Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    The Mediating Role of Boundary Creation around Work-Related ICT Use between Segmentation Preference and Psychological Detachment

    Hanying Tang1,2, Meng Ye1,2, Zhiqing E. Zhou3, Zhiyi Gan1,2,*, Hongyu Ma1,2,*

    International Journal of Mental Health Promotion, Vol.20, No.1, pp. 27-40, 2018, DOI:10.32604/IJMHP.2018.010734

    Abstract Work-related use of ICT (W_ICT) at home has been found to relate to important employee outcomes in their work and family lives. However, little is known about how individuals can actively apply strategies or tactics to utilize the advantages or reduce the disadvantages of W_ICT. In the current study, based on boundary theory, we examined the interaction effect of segmentation preference and boundary control in creating the boundary around W_ICT and its subsequent positive effect on individuals’ psychological detachment. Results based on a sample of 560 Chinese full-time employees showed that only for individuals with higher boundary control, segmentation preference… More >

  • Open Access

    ARTICLE

    Personalized Privacy Protecting Model in Mobile Social Network

    Pingshui Wang1,*, Zecheng Wang1, Tao Chen1,2, Qinjuan Ma1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 533-546, 2019, DOI:10.32604/cmc.2019.05570

    Abstract With the rapid development of the new generation of information technology, the analysis of mobile social network big data is getting deeper and deeper. At the same time, the risk of privacy disclosure in social network is also very obvious. In this paper, we summarize the main access control model in mobile social network, analyze their contribution and point out their disadvantages. On this basis, a practical privacy policy is defined through authorization model supporting personalized privacy preferences. Experiments have been conducted on synthetic data sets. The result shows that the proposed privacy protecting model could improve the security of… More >

Displaying 21-30 on page 3 of 22. Per Page