Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Lightweight privacy-preserving authentication mechanism in 5G-enabled industrial cyber physical systems
Information Sciences: an International Journal (ISCI), Volume 666, Issue Chttps://doi.org/10.1016/j.ins.2024.120391AbstractWith the deep integration of informatization and industrialization, cyber-physical system (CPS), which integrates computing, communication and control technologies, comes into being and has been widely used in industrial applications. A large ...
- research-articleJuly 2024
Blockchain enabled dynamic trust management method for the internet of medical things
AbstractThe Internet of Things (IoT) connects heterogeneous sensing devices with servers under the support of the network to monitor intelligent communication and real-time data transmission. The system caters well to the needs of medical services and ...
Highlights- Most participants in medical systems would prefer to control their data for in a decentralized environment.
- Trust mechanism leads to an increased willingness to use healthcare platforms.
- Blockchain technology are important for ...
- research-articleJuly 2024
The secret of voice: How acoustic characteristics affect video creators' performance on Bilibili
AbstractThe importance of voice has been well acknowledged in sensory decision-making. Yet, past literature on video creators' performance did not shed much light on the impact of video creators' acoustic characteristics. Building on signaling theory of ...
Highlights- Acoustic characteristics are calculated through speech recognition analytics.
- On user-generated video platforms, acoustic characteristics are important in influencing creators’ performance.
- Voice variability has positive ...
- research-articleJuly 2023
Aspect sentiment mining of short bullet screen comments from online TV series
Journal of the Association for Information Science and Technology (JAIST), Volume 74, Issue 8Pages 1026–1045https://doi.org/10.1002/asi.24800AbstractBullet screen comments (BSCs) are user‐generated short comments that appear as real‐time overlays on many video platforms, expressing the audience opinions and emotions about different aspects of the ongoing video. Unlike traditional long comments ...
- research-articleNovember 2022
Decentralized authentication and access control protocol for blockchain-based e-health systems
Journal of Network and Computer Applications (JNCA), Volume 207, Issue Chttps://doi.org/10.1016/j.jnca.2022.103512AbstractThe Internet of things technology has accelerated the development of e-health solutions and allows patients to obtain a more satisfying medical service experience. Each electronic health system(EHS) usually allows its subsystems to ...
-
- research-articleApril 2021
A hybrid ensemble learning method for the identification of gang-related arson cases
AbstractArson is one of the most common crimes, and it has the characteristics of low cost and great harm. In addition to causing casualties and property damage, arson can often have huge social impacts and cause psychological panic in the ...
- research-articleDecember 2020
Subdivided or aggregated online review systems: Which is better for online takeaway vendors?
Electronic Commerce Research (KLU-ELEC), Volume 20, Issue 4Pages 915–944https://doi.org/10.1007/s10660-018-9314-yAbstractThis paper examines the role of a subdivided or aggregated online review system to help online takeaway vendors select the most appropriate information strategy. First, we develop two models to depict the interaction between online vendors’ ...
- research-articleSeptember 2020
User adoption of physician's replies in an online health community: An empirical study
Journal of the Association for Information Science and Technology (JAIST), Volume 71, Issue 10Pages 1179–1191https://doi.org/10.1002/asi.24319AbstractOnline health question‐and‐answer consultation with physicians is becoming a common phenomenon. However, it is unclear how users identify the most satisfying reply. Based on the dual‐process theory of knowledge adoption, we developed a conceptual ...
- ArticleDecember 2019
Identifying Physician Fraud in Healthcare with Open Data
AbstractHealth care fraud is a serious problem that impacts every patient and consumer. This fraudulent behavior causes excessive financial losses every year and causes significant patient harm. Healthcare fraud includes health insurance fraud, fraudulent ...
- articleSeptember 2018
Effects of membership tier on user content generation behaviors: evidence from online reviews
Electronic Commerce Research (KLU-ELEC), Volume 18, Issue 3Pages 457–483https://doi.org/10.1007/s10660-017-9266-7Online shopping websites typically classify customers into different membership tiers in their customer relationship management systems. This study investigates the effects of membership tiers on user content generation behaviors in the context of an ...
- research-articleJanuary 2018
The persuasion of borrowers voluntary information in peer to peer lending
Computers in Human Behavior (COHB), Volume 78, Issue CPages 200–214https://doi.org/10.1016/j.chb.2017.09.004This paper investigates the persuasive process of borrowers' controllable voluntary information which can be easily manipulated and is particularly valuable for borrowers to persuade lenders and enhance the likelihood of funding success in P2P lending ...
- articleFebruary 2017
Antecedents of ERP assimilation and its impact on ERP value: A TOE-based model and empirical test
Information Systems Frontiers (KLU-ISFI), Volume 19, Issue 1Pages 13–30https://doi.org/10.1007/s10796-015-9583-0Drawing on the technology-organization-environment (TOE) framework and prior IT assimilation literature, we develop and test an integrated model of ERP assimilation and value in Chinese firms. We also contrast the strength of the antecedents of ERP ...
- research-articleNovember 2016
Examining macro-sources of institution-based trust in social commerce marketplaces
Electronic Commerce Research and Applications (ECRA), Volume 20, Issue CPages 116–131https://doi.org/10.1016/j.elerap.2016.10.004Marketplace-based e-commerce dominates current social commerce economy.The institution-based trust is vital for social commerce marketplaces.Two macro-level factors of the institution-based trust are uncovered.A high order construct - perceived social ...
- research-articleAugust 2016
Social Representations of Social Media Use in Government
Social Science Computer Review (SSCR), Volume 34, Issue 4Pages 416–436https://doi.org/10.1177/0894439315595222Social media use in government has gained a rapid growth in the last few years around the world. China has witnessed a boom in social media use in government, especially government microblogging. In this study, we employ social representation theory as ...
- research-articleMarch 2016
Social presence, trust, and social commerce purchase intention
Computers in Human Behavior (COHB), Volume 56, Issue CPages 225–237https://doi.org/10.1016/j.chb.2015.11.057Lacking the presence of human and social elements is claimed one major weakness that is hindering the growth of e-commerce. The emergence of social commerce might help ameliorate this situation. Social commerce is a new evolution of e-commerce that ...
- articleDecember 2015
Examining micro-level knowledge sharing discussions in online communities
Information Systems Frontiers (KLU-ISFI), Volume 17, Issue 6Pages 1227–1238https://doi.org/10.1007/s10796-015-9566-1Online communities of practice have become a popular knowledge source for both individuals and organizations. It is important to understand how to facilitate virtual knowledge sharing in online communities. Existing studies generally focus on system ...
- research-articleNovember 2015
- research-articleFebruary 2015
The joint moderating role of trust propensity and gender on consumers' online shopping behavior
Computers in Human Behavior (COHB), Volume 43, Issue CPages 272–283https://doi.org/10.1016/j.chb.2014.10.020Trust propensity moderates the relationship between perceived risk and overall satisfaction.Gender moderates the relationship between consumers' perceived benefit and re-purchase intention.Gender and trust propensity have interactive moderating effects ...
- research-articleDecember 2014
The relativity of privacy preservation based on social tagging
Information Sciences: an International Journal (ISCI), Volume 288, Issue CPages 87–107https://doi.org/10.1016/j.ins.2014.08.015Privacy preservation has gained importance with the development of tools for personal information retrieval and social information sharing in Web 2.0 environments. This paper addresses the need for a paradigm shift concerning publicity and privacy ...
- research-articleDecember 2014
An Analytical Framework for Understanding Knowledge-Sharing Processes in Online Q&A Communities
ACM Transactions on Management Information Systems (TMIS), Volume 5, Issue 4Article No.: 18, Pages 1–31https://doi.org/10.1145/2629445Online communities have become popular knowledge sources for both individuals and organizations. Computer-mediated communication research shows that communication patterns play an important role in the collaborative efforts of online knowledge-sharing ...