• Title/Summary/Keyword: trust standard

Search Result 156, Processing Time 0.025 seconds

A Study on the "Vertrauensgrundsatz" in aviation (항공 교통에서의 신뢰의 원칙)

  • Ham, Se-Hoon;Whang, Ho-Woon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.19 no.2
    • /
    • pp.45-51
    • /
    • 2011
  • The article specified in aviation legislation, 'The captain has the final authority and responsibility in flight safety' could be one reason running counter to applying "Vertrauensgrundsatz". In practice, however, captains do not have professional skills in every task and they should distribute duties and responsibilities to flight attendents and other staffs to operate the flight as safely and efficiently as possible. Therefore, in aviation, fair criterion, namely, "Vertrauensgrundsatz" is necessary to balance between efficiency and legal interest for participants. In addition, when it comes to mutual trust of duty which was the starting point of this study, the standard in mutual advice or interference must be based on the duty specified in air law and flight regulations. Also, pervasive trust will not only be attributed to joint responsibility but an act that cannot be trusted.

A Study on State and Operation of Non-government Certification in Korea (민간인증제도의 현황과 운영에 관한 연구)

  • Goh, Hyun-Woo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.2
    • /
    • pp.71-79
    • /
    • 2008
  • The Certification system will be able to expect that effect of marketing and the corporate image rising, if the certification body guarantees the contents of certification against industrial technical advance and safety, environment and efficiency, quality when it is suitable in the standard which is provided. The certification system where the private organization operates but recently on the legal notarization outside is disordering and the trust regarding the certification falls and the objective and gist of origin are damaged. But recently the trust of certification has fallen and the objective and gist of origin are damaged. Because the non-government certifications are disordering. Also the damage of the consumers majority occurs but it is insufficient the investigation analysis against the present condition regarding a non-government certification system and the operation actual condition. So it is necessary the actual condition where the countermeasure against hereupon is urgent. In this study, we present the operation direction of efficient against non-government certification system through investigation and the analysis.

An Analysis of the Moderating Effects of User Ability on the Acceptance of an Internet Shopping Mall (인터넷 쇼핑몰 수용에 있어 사용자 능력의 조절효과 분석)

  • Suh, Kun-Soo
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Due to the increasing and intensifying competition in the Internet shopping market, it has been recognized as very important to develop an effective policy and strategy for acquiring loyal customers. For this reason, web site designers need to know if a new Internet shopping mall(ISM) will be accepted. Researchers have been working on identifying factors for explaining and predicting user acceptance of an ISM. Some studies, however, revealed inconsistent findings on the antecedents of user acceptance of a website. Lack of consideration for individual differences in user ability is believed to be one of the key reasons for the mixed findings. The elaboration likelihood model (ELM) and several studies have suggested that individual differences in ability plays an moderating role on the relationship between the antecedents and user acceptance. Despite the critical role of user ability, little research has examined the role of user ability in the Internet shopping mall context. The purpose of this study is to develop a user acceptance model that consider the moderating role of user ability in the context of Internet shopping. This study was initiated to see the ability of the technology acceptance model(TAM) to explain the acceptance of a specific ISM. According to TAM. which is one of the most influential models for explaining user acceptance of IT, an intention to use IT is determined by usefulness and ease of use. Given that interaction between user and website takes place through web interface, the decisions to accept and continue using an ISM depend on these beliefs. However, TAM neglects to consider the fact that many users would not stick to an ISM until they trust it although they may think it useful and easy to use. The importance of trust for user acceptance of ISM has been raised by the relational views. The relational view emphasizes the trust-building process between the user and ISM, and user's trust on the website is a major determinant of user acceptance. The proposed model extends and integrates the TAM and relational views on user acceptance of ISM by incorporating usefulness, ease of use, and trust. User acceptance is defined as a user's intention to reuse a specific ISM. And user ability is introduced into the model as moderating variable. Here, the user ability is defined as a degree of experiences, knowledge and skills regarding Internet shopping sites. The research model proposes that the ease of use, usefulness and trust of ISM are key determinants of user acceptance. In addition, this paper hypothesizes that the effects of the antecedents(i.e., ease of use, usefulness, and trust) on user acceptance may differ among users. In particular, this paper proposes a moderating effect of a user's ability on the relationship between antecedents with user's intention to reuse. The research model with eleven hypotheses was derived and tested through a survey that involved 470 university students. For each research variable, this paper used measurement items recognized for reliability and widely used in previous research. We slightly modified some items proper to the research context. The reliability and validity of the research variables were tested using the Crobnach's alpha and internal consistency reliability (ICR) values, standard factor loadings of the confirmative factor analysis, and average variance extracted (AVE) values. A LISREL method was used to test the suitability of the research model and its relating six hypotheses. Key findings of the results are summarized in the following. First, TAM's two constructs, ease of use and usefulness directly affect user acceptance. In addition, ease of use indirectly influences user acceptance by affecting trust. This implies that users tend to trust a shopping site and visit repeatedly when they perceive a specific ISM easy to use. Accordingly, designing a shopping site that allows users to navigate with heuristic and minimal clicks for finding information and products within the site is important for improving the site's trust and acceptance. Usefulness, however, was not found to influence trust. Second, among the three belief constructs(ease of use, usefulness, and trust), trust was empirically supported as the most important determinants of user acceptance. This implies that users require trustworthiness from an Internet shopping site to be repeat visitors of an ISM. Providing a sense of safety and eliminating the anxiety of online shoppers in relation to privacy, security, delivery, and product returns are critically important conditions for acquiring repeat visitors. Hence, in addition to usefulness and ease of use as in TAM, trust should be a fundamental determinants of user acceptance in the context of internet shopping. Third, the user's ability on using an Internet shopping site played a moderating role. For users with low ability, ease of use was found to be a more important factors in deciding to reuse the shopping mall, whereas usefulness and trust had more effects on users with high ability. Applying the EML theory to these findings, we can suggest that experienced and knowledgeable ISM users tend to elaborate on such usefulness aspects as efficient and effective shopping performance and trust factors as ability, benevolence, integrity, and predictability of a shopping site before they become repeat visitors of the site. In contrast, novice users tend to rely on the low elaborating features, such as the perceived ease of use. The existence of moderating effects suggests the fact that different individuals evaluate an ISM from different perspectives. The expert users are more interested in the outcome of the visit(usefulness) and trustworthiness(trust) than those novice visitors. The latter evaluate the ISM in a more superficial manner focusing on the novelty of the site and on other instrumental beliefs(ease of use). This is consistent with the insights proposed by the Heuristic-Systematic model. According to the Heuristic-Systematic model. a users act on the principle of minimum effort. Thus, the user considers an ISM heuristically, focusing on those aspects that are easy to process and evaluate(ease of use). When the user has sufficient experience and skills, the user will change to systematic processing, where they will evaluate more complex aspects of the site(its usefulness and trustworthiness). This implies that an ISM has to provide a minimum level of ease of use to make it possible for a user to evaluate its usefulness and trustworthiness. Ease of use is a necessary but not sufficient condition for the acceptance and use of an ISM. Overall, the empirical results generally support the proposed model and identify the moderating effect of the effects of user ability. More detailed interpretations and implications of the findings are discussed. The limitations of this study are also discussed to provide directions for future research.

Improvement Strategies for the Standard Records Management System of Korea (표준기록관리시스템의 개선전략 연구)

  • Lee, So-Yeon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.15 no.1
    • /
    • pp.29-52
    • /
    • 2015
  • The current study aims to propose strategies for the improvement of the Standard Records Management System of Korea. Here, benefits from the system and reasons of underusage were derived based on the results taken from the analysis of interviews and answers to open-ended questions in the system usage survey. Issues related to the nine main functions of the system were also reviewed in the process. With this, the improvement strategies related to the aforementioned issues are categorized as (1) simplification of functionalities, (2) quality assurance of records and metadata, (3) strengthening user assistance and communication, and (4) trust building between the National Archives of Korea and records centers of public institutions.

A Study on the Influence of Restaurant Factors on Trust and Revisit Intention (외식업 점포 선택요인이 신뢰와 재방문 의도에 미치는 영향에 관한 연구)

  • Song, In-Am;Shin, Chang-Ok
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.161-168
    • /
    • 2017
  • The purpose of this study is to investigate the effect of restaurant selection factors on reliability and revisit intention. The results of empirical analysis were as follows: First, the factors influencing the intention to visit the restaurant were the physical environment, service, price, location, reputation, cleanliness, It is confirmed that consumers are willing to visit again if their satisfaction is high because they choose general consumers considering kindness and taste. Second, trust is found to affect re - visit intention and it can be judged that store faith is actively considering return visit through consumer 's belief. Third, it was found that the factor of selecting the restaurant business influenced the intention to visit again according to the trust. When the customer chooses according to the restaurant business standard and satisfies the trust, it intends to increase the intention to visit again. The results of this study are as follows. First, it is found that the factors of restaurant selection and trust affect the revisit intention of restaurants, and it is meaningful to provide theoretical and strategic implications.

A Study on Floor Slip Resistance Standard and Test Method for BF Certification (BF인증을 위한 바닥 마감재 미끄럼 성능기준 및 측정방법에 대한 연구)

  • Shin, Dong-Hong;Seong, Ki-Chang;Park, Kwang-Jae
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.25 no.3
    • /
    • pp.75-83
    • /
    • 2019
  • Purpose: There are no clear criteria for slip performance in the BF certification process, so the evaluator relies on subjective judgments depending on the field situation. Physical criteria for determining the slip performance of various floor finishes are not clear. C.S.R., the only criterion currently being used to check slip performance, may raise questions about its coverage, feasibility and reliability. Method: For an analysis of domestic standards and status, KS L 1001, KS M 3510, and KS F 2375. External standards are analyzed for ADA Standard, ANSI Standard, and BS EN Standard. Analyze the test methods and evaluation criteria of O-Y-PSM, BPT, and the dynamic slip resistance test used in these criteria. It also presents an improvement plan for the rational presentation of standards. Results: To date, various kinds of test methods and measuring devices of the slip resistance coefficient have been developed, but there are not many ways to trust useful results related to user safety. Reliability and thoroughly verified test methods and criteria should be used to assess the slip performance of the floor. In order to improve the standard for the evaluation of slip performance in Korea, the existing standard should first be raised to the same level as the overseas standard, and the application of the discriminatory standard should be applied considering the characteristics and usage patterns of each space. Implication: Currently, Korean standards propose various test methods, but the proper use of test methods, scope and assessment criteria are not established, so improvement of the comprehensive standard is necessary.

Development of Intelligent Robot Vision System for Automatic Inspection of Optical Lens (광학렌즈 자동 검사용 지능형 로봇 비젼 시스템 개발)

  • 정동연;장영희;차보남;한성현
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2004.04a
    • /
    • pp.247-252
    • /
    • 2004
  • Developed shape awareness technology and vision technology for optical ten slant in this research and including external form state of lens for the performance verification developed so that can be good achieve badness finding. And, establish to existing reflex data because inputting surface badness degree of scratch's standard specification condition directly, and error designed to distinguish from product more than schedule error to badness product by normalcy product within schedule extent after calculate the error comparing actuality measurement reflex data md standard reflex data mutually. Developed system to smallest 1pixel unit though measuring is possible 1pixel as 3.7$\mu\textrm{m}$${\times}$3.7$\mu\textrm{m}$(0.1369${\times}$10/sub-1/$\textrm{mm}^2$) the accuracy to 10/sub-1/mm minutely measuring is possible performance verification and trust ability through an experiment prove.

  • PDF

OAuth based Proxy Delegation Service (OAuth 기반의 대리 인증서 위임 서비스)

  • Heo, Daeyoung;Hwang, Suntae
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.55-62
    • /
    • 2012
  • Grid web applications by standard Web technology are increasingly used to provide grid service to users as normal Web user interface and service. It is however difficult to integrate a grid security system such as Grid Security Infrastructure (GSI) into Web applications because the delegation way of standard Web security is not the same as the one of Grid security. This can be solved by allowing Web applications to get a Grid credential by using an online credential repository system such as MyProxy. In this paper, we investigate the problem that occurs when MyProxy, which assumes mutual trust between a user and Grid web application, is adapted for achieving security integration between Web and Grid, and we propose a new Grid proxy delegation service to delegate a Grid credential to the Web without assuming mutual trust. In the service, the X.509 proxy delegation process is added to OAuth protocol for credential exchange, and authentication can be done by an external service such as OpenID. So, users can login onto the Grid web application in a single sign-on manner, and are allowed to securely delegate and retrieve multiple credentials for one or more Virtual Organizations.

IPMP(Intellectual Property Management and Protection) Service Interfaces based on MPEG Multimedia (MPEG 멀티미디어 미들웨어에 기반한 보호관리 서비스 인터페이스)

  • Choo, Hyon-Gon;Bang, Gun;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.325-334
    • /
    • 2007
  • In order to increase the promotion of multimedia processing techniques in MPEG standard, MPEG Multimedia Middleware (M3W) which supports middleware interface for multimedia processing is set up. In this paper, multimedia protection and management service interfaces based on MPEG Multimedia Middleware (M3W) are introduced. The service interfaces are based on component models of M3W and support normative IPMP messages. The proposed interfaces are composed of Tool interfaces and Trust management interfaces: Tool interfaces provide the functionality supporting terminal and tool based on the governed decoder model and Trust management interfaces provide the supporting functionality such as license managing and authentication required in DRM devices. As an application of the proposed interfaces, a JAVA based player simulator is shown. The proposed interfaces can be easily implemented under various device and application environments as an ISO/IEC 23004-2 standard middleware platform.

  • PDF

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.