期刊文献+
共找到582篇文章
< 1 2 30 >
每页显示 20 50 100
Modelling the Roles of Cewebrity Trust and Platform Trust in Consumers’Propensity of Live-Streaming:An Extended TAM Method 被引量:9
1
作者 Donghui Li Guozheng Zhang +4 位作者 Zeng Xu Yong Lan Yongdong Shi Zhiyao Liang Haiwen Chen 《Computers, Materials & Continua》 SCIE EI 2018年第4期137-150,共14页
Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from t... Live streaming is a booming industry in China,involving an increasing number of Internet users.Previous studies show that trust is a cornerstone to develop ecommerce.Trust in the streaming industry is different from that of other e-commerce areas.There are two major dimensions of trust in the live streaming context:platform trust and cewebrity trust,which are both important for customers to adopt and reuse a specific live streaming service.We collected questionnaire data from 520 participates who have used live streaming services in China.We model the collected data and identified factors that can influence users’propensity by an extended technology acceptance model(TAM)method.According to our analysis,both cewebrity trust and platform trust will greatly influence users’intention to reuse a certain platform.Moreover,results also indicate that cewebrity trust is far more important than platform trust.These findings can lead to several management strategies to improve the adherence of users to streaming platforms. 展开更多
关键词 Live streaming extended TAM approach consumers’propensity cewebrity trust platform trust
暂未订购
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
2
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
在线阅读 下载PDF
The Mechanism about Key and Credential on Trusted Computing Platform and the Application Study 被引量:2
3
作者 SHEN Zhidong ZHANG Huanguo ZHANG Miao YAN Fei ZHANG Liqiang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1641-1644,共4页
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry... Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system. 展开更多
关键词 trusted computing trusted platform module (TPM) key management CREDENTIAL
在线阅读 下载PDF
TPM Context Manager and Dynamic Configuration Management for Trusted Virtualization Platform 被引量:1
4
作者 QIN Yu FENG Dengguo LIU Chunyong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期539-546,共8页
It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen who... It is absolutely critical that trusted configuration management which significantly affects trust chain establishment, sealing storage and remote attestation, especially in trusted virtualization platform like Xen whose system configuration changes easily. TPM (trusted platform module) context manager is presented to carry out dynamic configuration management for virtual machine. It manages the TPM command requests and VM (virtual machine) configurations. The dynamic configuration representa- tion method based on Merkle hash tree is explicitly proposed against TCG (trusted computing group) static configuration representation. It reflects the true VM status in real time even if the configuration has changed, and it eliminates the invalidation of configuration representation, sealing storage and remote attestation. TPM context manager supports TCG storage protection, remote attestation etc, which greatly enhances the security on trusted virtualization platform. 展开更多
关键词 trusted computing TPM trusted platform module) trusted virtualization configuration representation configuration management
在线阅读 下载PDF
Merkle Tree Digital Signature and Trusted Computing Platform 被引量:1
5
作者 WANG Xiaofei HONG Fan TANG Xueming CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1467-1472,共6页
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu... Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios. 展开更多
关键词 digital signature one-time signature Merkle tree trusted computing platform
在线阅读 下载PDF
基于Trustzone的强安全需求环境下可信代码执行方案 被引量:23
6
作者 张英骏 冯登国 +1 位作者 秦宇 杨波 《计算机研究与发展》 EI CSCD 北大核心 2015年第10期2224-2238,共15页
针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控... 针对工业4.0等具有强安全需求、计算功能相对固定的新型信息化应用场景,基于白名单思想提出了1种移动嵌入式平台可信代码执行方案.利用ARM Trustzone硬件隔离技术构建可信执行环境,结合ARM虚拟内存保护机制,构造内核飞地,确保系统监控模块无法被不可信内核篡改或绕过.以此为基础为可信进程提供可执行文件完整性、运行时代码完整性、控制流完整性3种层次的白名单保护,确保设备只能执行符合白名单策略的授权代码.通过构建通信客户端进程与Trustzone安全世界的安全共享内存区,利用Trustzone对外设中断事件的控制能力构建可信时钟中断源,确保Trustzone安全世界与中控服务器通信的隐私性、不可屏蔽性.在此基础上设计安全的白名单更新与平台状态证明协议.在真实设备上实现了原型系统,实验结果证明了该方案的安全性和较为理想的运行效率. 展开更多
关键词 白名单 可信代码执行 trustzone技术 可信执行环境 内核飞地 平台状态证明
在线阅读 下载PDF
人工智能赋能中医药脾胃病可信联合循证分析平台构建策略
7
作者 王斌 庄荟瑛 +7 位作者 满志陶 任立峰 何畅 吴琛 胡旭磊 温宵宵 谢成功 唐旭东 《中医杂志》 北大核心 2026年第1期95-102,共8页
概述人工智能的发展及其在中医研究中的应用,并说明大模型、知识图谱与自然语言处理在深化证候识别、处方生成和机理探索等方面的作用与优势。以脾胃病为例,论证人工智能在古籍知识挖掘、临床精准辨证、药效/安全性预测和智能教育等环... 概述人工智能的发展及其在中医研究中的应用,并说明大模型、知识图谱与自然语言处理在深化证候识别、处方生成和机理探索等方面的作用与优势。以脾胃病为例,论证人工智能在古籍知识挖掘、临床精准辨证、药效/安全性预测和智能教育等环节的赋能效应,展示了数据驱动、知识驱动到智能驱动的研究范式升级。针对跨机构数据协作的隐私与是否合规的难点,提出区块链-智能合约、联邦学习、安全多方计算的“中医药脾胃病可信联合循证分析平台”。人工智能与隐私保护计算的深度融合正在重塑中医脾胃病研究与临床实践,为构建高质量、可信赖的中医药大数据生态与实现精准辨证提供了可行路径和技术框架。 展开更多
关键词 脾胃病 人工智能 中医药数据 可信联合循证分析平台
原文传递
电商平台纠纷解决中的信任机制研究
8
作者 王朕 《物流科技》 2026年第2期47-49,59,共4页
随着互联网技术的飞速发展,人工智能时代已经来临,电商平台已经成为人们生活中不可或缺的一部分。它在为人们带来便捷购物体验的同时,也产生了关于买卖双方的大量纠纷。随着在线纠纷解决机制在电商平台的成功实践,其在纠纷解决和诉讼分... 随着互联网技术的飞速发展,人工智能时代已经来临,电商平台已经成为人们生活中不可或缺的一部分。它在为人们带来便捷购物体验的同时,也产生了关于买卖双方的大量纠纷。随着在线纠纷解决机制在电商平台的成功实践,其在纠纷解决和诉讼分流中的重要性日益凸显。电商平台的纠纷解决机制是数字化创新的重要部分,数字时代的到来重新定义了电商平台的信任机制,推动了司法体系和社会数字化转型。 展开更多
关键词 电商平台 在线纠纷解决机制 ODR 信任机制
在线阅读 下载PDF
A Behavior-Based Remote Trust Attestation Model 被引量:10
9
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
在线阅读 下载PDF
Implementing Operating System Support for Extended Trusted Path in TPM-Capable Environments 被引量:3
10
作者 SHI Wenchang 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1493-1497,共5页
Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of truste... Trusted path is one of the crucial features that operating systems must provide for fundamental security support. In order to explore the possibility of implementing a trusted path mechanism with the support of trusted platform module (TPM) technologies, and to support TPM capabilities in operating systems, the paper extended the scope of the conventional trusted path to cover the situation in which a user communicates with software residing on a remote host. The paper combined the concept of operating system support for trusted path with that for TPM platforms, and proposed the architecture of an extended trusted path mechanism in operating system with considerations on TPM-capable platforms support. As part of the author's research in secure operating systems, the work of the paper was carried out with Linux as an experimental prototype system. The research result shows that TPM capabilities can strengthen extended trusted path mechanisms of operating systems. 展开更多
关键词 operating system trusted path trusted platform module (TPM) trusted software
在线阅读 下载PDF
An Improved Grid Security Infrastructure by Trusted Computing 被引量:3
11
作者 YAN Fei ZHANG Huanguo +3 位作者 SUN Qi SHEN Zhidong ZHANG Liqiang QIANG Weizhong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1805-1808,共4页
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled ... Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment. 展开更多
关键词 trusted computing grid computing grid security trusted platform module
在线阅读 下载PDF
Modeling Trusted Computing 被引量:3
12
作者 CHEN Shuyi WEN Yingyou ZHAO Hong 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1507-1510,共4页
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation... In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems. 展开更多
关键词 trusted computing group (TCG) trusted platform module (TPM) trusted computing root of trust predicate logic
在线阅读 下载PDF
Cyber-Physical-Social System Between a Humanoid Robot and a Virtual Human Through a Shared Platform for Adaptive Agent Ecology 被引量:3
13
作者 S. M. Mizanoor Rahman 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2018年第1期190-203,共14页
Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physica... Two artificial agents(a humanoid robot and a virtual human) are enriched with various similar intelligence,autonomy, functionalities and interaction modalities. The agents are integrated in the form of a cyber-physical-social system(CPSS) through a shared communication platform to create a social ecology. In the ecology, the agents collaborate(assist each other) to perform a real-world task(search for a hidden object)for the benefits of humans. A robot-virtual human bilateral trust model is derived and a real-time trust measurement method is developed. The role of taking initiative in the collaboration is switched between the agents following a finite state machine model triggered by bilateral trust, which results in a mixedinitiative collaboration. A scheme is developed to evaluate the performance of the agents in the ecology through the CPSS.The results show that the robot and the virtual human perform satisfactorily in the collaboration through the CPSS. The results thus prove the effectiveness of the real-world ecology between artificial agents of heterogeneous realities through a shared platform based on trust-triggered mixed-initiatives. The results can help develop adaptive social ecology comprising intelligent agents of heterogeneous realities to assist humans in various tasks through collaboration between the agents in the form of a CPSS. 展开更多
关键词 Adaptive agent ecology assisted living cyberphysical-social system(CPSS) humanoid robot(HR) smart homes social interaction virtual human(VH) shared platform trust
在线阅读 下载PDF
开源大数据平台助力供应链金融企业数字化转型的研究与实践
14
作者 王伟鲜 《数字化转型》 2026年第3期78-87,共10页
数字经济背景下,供应链金融企业的数字化转型迫切需要破解“数据孤岛”与决策效率低下等难题。文章构建基于Hadoop与Spark的开源大数据平台,并结合企业级开源治理流程、软件物料清单以及数据治理平台,形成了一套贯穿数据采集、数据治理... 数字经济背景下,供应链金融企业的数字化转型迫切需要破解“数据孤岛”与决策效率低下等难题。文章构建基于Hadoop与Spark的开源大数据平台,并结合企业级开源治理流程、软件物料清单以及数据治理平台,形成了一套贯穿数据采集、数据治理、数据资产以及智能应用的供应链金融服务体系。同时,以企业实际为例,展示其在数字化营销、自动化审单、智能化融资放款等环节的应用成效,并通过版本对比与审计留痕确保结论可复核,并进一步从产业融合的视角探讨数据可信共享、技术标准统一与产业协同治理等关键挑战,提出相应策略,旨在为供应链金融数字化与新型产融生态建设提供实践参考。 展开更多
关键词 数字经济 大数据平台 供应链金融 开源治理 数据可信共享
在线阅读 下载PDF
个人信息自决权的权能拓展——以大型平台企业为视角
15
作者 孙铭 《河南财经政法大学学报》 2026年第2期69-85,共17页
大型平台企业主导的数字生态中,传统“控制即自决”理论范式受限于个体中心主义以及静态控制与单向行权逻辑,难以应对数据价值共创现实与平台系统性权力挑战,致使个人发展权益落空。个人信息自决权从控制到发展的理论范式转向根植于人... 大型平台企业主导的数字生态中,传统“控制即自决”理论范式受限于个体中心主义以及静态控制与单向行权逻辑,难以应对数据价值共创现实与平台系统性权力挑战,致使个人发展权益落空。个人信息自决权从控制到发展的理论范式转向根植于人格自由、分配正义与系统治理三重法理,通过重构权利内涵与行权方式,确立个人作为参与数据价值分享与数据规则塑造的能动主体地位。该理念的实现需要双重权能拓展:一是创设个人数据收益权,通过构建数据信托机制,保障个人公平分享数据贡献产生的衍生价值;二是创设治理参与权,通过在平台内部建立含用户代表的数据治理委员会,并依托消费者协会拓展外部职能,赋予个体参与平台数据规则制定的资格。两项权能从经济与治理维度重塑平台与用户间的权力—权利关系,为保障数字时代个人自主发展提供制度方案。 展开更多
关键词 平台经济 个人信息自决权 数据信托 个人数据收益权 治理参与权
在线阅读 下载PDF
Architecture of Trusted PC
16
作者 WU Shuhua ZHU Yuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1433-1436,共4页
This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware ... This paper, focusing on the trusted computing group's standards, explained the key concept of trusted compuling and provided the architecture of trusted PC. It built trust bottom-up by starting with trusted hardware and adding layers of trusted software. It is a system-level solution available to all applications running on the member platforms. This solution reduces the security burden on applications and thus simplifies application programming. 展开更多
关键词 ARCHITECTURE trusted PC trusted platform
在线阅读 下载PDF
BBACIMA:A Trustworthy Integrity Measurement Architecture through Behavior-Based TPM Access Control
17
作者 YU Aimin FENG Dengguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第5期513-518,共6页
Two limitations of current integrity measurement architectures are pointed out:(1)a reference value is required for every measured entity to verify the system states,as is impractical however;(2)malicious user can for... Two limitations of current integrity measurement architectures are pointed out:(1)a reference value is required for every measured entity to verify the system states,as is impractical however;(2)malicious user can forge proof of inexistent system states.This paper proposes a trustworthy integrity measurement architecture,BBACIMA,through enforcing behavior-based access control for trusted platform module(TPM).BBACIMA introduces a TPM reference monitor(TPMRM)to ensure the trustworthiness of integrity measurement.TPMRM enforces behavior-based access control for the TPM and is isolated from other entities which may be malicious.TPMRM is the only entity manipulating TPM directly and all PCR(platform configuration register)operation requests must pass through the security check of it so that only trusted processes can do measurement and produce the proof of system states.Through these mechanisms malicious user can not enforce attack which is feasible in current measurement architectures. 展开更多
关键词 integrity measurement behavior-based access control trusted platform module(TPM) trusted computing remoteattestation
在线阅读 下载PDF
A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology 被引量:2
18
作者 WANG Juan LIN Wutao +3 位作者 LI Haoyu DU Bianxia MENG Ke WANG Jiang 《Wuhan University Journal of Natural Sciences》 CAS 2014年第5期379-384,共6页
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t... In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well. 展开更多
关键词 trusted computing mobile payment VIRTUALIZATION mobile platform
原文传递
Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing
19
作者 Abdul Saboor Mohd Fadzil Hassan +4 位作者 Rehan Akbar Erwin Susanto Syed Nasir Mehmood Shah Muhammad Aadil Siddiqui Saeed Ahmed Magsi 《Computers, Materials & Continua》 SCIE EI 2022年第11期2223-2239,共17页
Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and avail... Cloud computing has gained significant use over the last decade due to its several benefits,including cost savings associated with setup,deployments,delivery,physical resource sharing across virtual machines,and availability of on-demand cloud services.However,in addition to usual threats in almost every computing environment,cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm.Furthermore,since there are a growing number of attacks directed at cloud environments(including dictionary attacks,replay code attacks,denial of service attacks,rootkit attacks,code injection attacks,etc.),customers require additional assurances before adopting cloud services.Moreover,the continuous integration and continuous deployment of the code fragments have made cloud services more prone to security breaches.In this study,the model based on the root of trust for continuous integration and continuous deployment is proposed,instead of only relying on a single signon authentication method that typically uses only id and password.The underlying study opted hardware security module by utilizing the Trusted Platform Module(TPM),which is commonly available as a cryptoprocessor on the motherboards of the personal computers and data center servers.The preliminary proof of concept demonstrated that the TPM features can be utilized through RESTful services to establish the root of trust for continuous integration and continuous deployment pipeline and can additionally be integrated as a secure microservice feature in the cloud computing environment. 展开更多
关键词 Root of trust(RoT) trusted platform Module(TPM) cryptoprocessor microservices Hardware Security Modules(HSM) DevOps
在线阅读 下载PDF
基于SOR理论的患者线上医疗平台使用行为研究 被引量:1
20
作者 戴璟 张晓龙 +2 位作者 何璇 龚颖娜 杨云娟 《中国卫生事业管理》 北大核心 2025年第7期740-745,共6页
目的:分析影响患者线上医疗平台择医行为的关键因素,为促进线上医疗平台可持续发展提供决策参考。方法:基于SOR理论与信任源理论构建研究框架,选取技术信任、问诊价格、善意信任、诚实信任、声誉信任及感知信任六个维度,采用多元回归分... 目的:分析影响患者线上医疗平台择医行为的关键因素,为促进线上医疗平台可持续发展提供决策参考。方法:基于SOR理论与信任源理论构建研究框架,选取技术信任、问诊价格、善意信任、诚实信任、声誉信任及感知信任六个维度,采用多元回归分析和bootstrap方法对模型进行验证。结果:研究发现技术信任维度中的医生总患者数(β=0.467,P<0.01)和病友推荐度(β=1.652,P<0.01)对择医行为具有显著正向影响,同时问诊价格(β=0.122,P<0.01)和开通线下预约挂号(β=0.346,P<0.01)也显著影响患者择医决策;荣誉称号(β=0.154,P<0.1)则通过感知信任的完全中介作用影响择医行为,且这种影响存在患者风险特征的调节效应,即高疾病风险患者更依赖问诊价格,而低疾病风险患者更重视荣誉称号;进一步的异质性分析表明,资深医生(≥11年)的病友推荐度和线下预约功能影响更大,而新进医生(<11年)的总患者数和问诊价格影响更显著。结论:建议从优化信号指标体系、发展智能推荐系统、强化多层次信任建设和注重患者情感体验等方面入手,提升线上医疗平台服务质量,促进医疗资源可及性改善。 展开更多
关键词 线上医疗平台 信任 SOR理论 中介效应
暂未订购
上一页 1 2 30 下一页 到第
使用帮助 返回顶部