10 research outputs found

    Selection of Trusted Organic Food Sellers on Instagram Using Fuzzy Analytic Hierarchy Process

    Get PDF
    The awareness ofa healthy lifestyle, particularly in food intake, has resulted in the visibility of organic food products. Most of the organic food products are local-based and home-grown. The popularity of Social Network Sites (SNSs) opens the opportunity for organic food sellers to educate, promote, and market their products to customers. However, the credibility of organic food sellers remains as barriers for customers to purchase from them. In this study, we investigatethe organic food sellers selection problem, and the Fuzzy Analytic Hierarchy process method is applied to determine the most trusted sellers. Organic food sellers with the highest priority weight will be select as trusted sellers. The results of the study expected to be used by organic food sellers to improve their business operations. At the same time, the results will serve as guidelines for customers to evaluate the trustworthiness of organic food sellers

    Fuzzy-Based Trust Model to Evaluate Customer Trust towards Online SNSs Sellers

    Get PDF
    The rapid growth of Social Networking Sites (SNSs) as business platforms for individual or small sellers recognised trust as the main important role in determining the successful execution of their business operation.Current trust modelfocused in business sellers by considering website as one of the trust factors.  However, these model are not applicable for SNSs environment. Based on the identified factors affecting trust in SNSs environment, this paper proposeda fuzzy-based trust model to evaluate customers‘ trust based on their perception and experiences.The evaluation model was then tested to validate its efficiency in evaluating trust level

    An Application of Ant Colony Optimization in Industrial Training Allocation

    Get PDF
    The process of assigning a visiting university’s supervisor to visit a group of industrial training practical students in the university is currently being done manually. In order to perform such task, two constraints need to be fulfilled at any time: (1) Practical student can only be supervised by university supervisor from the same department; (2) location of the places to be visited by the visiting university’s supervisor must be as near as possible in order to optimize the travelling cost, time and budget. Using manual approach, the process can be very tedious and time consuming especially when it involved large number of practical students and lecturers. Furthermore, the optimized result is seldom achievable as not all practical student-lecturer combinations are examined. By automating the process, the tedious and time consuming process can be avoided as well as establishing optimized combinations based on the given constraints. This paper discusses on how the assignment process is automated using Ant Colony Optimization (ACO). The results are then compared with Dijkstra’s Algorithm to evaluate the ability of ACO algorithms. The algorithm design, implementation, its future direction and improvements are discussed as well

    The trust effect towards online seller in social commerce

    Get PDF
    Social Commerce has gained its popularity among the Social Networks Sites (SNSs) user as online shopping medium.The popularity has engaged small online businesses to use the SNSs as their business platforms.However, trust remains as the main issues in Social Commerce due to its unique features.This study presents a conceptual model to evaluate the trustworthiness of online sellers which may influence customers’ purchase intention.A pilot questionnaire was designed and distributed as the instrument.Data was collected and analyzed using SPSS to test on the item’s reliability.The finding shows that the instrument can be empirically tested for further research

    Ascertaining Trust of Information Transmitted During a Disaster

    Get PDF
    During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. With the presence of ICT applications and smartphone devices, the communications can be carried out easily. However, these ease of communication created one critical issue that is the reliability of the transmitted information. One of the potential solutions is to use trust algorithm to identify the trusted information. The trust engine can help to filter and verify the reliability and validity of the transmitted information. With the ability to identify trusted information, the authority and rescuer would be able to channel and prioritize their rescue efforts to the more critical disaster areas. A prototype, running on Android platform and Web server, was developed to demonstrate the proposed solutio

    Cybersecurity risk assessment: modeling factors associated with higher education institutions

    Get PDF
    Most universities rely heavily on Information Technology (IT) to process their information and support their vision and mission. This rapid advancement in internet technology leads to increased cyberattacks in Higher Education Institutions (HEIs). To secure their infrastructure from cyberattacks, they must implement the best cybersecurity risk management approach, which involves technological and education-based solutions, to safeguard their environment. However, the main challenges in existing cybersecurity risk management approaches are limited knowledge of how organizations can determine or minimize the significance of risks. As a result, this research seeks to advance understanding to establish a risk assessment model for universities to measure and evaluate the risk in HEIs. The proposed model is based on theoretical aspects that we organized as follows: First, we review the existing cybersecurity frameworks to identify the suitability and limitation of each model. Next, we review current works on cybersecurity risk assessment in HEIs to evaluate the proposed risk assessment approaches, scope and steps. Based on the information gathered, we developed a risk assessment model. Finally, we conclude the study with directions for future research. The result presented from this study may give an insig1ht for HEIs staff to analyze what is to be assessed, how to measure the severity of the risk, and determine the level of risk acceptance, improving their decision-making on risk management

    What influences customer’s trust on online social network sites (SNSS) sellers?

    Full text link
    Customer trust has been recognized as an essential part of the rising trend of social commerce. Lack of trust facilitates the hesitation of customers to shop online or to avoid them completely. Therefore, it is essential to implement and analyze a way of buyer-seller relationship establishment that will improve customers' trust. This paper aims to develop a trust model of Social Network Sites (SNSs) sellers, and to assess the dimensions and criteria that affects customer's trust on Online Social Network Sites (SNSs) sellers by using Analytic Hierarchy Process (AHP) approach. The study was carried out among those who have transactions with Malaysian online SNSs sellers at least every three months. The findings have indicated the top three influencing criteria: recommendation, transaction safety, and rating. This study provides insight into the customers' thoughts about placing trust on online SNSs sellers for selling and purchasing activities

    A Systematic Review on the Energy Efficiency of Dynamic Clustering in a Heterogeneous Environment of Wireless Sensor Networks (WSNs)

    Full text link
    There are a variety of applications for wireless sensor networks (WSNs), such as military, health monitoring systems, natural disasters, smartphones, and other surveillance systems. While the primary purpose of sensor nodes is to collect unattended data in hostile environments, many are placed in large numbers and operate independently. Due to limited capabilities, power is often limited. Therefore, these nodes are grouped into clusters to increase communication efficiency. In WSNs, two different routing protocols are possible: apartment and hierarchical or clustering protocols. Due to their significant role in minimizing energy consumption, hierarchical methods have become very popular in clustering. In cluster-based methods, nodes are organized into clusters, and the sensor node with the most resources is appointed as the cluster head (CH). In this paper, we present a Systematic Literature Review (SLR) explaining the difficulties in developing cluster-based methods, critical factors for clustering, and hierarchical clustering protocols. The most important factor of a routing protocol for WSN is the energy consumption and lifetime of a network. Focusing on energy consumption, different cluster-based methods were analyzed to determine which technology should be deployed by analyzing specific criteria to support the selection process. Additionally, the pros and cons of different protocols are listed with their relevance in specific scenarios. To identify these protocols, a systematic literature review was conducted using research studies published from 2010 to 2021, with 30 papers analyzed in the final phase. Based on the results of this SLR, several issues need to be further investigated with respect to the interaction of the potential technology with the Internet of Things (IoT) and Vehicular Ad-Hoc Networks (VANETs)

    Review and Development of a Scalable Lightweight Blockchain Integrated Model (LightBlock) for IoT Applications

    Full text link
    The Internet of things (IoT) is on the rise, and it is increasingly becoming a ubiquitous computing service that requires large data storage and processing. Due to the limited capabilities of most IoT devices, they always rely on cloud services for storage and computing, posing security and privacy risks. Due to its significant aspects, such as data security and privacy, Blockchain (BC) has drawn significant interest in alleviating these concerns. Despite its potential benefits, Blockchain’s high complexity and limited scalability make it computationally expensive and incompatible with IoT devices requiring lightweight solutions. Although several models have been proposed for this purpose, the issue is still far from being resolved. These models have significant constraints, such as resource optimization during operation. By presenting a scalable lightweight Blockchain integrated model (LightBlock), the primary objective of this work is to enable the usage of BC in the IoT environment. LightBlock is implemented by optimizing the components of a lightweight, scalable Blockchain. Lastly, the study’s findings should provide IoT users with a high level of security and privacy by ensuring applicability and offering end-to-end security
    corecore