• Title/Summary/Keyword: Trust Evaluation

Search Result 290, Processing Time 0.034 seconds

Influence of Physical Education Teacher's Transformational Leadership on Trust and Class Satisfaction (체육교사의 변혁적 리더십이 학생들의 신뢰와 수업만족에 미치는 영향)

  • Cho, Tae-Soo;Jeon, Yong-Bae;Mun, Sun-Ho
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.25 no.2
    • /
    • pp.526-537
    • /
    • 2013
  • The purpose of this study was to provide basic data needed for analyzing the factors needed for students' positive participation in physical education class and developing the leadership skills needed for effective class guidance by analyzing what relationship there exists between a physical education teacher-exercised transformational leadership and students' trust in physical education teachers and class satisfaction; thus, this study drew the conclusions as follows: First, in the relations between a physical education teacher-exercised transformational leadership and students' trust, it was found that a physical education teacher's charisma and intellectual stimulus had a positive influence on high school students. Second, it was found that a physical education teacher's charisma and individual consideration had a positive influence on a physical education teacher-exercised transformational leadership and the subordinate factor in class satisfaction-a sense of accomplishment while individual consideration and intellectual stimulus were found to have a positive influence on evaluation. Third, as for the trust in a physical education teacher and class satisfaction, the trust was found to have a positive influence on both a sense of accomplishment and evaluation.

Formal Trust Assessment with Confidence Probability

  • Kutay, Mahir;Ercan, Tuncay
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.830-842
    • /
    • 2015
  • Trust and trustworthiness of web services and organizations is calculated as scalar values. But there is still a certain level of risk for the overall reliability of this value. In this article, we focus on calculating trust values as intervals between upper and lower bounds based on predefined confidence values through an additional confidence probability. This will give us a more realistic approach to the trust assessments between individuals and organizations. We also developed a web-based software tool, TAST (Trust Assessment Software Tool) that collects the web services' evaluation of different customer groups for similar organizations through the user interface and calculates the trust intervals for predefined and previously selected confidence values. Our model uses a weighted calculation of mean and variances of customer groups in specific periods and analyses the total and incremental trust of different customer groups.

A Study on the trust factors in B2B e-Marketplace with Technology Acceptance Model (e-Marketplace의 신뢰요인에 대한 연구 -정보기술수용모형(TAM)을 중심으로-)

  • Lee Jong-Man;Kang Tae-Gyung
    • Management & Information Systems Review
    • /
    • v.13
    • /
    • pp.163-188
    • /
    • 2003
  • Lack of trust is major reason for many company to take a cautions stance towards business-to-business electronic commerce. Especially innovative business models such as online business-to-business marketplaces face the lack of not only having to give their members and partners faith own capabilities and reliability, but also to ensure that the respective parties interacting through them have trust in each other. This paper is empirical study on the trust factors affecting the repurchase intentions in a B2B e-Marketplace by survey instrument based on Likert-style 5 point measurement scale. The objective of this paper is evaluation of relationship between repurchase intentions and trust. The focus of this paper is the antecedents and consequences of buyer trust in a B2B e-Marketplace, not trust intermediaries or in third parties that might mediate between the buyer and e-Marketplace. The findings of this study are expected to increase the awareness of B2B e-Commerce adopter and implementers about the importance of trust in e-commerce participation.

  • PDF

The Effect of Discount Store Attributes and Clothing Product - Evaluation on Store Loyalty - (대형할인점인 점포속성 및 의류제품평가가 점포충성도에 미치는 영향)

  • Kwon Yoo-Jin;Hong Byung-Sook
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.7 s.155
    • /
    • pp.1066-1077
    • /
    • 2006
  • The purpose of this study was to investigate the effect of store attributes, purchasing experience, clothing product evaluation and store trust on store loyalty of discount store. With convenience sampling, the research was surveyed to women who have bought apparels at the discount store. The 374 responses were analyzed by frequency analysis, factor analysis, reliability test, t-test and hierarchical regression analysis. The results were as follows. First, the clothing product evaluation was significantly affected by the variety of products, reliable advertisement, good display, convenient store location, purchasing cost and buying experience of PB apparel. Second, the trust of discount store was significantly affected by store attributes, purchasing experience and clothing product evaluation. Third, the discount store loyalty was analyzed as fashion store loyalty. The store loyalty was affected by purchasing experience and clothing product evaluation. Fourth, the clothing product evaluation and store loyalty were appeared high by people who had bought PB, PNB and trendy apparels.

The Relationship between Network Marketing Organization and the Related Industry Sustainability in Indonesia

  • SELAMET, Thamrin;PRABOWO, Harjanto
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.509-513
    • /
    • 2020
  • Network marketing in Indonesia, especially in a time of crisis, is massively rising and has become a popular opportunity among other industries. Network marketing organizations, consists of partnership and trust, a community of connections and contact between individuals. This article has tried to examine the potential strategy to mitigate low trust in network marketing organizations specifically in the Indonesia market, where no studies on the subject has been done before. In doing this research assignment employed a secondary research methodology by reviewing previous academic literatures, by exploration and evaluation. For the purpose, 6 main articles and 25 relevant supporting articles were selected, there is an interesting and prominent research in an effort to repair trust in the perspective of the organization's efforts to build trust and control trust framework in strategy trust repair. The result of this analysis showed that the application of trust-building activities studies reveals how trust-building behavior is related to controls and how the efforts towards fostering subordinate cooperation are motivated by different types of controls and display of trustworthiness. It can be concluded that by implementing this trust repair model consistently and with a full commitment, it can gradually restore people's trust in the network marketing industry, sustain industry existence and exalted purpose of this industry can be achieved.

Study on moderating effects of trust factor that medical service evaluation of patients (환자의 의료서비스 평가에 대한 신뢰요인의 조절효과 분석)

  • Kim, Young-Hoon;Woo, Jung-Sik;Kim, Han-Sung;Kim, Hee-Rae;Kim, Hyo-Jeoung
    • Korea Journal of Hospital Management
    • /
    • v.16 no.4
    • /
    • pp.111-130
    • /
    • 2011
  • The purpose of this study is to find moderating effects of re-use intention by trust factors between patients satisfaction and hospital images. Survey a general hospital in Seoul was performed, and a total of 202 questionnaires has been analyzed. Result of multiple regression analysis are verified moderating effects by trust factors with hospital image and re-use intention(F=8.223**). And patient satisfaction and re-use intention are verified moderating effects by trust factors(F=4.255*). In addition, classify them into high trust group and low trust group by median split method, even if there are felt the equal level of satisfaction or image that high trust group will be re-visit the hospital better than low trust group. As a result, trust factors must consider different level from satisfaction or image, it is necessary that hospitals will be prepare to improve the trust.

  • PDF

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Detection and Trust Evaluation of the SGN Malicious node

  • Al Yahmadi, Faisal;Ahmed, Muhammad R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.89-100
    • /
    • 2021
  • Smart Grid Network (SGN) is a next generation electrical power network which digitizes the power distribution grid and achieves smart, efficient, safe and secure operations of the electricity. The backbone of the SGN is information communication technology that enables the SGN to get full control of network station monitoring and analysis. In any network where communication is involved security is essential. It has been observed from several recent incidents that an adversary causes an interruption to the operation of the networks which lead to the electricity theft. In order to reduce the number of electricity theft cases, companies need to develop preventive and protective methods to minimize the losses from this issue. In this paper, we have introduced a machine learning based SVM method that detects malicious nodes in a smart grid network. The algorithm collects data (electricity consumption/electric bill) from the nodes and compares it with previously obtained data. Support Vector Machine (SVM) classifies nodes into Normal or malicious nodes giving the statues of 1 for normal nodes and status of -1 for malicious -abnormal-nodes. Once the malicious nodes have been detected, we have done a trust evaluation based on the nodes history and recorded data. In the simulation, we have observed that our detection rate is almost 98% where the false alarm rate is only 2%. Moreover, a Trust value of 50 was achieved. As a future work, countermeasures based on the trust value will be developed to solve the problem remotely.

Functional Requirements of Data Repository for DMP Support and CoreTrustSeal Authentication

  • Kim, Sun-Tae
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.7-20
    • /
    • 2020
  • For research data to be shared without legal, financial and technical barriers in the Open Science era, data repositories must have the functional requirements asked by DMP and CoreTrustSeal. In order to derive functional requirements for the data repository, this study analyzed the Data Management Plan (DMP) and CoreTrustSeal, the criteria for certification of research data repositories. Deposit, Ethics, License, Discovery, Identification, Reuse, Security, Preservation, Accessibility, Availability, and (Meta) Data Quality, commonly required by DMP and CoreTrustSeal, were derived as functional requirements that should be implemented first in implementing data repositories. Confidentiality, Integrity, Reliability, Archiving, Technical Infrastructure, Documented Storage Procedure, Organizational Infrastructure, (Meta) Data Evaluation, and Policy functions were further derived from CoreTrustSeal. The functional requirements of the data repository derived from this study may be required as a key function when developing the repository. It is also believed that it could be used as a key item to introduce repository functions to researchers for depositing data.

A Study on the trust factors affecting repurchase intentions in a B2B e-Marketplace (B2B e-Marketplace에서의 재구매 의도에 미치는 신뢰요인에 관한 연구)

  • Lee, Jong-Man;Jang, Ju-Byung;Kang, Tae-Gyong
    • Journal of Industrial Convergence
    • /
    • v.1 no.2
    • /
    • pp.33-52
    • /
    • 2003
  • This paper is empirical study on the trust factors affecting the repurchase intentions in a B2B e-Marketplace by survey instrument based on Likert-style 5 point measurement scale. The objective of this paper is evaluation of relationship between repurchase intentions and trust. The focus of this paper is the antecedents and consequences of buyer trust in a B2B e-Marketplace, not trust intermediaries or in third parties that might mediate between the buyer and e-Marketplace. The findings of this study are expected to increase the awareness of B2B e-Commerce adopter and implementers about the importance of trust in e-commerce participation.

  • PDF