• Title/Summary/Keyword: trustworthy service

Search Result 55, Processing Time 0.019 seconds

An Exploratory Research on the Improvement of Agricultural Food-related Public Organizations' Information Service : Based on the example of Okdab.kr's information service improvement strategy

  • Ham, Eunin;Lee, Jongtae
    • Agribusiness and Information Management
    • /
    • v.10 no.1
    • /
    • pp.26-34
    • /
    • 2018
  • Development, availability and users' participation in the information service of agricultural food sector is slower than that of other sectors in Korea. This phenomenon comes from the lack of development strategies and comparative analyses with other sectors, as well as the agricultural food industry's own characteristics which is developed based on the offline market. In this research, we will discuss about how to improve the public information service of agricultural food sector based on the example of establishing service improvement strategy by the most representative Okdab. In this research, we have drawn the following implications for development strategy of Okdab service based on three core keywords derived from benchmarking KOSIS. Three core subjects for upgrading public information service are 'analysis information with expertise and differentiation,' 'user cooperation-oriented platform,' and 'intuitive nd effective UX,' and to strength B.I. as an integrated information service of agricultural food sector, we need to identify the users' satisfaction and needs for the existing service, establish an optimized operating strategy on a short-term, mid-term and long term bases, and implement them in a positive way. Based on this positive action, it can become a trustworthy information service for the users, and we can expect the improvement of the users' recognition for its consistent usability and efficiency.

Continuous Usage Intention of Twitter's Informations Focus on Elaboration Likelihood Model (트위터의 정보가 지속사용의도에 미치는 영향 : 정교화 가능성 모델을 중심으로)

  • Kim, Ee-Hwan;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Information Technology Services
    • /
    • v.11 no.3
    • /
    • pp.49-65
    • /
    • 2012
  • This study aims to investigate the factors influencing followers' continuous usage intention of twitter based on Elaboration Likelihood Model. In particular, central route(information itself) and peripheral route(twitterian's trustworthiness) are tested to reveal which has a more influential role in effecting the continuous usage intention of power-twitter. Furthermore, this study tests the relationship of users' attitude and continuous usage intention. The results indicate that argument quality, accuracy(central route), source expertise and source trustworthiness (peripheral route) have an influence on attitude. However, trustworthy on central route is not significant. Argument quality, trustworthy, accuracy(central route) and source expertise(peripheral route) have an influence on perceived usefulness. But source trustworthiness on peripheral is not significant. Attitude has an influence on perceived usefulness, and attitude and perceived usefulness both have an influence on perceived usefulness. In conclusion, central route is more influential than peripheral route in forming a positive attitude towards arguments, which in turn leads to the perception of twitter's usefulness, and in the end brings the continuous usage intention of twitter.

Trustworthy authentication and key management for NSDR ad-hoc network (안정적인 동적 복합 ad-hoc 네트워크와 이에 대한 신뢰성 있는 키 인증과 키 관리)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.49-55
    • /
    • 2012
  • In this paper, we consider the limit of the previous works for ad-hoc network, then propose a dynamic routing scheme which employs a 2-tier hierarchical structure. We adopt the advantages of proactive and reactive routing scheme for efficient network management. We define this method as NSDR(New Secure Dynamic Routing) scheme. We also propose a trustworthy authentication and key management for the proposed ad-hoc network. We currently study the possibility that ad-hoc networks can provide a service such as key management and authentication for the next generation mobile network.

Trust Evaluation Metrics for Selecting the Optimal Service on SOA-based Internet of Things

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • In the IoT environment, there is a huge amount of heterogeneous devices with limited capacity. Existing trust evaluation methods are not adequate to accommodate this requirement due to the limited storage space and computational resources. In addition, since IoT devices are mainly human operated devices, the trust evaluation should reflect the social relations among device owners. There is also a need for a mechanism that reflects the tendency of the trustor and environmental factors. In this paper, we propose an adaptable trust evaluation method for SOA-based IoT system to deal with these issues. The proposed model is designed to minimize the confidence bias and to dynamically respond to environmental changes by combining direct evaluation and indirect evaluation. It is expected that it will be possible to secure trust through quantitative evaluation by providing feedback based on social relationships.

Evaluation for Incheon International Airport security: passenger satisfaction and significance, using IPA method (IPA기법을 활용한 인천국제공항 이용객의 항공보안서비스 만족도와 중요도 평가)

  • Byeon, A-Reum;Choi, Jin-Young;Choi, Youn-Chul
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.25 no.2
    • /
    • pp.77-82
    • /
    • 2017
  • Currently the international flight passenger visit at Incheon International Airport increased 12.4% compared to January 2017. Such increase affects on the congestion of an airport and the security check is one of the most congested area. There is a prejudice that airport security is not related to the airport service and is only a type of control that limits the quality of service. However, considering the huge impact that airport security agents have on passenger move within the airport, trustworthy, fast and kind service at airport security check is one of the most important part of airport service quality improvement. This research is an importance performance analysis of Incheon International Airport security service passenger satisfaction and its significance using IPA method. This research will contribute to the improvement of airport operation and service quality, by proving the relation between airport security and service.

An Asynchronous-Driven Node.js Based Intermediary-free Direct Deal Distribution Platform Converged with Cloud Service

  • Lee, SongYeon;Paik, JongHo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4212-4226
    • /
    • 2019
  • In this paper, a design and implementation for direct deal distribution platform is proposed to bypass the complex traditional distribution structure of agricultural market, as one of the fields where distribution patterns have changed. In the case of domestic agricultural distribution, demand and supply are unstable since the sales market is excessively concentrated in the designated wholesale market. Besides sales must go through multiple stages of distribution leading to problems in freshness and stability of agricultural products and downward pressure on profit margins for producers. To solve the above mentioned issues, we propose a cloud service convergence direct deal distribution platform based on asynchronous-driven Node.js. The proposed platform can facilitate a variety of direct trading functions and also access to visualization information related to agricultural products, which may increase user confidence at an intermediary-free direct transactions platform. First, we describe the requirements of intermediary-free direct transactions of agricultural products and transaction entities. Next the database structure and transaction functions are designed and then implemented according to those requirements. Finally, an API based cloud convergence service structure is designed to provide the analyzed information to ensure a trustworthy system.

Machine Learning Methods for Trust-based Selection of Web Services

  • Hasnain, Muhammad;Ghani, Imran;Pasha, Muhammad F.;Jeong, Seung R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.38-59
    • /
    • 2022
  • Web services instances can be classified into two categories, namely trusted and untrusted from users. A web service with high throughput (TP) and low response time (RT) instance values is a trusted web service. Web services are not trustworthy due to the mismatch in the guaranteed instance values and the actual values achieved by users. To perform web services selection from users' attained TP and RT values, we need to verify the correct prediction of trusted and untrusted instances from invoked web services. This accurate prediction of web services instances is used to perform the selection of web services. We propose to construct fuzzy rules to label web services instances correctly. This paper presents web services selection using a well-known machine learning algorithm, namely REPTree, for the correct prediction of trusted and untrusted instances. Performance comparison of REPTree with five machine learning models is conducted on web services datasets. We have performed experiments on web services datasets using a ten k-fold cross-validation method. To evaluate the performance of the REPTree classifier, we used accuracy metrics (Sensitivity and Specificity). Experimental results showed that web service (WS1) gained top selection score with the (47.0588%) trusted instances, and web service (WS2) was selected the least with (25.00%) trusted instances. Evaluation results of the proposed web services selection approach were found as (asymptotic sig. = 0.019), demonstrating the relationship between final selection and recommended trust score of web services.

The Impact of Investment Information Technology-based Fund Attributes on Trust, Satisfaction, Emotional Immersion, and Reinvestment Intentions

  • Seongwon Kim;Jungmann Lee;Hongkeun Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.5
    • /
    • pp.83-105
    • /
    • 2023
  • The purpose of this study was to investigate the impact of investment fund attributes such as fund product characteristics, returns on fund investment (ROI), internal controls, and after service on fund investor behavior based on investment information technology. In addition, we also examined how customers reinvest through emotional immersion, company trust and company satisfaction of investment firms in the context of fund investment. First, empirical results show that fund product characteristics, returns on fund investment, and financial firms' internal controls and after service act as signals to fund investors to shape their reinvestment intentions. Second, while investors are generally perceived to be interested only in investment returns, this study also shows that they consider both fund product characteristics and fund investment returns, which are core attributes of funds, as well as financial firms' internal control and after service, which are non-core attributes. Third, we find that company trust is an important factor in investors' reinvestment intentions, showing that investors are more likely to reinvest in a fund if they perceive the financial firm to be trustworthy and reliable. Finally, these findings emphasize that investors consider not only tangible aspects of fund products, such as fund product characteristics and returns on fund investment, but also intangible factors, such as financial firms' internal control and after service, and trustworthiness. Taken together, another implication is that the more advanced the investment information technology of financial firms, the more trust, satisfaction, immersion, and reinvestment intentions of investors will increase.

Service Discovery Mechanism based on Trustable DHT in MANET (MANET에서 신뢰성 있는 DHT기반의 서비스 발견 기법)

  • Han, In-Sung;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1947-1954
    • /
    • 2009
  • Service discovery mechanism is a core technique for getting a desired service in MANET(Mobile Ad-Hoc NETwork) environment. However, As feature of MANET, existing mechanisms have some problem that service requester search for trustable service. also it can not support scalability. in this paper, how to reliably support applications such as service discovery on top of MANET. we are firstly finding a trustable service provider and configure DHT(Distributed Hash Table). P2P's DHT can be adopted to service discovery mechanism because P2P and MANET share certain similarities, primarily the fact that both are instances of self-organizing decentralized systems. Especially, Proposed DHT systems used for P2P overlay network can be effective in reducing the communication overhead in service discovery. So proposed mechanism can support for reliably searching required service and scalability. Simulation results show that our mechanism is scalable and outperforms existing service discovery mechanism.

Trustworthy Service Selection using QoS Prediction in SOA-based IoT Environments (SOA기반 IoT환경에서 QoS 예측을 통한 신뢰할 수 있는 서비스 선택)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.123-131
    • /
    • 2019
  • The Internet of Things (IoT) environment must be able to meet the needs of users by providing access to various services that can be used to develop diverse user applications. However, QoS issues arise due to the characteristics of the IoT environment, such as numerous heterogeneous devices and potential resource constraints. In this paper, we propose a QoS prediction method that reflects trust between users in SOA based IoT. In order to increase the accuracy of QoS prediction, we analyze the trust and distrust relations between users and identify similarities among users and predict QoS based on them. The centrality is calculated to enhance trust relationships. Experimental results show that QoS prediction can be improved.