首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Online peer-to-peer (P2P) lending is a new but essential financing method for small and micro enterprises that is conducted on the Internet and excludes the involvement of collateral and financial institutions. To tackle the inherent risk of this new financing method, trust must be cultivated. Based on trust theories, the present study develops an integrated trust model specifically for the online P2P lending context, to better understand the critical factors that drive lenders’ trust. The model is empirically tested using surveyed data from 785 online lenders of PPDai, the first and largest online P2P platform in China. The results show that both trust in borrowers and trust in intermediaries are significant factors influencing lenders’ lending intention. However, trust in borrowers is more critical, and not only directly nurtures lenders’ lending intention more efficiently than trust in intermediaries, but also carries the impact of trust in intermediaries on lenders’ lending intention. To develop lenders’ trust, borrowers should provide high-quality information for their loan requests and intermediaries should provide high-quality services and sufficient security protection. The findings provide valuable insights for both borrowers and intermediaries.  相似文献   

2.
Let (n) be the minimum number of arithmetic operations required to build the integer from the constants 1 and 2. A sequence xn is said to be easy to compute if there exists a polynomial p such that for all It is natural to conjecture that sequences such as or n! are not easy to compute. In this paper we show that a proof of this conjecture for the first sequence would imply a superpolynomial lower bound for the arithmetic circuit size of the permanent polynomial. For the second sequence, a proof would imply a superpolynomial lower bound for the permanent or P PSPACE.  相似文献   

3.
The present research adopts a benefit–cost perspective to study consumer adoption of the mobile banking services. It is suggested that because of the specific product context of the mobile banking service, such as the difficulty to assess some experiential qualities like the ease of use due to a low trial rate of mobile banking and the inherent risk factor involved in a new financial service technology, models complementary to the technology adoption model may be needed to accommodate these product contexts. In the present research, the benefit–cost framework was employed as an example of the complementary framework to study consumers' adoption of the mobile banking system. The key benefit of mobile banking is convenience, while the key cost is security. A set of ability and risk factors were modelled via structural equation model (SEM) as the antecedents of the benefit and cost of adopting the mobile banking system. The results showed that the empirical data supported most hypothesised relationships among the factors. It is concluded that consumers' new technology adoption behaviour is a complicated phenomenon which may require different models in different product contexts. It is suggested that future research should address the issue of the preconditions and product contexts under which a certain class of models may be most suitable to explain the adoption behaviour.  相似文献   

4.
Organizations are increasingly crowdsourcing their tasks to unknown individual workers, i.e., solvers. Solvers' participation is critical to the success of crowdsourcing activities. However, challenges exist in attracting solvers to participate in crowdsourcing. In this regard, prior research has mainly investigated the influences of benefit factors on solvers’ intention to participate in crowdsourcing. Thus, there is a lack of understanding of the cost factors that influence actual participation behavior, in conjunction with the benefits. Additionally, the role of trust in the cost-benefit analysis remains to be explored. Motivated thus, based on social exchange theory and context-related literature, we develop a model to explain the impacts of benefit and cost factors as well as trust on solver participation behavior in crowdsourcing. The model was tested using survey and archival data from 156 solvers on a large crowdsourcing platform. As hypothesized, monetary reward, skill enhancement, work autonomy, enjoyment, and trust were found to positively affect solvers’ participation in crowdsourcing, while cognitive effort negatively affects their participation. In addition, it was found that monetary reward positively affects trust (trust partially mediates its effect on participation behavior), while loss of knowledge power negatively affects trust. The theoretical contributions and practical implications of the study are discussed.  相似文献   

5.
Online technologies have made it possible for practitioners and the public to reach academics directly and seek information and knowledge in areas of professional or personal interest. This paper uses the extended version of the Unified Theory of Acceptance and Use of Technology (UTAUT2) to examine the factors that affect the adoption of online technologies by practitioners and other members of the public in order to engage with the academic community. Understanding the driving factors of such online engagement is very important as it can inform academic practice and how institutional support is provided. The results of our online survey (N?=?241), derived by using Structural Equation Modelling, show that behavioural intention is mainly affected by the user's habit, performance expectancy and facilitating conditions. Also, educational level has a moderating effect in the cases of habit and social influence and gender in the cases of habit and hedonic motivation.  相似文献   

6.
The increasing integration of computers and networks into society has profoundly affected our lives in recent years. In Taiwan, use of SNSs – especially Facebook – has become the main action for the Internet users; accordingly, a number of scholars have explored people's intention to use, or actual use of, SNSs. However, few studies have investigated how and why users stop using one SNS and begin using another from the linear perspective. The findings are incomplete for the human behaviors which are complex and nonlinear systems. The purpose of this study is therefore to explore the relationship between SNS users’ switching intention and switching behavior based on structural equation modeling (SEM) and cusp catastrophe model (CCM). The key factors for the switching intentions and behaviors of SNS users were examined through empirical research, and a structural model was established. The model, which involved habits as a mediating factor, was used to conduct a qualitative and quantitative analysis on the switching behaviors of SNS users from a nonlinear perspective. This model will provide a new method for future researchers to analyze nonlinear behaviors as well as a dynamic decision support model for service providers to improve their business operation.  相似文献   

7.
The well-known \(O(n^2)\) minmax cost algorithm of Lawler (MANAGE SCI 19(5):544–546, 1973) was developed to minimize the maximum cost of jobs processed by a single machine under precedence constraints. We propose two results related to Lawler’s algorithm. Lawler’s algorithm delivers one specific optimal schedule while there can exist other optimal schedules. We present necessary and sufficient conditions for the optimality of a schedule for the problem with strictly increasing cost functions. The second result concerns the same scheduling problem under uncertainty. The cost function for each job is of a special decomposable form and depends on the job completion time and on an additional numerical parameter, for which only an interval of possible values is known. For this problem we derive an \(O(n^2)\) algorithm for constructing a schedule that minimizes the maximum regret criterion . To obtain this schedule, we use Lawler’s algorithm as a part of our technique.  相似文献   

8.
This article attempts to explain the absence of a new rhetoric, as repurposed for electronic media. Such a rhetoric would provide, among other things, a blueprint for electronic arguments conducted in hypermedia form. Without an electronic rhetoric, the artifacts generated in new media inevitably fall into a narrow range: e-commerce and edutainment. One role of the humanist in this technological age, whose mother tongue is the conceptual language of the technologist, is to speak in an alternative language out of which an electronic rhetoric could emerge. The hallmark of the humanist’s alternative language or vocabulary is that it does not find technological innovation synonymous with rhetorical invention.  相似文献   

9.
Government legislation and calls for greater levels of oversight and transparency are leading public bodies to publish their raw datasets online. Policy makers and elected officials anticipate that the accessibility of open data through online Government portals for citizens will enable public engagement in policy making through increased levels of fact based content elicited from open data. The usability and benefits of such open data are being argued as contributing positively towards public sector reforms, which are under extreme pressures driven by extended periods of austerity. However, there is very limited scholarly studies that have attempted to empirically evaluate the performance of government open data websites and the acceptance and use of these data from a citizen perspective. Given this research void, an adjusted diffusion of innovation model based on Rogers’ diffusion of innovations theory (DOI) is proposed and used in this paper to empirically determine the predictors influencing the use of public sector open data. A good understanding of these predictors affecting the acceptance and use of open data will likely assist policy makers and public administrations in determining the policy instruments that can increase the acceptance and use of open data through an active promotion campaign to engage-contribute-use.  相似文献   

10.
Live-streaming shopping becomes increasingly popular recently. However, little research explored why live-streaming shopping is so successful in continuously promoting sales and engaging consumers. Based on the Stimulus-Organism-Response framework, we explore the effects of five distinct characteristics (information richness, interactivity, vividness, social presence, and newness) of live-streaming shopping on consumers’ continuous participation intentions, and investigate the underlying organism from both the momentary states (i.e., perceived diagnosticity, perceived enjoyment, and perceived social support) and the reflective state (i.e., memorable experience). The results of a multi-method empirical study indicate that the memorable experience is a strong indicator of continued shopping behaviors.  相似文献   

11.
This study applies social capital theory to investigate how a player’s network centrality in an online gaming community (i.e., a guild) affects his/her attitude and continuance intention toward a Massive Multiplayer Online Game (MMOG). Analysis of 347 usable responses shows that players’ network centrality has a negative impact on their ties to players who belong to other guilds (i.e., non-guild interaction), but a positive effect on players’ access to resources. However, players’ network centrality fails to increase their perceived game enjoyment directly. Players’ resource accessibility and perceived game enjoyment play mediating roles in the relationship between network centrality and attitude toward playing an MMOG, which in turn influences game continuance intention. The results also show that although players’ non-guild interaction is negatively related to their resource accessibility from the networks, it is positively associated with perceived game enjoyment. The article concludes with implications and limitations of the study.  相似文献   

12.
One of the more unusual revelations of the Snowden leaks was the discovery that UK and US security services had also targeted popular online gaming platforms for surveillance activity. While the British press had a field day coming up with creative headlines about “undercover Orcs”, public reaction was muted. Anger about “wasting taxpayer’s money” more than privacy concerns dominated the debate. But can we really dismiss surveillance of gaming as “not quite serious”? Using insights from psychology, anthropology and cultural studies, we argue that on the contrary, surveillance of people at play can be seen as a paradigmatic illustration of the dangers of the surveillance society, and give us insights in the values privacy law ought to protect.  相似文献   

13.
During the last decade, Peer-to-Peer (P2P) applications have been one of the dominant components of Internet traffic. Understanding BitTorrent, by far the most popular P2P protocol for data distribution, is extremely valuable to shed some light on the nature of distributed systems. This paper surveys the existing measurement studies and sets out to verify the acquired corpus of knowledge about BitTorrent by analyzing the largest and most comprehensive data-set so far. We collected BitTorrent traffic at four major European ISPs during 2009 and 2010, a vantage point not yet exploited by previous measurement studies. Our analysis puts into perspective and corroborates several well-known findings, such as that: (1) 20% of the most popular torrents represent more than 95% of the BitTorrent activity, (2) only 1–3% of the BitTorrent traffic stays local, i.e., within an ISP, (3) 4–44% of the BitTorrent traffic could be localized using appropriate locality-awareness techniques, and (4) about 20% of downloads get stalled due to scarcity of content pieces.  相似文献   

14.
ContextThe knowledge about particular characteristics of software that are indicators for defects is very valuable for testers because it helps them to focus the testing effort and to allocate their limited resources appropriately.ObjectiveIn this paper, we explore the relationship between several historical characteristics of files and their defect count.MethodFor this purpose, we propose an empirical approach that uses statistical procedures and visual representations of the data in order to determine indicators for a file’s defect count. We apply this approach to nine open source Java projects across different versions.ResultsOnly 4 of 9 programs show moderate correlations between a file’s defects in previous and in current releases in more than half of the analysed releases. In contrast to our expectations, the oldest files represent the most fault-prone files. Additionally, late changes correlate with a file’s defect count only partly. The number of changes, the number of distinct authors performing changes to a file as well as the file’s age are good indicators for a file’s defect count in all projects.ConclusionOur results show that a software’s history is a good indicator for ist quality. We did not find one indicator that persists across all projects in an equal manner. Nevertheless, there are several indicators that show significant strong correlations in nearly all projects: DA (number of distinct authors) and FC (frequency of change). In practice, for each software, statistical analyses have to be performed in order to evaluate the best indicator(s) for a file’s defect count.  相似文献   

15.
This study investigates the associations between enterprise social media (ESM) use, psychological conditions, and cyber-slacking in the workplace and examines the mediating role of psychological conditions between ESM use and cyber-slacking. The study utilizes Kahn’s framework to develop a research model and investigate various associations, and it employs a cross-sectional design, testing the developed research model with 277 ESM users from Chinese enterprises. The study results suggest that ESM use stimulates various psychological conditions that discourage cyber-slacking behaviors and significantly mediate the associations between ESM use and cyber-slacking.  相似文献   

16.
Universal Access in the Information Society - With the rapid increase of senior users in mobile social network sites (MSNS), how to attract and maintain seniors’ continuous usage is more and...  相似文献   

17.
Information Systems and e-Business Management - With the development of mobile communication technology and the wide application of intelligent devices, mobile payments with great commercial...  相似文献   

18.
A virtual human is an effective interface for interacting with users and plays an important role in carrying out certain tasks. As social networking sites are getting more and more popular, we propose a Facebook aware virtual human. The social networking sites are used to empower virtual humans for interpersonal conversational interaction in this paper. We combine Internet world, physical world and 3D virtual world together to create a new interface for users to interact with an autonomous virtual human which can behave like a real modern human. In order to take advantages of social networking sites, virtual human gathers information of a user from its profile, its likes, dislikes and gauge mood from most recent status update. In two user studies, we investigated whether and how this new interface can enhance human–virtual human interaction. Some positive results concluded from these studies will be guidelines on research and development of future virtual human interfaces.  相似文献   

19.
This study investigates knowledge contributors’ satisfaction with a distinct type of virtual communities (i.e., transactional virtual communities, TVCs), where knowledge sharing is guided mainly under the principle of economic exchange, and cost–benefit tradeoff is the primary motive for knowledge sharing. Drawing upon the goal attainment theory, we examine the effects of two types of benefits (i.e., extrinsic and intrinsic) and two types of costs (i.e., actual and opportunity) on knowledge contributors’ satisfaction, and highlight the mediating role of perceived net goal attainment. A field survey with 205 subjects in a TVC in China is conducted to test the research model.  相似文献   

20.
A recommender system is a Web technology that proactively suggests items of interest to users based on their objective behavior or explicitly stated preferences. Evaluations of recommender systems (RS) have traditionally focused on the performance of algorithms. However, many researchers have recently started investigating system effectiveness and evaluation criteria from users?? perspectives. In this paper, we survey the state of the art of user experience research in RS by examining how researchers have evaluated design methods that augment RS??s ability to help users find the information or product that they truly prefer, interact with ease with the system, and form trust with RS through system transparency, control and privacy preserving mechanisms finally, we examine how these system design features influence users?? adoption of the technology. We summarize existing work concerning three crucial interaction activities between the user and the system: the initial preference elicitation process, the preference refinement process, and the presentation of the system??s recommendation results. Additionally, we will also cover recent evaluation frameworks that measure a recommender system??s overall perceptive qualities and how these qualities influence users?? behavioral intentions. The key results are summarized in a set of design guidelines that can provide useful suggestions to scholars and practitioners concerning the design and development of effective recommender systems. The survey also lays groundwork for researchers to pursue future topics that have not been covered by existing methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号