Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy....Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms.展开更多
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
A mobile edge cloud provides a platform to accommodate the offloaded traffic workload generated by mobile devices.It can significantly reduce the access delay for mobile application users.However,the high user mobilit...A mobile edge cloud provides a platform to accommodate the offloaded traffic workload generated by mobile devices.It can significantly reduce the access delay for mobile application users.However,the high user mobility brings significant challenges to the service provisioning for mobile users,especially to delay-sensitive mobile applications.With the objective to maximize a profit,which positively associates with the overall admitted traffic served by the local edge cloud,and negatively associates with the access delay as well as virtual machine migration delay,we study a fundamental problem in this paper:how to update the service provisioning solution for a given group of mobile users.Such a profit-maximization problem is formulated as a nonlinear integer linear programming and linearized by absolute value manipulation techniques.Then,we propose a framework of heuristic algorithms to solve this Nondeterministic Polynomial(NP)-hard problem.The numerical simulation results demonstrate the efficiency of the devised algorithms.Some useful summaries are concluded via the analysis of evaluation results.展开更多
With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing co...With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.展开更多
The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the m...The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.展开更多
Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,s...Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.展开更多
Based on the UTAUT model,this article introduces three variables including perceived cost,information quality and hedonic motives,and using the level of education as a moderator variable,to build an acceptance model o...Based on the UTAUT model,this article introduces three variables including perceived cost,information quality and hedonic motives,and using the level of education as a moderator variable,to build an acceptance model of mobile information service system in rural area.Based on the household survey obtaining firsthand data of 961 farmers in Jiangsu Province,the study tests the improved UTAUT model by using Amos22.0 software.The results show that compared with the original UTAUT model,improved UTAUT model willingness to accept the explanatory power get further increase(from 49.0%to 61.9%).Performance expectations,social impact,information quality have significant positive influence on accepting intend,hedonic motives have a significant negative impact to accept in-tend,convenient conditions directly affect the use of behavior;gender and level of education has a regulating effect to accept intention.Through further grouping path analysis,the result shows that hedonic motives have broader impacts for women farmers accept mobile information services.Compared with other groups,only farmers with primary education are easily afected by others,and farmers with college education or above are more easily afectede by information quality.Finally,this paper explains the results and puts forward countermeasures and suggestions accordingly.展开更多
With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)wi...With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness.展开更多
Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Compo...Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition.展开更多
With the development of mobile technology, especially the development of 3G and mobile IP, the computational capacity of handsets is becoming more and more powerful, which provides a new method to solve the difficulti...With the development of mobile technology, especially the development of 3G and mobile IP, the computational capacity of handsets is becoming more and more powerful, which provides a new method to solve the difficulties encountered in real time GIS accessing caused by the characteristics of mobility and remoteness of fieldwork in oilfield. On the basis of studying in-depth on the technologies of J2ME platform, Mobile SVG and mobile data transfer, etc., and in accordance with the actual situation of oilfield, the design framework of oilfield mobile GIS service is put forward and the schemes of key technologies are given in this paper, which establishes the technical foundation for the construction of “Digital Oilfield”.展开更多
A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can ...A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.展开更多
With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expec...With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.展开更多
How to fmd main influence factors of individuals to mobile service demand is investiga- ted. The empirical research is conducted in the sample of high-value customers in China mobile market. Based on Lewin behavior mo...How to fmd main influence factors of individuals to mobile service demand is investiga- ted. The empirical research is conducted in the sample of high-value customers in China mobile market. Based on Lewin behavior model, this pa- per establishes factors-matrix from personal and environmental dimensions. Relationships among multiple factors are tested in the structural equa- tion model and their impacts on customers' de- mands are elaborated. Findings indicate that opera- tional convenience and business brand image have significant effects on sample users' demands. Fur- thermore, annual income, gender, occupation, the needs of access to information and the needs of enriching and improving social relationships are al- so important factors for high-value users. The re- suits may provide further insights into mobile service demand and the model can be popularized to other behavior researches.展开更多
Purpose:Based on the understanding of the characteristics of mobile services(m-services)provided by libraries,we attempt to develop a multidimensional and hierarchical model and a specifically designed measurement sca...Purpose:Based on the understanding of the characteristics of mobile services(m-services)provided by libraries,we attempt to develop a multidimensional and hierarchical model and a specifically designed measurement scale for the assessment of libraries' m-service quality.Design/methodology/approach:The research has been conducted sequentially in two stages.At the first stage,a multidimensional and hierarchical model of library m-service quality and a measurement scale are developed through literature review and focus group interviews.At the second stage the model is tested using partial disaggregation technique for an analysis of the data collected from over 400 library users in 3 Chinese universities.Findings:The proposed model is shown to fit the data well.The empirical analysis provides strong support for the model,which includes 4 dimensions(service environment,service interaction,information control and service effect) and 12 corresponding sub-dimensions.Research limitations:The sample size needs to be enlarged and the user types need to be expanded to make the sample more representative.Practical implications:The study provides a conceptual framework and measurement tool that can help library managers understand the users' needs in the context of mobile network environment,and boost their libraries' competitiveness by carrying out better services to meet the user demands.Originality/value:The proposed model and measurement scale specifically designed for the assessment of libraries' m-service quality fully reflect the hierarchical structure of libraries' m-service quality.In addition,by using partial disaggregation technique for model testing,we believe our research can serve as a practical reference to those engaged in the development and examination of a multidimensional and hierarchical model.展开更多
基金supported by Jilin Provincial Science and Technology Department Natural Science Foundation of China(20210101415JC)Jilin Provincial Science and Technology Department Free exploration research project of China(YDZJ202201ZYTS642).
文摘Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and energy.Due to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC server.In this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by tasks.Furthermore,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted cost.The proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized execution.Systematic and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms.
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
基金partially supported by JSPS KAKENHI under Grant Number JP16J07062
文摘A mobile edge cloud provides a platform to accommodate the offloaded traffic workload generated by mobile devices.It can significantly reduce the access delay for mobile application users.However,the high user mobility brings significant challenges to the service provisioning for mobile users,especially to delay-sensitive mobile applications.With the objective to maximize a profit,which positively associates with the overall admitted traffic served by the local edge cloud,and negatively associates with the access delay as well as virtual machine migration delay,we study a fundamental problem in this paper:how to update the service provisioning solution for a given group of mobile users.Such a profit-maximization problem is formulated as a nonlinear integer linear programming and linearized by absolute value manipulation techniques.Then,we propose a framework of heuristic algorithms to solve this Nondeterministic Polynomial(NP)-hard problem.The numerical simulation results demonstrate the efficiency of the devised algorithms.Some useful summaries are concluded via the analysis of evaluation results.
基金This work has been partly supported by the National Natural Science Foundation of China under Grant No.61702212the Fundamental Research Funds for the Central Universities under Grand NO.CCNU19TS017.
文摘With the rapid development of the Internet of Things(IoT),Location-Based Services(LBS)are becoming more and more popular.However,for the users being served,how to protect their location privacy has become a growing concern.This has led to great difficulty in establishing trust between the users and the service providers,hindering the development of LBS for more comprehensive functions.In this paper,we first establish a strong identity verification mechanism to ensure the authentication security of the system and then design a new location privacy protection mechanism based on the privacy proximity test problem.This mechanism not only guarantees the confidentiality of the user s information during the subsequent information interaction and dynamic data transmission,but also meets the service provider's requirements for related data.
文摘The Mobile Ubiquitous Service Environment (MUSE),established through the coordination and integration of mobile telecommunications and ubiquitous network,in the pursuit of Always Best Experience (ABE),represents the major development trend for the next generation mobile wireless network. Research on MUSE will involve the integration of the computing model system,service platform system,operating system and terminal structure system,all of which involve exploration and innovation of a new networking structure,its control and management as well as way of measuring. The change in network resources triggers the change in network computing models. To let readers have a basic understanding of MUSE,this lecture introduces it in four sections. This section focuses on the development and demand analysis of the service platform.
基金National Key Basic Research Program of China (973 Program) under Grant No.2012CB315802 and No.2013CB329102.National Natural Science Foundation of China under Grant No.61171102 and No.61132001.New generation broadband wireless mobile communication network Key Projects for Science and Technology Development under Grant No.2011ZX03002-002-01,Beijing Nova Program under Grant No.2008B50 and Beijing Higher Education Young Elite Teacher Project under Grant No.YETP0478
文摘Differently from the general online social network(OSN),locationbased mobile social network(LMSN),which seamlessly integrates mobile computing and social computing technologies,has unique characteristics of temporal,spatial and social correlation.Recommending friends instantly based on current location of users in the real world has become increasingly popular in LMSN.However,the existing friend recommendation methods based on topological structures of a social network or non-topological information such as similar user profiles cannot well address the instant making friends in the real world.In this article,we analyze users' check-in behavior in a real LMSN site named Gowalla.According to this analysis,we present an approach of recommending friends instantly for LMSN users by considering the real-time physical location proximity,offline behavior similarity and friendship network information in the virtual community simultaneously.This approach effectively bridges the gap between the offline behavior of users in the real world and online friendship network information in the virtual community.Finally,we use the real user check-in dataset of Gowalla to verify the effectiveness of our approach.
基金the periodical achievment of National Natural Science Foundation of China(71771126)The Key Project of Social Science Research in Jiangsu(17GLB013)
文摘Based on the UTAUT model,this article introduces three variables including perceived cost,information quality and hedonic motives,and using the level of education as a moderator variable,to build an acceptance model of mobile information service system in rural area.Based on the household survey obtaining firsthand data of 961 farmers in Jiangsu Province,the study tests the improved UTAUT model by using Amos22.0 software.The results show that compared with the original UTAUT model,improved UTAUT model willingness to accept the explanatory power get further increase(from 49.0%to 61.9%).Performance expectations,social impact,information quality have significant positive influence on accepting intend,hedonic motives have a significant negative impact to accept in-tend,convenient conditions directly affect the use of behavior;gender and level of education has a regulating effect to accept intention.Through further grouping path analysis,the result shows that hedonic motives have broader impacts for women farmers accept mobile information services.Compared with other groups,only farmers with primary education are easily afected by others,and farmers with college education or above are more easily afectede by information quality.Finally,this paper explains the results and puts forward countermeasures and suggestions accordingly.
基金This work was supported by National Natural Science Foundation of China(Grant Nos.61871140,61702223,61702220,61572153,61723022,61601146)and the National Key research and Development Plan(Grant No.2018YFB0803504,2017YFB0803300).
文摘With the evolution of location-based services(LBS),a new type of LBS has already gain a lot of attention and implementation,we name this kind of LBS as the Device-Dependent LBS(DLBS).In DLBS,the service provider(SP)will not only send the information according to the user’s location,more significant,he also provides a service device which will be carried by the user.DLBS has been successfully practised in some of the large cities around the world,for example,the shared bicycle in Beijing and London.In this paper,we,for the first time,blow the whistle of the new location privacy challenges caused by DLBS,since the service device is enabled to perform the localization without the permission of the user.To conquer these threats,we design a service architecture along with a credit system between DLBS provider and the user.The credit system tie together the DLBS device usability with the curious behaviour upon user’s location privacy,DLBS provider has to sacrifice their revenue in order to gain extra location information of their device.We make the simulation of our proposed scheme and the result convince its effectiveness.
基金ACKNOWLEDGEMENT This research is supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2011CB302506, 2012CB315802 National Key Technology Research and Development Program of China (Grant No. 2012BAH94F02)+3 种基金 National High-tech R&D Program of China (863 Program) under Grant No. 2013AA102301 National Natural Science Foundation of China under Grant No. 61132001, 61171102) Program for New Century Excellent Talents in University (Grant No. NCET-11-0592) Project of New Generation Broad band Wireless Networks under Grant No. 2011ZX03002-002-01. The technology development and experiment of innovative networks architecture (CNGI-12- 03-007).
文摘Composite service provision in mobile ad hoc networks encounters great challenges and its success rate is not satisfactory because the nodes' locations are dynamic and the nodes maybe unavailable at any time.Composite service is built through the service composition.In mobile ad hoc networks,the factors influencing the success rate of service composition are mainly the number of nodes and the time spent for the composition.The node's failure probability is proportional to the length of time the node exist in the networks.In order to improve the success rate of service composition,we take several measures.First,we split the service requirement into several segments and cluster the nodes,so that the nodes' waiting time for service composition can be reduced.Second,we propose a new node model of "one node contains multiple services" in mobile ad hoc networks.Using this type of nodes model,the number of nodes required for service composition can be reduced.These means can increase the success rate of service composition.
文摘With the development of mobile technology, especially the development of 3G and mobile IP, the computational capacity of handsets is becoming more and more powerful, which provides a new method to solve the difficulties encountered in real time GIS accessing caused by the characteristics of mobility and remoteness of fieldwork in oilfield. On the basis of studying in-depth on the technologies of J2ME platform, Mobile SVG and mobile data transfer, etc., and in accordance with the actual situation of oilfield, the design framework of oilfield mobile GIS service is put forward and the schemes of key technologies are given in this paper, which establishes the technical foundation for the construction of “Digital Oilfield”.
文摘A network model is proposed to support service differentiation for mobile Ad Hoc networks by combining a fully distributed admission control approach and the DIFS based differentiation mechanism of IEEE802.11. It can provide different kinds of QoS (Quality of Service) for various applications. Admission controllers determine a committed bandwidth based on the reserved bandwidth of flows and the source utilization of networks. Packets are marked when entering into networks by markers according to the committed rate. By the mark in the packet header, intermediate nodes handle the received packets in different manners to provide applications with the QoS corresponding to the pre-negotiated profile. Extensive simulation experiments showed that the proposed mechanism can provide QoS guarantee to assured service traffic and increase the channel utilization of networks.
基金supported by China Fundamental Research Funds for the Central University under Grant No.BUPT 2009RC1022
文摘With the development of intelligent terminals and mobile applications,the influence of continuous improvement on mobile content services to the continuance use intention is more and more significant.Based on the expectation-confirmation theory and information system continuance use theory,this paper proposes a mobile content continuance use model and puts forward related assumptions under the mobile commerce environment by introducing the continuous improvement variables.Questionnaire data are collected from 219 mobile content service users for research,and the hypothetical model is validated by the structural equation modeling.Results show that the information system continuance use model is still valid under the mobile commerce environment,and the continuous improvement on mobile content services have positive impacts on user's expectations after they have experienced certain mobile content services.
基金supported by the Hunan Province Soft SciencesPlan under Grant No. 2009ZK2001
文摘How to fmd main influence factors of individuals to mobile service demand is investiga- ted. The empirical research is conducted in the sample of high-value customers in China mobile market. Based on Lewin behavior model, this pa- per establishes factors-matrix from personal and environmental dimensions. Relationships among multiple factors are tested in the structural equa- tion model and their impacts on customers' de- mands are elaborated. Findings indicate that opera- tional convenience and business brand image have significant effects on sample users' demands. Fur- thermore, annual income, gender, occupation, the needs of access to information and the needs of enriching and improving social relationships are al- so important factors for high-value users. The re- suits may provide further insights into mobile service demand and the model can be popularized to other behavior researches.
基金supported by the Social Science Foundation of China(Grant No.:12CTQ005)
文摘Purpose:Based on the understanding of the characteristics of mobile services(m-services)provided by libraries,we attempt to develop a multidimensional and hierarchical model and a specifically designed measurement scale for the assessment of libraries' m-service quality.Design/methodology/approach:The research has been conducted sequentially in two stages.At the first stage,a multidimensional and hierarchical model of library m-service quality and a measurement scale are developed through literature review and focus group interviews.At the second stage the model is tested using partial disaggregation technique for an analysis of the data collected from over 400 library users in 3 Chinese universities.Findings:The proposed model is shown to fit the data well.The empirical analysis provides strong support for the model,which includes 4 dimensions(service environment,service interaction,information control and service effect) and 12 corresponding sub-dimensions.Research limitations:The sample size needs to be enlarged and the user types need to be expanded to make the sample more representative.Practical implications:The study provides a conceptual framework and measurement tool that can help library managers understand the users' needs in the context of mobile network environment,and boost their libraries' competitiveness by carrying out better services to meet the user demands.Originality/value:The proposed model and measurement scale specifically designed for the assessment of libraries' m-service quality fully reflect the hierarchical structure of libraries' m-service quality.In addition,by using partial disaggregation technique for model testing,we believe our research can serve as a practical reference to those engaged in the development and examination of a multidimensional and hierarchical model.