• Title/Summary/Keyword: initial trust

Search Result 66, Processing Time 0.032 seconds

A Study on Transferring Power Model in Chinese Family Business (중국 가족기업의 경영승계 모형에 관한 연구)

  • Kim, Mie-Jung;Son, Dong-Jin
    • International Commerce and Information Review
    • /
    • v.8 no.4
    • /
    • pp.277-300
    • /
    • 2006
  • In the initial stage of a national economic development of China, the family business takes enterprise's organizational form ruling position. The private enterprise of China is mainly family business; the family makes the mainly proprietorship in other words. Even in the private enterprise after developing, 70 percents are managed as a family This paper start to study the Transferring Power Patterns in family business using the Company's Life Circle Theory and some other correlative theories. Based on the Transporting Power Model, the paper gives a comprehensive explanation for the choice of transferring power pattern in the family business of China.

  • PDF

Secure MAC address-based Authentication on X.509 v3 Certificate in Group Communication (그룹 통신을 위한 안전 MAC 주소 기반 X.509 인증서에 관한 연구)

  • Hong, Sung-Hyuck
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.69-77
    • /
    • 2008
  • I propose adding users’Media Access Control (MAC) addresses to standard X.509 certificates to provide more secure authentication. The MAC address can be added by the issuing Certification Authority (CA) to the "extensions" section of the X.509 certificate. I demonstrate that when two users with MAC address information on their digital certificates communicate, the MAC address on the first user’s certificate can be easily verified by the second user. In this way, security can be improved without markedly degrading system performance and the level of initial trust between participants in virtual communities will be improved.

  • PDF

Authentication Scheme in Wireless Mobile Multi-hop Networks (무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선)

  • Lee, Yong;Lee, Goo Yeon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

Studies on Landscape Planting Design( I ) -With SpeciAl refErence to the Selection of til:es in the Landscape - (조경배치 설계에 관한 연구(1))

  • 심우경
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.15 no.3
    • /
    • pp.1-10
    • /
    • 1988
  • The initial selection of plants is the decisive step in the ultimate success of any landscape planting. This study intended to establish a reasonable selecting criteria of tree in the landscape through the holistic consideration of aesthetic, functional, cultural, operational and ecological viewpoints. The matrices of evaluating the fitness of tree were modulated to 10 categories ; availability from the established nursery. aesthetic value, indigenous to the locality, maintenance, soil fertility requirement, environmental tolerances. growth rate. wild-life food production. use of plants in design and user's likes. This 10 categories were weighted to their fitness as high(10 points), medium(8 points) and low(5points). Thus suitable plants were identified which got 70 more points from total 100 points. Such a method was believed as a rational process to get trust from client. to persuade uneducated client and to be free from designer's prejudice through a case study. But it is important to landscape designer to recognize the relationship between the rationality which prevails throughout the modern technical world and the intuitive aspects of design that are essential for developing creative solutions to encourage creativity as well as analytical responsibility.

  • PDF

A Implementation of Blockchain based Manufacturing Supply Chain Tracking System (블록체인 기반 제조 공급망 추적 시스템 구현)

  • Lee, Jae-Ho;Nam, Ho-Ki
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.4
    • /
    • pp.183-188
    • /
    • 2017
  • Block Chain is a technology that records and shares distributed ledgers without a central authority, providing a decentralized platform for transparent transactions in the business and enhancing transparency and traceability in all transactions to ensure trust in the transaction. Despite initial doubts about this technology, it is committed to adopting, adapting and improving the technology in a wide range of industries, including finance, government, security, logistics, food, medical, legal, and real estate. This study examines this technology, its applicability and potential benefits to the manufacturing supply chain. A tracking system of manufacturing supply chain to visualize transparency and traceability is implemented, and the conditions for adopting the technology in the manufacturing supply chain and the issues to be addressed are discussed.

Reliable Cascaded Delegation Scheme for Mobile Agent Environments (이동 에이전트 환경을 위한 안전한 연속 위임 구현 기법)

  • Lee, Hyun-Suk;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.31-38
    • /
    • 2004
  • In mobile agent environments, migration of an agent occurs continuously due to the mobility of agents. So cascaded delegation can occur among places for delegating the privilege to execute the agent. Because the existing delegation scheme considers only the delegation between two places that participate in migration of an agent, it does not support secure cascaded delegation. In this paper, we propose a cascaded delegation scheme that provides agents with secure cascaded delegation in mobile agent environments. Depending on the trust-relationship among places, the proposed scheme achieves the goal by nesting each delegation token or by nesting only initial token signed by creator of the agent within the signed part of the next immediate delegation token. And we prove that the proposed scheme is secure against the attack of replaying a message and the attack of substituting a delegation token.

Delay Factor Analysis of Public Project Based on System Dynamics (SD를 이용한 공공 프로젝트의 지체요인 분석)

  • 이만형;이정민
    • Korean System Dynamics Review
    • /
    • v.4 no.2
    • /
    • pp.95-130
    • /
    • 2003
  • The purpose of this study is to find what causes make public projects hold off, going beyond the planned deadline and budget. Using System Dynamics(SD) and their derivative Urban Dynamics(UD) models, it intends to analyze major feedback loops based on VENSIM and to simulate them with STELLA software, all of which are interrelated with various causes of project delay. To prevent or ameliorate project delay, first of all it advises to focus on endogenous delaying factors not exogenous ones. These factors either reinforce or balance certain loops in complex causal structure, In the case example on the Cremation Building Project in Cheongju, Residents’ participation demand make negotiation put off and delayed negotiation reinforces administrative-expediency planning in order to observe a time limit, on the other hand, once building consensus, it increase both the level of planning performance and public trust. In the meantime, the real planning process used to neglect residents opinions and manage public grievance only through compensation, he a result of simulation, visible fruit of negotiation in the initial phase seems to be not satisfactory owing to funds and time consumed, but after reaching an mutual agreement among stakeholders, planning performance is effective and strategic than administrative-expediency planning viewed in both financial and time angle. It proposes to devise specific tools schematizing project implementation. In order to upgrade the quality of project management, it recommends for planners to adopt key concepts based on SD/UD diagrams and causal loops, which would contribute to enriching Planning abbots.

  • PDF

Development of the Hope Scale for Korean Cancer Patients (암 환자의 희망 측정도구 개발)

  • Tae, Young Sook;Choi, Yooun Sook;Nam, Gum Hee;Bae, Ju Young
    • Korean Journal of Adult Nursing
    • /
    • v.29 no.2
    • /
    • pp.211-223
    • /
    • 2017
  • Purpose: This study was designed to develop and test the Hope Scale for Korean cancer patients. Methods: The process for the development of the Hope Test was a selection of initial items drawn from a literature review and in-depth interviews. The selected items were assessed for content validity by experts. The Hope Scale was comprised of five factors and 30 preliminary items. The preliminary Hope Scale for Korean Cancer Patients (HS_KCP) was administered to 259 cancer patients from one university hospital and one cancer hospital in Busan. Data were analyzed using item analysis, factor analysis, Pearson correlation coefficients, and Cronbach's ${\alpha}$. Results: Eighteen items were selected for the final scale. Five factors (inner sense of control, trust and expectation for recovery of disease, interconnection, spirituality, emotional despair) evolved from the factor analysis, which explained 63.3% of the total variance. The convergent & discriminent validity was r=.83 (p<.001), r=-73 (p<.001). The internal consistency, Cronbach's ${\alpha}$ was .88 and reliability of the subscales ranged from .54 to .85. Conclusion: The Hope Scale for Korean cancer patients demonstrated acceptable validity and reliability. It can be used to assess the hope of cancer patients and is feasible within a clinical setting.

Factors associated with willingness to participate in clinical trials for cancer patients: an exploratory narrative review (암 환자의 임상시험 참여 의향과 연관된 요인: 탐색형 서술적 문헌고찰)

  • Kim, Kun Hyung;Hwang, Bo Yown;Son, Gyung Mo
    • Journal of Acupuncture Research
    • /
    • v.33 no.3
    • /
    • pp.145-152
    • /
    • 2016
  • Objectives : This study aimed to investigate both cancer patients' willingness to participate (WTP) in clinical trials and its associated factors. Methods : We searched MEDLINE (PubMed) for studies that had investigated cancer patients' WTP in clinical trials. Search terms included 'willingness to participate', 'cancer' and 'trial'. Studies published within the last five years up to July 26, 2016 were potentially eligible. Results : Of 44 initial hits, 14 studies (12 quantitative and 2 qualitative) were included. Two out of the 14 studies investigated WTP in an acupuncture trial. Study designs, such as WTP measurement methods, investigation settings, and type of cancer, varied. The proportion of participants with a WTP was widely distributed between the studies (median 48.6 %, range 11.1 % to 88.3 %). Factors associated with WTP included various socio-demographic factors, clinical factors, participants' knowledge/attitudes toward clinical trials, travel distance, information from physicians, and trust toward physicians. Conclusion : WTP and its associated factors were variable across the reviewed studies, which might be due to different research methods and contexts. Whether or not common factors associated with cancer patients' WTP in clinical trials exist remains unclear and thus warrants further research.

New OTP Authentication Approach based on Table Pattern Schedule (테이블 패턴 스케줄 기반 OTP 인증)

  • Balilo, Benedicto B. Jr.;Gerardo, Bobby D.;Medina, Ruji P.;Byun, Yung-Cheol
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1899-1904
    • /
    • 2017
  • This paper presents a new one-time password approach generated based on $4{\times}4$ pattern schedule. It demonstrates generation of passkey from initial seed of random codes and mapping out in table pattern schedule which will produce a new form of OTP scheme in protecting information or data. The OTP-2FA has been recognized by many organizations as a landmark to authentication techniques. OTP is the solution to the shortcomings of the traditional user name/password authentication. With the application of OTP, some have benefited already while others have had second thoughts because of some considerations like cryptographic issue. This paper presents a new method of algorithmic approach based on table schedule (grid authentication). The generation of OTP will be based on the random parameters that will be mapped out in rows and columns allowing the user to form the XY values to get the appropriate values. The algorithm will capture the values and extract the predefined characters that produce the OTP codes. This scheme can work in any information verification system to enhance the security, trust and confidence of the user.