. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and custome.... In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented.展开更多
Three major poverty reduction models have successively been adopted in the poverty control led by the Communist Party of China(CPC),namely reliefbased poverty alleviation,which focused on adjusting the production fact...Three major poverty reduction models have successively been adopted in the poverty control led by the Communist Party of China(CPC),namely reliefbased poverty alleviation,which focused on adjusting the production factors of land,development-driven poverty alleviation,and targeted poverty alleviation.In the process,the target of finding a rational position for the principal function of poverty alleviation has been gradually realized:the approach of poverty alleviation has gradually adjusted from micro to macro,from direct to indirect;while the management has transformed from mobilization-based to rule-of-law based.Rules that link policies and laws,as well as a rule-of-law model of the poverty reduction of a developing country that is led by party committees and governments,has been formed,and an illustrative sample of poverty control has been created,which provides experience based knowledge to the anti-poverty practices in developing countries.In the future,it is necessary to further realize the protection of the rights of the people in comparative poverty and the proceduralization of poverty reduction administrative behaviors,as well as to formulate a unified "Poverty Reduction Law" when the time is ripe,to protect the rights of the people in comparative poverty in the post-poverty-alleviation era.展开更多
Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the met...Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the method,the control rule of the trust degree in the Dempster-Shafer(D-S)rule was utilized based on the entity network interactive behavior,and a proportion trust control rule was put up.The control rule could make the Web service self-adaptively study so as to gradually form a proper trust connection with its cooperative entities and to improve the security performance of the whole system.The experimental results show that the historical successful experience is saved during the service combination alliance,and the method can greatly improve the reliability and success rate of Web service combination.展开更多
Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the...Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project.展开更多
Over the course of the epochal 30 years, i.e., from the founding of People's Republic of China in 1949 till the launching of Chinese economic reform in 1978, the Communist Party of China (CPC) underwent a tremendou...Over the course of the epochal 30 years, i.e., from the founding of People's Republic of China in 1949 till the launching of Chinese economic reform in 1978, the Communist Party of China (CPC) underwent a tremendous transformation from the founding to the ruling party of the country. The present research examines the historical, social as well as political aspects of the identity crisis and the CPC was suffering from in its adventurous efforts to chart a course for the socialist transformation of China. It was tempted to resume its leadership role in the revolution given the mounting tension generated by the Cold War and the prevailing revolutionary beliefs within the Party. Nevertheless, it was obliged to restore the country's social and political order after the sweeping national reform. In search of an adequate interpretation for the various attempts the Party made in exploring its refreshed identity, hence resolving the crisis, the study focuses on a similar crisis which befell the Party leader, Mao Zedong, in his own struggle against the con- fusion caused by his potentially double role as the head of both a founding and a ruling party. The study suggests that Mao's misidentification of his own political role inevitably led to the Party's dysfunctions, and closer investigation into the leader's personal dilemma offers new insight into such tragic events as the Anti- Rightist Movement, the Great Leap Forward, and the Cultural Revolution.展开更多
In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites...In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites such a design of websites, security of websites and familiarity of website influence customers trust in online transactions. This paper presents an application of expert system on trust in electronic commerce. Based on experts’ judgment, a frame of work was proposed. The proposed model applies ANFIS and Mamdani inference fuzzy system to get the desired results and then results of two methods were compared. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of electronic websites. Based on AHP method, Expert Choice software was used to determine the priority of factors in the first questionnaire, and MATLAB and Excel were used for developing the fuzzy rules. Finally, the fuzzy logical kit was used to analyze the generated factors in the model. Our study findings show that trust in EC transactions is strongly mediated by perceived security.展开更多
China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The...China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The trust as an important vehicle in development of the financial market in China as well as in the world will play an important role, and there will be more foreign elements involved in Chinese trusts. The Law of the People's Republic of China on Application of Laws in Civil Relations with Foreign Elements provides rules, in its article 17, on the application of laws to trusts, which symbolizes the formal creation of rules of conflict of laws in China in this area. However, it seems to cause more problems than it may resolve. For example, it may not always be possible for the parties to determine the appli- cable law through consultation and agreement, and the parties' right to choice of law should not be without limitation either. By allowing judges to choose from "the law of the situs where the trust property is situated" and "the law of the situs where the trust relationship occurred" in the absence of an effective choice of law by the parties may lead to a situation contrary to existing laws and may create uncertainty for the parties as well. This paper analyzes this article 17 by comparing it with the conflict law rules adopted in the United States and by the Hague Convention, identifies problems, and seeks to find solutions in order to promote the healthy development of the trust system in China.展开更多
The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual need...The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual needs for new functionality,such as foresight,the number of linked devices in the industrial environment increases.Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments.Hence this blockchain-based endpoint protection platform(BCEPP)has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.A resolver supports the encoded model as an input;network functions can be optimized as an output in an infrastructure network.The configuration of the virtual network functions(VNFs)involved fulfills network characteristics.The output ensures that the final service is supplied at the least cost,including processing time and network latency.According to the findings of this comparison,our design is better suited to simplified trust management in IIoT devices.Thus,the experimental results show the adaptability and resilience of our suggested confidence model against behavioral changes in hostile settings in IIoT networks.The experimental results show that our proposed method,BCEPP,has the following,when compared to other methods:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%.展开更多
文摘. In this paper, the main driving factors affecting the customer loyalty of a third party mobile payment service were chosen by combining with the actual situation of the third party mobile payment service and customer spending habits in China. The assumed relations between all affecting factors and the customer loyalty of a third party mobile payment platform were proposed, and a model for studying customer loyalty was established and also a conclusion was made through the questionnaire survey analysis data. Finally, suggestions on improving the loyalty of the customers of a third party mobile payment platform are presented.
文摘Three major poverty reduction models have successively been adopted in the poverty control led by the Communist Party of China(CPC),namely reliefbased poverty alleviation,which focused on adjusting the production factors of land,development-driven poverty alleviation,and targeted poverty alleviation.In the process,the target of finding a rational position for the principal function of poverty alleviation has been gradually realized:the approach of poverty alleviation has gradually adjusted from micro to macro,from direct to indirect;while the management has transformed from mobilization-based to rule-of-law based.Rules that link policies and laws,as well as a rule-of-law model of the poverty reduction of a developing country that is led by party committees and governments,has been formed,and an illustrative sample of poverty control has been created,which provides experience based knowledge to the anti-poverty practices in developing countries.In the future,it is necessary to further realize the protection of the rights of the people in comparative poverty and the proceduralization of poverty reduction administrative behaviors,as well as to formulate a unified "Poverty Reduction Law" when the time is ripe,to protect the rights of the people in comparative poverty in the post-poverty-alleviation era.
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
基金Project(60673169)supported by the National Natural Science Foundation of China
文摘Based on the problem that the service entity only has the partial field of vision in the network environment,a trust evolvement method of the macro self-organization for Web service combination was proposed.In the method,the control rule of the trust degree in the Dempster-Shafer(D-S)rule was utilized based on the entity network interactive behavior,and a proportion trust control rule was put up.The control rule could make the Web service self-adaptively study so as to gradually form a proper trust connection with its cooperative entities and to improve the security performance of the whole system.The experimental results show that the historical successful experience is saved during the service combination alliance,and the method can greatly improve the reliability and success rate of Web service combination.
文摘Initial trust has been proved to be a crucial antecedent of Proper Risk Allocation(PRA)which benefits the improvement of construction project management.However,In the context of China,employer’s lack of trust in the unfamiliar contractor without prior trade experience is the main obstacle that prevents employer from using the RPA.The aim of this paper is to create a better understanding of a specific path of building trust named trust transfer.In this paper,we first reviews related literatures and sum up the main feature of the trust transfer from the other context(e.g.E-business),and proposed the conceptualization of trust transfer in construction project marketplace.And then,according the feature of the trust transfer,we describe the basic model of the trust transfer in the construction project marketplace including employer as the trustor,the third party(source)and the unfamiliar contractor as trustee(target),and the relationship between these three nodes.At last,we analyze the type of the third party and the relationship of the trust transfer in the context of construction project.
文摘Over the course of the epochal 30 years, i.e., from the founding of People's Republic of China in 1949 till the launching of Chinese economic reform in 1978, the Communist Party of China (CPC) underwent a tremendous transformation from the founding to the ruling party of the country. The present research examines the historical, social as well as political aspects of the identity crisis and the CPC was suffering from in its adventurous efforts to chart a course for the socialist transformation of China. It was tempted to resume its leadership role in the revolution given the mounting tension generated by the Cold War and the prevailing revolutionary beliefs within the Party. Nevertheless, it was obliged to restore the country's social and political order after the sweeping national reform. In search of an adequate interpretation for the various attempts the Party made in exploring its refreshed identity, hence resolving the crisis, the study focuses on a similar crisis which befell the Party leader, Mao Zedong, in his own struggle against the con- fusion caused by his potentially double role as the head of both a founding and a ruling party. The study suggests that Mao's misidentification of his own political role inevitably led to the Party's dysfunctions, and closer investigation into the leader's personal dilemma offers new insight into such tragic events as the Anti- Rightist Movement, the Great Leap Forward, and the Cultural Revolution.
文摘In new environments of trading, customer's trust is vital for the extended progress and development of electronic commerce. This paper proposes that in addition to known factors of electronic commerce B2C websites such a design of websites, security of websites and familiarity of website influence customers trust in online transactions. This paper presents an application of expert system on trust in electronic commerce. Based on experts’ judgment, a frame of work was proposed. The proposed model applies ANFIS and Mamdani inference fuzzy system to get the desired results and then results of two methods were compared. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of electronic websites. Based on AHP method, Expert Choice software was used to determine the priority of factors in the first questionnaire, and MATLAB and Excel were used for developing the fuzzy rules. Finally, the fuzzy logical kit was used to analyze the generated factors in the model. Our study findings show that trust in EC transactions is strongly mediated by perceived security.
文摘China has entered a new era represented by the newly established China (Shanghai) Pilot Free Trade Zone, in which further reform and development of its financial system and capital market are highly prioritized. The trust as an important vehicle in development of the financial market in China as well as in the world will play an important role, and there will be more foreign elements involved in Chinese trusts. The Law of the People's Republic of China on Application of Laws in Civil Relations with Foreign Elements provides rules, in its article 17, on the application of laws to trusts, which symbolizes the formal creation of rules of conflict of laws in China in this area. However, it seems to cause more problems than it may resolve. For example, it may not always be possible for the parties to determine the appli- cable law through consultation and agreement, and the parties' right to choice of law should not be without limitation either. By allowing judges to choose from "the law of the situs where the trust property is situated" and "the law of the situs where the trust relationship occurred" in the absence of an effective choice of law by the parties may lead to a situation contrary to existing laws and may create uncertainty for the parties as well. This paper analyzes this article 17 by comparing it with the conflict law rules adopted in the United States and by the Hague Convention, identifies problems, and seeks to find solutions in order to promote the healthy development of the trust system in China.
基金The authors extend their appreciation to the Deputyship for Research&Innovation,Ministry of Education in Saudi Arabia for funding this research work through the Project Number IFPHI-218-611-2020.”。
文摘The Industrial Internet of Things(IIoT)has been growing for presentations in industry in recent years.Security for the IIoT has unavoidably become a problem in terms of creating safe applications.Due to continual needs for new functionality,such as foresight,the number of linked devices in the industrial environment increases.Certification of fewer signatories gives strong authentication solutions and prevents trustworthy third parties from being publicly certified among available encryption instruments.Hence this blockchain-based endpoint protection platform(BCEPP)has been proposed to validate the network policies and reduce overall latency in isolation or hold endpoints.A resolver supports the encoded model as an input;network functions can be optimized as an output in an infrastructure network.The configuration of the virtual network functions(VNFs)involved fulfills network characteristics.The output ensures that the final service is supplied at the least cost,including processing time and network latency.According to the findings of this comparison,our design is better suited to simplified trust management in IIoT devices.Thus,the experimental results show the adaptability and resilience of our suggested confidence model against behavioral changes in hostile settings in IIoT networks.The experimental results show that our proposed method,BCEPP,has the following,when compared to other methods:high computational cost of 95.3%,low latency ratio of 28.5%,increased data transmitting rate up to 94.1%,enhanced security rate of 98.6%,packet reception ratio of 96.1%,user satisfaction index of 94.5%,and probability ratio of 33.8%.