共查询到20条相似文献,搜索用时 31 毫秒
1.
A number of studies have examined the relationship between privacy concerns, perceived control over information, trust and online self-disclosure, highlighting different points of view to understand this connection. This paper intends to compare these different models of explanation for self-disclosure behaviors in online social networks. Three different hypotheses are verified, using mediation and moderation analyses. The results allow underling the effect of the interaction between privacy concerns and trust on online self-disclosure, along with the absence of a direct influence of privacy concerns on disclosure itself. The results suggest practical implications for online social network providers, most of all with regard to privacy policies in online environments. 相似文献
2.
Online peer-to-peer (P2P) lending is a new but essential financing method for small and micro enterprises that is conducted on the Internet and excludes the involvement of collateral and financial institutions. To tackle the inherent risk of this new financing method, trust must be cultivated. Based on trust theories, the present study develops an integrated trust model specifically for the online P2P lending context, to better understand the critical factors that drive lenders’ trust. The model is empirically tested using surveyed data from 785 online lenders of PPDai, the first and largest online P2P platform in China. The results show that both trust in borrowers and trust in intermediaries are significant factors influencing lenders’ lending intention. However, trust in borrowers is more critical, and not only directly nurtures lenders’ lending intention more efficiently than trust in intermediaries, but also carries the impact of trust in intermediaries on lenders’ lending intention. To develop lenders’ trust, borrowers should provide high-quality information for their loan requests and intermediaries should provide high-quality services and sufficient security protection. The findings provide valuable insights for both borrowers and intermediaries. 相似文献
3.
This article analyzes the relationships among online trust and two of its most important antecedents, namely privacy and security, and explains how consumers’ characteristics (gender, age, education and extraversion), moderate the influence of both privacy and security in online trust. This study expands previous literature by identifying the conditions under which perceived privacy and security are likely to have the greatest positive effects on consumer trust in the online retailer. Based on data from 398 online consumers, the results revealed that the influence of both privacy and security on online trust was stronger for male, younger, more educated, and less extraverted consumers. Implications for theory and management are discussed. 相似文献
4.
The advent of social networks opened a myriad opportunities for merging the social character of trust with the technical possibilities offered by the Internet and its availability as a mobile service. While most of the computational trust models aim to detect trustworthy entities, much less attention is paid to how these models are perceived by the users who are the core of the system. This paper delves into the workings of online trust systems under user bias and analyses the user behaviour through biases defined by Prospect theory. By performing empirical study on an existing system, we are able to demonstrate that there is a huge discrepancy between the aim of implementation of the online trust models and the users’ perception of those models. Understanding of this relation by the system designers can reduce complexity and improve the user experience and the system performance. The results imply that the tendency of the users to exhibit cognitive biases is not only the cause, but also the effect from the trust system design. These results and the analysis are then used to propose to the system designers a methodology for user bias identification and mitigation in the form of a Choice architecture for trust systems. 相似文献
5.
6.
7.
Israr Qureshi Yulin Fang Elaine Ramsey Patrick McCole Patrick Ibbotson Deborah Compeau 《欧洲信息系统杂志》2009,18(3):205-222
Although e-commerce adoption and customers’ initial purchasing behavior have been well studied in the literature, repeat purchase intention and its antecedents remain understudied. This study proposes a model to understand the extent to which trust mediates the effects of vendor-specific factors on customers’ intention to repurchase from an online vendor. The model was tested and validated in two different country settings. We found that trust fully mediates the relationships between perceived reputation, perceived capability of order fulfillment, and repurchasing intention, and partially mediates the relationship between perceived website quality and repurchasing intention in both countries. Moreover, multi-group analysis reveals no significant between-country differences of the model with regards to the antecedents and outcomes of trust, except the effect of reputation on trust. Academic and practical implications and future research are discussed. 相似文献
8.
9.
Fostering customer loyalty is a key objective for online businesses. Initial transactions with new customers are less profitable than transactions with existing customers, making loyalty an important strategy. Drawing on research examining online customer loyalty (termed e-loyalty), switching costs, and trust, this study provides an empirical test of the relative influence of trust vs switching costs on e-loyalty for e-service providers. We further examine whether trust moderates the relationship between switching costs and e-loyalty. We propose that in the presence of high customer trust, e-service providers should have less need to rely on switching costs as a driver of e-loyalty. We test the hypothesized relationships using data collected from 299 repeat users of online travel services. Our results confirm that trust is a more important predictor of e-loyalty than switching costs. In addition, we find that the impact of switching costs on e-loyalty depends on the level of trust felt by customers. This study extends our understanding of customer loyalty, switching costs, and trust in e-commerce environments and provides practical, theory-driven guidelines to e-businesses seeking to develop customer loyalty programmes. 相似文献
10.
11.
18年前,倾盆坠落的流星雨席卷了亚洲地区,整片大陆进入了非常戒备状态。16年后,具有国家性规模和影响力的Saint财团建立了四个特殊教育机关,分别是:“圣文学院”、“玄岩学院”、“凤凰学院”、“号令学院”。四个学院从各个地区、各个学校选拔出运动特技天才, 相似文献
12.
13.
As our society becomes more technologically complex, computer systems are finding an alarming number of uses in safety-critical applications. In many such systems, the software component's reliability is essential to the system's safe operation, so it becomes natural to ask, “How can software be made to behave correctly when executed?” Using program transformations to produce trusted software simplifies verification. Program transformations use proven laws to manipulate programs in a manner analogous to algebraic transformations. The authors sketch how a formal method based on program transformations can be used to construct a verified compiler. Such a compiler has been proved to correctly compile any correct program into assembly language. While the compiler itself may not execute efficiently-after all, you need only use the verified compiler the last time you compile a program-the transformational approach should enable the verified compiler to produce efficient assembly code 相似文献
14.
15.
大势所趋,明年的主流网游产品将是画面表现和代入感觉更加逼真的全3D游戏!《天堂Ⅱ》、《WOW》等一批高水平3D游戏即将登陆中国大陆这块网游热土。国产游戏在积攒、追赶了几个年头之后,终于拿出了一款同等重量级的作品,那就是目标软件的《傲世online》。仅仅是放出了几张场景截图,其完美的画面质量便引起了玩家的高度关注和热情 相似文献
16.
说起热门电视剧改编网络游戏,相信许多朋友都不会感到陌生,不过若是说起将《还珠格格》改编成一款MMORPG游戏,那么足够震惊许多人了。作为一部言情作品,无论是剧情还是人物设定,《还珠格格》的内容都实在不足以撑起一款网络游戏。但是,作为一部红遍大江南北十几年的剧集,游戏制作者还是可以通过剑走偏锋的方式,获得其他游戏无法企及的成功。 相似文献
17.
Why do we trust new technology? A study of initial trust formation with organizational information systems 总被引:1,自引:0,他引:1
Xin Li Traci J. Hess Joseph S. Valacich 《The Journal of Strategic Information Systems》2008,17(1):39-71
Recent trust research in the information systems (IS) field has described trust as a primary predictor of technology usage and a fundamental construct for understanding user perceptions of technology. Initial trust formation is particularly relevant in an IS context, as users must overcome perceptions of risk and uncertainty before using a novel technology. With initial trust in a more complex, organizational information system, there are a number of external determinants, trusting bases, that may explain trust formation and provide organizations with the needed levers to form or change individuals’ initial trust in technology. In this study, a research model of initial trust formation is developed and includes trusting bases, trusting beliefs, trusting attitude and subjective norm, and trusting intentions. Eight trusting base factors are assessed including personality, cognitive, calculative, and both technology and organizational factors of the institutional base. The model is empirically tested with 443 subjects in the context of initial trust in a national identity system (NID). The proposed model was supported and the results indicate that subjective norm and the cognitive–reputation, calculative, and organizational situational normality base factors significantly influence initial trusting beliefs and other downstream trust constructs. Factors from some of the more commonly investigated bases, personality and technology institutional, did not significantly affect trusting beliefs. The findings have strategic implications for agencies implementing e-government systems and organizational information systems in general. 相似文献
18.
Xiuxian Li 《控制理论与应用》2021,38(1):153-156
Online optimization has received numerous attention in recent two decades, mostly inspired by its potential applications to auctions, smart grids, portfolio management, dictionary learning, neural networks, and so on. Generally, online optimization is a sequence of decision making processes, where a sequence of time-varying loss functions are gradually revealed in a dynamic environment which may be adversarial. At each time instant, the loss function information at current time is revealed to the decision maker only after her/his decision is made. The objective of online optimization is to choose the best decision at each time step as far as possible, but unfortunately, this goal is generally diffcult or impossible to achieve. As such, to measure the performance for an algorithm, two metrics are usually exploited, i.e., regret and competitive ratio, for which the former one is leveraged more frequently in the literature. Moreover, two kinds of regrets, i.e., static and dynamic regrets, are usually considered by researchers, where the static regret is to compare the performance with a cumulative loss with respect to the same best decision through all the time horizons, while the dynamic regret is with respect to the best decision at each time instant. More recently, another regret, called adaptive regret , has been proposed and investigated as a suitable metric for changing environments, as dynamic regret does.
Historically, centralized online optimization is first addressed, that is, there is a centralized decision maker who can access all the information on the revealed loss function at each time. Along this line, a wide range of results have thus far been reported in the literature. For example, online optimization was studied subject to feasible set constraints, where it has been shown that the optimal bound is O( √ T) for static regret.... 相似文献
19.
20.
The supremacy of online white supremacists – an analysis of online discussions by white supremacists
A content analysis was conducted on five different white supremacist online forums to observe the discourse and types of activities occurring within. In addition, web link analysis was conducted on the forums to identify the presence of external links being posted and discussed by members. We found that members used the forums primarily for information provision, recruitment and networking. Based on these results, we discuss the implications that online hate speech have within offline settings, and the affects these activities have on Canadian citizens in light of the recent repeal of section 13 of the Canadian Human Rights Act (1985), the primary tool in Canada with which to deal with hate speech and other activities observed. The insights extracted from this research have provided novel insight into the sentiments and activities of the white supremacist movement online, a relatively unexplored venue of hate speech and propaganda online. 相似文献