期刊文献+
共找到439篇文章
< 1 2 22 >
每页显示 20 50 100
Research of Internet Trust Based on the Game Theory
1
作者 Xu Qionglai Tang Shoulian 《China Communications》 SCIE CSCD 2008年第1期54-57,共4页
This paper analyses adverse selection by signalingmodel and imcomplete information static game modelafter the review of Internet trust. The results showthat establishing credit grades system, decreasingcost difference... This paper analyses adverse selection by signalingmodel and imcomplete information static game modelafter the review of Internet trust. The results showthat establishing credit grades system, decreasingcost differences of Internet goods, increasing Internetmerchants participating in marking a price, reducingmerchants’ cost, concentrating purchase can improveInternet trust. The theoretical bias is provided for theresearch of trust in Internet. 展开更多
关键词 internet trust ADVERSE selection SIGNALING imcomplete information STATIC GAME
在线阅读 下载PDF
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement 被引量:10
2
作者 Bei Gong Yubo Wang +2 位作者 Xiangang Liu Fazhi Qi Zhihui Sun 《China Communications》 SCIE CSCD 2018年第2期100-121,共22页
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the... Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance. 展开更多
关键词 internet of things: trusted mea-surement trusted attestation: group signature
在线阅读 下载PDF
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme 被引量:1
3
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 Pervasive computing vehicular networks SECURITY trust decision schemes trusted internet of vehicles big data
在线阅读 下载PDF
Trust Attestation Mechanism for the Sensing Layer Nodes of Internet of Things 被引量:1
4
作者 WANG Yubo GONG Bei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第4期337-345,共9页
The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data sourc... The main function of Internet of Things is to collect and transmit data.At present,the data transmission in Internet of Things lacks effective trust attestation mechanism and trust traceability mechanism of data source.To solve the above problems,a trust attestation mechanism for sensing layer nodes is presented.First a trusted group is established,and the node which is going to join the group needs to attest its identity and key attributes to the higher level node.Then the dynamic trust measurement value of the node can be obtained by measuring the node data transmission behavior.Finally the node encapsulates the key attributes and trust measurement value to use short message group signature to attest its trust to the challenger.This mechanism can measure the data sending and receiving behaviors of sensing nodes and track the data source,and it does not expose the privacy information of nodes and the sensing nodes can be traced effectively.The trust measurement for sensing nodes and verification is applicable to Internet of Things and the simulation experiment shows the trust attestation mechanism is flexible,practical and efficient.Besides,it can accurately and quickly identify the malicious nodes at the same time.The impact on the system performance is negligible. 展开更多
关键词 internet of Things source of data trust measurement trust attestation
原文传递
Research of Internet Trade Trust Based on the KMRW Reputation Model
5
作者 Xu Qionglai Tang Shoulian 《China Communications》 SCIE CSCD 2008年第2期77-82,共6页
The paper discusses the Internet trade trust problemby using KMRW reputation model in incompleteinformation limited repeated game,concluding thatin certain conditions,both Internet trade participatorswill give up shor... The paper discusses the Internet trade trust problemby using KMRW reputation model in incompleteinformation limited repeated game,concluding thatin certain conditions,both Internet trade participatorswill give up short-time revenue for maximizinglong-term revenue and accordingly employ the cooperationstrategy,and the times of cooperation isvulnerable to trade price and product utility.At last,the paper proposes several policies and suggestionssuch as forming Internet honesty culture,strengtheningInternet brand and figure and protecting Internetwell-known brands. 展开更多
关键词 internet trust KMRW REPUTATION model INCOMPLETE information internet BRAND
在线阅读 下载PDF
Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing 被引量:5
6
作者 Weijin Jiang Yang Wang +3 位作者 Yirong Jiang Jiahui Chen Yuhui Xu Lina Tan 《China Communications》 SCIE CSCD 2019年第7期174-194,共21页
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per... This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large. 展开更多
关键词 MOBILE internet CLOUD COMPUTING MOBILE agent system SUBJECTIVE trust dynamic trust management
在线阅读 下载PDF
Security Architecture on the Trusting Internet of Things 被引量:2
7
作者 Bing Zhang Xin-Xin Ma Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2011年第4期364-367,共4页
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi... By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided. 展开更多
关键词 Combined public key elliptic curves cryptography internet of Things radio frequency identification security system trusting system.
在线阅读 下载PDF
一个基于信任的嵌入式Internet协同工作模型 被引量:5
8
作者 林涛 王济勇 +2 位作者 韩光洁 王金东 赵海 《通信学报》 EI CSCD 北大核心 2004年第3期134-143,共10页
提出了一种基于社会信任关系的协同工作网络模型,并将其应用在嵌入式Internet系统中,在嵌入式Internet系统中,每一个嵌入设备都是整个嵌入式分布网络中的一个端点,端点之间可以协作完成某一复杂功能,如分布式计算,普适计算等。在协作过... 提出了一种基于社会信任关系的协同工作网络模型,并将其应用在嵌入式Internet系统中,在嵌入式Internet系统中,每一个嵌入设备都是整个嵌入式分布网络中的一个端点,端点之间可以协作完成某一复杂功能,如分布式计算,普适计算等。在协作过程中,端点之间逐步形成了一种相互信任的关系,这种关系以信任表的形式存在本地端点中,并通过不断的自学习来修改信任表。本文给出了信任模型的建立过程以及信任参数的更新和传递算法,最后在文中还给出了一个使用此模型的实例。 展开更多
关键词 信任 嵌入式internet 端点 协同工作
在线阅读 下载PDF
Internet应用安全中的信任研究与进展 被引量:1
9
作者 汪永好 曾广平 +1 位作者 肖超恩 张青川 《计算机科学》 CSCD 北大核心 2010年第9期28-31,共4页
Internet是计算机应用未来运行的主流平台,由于Internet环境的开放性和复杂性,传统的ACL、PKI技术已不能完全解决计算机应用的安全问题。以安全凭证为基础的信任管理技术和以历史交往经验及推荐经验为基础的信任评估技术,利用主体间的... Internet是计算机应用未来运行的主流平台,由于Internet环境的开放性和复杂性,传统的ACL、PKI技术已不能完全解决计算机应用的安全问题。以安全凭证为基础的信任管理技术和以历史交往经验及推荐经验为基础的信任评估技术,利用主体间的信任关系来解决开放协同环境中的信任问题,是目前Internet应用安全中的研究热点。基于此,对目前国内外的信任管理和信任评估技术的研究现状做了分析和总结,指出了它们的优势与不足,并探讨了In-ternet应用安全中信任问题的未来研究方向。 展开更多
关键词 internet应用 信任 信任管理 信任评估
在线阅读 下载PDF
分布式信任模型在嵌入式Internet中的应用研究 被引量:1
10
作者 魏守智 林涛 赵海 《航空计算技术》 2007年第2期103-107,共5页
为了充分利用嵌入式设备的联合处理能力,嵌入式设备之间必须进行一系列的合作。信任是人们进行社会交往的基础,人们之间的信任关系在不断地更新和传递。依据这种原理,提出了一种基于社会信任关系的协同工作分布式网络模型。嵌入式Inter... 为了充分利用嵌入式设备的联合处理能力,嵌入式设备之间必须进行一系列的合作。信任是人们进行社会交往的基础,人们之间的信任关系在不断地更新和传递。依据这种原理,提出了一种基于社会信任关系的协同工作分布式网络模型。嵌入式Internet系统中的设备在协作过程中,互相之间逐步形成了一种相互信任的关系,这种关系以信任表的形式存在本地端点中,并通过不断地自学习来修改信任表。给出了信任模型的建立过程以及信任参数的更新和传递算法,应用实例表明了模型的有效性。 展开更多
关键词 嵌入式INTEMET 分布式信任模型 端点 协同工作
在线阅读 下载PDF
多级安全策略的Internet防火墙的设计与实施 被引量:1
11
作者 王辉 邵佩英 《中国科学院研究生院学报》 CAS CSCD 2000年第2期99-104,共6页
针对目前网络安全的紧迫形势 ,指出了传统防火墙的缺陷 ,将多级安全策略用于网络访问控制 ,提出了具有多级安全思想的Internet防火墙 ,并进行了设计与实施 .
关键词 防火墙 internet 多级安全 安全模型 可信网关 网络安全
在线阅读 下载PDF
网民对食品安全网络舆情中媒体信息的接受意愿——基于TRUST&TAM综合模型 被引量:8
12
作者 洪巍 杜忠莲 吴祐昕 《系统工程》 CSSCI CSCD 北大核心 2016年第3期142-148,共7页
为了分析食品安全网络舆情中网民对媒体信息接受意愿的影响因素,探寻提高媒体舆情引导作用的有效手段,以TRUST&TAM综合模型为基础,构建网民对媒体食品安全网络信息接受行为的假设模型,并运用全国12个省共48个城市网民的调研数据对... 为了分析食品安全网络舆情中网民对媒体信息接受意愿的影响因素,探寻提高媒体舆情引导作用的有效手段,以TRUST&TAM综合模型为基础,构建网民对媒体食品安全网络信息接受行为的假设模型,并运用全国12个省共48个城市网民的调研数据对假设模型进行实证研究。研究结果显示:对于网民对媒体信息的接受意愿,感知有用性与信任是两个重要的影响因素,前者对接受意愿的影响最大,后者在直接影响接受意愿的同时还通过影响感知有用性间接地对其产生影响;对于网民对媒体信息的信任,基于制度的结构性保证的影响最大。基于研究结果,提出应通过提高信息发布的及时性、针对性、实用性、建立健全信息发布的制度规范等手段直接或间接地增强网民对媒体信息的接受意愿。 展开更多
关键词 食品安全网络舆情 媒体 实证研究 trust&TAM综合模型
原文传递
Research and Implementation of the SDN Resources Transaction Process Based on Trust Mechanism
13
作者 ZHUGE Bin PENG Dan +1 位作者 BU Xiaobo WANG Weiming 《China Communications》 SCIE CSCD 2016年第S1期190-207,共18页
SDN network as new network architecture,can address a range of issues of the current internet effectively,this paper in the view of SDN network resources' allocation,for decreasing resources waste and achieving a ... SDN network as new network architecture,can address a range of issues of the current internet effectively,this paper in the view of SDN network resources' allocation,for decreasing resources waste and achieving a reasonable distribution of SDN resources,come up with a suitable resource price negotiation algorithm based on trust mechanism in SDN network environment.According to the characteristics of the trust mechanism,simulating on the unit utility and equivalent price of SDN network resources in three aspects(remove individual malicious nodes,remove most malicious nodes and remove all malicious nodes),through the above simulation,combined trust mechanism with MCDAM algorithm,can form a weighing system which pricing and trust comprehensive competitive,so that the whole SDN trading environment become safer and more stable.So trust mechanism as the patch of SDN pricing negotiation algorithm.Finally,propose the planned trading model based on trust mechanism as a management method of SDN trading. 展开更多
关键词 SDN internet RESOURCES trust mechanism PLANNED TRADING
在线阅读 下载PDF
A Sensing Layer Network Resource Allocation Model Based on Trusted Groups
14
作者 Bei Gong Xipeng Zhang +2 位作者 Shen He Nan Tian Yubo Wang 《China Communications》 SCIE CSCD 2019年第10期151-173,共23页
There are many heterogeneous sensing nodes in the sensing layer of the Internet of Things, and the amount of data transmission is huge, which puts high requirements on the allocation of network bandwidth. At the same ... There are many heterogeneous sensing nodes in the sensing layer of the Internet of Things, and the amount of data transmission is huge, which puts high requirements on the allocation of network bandwidth. At the same time, untrusted sensing nodes maliciously invade network resources. Therefore, how to confirm whether a sensing node is trusted and reasonably allocate network resources is an urgent problem to be solved. To resolve this issue, this paper proposes a sensing network resource allocation model based on trusted groups. Through the sensing node computing environment and behavior measurement, we can identify and exclude untrusted nodes, so the trusted group can be built. Then the network resources are distributed from a global perspective. Based on the available bandwidth of the link, a network resource fusion model of IPv4 and IPv6 is proposed. On this basis, a global network resource allocation model is further proposed. Afterwards, real-time monitoring of data transmission behavior ensures data security during transmission. Simulation experiments show that this mechanism can effectively optimize the bandwidth allocation in the data transmission process and has little effect on the running efficiency of existing network applications. At the same time, it can effectively guarantee the trust of nodes and achieve trusted data transmission. 展开更多
关键词 internet of THINGS trust measurement link BANDWIDTH network resource ALLOCATION data transmission
在线阅读 下载PDF
基于区块链的协作式车联网信任管理方案 被引量:1
15
作者 张海波 谭茂煌 +2 位作者 徐勇军 李方伟 王明月 《电子与信息学报》 北大核心 2025年第3期720-728,共9页
针对车联网(IoV)中传统信任管理方案对恶意车辆的识别假阳率高、无法满足多样化服务且传统共识算法不适用于当前车联网环境的问题,该文提出了基于区块链的协作式车联网信任管理方案。构建了基于狄利克雷分布的信任管理模型,将车辆信任... 针对车联网(IoV)中传统信任管理方案对恶意车辆的识别假阳率高、无法满足多样化服务且传统共识算法不适用于当前车联网环境的问题,该文提出了基于区块链的协作式车联网信任管理方案。构建了基于狄利克雷分布的信任管理模型,将车辆信任和协作服务划分为多个等级,针对不同服务调整信任等级阈值。设计了具有反馈机制的信任等级评价算法,考虑协作车辆当前状态、邻居推荐、历史信任信息、服务质量4方面因素,从协作前、后两阶段对协作车辆信任等级进行评价。改进了传统的工作量证明(PoW)共识算法,动态调整矿工节点出块难度。仿真结果表明,相比同类方案,所提方案在保证能够高效识别恶意节点的前提下,还能够进一步降低识别假阳率,提高协作成功率和共识效率。 展开更多
关键词 车联网 信任管理 区块链 车辆协作 共识算法
在线阅读 下载PDF
基于贝叶斯网络预测的车联网信任管理方案
16
作者 张红斌 李姿 赵冬梅 《计算机仿真》 2025年第12期505-510,共6页
针对车联网中存在信任初始化和评估准确率低的问题,提出一个基于贝叶斯网络方法进行道路预测的信任管理方案。首先,在信任初始化中引入环境因素利用贝叶斯网络进行道路情况预测,根据车辆消息是否符合预测结果赋予信任初值,提高了模型在... 针对车联网中存在信任初始化和评估准确率低的问题,提出一个基于贝叶斯网络方法进行道路预测的信任管理方案。首先,在信任初始化中引入环境因素利用贝叶斯网络进行道路情况预测,根据车辆消息是否符合预测结果赋予信任初值,提高了模型在面临初始化问题的评估准确性。其次,从信任处理方面考虑,引入了自适应的遗忘因子和余弦相似度来改进信任评估的方法,提高了模型准确率的同时也使其具有很好的抗攻击性。通过对比实验最终得到本文模型在恶意节点比例为40%时依然具有较高的评估准确率,仿真结果表明,所提模型可以有效识别恶意节点,并具有较好的抗开关攻击能力。 展开更多
关键词 车联网 信任管理 信任评估 贝叶斯网络
在线阅读 下载PDF
我国公众互联网使用对县级政府公信力的影响——基于CSS 2021数据的分析 被引量:2
17
作者 李斌 孙雪 方錄 《重庆理工大学学报(社会科学)》 2025年第2期158-177,共20页
政府公信力是公众基于政府履职行为而产生的信任评价,是政府永恒追求的主题。为深入研究数字时代公众的互联网使用对县级政府公信力的影响,在“把关人”理论和媒体抑郁症理论基础上,以中国社会状况综合调查(CSS)为数据来源,综合运用多... 政府公信力是公众基于政府履职行为而产生的信任评价,是政府永恒追求的主题。为深入研究数字时代公众的互联网使用对县级政府公信力的影响,在“把关人”理论和媒体抑郁症理论基础上,以中国社会状况综合调查(CSS)为数据来源,综合运用多元回归和因子分析等方法进行研究。研究发现:新时代以来,我国县级政府公信力水平从2013年的2.59增加到2021年的3.06;网民和非网民的政府信任水平同样呈现逐步递增的态势。是否使用互联网显著影响了公众的政府信任水平,网民的政府信任水平低于非网民的政府信任水平;公众使用互联网且有一定使用频率时,互联网使用频率对县级政府公信力无显著影响,而互联网使用频率对县级政府公信力存在的负向显著影响是由公众从“从不使用互联网到使用互联网”这一转变的负向效应所带来的;公众不同的互联网使用方式对县级政府公信力影响不存在显著差异,发展型使用和娱乐型使用均不显著影响县级政府公信力。同时,个体的受教育水平在是否使用互联网对县级政府公信力的负向影响中发挥抑制作用。 展开更多
关键词 数字时代 互联网使用 政府公信力 CSS数据 政府信任
在线阅读 下载PDF
舰船物联网终端的零信任安全架构设计与漏洞检测方法
18
作者 徐增勇 崔源 《舰船科学技术》 北大核心 2025年第23期189-193,共5页
为解决传统舰船网络安全边界模糊、终端自身安全防护能力薄弱等问题,研究舰船物联网终端的零信任安全架构设计与漏洞检测方法。构建舰船物联网终端零信任安全架构,终端层利用零信任客户端(Zero Trust Client,ZTC)获取物联网终端行为数... 为解决传统舰船网络安全边界模糊、终端自身安全防护能力薄弱等问题,研究舰船物联网终端的零信任安全架构设计与漏洞检测方法。构建舰船物联网终端零信任安全架构,终端层利用零信任客户端(Zero Trust Client,ZTC)获取物联网终端行为数据、漏洞数据,提交给边缘层后,通过信任存储引擎保存至区块链。在零信任引擎的3个虚拟机上部署策略引擎(Policy Engine,PE)、策略管理员(Policy Administrator,PA)、策略执行点(Policy Enforcement Point,PEP)零信任组件,由漏洞检测模块调用终端漏洞数据,通过特征提取与相似度比对实现终端漏洞检测。信任评估模块利用LSTM网络处理终端行为数据,生成规则化信任因素,采用Beta分布量化信任因素,生成基础信任值,结合漏洞检测结果与时间衰减因子确定动态信任值,实现失陷终端识别、隔离以及可信终端的认证,将认证结果提交云层,由其提供与终端权限相符的资源与服务。实验结果表明:该方法可实现终端漏洞的准确检测,决策参数为0.5时,F1 score指标为0.90;可实现失陷终端的隔离以及可信终端的认证。 展开更多
关键词 物联网终端 零信任 漏洞检测 信任因素 信任评估
在线阅读 下载PDF
区块链赋能的可信雾计算资源分配方法
19
作者 赵小虎 刘桁琳 王越 《计算机工程与设计》 北大核心 2025年第5期1318-1326,共9页
为解决雾环境中恶意节点的存在所造成系统资源分配整体收益低、节点间不可信问题,提出一种基于区块链技术的可信雾计算资源分配方法,保证可信节点的利益。将资源分配过程建模为区块链上的交易,对参与交易节点构建信任模型,采用节点信誉... 为解决雾环境中恶意节点的存在所造成系统资源分配整体收益低、节点间不可信问题,提出一种基于区块链技术的可信雾计算资源分配方法,保证可信节点的利益。将资源分配过程建模为区块链上的交易,对参与交易节点构建信任模型,采用节点信誉评估算法实现对不可信节点的筛选;考虑节点信誉度、需求和资源分配条件,以时延和能耗优化加权和作为系统整体增益,制定最大化系统增益优化问题;利用可信模拟退火算法对优化问题求解,得到最优分配策略。仿真结果验证了该方法的可靠性和有效性。 展开更多
关键词 雾计算 物联网 区块链 资源分配 任务卸载 信任计算 模拟退火优化算法
在线阅读 下载PDF
数字化认同:电商直播中的消费信任构建 被引量:3
20
作者 林傲耸 刘少杰 《学习与探索》 北大核心 2025年第6期93-100,175,共9页
在电商直播中,直播观看者的群体规模庞大、消费行动清晰可见,作为个体的观看者之所以信任直播间并产生消费行为,不仅仅是因为与直播方的信息交流和情感联动,还因为个体观看者信任其所在的观看者群体的评价并认可其行动。观看者群体层面... 在电商直播中,直播观看者的群体规模庞大、消费行动清晰可见,作为个体的观看者之所以信任直播间并产生消费行为,不仅仅是因为与直播方的信息交流和情感联动,还因为个体观看者信任其所在的观看者群体的评价并认可其行动。观看者群体层面的数字化认同,通过直播间页面上的象征群体规模的数字符号和象征群体性消费及评价的更新变动,被直观地展现在电商直播的消费场景中,是影响观看者建构对直播间及其商品信任的重要因素。直播方会引导观看者参与留有数字痕迹的活动,或直接调整数字和评价的呈现时间,以营造数字化认同,展现直播被“围观”、商品被“疯抢”、直播间及商品被“认可”的状态,让观看者信任从而产生消费行动。“网红”经济的“红”,恰恰是来自网络社会中数字化认同的积累和营造。 展开更多
关键词 电商直播 消费信任 数字化认同 “网红”
在线阅读 下载PDF
上一页 1 2 22 下一页 到第
使用帮助 返回顶部