• Title/Summary/Keyword: 신뢰 협상

Search Result 51, Processing Time 0.025 seconds

Different Levels of Trust in Global Business Negotiation: A Comparative Study about Canadians and Korean Perspective on Doing Business Negotiation with Chinese (글로벌 비즈니스 협상의 신뢰수준별 차이 : 한-캐나다인의 대중국 협상문화 비교연구)

  • Kim, Mie-Jung;Wang, Liyuan;Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.17 no.3
    • /
    • pp.155-176
    • /
    • 2015
  • This study examines the close relationship between trust and global business negotiations. Kristen Blankley(2010) pointed out three level of trust impacting each negotiation stage: calculus-, knowledge-, identification-based trust. In this regard, the present study examines the relationship between each level of trust and the process of business negotiations by focusing on Canadians and Koreans who had business negotiation experience with Chinese counterparts. For Canadian respondents, calculus-based trust and identification-based trust didn't have significant effects on the negotiation atmosphere, whereas they did for Korean respondents. For Canadian respondents, knowledge-based trust had the greatest effect on each step of the business negotiation process.

  • PDF

Trust and facial information in online negotiation (온라인 협상에서 얼굴 정보에 따른 신뢰감 비교)

  • Ji, Jae-Yeong;Han, Gwang-Hui
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2007.05a
    • /
    • pp.153-156
    • /
    • 2007
  • 본 연구는 온라인으로 이루어지는 협상에서 얼굴정보가 협상의 신뢰 수준에 영향을 주는지 보고자 한다. 협상의 진행이 실시간 문자 대화(Synchronous text communication) 또는 음성(Voice)으로 이루어지는 조건과 얼굴 정보가 추가된 조건을 비교한 결과, 얼굴 정보가 추가되었을 때 신뢰의 수준이 높게 나타났다.

  • PDF

신뢰 협상 기술 동향

  • Kim, Young-Sam;Jin, Seung-Hun
    • Review of KIISC
    • /
    • v.20 no.4
    • /
    • pp.80-84
    • /
    • 2010
  • 인터넷, 모바일 등을 이용한 서비스들이 다양한 개인정보를 이용하기 시작하면서, 사용자의 프라이버시 문제는 점점 더 심각해지고 있다. 이러한 프라이버시 문제를 해결하기 위해 여러 가지 연구가 진행되고 있으며, 그 중 하나가 신뢰협상(Trust Negotiation) 기술이다. 이 기술은 사용자의 데이터 노출제어 및 서비스제공자의 자원인가 및 제어간의 균형점을 찾아주어 사장자의 프라이버시 보호 및 서비스제공자의 접근제어를 가능하게 할 수 있다. 본 논문에서는 이러한 신뢰 협상 기술 중 몇 가지를 살펴봄으로써 신뢰 협상 기술의 연구 동향 및 발전 방향에 대해 알아보고자 하였다.

헬스케어시스템을 위한 역할 기반의 신뢰협상 모델

  • Jo, Hyeon-Suk;Lee, Hyeong
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.84-102
    • /
    • 2007
  • Security is crucial for the successful deployment of large distributed systems. Many of these systems provide services to people across different administrative domains. The traditional identity-based access control mechanisms are un scalable and difficult to manage. Unlike the closed systems, open systems provide services to people from different security domains. Healthcare systems need to be highly available in order for the patients to get a timely treatment. The health care information should be available to authorized users both inside the administrative domain and outside the domain, such as pharmacies and insurance companies. In this paper, we first analyzed the necessities and advantages of importing attribute-based trust-management models into open distributed systems. Then we reviewed traditional access-control models and presented the basic elements of the new trust-management model.

  • PDF

RBAC-based Trust Negotiation Model for Grid Security (그리드 보안을 위한 역할 기반의 신뢰 협상 모델)

  • Cho, Hyun-Sug;Lee, Bong-Hwan
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.455-468
    • /
    • 2008
  • In this paper, we propose FAS model for establishing trust based on digital certificates in Grid security framework. The existing RBAC(Role Based Access Control) model is extended to provide permissions depending on the users‘ roles. The FAS model is designed for a system independent integrated Grid security by detailing and extending the fundamental architecture of user, role, and permission. FAS decides each user’s role, allocates access right, and publishes attribute certificate. FAS is composed of three modules: RDM, PCM, and CCM. The RDM decides roles of the user during trust negotiation process and improves the existing low level Grid security in which every single user maps a single shared local name. Both PCM and CCM confirm the capability of the user based on various policies that can restrict priority of the different user groups and roles. We have analyzed the FAS strategy with the complexity of the policy graph-based strategy. In particular, we focused on the algorithm for constructing the policy graph. As a result, the total running time was significantly reduced.

현장스케치 - 원유가 협상 그 이후 진단과 대책 모색을 위한 국회 토론회 현장

  • Lee, Jeong-Hun
    • 월간낙농육우
    • /
    • v.31 no.11
    • /
    • pp.72-76
    • /
    • 2011
  • 김성수 한나라당 의원 주최, 한국농어민신문사가 주관한 '원유가협상 그 이후 진단과 대책마련 국회토론회'가 지난 10월 19일 국회에서 열렸다. 정부와 생산자 유가공업계, 낙농진흥회 등 대표자들이 참석해 차분한 분위기에서 열렸지만 주체벌 입장차는 여실히 드러났다. 쟁점사항은 협동조합중심의 집유일원화와 통계청 우유생산비의 신뢰성 문제, 낙농산업 제도 개선방안(원유기본가격연동제), 생산자 중심의 유가공공장 건립 등이었다. 낙농강국과의 자유무역협정이 진행되고 있는 가운데 낙농산업을 안정적으로 발전시키려면 정부의 강력한 제도개선의지와 각 이해주체들의 최선의 절충점 도출이 시급하다.

  • PDF

The relationship among Senior Dance participants' Fun, Leisure Constraints Negotiation and Intention to Continue Exercise of The Oldest Old

  • Moon-Sook Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.153-165
    • /
    • 2024
  • The purpose of this study was to examine the relationship among senior dance participants' fun, leisure constraints negotiation and intention to continue exercise of the oldest old. The questionnaires were analyzed 103 of the oldest old in D-city. The measurement tools used were fun, leisure constraints negotiation and intention to continue exercise. Amos 26.0 and SPSS WIN VER 26.0 program were used to analyze the data with correlation analysis, reliability analysis and structural equation model. the results of this study, First, it was showed that the fun of the oldest's old participation in senior dance had a significant effect on the intention to continue exercise. Second, it was showed that the fun of the oldest's old participation in senior dance had a significant effect on the leisure constraints negotiation. Third, it was showed that the leisure constraints negotiation of the oldest's old participation in senior dance had a significant effect on the intention to continue exercise. Fourth, it was showed that the leisure constraints negotiation of the oldest's old participation in senior dance had a partial mediation effect between fun and intention to continue exercise.

Generating Proposals by Agent-mediated in the Multi Attribute and Non-linear Negotiation Environment (다중속성, 비선형 협상전략 환경에서 중개 에이전트에 의한 제안생성 알고리즘)

  • Lee, Sang-Yong;Yang, Sung-Bong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1875-1878
    • /
    • 2003
  • 에이전트를 이용하여 의견을 교환하여 타협안을 찾거나. 혹은 양자간 협상 시 양쪽의 에이전트는 각자의 이익을 최대로 하려고 한다. 하지만 한쪽이 많은 이득을 많이 취할 경우 상대방의 이익은 줄어들게 되고 손해를 본 사용자는 에이전트의 신뢰를 잃게 된다. 본 연구에서는 다중 사용자, 다중 속성, 비선형 협상 전략 환경에서 유틸리티 함수와 유전자 알고리즘을 이용하여 양쪽에게 균등한 이익이 돌아감과 동시에 최대의 이익이 되는 제안을 생성하는 중개 에이전트의 핵심 알고리즘을 구현하는 것이 논문의 목적이다.

  • PDF

Security Policy Negotiation Model Design Using Mobile Agent System (이동 에이전트 시스템을 이용한 보안정책 협상모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.37-46
    • /
    • 2004
  • This paper presents the design of a certain highly efficient security policy negotiation of SPS(Security Policy System) using mobile agent system. The conventional IP security systems have some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

  • PDF