• Title/Summary/Keyword: Trustworthy Evidence

Search Result 15, Processing Time 0.027 seconds

Study on Net Assessment of Trustworthy Evidence in Teleoperation System for Interplanetary Transportation

  • Wen, Jinjie;Zhao, Zhengxu;Zhong, Qian
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1472-1488
    • /
    • 2019
  • Critical elements in the China's Lunar Exploration reside in that the lunar rover travels over the surrounding undetermined environment and it conducts scientific exploration under the ground control via teleoperation system. Such an interplanetary transportation mission teleoperation system belongs to the ground application system in deep space mission, which performs terrain reconstruction, visual positioning, path planning, and rover motion control by receiving telemetry data. It plays a vital role in the whole lunar exploration operation and its so-called trustworthy evidence must be assessed before and during its implementation. Taking ISO standards and China's national military standards as trustworthy evidence source, the net assessment model and net assessment method of teleoperation system are established in this paper. The multi-dimensional net assessment model covering the life cycle of software is defined by extracting the trustworthy evidences from trustworthy evidence source. The qualitative decisions are converted to quantitative weights through the net assessment method (NAM) combined with fuzzy analytic hierarchy process (FAHP) and entropy weight method (EWM) to determine the weight of the evidence elements in the net assessment model. The paper employs the teleoperation system for interplanetary transportation as a case study. The experimental result drawn shows the validity and rationality of net assessment model and method. In the final part of this paper, the untrustworthy elements of the teleoperation system are discovered and an improvement scheme is established upon the "net result". The work completed in this paper has been applied in the development of the teleoperation system of China's Chang'e-3 (CE-3) "Jade Rabbit-1" and Chang'e-4 (CE-4) "Jade Rabbit-2" rover successfully. Besides, it will be implemented in China's Chang'e-5 (CE-5) mission in 2019. What's more, it will be promoted in the Mars exploration mission in 2020. Therefore it is valuable to the development process improvement of aerospace information system.

A Study on Electronic Transaction Records Management and Trusted Repositories (전자거래기록의 신뢰성 확보에 관한 연구 - TTPR을 중심으로 -)

  • Lee, So-Yeon;Seol, Moon-Won;Kim, You-Seung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.12 no.2
    • /
    • pp.181-205
    • /
    • 2012
  • The study aims at providing an electronic transaction records management system based on the third party repository which do not have any interest in electronic transactions. This study reviews various articles and standards. It also discusses theoretical issues about electronic transactions and electronic transaction records. Complex characteristics of electronic transaction records are explored and management procedures are analyzed and divided into 5 stages by the life cycle and management bodies. Based on these discussions the study affirms that trustworthy third parties' interventions are essential to prevent and control potential conflicts of electronic transactions. It proposes a trustworthy electronic transaction record management system with the third party repository. Futhermore, it discusses evidence and management environment of electronic transaction records and provides cases of TTPR based on contract transaction and exchange transaction.

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Corporate Sustainable Management and Capital Market: Evidence from Data on Korean Firms

  • Kim, Young Sik;Park, Ki Bum
    • Asia Pacific Journal of Business Review
    • /
    • v.1 no.1
    • /
    • pp.56-66
    • /
    • 2016
  • This paper analyzes the impact of CSR on the capital market in Korea. Using listed firm data, we found that the creation of a sustainability report that indirectly measures the level of CSR can bring the stock rate of return difference of the capital markets representative market index. First, when a firm that publishes a sustainability report was compared in terms of its market rate of return, it showed a return increase of about 2%. We found that higher returns were gained through the competitive advantage of related business when the firm was actively involved in social responsibility. Second, subdivided by industry, firms belonging to the capital goods industry were found to reach a rate of return higher than that of industry. These firms were noticeable in that they were mainly industries that caused environmental pollution. Third, in an additional analysis, foreign investors were given the sustainability report of financial businesses, which was interpreted as a result of industrial properties. A sustainability report is a comprehensive report on the economic, environmental, and social activities of a firm. Firms must learn that they can gain trust through publishing trustworthy reports while achieving the lasting power of growth from the stakeholders.

Good Corporate Governance: A Case Study of Family Business in Indonesia

  • RUSTAM, Akie Rusaktiva;NARSA, I Made
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.69-79
    • /
    • 2021
  • Good Corporate Governance (GCG) has been implemented by companies, especially companies that have gone public. However, many local companies still have not applied the principles of GCG. This study examines the implementation of the CG concept which is not fully implemented in family businesses in Indonesia. Besides, this research also aims to find out the role of the Internal Audit function in enhancing GCG practices. This research is a qualitative study that uses in-depth interviews, observation, and data triangulation, to gather evidence from exploratory case studies conducted in three family business firms. The results of this study found that CG is essential for the successful run of family businesses. After analyzing the data, we developed a new theory called Islamic Integrity Governance. The Internal Auditor plays a key role in improving GCG and a vibrant and agile internal audit function can be an indispensable resource supporting sound corporate governance. The internal auditor provides objective assurance and insight on the effectiveness and efficiency of risk management, internal control, and governance processes. Therefore, the Internal Auditor is an important pillar for effective and efficient GCG implementation. This theory concludes several concepts such as THTCL (Trustworthy, Honest, Transparent, Creative, Loyal). Internal auditors are needed because the concept of control is useful for improving GCG in business.

Challenge of Arbitrators (중재인에 대한 기피)

  • Jeong, Sun-Ju
    • Journal of Arbitration Studies
    • /
    • v.17 no.1
    • /
    • pp.33-55
    • /
    • 2007
  • Parties to national or international disputes use arbitration because they think it is faster than litigation or affords privacy. But it is very important for the parties that the decision of arbitrators is made impartially and independently. For the parties to accept the outcome of an arbitration, it is essential that the final outcome be the result of an impartial process, especially because arbitration is a form of adjudication, albeit a private one. The success of arbitration resides in the conduct of arbitrators. The more independent and impartial arbitrators are, the more trustworthy arbitration will be. Just as court procedures allow for the recusal of judges under certain circumstances, the arbitral process provides means to remove arbitrators from a tribunal if arbitrator can no longer be considered impartial or independent. This is blown as the disqualification or challenge of arbitrators. An arbitrator can also be challenged when he or she does not fulfill the contactually agreed and stipulated qualifications required by the arbitral agreement. An arbitrator's inability to act impartially could give rise to a challenge to the arbitrator, and even to the award. However, deciding whether an interest or relationship could give rise to an apprehension of bias is a difficult issue for every arbitrator. The standard of arbitrator's impartiality and independence is not commensurable to that of judge, because the parties are permitted considerable autonomy in selecting arbitrators. Particularly it may be expected for the party-appointed arbitrator to act as the advocate of the party in the deliberations of the tribunal. Doubts that could give rise to a challenge to the arbitrator should be justifiable. That is the case if a reasonable, informed third party would conclude that the arbitrator's decision making might be influenced by factors other than evidence presented by the parties. Consequently, for example, the mere fact that an arbitrator was to work in the same firm as one of the parties' counsel, this could not automatically be considered as grounds for challenge for lack of impartiality.

  • PDF

A Study on Pobeckchuck in the Middle period of Chosun Dynasty(Second) - Focusing on the History of Chosun Dynasty (조선시대(朝鮮時代) 중기(中期)의 포백척(布帛尺)에 관한 연구(硏究) - 조선왕조실록(朝鮮王朝實錄)을 중심으로 -)

  • Lee, Eun-Kyung
    • Korean Journal of Human Ecology
    • /
    • v.16 no.3
    • /
    • pp.623-630
    • /
    • 2007
  • The remarkable fact regarding the History of Chosun Dynasty(from Jungjong- Youngjo) is that any slightest evidence can't be found that Pobeckchuck was used to measure clothes or various Pobecks. There remains the document that in the 22nd years of Myeonjong, Japan required that Pobeckchuck be used, but it couldn't be allowed because of the reason it was made in the former king. This fact raises the high possibility that Pobeckchuck could be the most trustworthy standardized ruler at that time, and in other point of view, it can be presumed that the measurement in the period of King Sejong continued to have been used until this time. It can be seen that the length of one Chuck of Pobeckchuck at this time must have been equivalent to 46. 73cm of Pobeckchuck of Samchuck in the period of Sejong. In the History of Sunjo Period, many records on Pobeckchuck can be found, which fact seemed to have rectified the measurement system which was disordered by military revolt, though the reason is not clear. Also a record can be found that in the period of Sunjo, Chinese envoy required the Sunjo Regime to use Pobeckchuck for the measurement of copper pillar, which record supports the fact that Pobeckchuck is the standardized ruler. Another record that in the 26th period of Youngjo, Pobeckchuck of Samchuck was corrected according to the Kyeongkukdaejeon shows that the length of Pobeckchuck was 46.80cm at that time. Also, the record which rectified many rulers with the comparison of Hwangjong-chuck, Ju-chuck, Joryeki-chuck, Yongjo-chuck, etc. with one another reveals that the rulers used in the period of Sejong continued to have been used unchanged until in the period of Youngjo.

Integrative Review of Sexual Health Information Seeking Behaviors among Adolescents: Based on Qualitative Research (청소년의 성 건강정보 추구행동: 질적연구를 중심으로 한 통합적 문헌고찰)

  • Kim, Sookyung;Kim, Sanghee
    • Journal of the Korean Society of School Health
    • /
    • v.34 no.1
    • /
    • pp.42-52
    • /
    • 2021
  • Purpose: With the development of media, the ways adolescents can obtain information related to sexual health have diversified. Prior quantitative research on adolescents' sexual health information seeking behaviors (HISB) has limitations in grasping the details, and sexual issues of adolescents have tended to be underreported in quantitative studies. It is necessary to explore sexual HISB through an integrative review of qualitative research. The aim of the study was to analyze the literature on sexual HISB among adolescents, focusing on qualitative research. Methods: An integrative review was undertaken to explore the studies conducted between 2009 and 2018 that addressed sexual HISB such as source preferences, perceived trustworthiness, and tendency according to age and gender among adolescents. Results: Seven studies met the selection criteria and were analyzed according different sexual HISB. It was identified that adolescents preferred trustworthy sources and had a pattern of reviewing and comparing the content among diverse sources to confirm the quality of the information. Female adolescents valued privacy and confidentiality, while male adolescents would like to earn information along with their peers and perceived it as an opportunity to exchange their experiences and thoughts. Late adolescents preferred to seek sexual health information from peers and on the internet such as websites and social platforms compared to early adolescents. Conclusion: This study is significant in that it provides evidence that can be applied when developing programs for promoting sexual health in adolescents. It is suggested that programs should focus on building trustworthiness and consider differences in age and gender to improve the use of sexual health information among adolescents.

A Secure Receipt Issuing Scheme for e-Voting with Improved Usability (향상된 사용자 편의성을 갖는 안전한 전자 투표 영수증 발급 방식)

  • Lee, Yun-Ho;Lee, Kwang-Woo;Park, Sang-Joon;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.75-88
    • /
    • 2007
  • Current electronic voting systems are not sufficient to satisfy trustworthy elections as they do not provide any proof or confirming evidence of their honesty. This lack of trustworthiness is the main reason why e-voting is not widespread even though e-voting is expected to be more efficient than the current plain paper voting. Many experts believe that the only way to assure voters that their intended votes are casted is to use paper receipts. In this paper, we propose an efficient scheme for issuing receipts to voters in an e-voting environment using the well-known cut-and-choose method. Our scheme does not require any special printers or scanners, nor frequent observations of voting machines. In addition, our scheme is more secure than the previous schemes.

The Mediating Role of Perceived Risk in the Relationships Between Enduring Product Involvement and Trust Expectation (지속적 제품관여도와 소비자 요구신뢰수준 간의 영향관계: 인지된 위험의 매개 역할에 대한 실증분석을 중심으로)

  • Hong, Ilyoo B.;Kim, Taeha;Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.103-128
    • /
    • 2013
  • When a consumer needs a product or service and multiple sellers are available online, the process of selecting a seller to buy online from is complex since the process involves many behavioral dimensions that have to be taken into account. As a part of this selection process, consumers may set minimum trust expectation that can be used to screen out less trustworthy sellers. In the previous research, the level of consumers' trust expectation has been anchored on two important factors: product involvement and perceived risk. Product involvement refers to the extent to which a consumer perceives a specific product important. Thus, the higher product involvement may result in the higher trust expectation in sellers. On the other hand, other related studies found that when consumers perceived a higher level of risk (e.g., credit card fraud risk), they set higher trust expectation as well. While abundant research exists addressing the relationship between product involvement and perceived risk, little attention has been paid to the integrative view of the link between the two constructs and their impacts on the trust expectation. The present paper is a step toward filling this research gap. The purpose of this paper is to understand the process by which a consumer chooses an online merchant by examining the relationships among product involvement, perceived risk, trust expectation, and intention to buy from an e-tailer. We specifically focus on the mediating role of perceived risk in the relationships between enduring product involvement and the trust expectation. That is, we question whether product involvement affects the trust expectation directly without mediation or indirectly mediated by perceived risk. The research model with four hypotheses was initially tested using data gathered from 635 respondents through an online survey method. The structural equation modeling technique with partial least square was used to validate the instrument and the proposed model. The results showed that three out of the four hypotheses formulated were supported. First, we found that the intention to buy from a digital storefront is positively and significantly influenced by the trust expectation, providing support for H4 (trust expectation ${\rightarrow}$ purchase intention). Second, perceived risk was found to be a strong predictor of trust expectation, supporting H2 as well (perceived risk ${\rightarrow}$ trust expectation). Third, we did not find any evidence of direct influence of product involvement, which caused H3 to be rejected (product involvement ${\rightarrow}$ trust expectation). Finally, we found significant positive relationship between product involvement and perceived risk (H1: product involvement ${\rightarrow}$ perceived risk), which suggests that the possibility of complete mediation of perceived risk in the relationship between enduring product involvement and the trust expectation. As a result, we conducted an additional test for the mediation effect by comparing the original model with the revised model without the mediator variable of perceived risk. Indeed, we found that there exists a strong influence of product involvement on the trust expectation (by intentionally eliminating the variable of perceived risk) that was suppressed (i.e., mediated) by the perceived risk in the original model. The Sobel test statistically confirmed the complete mediation effect. Results of this study offer the following key findings. First, enduring product involvement is positively related to perceived risk, implying that the higher a consumer is enduringly involved with a given product, the greater risk he or she is likely to perceive with regards to the online purchase of the product. Second, perceived risk is positively related to trust expectation. A consumer with great risk perceptions concerning the online purchase is likely to buy from a highly trustworthy online merchant, thereby mitigating potential risks. Finally, product involvement was found to have no direct influence on trust expectation, but the relationship between the two constructs was indirect and mediated by the perceived risk. This is perhaps an important theoretical integration of two separate streams of literature on product involvement and perceived risk. The present research also provides useful implications for practitioners as well as academicians. First, one implication for practicing managers in online retail stores is that they should invest in reducing the perceived risk of consumers in order to lower down the trust expectation and thus increasing the consumer's intention to purchase products or services. Second, an academic implication is that perceived risk mediates the relationship between enduring product involvement and trust expectation. Further research is needed to elaborate the theoretical relationships among the constructs under consideration.