• Title/Summary/Keyword: Trust in Other Users

Search Result 90, Processing Time 0.023 seconds

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System

  • Zhang, Wei;Wu, Yi;Xiong, Hu;Qin, Zhiguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.302-322
    • /
    • 2021
  • In the system of ciphertext policy attribute-based encryption (CP-ABE), only when the attributes of data user meets the access structure established by the encrypter, the data user can perform decryption operation. So CP-ABE has been widely used in personal health record system (PHR). However, the problem of key abuse consists in the CP-ABE system. The semi-trusted authority or the authorized user to access the system may disclose the key because of personal interests, resulting in illegal users accessing the system. Consequently, aiming at two kinds of existing key abuse problems: (1) semi-trusted authority redistributes keys to unauthorized users, (2) authorized users disclose keys to unauthorized users, we put forward a CP-ABE scheme that has authority accountability, user traceability and supports arbitrary monotonous access structures. Specifically, we employ an auditor to make a fair ruling on the malicious behavior of users. Besides, to solve the problem of user leaving from the system, we use an indirect revocation method based on trust tree to implement user revocation. Compared with other existing schemes, we found that our solution achieved user revocation at an acceptable time cost. In addition, our scheme is proved to be fully secure in the standard model.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.147-165
    • /
    • 2009
  • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.

Recommendation Technique using Social Network in Internet of Things Environment (사물인터넷 환경에서 소셜 네트워크를 기반으로 한 정보 추천 기법)

  • Kim, Sungrim;Kwon, Joonhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.47-57
    • /
    • 2015
  • Recently, Internet of Things (IoT) have become popular for research and development in many areas. IoT makes a new intelligent network between things, between things and persons, and between persons themselves. Social network service technology is in its infancy, but, it has many benefits. Adjacent users in a social network tend to trust each other more than random pairs of users in the network. In this paper, we propose recommendation technique using social network in Internet of Things environment. We study previous researches about information recommendation, IoT, and social IoT. We proposed SIoT_P(Social IoT Prediction) using social relationships and item-based collaborative filtering. Also, we proposed SR(Social Relationship) using four social relationships (Ownership Object Relationship, Co-Location Object Relationship, Social Object Relationship, Parental Object Relationship). We describe a recommendation scenario using our proposed method.

Operation Strategy in Online Knowledge Sharing Community (지식공유 목적의 가상 커뮤니티 운영전략에 관한 연구)

  • Lee, Kook-Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.4
    • /
    • pp.95-118
    • /
    • 2009
  • Virtual community, which is formed on the internet, is expected to serve the needs of members for communication, information, and knowledge sharing. The executives of organizations should consider operating strategy of virtual community as a new innovation or knowledge pool since members share knowledge. However, many virtual community have failed due to members' low willingness to engage and furthermore to share knowledge with other members. Thus, there is a need to understand and foster the determinants of members' loyalty in virtual community. The objective of this study is to develop an integrated model designed to investigate and explain the relationships between contextual factors, personal perceptions of virtual community, usefulness, ease of use, familiarity, members' trust, reputation, community trust, attitude, satisfaction and loyalty. Empirical data was collected from 286 internet users and tested using structural equation modeling to verify the fit of the hypothetical model. The results show that the usefulness, familiarity significantly influences attitude and members' trust is significantly influence the community trust. And I confirmed that ease of use and attitude play the role of determinants in making the satisfaction, community trust and reputation influence the satisfaction that have the direct effect to making the loyalty. The results of the study can be used to identify the loyalty in virtual community. By investigating the impacts of contextual factors and personal perceptions on virtual community, the integrated model better explains behavior than other proposed models. This study might help executives of virtual communities and organizations to manage and promote community trust, attitude, satisfaction to stimulate members' willingness to revisit the community and futhermore enhance their virtual community loyalty.

  • PDF

A Study on the Need of the Usable Security in the Corelation between IT Security and User Experience

  • Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.14-18
    • /
    • 2017
  • In this paper, an contemplate the direction for Usable Security in IT security and User Experience. To evaluate how the user interface is convenient to use, we examine the components such as the property, learnable property, memory simplicity, faults and satisfaction level. By considering for the security, we should bring positive effects on the user experience. By emphasizing usability and security at the same time, we should increase the satisfaction level of the user experience and then produce the valuable experience through participation, use and observation. The positive user experience is the important task for the software engineering, business administration and others., and this will result satisfaction of the users, brand trust, and success in the market. On the other hand, for the negative user experience, the users cannot achieve their desired goal and therefore, are unsatisfied due to emotional, rational and economic inconvenience. Due to this, we should try to maintain a certain level of usability and security of the system in IT security and User Experience.

Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks

  • Kong, Jong-Hwan;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.421-433
    • /
    • 2015
  • Recently, there have been fast-growing social network services based on the Internet environment and web technology development, the prevalence of smartphones, etc. Social networks also allow the users to convey the information and news so that they have a great influence on the public opinion formed by social interaction among users as well as the spread of information. On the other hand, these social networks also serve as perfect environments for rampant malware. Malware is rapidly being spread because relationships are formed on trust among the users. In this paper, an effective patch strategy is proposed to deal with malicious worms based on social networks. A graph is formed to analyze the structure of a social network, and subgroups are formed in the graph for the distributed patch strategy. The weighted directions and activities between the nodes are taken into account to select reliable key nodes from the generated subgroups, and the Incremental PageRanking algorithm reflecting dynamic social network features (addition/deletion of users and links) is used for deriving the high influential key nodes. With the patch based on the derived key nodes, the proposed method can prevent worms from spreading over social networks.

Usability Evaluation of Mobile Banking Applications in Digital Business as Emerging Economy

  • Hamid, Khalid;Iqbal, Muhammad Waseem;Muhammad, Hafiz Abdul Basit;Fuzail, Zubair;Ghafoor, Zahid Tabassum;Ahmad, Sana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.250-260
    • /
    • 2022
  • Mobile Banking Applications (MBAPs) is one of the recent fads in mobile trading applications (Apps). MBAPs permit users to execute exchanges of money and many more whenever it might suit them; however, the primary issue for mobile banking Apps is usability. Hardly any investigation analyzes usability issues dependent on user's age, gender, exchanging accomplices, or experience. The purpose of this study is to determine the degree of usability issues, and experience of mobile banking users. The survey employs a quantitative method and performs user experiment on 240 participants with six different tasks on the application's interface. The post experiment survey is done with concerning participants. On the other hand, banking experts and Information Technology (IT) expert's group is also involved after the experiment. Expert's opinions about existing mobile banking Apps and suggestions for improving usability of MBAPs are collected through physical means (like questionnaire and interview) and online means like Google form. After that comparison of the opinions of users and experts about MBAPs is performed. The experimentation measures the tasks usability of various mobile banking apps with respect to its effectiveness, efficiency, trustfulness, learnability, memorability and satisfaction. The usability testing was led at different Universities and the outcomes acquired show that there are privacy and trust issues with their mobile banking apps. There is also a gap between users and experts which should be minimized by applying customized usability models, modes concept like other application software and also by adding complete features of banking in MBAPs. It will benefit mobile banking apps users, developers and usability engineers by providing user-friendly which are up to the mark of user's requirements.

Analysis of AI Content Detector Tools

  • Yo-Seob Lee;Phil-Joo Moon
    • International journal of advanced smart convergence
    • /
    • v.12 no.4
    • /
    • pp.154-163
    • /
    • 2023
  • With the rapid development of AI technology, ChatGPT and other AI content creation tools are becoming common, and users are becoming curious and adopting them. These tools, unlike search engines, generate results based on user prompts, which puts them at risk of inaccuracy or plagiarism. This allows unethical users to create inappropriate content and poses greater educational and corporate data security concerns. AI content detection is needed and AI-generated text needs to be identified to address misinformation and trust issues. Along with the positive use of AI tools, monitoring and regulation of their ethical use is essential. When detecting content created by AI with an AI content detection tool, it can be used efficiently by using the appropriate tool depending on the usage environment and purpose. In this paper, we collect data on AI content detection tools and compare and analyze the functions and characteristics of AI content detection tools to help meet these needs.