• Title/Summary/Keyword: Trustworthy

Search Result 243, Processing Time 0.031 seconds

A Large Number of Consumer Recommendations? or A Small Number of Friend Recommendations? : Purchasing Decision Making based on SNS (다수의 대중추천인가? 소수의 지인추천인가? : 소셜 네트워크 기반의 구매의사결정)

  • Shim, Seon-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.15-41
    • /
    • 2012
  • Recently, there happens many purchasing cases encouraged by friends' recommendation in SNS (Social Network Service). This study investigates the effect of friend recommendation on consumers' purchasing heuristic. For this purpose, we compare the effect of friend recommendation with consumer recommendation in terms of trustworthy, specialty, relevancy. Usually, the frequency of friend recommendation is far lower than that of consumer recommendation. Hence, we examine how the effect of information source (friend recommendation or consumer recommendation) is moderated by the frequency of recommendation, as well. As results, this study finds out that, under the same frequency, friend recommendation does not have significantly stronger effect on the purchasing heuristic, although friend recommendation is evidenced as one of significant heuristic inducers. However, in terms of trustworthy, friend recommendation is significantly superior to the consumer recommendation. Moreover, under sufficiently higher frequency, friend recommendation works as better heuristic factor than consumer recommendation. The results deliver managerial implications in the perspective of understanding consumers' purchasing decisions and responding strategies of firms.

A Trustworthiness Improving Link Evaluation Technique for LOD considering the Syntactic Properties of RDFS, OWL, and OWL2 (RDFS, OWL, OWL2의 문법특성을 고려한 신뢰향상적 LOD 연결성 평가 기법)

  • Park, Jaeyeong;Sohn, Yonglak
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.226-241
    • /
    • 2014
  • LOD(Linked Open Data) is composed of RDF triples which are based on ontologies. They are identified, linked, and accessed under the principles of linked data. Publications of LOD data sets lead to the extension of LOD cloud and ultimately progress to the web of data. However, if ontologically the same things in different LOD data sets are identified by different URIs, it is difficult to figure out their sameness and to provide trustworthy links among them. To solve this problem, we suggest a Trustworthiness Improving Link Evaluation, TILE for short, technique. TILE evaluates links in 4 steps. Step 1 is to consider the inference property of syntactic elements in LOD data set and then generate RDF triples which have existed implicitly. In Step 2, TILE appoints predicates, compares their objects in triples, and then evaluates links between the subjects in the triples. In Step 3, TILE evaluates the predicates' syntactic property at the standpoints of subject description and vocabulary definition and compensates the evaluation results of Step 2. The syntactic elements considered by TILE contain RDFS, OWL, OWL2 which are recommended by W3C. Finally, TILE makes the publisher of LOD data set review the evaluation results and then decide whether to re-evaluate or finalize the links. This leads the publishers' responsibility to be reflected in the trustworthiness of links among the data published.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

Development of the Mobile Measuring System for Tunnel Lighting Luminance and Illuminance (차량을 이용한 터널조도 및 휘도 측정시스템 개발)

  • Kim, Dong-Jo;Jo, Duk-Soo;Suk, Dae-Il;Jung, Sueng-Kyun;Lee, Chang-Mo;Nam, Dong-Hoon;Kim, Hoon
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.4
    • /
    • pp.1-6
    • /
    • 2006
  • The tunnel is the place where brightness changes abruptly. It is important to grasp the road situation and the traffic situation of the tunnel accurately for safe and secure driving, and tunnel lighting installation should be well maintained. Luminance and illuminance of the tunnel inside should be measured periodically to maintain enough brightness. But traditional manual measurement could not guarantee the fastness and trustworthy of the measured values. In this paper, a mobile measuring system for tunnel lighting luminance and illuminance was developed and a result regarding the propriety of the system was derived.

Rethinking Career Starters' Entrepreneurship in a Digital Economy (디지털 경제와 커리어 초심자의 기업가 정신)

  • Heo, Se Jin
    • Management & Information Systems Review
    • /
    • v.34 no.1
    • /
    • pp.21-34
    • /
    • 2015
  • In the digital economy praising innovation, entrepreneurship has been strongly admired because it works as a foundation for successful innovation. In this paper, I will focus on the entrepreneurial attitude within an organization because the purpose of this paper is to clarify the organizational mechanism to facilitate the career starters' entrepreneurship in the digital age. From a psychosocial perspective, career starters seem to be so vulnerable and unstable because they are in their 20s as the most turbulent period during lifetime. For this reason, entrepreneurship for career starters needs to be reconsidered in terms of the uniqueness of young novice workers. While hierarchical organizational structure such as "atelier" is suggested in this paper, trustworthy leadership should be a basis of teamwork between veterans and novices.

  • PDF

An Alternative Design of the Internet Survey for Data Quality (데이터 품질을 위한 인터넷 설문조사의 대안적 설계)

  • Kim, Byoung-Gil;Lee, Ki-Dong
    • Journal of Digital Convergence
    • /
    • v.8 no.3
    • /
    • pp.129-141
    • /
    • 2010
  • Though an internet survey, an alternative method for the off-line survey, has various merits is, it still has some problems such as sampling bias and low reliability from insincerity during survey. Especially the exogenous variables such as sample respondents of the environment should be controlled to make internet survey trustworthy. This study attempts to design and implement such system that can help researchers to control the network and sampling environment and behaviors on respondents. Thru the various Question forms and structured Questionnaire design, this study tries to contribute the improvement of survey satisfaction and the reliability for survey result in internet survey system.

  • PDF

Effect of Menu Reliability on Consumer Satisfaction at Rice Cake Cafe using Domestically Grown Agricultural Products - Focus on Jeonju Hanok Village - (국내산 농산물을 사용한 떡 카페 메뉴에 대한 신뢰가 소비자 만족에 미치는 영향 - 전주 한옥마을을 중심으로 -)

  • Kim, Su In
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.25 no.5
    • /
    • pp.922-931
    • /
    • 2015
  • To investigate and analyze the influence of trust on consumer satisfaction in rice cake cafe menus using domestically grown food ingredients, this study divided selection attributes of rice cake cafe menus into safety, nutrition, ethicality and marketability through an exploratory factor analysis and analyzed reliability and correlation among these variables. As a result, these four factors were adopted as selection factors, and the results of the correlation analysis among the variables showed that the four factors were statistically correlated with trust and customer satisfaction. The result of validity and reliability testing on consumer trust showed that the menus were reliable and trustworthy as they had been made using domestically grown agricultural products. Analysis of how cafe selection attributes affect trust showed that the these variables had a significantly positive influence on trust in the order of safety, marketability, nutrition, and ethicality. The influence of the selection attributes on customer satisfaction was statistically significant, and the independent variables had a significantly positive influence on trust in the order of marketability, ethicality, safety, and nutrition. In verifying the mediation effect of trust on customer satisfaction, the four factors of rice cake cafe selection attributes had statistically significant mediation effects.

Evaluation for Incheon International Airport security: passenger satisfaction and significance, using IPA method (IPA기법을 활용한 인천국제공항 이용객의 항공보안서비스 만족도와 중요도 평가)

  • Byeon, A-Reum;Choi, Jin-Young;Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.2
    • /
    • pp.77-82
    • /
    • 2017
  • Currently the international flight passenger visit at Incheon International Airport increased 12.4% compared to January 2017. Such increase affects on the congestion of an airport and the security check is one of the most congested area. There is a prejudice that airport security is not related to the airport service and is only a type of control that limits the quality of service. However, considering the huge impact that airport security agents have on passenger move within the airport, trustworthy, fast and kind service at airport security check is one of the most important part of airport service quality improvement. This research is an importance performance analysis of Incheon International Airport security service passenger satisfaction and its significance using IPA method. This research will contribute to the improvement of airport operation and service quality, by proving the relation between airport security and service.

An Analysis of the Effects of Energy Saving in Connection with Transformer Loss (변압기 손실에 따른 에너지절감 효과 비교 분석)

  • Choi, In-Ho
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2007.11a
    • /
    • pp.291-294
    • /
    • 2007
  • Countries in the world are setting up policies to implement anti-global warning measures to actively cope with the Agreement on Climate Change. Rising problems related to energy and environment prompted research and development efforts to highly efficient electric instrument and environmentally friendly products to secure resources and save energy Korea's high dependency on imported energy and its lack in natural resources make it urgently necessary to develop energy efficient instrument and equipment that can save energy. Every household now uses a transformer, which is very important instrument among others. A variety of technologies to manufacture transformers are currently used along with efforts to develop new materials. Development nit of high efficient transformers is called for by the time and has direct economic impact on suppliers and consumers. In addition, it is desirable to install a transformer that is trustworthy, secure, low on loss, anti-incident capable, small, anti-flammable, environmentally friendly, cost-efficient high-frequency resistant and easy for maintenance. To do this, it is necessary to look deeper into a highly efficient transformer that can save energy. This paper will discuss the types and characteristics of various transformers and propose ways to save energy and raise efficiency tv analyzing a environmentally friendly amorphous transformer.

  • PDF