English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 18278/19583 (93%)
造訪人次 : 913862      線上人數 : 839
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: http://nhuir.nhu.edu.tw/handle/987654321/28486


    題名: A network behavior evaluation method for improving interactive security in virtual network worlds
    作者: 陳宗義;Chen, Tsung-Yi
    貢獻者: 資訊管理學系
    關鍵詞: Criminology;interaction security;network behavior;social computing;virtual network world
    日期: 2016-01
    上傳時間: 2022-07-18 11:42:03 (UTC+8)
    摘要: The Internet is increasingly being used for socializing. In virtual network worlds (VNWs), security and trust evaluation mechanisms are weak. This study used a network behavior evaluation method to appraise the online behavior qualities and personal attributes of Internet users based on social computing. This paper first proposes a security interaction theory and factor model based on criminological theories. To understand importance of the factors affecting interactive security, we first analyze the background differences of 758 Internet users. We also design three interaction-security scales, which we use to evaluate the security values of other users. A network behavior evaluation method comprising three submethods is then developed. Finally, we present a fuzzy multiobjective decision inference (FMODI) method to integrate the three submethods to identify the optimal Internet user. There are 56 Internet users to participate in the method experiment, which include 19 valid samples regarding online entertainment, 22 samples regarding online shopping, and 15 samples regarding online social. We used quartiles to analyze these data, which we divided into four safety levels. This study provides a novel contribution to Internet safety evaluations. The security scores of the three network behavior evaluation submethods are used to warn or caution users of threats or identify users of potential threats, thereby preventing immediate damage.
    關聯: Information Security Journal: A Global Perspective
    vol. 25, no. 1-3
    pp.1-17
    顯示於類別:[資訊管理學系] 期刊論文

    文件中的檔案:

    檔案 描述 大小格式瀏覽次數
    index.html0KbHTML158檢視/開啟


    在NHUIR中所有的資料項目都受到原著作權保護.

    TAIR相關文章

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋