• Title/Summary/Keyword: Trust management

Search Result 1,797, Processing Time 0.036 seconds

The Mediation Effect of Knowledge Transfer on IT Project Performance (IT 프로젝트 성과에 대한 지식이전의 매개효과에 관한 연구)

  • Lee, Sang-Hoon;Kim, Gi-Mun;Lee, Ho-Geun
    • Asia pacific journal of information systems
    • /
    • v.15 no.3
    • /
    • pp.9-39
    • /
    • 2005
  • Recently, knowledge transfer has been recognized as one of the major factors for success of IT projects but little investigated in Information Systems research. IT project, which needs collaboration between organization's IT project team and external partner, is an critical source for a firm to acquire external knowledge and to achieve its competitive advantage. Based on this recognition on knowledge transfer under IT project, we investigate a mediation role of knowledge transfer to IT project performance after identifying its antecedents such as project team capabilities and partner capabilities. The research model is tested by analyzing 161 sample data gathered from firms' employees who have participated IT projects within last two years. The results reveal that knowledge transfer has full-mediation effect between its antecedents and IT project performance. Moreover, project team capabilities have more impacts on knowledge transfer than partner capabilities do.

IPv4 Address Trading Using Resource Certificate

  • Park, Cheol-Soon;Ryou, Jae-Cheol;Park, Yong-Tae
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.107-120
    • /
    • 2010
  • The Internet has been growing at unprecedented rates. The problem of an address shortage could act as a barrier on this growth. In principle, a new Internet standard, IPv6 solves the problem of the address shortage because it has a very large address space. But IPv6 is not yet compatible with the IPv4 and during the IPv4-to-IPv6 transition period IPv4 address will continue to be in demand. Thus for quite some time, the problem of IP address shortage will persist. To solve the problem, we propose the mechanism of secure IP address trading. This mechanism is based on the Resource PKI (RPKI). The RPKI is the working item of IETF. This proposed mechanism maximizes the trust of IP address trading using RPKI.

Implementing a Verified Efficient RUP Checker

  • Oe, Duckki
    • Annual Conference of KIPS
    • /
    • 2012.04a
    • /
    • pp.1176-1179
    • /
    • 2012
  • To ensure the correctness of high performance satisfiability (SAT) solvers, several proof formats have been proposed. SAT solvers can report a formula being unsatisfiable with a proof, which can be independently verified by a trusted proof checker. Among the proof formats accepted at the SAT competition, the Reverse Unit Propagation (RUP) format is considered the most popular. However, the official proof checker was not efficient and failed to check many of the proofs at the competition. This inefficiency is one of the drawbacks of SAT proof checking. In this paper, I introduce a work-in-progress project, vercheck to implement an efficient RUP checker using modern SAT solving techniques. Even though my implementation is larger and more complex, the level of trust is preserved by statically verifying the correctness of the code. The vercheck program is written in GURU, a dependently typed functional programming language with a low-level resource management feature.

A Data Provenance System for Myanmar Rice Cycle Based on Ethereum Blockchain

  • Latt, Cho Nwe Zin;Rahmadika, Sandi;Rhee, Kyung-Hyune
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • The Myanmar rice cycle's existing system is still relying on a third party to manage every rice data information from several organizations. It is inconvenient to supervise simultaneously due to the unreliability of information provided by organizations. Thus, the rice cycle's original data is challenging to be utterly trusted since irresponsible parties can manipulate the current state of information. Moreover, the applied system does not preserve a proper incentive for the involved parties. In this paper, we leverage the Ethereum blockchain to be adopted to tackle the aforementioned issues. The main objective is to build trust between parties in the Myanmar rice cycle system. Our proposed scheme allows customers to check and trace information about the rice cycle information without worrying about the integrity of the data. Furthermore, the authorized parties are also rewarded by the government through Ethereum smart contract features. Eventually, our scheme achieves traceability in the rice chain system and leads to the complete digitization and automation of the rice cycle information.

Managing the Back-end of the Nuclear Fuel Cycle: Lessons for New and Emerging Nuclear Power Users From the United States, South Korea and Taiwan

  • Newman, Andrew
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.19 no.4
    • /
    • pp.435-446
    • /
    • 2021
  • This article examines the consequences of a significant spent fuel management decision or event in the United States, South Korea and Taiwan. For the United States, it is the financial impact of the Department of Energy's inability to take possession of spent fuel from commercial nuclear power companies beginning in 1998 as directed by Congress. For South Korea, it is the potential financial and socioeconomic impact of the successful construction, licensing and operation of a low and intermediate level waste disposal facility on the siting of a spent fuel/high level waste repository. For Taiwan, it is the operational impact of the Kuosheng 1 reactor running out of space in its spent fuel pool. From these, it draws six broad lessons other countries new to, or preparing for, nuclear energy production might take from these experiences. These include conservative planning, treating the back-end of the fuel cycle holistically and building trust through a step-by-step approach to waste disposal.

Formation of Anti-Corruption Consciousness of Citizens as a Direction of Interaction of Public Authorities and Institutions of Civil Society

  • Shpak, Yurii;Bandura, Ivan;Primush, Roman;Dokalenko, Varvara;Abdullayev, Vagif
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.17-22
    • /
    • 2022
  • This article defines the process of formation of anti-corruption consciousness as one of the areas of interaction between public authorities and civil society institutions. It is concluded that the implementation of the state anti-corruption policy in Ukraine may be more promising if the institutions of civil society are actively involved. The degree of citizen engagement can be increased by increasing social trust, as well as by increasing the level of political and legal education and culture. Particular attention should be paid to the organization of public control and monitoring of the activities of public authorities, impartial coverage of information on the fight against corruption in the media, as well as the joint conduct of an information and educational campaign and the promotion of the formation of anti-corruption consciousness among a large number of citizens.

A Study on the Establishment of Information Security Management System Based on Zero Trust Architecture (제로 트러스트 아키텍처 기반의 정보보호 관리체계 구축에 대한 연구)

  • Lee, Jin Yong;cho, wonbae;Jang, Hyoung Jin
    • Annual Conference of KIPS
    • /
    • 2022.11a
    • /
    • pp.210-212
    • /
    • 2022
  • 4차 산업혁명의 시대적 요구에 따라 스마트워크, 원격진료, 메타버스 등 원격 접속 기반의 사회 인프라 환경이 확산되고 있으며, 코로나19는 이와 같은 원격접속 환경을 가속화하였다. 원격 접속 환경에서는 공간, 시간, 단말 등의 제약으로부터 비교적 자유롭게 기업 내부의 중요 자원 및 서비스를 이용할 수 있기 때문에 노동 생산성을 증대시킨다는 이점은 있으나, 충분히 검증받지 않은 작업 환경이기 때문에 보안적 측면에서는 문제를 야기시킬 수 있다. 또한 전통적인 정보보호 관리체계에서는 원격접속 환경은 허용하지 않거나 최소화한다는 기본 사상을 바탕으로 설계되어 있기 정보보호 전략적 한계가 존재한다. 본 논문에서는 이와 같은 정보보호 전략적 한계를 개선하기 위해 제로 트러스트 아키텍처 기반의 정보보호 관리체계 구축에 대한 방안을 제언한다.

Lymphatic Intervention, the Frontline of Modern Lymphatic Medicine: Part II. Classification and Treatment of the Lymphatic Disorders

  • Saebeom Hur;Jinoo Kim;Lakshmi Ratnam;Maxim Itkin
    • Korean Journal of Radiology
    • /
    • v.24 no.2
    • /
    • pp.109-132
    • /
    • 2023
  • Lymphatic disorders encompass a broad spectrum of diseases involving the lymphatic system, ranging from traumatic lymphatic leaks to lymphatic malformations. Lymphatic disorders can be categorized into traumatic and non-traumatic disorders according to their etiology. These two categories may be further divided into subgroups depending on the anatomical location of the lymphatic pathology and their association with clinical syndromes. Thoracic duct embolization was a milestone in the field of lymphatic intervention that encouraged the application of percutaneous embolization techniques to treat leaks and reflux disorders in the lymphatic system. Additional access routes for embolization, including retrograde thoracic duct and transhepatic lymphatic access, have also been developed. This article comprehensively reviews a variety of options for the treatment of lymphatic disorders, from conservative management to the most recent embolization techniques.

Open Research Problem for effective IoT Authentication

  • Mihir Mehta;Kajal Patel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.174-178
    • /
    • 2024
  • IoT is collection of different "things" which are associated with open web. As all the things are connected to the Internet, it offers convenience to end users for accessing the resources from "Any Where, Any Time" throughout the globe. At the same time, open nature of IoT provides a fertile ground to an intruder for launching different security related threats. If we can no apply proper security safeguards to the IoT System, then it will be not useful to society. Authentication, Encryption, Trust Management and Secure Routing are different domains to offer security in IoT system. Among them, Authentication is very much important security service as it validates device identity before granting access to system services/ resources. Existing IoT Authentication algorithms are fail to verify device identity in unambiguous way. They are vulnerable to different security threats such as Key Stolen threat, MITM threat and Location Spoofing threat. So, it is a demand of time to design an efficient and secure Multi-factor IoT algorithm which can offer better security and validate device identity in unambiguous way.

Performance and Asset Management System of Listed Property Trusts in Australia: Implications for Korean Real Estate Indirect Investment Market (호주 Listed Property Trusts의 성과와 자산관리 특성 분석: 우리나라 부동산간접투자에의 시사점)

  • Park, Won-Seok
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.10 no.3
    • /
    • pp.245-262
    • /
    • 2007
  • This paper aims at analyzing the characteristics of performance and asset management system of listed property trusts(LPT) in Australia, and elucidating the implications for Korean real estate indirect investment market. The main results of this paper are as follows. Firstly, LPT have a leading position among the real estate indirect investment systems in Australia, through the rapid growth of market capitalization. Secondly, LPT achieved superior risk adjustment performance than other financial products, and had valid portfolio diversification effect. Thirdly, many LPT have used stapled securities structure as a asset management system, and stapled LPT revealed superior risk adjustment performance than unit LPT. Finally, implications and policy measures such as using the stapled structure and activating the development activities were examined for the development of Korean real estate indirect investment market.

  • PDF