• 제목/요약/키워드: Trustee

검색결과 26건 처리시간 0.022초

The Relationship between the Social Interactions on the Social Network and the Purchase Intention

  • Jung, Seung-Min
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권5호
    • /
    • pp.149-160
    • /
    • 2016
  • The purpose of this paper is to examine the relationship between the social interactions on the social network and the purchase intention. And the trust propensity of a trustor, the ability of a trustee, and the sincerity of a trustee are selected as the antecedents of social interactions. This paper also examines the effect of type of product as a moderating variable. The result of this paper reveals that social interactions(in terms of closeness, familiarity, and interpersonal trust) have a positive(+) effect on the purchase intention. The more social interactions, the more trustors have intentions to purchase the recommended products by trustees. In addition, the study reveals that the trust propensity of a trustor and the ability of a trustee directly and indirectly influenced on the intention to purchase the recommended product. The findings also suggest that the trust propensity of a trustor and the ability of a trustee have an effect on the closeness, familiarity, and interpersonal trust resulting from social interactions.

클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안 (Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing)

  • 김시인;김인석
    • 정보보호학회논문지
    • /
    • 제29권4호
    • /
    • pp.885-895
    • /
    • 2019
  • 최근 금융권 해킹사례를 통해서 알 수 있듯이 공격자는 금융회사를 직접 해킹하기 보다는 보안관리가 허술한 수탁자를 대상으로 해킹공격을 시도하고 있다. 이로 인해 위탁자는 수탁자에 대한 보안점검 및 통제를 강화하고 있으나 영세 수탁자의 경우 전산설비 부족 및 보안장비 도입 시 과도한 비용 발생으로 인해 정보보호 투자에 미흡하다. 본 논문에서는 신용카드사들로부터 개인정보를 제공 받은 영세수탁업체의 보안강화를 위해 개인정보 라이프 사이클 기준으로 취약점에 대해 알아 보고자한다. 취약점 해결방안으로 클라우드 컴퓨팅 서비스에 소송관리시스템을 구축하여 사용하고 데이터 전송구간은 가상사설망을 설치하여 기밀성 및 무결성을 확보한다. 또한 사용자 보안강화를 위해 사용자PC에 PC방화벽, 출력물 보안등의 설치를 통한 개인신용정보 처리 보호방안을 제시하고자 한다.

다중서버를 이용한 인증된 키교환 프로토콜 (Multi-Server Authenticated Key Exchange Protocol)

  • 이정현;김현정;이동훈
    • 정보보호학회논문지
    • /
    • 제13권1호
    • /
    • pp.87-97
    • /
    • 2003
  • 본 논문에서는 사용자가 서버를 신뢰하지 않아도 되는 인증프로토콜을 설계하기 위하여 인증서버에 위탁되는 인증정보에 대한 두 가지 안전성인 “계산 불가능 안전성”과 “분산 안전성”을 정의한다 또한 분산 안전성에 기반 하여 서버를 신뢰하지 않아도 되는 패스워드 기반 인증프로토콜인 MAP(Multiplex Server Authentication Protocol)을 제시하고, 이러한 MAP을 이용한 SSSO(Secure Single Sign On)가 서버를 신뢰하여야 하는 인증프로토콜을 이용한 SSO(Single Sign On)의 문제점을 해결함을 보인다.

SNS에서 대인신뢰의 영향요인 : 트위터 사용자 경우 (Antecedents of Interpersonal Trust in SNS : In Case of Twitter Users)

  • 우관란;송희석
    • Journal of Information Technology Applications and Management
    • /
    • 제19권2호
    • /
    • pp.197-215
    • /
    • 2012
  • SNS has been recognized as a means of expanding social capital by promoting interaction and efficient communication among users. On the other hand, there are serious concerns on negative side of social network which is often called epidemics. Trust plays a critical role in controlling the spread of distorted information and vicious rumor as well as reducing uncertainties and risk from unreliable users in social network. This study focuses on what the antecedents of interpersonal trust are in social network. We performed online survey from 252 Twitter users and tested candidate antecedents which are chosen from previous literature. As a result, propensity to trust of trustor, ability and sincerity of trustee, intimacy between trustor and trustee significantly affected to the interpersonal trust in Twitter.

Understanding the Role of Trustees in the Adoption of IT Services

  • Kim, Gi-Mun;Shin, Bong-Sik;Lee, Ho-Geun
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.469-472
    • /
    • 2007
  • This study deals with an important but ignored topic in IS research, the trustee issue. The purpose of this study, performed in the context of mobile banking, is: (1) to broaden the types of trustees (vendors, mobile channel, customers themselves) that customers consider in the adoption of emerging IT services and (2) to investigate the relationships between customer intention to adopt new IT services and trust in three different trustee types. The analysis showed that customers' self-trust is the most important in shaping their intention to adopt mobile banking. Consumer trust in the mobile channel came in second. Unlike the results of previous research, the effect of customers' trust in vendors was insignificant in mobile banking.

  • PDF

Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation

  • Liu, Haifeng;Yang, Zhuo;Zhang, Jun;Bai, Xiaomei;Wang, Wei;Xia, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.4892-4911
    • /
    • 2015
  • Trust as one of important social relations has attracted much attention from researchers in the field of social network-based recommender systems. In trust network-based recommender systems, there exist normally two roles for users, truster and trustee. Most of trust-based methods generally utilize explicit links between truster and trustee to find similar neighbors for recommendation. However, there possibly exist implicit correlations between users, especially for users with the same role (truster or trustee). In this paper, we propose a novel Collaborative Filtering method called CF-TC, which exploits Trust Context to discover implicit correlation between users with the same role for recommendation. In this method, each user is first represented by the same-role users who are co-occurring with the user. Then, similarities between users with the same role are measured based on obtained user representation. Finally, two variants of our method are proposed to fuse these computed similarities into traditional collaborative filtering for rating prediction. Using two publicly available real-world Epinions and Ciao datasets, we conduct comprehensive experiments to compare the performance of our proposed method with some existing benchmark methods. The results show that CF-TC outperforms other baseline methods in terms of RMSE, MAE, and recall.

모바일뱅킹 환경에서 서비스 채택의도와 피신뢰자 유형 (Customer Adoption of Emerging IT Services and Trustee Types)

  • 김기문;남상민;이호근
    • 경영정보학연구
    • /
    • 제9권2호
    • /
    • pp.67-83
    • /
    • 2007
  • 본 연구는 기존의 정보시스템 연구에서 중요하지만 간과된 주제인 피신뢰자 이슈를 다룬다. 본 연구의 목적은 모바일뱅킹 서비스 환경에서 피신뢰자 유형에 따른 신뢰 유형들과 고객의 정보기술 서비스 채택의도 사이의 관계를 비교 검토하는 것이다. 분석 결과, 고객 자신에 대한 신뢰가 모바일뱅킹 서비스의 고객 채택의도에 있어서 가장 중요한 영향을 미치는 요인으로 나타났으며, 모바일 채널에 대한 신뢰가 그 다음으로 중요한 요인으로 나타났다. 그러나 예상과는 달리 모바일뱅킹 서비스 제공업체에 대한 신뢰는 통계적으로 유의하지 않게 나타났다. 본 연구는 이러한 결과를 토대로 본 연구가 갖는 학문적, 실무적 의의를 논의한다.

인터넷쇼핑몰에서 신뢰와 친밀감이 고객충성도에 미치는 영향에 관한 연구 (Building Customer Loyalty with Trust and Familarity in the Internet-based Shopping-mall)

  • 고일상;최수정
    • Asia pacific journal of information systems
    • /
    • 제15권3호
    • /
    • pp.187-207
    • /
    • 2005
  • In the Internet-based B2C e-commerce, trust has been recognized as a critical factor to reduce uncertainties, through interacting with a well-known specific shopping mall. In this study, we view customer trust as not a unitary concept but multidimensional one consisted of the trustworthiness of trustee, familiarity with the specific shopping-mall, disposition to trust, and institution-based trust. In this study, first, we considered the trustworthiness of trustee consisted of capability, benevolence, and integrity as one of the major factors to build customer trust on the specific Internet shopping-mall. In the context of the Internet e-commerce, the role of institutional structures is very important to assure the customer trust from the various opportunistic behaviors because of the characteristics of internet-based commerce such as impersonality, the lack of information on the other party, and the transactions with a number of anonymous people. Second, we examined the effect of the institution-based trust built by institutional structures on customer trust. Third, we examined the effect of customer trust and familiarity on retaining customer loyalty. Our findings showed that customer trust and familiarity played a major role in retaining customer loyalty with the specific shopping-mall. In conclusions, we discussed the strategies to build the customer loyalty for maintaining the customer. We suggest customer trust and familiarity for the factors to bind the customer with the specific shopping-mall based on these results.

안전한 키 위탁 시스템에 관한 연구 (A Study on the Secure Key Escrow System)

  • 채승철
    • 정보보호학회논문지
    • /
    • 제9권2호
    • /
    • pp.83-92
    • /
    • 1999
  • 암호를 사용함으로써 정보를 위.변조나 노출 위협으로부터 보호할 수 있지만, 암호의 잘못된 사용은 몇 가지 문제점을 발생시킬 수 있다. 만약 키가 손상되면 암호의 적법한 소유자조차도 암호문을 해독할 수 없으며, 범죄 등의 목적에 암호가 사용되었을 경우, 수사 기관이 수사에 어려움을 겪을 수 있다. 이러한 문제점을 해결하기 위해 키 또는 메시지를 복구할 수 있도록 키를 신뢰기관에 위탁하는 키 위탁(key escrow) 방식이 제안되었다. 키 위탁은 유사시 키 복구를 보장하면서 동시에 사용자의 사생활을 침해해서는 안된다. 본 논문에서는 키 위탁 시스템이 가져야할 요구사항을 도출하고, EIGamal 암호 시스템에 기반한 새로운 키 위탁 방식을 제안한다. 제안 방식은 도청기한의 제한, 키의 복구에 관련된 부정 방지와 이에 대한 사용자의 shadow 공개키 생성 방지 등의 속성을 갖는 새로운 키위탁 방식이다. Cryptography techniques can prevent eavesdroppers from maliciously intercepting or modifying sensitive information. however misuses of encryption may cause other problems First if the encryption key is lost or damaged even an authorized access to the original data will be denied. Second criminals can prevent authorized law enforcement officers from examining the necessary information by using the strong encrypted data can provide solutions for the situations. In this paper we propose a new key escrow system based on the ElGamal cryptosystem. Our system provide time-bound eavesdropping under court authorized permission protect from trustee's cheating and prevent user's shadow public key generation.

건설기술용역 실적 관리 프로세스 시스템 개발에 대한 연구 (A Research on the Development of Management Process System of Public Ordering Service Results and Estimation)

  • 이규성;이한규;김남곤
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2014년도 춘계 학술논문 발표대회
    • /
    • pp.168-169
    • /
    • 2014
  • Construction Technology Service is currently hardly managed due to failure to offer standard management system of service performance, company performance, and business evaluation in every Ordering Agencies. After Construction Technology Promotion Act is enforced in May 2014, Ordering Agency obligates them to report to Minister of Land and Transportation within 10 days upon contract/ amendment/ completion. In 2013, in advance to enforcement of this law, performance management system for construction technology service was developed for a test run. However this system only applies to main contractors while management and operation of subcontractors are unavailable that causes problems on connection and integration with Experience Management Trustee. Therefore, this research will establish systematic foundation that enables real-time information of service performance and evaluation of subcontractors to result standardization of performance and evaluation for public ordered services.

  • PDF