• Title/Summary/Keyword: Trust (Trustworthiness)

Search Result 73, Processing Time 0.023 seconds

Personal Information Disclosure Control in Context-aware Healthcare Applications (컨텍스트 인식 헬스케어 어플리케이션을 위한 개인화된 정보 공개 기법)

  • Rashid, Umar;Choi, Ah-Young;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.970-975
    • /
    • 2006
  • There is a tradeoff between user's privacy and utility of context-aware services in ubiquitous computing environments. Many privacy models have been proposed to support the disclosure of personal information at different levels of detail, in ubiquitous computing environments. However, most of these models do not allow for explicit criteria to assess the benefit users are likely to reap by disclosing their personal information. In this paper, we propose an automated decision making mechanism that evaluates the "benefit of disclosure" for the users based on trust relationships between users and information requesters and manages the disclosure of user's personal information accordingly. Unlike other trust models, we do not regard the reputation of an information requester as sufficient to determine his/her trustworthiness. Instead, we represent trustworthiness as a function of information requester's reputation in the eyes of the user and his/her competence in a given context. To validate our mechanism, we apply it to context-aware healthcare application that monitors physiological condition of a user.

  • PDF

A Study on Admissibility Framework for Establishing Trust in Digital Records : Focused on the Development of the Trustworthiness Model for Public Digital Records (전자기록의 신뢰가치 확립을 위한 증거능력 구현체계 연구 우리나라 공공 전자기록의 신뢰가치 모델 개발을 중심으로)

  • Hyun, Moonsoo
    • The Korean Journal of Archival Studies
    • /
    • no.73
    • /
    • pp.5-46
    • /
    • 2022
  • This study aims to develop the trustworthiness model for public digital records, as an admissibility framework for establishing trust. The trustworthiness model is deemed to used to identify the qualities of the digital records in their lifecycle, including the identity that could be identified at the time of the creation, integrity obtained from the chain-of-custodial management, the evidence of relationship between business activities and records, and the technical or cognitive accessibility. Based on the analysis of the QADEP model, it was decided to develop a model that could measure the trustworthiness of public digital records in the external measurement type, which are authenticity, reliability, and usability. In line with this direction, the model expanded measurement areas and indicators of the QADEP model through the analysis of ISO 16175-1:2020, and measuring metrics was also proposed so that it could be a measuring instrument for public digital records in Korea, after analysing NAK 19-3. It would be useful to expand the model and to test the approach of the trustworthiness model for public digital records.

Attributes of Trusted Blog Contents: Through Analysis of Product-reviews in Powerblogs and Consumer Survey (신뢰받는 블로그 콘텐츠의 특성 탐구: 파워블로그의 사용후기분석과 소비자 조사를 통하여)

  • Soh, Hyeonjin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.73-82
    • /
    • 2013
  • The purpose of this study is to explore attributes of trusted blog product-reviews and to examine the weight of each attribute. First, the attributes of trusted blog product-reviews were collected through consumer interviews. Second, the trust attributes were examined in terms of their relative importance. The results are: 1) Thirty-five of trust attributes were discovered and categorized into 'popularity', 'presence', 'attractiveness', 'trustworthiness', and 'expertise'. 2) In general, attributes reflecting usefulness, trustworthiness and attractiveness seemed the most important trust factors. 3) 'presence', which have not been highlighted so far in trust research, was emerged as an important trust factor in the web blog context. Theoretical and practical implications were discussed.

Case Study of Internet Brand Extension (인터넷 브랜드 확장 전략 사례 연구)

  • Yang, Hee-Dong;Hwang, Sun-Suk;Lee, Chae-Young;Park, Min-A
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.1
    • /
    • pp.95-107
    • /
    • 2010
  • This study investigates the influential factors for online shoppers to accept the brand extension of Internet companies. We specifically attend to the trustworthiness of vendor which has emerged vital for Internet-based commerce. After case analysis, we conclude that vendor's trustworthiness has more important influence on the successful brand extension on Internet than product similarity does.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

Research on 5G Core Network Trust Model Based on NF Interaction Behavior

  • Zhu, Ying;Liu, Caixia;Zhang, Yiming;You, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3333-3354
    • /
    • 2022
  • The 5G Core Network (5GC) is an essential part of the mobile communication network, but its security protection strategy based on the boundary construction is difficult to ensure the security inside the network. For example, the Network Function (NF) mutual authentication mechanism that relies on the transport layer security mechanism and OAuth2.0's Client Credentials cannot identify the hijacked NF. To address this problem, this paper proposes a trust model for 5GC based on NF interaction behavior to identify malicious NFs and improve the inherent security of 5GC. First, based on the interaction behavior and context awareness of NF, the trust between NFs is quantified through the frequency ratio of interaction behavior and the success rate of interaction behavior. Second, introduce trust transmit to make NF comprehensively refer to the trust evaluation results of other NFs. Last, classify the possible malicious behavior of NF and define the corresponding punishment mechanism. The experimental results show that the trust value of NFs converges to stable values, and the proposed trust model can effectively evaluate the trustworthiness of NFs and quickly and accurately identify different types of malicious NFs.

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.

Trust and Risk based Access Control and Access Control Constraints

  • Helil, Nurmamat;Kim, Mu-Cheol;Han, Sang-Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2254-2271
    • /
    • 2011
  • Access control in dynamic environments needs the ability to provide more access opportunities of information to users, while also ensuring protection information from malicious users. Trust and risk are essential factors and can be combined together in access control decision-making to meet the above requirement. In this paper, we propose the combination of the trust and risk in access control to balance information accessibility and protection. Access control decision is made on the basis of trustworthiness of users and risk value of permissions. We use potential relations between users and relations between permissions in access control. Our approach not only provides more access opportunities for trustworthy users in accessing permissions, but also enforces traditional access control constraints such as Chinese Wall policy and Separation of Duty (SoD) of Role-Based Access Control (RBAC) model in an effective way.

Do Younger Researchers Assess Trustworthiness Differently when Deciding what to Read and Cite and where to Publish?

  • Nicholas, David;Jamali, Hamid R.;Watkinson, Anthony;Herman, Eti;Tenopir, Carol;Volentine, Rachel;Allard, Suzie;Levine, Kenneth
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.5 no.2
    • /
    • pp.45-63
    • /
    • 2015
  • An international survey of over 3600 academic researchers examined how trustworthiness is determined when making decisions on scholarly reading, citing, and publishing in the digital age and whether social media and open access publications are having an impact on judgements. In general, the study found that traditional scholarly methods and criteria remain important across the board. However, there are significant differences between younger (age 30 & under) and older researchers (over 30). Thus younger researchers: a) expend less effort to obtain information and more likely to compromise on quality in their selections; b) view open access publishing much more positively as it offers them more choices and helps to establish their reputation more quickly; c) compensate for their lack of experience by relying more heavily on trust markers and proxies, such as impact factors; d) use all the outlets available in order to improve the chances of getting their work published and, in this respect, make the most use of the social media with which they are more familiar.

A Computational Model of Trust and Its Applications in Internet Transactions (인터넷 거래에서 신뢰도의 계산적 모델 및 적용)

  • Noh, Sang-Uk
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.137-147
    • /
    • 2007
  • As Web-based online communities are rapidly growing, the agents in social groups need to know their measurable belief of trust for safe andsuccessful interactions. In this paper, we propose a computational model of trust resulting from available feedbacks in online communities. The notion of trust can be defined as an aggregation of consensus given a set of past interactions. The averagetrust of an agent further represents the center of gravity of the distribution of its trustworthiness and untrustworthiness. And then, we precisely describe the relationship between reputation, trust, and averagetrust through a concrete example of their computations. We apply our trust model to online internet settings in order to show how trust mechanisms are involved in a rational decision-making of the agents.

  • PDF