• Title/Summary/Keyword: Validated Trust

Search Result 39, Processing Time 0.03 seconds

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

A Study on the Acceptance Model of Ubiquitous Services (유비쿼터스 서비스 수용모형에 관한 연구)

  • Oh, Tae-Dong;Lee, Jun-Soo;Oh, Jay-In
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.19-36
    • /
    • 2010
  • The purpose of this study is to investigate the relationship among users perception on the characteristics of U-Services, attitude factors as mediating variables, and behavioral intention toward U-Services as the dependent variable. Based on the literature review on the related theories, the research model which analyzes the behavioral intention toward U-Services was developed. The result from the analysis of the data collected validated the U-Services Acceptance Model (USAM) proposed in this study as a sound construct framework. Futhermore, significant insights on the USAM were provided for the stakeholders and future researchers in the field of U-Services Acceptance.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

Factors Affecting Technology Acceptance of Smart Factory (스마트팩토리 기술수용에 영향을 미치는 요인에 관한 연구)

  • Kim, Joung-Rae;Lee, Sang-Jik
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.1
    • /
    • pp.75-95
    • /
    • 2020
  • Smart Factory is the decisive factor of the Fourth Industrial Revolution and is a key field for national competitiveness. Until now, most smart factory research has focused on policy and technology. In order to spread more technology, it is necessary to study what factors influence the adoption of smart factory technology in the enterprise. Nevertheless, little research has been done. In this study, based on the UTAUT (Unified Theory of Acceptance and Use of Technology), which has been proved through many years of research, I have studied the factors that influence the acceptance of smart factory technology. As a result of research, performance expectancy, social influence, and facilitating conditions of UTAUT model had a positive(+) effect on behavior intention. Their relationship of influence was in the order of performance expectancy (β = .459)> facilitating conditions (β = .212)> social influence (β = .210). However, it was found that the effort expectancy did not affect the behavior intention, and the impact of the newly perceived risk on the behavior intention to use was not confirmed. The main reason is that the acceptance of smart factory technology is not a matter of personal interest but a matter of organizational choice. Trust, on the other hand, was found to be partially mediated between performance expectancy, facilitating conditions, social influence and behavior intention. For many years, many researchers have validated the UTAUT, which has been validated through various empirical studies. It is academically meaningful to begin the study of factors affecting the acceptance of smart factory technology in terms of the UTAUT. In practice, it is necessary to provide SME employees with more information related to the introduction of smart factories, to provide advanced services related to the establishment of smart factories, and to establish a standardized model for each industry.

A Study on Influencing Factors of Virtual Community Success (가상커뮤니티 성과의 영향요인에 관한 연구)

  • Kim, Sang-Hoon;Cho, Seung-Chul
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.49-69
    • /
    • 2006
  • The virtual community has been recognized as an effective marketing tool and has been an important motive of using internet to Internet users, but very few attempts have been done for the development of virtual community success. Although many studies have been made on influencing factors of virtual community success, the comprehensive studies have never been done so far. Therefore, this study focused on developing the comprehensive model and verifying empirically. This study proposed five influencing factors(Virtual Community Operational factor, Characteristics of Users, Usefulness, Trust, Commitment) that affect virtual community success and three success factors(Sense of Virtual Community, Loyalty, Purchasing Intention) by carrying out literature review extensively and suggesting the relationship among factors. The relationship among factors were empirically validated by structural equation modeling. The data used in this study were collected from 292 users of the existing virtual communities. As the result of statistical analysis. It was found that Virtual Community Operational Factor and Characteristics of Users statistically significantly influenced Virtual Community Success. Also, it was shown that the intervening effects of Usefulness, Trust and Commitment were statistically significant, but that the relationship between commitment and Loyalty was not statistically significant. Finally, it turned out that the causality among success variables of Virtual Community was supported, but that sense of Virtual Community was required to be measured by new measurements.

  • PDF

The Effect of Donations Feedback and Donation Awareness to Donation Continuity Intention (기부금 사용 내역 피드백과 기부인식이 기부지속에 미치는 영향)

  • Suh, Munshik;Oh, Daeyang
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • The purpose of this study was to examine the effect of donation expenditure details and the shift in awareness as a result of disclosure of donation expenditure details in order to promote constant donation by nonprofit organizations in the course of marketing activities. The first experiment was configured through $2{\times}2$ intergroup element design based on 2(feedback on donation expenditure details: available vs. unavailable) ${\times}$ 2(donation awareness: expenditure vs. exchange), and furthermore, MANOVA was performed. The results showed that the satisfaction with donation was higher when the donation expenditure details were disclosed(M=5.125, SD=0.437) and that the relation maintenance intention was higher(p<0.01) when the donation expenditure details were disclosed M=5.328, SD=0.459). In addition, the main effect was validated by using the bootstrapping method. The results of overall model validation showed that satisfaction & trust(=0.843, p<0.01) and satisfaction(=0.267, p<0.01) and trust(=0.691, p<0.01) had a positive(+) relationship. Based on aforesaid results, donors are expected to have greater trust if nonprofit organizations make effort to ensure transparent and detailed disclosure of information on expenditure of donations made by donors. Succeeding studies would need to investigate the effect that might vary depending on the type of feedback methods, etc.

Brand Relationship Quality of Brand Loyal Fashion Consumers and Their Loyalty Orientation (상표충성 소비자의 상표관계본질과 상표충성성향)

  • Moon, Hee-Kang
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.3
    • /
    • pp.57-71
    • /
    • 2008
  • The purpose of this study is 1) to develop and validate the BRQ construct perceived by brand loyal consumers, 2) to evaluate the predictive capacity of the individual BRQ dimension and brand relationship benefit on consumers' relationship intention, and 3) to identify the distinctive loyalty orientation based on the concept of BRQ. Questionnaire data from 379 brand loyal consumers on BRQ, brand relationship benefit, relationship intention, and their brand loyal behavior pattern were analyzed. The results showed that brand loyal consumers' BRQ composed of 3 dimensions including 'compensational bind', 'self attachment', and 'trust'. In addition, the mediating role of BRQ in predicting consumers' loyal relationship intention was validated using the structural equation model. Regarding the effect of each BRQ dimension on loyal relationship intention, consumers' intention to be loyal to an apparel brand was more explained by self attachment than the other dimensions. This study also intended to provide a useful direction to apparel brands in finding out which relationship quality type is more effective for differentiated marketing strategies by comparing the BRQ of single-brand loyal consumers and that of multi-brand loyal consumers.

The Impact of Existing Relationship and IT-based collaboration activities on the Performance of Supply chain: Focused on Absorptive Capacity (공급 사슬 참여 기업간 기존 거래 관계와 IT 기반 협업 활동이 공급 사슬 성과에 미치는 영향: 흡수 역량을 중심으로)

  • Lee, Won Jun;Bock, Gee-Woo;Kang, Youn Jung
    • Knowledge Management Research
    • /
    • v.19 no.4
    • /
    • pp.77-98
    • /
    • 2018
  • The purpose of this paper is examine the existing relations structure and IT use for collaboration activities on supply chain and their impacts on the performance of supply chain. This study made a design of the research model that was further constructed by integrating the relationship structure, IT exploration, IT exploitation, supply chain collaboration, absorptive capacity, and knowledge creation, efficiency and efficient. The survey data were collected from 378 companies, where firms are facing increased global competitive pressure and heavily utilize SCM to retain their competitive advantages. The authors validated a measurement model with structural equation modelling and tested eight hypotheses. As a result, the absorptive capacity was closely related to trust, IT exploitation and IT exploration, but supply chain collaboration. Examining the effect of supply chain collaboration with two types of absorptive capacity, the authors found positive effect on potential absorptive capacity, but a non-significant effect on realized absorptive capacity. This finding suggests that the improving performance of supply chain not only is related to the relations structure and IT use on supply chain, but also is closely related to the absorptive capacity.

Benchmarking of the CUPID code to the ASSERT code in a CANDU channel

  • Eun Hyun Ryu;Joo Hwan Park;Yun Je Cho;Dong Hun Lee;Jong Yeob Jung
    • Nuclear Engineering and Technology
    • /
    • v.54 no.11
    • /
    • pp.4338-4347
    • /
    • 2022
  • The CUPID code was developed and is continuously updated in KAERI. Verification and validation (V&V) is mainly done for light water reactors (LWRs). This paper describes a benchmarking of the detailed mesh level compared with sub-channel level for application to pressurized heavy water reactors (PHWRs), even though component scale comparison for the PHWR moderator system was done once before. We completed a sub-channel level comparison between the CUPID code and the ASSERT code and a CUPID code analysis. Because the ASSERT code has already been validated with numerous experiments, benchmarking with the ASSERT code will offer us more trust on the CUPID code. The target channel has high power and thus high pressure deformation. The high power channel tends to have a high possibility of critical heat flux (CHF), because a high void fraction and quality in channel exit region appear. In this research, after determining the reference grid and T/H model, we compared the sub-channel level results of the CUPID code with those of the ASSERT code.