• Title/Summary/Keyword: Trustworthiness

Search Result 225, Processing Time 0.02 seconds

Automatic Generation of Machine Readable Context Annotations for SPARQL Results

  • Choi, Ji-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.1-10
    • /
    • 2016
  • In this paper, we propose an approach to generate machine readable context annotations for SPARQL Results. According to W3C Recommendations, the retrieved data from RDF or OWL data sources are represented in tabular form, in which each cell's data is described by only type and value. The simple query result form is generally useful, but it is not sufficient to explain the semantics of the data in query results. To explain the meaning of the data, appropriate annotations must be added to the query results. In this paper, we generate the annotations from the basic graph patterns in user's queries. We could also manipulate the original queries to complete the annotations. The generated annotations are represented using the RDFa syntax in our study. The RDFa expressions in HTML are machine-understandable. We believe that our work will improve the trustworthiness of query results and contribute to distribute the data to meet the vision of the Semantic Web.

A Certificate Revocation List Distribution Scheme over the eMBMS for Vehicular Networks

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.77-83
    • /
    • 2016
  • To verify the trustworthiness of messages, public key certificates and certificate revocation list(CRL) has been standardized for vehicular networks. However, timely distribution of large CRLs to vehicles should be more elaborated with low bandwidth utilization from a practical point of view. To address this concern, we propose a CRL distribution scheme using long term evolution(LTE) point-to-multicast transmission, namely the enhanced multimedia broadcast multicast service(eMBMS). The schem is much more resource efficient than the existing unicast CRL distribution schemes for vehicular networks and it allows realizing the regional CRL distribution schemes efficiently in LTE network. By means of ns-3 simulation, we analyze the performance, latency, and execution time of the scheme in terms of varying coverage of the multimedia broadcast multicast service over single frequency network (MBFSN).

Identifying and Exploiting Trustable Users with Robust Features in Online Rating Systems

  • Oh, Hyun-Kyo;Kim, Sang-Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2171-2195
    • /
    • 2017
  • When purchasing an online product, a customer tends to be influenced strongly by its reputation, the aggregation of other customers' ratings on it. The reputation, however, is not always trustable since it can be manipulated easily by attackers who intentionally give unfair ratings to their target products. In this paper, we first address identifying trustable users who tend to give fair ratings to products in online rating systems and then propose a method of computing true reputation of a product by aggregating only those trustable users' ratings. In order to identify the trustable users, we list some candidate features that seem related significantly to the trustworthiness of users and verify the robustness of each of the features through extensive experiments. By finding and exploiting these robust features, we are able to identify trustable users and to compute true reputation effectively and efficiently based on fair ratings of those trustable users.

Computational Trust and Its Impact over Rational Purchasing Decisions of Internet Users

  • Noh, Sang-Uk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.547-559
    • /
    • 2010
  • As web-based online communities are rapidly growing, the agents in the communities need to know their measurable belief of trust for safe and successful interactions. In this paper, we propose a computational model of trust resulting from available feedbacks in online communities. The notion of trust can be defined as an aggregation of consensus given a set of past interactions. The average trust of an agent further represents the center of gravity of the distribution of its trustworthiness and untrustworthiness. Furthermore, we precisely describe the relationships among reputation, trust and average trust through concrete examples showing their computations. We apply our trust model to online social networks in order to show how trust mechanisms are involved in the rational purchasing decision-making of buyers and sellers, and we summarize our simulation results.

Resources for Success in Experiment: Goldingham's Measurement of the Velocity of Sound

  • Ku, Ja-Hyon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.31 no.4
    • /
    • pp.253-259
    • /
    • 2012
  • Goldingham's measurement of the velocity of sound undertaken in the early nineteenth century was the first large-scale measuring enterprise which considered various meteorological factors such as temperature, humidity, atmospheric pressure, the direction of the wind, etc. Goldingham's successful performance of measuring the velocity of sound by employing the sounds of cannons as sound source in Madras (now Chennai), a colonial region of India, for one and a half years was supported by material, institutional and social resources. As the official astronomer at the Madras Observatory, he was benefitted by the undemanding employment of accurate measuring instruments under the support of the Madras Army enabled him to gain reliable data and his reputation as professional experimentalist facilitated the acknowledgment of their trustworthiness.

A Qualitative Inquiry into EFL Anxiety: Through the Voices of Class Constituents

  • Kim, Young-Sang
    • English Language & Literature Teaching
    • /
    • v.8 no.1
    • /
    • pp.15-38
    • /
    • 2002
  • This article explored 9 EFL learners' emotional reactions they experienced in order to locate sources of EFL apprehension in university-based classroom settings. As part of further establishing construct validity of the measure (the FLPAS) Kim (2002) developed, lengthy interviews were adopted with focus on sources of discomfort with a variety of forms of language learning tasks. Findings showed that the interviewees confirmed most of the statements in the measuring tool, thereby increasing the trustworthiness of the measure. Specifically, the following themes or categories emanated from the analysis of interview data: (a) anxiety about performance in EFL classrooms; (b) EFL anxiety or discomfort about difficulties with cultural understanding; and (c) EFL anxiety induced by instructor and instruction.

  • PDF

Comparison of Corporate Security Control Level with Social Trust Index (사회 신뢰수준에 따른 기업의 보안통제 수준 비교)

  • Na, Husung;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.673-685
    • /
    • 2017
  • STI(Social Trust Index) indicates levels of trustworthiness, honesty and reliability among people in a society. Since the STI varies in countries, security control on cyber space should be applied differently according to the STI so that companies can protect their assets efficiently and effectively. We compare STIs between Korea and United States using the Diamond Model and investigate how the STIs affect corporate security controls in those two countries. We finally present a formula using AHP (Analytic Hierarchy Process) to measure levels of corporate security controls in different countries.

Analysis of Anti-SPAM Regulations in Korean IT Law (정보통신망법 스팸 규제 개선 방안 연구)

  • Kim, Seongjun;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2011
  • Spam refers to any unwanted or unauthorized commercial messages. Spam may violate individuals' privacy or other personal rights. Spam often overloads network traffic, wastes individuals' time, lowers productivity and quality of life, and limits the trustworthiness of Internet businesses. As the use of mobile messaging services and social networking services both on mobile communication networks and on the Internet increase, newer and more complex types of IT applications and services are often used as new means of spam. In this research, the characteristics and impact of new and future forms of spam, and anti-spam related policies and regulations are surveyed. To improve the effectiveness of anti-spam policies and regulations in Korea, adding a definition of spam in the law, changing policies to focus on the 'type of services' rather on the medium of transmission, and redefining the scope of 'commercial purposes' in Korean law are suggested.

The Effects of Social Media Influencers' Advertising Disclosure on Consumer Responses on Instagram

  • Abdullahi, Fartun
    • International Journal of Contents
    • /
    • v.16 no.1
    • /
    • pp.10-24
    • /
    • 2020
  • As many brands use social media influencers (SMIs) on Instagram to advertise, not disclosing advertised content affects how consumers perceive these influencers. The purpose of this study was to investigate two objectives: 1) recent advertising disclosure types on Instagram and 2) the factors that affect consumer responses towards Instagram influencers posting advertised content. Using an experimental 2x2 between-subjects design (N=200), the findings show that "sponsored" and "paid partnership with" are two recent types of ad disclosures. However, both factors are insignificantly different from each other. Also, ad disclosure condition enhances the trustworthiness of the influencer than no disclosure. Ad skepticism, source credibility, and the level of persuasion strongly relate to how consumers perceive Instagram influencers advertising for brands. These factors enable consumers to assess if the influencer is a reliable source of information when faced with advertisement. Ultimately, using disclosure gives full information to consumers about the persuasive intent, as well as increases positive consumer responses towards the influencer who discloses, thereby, enhancing the ethical use of the influencer advertising strategy and long-term consumer relationship.

How do multilevel privacy controls affect utility-privacy trade-offs when used in mobile applications?

  • Kim, Seung-Hyun;Ko, In-Young
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • In existing mobile computing environments, users need to choose between their privacy and the services that they can receive from an application. However, existing mobile platforms do not allow users to perform such trade-offs in a fine-grained manner. In this study, we investigate whether users can effectively make utility-privacy trade-offs when they are provided with a multilevel privacy control method that allows them to recognize the different quality of service that they will receive from an application by limiting the disclosure of their private information in multiple levels. We designed a research model to observe users' utility-privacy trade-offs in accordance with the privacy control methods and other factors such as the trustworthiness of an application, quality level of private information, and users' privacy preferences. We conducted a user survey with 516 participants and found that, compared with the existing binary privacy controls, both the service utility and the privacy protection levels were significantly increased when the users used the multilevel privacy control method.