• Title/Summary/Keyword: Trust Cluster

Search Result 71, Processing Time 0.025 seconds

The internet and TV home-shopping perceived risk segments: Shopping orientations, purchase intention, and purchase behavior (인터넷쇼핑 및 TV홈쇼핑 위험지각에 따른 의복쇼핑성향, 구매의도, 구매행동)

  • Hwang JinSook;Joung Joung Hyun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.29 no.5 s.142
    • /
    • pp.637-648
    • /
    • 2005
  • The purpose of this study was to investigate the differences among internet and TV home-shopping perceived risk segments in regard to clothing shopping orientations and purchase intention. The subjects used for the study were 290 female consumers aged from 20 to 40 living in Seoul. The study used factor analysis, cluster analysis, ANOVA, Duncan test, and $\chi^2-test$. The results showed that the Internet and TV home-shopping perceived risks consisted of 9 factors: Products uncertainty risk, Internet shopping mall trust risk, account-related risk, delivery risk, social risk, size risk, exchange/return risk, TV watching-related risk, and price risk. The cluster analysis showed that there were five groups segmented: Size risk/TV watching risk group, Social risk/Internet trust risk group, Return risk/TV watching low-risk group, Delivery risk/product trust group, and Product risk group. The clothing shopping orientations were classified by 5 factors: Planned shopping, pleasure shopping, sales/fashion oriented shopping, time saving shopping, and credit card preference/in-store oriented shopping. The results showed that the five segmented perceived risk groups differed in regard to clothing shopping orientations, purchase intention, and demographics. Further group differences and implications of the results were discussed.

Forms of Inter-organizational Relationships, Patterns of Inter-organizational Information Flow, and Relevant E-commerce Strategies (조직간 관계 유형별 정보교류 행태와 적합한 전자상거래 전략)

  • Choe, Jong-Min
    • The Journal of Information Systems
    • /
    • v.24 no.2
    • /
    • pp.97-116
    • /
    • 2015
  • Purpose This study suggested the four forms of inter-organizational relationships(IORs): partnerships, inter-dependence relationship, trust relationship, and market relationship. The purposes of this study include the demonstration of four forms of IORs and the investigation of the relationships among forms of IORs, inter-organizational information flow(IOIF), kinds of e-commerce strategies, and the supply-chain performance of a firm. Design/methodology/approach The empirical data were collected through post-survey. 92 survey data were collected. With a cluster analysis, we confirmed four types of IORs, and the relationships among critical variables. Findings The results of cluster analysis showed that according to the types of IORs, the frequency and quality of IOIF are different. Appropriate kinds of e-commerce strategies were examined under the each types of IORs, which cause specific patterns of IOIF. It was found that the adoption of e-procurement strategy can improve the supply-chain performance of a firm in trust relationship. It was also observed that under partnerships, the use of e-partnerships strategy can contribute to the improvement of supply-chain performance.

A Reliable 2-mode Authentication Framework for Wireless Sensor Network (무선 센서네트워크를 위한 신뢰성 있는 2-모드 인증 프레임워크)

  • Huyen, Nguyen Thi Thanh;Huh, Eui-Nam
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.51-60
    • /
    • 2009
  • This paper proposes a reliable 2-mode authentication framework for probabilistic key pre-distribution in Wireless Sensor Network (WSN) that guarantees the safe defense against different kinds of attacks: Hello flood attacks, Wormhole attacks, Sinkhole attack, location deployment attacks, and Man in the middle attack. The mechanism storing the trust neighbor IDs reduces the dependence on the cluster head and as the result; it saves the power energy for the authentication process as well as provides peer-to-peer communication.

  • PDF

Dynamic Cloud Resource Reservation Model Based on Trust

  • Qiang, Jiao-Hong;Ning, Ding-Wan;Feng, Tian-Jun;Ping, Li-Wei
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.377-395
    • /
    • 2018
  • Aiming at the problem of service reliability in resource reservation in cloud computing environments, a model of dynamic cloud resource reservation based on trust is proposed. A domain-specific cloud management architecture is designed in which resources are divided into different management domains according to the types of service for easier management. A dynamic resource reservation mechanism (DRRM) is used to test users' reservation requests and reserve resources for users. According to user preference, several resources are chosen to be candidate resources by fuzzy cluster analysis. The fuzzy evaluation method and a two-way trust evaluation mechanism are adopted to improve the availability and credibility of the model. An analysis and simulation experiments show that this model can increase the flexibility of resource reservation and improve user satisfaction.

The Effects of Perceived Justice According to Type of Consumer Complaints in the Internet Open Market (인터넷 오픈마켓에서의 소비자 불만유형에 따른 공정성지각 효과의 비교)

  • Im, Jung-Eun;Lee, Jin-Hwa
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.4
    • /
    • pp.563-574
    • /
    • 2010
  • This study focused on the consumer post-complaint behavior in the Internet open market due to the rapid growth of Internet fashion markets and increased consumer dissatisfaction that has increased post complaint behavior. This study identifies the effect of perceived justice on consumer trust and repurchase intention, it then compares the effects of perceived justice on consumer trust and repurchase intention among the different types of dissatisfied groups. The respondents were 369 consumers who experienced dissatisfaction in the Internet open market. The data were analyzed by factor analysis, path analysis, ANOVA, cluster analysis using SPSS win 12.0 and Amos 7.0. In the research model, three components of perceived justice: distributive justice, procedural justice, and interactional justice have significant effects on trust. Trust has a positive effect on repurchase intention. Dissatisfied consumers were clustered into three types of those dissatisfied with 1) shopping mall/shipping, 2) service, and 3) products. The consumer groups classified by the types of dissatisfaction showed different effects of perceived justice on trust and repurchase intention in the Internet open market.

Design a Method Enhancing Recommendation Accuracy Using Trust Cluster from Large and Complex Information (대규모 복잡 정보에서 신뢰 클러스터를 이용한 추천 정확도 향상기법 설계)

  • Noh, Giseop;Oh, Hayoung;Lee, Jaehoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.17-25
    • /
    • 2018
  • Recently, with the development of ICT technology and the rapid spread of smart devices, a huge amount of information is being generated. The recommendation system has helped the informant to judge the information from the information overload, and it has become a solution for the information provider to increase the profit of the company and the publicity effect of the company. Recommendation systems can be implemented in various approaches, but social information is presented as a way to improve performance. However, no research has been done to utilize trust cluster information among users in the recommendation system. In this paper, we propose a method to improve the performance of the recommendation system by using the influence between the intra-cluster objects and the information between the trustor-trustee in the cluster generated in the online review. Experiments using the proposed method and real data have confirmed that the prediction accuracy is improved than the existing methods.

Secure Key Predistribution Scheme using Authentication in Cluster-based Routing Method (클러스터 기반에서의 인증을 통한 안전한 키 관리 기법)

  • Kim, Jin-Su;Choi, Seong-Yong;Jung, Kyung-Yong;Ryu, Joong-Kyung;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.105-113
    • /
    • 2009
  • The previous key management methods are not appropriate for secure data communication in cluster-based routing scheme. Because cluster heads are elected in every round and communicate with the member nodes for authentication and share-key establishment phase in the cluster. In addition, there are not considered to mobility of nodes in previous key management mechanisms. In this paper, we propose the secure and effective key management mechanisim in the cluster-based routing scheme that if there are no share keys between cluster head and its nodes, we create the cluster key using authentication with base station or trust autentication and exchange the their information for a round.

A Study on 3-tiers Authentication Scheme for Improving the Confidence Verification of Nodes in the MANET (MANET에서 노드들의 신뢰 검증 향상을 위한 3-tiers 인증 기법 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2013
  • MANET has the advantage of having the flexibility to build easily a network in a difficult situation that builds a wired network. But, data transmission errors by movement of nodes and eavesdropping by wireless communications have become a problem of security. Authentication service is the most essential in order to overcome these problems and operate network stably. In this paper, we propose 3-tiers authentication structure to exclude of malicious node and operate stable network through more systematic and thorough node authentication. After network is composed into a cluster, cluster head which play CA role is elected. Among these, the highest-CA is elected. The highest-CA receives certificates to cluster head and the cluster head evaluates trust value of their member nodes. Authentication technique which issues member node key is used. We compared PSS and experimented to evaluate performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

Evaluative Criteria of Cyber Store based on Consumer Character of Cyber Stove Shoppers (사이버쇼핑 이용자의 소비자특성에 따른 가상점포 평가기준)

  • 박재옥;안민영
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.27 no.3_4
    • /
    • pp.441-451
    • /
    • 2003
  • The purpose of this study was to find out evaluative criteria of cyber store toward shopping orientation, purchasing experience and demographic factors of consumers to visit cyber store. This study surveyed consumers who have an experience of using cyber store and judgment sampling was used. The respondents were 240 men and women living in the metropolitan area of Seoul and Gyeonggi province. Research method was measured by clothing shopping orientation (utilitarian and hedonic factors), cyber store evaluation criteria (convenience, quality & trust and product character factors), purchasing experience(existent and nonexistent) and demographic factors. For data analysis, descriptive statistics, factor analysis, cluster analysis, ANOVA, t-test, Duncan test, and reliability analysis were conducted. The results were as follows: 1. Evaluative criteria of cyber store were considered importantly in order of possibility of exchange and refund, stability of personal information security, substance of quality degree of product and service and store. 2. Among shopping orientation groups, there were significant differences in all evaluative criteria of cyber store: convenience, quality & trust and product character of store. 3. Among groups toward existence and nonexistence in a purchasing experience, there were significant differences in convenience and quality & trust of store. 4. Among Demographic factors(gender, job, education and income) there were significant differences in convenience and quality & trust of store.

A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud

  • Prasad, Aluri V.H. Sai;Rajkumar, Ganapavarapu V.S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2060-2073
    • /
    • 2022
  • Cloud Computing permits users to access vast amounts of services of computing power in a virtualized environment. Providing secure services is essential. There are several problems to real-world optimization that are dynamic which means they tend to change over time. For these types of issues, the goal is not always to identify one optimum but to keep continuously adapting to the solution according to the change in the environment. The problem of scheduling in Cloud where new tasks keep coming over time is unique in terms of dynamic optimization problems. Until now, there has been a large majority of research made on the application of various Evolutionary Algorithms (EAs) to address the issues of dynamic optimization, with the focus on the maintenance of population diversity to ensure the flexibility for adapting to the changes in the environment. Generally, trust refers to the confidence or assurance in a set of entities that assure the security of data. In this work, a dynamic optimization technique is proposed to find an optimal trust weights in cloud during scheduling.