• Title/Summary/Keyword: Technology Trust

Search Result 975, Processing Time 0.027 seconds

Applying The Technology Acceptance Model and Trust Beliefs to Online B2C Websites (온라인 B2C 웹사이트에 기술수용모델 및 신뢰 신념의 적용)

  • Park, Kwan-Hee
    • The Journal of Information Systems
    • /
    • v.13 no.2
    • /
    • pp.173-193
    • /
    • 2004
  • B2C EC has two kinds of perspectives such as technology-oriented and trust-oriented perspectives. As lots of fraud damages on the B2C EC have been reported every day, the trust-oriented perspective receives lots of attention. In this study, an integrative typology for developing and validating trust measures for B2C EC proposed by McKnight et al.(2002a) and McKnight and Chevany(2002b) has been used for trust-oriented perspective, and the TAM(technology acceptance model) model proposed by Fred Davis in 1985 has been used for technology-oriented perspective. An research model had been developed by using the 4 factors of an integrative typology and 5 factors of the TAM model such as perceived usefulness, perceived ease of use, trust beliefs, intention, and actual transaction. All 13 hypotheses had been proposed from this research model and tested by field study. 12 hypotheses, including the 4 f actors of an integrative typology as antecedents on trust beliefs, were significant, whereas the hypothesis 5 on the relationship between structural assurance and perceived ease of use was insignificant. Structures on B2C EC like guarantees, regulations, promises, legal recourse, or other procedures seemed to be difficult to B2C EC customers. Therefore, these structures should be developed more easier to B2C EC customers.

  • PDF

A Study on the Application of Security Reinforcement Technology Reflecting Zero Trust Principles (제로 트러스트 원리를 반영한 보안 강화 요소 기술 적용 방안 연구)

  • DA-IN Lee;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.3-11
    • /
    • 2022
  • With increasingly sophisticated cyber threats, accelerating cloud adoption, and the adoption of remote and hybrid work environments due to the COVID-19 pandemic, the traditional security model, in which many businesses implicitly trust everything within their boundaries, is changing without boundaries, allowing data and users The concept of zero trust is getting more and more attention as the fact that it is not suitable for today's increasingly decentralized environment has been highlighted. Zero Trust is a cyber security model on the premise that 'no one trusts'. In principle, there is no safe area or user in the entire system, and internal users are also verified. is a way As telecommuting becomes commonplace due to the COVID-19 pandemic, and existing cyber security measures are facing limitations, Zero Trust technology is drawing more attention. Accordingly, it is expected that the Korean government will also check the status of acceptability of the domestic public and private sectors and tasks that need improvement when introducing Zero Trust with reference to the NIST standard. In this paper, the basic principles, philosophy, and considerations of Zero Trust and Zero Trust are explained, and practical basic measures to strengthen security by combining Zero Trust technology are presented.

A trust evaluation method for improving nodes utilization for wireless sensor networks

  • Haibo, Shen;Kechen, Zhuang;Hong, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1113-1135
    • /
    • 2018
  • Existing trust evaluation models for wireless sensor networks can accurately and objectively evaluate trust value of nodes, but the nodes' energy saving problem was ignored. Especially when there are a few malicious nodes in a network, the overall trust value calculation for all nodes would waste lots of energy. Beside that, the network failure caused by nodes death was also not considered. In this paper, we proposed a method for avoiding energy hole which applied trust evaluation models and a trust evaluation method based on information entropy, so as to achieve the purpose of improving nodes utilization. Simulation results show that the proposed method can effectively improve nodes utilization, and it has reasonable detection rate and lower false alert rate compared to other classical methods.

A Study on Gender Difference in Antecedents of Trust and Continuance Intention to Purchase Voice Speakers

  • Youness EL Mezzi;Nicole Agnieszka Rydz;Kyung Jin Cha
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.614-635
    • /
    • 2020
  • This study aims at understanding gender difference in trust and the related factors affecting the intention to purchase voice speakers VS. VS are one of the innovations that are emerging at a fast pace in the market. Although it seems to be widely embraced by both genders, people do not intend to use them in some cases due to a lack of trust and the rumors circling these types of technologies. Nevertheless, there are particular barriers to the acceptance of VS technology between females and males due to unfamiliarity with the effective components of such technologies. Therefore, assuming that increasing the knowledge-based familiarity with an effective technique is essential for accepting it. So far, only little is known about VS and its concepts to increase the familiarity and, as a consequence, the acceptance of effective technology. Technology adoption in gender has been studied for many years, and there are many general models in the literature describing it. However, having more customized models for emerging technologies upon their features seems necessary. This study is based on Theory of Reasoned Action and trust-based acceptance which provides a background for understanding the relationships between beliefs, attitude, intentions, and subject norms and how it's affecting gender trust in VS. The statistical analysis results indicate that perceived system quality and perceived interaction quality have stronger influences on trust for males, while privacy concern and emotional trust have stronger influences on trust for females with the intention of purchase for both genders. Our study can be beneficial for future research in the areas of Perceived risk and Perceived utility and behavioral intention to use and human-technology interaction and psychology.

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment

  • Liu, Zhiquan;Ma, Jianfeng;Jiang, Zhongyuan;Miao, Yinbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.914-934
    • /
    • 2016
  • In the mobile distributed environment, an entity may move across domains with great frequency. How to utilize the trust information in the previous domains and quickly establish trust relationships with others in the current domain remains a challenging issue. The classic trust models do not support cross-domain and the existing cross-domain trust models are not in a fully distributed way. This paper improves the outstanding Certified Reputation (CR) model and proposes a Lightweight Cross-domain Trust (LCT) model for the mobile distributed environment in a fully distributed way. The trust certifications, in which the trust ratings contain various trust aspects with different interest preference weights, are collected and provided by the trustees. Furthermore, three factors are comprehensively considered to ease the issue of collusion attacks and make the trust certifications more accurate. Finally, a cross-domain scenario is deployed and implemented, and the comprehensive experiments and analysis are conducted. The results demonstrate that our LCT model obviously outperforms the Bayesian Network (BN) model and the CR model in our cross-domain scenario, and significantly improves the successful interaction rates of the honest entities without increasing the risks of interacting with the malicious entities.

An Empirical Study on the Determinants of Trust in Internet Shopping Mall : The Comparison of Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 실증연구 : 한.중국 이용자 비교 분석)

  • Jung, Chul-Ho;Chung, Young-Soo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.437-462
    • /
    • 2006
  • The objective of this study is to investigate what factors influence a major role in building trust on Internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on relevant literature review, this study posits six factors of transaction security, perceived reputation, Perceived size, interactivity, propensity of trust, and familiarity as key determinants of trust in internet shopping mall. Analysis of 470 responses(Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following; First, in terms of the relationship between influencing factors and the trust, five factors of transaction security, perceived reputation, perceived size, interactivity, and propensity to trust have a significant positive effects on the trust. Second, the differences between Korean and Chinese users are transaction security, perceived size, and familiarity. In conclusions, we suggested the factors to create user trust in internet shopping mall. Also we suggested differences in the determinant factors between Korean and Chinese users, and discussed some policies to build the trust in each user types.

  • PDF

Analyzing the Effect of Trust in Reviews on Trust in a Product and a Company: Using the Trust Transfer Theory

  • Namjae Cho;Xiaochen Li;Giseob Yu
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.57-77
    • /
    • 2024
  • The aim of this research is to examine the impact of trust in reviews. Expertise, enjoyment, recency, and usefulness-four aspects of reviews-are designated as independent variables, and trust in reviews has been chosen as the mediating variable. The dependent variables are trust in firms and trust in products. For explaining the flow of trust, this study uses the theory of Trust Transfer. The study's findings demonstrated that customer trust in a product leads to consumer trust in a company, which is derived from trust in reviews. Reviews were found to be important from a practical standpoint. Furthermore, it was discovered that a product's category or features would have an impact on how reviews are trusted.

ITU-T International Standard based Trust-enabled Service Provisioning Technology (ITU-T 국제표준 중심의 신뢰 서비스 프로비저닝 기술)

  • Hoan-Suk Choi;Jun-Kyun Choi;Woo-Seop Rhee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.6
    • /
    • pp.420-433
    • /
    • 2023
  • With the development of ICT technologies, various systems and services based on data have been introduced. Also, raising the importance of technologies that provide trust to a data, infrastructure, and services. for ICT services. However, in the existing ICT service environment, there is no way to objectively judge and manage the trust of various components (content, infrastructure, process, service provider, etc) that constitute a specific service, and there is a limitation that we can only rely on the service provider's own quality standards. This paper provides requirements, functional archtecture, and procedures for providing reliable ICT services from the perspective of ITU-T international standards. Trust-enabled service provisioning adds additional functions for providing trust to existing ICT service entities (service resources, stakeholders, and users), collecting, analyzing, and providing trust related information. Therefore, a users can consider the trust of various service components based on analyzed trust information based on their trust requirements.

Roles of Trust in Technology Acceptance of Augmented Reality (증강현실(AR) 기술 수용에 있어서 신뢰성의 역할)

  • Chung, Byoung-gyu
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.1-19
    • /
    • 2019
  • Various studies have been conducted on factors influencing the adoption of new technologies. In particular, the factors influencing customers' acceptance of new technologies that emerged along with the arrival of the 4th Industrial Revolution. Theoretical models are mainly based on the technology acceptance model (TAM) or Extended Unified Theory of Acceptance and Use of Technology : UTAUT2). However, there are no trust variables in these models. In this study, we added trust variable and tested augmented reality(AR). Three types - trust as an independent variable, as a mediating variable, and as a moderating variable - were analyzed statistically. As a result, trust was most explanatory when viewed as a mediating variable between independent variables and intention to use. In theory, it has been shown that trust acts as a mediating effect. In practice, trust is most important in accepting new technologies, so it is important to prioritize trust.

A Comparative Study on the Mutual Influence between Institutional Mechanisms and Trust in Online Platform Environment (온라인 플랫폼 환경에서 제도적 메커니즘과 신뢰 간 상호 영향에 관한 비교 연구)

  • YoonHo Roh;Yeong-Hyeon Hwang
    • Journal of Information Technology Services
    • /
    • v.23 no.2
    • /
    • pp.83-97
    • /
    • 2024
  • This study was conducted to examine the effect of institutional mechanisms on customers' trust and continuous purchase intention in open market platforms, The research frame was expanded by setting institutional situations into positive and negative areas in order to examine the relationship between institutional mechanisms and trust in multiple dimensions. The results of this study confirmed that the feedback system, dispute resolution, and intermediary trust factors affect trust in positive areas, and dispute resolution, information security, and intermediary trust affect buyer trust in negative areas. For the relationship between trust and repurchase intention, it was confirmed that if the institutional situation is positive, trust leads to repurchase intention, and in negative areas, trust does not lead to repurchase intention. The results of this study show that institutional mechanisms are a key factor in building trust in online platforms according to institutional circumstances and play a role in offsetting trust in platforms in negative areas.