• Title/Summary/Keyword: Information Trust

Search Result 2,023, Processing Time 0.026 seconds

Trust Center based on Key Management Scheme in Sensor Networks (센서 네트워크 환경에서의 Trust Center 기반 키 관리 기법 설계)

  • Lee, Hyub-Gun;Lee, Kyoung-Hwa;Shin, Yong-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.633-634
    • /
    • 2009
  • 센서 네트워크(Sensor Network)는 유비쿼터스 컴퓨팅 환경 구현을 위한 기반 네트워크 기술로 다양한 분야에 활용되고 있다. 그러나 센서 네크워크의 구조적 특징으로 인해 보안에 취약하다는 단점이 있다. 본 논문에서는 센서 네트워크 환경에서 안전한 통신을 위한 Trust Center 기반 키 관리 기법을 설계하였다. 신규 노드 인증을 위한 키 관리 절차를 크게 키 생성, 키 분배, 키 갱신으로 구분하였다. 특히 키 분배 절차를 Trust Center 와 센서 노드 간의 키 분배, 센서 노드 간의 키 분배, Trust Center 간의 키 분배로 세분화시켜 Trust Center 가 신규 노드 인증시 이전의 인증 정보를 재사용함으로서 키 관리의 효율성을 높였다.

Social Network-based Hybrid Collaborative Filtering using Genetic Algorithms (유전자 알고리즘을 활용한 소셜네트워크 기반 하이브리드 협업필터링)

  • Noh, Heeryong;Choi, Seulbi;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.19-38
    • /
    • 2017
  • Collaborative filtering (CF) algorithm has been popularly used for implementing recommender systems. Until now, there have been many prior studies to improve the accuracy of CF. Among them, some recent studies adopt 'hybrid recommendation approach', which enhances the performance of conventional CF by using additional information. In this research, we propose a new hybrid recommender system which fuses CF and the results from the social network analysis on trust and distrust relationship networks among users to enhance prediction accuracy. The proposed algorithm of our study is based on memory-based CF. But, when calculating the similarity between users in CF, our proposed algorithm considers not only the correlation of the users' numeric rating patterns, but also the users' in-degree centrality values derived from trust and distrust relationship networks. In specific, it is designed to amplify the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the trust relationship network. Also, it attenuates the similarity between a target user and his or her neighbor when the neighbor has higher in-degree centrality in the distrust relationship network. Our proposed algorithm considers four (4) types of user relationships - direct trust, indirect trust, direct distrust, and indirect distrust - in total. And, it uses four adjusting coefficients, which adjusts the level of amplification / attenuation for in-degree centrality values derived from direct / indirect trust and distrust relationship networks. To determine optimal adjusting coefficients, genetic algorithms (GA) has been adopted. Under this background, we named our proposed algorithm as SNACF-GA (Social Network Analysis - based CF using GA). To validate the performance of the SNACF-GA, we used a real-world data set which is called 'Extended Epinions dataset' provided by 'trustlet.org'. It is the data set contains user responses (rating scores and reviews) after purchasing specific items (e.g. car, movie, music, book) as well as trust / distrust relationship information indicating whom to trust or distrust between users. The experimental system was basically developed using Microsoft Visual Basic for Applications (VBA), but we also used UCINET 6 for calculating the in-degree centrality of trust / distrust relationship networks. In addition, we used Palisade Software's Evolver, which is a commercial software implements genetic algorithm. To examine the effectiveness of our proposed system more precisely, we adopted two comparison models. The first comparison model is conventional CF. It only uses users' explicit numeric ratings when calculating the similarities between users. That is, it does not consider trust / distrust relationship between users at all. The second comparison model is SNACF (Social Network Analysis - based CF). SNACF differs from the proposed algorithm SNACF-GA in that it considers only direct trust / distrust relationships. It also does not use GA optimization. The performances of the proposed algorithm and comparison models were evaluated by using average MAE (mean absolute error). Experimental result showed that the optimal adjusting coefficients for direct trust, indirect trust, direct distrust, indirect distrust were 0, 1.4287, 1.5, 0.4615 each. This implies that distrust relationships between users are more important than trust ones in recommender systems. From the perspective of recommendation accuracy, SNACF-GA (Avg. MAE = 0.111943), the proposed algorithm which reflects both direct and indirect trust / distrust relationships information, was found to greatly outperform a conventional CF (Avg. MAE = 0.112638). Also, the algorithm showed better recommendation accuracy than the SNACF (Avg. MAE = 0.112209). To confirm whether these differences are statistically significant or not, we applied paired samples t-test. The results from the paired samples t-test presented that the difference between SNACF-GA and conventional CF was statistical significant at the 1% significance level, and the difference between SNACF-GA and SNACF was statistical significant at the 5%. Our study found that the trust/distrust relationship can be important information for improving performance of recommendation algorithms. Especially, distrust relationship information was found to have a greater impact on the performance improvement of CF. This implies that we need to have more attention on distrust (negative) relationships rather than trust (positive) ones when tracking and managing social relationships between users.

Protecting the iTrust Information Retrieval Network against Malicious Attacks

  • Chuang, Yung-Ting;Melliar-Smith, P. Michael;Moser, Louise E.;Lombera, Isai Michel
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.3
    • /
    • pp.179-192
    • /
    • 2012
  • This paper presents novel statistical algorithms for protecting the iTrust information retrieval network against malicious attacks. In iTrust, metadata describing documents, and requests containing keywords, are randomly distributed to multiple participating nodes. The nodes that receive the requests try to match the keywords in the requests with the metadata they hold. If a node finds a match, the matching node returns the URL of the associated information to the requesting node. The requesting node then uses the URL to retrieve the information from the source node. The novel detection algorithm determines empirically the probabilities of the specific number of matches based on the number of responses that the requesting node receives. It also calculates the analytical probabilities of the specific numbers of matches. It compares the observed and the analytical probabilities to estimate the proportion of subverted or non-operational nodes in the iTrust network using a window-based method and the chi-squared statistic. If the detection algorithm determines that some of the nodes in the iTrust network are subverted or non-operational, then the novel defensive adaptation algorithm increases the number of nodes to which the requests are distributed to maintain the same probability of a match when some of the nodes are subverted or non-operational as compared to when all of the nodes are operational. Experimental results substantiate the effectiveness of the detection and defensive adaptation algorithms for protecting the iTrust information retrieval network against malicious attacks.

How Much Impact do Social Media Make on Chasm and Buyer's Value? : The Information Accessibility and Trust Effect among Adopting Groups (소셜 미디어는 캐즘(Chasm)과 구매 가치에 얼마나 영향을 미치는가? : 채택 집단간 정보력 및 신뢰도 효과)

  • Jung, Byungho;Kwon, Taehyoung
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.221-251
    • /
    • 2014
  • This paper is to investigate the degree of impact of social media use on buyer's value. Buyers of innovative digital devise are classified into three groups based on adopting behaviors. This study focuses on the degree of changes in information accessability and trust, and their associations with increased value perceived in resulting quality life. The result shows the gap in information accessability has disappeared while the one in trust remained. This implies that the gap among adopters in diffusion curve, so-called the chasm notion is very likely to be lessened or disappeared due to social network openness. Also, shown are the relationship of these variables with the degree of purchase value more stable with information accessability than with trust, all in varying patterns though. It implies that information sharing through social media be accompanied with source credibility in order to be of more value not only to buyers but also to sellers especially for new interactive devices.

A Cross-National Study on the Determinants of Trust in Internet Shopping Mall : Focusing on Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 국가 간 비교 연구 : 한국.중국 이용자를 대상으로)

  • Jung, Chul-Ho;Chung, Young-Su
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.321-349
    • /
    • 2007
  • The objective of this study is to investigate factors influencing trust on internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on the literature reviews, this study employs six factors in two groups of influencing factors, web-site characteristics and individual characteristics as key determinants of trust in internet shopping mall. Analysis of 470 responses (Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following: In terms of the relationship between web-site characteristics factors and the trust, the results showed clear differences between Korean and Chinese samples. For the Korean samples, transaction security and interactivity were the only significant influencing factors. For the Chinese samples, perceived reputation and perceived size were the only significant factors. In terms of individual characteristics factors, the influencing factors were found identical for the samples. Both propensity to trust and familiarity were significant factors in both Korean and Chinese samples. Based on the findings, managerial implications are discussed in building user trust in internet shopping mall in Korean and Chinese market.

  • PDF

Applying The Technology Acceptance Model and Trust Beliefs to Online B2C Websites (온라인 B2C 웹사이트에 기술수용모델 및 신뢰 신념의 적용)

  • Park, Kwan-Hee
    • The Journal of Information Systems
    • /
    • v.13 no.2
    • /
    • pp.173-193
    • /
    • 2004
  • B2C EC has two kinds of perspectives such as technology-oriented and trust-oriented perspectives. As lots of fraud damages on the B2C EC have been reported every day, the trust-oriented perspective receives lots of attention. In this study, an integrative typology for developing and validating trust measures for B2C EC proposed by McKnight et al.(2002a) and McKnight and Chevany(2002b) has been used for trust-oriented perspective, and the TAM(technology acceptance model) model proposed by Fred Davis in 1985 has been used for technology-oriented perspective. An research model had been developed by using the 4 factors of an integrative typology and 5 factors of the TAM model such as perceived usefulness, perceived ease of use, trust beliefs, intention, and actual transaction. All 13 hypotheses had been proposed from this research model and tested by field study. 12 hypotheses, including the 4 f actors of an integrative typology as antecedents on trust beliefs, were significant, whereas the hypothesis 5 on the relationship between structural assurance and perceived ease of use was insignificant. Structures on B2C EC like guarantees, regulations, promises, legal recourse, or other procedures seemed to be difficult to B2C EC customers. Therefore, these structures should be developed more easier to B2C EC customers.

  • PDF

An Empirical Study on the Determinants of e-Trust - Focused on the Domestic Trade Portal Site - (e-신뢰(e-Trust)의 결정요인에 관한 연구 -국내 무역포털사이트를 중심으로-)

  • Song, Sun-Yok
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.41
    • /
    • pp.205-234
    • /
    • 2009
  • The trade portal site is one of the innovative skills which makes it possible for trade companies to manage international trade activities more efficiently by using the newest information technology. Especially, trade portal site can be considerable help to small and medium-sized enterprises which have much difficulties in finding overseas buyers due to the lack of international marketing capabilities. This study attempts to present a comprehensive model about the determinants of e-Trust in domestic trade portal site and to suggest practical strategies for e-Trade. Therefore, a theoretical framework was presented by the literature review, and a empirical study was carried out through a questionnaire survey to those who have had experiences of visiting trade portal site. The empirical analysis had the following results. First, it reveals that reputation, web-site quality, transaction efficiency of the trade portal site have influence upon e-Trust dimension. On the other hand, perceived risk did not have significant relationship with e-Trust. Second, e-Trust had significant impact on willingness to depend on the trade portal site. And also, e-Trust had positive influence on performance of using which is measured by sales increase, information sharing, and synergy effect.

  • PDF

IPTV in Korea: The Effect of Perceived Interactivity on Trust, Emotion, and Continuous Use Intention

  • Shin, Geena;Ahn, Joong-Ho;Kim, Taeha
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.55-76
    • /
    • 2013
  • The principal objective of the work is to confirm the effects of perceived interactivity, trust, and emotion on intentions to use IPTV service. The empirical investigation into IPTV service users suggests that (i) the perception of interactivity should be directly related with trust, (ii) Users' trust should bolster users' emotion in a positive or negative aspect, and (iii) such emotion is verified to affect the intention to use IPTV continuously. More specifically, we demonstrate that positive and negative emotions influence user intentions positively and negatively. Additionally, we find that the trust mediates perceived interactivity and emotions, and both trust and emotion mediate the relationship between perceived interactivity and intentions to use IPTV. The work indicates that trust and emotion of users should be considered from IS perspective in an attempt to build the intention to use IPTV. IPTV firms should consider in their IPTV design and offering strategy how to enhance positive emotions for user retention and eventually bolster intentions to use IPTV continuously.

The Effect of Using Smartphones on the Intention of Using Smartwatches - Focused on the Brand Extension - (스마트폰 사용이 스마트워치 사용의도에 미치는 영향 - 브랜드 확장의 관점 -)

  • Lim, Yangwhan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.99-111
    • /
    • 2017
  • Although smartwatches are different from smartphones in shape and carried method, they are also highly relevant to smartphones and have similar characteristics. This paper studied the impact of using smartphones on the intention to use smartwatches from the perspective of brand extension. The hypotheses were that the major factors of the attitude formed in the process of using smartphones affect the intention of using them and affect the trust of smartwatches. As a result of testing the hypotheses, trust in smartphonees affected trust in smartwatches. And the intention to use smartphones and the trust of smartwatches affected the intention to use smartwatches. However, the satisfaction, familiarity, and favorability of smartphones did not affect the trust of smartwatches. Smartwatches were associated with smartphones but they had independent characters. Based on the results of the study, the trust of smartwatches is very important, so the corporate managers need to find ways to improve their trust. And they should find strategies to improve the value of the product by finding out the factors that can increase the intention of using smartwatches.

When in danger, who will help you? Two types of trust in technical coping on online platforms

  • Lee, Saerom
    • The Journal of Information Systems
    • /
    • v.32 no.4
    • /
    • pp.69-94
    • /
    • 2023
  • Purpose Social networking service (SNS) platforms employ distinct networking strategies to meet the varying needs of their users, resulting in divergent sets of technological functionalities offered by each platform. Consequently, unique features on various SNSs give rise to distinct social issues. Moreover, the available technical coping mechanisms for users vary significantly across platforms. Design/methodology/approach Therefore, this study analyzes the factors affecting technical coping intention based on technical functions of SNSs for users exposed to cybercrime, such as sexual harassment. We divide coping intention into active and passive coping intention. Furthermore, this research focuses on trust as an antecedent of coping intention and verifies how human and system-like trust affects two coping intentions in different directions. Findings Findings reveal that system-like trust significantly affects both active and passive coping intention as a belief in whether the technology will work properly. However, in the case of human-like trust, trust in the platform provider was found to negatively affect passive coping, which is considered unsocialized behavior on SNS platforms. Therefore, both human-like and system-like trust for the platform must be appropriately applied to cope with the problem while activating the platform.