-distrust is identified and it is shown what relationship between internet shopping mall and relation absorption and foregoing purchase intention resulting from online trust-distrust exists. Third, it is shown that in online context the formative factor of online trust-distrust is distinctly contributed to relation absorption and repurchase intention. It is suggested that trust needs to be managed two-dimensionally separating from trust and distrust. Fourth, it is shown that both trust and distrust factor in terms of relation absorption and repurchase intention of consumer in internet shopping mall are significant variables. Trust is linked with repurchase intention through relation absorption, however, distrust is not directly linked with repurchase intention through relation absorption. Thus, the ripple effect of distrust appears to be much higher than that of trust.

A study on the current status and ways of activating 3PL (제3자물류의 실태분석 및 활성화 방안에 관한 연구)

  • 이충규;김준석
    • Journal of Korea Port Economic Association
    • /
    • v.18 no.2
    • /
    • pp.65-90
    • /
    • 2002
  • Despite the importance and necessity, the 3PL has not been activated to date. Among many views, customers claim that logistics service provider(LSP) are not prepared or capable of offering satisfactory 3PL services, while LSP emphasize the lack of mutual trust, closed corporate culture of the customer and excessive demand for reducing the costs. With this keeping in mind, it surveyed difference of perception between users and providers of 3PL services in terms of the actual status of using 3PL services, the degree of satisfaction and key factors for selecting 3PL provider through the questionnaire. As shown in this study, 43.3% of the respondents outsourced logistics services. However, Most company outsourced only inland transportation (49.5%) which is a simple and limited scope of 3PL services, but it also indicated that the percentage of users have ranged was less then 10% in outsourcing their whole logistics sector to 3PL provider and employing other logistics functions. Among respondents, a majority of the service provider stated that they offered satisfactory cost-saving to the customers, while users felt that the degree of satisfaction for using 3PL services was evaluated as at an average level and they more highly regarded the strong partnership of their 3PL provider rather than the saving of cost and improvement of customer's services. Moreover, in contrast to the 3PL providers which regard the most important factor for selecting 3PL service provider is the logistics cost quoted, users of 3PL services felt that the quality of services was more significant than the reduction of cost, and this tendency for selecting 3PL providers was shown in more advanced countries. While users of 3PL services indicated that the main reason for not using 3PL services was to avoid disclosing information of their business and it costs much for employing 3PL providers than doing themselves, 3PL providers thought it was due to reluctancy of opening information and resistance from the logistics division engaged in logistics activities concerned. Accordingly, providers and users of 3PL services should trust each other and prepare plan to activate 3PL services under the collaborative relationships as soon as possible.

  • PDF

The Effect of Features and Motivators of Mobile Phone on Repurchasing Intention: Focusing on Difference Between Korea and Indonesia (휴대폰의 재구매 동기에 관한 국가간 비교 연구 : 한국과 인도네시아를 중심으로)

  • Lee, Jong-Oh;Whang, Jae-Hoon
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.159-174
    • /
    • 2007
  • The purpose of this research is to investigate the relationships among the perceived satisfaction, the perceived the trust, the commitment, the key features for mobile phone, the brand image, the switching cost and the repurchasing intention. We also examine the differences between Korean and Indonesian markets concerning the relationships of these key successfactors. The structural model is tested with the data form each of the sub-samples (i. e. Korean and Indonesian users taken separately). Properties of the casual paths, including standardized path coefficients, the significance of difference, and variance explained for trust, satisfaction, commitment and repurchasing in the hypothesized model, are presented. This study indicated that hardware (sound quality, LCD display, design) user interface (GUI, Menu, Key pad) and extra functions (camera phone, wireless internet, MP3 player) are the three important factors effecting the trust and the satisfaction. The proposed model has been newly tested from the technological prospective in order to get the more practical result. Following the model test, we conduct a test of the differences in path coefficients between Korean and Indonesian users. MSEM show that, compared to Korean market, Indonesian had more emphasized on extra-function for the mobile phone as well as giving more influence to the satisfaction from the brand image. It means Korean market consider the extra-function as basic or no-premium points. And the satisfaction has been effected by switching-cost in Korea but the trust in Indonesia. Other interesting result from the structural weight invariance indicate that, compared to Korean market, the brand-image has effected the satisfaction in addition to placing more the trust on determining the commitment in Indonesia.

  • PDF

Contents Recommendation Scheme Considering User Activity in Social Network Environments (소셜 네트워크 환경에서 사용자 행위를 고려한 콘텐츠 추천 기법)

  • Ko, Geonsik;Kim, Byounghoon;Kim, Daeyun;Choi, Minwoong;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.404-414
    • /
    • 2017
  • With the development of smartphones and online social networks, users produce a lot of contents and share them with each other. Therefore, users spend time by viewing or receiving the contents they do not want. In order to solve such problems, schemes for recommending useful contents have been actively studied. In this paper, we propose a contents recommendation scheme using collaborative filtering for users on online social networks. The proposed scheme consider a user trust in order to remove user data that lower the accuracy of recommendation. The user trust is derived by analyzing the user activity of online social network. For evaluating the user trust from various points of view, we collect user activities that have not been used in conventional techniques. It is shown through performance evaluation that the proposed scheme outperforms the existing scheme.

Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems

  • Oh, Hyun-Kyo;Kim, Sang-Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2171-2195
    • /
    • 2017
  • When purchasing an online product, a customer tends to be influenced strongly by its reputation, the aggregation of other customers' ratings on it. The reputation, however, is not always trustable since it can be manipulated easily by attackers who intentionally give unfair ratings to their target products. In this paper, we first address identifying trustable users who tend to give fair ratings to products in online rating systems and then propose a method of computing true reputation of a product by aggregating only those trustable users' ratings. In order to identify the trustable users, we list some candidate features that seem related significantly to the trustworthiness of users and verify the robustness of each of the features through extensive experiments. By finding and exploiting these robust features, we are able to identify trustable users and to compute true reputation effectively and efficiently based on fair ratings of those trustable users.