This page has only limited features, please log in for full access.

Unclaimed
Bin Zhang
School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing 100876, China

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

Professor, School of Economics and Management, Beijing University of Posts and Telecommunications

Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 30 July 2021 in Information
Reads 0
Downloads 0

Personal information has been likened to “golden data”, which companies have chased using every means possible. Via mobile apps, the incidents of compulsory authorization and excessive data collection have evoked privacy concerns and strong repercussions among app users. This manuscript proposes a privacy boundary management model, which elaborates how such users can demarcate and regulate their privacy boundaries. The survey data came from 453 users who authorized certain operations through mobile apps. The partial least squares (PLS) analysis method was used to validate the instrument and the proposed model. Results indicate that information relevance and transparency play a significant role in shaping app users’ control–risk perceptions, while government regulation is more effective than industry self-discipline in promoting the formation of privacy boundaries. Unsurprisingly, privacy risk control perceptions significantly affect users’ privacy concerns and trust beliefs, which are two vital factors that ultimately influence their willingness to authorize. The implications of conducting a thorough inquiry into app users’ willingness to authorize their privacy information are far-reaching. In relation to this, app vendors should probe into the privacy-relevant beliefs of their users and enact effective privacy practices to intercept the economic and reputational damages induced by improper information collection. More significantly, a comprehensive understanding of users’ willingness to authorize their information can serve as an essential reference for relevant regulatory bodies to formulate reasonable privacy protection policies in the future.

ACS Style

Jie Tang; Bin Zhang; Umair Akram. What Drives Authorization in Mobile Applications? A Perspective of Privacy Boundary Management. Information 2021, 12, 311 .

AMA Style

Jie Tang, Bin Zhang, Umair Akram. What Drives Authorization in Mobile Applications? A Perspective of Privacy Boundary Management. Information. 2021; 12 (8):311.

Chicago/Turabian Style

Jie Tang; Bin Zhang; Umair Akram. 2021. "What Drives Authorization in Mobile Applications? A Perspective of Privacy Boundary Management." Information 12, no. 8: 311.

Journal article
Published: 02 February 2021 in International Journal of Environmental Research and Public Health
Reads 0
Downloads 0

Users provide and share information with a broad audience on different forms of social media; however, information accuracy is questionable. Currently, the health information field is severely affected by misinformation. Thus, addressing health misinformation is integral for enhancing public health. This research can help relevant practitioners (i.e., government officials, medical and health service personnel, and educators) find the most effective correctional interventions for governing health misinformation. We constructed a theoretical model for credibility-oriented determinants refuting misinformation based on the elaboration likelihood model. We aggregated 415 pieces of valid data through a questionnaire survey. A partial least squares structural equation model evaluated this research model. The results indicated that both perceived information quality and perceived source credibility can enhance perceived information credibility. Under some circumstances, the influence of information quality on information credibility may be more important than that of the information source. However, the cognitive conflict and knowledge self-confidence of information receivers weaken the influence of information quality on information credibility. In contrast, cognitive conflict can strengthen the influence of source credibility on information credibility. Further, perceived information quality can be affected by information usefulness, understandability, and relevance, while perceived source reliability can be affected by source expertise and authority.

ACS Style

Yujia Sui; Bin Zhang. Determinants of the Perceived Credibility of Rebuttals Concerning Health Misinformation. International Journal of Environmental Research and Public Health 2021, 18, 1345 .

AMA Style

Yujia Sui, Bin Zhang. Determinants of the Perceived Credibility of Rebuttals Concerning Health Misinformation. International Journal of Environmental Research and Public Health. 2021; 18 (3):1345.

Chicago/Turabian Style

Yujia Sui; Bin Zhang. 2021. "Determinants of the Perceived Credibility of Rebuttals Concerning Health Misinformation." International Journal of Environmental Research and Public Health 18, no. 3: 1345.

Book chapter
Published: 31 January 2012 in Advances in Intelligent and Soft Computing
Reads 0
Downloads 0

Reverse Logistics is receiving increasing attention in business and research due to the growing environmental concern, economic gain and consumer pressure. Reverse logistics deals with the activities and processes associated with the flows of products, components and materials from users to re-users, or its proper disposal.

ACS Style

Surat Khan; Faizullah Khan; Bin Zhang. Reverse e-Logistics for SMEs in Pakistan. Advances in Intelligent and Soft Computing 2012, 115, 229 -237.

AMA Style

Surat Khan, Faizullah Khan, Bin Zhang. Reverse e-Logistics for SMEs in Pakistan. Advances in Intelligent and Soft Computing. 2012; 115 ():229-237.

Chicago/Turabian Style

Surat Khan; Faizullah Khan; Bin Zhang. 2012. "Reverse e-Logistics for SMEs in Pakistan." Advances in Intelligent and Soft Computing 115, no. : 229-237.

Book chapter
Published: 31 January 2012 in Advances in Intelligent and Soft Computing
Reads 0
Downloads 0

The rationale to exploit the potential of ICT and e-government are compelling for most of the countries. However, implementation of e-Government projects requires the Capital investment as well as funds required for operation and maintenance of ICT systems on sustained basis. Facing excessive financial constraints governments are not in a position to extend an open-ended financial support to e-government projects. It therefore becomes imperative to find new innovative methods of financing ICT and e-government projects by including the expertise and finance of private sector. A Public-Private Partnership is a legally enforceable contract between a private sector entity and a government body that requires the private partner to deliver a desired electronic public service, and share the associated risks of service delivery. This paper analyzes Public-Private Partnerships in general and e-government PPP projects in particular, and the need for employing PPP for implementation of e-Government projects in Pakistan.

ACS Style

Faizullah Khan; Surat Khan; Bin Zhang. Public-Private Partnerships and E-Government. Advances in Intelligent and Soft Computing 2012, 221 -228.

AMA Style

Faizullah Khan, Surat Khan, Bin Zhang. Public-Private Partnerships and E-Government. Advances in Intelligent and Soft Computing. 2012; ():221-228.

Chicago/Turabian Style

Faizullah Khan; Surat Khan; Bin Zhang. 2012. "Public-Private Partnerships and E-Government." Advances in Intelligent and Soft Computing , no. : 221-228.