首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 453 毫秒
1.
This study investigates how differences in the use of online health information and social media affect the use of online health services. We attempt to predict the extent to which the use of social media and online health information prompt individuals to use online health services. We draw upon a combination of sociology and communication studies and integrate relational maintenance assumptions regarding the quality of online social relationships to promote the importance of health empowerment factors–socio-demographic characteristics, internet attitudes and health status models to predict the likelihood of using online health services. The study’s sample consists of 1406 individuals using the Internet, including 633 individuals using the Internet and social media to look for health information. The study’s results provide evidence that (a) online health information empowers most of the examined individuals to use online health services; (b) among all social media only those that offer consulting have a significant effect on the likelihood of using online health services. The implications of these findings support that a conceptual integration of CMC and social media use theories along with health empowerment assumptions, is a promising theoretical framework to test the effectiveness of social media use in prompting use of online health services. The practical applications for health management are highlighted as well. Finding practical and affordable ways to support the use of social media and encourage access to online health information and use of online health services could improve health literacy and self-management of health at the individual level and increase the efficiency in the provision of health services at the institutional level.  相似文献   

2.
Given the proliferation of social networking sites (SNSs), it has become important to understand users’ continued attraction and usage of them. Previous works on information systems (IS) and marketing have paid little attention to the role of automatic mechanisms in frequently used IS such as mobile applications and SNSs. We develop an integrated framework to examine the effects of conscious and automatic mechanisms on SNS users’ postadoption behaviors. Considering the unique characteristics of SNSs, we posit user satisfaction, trust in an SNS provider, and prior SNS use as key drivers accelerating the development of SNS habitual use. Longitudinal data collected from 250 Facebook users were tested against the research model using partial least squares. The findings showed that SNS continuance usage is shaped by automatic factor as well as by reasoned conscious factor. In particular, SNS continuance usage is largely explained by SNS habit. User satisfaction, trust in an SNS provider, and prior SNS use were found to be the key enablers of developing SNS habit. Moreover, the analysis results clarify the exact role of relationship management, self-presentation, perceived enjoyment, and trust in an SNS provider in users’ decision-making processes. Implications for research and practice are described.  相似文献   

3.
The sentient Web     
In a startling revelation, a team of university scientists has reported that a network of computers has become conscious and sentient, and is beginning to assume control of online information system. In spite of the ominous tone typically chosen for dramatic effect, a sentient Web would be more helpful and much easier for people to use. An agent is an active, persistent software component that perceives, reasons, and acts, and whose actions include communication. Agents inherently take intentional actions based on sensory information and memories of past actions. All agents have necessary communication ability, but they do not necessarily possess introspective capabilities or awareness of place and time. Four things characterize being sentient Web conscious: 1) knowing 2) having intentions 3) introspecting and 4) experiencing phenomena. For the first two, it is easy to show that most Web entities possess and demonstrate the use of knowledge, and other entities, including Web services, exhibit intentions. The last two, introspection and phenomenal experience, are facets of awareness and are not as obvious in current Web systems, so we will consider them more thoroughly and conclude with future prospects.  相似文献   

4.
Privacy policy statements and privacy assurance cues are among the most important website features that online providers use to increase individuals’ trust and willingness to disclose private information online. The focus of this study is a comprehensive examination of the process by which privacy assurance mechanisms influence trust and the moderating role of privacy concern in this process. We use the lens of the Elaboration Likelihood Model to investigate the way different individuals perceive and process privacy assurance mechanisms. We argue that the trust-enhancing role of these mechanisms depends on the individual’s privacy concern. The results of this study articulate the process by which various privacy assurance mechanisms operate in enhancing an individual’s trust, and show that there are distinct behavioral differences between individuals with high- vs low-privacy concern when forming their trust to disclose private information. The paper sheds new light on the role of elaboration in the trust building process, and shows why privacy assurance mechanisms have different impacts depending on individuals’ privacy concerns.  相似文献   

5.
This study investigates how the e-business platform certification system affects online trust-building mechanisms for existing brands. Integrating theories of online trust and brand knowledge, we propose that brand awareness and brand image, two sub-dimensions of brand knowledge, contribute to building brand trust in online stores. The effectiveness of e-business platform services also contributes to consumers’ trust in the online channel. Instead of regarding the platform guarantees as the antecedents of online trust, we hypothesize that the e-business platform certification system positively moderates the effects of building online trust. We test the research hypotheses using questionnaire data collected through an online survey and use structural equation modeling to analyze the data. The findings support our proposed model. The theoretical and managerial implications are identified based on the results.  相似文献   

6.
Customer retention plays a key role in online shopping success. However, little attention has been paid to how online customers’ shopping habit moderates the relationship between their evaluation of online services and repurchase intention. To fill this gap, this study draws on both social exchange theory and IS use theory to propose a model. The social exchange theory is characterized as emotional evaluation (i.e., satisfaction with outcome quality, satisfaction with process quality) and rational evaluation (i.e., trust, learning). We view online repurchase as post-adoption phenomena of IS use that entail users’ beliefs, perception, and intention. The proposed model and hypotheses are supported by the empirical data from 469 online customers. Our findings show that shopping habit increases the influence of emotional evaluation on continuance, while habit weakens the impact of rational evaluation on continuance intention. The integration of social exchange theory and IS use (continuance) distinguishes our study from others who have primarily considered these theories disparately.  相似文献   

7.
E-services remain characterised by uncertainty despite their proliferation. Consumer trust beliefs are therefore considered an important determinant of e-service adoption. However, the research has not yet considered the potentially dynamic nature of these trust beliefs or how early-stage trust might influence later-stage adoption and use. To address this gap, this study draws on the theory of reasoned action and expectation–confirmation theory in a longitudinal study of trust in e-services. We examine how trust interacts with other consumer beliefs such as perceived usefulness (PU) and how these beliefs together influence consumer intentions and behaviours concerning e-services at both the initial and latter stages of use. The empirical context is online health information services. Data collection on a student population occurred during two time periods approximately five weeks apart. The results show that PU and trust are important at both the initial and latter stages in the consumer acceptance of online health services. Consumers’ actual usage experiences modify perceptions of usefulness and influence the confirmation of their initial expectations. These results have implications for our understanding of the dynamic nature of trust and PU as well as their roles in the long-term sustainability of e-services.  相似文献   

8.
Computer-generated animations of American Sign Language (ASL) can improve the accessibility of information, communication, and services for the significant number of deaf adults in the US with difficulty in reading English text. Unfortunately, there are several linguistic aspects of ASL that current automatic generation or translation systems cannot produce (or are time-consuming for human animators to create). To determine how important such phenomena are to user satisfaction and the comprehension of ASL animations, studies were conducted in which native ASL signers evaluated ASL animations with and without: establishment of spatial reference points around the virtual human signer representing entities under discussion, pointing pronoun signs, contrastive role shift, and spatial inflection of ASL verbs. It was found that adding these phenomena to ASL animations led to a significant improvement in user comprehension of the animations, thereby motivating future research on automating the generation of these animations.  相似文献   

9.
Providers of online services are under increasing pressure to leverage the value inherent in customer data to remain competitive. At the same time, however, Internet users' privacy has become more and more subject to public debate, and companies must protect this privacy if they want to attract and retain customers. It seems that companies struggle to satisfy these competing demands, and neglecting either could have detrimental effects on their success. Different streams of research underline the importance of either privacy protection or the collection and use of customer information. But they remain largely silent about the resulting challenges that companies face. In this study, we address this gap by exploring how companies perceive and handle the tensions between their organizational information needs that necessitate some degree of privacy intrusion and their need to attract and retain customers, which requires privacy protection. We develop a grounded theory that explains how companies balance these opposing demands from an organizational perspective. More specifically, we identify four challenging tensions that define the conditions under which companies must operate. We find that companies try to achieve and maintain a state of balance in the presence of these tensions, and we discover three categories of tactics that help companies in their balancing acts. Our research contributes to a provider‐centric perspective on information privacy and uncovers the management of customer information and privacy as a new but important context in which organizational ambidexterity is required. We offer a detailed perspective on the specific challenges that companies face with respect to customer information and privacy, and our results can guide managers who have to deal with these challenges.  相似文献   

10.
Building a problem solver and acquiring the knowledge needed to operate it are the two central goals of knowledge engineering. to achieve these goals, knowledge engineers construct models of the domain and of the task of interest. the various approaches used for modeling, however, have so far failed to define methods and techniques that can be applied across domains and tasks, and to produce models that can be reused in future applications. In this article, we propose that both of these objectives can be achieved by the use of building blocks called mechanisms. We examine the composition of mechanisms and also show how these mechanisms can be manipulated to construct problemsolving methods. We present PROTÉGÉ-II, a knowledge-acquisition shell that uses problem-solving methods to drive the modeling of tasks, the automatic generation of knowledge-acquisition tools, and the control flow of the problem solver. the modeling of tasks, within the context of PROTÉGÉ-II, is illustrated with two examples: one from the game domain and another from the medical-therapy domain. In addition, we introduce the conceptual basis for a library of mechanisms that serves as a repository of reusable knowledge components. © 1993 John Wiley & Sons, Inc.  相似文献   

11.
Distributed applications, based on internetworked services, provide users with more flexible and varied services and developers with the ability to incorporate a vast array of services into their applications. Such applications are difficult to develop and manage due to their inherent dynamics and heterogeneity. One desirable characteristic of distributed applications is self-healing, or the ability to reconfigure themselves “on the fly” to circumvent failure. In this paper, we discuss our middleware for developing self-healing distributed applications. We present the model we adopted for self-healing behaviour and show as case study the reconfiguration of an application that uses networked sorting services and an application for networked home appliances. We discuss the performance benefits of self-healing property by analysing the elapsed time for automatic reconfiguration without user intervention. Our results show that a distributed application developed with our self-healing middleware will be able to perform smoothly by quickly reconfiguring its services upon detection of failure. We also consider the performance impact of a number of fault-detection mechanisms, including pre-emptive detection and on-use detection.  相似文献   

12.
The main idea of an online group-buying auction is to recruit enough people to generate a sufficient volume of orders to create the basis for a lower transaction price. Typically, the larger the number of orders, the more consumers will wish to participate. This is because the final auction price is likely to be lower than it would be otherwise. This positive feedback is a demand externalities phenomenon. Nevertheless, there also is a phenomenon of inertia that often occurs at the beginning of online group-buying auctions. Due to the small number of orders that occur in the beginning of an online group-buying auction, many potential participants are inclined to wait until the auction price for the sale item falls to an acceptable level. This only comes through the participation of more people in the auction. As a result, consumers will tend to wait for one another to join the auction. Thus, the startup inertia must be overcome before the number of orders will increase. We explore three incentive mechanisms to address this problem: sequence-based, time-based and quantity-based incentives. We conducted a series of experiments using an online group-buying auction experimental test bed deployed on the Internet to develop deeper insights into how these incentives work in the context of bakery cookie sales. Using theory to represent a variety of decision-making perspectives that can be applied in the online group-buying auction context, we explore whether the different incentive mechanisms cause consumers to perceive a lack of price fairness and procedural fairness in an auction’s operations. Our results suggest that consumers view participation discounts as creating the basis for perceptions of greater price fairness in online group-buying auctions. Compared with other incentive mechanisms, a sequence-based incentive mechanism gives consumers a sense of less procedural fairness. Finally, perceptions of fairness tend to have a positive association with price satisfaction and purchase intention.  相似文献   

13.
Many firms are developing application-based mobile services (ABMS) as a complementary channel to their online service. Although perceptions of the ABMS determine trust in the ABMS, trust transfer from the online channel plays a role in the formation of ABMS trust. Applying the elaboration likelihood model (ELM) to the study, two objectives were pursued: (1) to investigate the role different influence processes play in the formation of ABMS trust and (2) to assess whether the effects of these influences vary across users, and if so, how. Data collected from 344 users of the online services of a price-comparison service also offering an ABMS were analysed. Based on the ELM, central and peripheral routes of information processing were identified in the formation of ABMS trust. The central routes of information processing that play a role are the influence of online-service trust and ABMS perceived usefulness on ABMS trust, while the influence of ABMS perceived ease-of-use on ABMS trust emerged as a peripheral cue. Furthermore, online-service trust is also a peripheral cue for ABMS perceived ease-of-use. Other theoretical contributions offered by this study are findings that show that ABMS self-efficacy and online-service use influence information processing, but use different ELM routes.  相似文献   

14.
The use of the Internet in the daily activities of individuals and firms has become entrenched, and online shopping has become commonplace. However, debates about how online shopping recommendation mechanisms (OREMs) should be designed have not been completely resolved. The challenge with traditional online shopping recommendation mechanisms (TR-OREMs) is that they focus too much on quantitative factors. Thus, they ignore causal interrelationships with qualitative factors that are believed to significantly impact quantitative factors. Considering only quantitative factors and ignoring qualitative ones likely distorts the final recommendation results. Another problem with TR-OREMs is that they ignore the perceived psychological reactance of consumers against the recommended products. Such consumer reactance may be reduced when the causal interrelationships among all the quantitative and qualitative factors are analyzed and incorporated properly into the OREM. To overcome these problems, we propose a causal map – online shopping recommendation mechanisms (CM-OREMs) based on a causal map. We analyzed possible causal relationships among quantitative and qualitative factors and incorporated them in the recommendation process to reduce consumer reactance against the recommendation results. Furthermore, an elaboration likelihood model (ELM) was used to build hypotheses about how the online shopping behavior of consumers is affected by OREMs based on the proposed causal map. Specifically, the performance of the proposed OREM was empirically analyzed by gathering experiment data from qualified respondents who were asked to refer to the proposed OREM before making purchasing decisions via mobile phones. Statistical results showed that the proposed OREMs could enhance consumer decision satisfaction, decision confidence, and attitude toward the recommended products. It could also positively affect consumer purchasing intentions. The OREM had a greater effect on the high-reactance group of participants than on the low-reactance group as well as on a high-involvement product versus a low-involvement product.  相似文献   

15.
The use of online information resources is growing exponentially and it is widely agreed by producers and purchasers of information that the use of these resources should be measured in a more consistent way. Librarians want to understand better how the information they use from a variety of sources is being used; publishers want to know how the information products they disseminate are being accessed. An essential requirement to meet these objectives is an agreed International Code of Practice governing the recording and exchange of usage data. The first objective of Project COUNTER was to develop such a Code of Practice. This article describes the origins of COUNTER, sets its mission in the context of other industry initiatives, outlines the plan for COUNTER, and describes Release 1 of the COUNTER Code of Practice, published in December 2002.  相似文献   

16.
A huge amount of web services are deployed on the Web, nowadays. These services can be used to fulfill online requests. Requests are getting more and more complicated over time. So, there exists a lot of frequent request that cannot be fulfilled using just one web service. For using web services, composing individual services to create the added-value composite web service to fulfill the user request is necessary in most cases. Web services can be composed manually but it is a too tedious and time consuming task. The ability of automatic web service composition to create a new composite web service is one of the key enabling features for the future for the semantic web. There are some successful methods for automatic web service composition, but the lack of standard, open, and lightweight test environment makes the comparison and evaluation of these composition methods impossible. In this paper we propose an architecture for a light weight and scalable testbed to execute, test and evaluate automatic web service composition algorithms. The architecture provides mandatory components for implementing and evaluation of automatic web service composition algorithms. Also, this architecture provides some extension mechanisms to extend its default functionalities. We have also given reference implementations for web service matchmaking and composition. Also, some scenarios for testing and evaluating the testbed are given. We have found that the performance of the composition method will dramatically decrease as the number of web services increases.  相似文献   

17.
Online mapping services, such as Google Maps and Bing Maps, have become increasingly popular. In addition to providing map, navigation, and directory information, such services provide third-party applications with a technology framework including geospatial-visualization capabilities. For instance, consumers often use location-based services and spatial decision support systems (SDSS) to locate the nearest restaurants, search for ideal homes, navigate specific routes, and effectively participate in car and bike sharing programs. Organizations utilize SDSS to perform retail site selection, manage global assets, and optimize supply chains. While geospatial-visualization is a vital capability of online mapping services, little is understood about how it impacts the acceptance of technology. Through a partial least squares analysis of 577 subject responses, this paper demonstrates that the user-acceptance of geospatial-visualization is influenced by utilitarian, hedonic, and cognitive measures. This paper concludes with a discussion of the implications of these results to research and practice.  相似文献   

18.
In emerging service-oriented systems, such as computational clouds or grids, software agents are able to automatically procure distributed services to complete computational tasks. However, service execution times are often highly uncertain and service providers may have incentives to lie strategically about this uncertainty to win more customers. In this paper, we argue that techniques from the field of artificial intelligence are instrumental to addressing these challenges.To this end, we first propose a new decision-theoretic algorithm that allows a single service consumer agent to procure services for a computational task with a strict deadline. Crucially, this algorithm uses redundancy in a principled manner to mitigate uncertain execution times and maximise the consumer?s expected utility. We present both an optimal variant that uses a novel branch-and-bound formulation, and a fast heuristic that achieves near-optimal performance. Using simulations, we demonstrate that our algorithms outperform approaches that do not employ redundancy by up to 130% in some settings.Next, as the algorithms require private information about the providers? capabilities, we show how techniques from mechanism design can be used to incentivise truthfulness. As no existing work in this area deals with uncertain execution times and redundant invocations, we extend the state of the art by proposing a number of payment schemes for these settings. In a detailed analysis, we prove that our mechanisms fulfil a range of desirable economic properties, including incentive compatibility, and we discuss suboptimal variants that scale to realistic settings with hundreds of providers. We show experimentally that our mechanisms extract a high surplus and that even our suboptimal variants typically achieve a high efficiency (95% or more in a wide range of settings).  相似文献   

19.
介绍了在Python编程环境下用pyExcelerator操作Excel文件的方法,着重介绍了pyExcelerator产生带格式的Excel文件的实现细节。pyExcelerator可以应用在非Windows环境下,广泛应用到Web程序返回Excel报表、信息系统自动导出Excel文件、网络游戏Excel报表等场合。  相似文献   

20.
In order to provide insights about cancer patients' online information seeking behaviors, the present study analyzes individuals' transaction log data and reports on how demographics, disease‐related factors, and psychosocial needs predict patterns of service use within a particular Interactive Cancer Communication System (ICCS). Study sample included 294 recently diagnosed breast cancer patients. Data included pretest survey scores of demographic, disease‐related, and psychosocial factors and automatically collected ICCS use data over the 4‐month intervention. Statistical analyses correlated pre‐test survey scores with subsequent, specific types of ICCS service usage. Patterns of online cancer information seeking differed according to the patients' characteristics, suggesting that lower income, less educated women and those lacking in information‐seeking competence use the computer and online services to the same or a greater degree if those services are made available to them. Results of this study can inform more effective resource development for future eHealth applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号