首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   15篇
  免费   1篇
数学   5篇
无线电   11篇
  2023年   1篇
  2021年   1篇
  2020年   2篇
  2018年   1篇
  2017年   3篇
  2016年   2篇
  2013年   2篇
  2012年   1篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
排序方式: 共有16条查询结果,搜索用时 15 毫秒
11.
Home Internet of Things (IoT) services are expected to augment the efficiency and comfort of users’ daily lives; however, this expectation is eclipsed by concerns regarding privacy and vulnerability. While these concerns critically impact the acceptance of IoT services for the home, they have been discussed primarily from a traditional point of view; academic discussions of privacy and vulnerability in the current environment are lacking. This study extends existing privacy and vulnerability theories to demonstrate the importance of physical privacy and user vulnerability protections in home IoT environments. To validate the proposed research model, an empirical analysis was conducted on 265 samples with a partial least squares structural equation modeling technique. The differences in vulnerability factors, along with privacy concerns and resistance to home IoT services, were also compared by gender, experience, and type of housing. Results show that user vulnerability has the strongest impact on home IoT privacy concerns and resistance to home IoT environments. Additionally, this study found that personal factors appear differently across vulnerabilities, privacy concerns, and home IoT resistance. This study extends the traditional concepts of privacy and vulnerability to the home IoT environment.  相似文献   
12.
With the digital age, businesses are increasingly collecting consumers’ data, which is raising privacy issues. Existing research has been dominated by the rational-based privacy calculus theory, which overlooks the role of irrationality and contextual factors. This study accounts for the influence of both rational (benefits and costs) and irrational (habits) factors in the disclosure decision-making process, while considering the moderating role of context sensitivity. Data gathered from 956 consumers who disclosed personal data with self-selected companies partially supports the context-dependence of data disclosure and reveals that, although consumers do face a trade-off between perceived benefits and privacy loss, habit plays a dominant role. The study extends the privacy calculus theory and provides insights for businesses aiming to collect consumers’ data across industries.  相似文献   
13.
The analysis of survey data pooled from the Pew Research Center’s Privacy Panels revealed that ideological proximity influences individual concerns about government surveillance. Two dimensions of ideology—allowance for government interference in the personal sphere and in the economic sphere—manifest themselves as four types: libertarians (less allowance for interference in both spheres), liberals (less allowance in the personal sphere but more allowance in the economic sphere), conservatives (more allowance in the personal sphere but less allowance in the economic sphere), and communitarians (more allowance in both spheres). Whereas libertarians and liberals have more concerns about government surveillance, conservatives and communitarians have fewer concerns. Given the salient differences between the libertarian-liberal ideology and conservative-communitarian ideology, findings of this study revealed that government interference in the personal sphere matters more for surveillance concerns than government interference in the economic sphere. Actual control for privacy protection, information sensitivity, and perceived transparency predict significantly the level of surveillance concerns.  相似文献   
14.
面向方面编程及其应用现状的研究   总被引:5,自引:0,他引:5  
面向方面编程(AOP)弥补了面向对象的编程(OOP)在跨越模块行为上的不足.它引进了Aspect将影响多个类的行为封装到一个可重用模块中,从而消除了OOP引起的代码混乱和分散问题,增强了系统的可维护性和代码的重用性.文章首先对AOP的基本思想、关键技术和编程过程进行了叙述,然后重点研究和分析了AOP在异常处理、分布式系统、日志管理和设计模式方面的应用,最后描述了它的研究应用热点.  相似文献   
15.
为了缓解隐私焦虑,企业发布了隐私声明:罗列出数据是如何使用和共享的。首席隐私官可以使用E-p3p 形式化想得到的企业内部处理收集的数据。允许一个特定的数据用户使用给定一个条件所收集的特定数据,当且仅当E-p3p授权引擎允许这个基于E-p3p应用策略的请求。通过加强这个形式化的隐私常规,E-p3p可以使企业遵守他们的诺言以及阻止偶然的隐私侵害。在这篇论文中,我们描述了E-P3P隐私策略语言的形式模型,列出了一些选出的细节语言的xml句法规则。  相似文献   
16.
This study conducted an online experiment to examine how persuasion knowledge of online targeted advertising (OTA), coping self-efficacy, and product involvement influenced the perceptions of privacy concerns and ad intrusiveness. These findings indicated that persuasion knowledge increased coping self-efficacy, which, in turn, influenced privacy concerns and perceived ad intrusiveness. Furthermore, the relations between coping self-efficacy and the evaluations of the OTA varied, depending on levels of product involvement. Specifically, when participants had high product involvement, their perceptions of privacy concerns and ad intrusiveness increased as their coping self-efficacy enhanced. However, those relationships did not appear among participants with low levels of product involvement. Theoretical and managerial implications of these findings are discussed later.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号