• Title/Summary/Keyword: Dynamic trust model

Search Result 31, Processing Time 0.03 seconds

An Empirical Study on the Structural Relationships among Colleague trustworthiness, Organizational trust and Organizational citizenship behaviors (동료신뢰성, 조직신뢰, 조직시민행동 간의 구조적 관계)

  • Baek, You-Sung
    • Management & Information Systems Review
    • /
    • v.35 no.4
    • /
    • pp.155-168
    • /
    • 2016
  • The purpose of this study is to empirically examine the structural relationships among colleague trustworthiness, organizational trust and organizational citizenship behaviors(OCB). To conduct such examination, the author (i) designated colleague trustworthiness, organizational trust and OCB as variables and (ii) designed a research model by conducting preceding studies on the variables. To examine the research model the author collected the survey data from the 2 universities employees, 134 copies of questionnaire. Collected data were analyzed using SPSS and AMOS programs. The analysis results are as follows. Especially, (1) there was no statistically significant relationship between colleague trustworthiness and OCB. (2) it was found that higher degree of integrity the constructs of colleague trustworthiness would lead to higher degree of organizational trust. (3) organizational trust has been found to exert mediating effect on the relationship between colleague trustworthiness and OCB. The implication and limitation which this study are as follows. First, this study has discovered that organizational trust is the important mediating variable that affect the process of relationship between colleague trustworthiness and OCB. This study have limitation in that was conducted based on cross-sectional design of research. Because, the formation of trust is a dynamic process.

  • PDF

A Study on e-CRM in Fashion Internet Shopping Mall -Focusing on trust and commitment- (패션제품의 e-CRM에 관한 연구(1보) -신뢰와 관계몰입을 중심으로-)

  • 이지현;이승희;임숙자
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.6
    • /
    • pp.685-695
    • /
    • 2003
  • The purpose of this study was to identify dynamic relationship structure in fashion Internet shopping mall and to present marketers to perform marketing strategy in e-CRM, focusing on trust and commitment. 473 customers who had purchased fashion products in fashion internet shopping mall had participated in the survey. Finally, 470 were used into data analysis. The data was analyzed by factor analysis, t-test, ANOVA, correlation analysis and Structural Equation Model(SEM) using AMOS program. As the results, 'economic benefits' and 'service' variables had the positive effects on 'trust'. Especially, 'service' had the major effect on 'trust'. 'Trust' and 'product information quality' had the positive effects on 'emotional commitment'. 'Trust', 'economic benefits' and 'reputation' had the positive effects on calculus commitment, while contents had the negative effect. Also, 'emotional' and 'calculus' commitment had positive effects on 'relationship maintenance intention'. 'Emotional commitment' had higher effect on 'relationship maintenance intention' than 'calculus commitment'. 'Calculus commitment' had the positive effect on discontinue relationship intention when shopping mall made mistakes. The results of this study provide e-CRM marketing strategy for marketers of fashion internet shopping mall.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

A system dynamics study on the Trust and Cooperation in the Policy Implementation Network (정책집행 네트워크에서의 신뢰와 협력생성에 관한 시스템다이내믹스 연구)

  • 박성진;맹보학
    • Korean System Dynamics Review
    • /
    • v.1 no.2
    • /
    • pp.61-89
    • /
    • 2000
  • The purpose of this study is first, to find out what factors affect the cooperation and trust within the functions in the policy implementation network and in what mechanism these factors interact, second to investigate the whys to manage trust and cooperation successfully in the dynamic situation such as the network setting. For these purpose, this study reviews the concept and characteristics of policy implementation organizations, second, extracts the various factors affecting trust and cooperation in the network situation, third applies and analyzes the relationship among factors to system dynamics model based on the game theory. The results of this study could be summarized as follows: It was found that the utility change within the participants by persuasion & mutual understanding and change of rule would be leading to success in policy implementation network. Also bureaucratic management such as power enforcement does not have any good impact in the managing network. In this study, system simulation method tried to analyze the hypothesis. Quantitative and case analyses were not accompanied and analysis was limited to two-person game theory. So there is some doubt this results could be generalized to actual situation which is N-person game.

  • PDF

A Secure and Efficient Cloud Resource Allocation Scheme with Trust Evaluation Mechanism Based on Combinatorial Double Auction

  • Xia, Yunhao;Hong, Hanshu;Lin, Guofeng;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4197-4219
    • /
    • 2017
  • Cloud computing is a new service to provide dynamic, scalable virtual resource services via the Internet. Cloud market is available to multiple cloud computing resource providers and users communicate with each other and participate in market transactions. However, since cloud computing is facing with more and more security issues, how to complete the allocation process effectively and securely become a problem urgently to be solved. In this paper, we firstly analyze the cloud resource allocation problem and propose a mathematic model based on combinatorial double auction. Secondly, we introduce a trust evaluation mechanism into our model and combine genetic algorithm with simulated annealing algorithm to increase the efficiency and security of cloud service. Finally, by doing the overall simulation, we prove that our model is highly effective in the allocation of cloud resources.

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

Efficient Approximation Method for Constructing Quadratic Response Surface Model

  • Park, Dong-Hoon;Hong, Kyung-Jin;Kim, Min-Soo
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.7
    • /
    • pp.876-888
    • /
    • 2001
  • For a large scaled optimization based on response surface methods, an efficient quadratic approximation method is presented in the context of the trust region model management strategy. If the number of design variables is η, the proposed method requires only 2η+1 design points for one approximation, which are a center point and tow additional axial points within a systematically adjusted trust region. These design points are used to uniquely determine the main effect terms such as the linear and quadratic regression coefficients. A quasi-Newton formula then uses these linear and quadratic coefficients to progressively update the two-factor interaction effect terms as the sequential approximate optimization progresses. In order to show the numerical performance of the proposed method, a typical unconstrained optimization problem and two dynamic response optimization problems with multiple objective are solved. Finally, their optimization results compared with those of the central composite designs (CCD) or the over-determined D-optimality criterion show that the proposed method gives more efficient results than others.

  • PDF

A Study on Secure Routing Technique using Trust Model in Mobile Ad-hoc Network (신뢰 모델을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.11-16
    • /
    • 2017
  • MANET composed of only mobile node is applied to various environments because of its advantage which can construct network quickly in emergency situation. However, many routing vulnerabilities are exposed due to the dynamic topology and link failures by the movement of nodes. It can significantly degrade network performance. In this paper, we propose a secure routing protocol based on trust model. The domain-based network structure is used for efficient trust evaluation and management of nodes in the proposed technique. The reliability evaluation of nodes was performed by the discard ratio of control packet and data packet of the nodes. The abnormal nodes are detected by performing traffic check and inspecting of nodes on a path that generates excessive traffic in order to increase the efficiency of routing. It is confirmed through experiments of the proposed technique that data transmission is performed securely even if an attack exists on the path.

Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy (제로 트러스트를 위한 소프트웨어 정의 경계(SDP) 인증 메커니즘 제안 및 ECC 암호 구현)

  • Lee, Yun-kyung;Kim, Jeong-nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1069-1080
    • /
    • 2022
  • Zero trust, which means never trust anything before verifying it, is emerging as a hot issue in security field. After authenticating users, zero trust establishes network boundaries so that only networks in the trusted range can be accessed. This concept is also consistent with the concept of SDP, which performs pre-verification and creates a network boundary with a dynamic firewall so that clients can access only as many as they have permission to connect. Therefore, we recommend the SDP model as an example of how zero trust can be achieved in a zero trust architecture. In this paper, we point out the areas where SDP needs to be modified for zero trust and suggest ways to overcome them. In addition, we propose an onboarding method, which is one of the processes for becoming an SDP entity, and present performance measurement results.

A Study on e-CRM in Fashion Internet Shopping Mall -Comparing groups by gender- (패션 제품의 e-CRM에 관한 연구 (제2보) -성별의 조절 효과-)

  • 이지현;이승희;임숙자
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.7
    • /
    • pp.809-818
    • /
    • 2003
  • The purpose of this study was to identify importance of gender in dynamic relationship structure in fashion internet shopping mall and to provide marketers e-CRM marketing strategy. Out of 473 customers, 470 who had purchased fashion products in fashion Internet shopping mall were surveyed for this study. The data was analyzed by factor analysis, 1-test, correlation analysis, Structural Equation Model(SEM) using AMOS program. As the results, both men and women had ‘relationship maintenance intention’ in e-CRM. However, only women had ‘intention to discontinue relationship’, when shopping mall made mistakes to them. Also, in men's group, ‘service’ only had effect on ‘Trust’, while ‘service’and ‘financial benefit’ had effects on‘Trust’ in women's group. If women would be dissatisfied with a shopping mall, they have a strong intention to disconnect with it. Based on these results, it could be concluded that men have more tolerance for shopping mall's mistakes than women have. Therefore, the results of this study provide e-CRM marketing strategy for fashion internet marketers.