Search (2 results, page 1 of 1)

  • × author_ss:"Zhou, Z."
  • × year_i:[2020 TO 2030}
  1. Wu, Z.; Li, R.; Zhou, Z.; Guo, J.; Jiang, J.; Su, X.: ¬A user sensitive subject protection approach for book search service (2020) 0.02
    0.01716654 = product of:
      0.051499616 = sum of:
        0.051499616 = product of:
          0.07724942 = sum of:
            0.047734402 = weight(_text_:network in 5617) [ClassicSimilarity], result of:
              0.047734402 = score(doc=5617,freq=2.0), product of:
                0.19402927 = queryWeight, product of:
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.043569047 = queryNorm
                0.2460165 = fieldWeight in 5617, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5617)
            0.029515022 = weight(_text_:22 in 5617) [ClassicSimilarity], result of:
              0.029515022 = score(doc=5617,freq=2.0), product of:
                0.15257138 = queryWeight, product of:
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.043569047 = queryNorm
                0.19345059 = fieldWeight in 5617, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  3.5018296 = idf(docFreq=3622, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=5617)
          0.6666667 = coord(2/3)
      0.33333334 = coord(1/3)
    
    Abstract
    In a digital library, book search is one of the most important information services. However, with the rapid development of network technologies such as cloud computing, the server-side of a digital library is becoming more and more untrusted; thus, how to prevent the disclosure of users' book query privacy is causing people's increasingly extensive concern. In this article, we propose to construct a group of plausible fake queries for each user book query to cover up the sensitive subjects behind users' queries. First, we propose a basic framework for the privacy protection in book search, which requires no change to the book search algorithm running on the server-side, and no compromise to the accuracy of book search. Second, we present a privacy protection model for book search to formulate the constraints that ideal fake queries should satisfy, that is, (i) the feature similarity, which measures the confusion effect of fake queries on users' queries, and (ii) the privacy exposure, which measures the cover-up effect of fake queries on users' sensitive subjects. Third, we discuss the algorithm implementation for the privacy model. Finally, the effectiveness of our approach is demonstrated by theoretical analysis and experimental evaluation.
    Date
    6. 1.2020 17:22:25
  2. Zhou, Z.; Jin, X.-L.; Hsu, C.; Tang, Z.: User empowerment and well-being with mHealth apps during pandemics : a mix-methods investigation in China (2023) 0.01
    0.0053038225 = product of:
      0.015911467 = sum of:
        0.015911467 = product of:
          0.047734402 = sum of:
            0.047734402 = weight(_text_:network in 1090) [ClassicSimilarity], result of:
              0.047734402 = score(doc=1090,freq=2.0), product of:
                0.19402927 = queryWeight, product of:
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.043569047 = queryNorm
                0.2460165 = fieldWeight in 1090, product of:
                  1.4142135 = tf(freq=2.0), with freq of:
                    2.0 = termFreq=2.0
                  4.4533744 = idf(docFreq=1398, maxDocs=44218)
                  0.0390625 = fieldNorm(doc=1090)
          0.33333334 = coord(1/3)
      0.33333334 = coord(1/3)
    
    Abstract
    As a healthcare ICT4D solution, mobile health (mHealth) can potentially improve users' well-being during pandemics, especially in developing countries with limited healthcare resources. Recent ICT4D research reveals that providing end-users with access to ICT is insufficient for improving well-being and, thus, understanding how mHealth empowers end-users to enhance well-being against stressful events is important. However, prior research has rarely discussed the issue of empowerment in the domain of mHealth or the context of major disruptive events. This paper contributes to the literature by conceptualizing the psychological empowerment of mHealth users (PEMU) and investigating its nomological network during pandemics. Drawing upon theories of psychological empowerment and event characteristics, we developed a research model and tested it through a mixed-methods investigation, containing a quantitative study with 602 Chinese mHealth users during COVID-19 and a follow-up qualitative study of 326 online articles and reviews. We found that PEMU, driven by three technological characteristics (perceived response efficacy, ease of use, and mHealth quality), affects well-being through both (a) a stress-buffering effect, which counterbalances the detrimental, stress-increasing effects of event criticality and disruption, and (b) a vitality-stimulating effect, which is intensified by event criticality. These findings have important implications for ICT4D research and practice.

Authors