• Title/Summary/Keyword: Trust (Trustworthiness)

Search Result 73, Processing Time 0.018 seconds

Effect of Anthropomorphism Level of Digital Human Banker Speech on User Experience: Focusing on Social Presence, Affinity, Trust, Perceived Intelligence, and Usefulness (디지털 휴먼 은행원 발화의 의인화 수준이 사용자 경험에 미치는 영향: 사회적 실재감, 친밀감, 신뢰도, 인지된 지능, 유용성을 중심으로)

  • Choi, Bomi;Jang, Seojin;Kang, Hyunmin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.469-476
    • /
    • 2022
  • As the 3D modeling technology and conversational algorithm is developed, digital humans are being used in various fields, and also virtual bankers have begun to appear in banks, including major banks such as Shin-Han Bank and Nong-Hyup Bank. However, most of the research of digital human mainly focus on its appearance, and research on robot persona that should be considered in anthropomorphizing a robot is insufficient. In this study, an experiment was conducted to find out the user experience of three scenarios (student ID receipt, deposit and withdrawal account opening, leasehold loan consultation) in which the level of anthropomorphism of the speech strategy and the level of personal information use differed in the specific context of banking. As a result of the study, social presence and usefulness had an interactive effect on the scenario and the level of anthropomorphism. There was no interaction effect on intimacy, trustworthiness, and perceived intelligence, but a tendency could be confirmed.

Effects of Self-disclosing Agents (자기노출 에이전트의 효과)

  • Park, Joo-Yeon
    • Journal of the HCI Society of Korea
    • /
    • v.1 no.2
    • /
    • pp.35-42
    • /
    • 2006
  • The importance of interface agent as user interface increases in the ubiquitous computing environment. It is essential that an interface agent can develop social relationship with users. We propose that self-disclosure, a major factor to form and maintain human relationship, can be useful to achieve this goal. This study examined the effects of the degree of a computer agent's self-disclosure on the users' social responses. The experiment was conducted in a 2(intimacy of agent's disclosure: high vs. low) by 2(amount of agent's disclosure: high vs. low) between-group design. The results show that: 1) reciprocity of self-disclosure was found in both sub-dimensions (intimacy and amount) of self-disclosure; 2) in case that participants received highly intimate self-disclosure from the agent, social attraction, trustworthiness and expectation of mutual influence toward agent were lower than when the agent's disclosure was less intimate. These findings suggest that the intimacy of agent's self-disclosure can affect on gathering user information and human-agent relationship formation separately. While agent's highly intimate disclosure can be useful to gather user information, agent's appropriate disclosure can be useful to form positive user-agent relationship.

  • PDF

Classification of Trusted Boot Technology Components based on Hardware Dependency (하드웨어 종속/독립성에 따른 신뢰성 부팅 기술 구성 요소 분류)

  • Park, Keon-Ho;Kim, Sieun;Lee, Yangjae;Lee, SeongKee;Kang, Tae In;Kim, Hoon Kyu;Park, Ki-woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.14 no.6
    • /
    • pp.44-56
    • /
    • 2018
  • Researches on military weapons are actively studied to improve national defense power of each country. The military weapon system is being used not only as a weapon but also as a reconnaissance and surveillance device for places where it is difficult for people to access. If such a weapon system becomes an object of attack, military data that is important to national security can be leaked. Furthermore, if a device is taken, it can be used as a terrorist tool to threaten its own country. So, security of military devices is necessarily required. In order to enhance the security of a weapon system such as drone, it is necessary to form a chain of trust(CoT) that gives trustworthiness to the overall process of the system from the power on until application is executed. In this paper, by analyzing the trusted computing-based boot technology, we derive trusted boot technology components and classify them based on hardware dependence/independence. We expect our classification of hardware dependence/independence to be applied to the trusted boot technology of our self-development ultraprecision weapon system to improve the defense capability in our military.