• Title/Summary/Keyword: Technology Trust

Search Result 968, Processing Time 0.022 seconds

An Empirical Study on the Effect of Trust to RFID Technology Acceptance (신뢰가 RFID 기술수용에 미치는 영향에 관한 실증연구)

  • Lee, Mi-Sook
    • Journal of Technology Innovation
    • /
    • v.16 no.1
    • /
    • pp.47-79
    • /
    • 2008
  • RFID(Radio Frequency Identification) technologies enjoy an enormous interest in all throughout the world, not only from the research but also from corporate practice. Although bar code is gradually substituted with RFID technology, the use of RFID technology in the companies is at the early stages and it's potential value isn't fully realized yet. RFID-related-trust is needed to solve these problems because these phenomena are related to uncertainties or risks disturbing RFID diffusion. This paper focuses on trust in the adoption of RFID and analyzes the effect to RFID technology acceptance of trust. This paper proposes 5 second constructs of trust; institutional trust, trust between companies, trust within company, technology trust, and service provider trust. In order to analyze some relationships between trust variable and 4 variables in TAM, structural equation modeling(SEM) is developed and SPSS 12.0 and AMOS 7.0 are used for analyses.

  • PDF

A Study on Trust and Distrust on Science and Technology: Focusing on Geological Resource Technology (과학기술에 대한 신뢰 및 불신 연구: 지질자원기술을 중심으로)

  • Kim, Chan-Souk;Lee, Hyunseon
    • Economic and Environmental Geology
    • /
    • v.52 no.6
    • /
    • pp.605-616
    • /
    • 2019
  • The purpose of this study is to measure the trust and distrust perception of our society about science and technology. In addition to examining trust and distrust in science and technology, we also looked at trust and distrust in geoscience technology. In addition, by comparing the levels of trust and distrust in science and technology and geological resource technology, the implications for improving the reliability of geological resource technology are drawn. This study surveyed male and female office workers over 20 years of age working in the Seoul metropolitan area on the trust and distrust of science and technology. The results of this study show that respondents showed above-average trust in science and technology and geological resource technology. According to the gender or age of respondents, there was no difference in trust and distrust of science and technology and geological resource technology. As a result of examining the difference between trust and distrust in science and technology and geological resource technology, respondents showed higher trust scores in science and technology than geological resource technology. These results suggest that current communications activities on geological resources should be more active and diversified.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

Dynamic Trust Model Based on Extended Subjective Logic

  • Junfeng, Tian;Jiayao, Zhang;Peipei, Zhang;Xiaoxue, Ma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3926-3945
    • /
    • 2018
  • In Jøsang's trust model, trust evaluation is obtained through operators, but there are problems with the mutuality and asymmetry of trust and the impact of event weight on trust evaluation. Trust evaluation is updated dynamically and continuously with time and the process of interactions, but it has not been reflected in Jøsang's model. Therefore, final trust evaluation is not accurate, and malicious fraud cannot be prevented effectively. This causes the success rate of interaction to be low. To solve these problems, a new dynamic trust model is proposed based on extended subjective logic (DTM-ESL). In DTM-ESL, the event weight and the mutuality of trust are fully considered, the original one-way trust relationship is extended to a two-way trust relationship, discounting and consensus operators are improved, and trust renewal is designed based on event weight. The viability and effectiveness of this new model are verified by simulation experiments.

TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks

  • Li, Jingru;Yu, Li;Zhao, Jia;Luo, Chao;Zheng, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3273-3308
    • /
    • 2017
  • Building appropriate trust evaluation models is an important research issue for security guarantee in social networks. Most of the existing works usually consider the trust values at the current time slot, and model trust as the stochastic variable. However, in fact, trust evolves over time, and trust is a stochastic process. In this paper, we propose a novel time-variant stochastic trust evaluation (TSTE) model, which models trust over time and captures trust evolution by a stochastic process. Based on the proposed model, we derive the time-variant bound of untrustworthy probability, which provides stochastic trust guarantee. On one hand, the time-variant trust level of each node can be measured by our model. Meanwhile, by tolerating nodes with relatively poor performance, our model can effectively improve the node resource utilization rate. Numerical simulations are conducted to verify the accuracy and consistency of the analytical bounds on distinguishing misbehaved nodes from normal ones. Moreover, simulation results on social network dataset show the tradeoff between trust level and resource utilization rate, and verify that the successful transmission rate can be improved by our model.

Trust-aware secure routing protocol for wireless sensor networks

  • Hu, Huangshui;Han, Youjia;Wang, Hongzhi;Yao, Meiqin;Wang, Chuhang
    • ETRI Journal
    • /
    • v.43 no.4
    • /
    • pp.674-683
    • /
    • 2021
  • A trust-aware secure routing protocol (TSRP) for wireless sensor networks is proposed in this paper to defend against varieties of attacks. First, each node calculates the comprehensive trust values of its neighbors based on direct trust value, indirect trust value, volatilization factor, and residual energy to defend against black hole, selective forwarding, wormhole, hello flood, and sinkhole attacks. Second, any source node that needs to send data forwards a routing request packet to its neighbors in multi-path mode, and this continues until the sink at the end is reached. Finally, the sink finds the optimal path based on the path's comprehensive trust values, transmission distance, and hop count by analyzing the received packets. Simulation results show that TSRP has lower network latency, smaller packet loss rate, and lower average network energy consumption than ad hoc on-demand distance vector routing and trust based secure routing protocol.

A Distributed Decision-Making Mechanism for Wireless P2P Networks

  • Wu, Xu;He, Jingsha;Xu, Fei;Zhang, Xi
    • Journal of Communications and Networks
    • /
    • v.11 no.4
    • /
    • pp.359-367
    • /
    • 2009
  • Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to attack if they do not have knowledge or correct knowledge of other peers in a trust management system. Therefore, considering only trust is inadequate when a decision is made to identify the best set of peers to utilize. In order to solve the problem, we propose a distributed decision-making mechanism for wireless peer-to-peer (P2P) networks based on game theory and relevant trust mechanisms in which we incorporate the element of trust and risk into a single model. The main idea of our mechanism is to use utility function to express the relationship between benefits and costs of peers, and then make the decision based on expected utility as well as risk attitude in a fully distributed fashion. The unique feature of our mechanism is that it not only helps a peer to select its partners, but also mitigates vulnerabilities in trust-based mechanisms. Through analysis and experiments, we believe our approach is useful for peers to make the decision regarding who to interact with. In addition, it is also a good starting point for exploring tradeoffs among risk, trust and utility.

DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing

  • Zhou, Zhen-Ji;Wu, Li-Fa;Hong, Zheng;Xu, Ming-Fei;Pan, Fan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.305-325
    • /
    • 2014
  • In cloud computing infrastructure, current virtual machine trust measurement methods have many shortcomings in dynamism, security and concurrency. In this paper, we present a new method to measure the trust of virtual machine. Firstly, we propose "behavior trace" to describe the state of virtual machine. Behavior trace is a sequence of behaviors. The measurement of behavior trace is conducted on the basis of anticipated trusted behavior, which not only ensures security of the virtual machine during runtime stage but also reduces complexity of the trust measurement. Based on the behavior trace, we present a Dynamic Tree Style Trust Measurement Model (DTSTM). In this model, the measurement of system domain and user domain is separated, which enhances the extensibility, security and concurrency of the measurement. Finally, based on System Call Interceptor (SCI) and Virtual Machine Introspection (VMI) technology, we implement a DTSTM prototype system for virtual machine trust measurement. Experimental results demonstrate that the system can effectively verify the trust of virtual machine and requires a relatively low performance overhead.

Trust-based business model in trust economy: External interaction, data orchestration and ecosystem value

  • Minzheong, Song
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.32-41
    • /
    • 2018
  • The aim of this study is to formulate a trust-based business model of Internet services in so called the "trust economy." For it, firstly concepts of trust and trust economy are discussed. Then, we present previous literatures' review of trust in social science prism and trust economy in economic prism. This study classified the literatures' stances with two viewpoints of the 'system' and the 'user'. With this backdrop, we discuss three contradictory stances: Internal optimization vs. external interaction, personal data control vs. orchestration, and end-user vs. ecosystem value. In the result, we formulate a trust-based business model framework with three trust issues in user perspective and suggests three strategic directions related three issues along with representative use cases.

A Study on the Impact of Perceived Risk Factors on Cognitive Trust and Quality Trust in Mobile Payment Systems

  • Choi, Hun;Choi, Yoo Jung
    • International Journal of Contents
    • /
    • v.14 no.4
    • /
    • pp.18-23
    • /
    • 2018
  • Recently, the developments in IT technology and the spread of smart phones have made Fin-Tech, which is a combination of financial services and IT technology, a big issue. In accordance with the growth trend of mobile payments in the world, all financial transactions in Korea are gradually shifting to smart phones. In fact, mobile payment system services are not widely used by users. In particular, the risk factors involved when users want to use the service are one of the factors that hinder the expansion of the usage of mobile financial payment service. The risk factors affect the trust of the mobile payment system users. Therefore, this study investigates the risk factors of the mobile payment system and the manner in which it affects a user's trust. We have also examined as how user's trust affects trust in the quality of the mobile payment system. To this end, the trust in overall quality of use was largely divided into trust in system quality, trust in information quality, and trust in service quality. Perceived finance risk, perceived performance risk, and perceived privacy risk have negative effects on cognitive trust. However, perceived time risk did not affect cognitive trust. User's cognitive trust also has an effect on trust in quality.