mobile social networks
Recently Published Documents


TOTAL DOCUMENTS

670
(FIVE YEARS 137)

H-INDEX

39
(FIVE YEARS 7)

2021 ◽  
Author(s):  
Zijie Yang ◽  
Binghui Wang ◽  
Haoran Li ◽  
Dong Yuan ◽  
Zhuotao Liu ◽  
...  

Author(s):  
Jorge Serrano-Malebrán ◽  
Jorge Arenas-Gaitán

AbstractThe aim of this research is to find a segment of consumers of fashion products based on their personal visions of personalization of shoppable ads on mobile social media. To meet this objective, three operational objectives are defined. First, a theoretical model is evaluated based on the stimulus-organism-response framework (S–O–R). This examines, with a PLS-SEM approach, how the stimulation of personalization will affect consumers' internal cognitive state (perceived usefulness) and consequently generates a behavioral response (intention to buy). Second, we look for fashion consumer segments based on their perception of personalization through prediction-oriented segmentation (PLS-POS). Third, the segments are explained based on three constructs that were considered important in fashion consumption through mobile social networks: purchase intention, concern for privacy, and perception of trend. The inclusion of personalization and the perception of usefulness of advertisements can greatly help the intention to purchase clothing to be understood. The application of a posterior segmentation helps to better understand the different types of users exposed to shoppable ads on mobile social networks and their relationship with the purchase intention, concern for privacy and trend. While the measures and scales were tested in a context of mobile clothing trade, the methodology can be applied to other types of products or services.


2021 ◽  
Vol 17 (9) ◽  
pp. 155014772110412
Author(s):  
Sheng Zhang ◽  
Houzhong Liu ◽  
Caisen Chen ◽  
Zhaojun Shi ◽  
William Wei Song

In opportunistic mobile social networks, nodes are clustered according to their interests or hobbies and take part in different activities regularly. We delve into the temporal and spatial mobility characteristics of network nodes and put forward an activity-based message opportunistic forwarding algorithm. The main idea of the algorithm is that we choose different message forwarding methods according to the situation of nodes participating in activities. If the source node and the destination node are both attend in the same activities, we select the best relay node which has the biggest delivery probability. While the source node and the destination node are not in the same activities at the same time, we need to find the optimal path which owns highest indirect delivery probability, and messages will be transmitted through the optimal path. The simulation results show that the proposed routing algorithm can not only improve the successful delivery ratio of messages but also reduce the network delay and the network overhead obviously, in comparison with the classical opportunistic routing algorithms, such as community-aware message opportunistic transmission algorithm, community-based message transmission scheme algorithm, PRoPHET, Epidemic algorithm, and interest characteristic probability prediction algorithm.


2021 ◽  
Vol 3 (3) ◽  
pp. 250-262
Author(s):  
Jennifer S. Raj

Several subscribing and content sharing services are largely personalized with the growing use of mobile social media technology. The end user privacy in terms of social relationships, interests and identities as well as shared content confidentiality are some of the privacy concerns in such services. The content is provided with fine-grained access control with the help of attribute-based encryption (ABE) in existing work. Decryption of privacy preserving content suffers high consumption of energy and data leakage to unauthorized people is faced when mobile social networks share privacy preserving data. In the mobile social networks, a secure proxy decryption model with enhanced publishing and subscribing scheme is presented in this paper as a solution to the aforementioned issues. The user credentials and data confidentiality are protected by access control techniques that work on privacy preserving in a self-contained manner. Keyword search based public-key encryption with ciphertext policy attribute-based encryption is used in this model. At the end users, ciphertext decryption is performed to reduce the energy consumption by the secure proxy decryption scheme. The effectiveness and efficiency of the privacy preservation model is observed from the experimental results.


Sign in / Sign up

Export Citation Format

Share Document