- Technology Adoption and User Behaviour
- Digital Marketing and Social Media
- Information Technology Governance and Strategy
- Service-Oriented Architecture and Web Services
- Sharing Economy and Platforms
- Business Process Modeling and Analysis
- Information and Cyber Security
- Customer Service Quality and Loyalty
- Model-Driven Software Engineering Techniques
- Advanced Malware Detection Techniques
- Software Engineering Techniques and Practices
- Advanced Software Engineering Methodologies
- FinTech, Crowdfunding, Digital Finance
- Network Security and Intrusion Detection
- Gear and Bearing Dynamics Analysis
- Digital Platforms and Economics
- Consumer Retail Behavior Studies
- Online Learning and Analytics
- Security and Verification in Computing
- ICT Impact and Policies
- Advanced machining processes and optimization
- Cloud Computing and Resource Management
- Advanced Measurement and Metrology Techniques
- Privacy, Security, and Data Protection
- Cybercrime and Law Enforcement Studies
First Automotive Works (China)
2024-2025
Tongji University
2024
Northeast Agricultural University
2024
Örebro University
2016-2024
Wuhan University of Technology
2023-2024
Jilin University
2015-2024
Shanghai Jiao Tong University
2008-2024
Beijing University of Technology
2021-2024
Hong Kong Polytechnic University
2023
Zhejiang Institute of Hydraulics & Estuary
2018-2023
Preserving the confidentiality, integrity and availability (CIA) of an organisation's sensitive information systems assets against attacks threats is a challenge in this digital age. Organisations worldwide make huge investments security technological countermeasures. Nonetheless, organisations many cases fail to protect their as they rely mainly on technical solutions which are not contextually compatible sufficient. As matter fact, significant number organisational incidents due...
Due to the COVID-19 pandemic, higher educational institutions worldwide switched emergency distance learning in early 2020. The less structured environment of forced students regulate their and motivation more independently. According self-determination theory (SDT), satisfaction three basic psychological needs for autonomy, competence social relatedness affects intrinsic motivation, which turn relates active or passive behavior. As context plays a major role need satisfaction, may impair...
This study aims to explore university students’ intention use mobile learning management systems (m-LMS) in higher education Sweden. To address this, a research model based on the technology acceptance (TAM) and nine hypotheses are developed. In addition perceived usefulness ease of from TAM, includes academic relevance, support mobility value previous literature as external variables adoption m-LMS. The proposed empirically tested with 130 students According results, is found for seven...
The interplay between finance and technology with the use of internet triggered emergence digital payment technologies. Such technological innovation in industry is foundation for financial inclusion. However, despite continuous progress potential moving landscape towards payments connecting population to ubiquitous environment, some critical issues need be addressed achieve a more harmonious inclusive sustainable cashless society. study aims provide comprehensive literature review on...
Currently, there is no standard instrument for measuring user adoption of mobile services. Based on the service acceptance model, this paper reports development a survey designed to measure perception services acceptance. A was developed by using some existing scales from prior instruments and creating additional items which might appear fit construct definitions. In addition, pilot study conducted distributing 25 users called Mobile Student Information Systems. As result, containing 22 were...
Abstract Background Turnover problems among primary health care workers are a significant contributor to the shortage of human resources. This study aims determine relationship between job stress and turnover intention workers, as well examine mediating effects satisfaction presenteeism on this relationship. Methods Stratified random sampling quota were used select 703 in Jilin Province, China January 2020. Validated scales measure intention, stress, satisfaction, workers. The utilized...
Purpose The purpose of the research is to investigate users’ adoption blockchain-based games in China. Design/methodology/approach This applied existing technology diffusion theories develop a model examine games. As result, with nine hypotheses was developed. developed empirically tested using data collected from survey 210 users. Structural equation modeling analyse data. Findings results indicated that seven were supported. It found trust, perceived usefulness, enjoyment and ease use key...
Objectives This study aims to evaluate the direct effects of work stress, health status and presenteeism on task performance, further explore mediating presenteeism, hoping provide theoretical basis for improving performance medical staff. Methods A cross-sectional was conducted among staff in Jilin Province, Northeast China. The Challenge Hindrance-Related Self-Reported Stress scale, Short Form-8 Health Survey Stanford Presenteeism Scale Task Performance were adopted assess status, Results...
<div class="section abstract"><div class="htmlview paragraph">Off-road vehicles are required to traverse a variety of pavement environments, including asphalt roads, dirt sandy terrains, snowy landscapes, rocky paths, brick and gravel over extended periods while maintaining stable motion. Consequently, the precise identification types, road unevenness, other environmental information is crucial for intelligent decision-making planning, as well assessing traversability risks in...
Along with the rapid development of information and communication technology, more mobile commerce applications are available. However, what is user's perception reaction those new applications? It critical to study factors that influence user adoption applications. In this research work, we propose an extended technology acceptance model, which called services a consideration trust, context, personal initiatives characteristics in addition perceived usefulness ease use. Furthermore, order...
With the development of mobile technology, advertising has become popular worldwide. It seems that almost every user who owns a device receives advertisements from various service providers. However, most consumers hold negative attitudes towards advertising. This research aims to investigate factors which influence consumers’ adoption Based on literature review previous research, model is proposed. empirically evaluated using survey data collected 302 receivers in China. Consumers’ toward...
This study investigates the adoption of mobile information services at a Norwegian university. By expanding Technology Acceptance Model TAM, new research model, known as acceptance model MSAM, is proposed. Based on seven hypotheses are presented. The proposed and were empirically tested using data collected from survey users service, extended Mobile Student Information Systems eMSIS, findings indicate that fitness good. Support was also found for hypotheses. Among factors, personal...
This study investigates the adoption of mobile information services at a Norwegian university. By expanding Technology Acceptance Model (TAM), new research model, known as acceptance model (MSAM), is proposed. Based on seven hypotheses are presented. The proposed and were empirically tested using data collected from survey users service, extended Mobile Student Information Systems (eMSIS), findings indicate that fitness good. Support was also found for hypotheses. Among factors, personal...
This article aims to investigate users' continuous usage intention of quick response (QR) code mobile payment services in China. Drawing from UTAUT as theory foundation, this study integrates with literature on perceived risk and involvement propose a research model seven hypotheses examine user's QR services. The was empirically tested sample 215 users results indicated that five were significantly supported. According the results, performance expectancy, effort expectancy social influence...
Purpose The purpose of the research is to assess security concerns in government's use Blockchain technology through lens value focused thinking (VFT) approach. Design/methodology/approach Qualitative methods such as open ended questions and interviews were used gather data was analysed a structured approach formulate means-ends network objectives. collected from eight selected participants. Findings findings are 35 objectives which ten fundamental related values identity, trust, privacy,...
This paper presents a mobile services acceptance model, which includes aspects of trust, contextual fit, and personal initiatives characteristics in addition to perceived usefulness ease use from the technology model (TAM). The proposed research was empirically tested using data collected survey 25 users service called Mobile Student Information Systems (MSIS). results reveal that fitness is quite good. Our findings indicate characteristics, are key determinants for adopt service. Context...
Cooperative coevolutionary algorithms have been a popular and effective learning approach to solve optimization problems through problem decomposition. However, their performance is highly sensitive the degree of separability. Different collaboration mechanisms usually be chosen for particular problems. In paper, we aim design model that can successfully applied wide range We present novel mechanism offers this type potential, along with new sorting strategy individuals are assigned multiple...