• Title/Summary/Keyword: Users' trust

Search Result 568, Processing Time 0.029 seconds

Analysis of Data Encryption Mechanisms for Searchable Encryption (검색가능 암호시스템을 위한 데이터 암호기법의 문제점 분석)

  • Son, Junggab;Yang, Yu-Jin;Oh, Heekuck;Kim, Sangjin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.79-89
    • /
    • 2013
  • Recently, the need for outsourcing sensitive data has grown due to the wide spreading of cost-effective and flexible cloud service. However, there is a fundamental concern in using such service since users have to trust external servers. Therefore, searchable encryption can be a very valuable tool to meet the security requirements of data outsourcing. However, most of work on searchable encryption focus only on privacy preserving search function and relatively lacks research on encryption mechanism used to actually encrypt data. Without a suitable latter mechanism, searchable encryption cannot be deployed in real world cloud services. In this paper, we analyze previously used and possible data encryption mechanisms for multi-user searchable encryption system and discuss their pros and cons. Our results show that readily available tools such as broadcast encryption, attribute-based encryption, and proxy re-encryption do not provide suitable solutions. The main problem with existing tools is that they may require separate fully trusted servers and the difficulty in preventing collusion attacks between outsiders and semi-trusted servers.

A Study on the Effects of Servant Service Factors in Hotel Service on the Relationship Quality and Revisit Intention (호텔서비스의 인적 서비스요인이 관계의 질 및 재이용의도에 미치는 영향에 관한 연구)

  • Kim, Jong-Ho;Kim, Bong;Shin, Yong-Seop
    • Journal of Global Scholars of Marketing Science
    • /
    • v.12
    • /
    • pp.77-97
    • /
    • 2003
  • The purpose of this study is to analyze how servant service factor of service marketing factors affects to customer's satisfaction, relationship quality, and commitment and consequently to see how these factors affect to revisit intention which is the hotel performance. The empirical results showed that technical factor and customer orientational factor had a significant influence on customer satisfaction and relationship quality, and functional factor affected to only relationship quality. Also customer and relationship quality had a significant influence, and commitment had a significant influence on revisit intention which is a performance factor. Specifically relationship quality built by the interrelationship between the purchasers and the suppliers showed higher influence than customer satisfaction's influence on the commitment. That is, when there is an interaction between trust on the employees and customer satisfaction, there is a greater synergy effect on the commitment. Although the degree of customer satisfaction is low, the commitment can be high with high effort of service providers. This implies that the attitude of service providers is the critical factor on the degree of commitment of service users.

  • PDF

A Study on the Factors of Satisfaction & WOM Regarding to Financial Institutions Internet and Smartphones Application On-line Usage of Financial Customers (금융소비자의 인터넷, 스마트폰 어플리케이션 등 금융기관 온라인 시스템 이용에 따른 만족과 구전에 미치는 효과 요인 연구)

  • Jeon, Seong-Ki;Kwon, Man-Woo;Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.8
    • /
    • pp.183-194
    • /
    • 2020
  • Recently, in Korea, financial institutions such as banks are most severely affected by the universalization of the Internet and smartphones. On the other hand, the use of online systems by financial institutions keeps increasing; the convenience of online services has a significant influence on the attraction and the retention of financial customers; consumer needs are also diversely expressed. This paper deduces from the precedent researches a mechanism that online financial system enhances the trust of customers -the medium of the online system and other customers- and its perceived easiness affects its perceived effectiveness and then all these internal variables induce satisfaction. Plus, this paper aims at verification of the hypothesis in terms of an extended technology acceptance model, based on the hypothesis that word of mouth and repurchase are significantly linked to this mechanism. Through this study, the researchers tried to check how the online service quality and emotional factors of financial institutions affect the users in accordance with the trend of changes in the service usage method of financial institutions, and confirmed that the hypothesis was not rejected.

Age differences of preference for humanoid AI speakers (얼굴형 인공지능 스피커에 대한 선호의 나이 효과)

  • Oh, Songjoo;Hwang, Jihyun;Yew, Jiho;Hahn, Sowon
    • Korean Journal of Cognitive Science
    • /
    • v.29 no.1
    • /
    • pp.1-16
    • /
    • 2018
  • In this study, we investigated age differences of preference and trust ratings when the appearance of an artificial intelligent speaker resembles a human face. The appearance of the artificial intelligent speaker was presented in seven levels from robot face to human face. In addition, face stimuli were divided into gender (male and female) and age (20s / 60s). Participants evaluated the reliability and likability of each face stimulus on a 7-point scale. The results show that younger adults tend to prefer the face that was halfway between the robot and the human face, while older adults evaluated that the perceived reliability and likability were higher when the stimuli resembled the human face. When asked to choose the most preferred of the four face categories, all participants chose a younger face. However, with additional conditions including emoticon face and empty condition, older adults still preferred human face, while younger adults preferred emoticon face and empty condition. Taken together, older adults are more receptive to human faces than robotic faces in the context of artificial intelligence speakers. Because artificial intelligent speakers can play an important role in the elderly living alone, the present study will be a good reference in the design and development of artificial intelligent speakers for the elderly users.

Relationships between Perceived Outcome of SNS Use and Social Capital: Focused on Moderating Effects of Victim and Offender Experiences (소셜미디어 사용의 지각된 성과와 사회자본과의 관계 - 피해경험과 가해경험의 조절효과를 중심으로 -)

  • Kim, Sora
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.448-460
    • /
    • 2020
  • The purpose of this study is to examine the effects of negative experiences on social capital in order to see if the adverse functions of social media could be a barrier to the promotion of social capital through the use of social media. The study verified the moderating effect of perceived performance from social media and negative experiences(victim experience and offender experience) on social capital. The online survey was conducted in November 2019, and a total of 846 responses were used for the final analysis. As a result of the two-step regression analysis using the mean-centering technique first, it was found that the victim experience had no significant effect on the bridge social capital, but the perceived performance and the victim experience had negative moderating effect on the bridge social capital. Second, the victim experience showed a significant positive effect on the binding social capital, but showed a negative moderating effect with the perceived performance indicating positive influence on the binding social capital of the perceived performance could reduce through victim experience. Accordingly it is necessary to educate social media users on the cyber ethics, and regulation is required to mitigate risk factors for trust.

A Study on the Service Quality Analysis and the Difference Between User Groups in Bulk Terminals of Busan Port (벌크터미널 서비스품질 분석 및 이용주체별 차이에 관한 연구: 부산항 벌크터미널을 중심으로)

  • Lee, Kyung-Nam;Yang, Han-Na;Wang, Gao-Feng;Shin, Chang-Hoon
    • Journal of Navigation and Port Research
    • /
    • v.40 no.4
    • /
    • pp.223-230
    • /
    • 2016
  • While marine transport freight is steadily increasing, people are more interested in terminals handling cargo. But the domestic researches on terminals were almost on container terminal. This study attempted to study the service quality for bulk terminals. The users of bulk terminal services were divided into shipowners and shippers to compare their differences by using bulk terminal service provided. During the attributions proposed in this study, Tangibles were descripted by the numbers of berth or depth, facilities, and so on. So it was suitable to consider the tangibles by formative indicators. And also this study has tried using "reflective model" and "formative model" to make a measurement model for comprehensive analyses. The results showed that all of the items were significant except the relation between empathy and performance satisfaction in the overall measurement model analyses. User groups difference analyses results have showed that the trust responsiveness impact on performance satisfaction was more importantly assessed by shippers than by shipowners. It was expected to use the results of this study as a good strategic resource to help bulk terminal administrators make various expansion plans to improve the bulk terminal's competitiveness in the future.

An Authentication Protocol Supporting User Device Mobility in CAS-Based IPTV Environments (CAS 시스템 기반의 IPTV 환경에서 사용자 단말 이동성 지원을 위한 인증 프로토콜)

  • Roh, Hyo-Sun;Jung, Seo-Hyun;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.302-312
    • /
    • 2010
  • Internet Protocol Television (IPTV) service is the convergence service of the telecommunication and broadcasting that provides various bidirectional multimedia contents by IPTV service subscribe's request through the high-speed internet. However, the proposed technologies current do not guarantee the security such as authentication between Set-Top-Box (STB) and the user mobile devices available IPTV service at home domain, and authentication of mobile user device at out of door. This paper proposes the authentication protocol for distributing content securely from STB to the users' mobile devices at home domain and authentication for network access and IPTV service access when the user's mobile device is moved out of the house. The proposed scheme using the proxy signature enables to distribute and protect securely the contents protected through an underlying Conditional Access System (CAS) without re-encrypting then that the existing scheme should employ. Then this protocol supports the authentication scheme to get service access authentication based on network access authentication using the signature, which the STB issued on behalf of the trust authority of IPTV service provider. Also the proposed authentication protocol reduces the total communication overhead and computation time comparing to the other authentication protocol.

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

A Study of Wireless LAN Cryptosystem for Supporting Realtime Mutual Authentication (실시간 상호인증 지원을 위한 무선랜 보안시스템에 관한 연구)

  • Lee Sang-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.161-170
    • /
    • 2005
  • The Certificate Revocation List(CRL) or the Online Certificate Status Protocol(OCSP)has been used to validate certificates. However, the CRL cannot validate certificates in realtime because of the Time-Gap problem and the OCSP server overloads in a large scale secure system. In addition, the client cannot access a wired LAN until the client has been authenticated by the authentication server on the IEEE 802. 1x framework. Therefore, the client cannot validate the authentication server's certificate using a certificate validation server. Thus, the client cannot authenticate the authentication server in realtime. To solve these problems this paper designed a secure system that can protect the content of communications and authenticate users in realtime on a wireless LAN The designed certificate validation protocol was proved that the stability and efficiency of the system was very high, the result of the validation had the presence, the speed of the validation was not affected by the system scale, the number of authorities user must trust was reduced to one, and the overload of the validation server was Protected. And the designed user authentication and key exchange protocols were Proved that the mutual authentication was possible in realtime and the fact of the authentication could be authorized by the CA because of using the authorized certificates.

  • PDF

The Effect of Augmented Reality Traits on Presence, Flow, and Relational Continuance Behavior with Smart-Phones (스마트폰 기반 증강현실 특성이 프레즌스, 플로우 및 관계지속행동에 미치는 영향)

  • Chun, Tae-Yoo;Park, No-Hyun
    • Journal of Distribution Science
    • /
    • v.13 no.5
    • /
    • pp.45-52
    • /
    • 2015
  • Purpose - Augmented reality (AR) content used in mobile media today can accommodate a wide variety of contextual information. This indicates that making people experience a sense of presence and flow is a very significant factor in augmented reality content. Flow represents a rich immersion potential as representing the progress of emotion and the means to facilitate the operation of the smart phone. Therefore, users will have friendly relational continuance behavior with products and brands that supply this experience. Based on that, the purpose of this study is to investigate the relationships among smart phone AR application traits, presence, flow experience, and relational continuance behavior. First, AR application traits are defined as three categories sensory immersion, navigation, and manipulation, based on preceding studies. This study then examines the influence of AR application traits on the presence and flow experience and looks into the relation among presence, flow experience, and relational continuance behavior. This analysis suggests more detailed and concentrated strategic implications. Research design, data, and methodology - A research model is designed to examine the relation among AR application traits, presence, flow experience, and relational continued behavior. For data collection, questionnaire surveys were composed of multi-items for each component and the direct interview method was used for the interviews. To collect the data, after running the smart phone AR applications, the consumer behaviors of the respondents were generally determined. The questionnaire surveys were conducted for one month, October 2014. A total of 300 questionnaires were distributed with 278 questionnaires used for analysis, excluding the unanswered and insincere questionnaires. The data were analyzed using SPSS ver. 20.0 and LISREL ver. 8.51. Results - The following results are found: First, AR application traits have a significantly positive effect on presence with sensory immersion, navigation, and manipulation all having a significantly positive effect. Second, sensory immersion and manipulation among the AR application traits have a significantly positive effect on flow. However, navigation did not have a significantly positive effect on flow. Third, presence has a significantly positive effect on flow and has a significantly positive effect on relational continuance behavior. Moreover, flow also has a significantly positive effect on relational continuance behavior. This behavior tends to be formed since brands want to encourage relational continuance behavior and positive emotions with the brands being used. Relational continuance behavior accompanies repeat purchasing, positive word-of-mouth and recommendation activities, and forms of trust with the brand. Conclusions - The research results showed that smart phone AR traits had significantly positive effect on presence, flow, and relational continuance behavior. Based on this, smart phone AR application providers should establish an aggressive marketing strategy to accommodate more realistic problems in order to positively influence user behavior. Additionally, the marketers should make efforts to provide fun or convenience in the AR application operation process of the user.