Showing 281 - 300 results of 1,364 for search '"social networks"', query time: 0.09s Refine Results
  1. 281
  2. 282

    Evolutionary Game of Social Network for Emergency Mobilization (SNEM) of Magnitude Emergencies: Evidence from China by Rui Nan, Jingjie Wang, Wenjun Zhu

    Published 2022-01-01
    “…As a common social network, the SNEM plays an important role in emergency management. …”
    Get full text
    Article
  3. 283

    Investigating the effect of marketing on social networks with the mental image of customers of insurance companies in Kurdistan province by Hadi Hosein Panahi, Heresh Soltanpanah

    Published 2021-08-01
    “…Also, among the three variables of social marketing affecting the mental image of insurance companies' customers, according to the respondents, communication programs had an average of 2.29, behaviour management programs had an average of 2.25, and symbolic programs had an average of 1.15.Originality/Value: Using social networks in insurance companies to form the mental image of customers and thus increase the quality of services, profits, and productivity is very effective and valuable. …”
    Get full text
    Article
  4. 284
  5. 285
  6. 286

    Privacy preserving friend discovery cross domain scheme using re-encryption in mobile social networks by En-tao LUO, Guo-jun WANG, Shu-hong CHEN, Khan-butt PINIAL

    Published 2017-10-01
    “…In order to guarantee the users’ privacy in the process of making friends in the mobile social networks,a new scheme of proxy re-encryption privacy protection in the cross-domain environment was introduced.The scheme employed the cross-domain multi-authority to sharing secret keys,so as to realize the access and shave of the cross-domain users data.And the secret keys of users’ attributes were re-encrypted,based on the technology of the proxy re-encryption and attribute encryption,to achieve the friends matching under the conditions of extending the access policy.Meanwhile,in purpose of enhancing the privacy of users’ data,the technology which contained the separation of users’ privacy ciphertext and secret keys was adopted.Based on that,problems in the existing system such as user data’s inability to be shared cross-cloud,less matching during the process of making friends and users’ inability to make friends when offline had been addressed.Security and experimental analysis show that this scheme can achieve chosen plaintext attack (CPA) security,ensure the privacy of friend discovery,and that is more effective than existing solutions.…”
    Get full text
    Article
  7. 287
  8. 288
  9. 289
  10. 290

    Peer support and social networking interventions in diabetes self-management in Kenya and Uganda: A scoping review. by Habil Otanga, Brian Semujju, Lynn Mwaniki, Justus Aungo

    Published 2022-01-01
    “…Eleven studies reported peer support interventions while two focused on social networks in diabetes self-management. Peer support and social networking interventions incorporated microfinance and group medical visits, diabetes self-management education, telephone support and Medication Adherence Clubs. …”
    Get full text
    Article
  11. 291
  12. 292

    The Core Might Change Anyhow We Define It: The Instability of Key Actors in Longitudinal Social Network Data by Róbert Pethes, Eliza Bodor-Eranus, Károly Takács, Levente Kovács

    Published 2024-01-01
    “…Widely accepted centrality measures do not take into account that those in central positions in the social network may change over time. A longitudinal comparison of the set and importance of opinion leaders is problematic with these measures and therefore needs a novel approach. …”
    Get full text
    Article
  13. 293
  14. 294
  15. 295

    Social Media by Proxy: how older adults work within their ‘social networks’ to engage with social media by Gemma Webster, Frances Ryan

    Published 2023-03-01
    “…Social media proxy relationships exist, even if proxy roles are not clearly defined, and that older adults engage with their ‘social networks’ to identify proxy support and it is likely that without this support the older adult would be unable to fully access or engage with social media or other online accounts. …”
    Get full text
    Article
  16. 296
  17. 297
  18. 298
  19. 299
  20. 300

    Trust-Based Access Control Model from Sociological Approach in Dynamic Online Social Network Environment by Seungsoo Baek, Seungjoo Kim

    Published 2014-01-01
    “…There has been an explosive increase in the population of the OSN (online social network) in recent years. The OSN provides users with many opportunities to communicate among friends and family. …”
    Get full text
    Article