• Title/Summary/Keyword: Trustworthiness of Data

Search Result 80, Processing Time 0.021 seconds

ZigBee Network Formation based on Trust Model and Trustworthiness Measurement (신뢰모델기반의 ZigBee 네트워크 구성 및 신뢰성 측정)

  • Hwang, Jae-Woo;Park, Ho-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1284-1294
    • /
    • 2010
  • The ZigBee is one of the most important technologies for composing USN. It is one of the IEEE 802.15.4 standards to support personal area networks. It uses a hierarchical routing or an on-demand route discovery strategy as an address allocation method. A hierarchical routing doesn't use a routing table but only uses a child node or a parent node as an intermediate node for data delivery. Therefore, the ZigBee network's topology greatly affects the overall network performance. In this paper, we propose a more trustworthy algorithm than only using the depth and widely variable LQI during network formation, and moreover we propose an algorithm to measure network's trustworthiness. We simulate our algorithm using the NS-2 and implement our network using the MG2400 ZigBee module for verifying performance.

Resources for Success in Experiment: Goldingham's Measurement of the Velocity of Sound

  • Ku, Ja-Hyon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.31 no.4
    • /
    • pp.253-259
    • /
    • 2012
  • Goldingham's measurement of the velocity of sound undertaken in the early nineteenth century was the first large-scale measuring enterprise which considered various meteorological factors such as temperature, humidity, atmospheric pressure, the direction of the wind, etc. Goldingham's successful performance of measuring the velocity of sound by employing the sounds of cannons as sound source in Madras (now Chennai), a colonial region of India, for one and a half years was supported by material, institutional and social resources. As the official astronomer at the Madras Observatory, he was benefitted by the undemanding employment of accurate measuring instruments under the support of the Madras Army enabled him to gain reliable data and his reputation as professional experimentalist facilitated the acknowledgment of their trustworthiness.

A Qualitative Inquiry into EFL Anxiety: Through the Voices of Class Constituents

  • Kim, Young-Sang
    • English Language & Literature Teaching
    • /
    • v.8 no.1
    • /
    • pp.15-38
    • /
    • 2002
  • This article explored 9 EFL learners' emotional reactions they experienced in order to locate sources of EFL apprehension in university-based classroom settings. As part of further establishing construct validity of the measure (the FLPAS) Kim (2002) developed, lengthy interviews were adopted with focus on sources of discomfort with a variety of forms of language learning tasks. Findings showed that the interviewees confirmed most of the statements in the measuring tool, thereby increasing the trustworthiness of the measure. Specifically, the following themes or categories emanated from the analysis of interview data: (a) anxiety about performance in EFL classrooms; (b) EFL anxiety or discomfort about difficulties with cultural understanding; and (c) EFL anxiety induced by instructor and instruction.

  • PDF

Wikipedia as an Online Health Information Source: Consumers' Satisfaction with Information Quality

  • Boryung Ju;Yoonhyuk Jung;John Paul Bourgeois
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.2
    • /
    • pp.36-48
    • /
    • 2024
  • For consumers making health decisions, Wikipedia is a popular source for health information. This study investigated major factors influencing consumer satisfaction with Wikipedia medical/health articles. Using a crowdsourcing method, data were collected from 322 adults who read/edit English Wikipedia medical/health articles and reside in the US. The results showed that the presentation of information was the most influential factor. Trustworthiness was the second most important factor for consumer satisfaction with the quality of information, followed by reliability, and topic coverage. Study participants did not consider other factors such as accuracy and currency to be crucial factors. Moderating effects of the control variables such as editing experience with Wikipedia articles, gender, and age were also examined to enhance the internal validity of the study. Implications for the Wikipedia editor community and researchers, and directions of future research are presented.

SRS: Social Correlation Group based Recommender System for Social IoT Environment

  • Kang, Deok-Hee;Choi, Hoan-Suk;Choi, Sang-Gyu;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.53-61
    • /
    • 2017
  • Recently, the Social Internet of Things (IoT), the follow-up of the IoT, has been studied to expand the existing IoT services, by integrating devices into the social network of people. In the Social IoT environment, humans, devices and digital contents are connected with social relationships, to guarantee the network navigability and establish levels of trustworthiness. However, this environment handles massive data, including social data of humans (e.g., profile, interest and relationship), profiles of IoT devices, and digital contents. Hence, users and service providers in the Social IoT are exposed to arbitrary data when searching for specific information. A study about the recommender system for the Social IoT environment is therefore needed, to provide the required information only. In this paper, we propose the Social correlation group based Recommender System (SRS). The SRS generates a target group, depending on the social correlation of the service requirement. To generate the target group, we have designed an architecture, and proposed a procedure of the SRS based on features of social interest similarity and principles of the Collaborative Filtering and the Content-based Recommender System. With simulation results of the target scenario, we present the possibility of the SRS to be adapted to various Social IoT services.

Blockchain for the Trustworthy Decentralized Web Architecture

  • Kim, Geun-Hyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.26-36
    • /
    • 2021
  • The Internet was created as a decentralized and autonomous system of interconnected computer networks used for data exchange across mutually trusted participants. The element technologies on the Internet, such as inter-domain and intra-domain routing and DNS, operated in a distributed manner. With the development of the Web, the Web has become indispensable in daily life. The existing web applications allow us to form online communities, generate private information, access big data, shop online, pay bills, post photos or videos, and even order groceries. This is what has led to centralization of the Web. This centralization is now controlled by the giant social media platforms that provide it as a service, but the original Internet was not like this. These giant companies realized that the decentralized network's huge value involves gathering, organizing, and monetizing information through centralized web applications. The centralized Web applications have heralded some major issues, which will likely worsen shortly. This study focuses on these problems and investigates blockchain's potentials for decentralized web architecture capable of improving conventional web services' critical features, including autonomous, robust, and secure decentralized processing and traceable trustworthiness in tamper-proof transactions. Finally, we review the decentralized web architecture that circumvents the main Internet gatekeepers and controls our data back from the giant social media companies.

A Normative Approach to Data Democracy (데이터 민주주의(data democracy)에 대한 규범적 접근)

  • Heejin Park;Ji Sung Kim
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.2
    • /
    • pp.137-158
    • /
    • 2023
  • In the modern digitized data society, there is a growing emphasis on securing trustworthiness and fairness in data utilization, along with data openness. By defining the concept of data democracy from various perspectives and presenting elements of normative values, this study aims to provide a basic conceptual framework to identify and evaluate the data governance system and levels of data democracy. As a foundation for the discussion of data democracy, based on Kneuer's (2016) conceptualization of e-democracy, free and equitable access, e-participation, and e-government were introduced as core dimensions of e-democracy. To improve the quality of data governance and foster a better understanding and practical application of the concept of data democracy, this study takes a normative approach from the perspective of democracy. Inclusiveness, equity, participation, and democratic sovereignty are provided as core dimensions of data democracy. This study highlights the significance of data literacy in promoting data democracy. It proposes the creation and assessment of a curriculum rooted in the normative principles of data democracy within the field of library and information science for future investigation.

Qualitative Data Analysis using Computers (컴퓨터를 이용한 질적 자료 분석)

  • Yi Myung-Sun
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.6 no.3
    • /
    • pp.570-582
    • /
    • 1999
  • Although computers cannot analyze textual data in the same way as they analyze numerical data. they can nevertheless be of great assistance to qualitative researchers. Thus, the use of computers in analyzing qualitative data has increased since the 1980s. The purpose of this article was to explore advantages and disadvanteges of using computers to analyze textual data and to suggest strategies to prevent problems of using computers. In additon, it illustrated characteristics and functions of softwares designed to analyze qualitative data to help researchers choose the program wisely. It also demonstrated precise functions and procedures of the NUDIST program which was designed to develop a conceptual framework or grounded theory from unstructured data. Major advantage of using computers in qualitative research is the management of huge amount of unstructured data. By managing overloaded data, researcher can keep track of the emerging ideas, arguments and theoretical concepts and can organize these tasks mope efficiently than the traditional method of 'cut-and-paste' technique. Additional advantages are the abilities to increase trustworthiness of research, transparency of research process, and intuitional creativity of the researcher, and to facilitate team and secondary research. On the other hand, disvantages of using computers were identified as worries that the machine could conquer the human understanding and as probability of these problems. it suggested strategies such as 1) deep understanding of orthodoxy in analytical process. To overcome philosophical and theoretical background of qualitative research method, 2) deep understanding of the data as a whole before using software, 3) use of software after familiarity with it, 4) continuous evaluation of software and feedback from them, and 5) continuous awareness of the limitation of the machine, that is computer, in the interpretive analysis.

  • PDF

Securing Cooperative Spectrum Sensing against Rational SSDF Attack in Cognitive Radio Networks

  • Feng, Jingyu;Zhang, Yuqing;Lu, Guangyue;Zhang, Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.1-17
    • /
    • 2014
  • Cooperative spectrum sensing (CSS) is considered as a powerful approach to improve the utilization of scarce radio spectrum resources. However, most of CSS schemes assume all secondary users (SU) are honest, and thus offering opportunities for malicious SUs to launch the spectrum sensing data falsification attack (SSDF attack). To combat such misbehaved behaviors, recent efforts have been made to trust schemes. In this paper, we argue that powering CSS with traditional trust schemes is not enough. The rational SSDF attack is found in this paper. Unlike the simple SSDF attack, rational SSDF attackers send out false sensing data on a small number of interested primary users (PUs) rather than all PUs. In this case, rational SSDF attackers can keep up high trustworthiness, resulting in difficultly detecting malicious SUs in the traditional trust schemes. Meanwhile, a defense scheme using a novel trust approach is proposed to counter rational SSDF attack. Simulation results show that this scheme can successfully reduce the power of rational SSDF, and thus ensure the performance of CSS.

Block-chain based Secure Data Access over Internet of Health Application Things (IHoT)

  • A. Ezil Sam, Leni;R. Shankar;R. Thiagarajan;Vishal Ratansing Patil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1484-1502
    • /
    • 2023
  • The medical sector actively changes and implements innovative features in response to technical development and revolutions. Many of the most crucial elements in IoT-connected health services are safeguarding critical patient records from prospective attackers. As a result, BlockChain (BC) is gaining traction in the business sector owing to its large implementations. As a result, BC can efficiently handle everyday life activities as a distributed and decentralized technology. Compared to other industries, the medical sector is one of the most prominent areas where the BC network might be valuable. It generates a wide range of possibilities and probabilities in existing medical institutions. So, throughout this study, we address BC technology's widespread application and influence in modern medical systems, focusing on the critical requirements for such systems, such as trustworthiness, security, and safety. Furthermore, we built the shared ledger for blockchain-based healthcare providers for patient information, contractual between several other parties. The study's findings demonstrate the usefulness of BC technology in IoHT for keeping patient health data. The BDSA-IoHT eliminates 2.01 seconds of service delay and 1.9 seconds of processing time, enhancing efficiency by nearly 30%.