• Title/Summary/Keyword: Trustee

Search Result 26, Processing Time 0.026 seconds

The Relationship between the Social Interactions on the Social Network and the Purchase Intention

  • Jung, Seung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.149-160
    • /
    • 2016
  • The purpose of this paper is to examine the relationship between the social interactions on the social network and the purchase intention. And the trust propensity of a trustor, the ability of a trustee, and the sincerity of a trustee are selected as the antecedents of social interactions. This paper also examines the effect of type of product as a moderating variable. The result of this paper reveals that social interactions(in terms of closeness, familiarity, and interpersonal trust) have a positive(+) effect on the purchase intention. The more social interactions, the more trustors have intentions to purchase the recommended products by trustees. In addition, the study reveals that the trust propensity of a trustor and the ability of a trustee directly and indirectly influenced on the intention to purchase the recommended product. The findings also suggest that the trust propensity of a trustor and the ability of a trustee have an effect on the closeness, familiarity, and interpersonal trust resulting from social interactions.

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

Multi-Server Authenticated Key Exchange Protocol (다중서버를 이용한 인증된 키교환 프로토콜)

  • 이정현;김현정;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.87-97
    • /
    • 2003
  • In this paper, we define two security concepts, “non-computable security” and “distribution security”, about authentication information committed to a authentication server without any trustee, and propose an authenticatied key exchange protocol based on password, satisfying “distribution security”. We call it MAP(Muti-Server Authentication Protocol based on Password) and show that SSSO(Secure Single Sign On) using MAP solves a problem of SSO(Single Sign On) using authentication protocol based on password with a trustee.

Antecedents of Interpersonal Trust in SNS : In Case of Twitter Users (SNS에서 대인신뢰의 영향요인 : 트위터 사용자 경우)

  • Wu, Gwan Ran;Song, Hee-Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.2
    • /
    • pp.197-215
    • /
    • 2012
  • SNS has been recognized as a means of expanding social capital by promoting interaction and efficient communication among users. On the other hand, there are serious concerns on negative side of social network which is often called epidemics. Trust plays a critical role in controlling the spread of distorted information and vicious rumor as well as reducing uncertainties and risk from unreliable users in social network. This study focuses on what the antecedents of interpersonal trust are in social network. We performed online survey from 252 Twitter users and tested candidate antecedents which are chosen from previous literature. As a result, propensity to trust of trustor, ability and sincerity of trustee, intimacy between trustor and trustee significantly affected to the interpersonal trust in Twitter.

Understanding the Role of Trustees in the Adoption of IT Services

  • Kim, Gi-Mun;Shin, Bong-Sik;Lee, Ho-Geun
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.469-472
    • /
    • 2007
  • This study deals with an important but ignored topic in IS research, the trustee issue. The purpose of this study, performed in the context of mobile banking, is: (1) to broaden the types of trustees (vendors, mobile channel, customers themselves) that customers consider in the adoption of emerging IT services and (2) to investigate the relationships between customer intention to adopt new IT services and trust in three different trustee types. The analysis showed that customers' self-trust is the most important in shaping their intention to adopt mobile banking. Consumer trust in the mobile channel came in second. Unlike the results of previous research, the effect of customers' trust in vendors was insignificant in mobile banking.

  • PDF

Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation

  • Liu, Haifeng;Yang, Zhuo;Zhang, Jun;Bai, Xiaomei;Wang, Wei;Xia, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4892-4911
    • /
    • 2015
  • Trust as one of important social relations has attracted much attention from researchers in the field of social network-based recommender systems. In trust network-based recommender systems, there exist normally two roles for users, truster and trustee. Most of trust-based methods generally utilize explicit links between truster and trustee to find similar neighbors for recommendation. However, there possibly exist implicit correlations between users, especially for users with the same role (truster or trustee). In this paper, we propose a novel Collaborative Filtering method called CF-TC, which exploits Trust Context to discover implicit correlation between users with the same role for recommendation. In this method, each user is first represented by the same-role users who are co-occurring with the user. Then, similarities between users with the same role are measured based on obtained user representation. Finally, two variants of our method are proposed to fuse these computed similarities into traditional collaborative filtering for rating prediction. Using two publicly available real-world Epinions and Ciao datasets, we conduct comprehensive experiments to compare the performance of our proposed method with some existing benchmark methods. The results show that CF-TC outperforms other baseline methods in terms of RMSE, MAE, and recall.

Customer Adoption of Emerging IT Services and Trustee Types (모바일뱅킹 환경에서 서비스 채택의도와 피신뢰자 유형)

  • Kim, Gi-Mun;Nam, Sang-Min;Lee, Ho-Geun
    • Information Systems Review
    • /
    • v.9 no.2
    • /
    • pp.67-83
    • /
    • 2007
  • This study deals with an important but ignored topic in previous IS research, so called trustee issue. The purpose of this study is to compare the influencing strengths of trust types on the customers' intention to adopt IT services. The research results showed that the influences of the customers' self-trust and the trust in mobile channel on the customers' intention to adopt mobile banking are statistically significant. However, unlike the results of previous research, it was revealed that the customers' trust in vendors is statistically insignificant in mobile banking services.

Building Customer Loyalty with Trust and Familarity in the Internet-based Shopping-mall (인터넷쇼핑몰에서 신뢰와 친밀감이 고객충성도에 미치는 영향에 관한 연구)

  • Ko, Il-Sang;Choi, Su-Jeong
    • Asia pacific journal of information systems
    • /
    • v.15 no.3
    • /
    • pp.187-207
    • /
    • 2005
  • In the Internet-based B2C e-commerce, trust has been recognized as a critical factor to reduce uncertainties, through interacting with a well-known specific shopping mall. In this study, we view customer trust as not a unitary concept but multidimensional one consisted of the trustworthiness of trustee, familiarity with the specific shopping-mall, disposition to trust, and institution-based trust. In this study, first, we considered the trustworthiness of trustee consisted of capability, benevolence, and integrity as one of the major factors to build customer trust on the specific Internet shopping-mall. In the context of the Internet e-commerce, the role of institutional structures is very important to assure the customer trust from the various opportunistic behaviors because of the characteristics of internet-based commerce such as impersonality, the lack of information on the other party, and the transactions with a number of anonymous people. Second, we examined the effect of the institution-based trust built by institutional structures on customer trust. Third, we examined the effect of customer trust and familiarity on retaining customer loyalty. Our findings showed that customer trust and familiarity played a major role in retaining customer loyalty with the specific shopping-mall. In conclusions, we discussed the strategies to build the customer loyalty for maintaining the customer. We suggest customer trust and familiarity for the factors to bind the customer with the specific shopping-mall based on these results.

A Study on the Secure Key Escrow System (안전한 키 위탁 시스템에 관한 연구)

  • 채승철
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.2
    • /
    • pp.83-92
    • /
    • 1999
  • Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.

A Research on the Development of Management Process System of Public Ordering Service Results and Estimation (건설기술용역 실적 관리 프로세스 시스템 개발에 대한 연구)

  • Lee, Kyu-Sung;Lee, Han-kyu;Kim, Nam-Gon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2014.05a
    • /
    • pp.168-169
    • /
    • 2014
  • Construction Technology Service is currently hardly managed due to failure to offer standard management system of service performance, company performance, and business evaluation in every Ordering Agencies. After Construction Technology Promotion Act is enforced in May 2014, Ordering Agency obligates them to report to Minister of Land and Transportation within 10 days upon contract/ amendment/ completion. In 2013, in advance to enforcement of this law, performance management system for construction technology service was developed for a test run. However this system only applies to main contractors while management and operation of subcontractors are unavailable that causes problems on connection and integration with Experience Management Trustee. Therefore, this research will establish systematic foundation that enables real-time information of service performance and evaluation of subcontractors to result standardization of performance and evaluation for public ordered services.

  • PDF