• Title/Summary/Keyword: Trust value

Search Result 546, Processing Time 0.028 seconds

The Distribution Industry's Social Responsibility and Ethics Management: Effects on Corporate Trust and Loyalty

  • Yoon, Nam-Soo;Kim, Young-Ei
    • Journal of Distribution Science
    • /
    • v.12 no.7
    • /
    • pp.23-35
    • /
    • 2014
  • Purpose - This study aims to explore the effects of social responsibility activities and business ethics practices on corporate trust and loyalty in the context of a large retail distribution business. Research design, data, and methodology - The data collected was analyzed using PASW Statistics 18.0. In order to verify the demographic characteristics, frequency analysis was conducted on the data. Results - The results of the study were as follows. First, social responsibility activities had a significant effect on corporate trust. Second, both corporate social responsibility activities and business ethics practices had significant effects on loyalty. Third, corporate trust had a significant effect on loyalty. Fourth, corporate social responsibility activities and consumer protection activities had a partial mediation effect, while environmental protection activities and social contribution activities had complete mediation effects. Conclusions - This study clarified and explained the factors of corporate social responsibility activities and business ethics practices that customers value, and analyzed the influence of these factors on corporate trust and loyalty.

Design and Implementation about Trust Evaluation Mechanism of Distributed Services In Mobile Ad-hoc Network (Mobile Ad-hoc Network 상의 분산된 서비스에 대한 신뢰도 평가 기법 설계 및 구현)

  • Jang, Jong-Deok;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.9 no.4
    • /
    • pp.29-34
    • /
    • 2009
  • The many transaction occurs because of service will not be able to trust in mobile Ad-hoc Network. Overcomes like this problem point with the plan for, This paper proposes the trust evaluation mechanism which is the possibility becoming the standard of the node selection which provides a better service by using the transaction message which is basic occurs from within the mobile Ad-hoc network and in the transaction message which is additional. At last, this paper embodies the trust mechanism which proposes, confirms the trust value which is evaluated with NS2 simulator.

  • PDF

Local Scalar Trust Metrics with a Fuzzy Adjustment Method

  • Seo, Yang-Jin;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.138-153
    • /
    • 2010
  • The interactions between people who do not know each other have been greatly increased with the on-going increase of people's cyberspace activities. In this situation, there exist potential risk factors such as the possibility of fraud, so we need a method to reduce or eliminate those risk factors. Concerning this necessity, rating systems are widely used, and many trust metrics calculated from rate values that people give to each other are proposed to help them make decisions. However, the trust metrics decrease the accuracy, and this is caused by the different rating scales and ranges of each person. So, we propose a fuzzy adjustment method to solve this problem. It is possible to catch the exact meaning of the trust value that each person selects through applying fuzzy sets, which improve the accuracy of the trust metric calculated from the trust values. We have applied our fuzzy adjustment method to the TidalTrust algorithm, a representative algorithm for calculating the local scalar trust metric, and we performed an experimental evaluation with four data sets and three evaluation methods.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

A Quantitative Trust Model based on Empirical Outcome Distributions and Satisfaction Degree (경험적 확률분포와 만족도에 기반한 정량적 신뢰 모델)

  • Kim, Hak-Joon;Sohn, Bong-Ki;Lee, Seung-Joo
    • The KIPS Transactions:PartB
    • /
    • v.13B no.7 s.110
    • /
    • pp.633-642
    • /
    • 2006
  • In the Internet environment many interactions between many users and unknown users take place and it is usually rare to have the trust information about others. Due to the lack of trust information, entities have to take some risks in transactions with others. In this perspective, it is crucial for the entities to be equipped with functionality to accumulate and manage the trust information on other entities in order to reduce risks and uncertainty in their transactions. This paper is concerned with a quantitative computational trust model which takes into account multiple evaluation criteria and uses the recommendation from others in order to get the trust for an entity. In the proposed trust model, the trust for an entity is defined as the expectation for the entity to yield satisfactory outcomes in the given situation. Once an interaction has been made with an entity, it is assumed that outcomes are observed with respect to evaluation criteria. When the trust information is needed, the satisfaction degree, which is the probability to generate satisfactory outcomes for each evaluation criterion, is computed based on the empirical outcome outcome distributions and the entity's preference degrees on the outcomes. Then, the satisfaction degrees for evaluation criteria are aggregated into a trust value. At that time, the reputation information is also incorporated into the trust value. This paper also shows that the model could help the entities effectively choose other entities for transactions with some experiments in e-commerce.

Effects of Experiential Value on Continuous Use Intention for On-Demand Services (온디맨드(On-Demand) 서비스의 지속사용의도에 대한 경험가치 효과)

  • Lee, Jihyun;Jeong, Yujin;Lee, Junghoon
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.49-67
    • /
    • 2020
  • On-Demand services have emerged as one of the core business strategies for delivering new experiential values by providing customized services in different user-needs nowadays. Based on the Stimulus-Organism-Response (S-O-R) framework, this paper focuses on the factors of environmental stimulation and emotional states of the demand-side that induce continuous intention of use from the On-Demand services. The study defines 'Informativeness', 'Fulfillment', 'Trust', and 'Convenience' as the properties of the On-Demand services and considers 'Playfulness', 'Customer Return on Investment (CROI)', and 'Service Excellence' as the aspects of the experiential values. The research shows that 'Fulfillment', 'Trust' and 'Convenience' affected the experiential value in 'Kakao Taxi (On-Demand transportation service)' while 'Informativeness', 'Fulfillment', 'Trust of platform', and 'Convenience' are represented as the related factors to the experiential value in 'Baedal Minjok (On-Demand food delivery service)'. The experiential value factors, 'CROI' and 'Service Excellence', are shown directly related to the continuous intention of use in both services. A partial mediation relationship is, furthermore, observed between the aspects of 'CROI' and 'Service Excellence' in Kakao Taxi and its 'Convenience' and 'Continuous intention of use.' In Baedal Minjok, a partial mediation relationship is found between the 'CROI' with its aspects of 'Trust of the platform', 'Convenience', and 'Continuous intention of use' as well. The results of this study may contribute a comprehensive understanding of the purpose of On-Demand services and its needs from the demand-side thus can be helpful for the supply-side.

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.

The Effects of Trust on Student Silence and Exit Intention (신뢰가 학생침묵과 이탈의도에 미치는 영향)

  • CHO, Hyun-Jin
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.5
    • /
    • pp.59-66
    • /
    • 2019
  • Purpose - Many studies show that dissatisfied customers are silent rather than expressing complaints directly to firms. Although silent voices are pervasive in service failure, they have received little attention from researchers. Silence implies a multidimensional nature, not just the opposite of voice. This study focuses on two types of silent students in higher education: acquiescent silence and defensive silence. This study also proposes cognitive trust and affective trust as variables affecting student silence. The objective of this study is to analyse the effects of trust types on student silence and exit intention. Research design, data, and methodology - To test the proposed model, this study conducted a survey with undergraduate students who selected silence in a dissatisfied relationship with a professor. Respondents were asked to respond to the questionnaire, recalling the dissatisfaction at that time. A total of 300 students was surveyed from whom 275 completed questionnaires was obtained. The structural equation model analysis was used for the hypothesis test. Results - First, cognitive trust was negatively related to acquiescent and defensive silence. Second, affective trust was negatively related to acquiescent and defensive silence. Third, cognitive trust was negatively exit intention, but affective trust didn't significantly reduce exit intention. Forth, acquiescent silence was positively related to exit intention, but defensive silence didn't have a significant positive impact on exit intention. Thus, a key result of this analysis was that acquiescent silence enhances exit intention. Conclusions - The findings of the study provide a better understanding of the types of silence, and the role of trust, thus furthering the implication of student reactions to dissatisfaction. In particular, this study is meaningful in that it confirms the value of student silence in the context of complaint management. Acquiescent silence should be more importantly managed because it has stronger negative motive than defensive silence. Acquiescent silence is reduced through various channels(mail, telephone, counseling) that can express complaints. Cognitive trust and affective trust are a essential factors in reducing silence. Also, in explaining exit intention, cognitive trust plays a more important role than affective trust.

Customer Buying Process Based B2C Differentiation Strategy Analysis (고객 구매 프로세스 기반 B2C 차별화 전략 분석)

  • Gu, Ja-Heon;Park, U-Seong;Han, Hyeon-Su
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.488-492
    • /
    • 2007
  • In this study, we investigated how to distinguish customer delivered value to re-purchasing in fierce B2C industry. To identify key managerial variables that could distinctively impact re-purchasing, we first identified customer value proposition as per the customer buying decision process. Next, core value propositions of choice efficiency and competitive price are defined to determine vendor satisfaction during the searching stage and purchasing stage. The trust level is also introduced in the sense of reflecting confirmation to guarantee after purchase security. Then, significant managerial variables to impact on core value propositions are extracted. The resulting structural model illustrated that search convenience and quality assurance affect the choice efficiency, and re-purchase intention is strongly explained by both the vendor satisfaction and trust level. The empirical testing results also support that transaction cost reduction is key determinant of shopping at the Internet shopping mall. Furthermore, trust level should be combined to induce re-purchasing in addition to transaction cost savings.

  • PDF

The influence of the IoT based healthcare user's experience value on the usage and continuous use intention -Focused on Xiaomi Mi band user in china- (IoT기반 헬스케어 사용자 경험가치가 사용량과 지속적 사용의도에 미치는 영향에 관한연구 -중국내 샤오미 미밴드 사용자를 중심으로-)

  • Shang, Meng;Shin, Yong Ho;Lee, Chul Woo
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.3
    • /
    • pp.689-706
    • /
    • 2016
  • Purpose: This study identifies causality in IoT-based healthcare user's experience(playful experience, economical experience), trust, usage, degree of dependence and continuous use intention, especially focused on chinese case. Methods: Face to face interviews was conducted for people who has experience in the use of the Xiaomi Mi band. This study used Partial Least Square(PLS) method with the questionnaires from the interview. Results: IoT-based healthcare users taking playful experience have a strong trust in a positive economic experiences. Also, the user recognizing the experience as an economic one shows stronger intention to use continuously. Conclusion: By getting healthcare users have more economic experience, they have continuous use intention of healthcare product. The empirical findings can be applied to the related companies strategy building.