期刊文献+
共找到3,865篇文章
< 1 2 194 >
每页显示 20 50 100
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
1
作者 Moona Kanwal Najeed AKhan Aftab A.Khan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2419-2440,共22页
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest... The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater. 展开更多
关键词 user intent CLUsTER user profile online search information sharing user behavior search reasons
下载PDF
The Intersection of Privacy by Design and Behavioral Economics: Nudging Users towards Privacy-Friendly Choices
2
作者 Vivek Kumar Agarwal 《Journal of Information Security》 2024年第4期557-563,共7页
This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can... This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can leverage “nudges” to encourage users towards privacy-friendly choices. We analyze the limitations of rational choice in the context of privacy decision-making and identify key opportunities for integrating behavioral economics into PbD. We propose a user-centered design framework for integrating behavioral economics into PbD, which includes strategies for simplifying complex choices, making privacy visible, providing feedback and control, and testing and iterating. Our analysis highlights the need for a more nuanced understanding of user behavior and decision-making in the context of privacy, and demonstrates the potential of behavioral economics to inform the design of more effective PbD solutions. 展开更多
关键词 Privacy by Design behavioral Economics Nudges user-Centric Design Data Protection Cognitive Biases HEURIsTICs
下载PDF
The Research on E-mail Users' Behavior of Participating in Subjects Based on Social Network Analysis 被引量:3
3
作者 ZHANG Lejun ZHOU Tongxin +2 位作者 Qi Zhixin GUO Lin XU Li 《China Communications》 SCIE CSCD 2016年第4期70-80,共11页
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in... The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition. 展开更多
关键词 E-MAIL NETWORK social NETWORK ANALYsIs user behavior ANALYsIs KEYWORD selection
下载PDF
Evaluation of Microblog Users’ Influence Based on PageRank and Users Behavior Analysis 被引量:6
4
作者 Lijuan Huang Yeming Xiong 《Advances in Internet of Things》 2013年第2期34-40,共7页
This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and... This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example. 展开更多
关键词 sOCIAL Network Microblog users behavior PAGERANK ALGORITHMs U-R Model INFLUENCE
下载PDF
Free Riding Inhibition Mechanism Based on User Behavior in P2P File-Sharing System 被引量:2
5
作者 Zhang Yu Bai Yanping Hao Ying 《China Communications》 SCIE CSCD 2012年第12期36-45,共10页
In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user b... In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems. 展开更多
关键词 free riding user behavior FILE-sHARING white-washing
下载PDF
User Profile & Attitude Analysis Based on Unstructured Social Media and Online Activity
6
作者 Yuting Tan Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第6期463-473,共11页
As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ... As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis. 展开更多
关键词 social Media user behavior Analysis sentiment Analysis Data Mining Machine Learning user Profiling CYBERsECURITY behavioral Insights Personality Prediction
下载PDF
The clutch size,incubation behavior of Reeves’s Pheasant(Syrmaticus reevesii) and their responses to ambient temperature and precipitation
7
作者 Ting Jin Shuai Lu +7 位作者 Yunqi Wang Junqin Hua Zhengxiao Liu Qian Hu Yating Liu Yuze Zhao Jianqiang Li Jiliang Xu 《Avian Research》 SCIE CSCD 2024年第1期72-80,共9页
Weather conditions play a pivotal role in embryo development and parental incubation costs,potentially impacting the clutch size and incubation behavior of birds.Understanding these effects is crucial for bird conserv... Weather conditions play a pivotal role in embryo development and parental incubation costs,potentially impacting the clutch size and incubation behavior of birds.Understanding these effects is crucial for bird conservation.Reeves’ s Pheasant(Syrmaticus reevesii) is a threatened species endemic to China,which is characterized by female-only incubation.However,there is a lack of information regarding the impact of weather conditions on clutch size and incubation behavior in this species.Using satellite tracking,we tracked 27 wild female Reeves’ s Pheasants from 2020 to 2023 in Hubei Province,China.We explored their clutch size and incubation behavior,as well as their responses to ambient temperature and precipitation.Clutch size averaged 7.75 ±1.36,had an association with average ambient temperature and average daily precipitation during the egglaying period,and was potentially linked to female breeding attempts.Throughout the incubation period,females took an average of 0.73 ±0.46 recesses every 24 h,with an average recess duration of 100.80 ±73.37 min and an average nest attendance of 92.98 ±5.27%.They showed a unimodal recess pattern in which nest departures peaked primarily between 13:00 and 16:00.Furthermore,females rarely left nests when daily precipitation was high.Recess duration and nest attendance were influenced by the interaction between daily mean ambient temperature and daily precipitation,as well as day of incubation.Additionally,there was a positive correlation between clutch size and recess duration.These results contribute valuable insights into the lifehistory features of this endangered species. 展开更多
关键词 Ambient temperature Clutch size Incubation behavior PRECIPITATION Reevess Pheasant
下载PDF
Container Networking Performance Analysis for Large-Scale User Behavior Simulation 被引量:1
8
作者 Yifang Ji Guomin Zhang +1 位作者 Shengxu Xie Xiulei Wang 《Journal of Computer and Communications》 2019年第10期136-146,共11页
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-... Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical resources. In a container-based virtualization environment, container networking is an important component. To evaluate the impact of different networking methods between the containers on the simulation performance, the typical container networking methods such as none, bridge, macvlan were analyzed, and the performance of different networking methods was evaluated according to the throughput and latency metrics. The experiments show that under the same physical resource constraints, the macvlan networking method has the best network performance, while the bridge method has the worst performance. This result provides a reference for selecting the appropriate networking method in the user behavior simulation process. 展开更多
关键词 Linux CONTAINER NETWORKING Mode Network Performance user behavior sIMULATION
下载PDF
Interconnected microstructure and flexural behavior of Ti_(2)C-Ti composites with superior Young’s modulus
9
作者 Fengbo Sun Rui Zhang +3 位作者 Fanchao Meng Shuai Wang Lujun Huang Lin Geng 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 2024年第9期2088-2101,共14页
To enhance the Young’s modulus(E)and strength of titanium alloys,we designed titanium matrix composites with intercon-nected microstructure based on the Hashin-Shtrikman theory.According to the results,the in-situ re... To enhance the Young’s modulus(E)and strength of titanium alloys,we designed titanium matrix composites with intercon-nected microstructure based on the Hashin-Shtrikman theory.According to the results,the in-situ reaction yielded an interconnected microstructure composed of Ti_(2)C particles when the Ti_(2)C content reached 50vol%.With widths of 10 and 230 nm,the intraparticle Ti lamellae in the prepared composite exhibited a bimodal size distribution due to precipitation and the unreacted Ti phase within the grown Ti_(2)C particles.The composites with interconnected microstructure attained superior properties,including E of 174.3 GPa and ultimate flexural strength of 1014 GPa.Compared with that of pure Ti,the E of the composite was increased by 55% due to the high Ti_(2)C content and interconnected microstructure.The outstanding strength resulted from the strong interfacial bonding,load-bearing capacity of interconnected Ti_(2)C particles,and bimodal intraparticle Ti lamellae,which minimized the average crack driving force.Interrupted flexural tests revealed preferential crack initiation along the{001}cleavage plane and grain boundary of Ti_(2)C in the region with the highest tensile stress.In addition,the propagation can be efficiently inhibited by interparticle Ti grains,which prevented the brittle fracture of the composites. 展开更多
关键词 titanium matrix composites titanium carbide INTERFACE Young’s modulus flexural behavior
下载PDF
User Behaviors Analysis in Website Identification Registration 被引量:1
10
作者 甘曈 林福宏 +2 位作者 陈常嘉 郭宇春 郑毅 《China Communications》 SCIE CSCD 2013年第3期76-81,共6页
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S... Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords. 展开更多
关键词 user behaviors website identifi- cation COMPLEXITY CORRELATION PREFERENCE
下载PDF
Database Search Behaviors: Insight from a Survey of Information Retrieval Practices
11
作者 Babita Trivedi Brijender Dahiya +2 位作者 Anjali Maan Rajesh Giri Vinod Prasad 《Intelligent Information Management》 2024年第5期195-218,共24页
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego... This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns. 展开更多
关键词 Information Retrieval Database search user behavior Patterns
下载PDF
Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics 被引量:1
12
作者 Abdullah Alshehri Nayeem Khan +1 位作者 Ali Alowayr Mohammed Yahya Alghamdi 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1679-1689,共11页
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities ... This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities at such a network.The represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users.Thus,the model can recognize frequencies of regular behavior to profile the user manner in the network.The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular behavior.The importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the network.Typically detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including users.Therefore,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workflow.In contrast,the irregular patterns can trigger an alert for a potential cyber-attack.The framework has been fully described where the evaluation metrics have also been introduced.The experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM 1.The paper has been concluded with pro-viding the potential directions for future improvements. 展开更多
关键词 CYBERsECURITY deep learning machine learning user behavior analytics
下载PDF
Adsorption behavior of CO_(2)/H_(2)S mixtures in calcite slit nanopores for CO_(2) storage:An insight from molecular perspective
13
作者 Cheng Qian Zhen-Hua Rui +4 位作者 Yue-Liang Liu Kai Du Chen Liu Yang Zhao Xiao-Min Ma 《Petroleum Science》 SCIE EI CAS CSCD 2024年第4期2444-2456,共13页
It is acknowledged that injecting CO_(2) into oil reservoirs and saline aquifers for storage is a practical and affordable method for CO_(2) sequestration.Most CO_(2) produced from industrial exhaust contains impurity... It is acknowledged that injecting CO_(2) into oil reservoirs and saline aquifers for storage is a practical and affordable method for CO_(2) sequestration.Most CO_(2) produced from industrial exhaust contains impurity gases such as H_(2)S that might impact CO_(2) sequestration due to competitive adsorption.This study makes a commendable effort to explore the adsorption behavior of CO_(2)/H_(2)S mixtures in calcite slit nanopores.Grand Canonical Monte Carlo(GCMC)simulation is employed to reveal the adsorption of CO_(2),H_(2)S as well as their binary mixtures in calcite nanopores.Results show that the increase in pressure and temperature can promote and inhibit the adsorption capacity of CO_(2) and H_(2)S in calcite nanopores,respectively.CO_(2)exhibits stronger adsorption on calcite surface than H_(2)S.Electrostatic energy plays the dominating role in the adsorption behavior.Electrostatic energy accounts for 97.11%of the CO_(2)-calcite interaction energy and 56.33%of the H_(2)S-calcite interaction energy at 10 MPa and 323.15 K.The presence of H_(2)S inhibits the CO_(2) adsorption in calcite nanopores due to competitive adsorption,and a higher mole fraction of H_(2)S leads to less CO_(2) adsorption.The quantity of CO_(2) adsorbed is lessened by approximately 33%when the mole fraction of H_(2)S reaches 0.25.CO_(2) molecules preferentially occupy the regions near the po re wall and H_(2)S molecules tend to reside at the center of nanopore even when the molar ratio of CO_(2) is low,indicating that CO_(2) has an adsorption priority on the calcite surface over H_(2)S.In addition,moisture can weaken the adsorption of both CO_(2) and H_(2)S,while CO_(2) is more affected.More interestingly,we find that pure CO_(2) is more suitable to be sequestrated in the shallower formations,i.e.,500-1500 m,whereas CO_(2)with H_(2)S impurity should be settled in the deeper reservoirs. 展开更多
关键词 Adsorption behavior CO_(2)/H_(2)s binary mixtures Molecular perspective Calcite slit nanopores CO_(2)sequestration
下载PDF
Research on the Influence of Anchor Attributes on Consumers’Online Behaviors in Social E-Commerce Platforms:The Moderating Effect of Platform Contextual Factors
14
作者 Xiaodong Yang Gi Young Chung 《Proceedings of Business and Economic Studies》 2024年第5期186-193,共8页
As e-commerce continues to mature,the advantages of live streaming within the industry have become increasingly apparent,offering significant growth opportunities.Social e-commerce platforms,which are user-centered,in... As e-commerce continues to mature,the advantages of live streaming within the industry have become increasingly apparent,offering significant growth opportunities.Social e-commerce platforms,which are user-centered,integrate social networks with e-commerce by leveraging social interactions to drive product sales and enhance the overall consumer shopping experience.This type of e-commerce fosters engagement and promotes products by merging online communities with shopping behavior,creating a more interactive and dynamic marketplace.It not only retains the traditional e-commerce trading and marketing functions but also adds a social dimension,making live stream anchors crucial figures connecting consumers with products.These anchors can attract consumers with their appearance and charm,and use their expertise on live streaming platforms to guide consumers by recommending live content.They can also interact with their audiences and potentially influence them to purchase the recommended goods.It is evident that the attributes of anchors in live streaming rooms significantly impact consumers’online behavior.Therefore,researching how platform contextual factors regulate consumers’online behavior is of great practical significance.This study employs multilevel regression analysis to support its hypotheses using data.The findings indicate that contextual factors of the platform significantly influence online behavior,enhancing the positive relationship between user attachment and online activities. 展开更多
关键词 Anchor attribute user attachment Consumers’online behaviors Contextual factors
下载PDF
Exploring users' within-site navigation behavior:A case study based on clickstream data 被引量:1
15
作者 Tingting JIANG Yu CHI Wenrui JIA 《Chinese Journal of Library and Information Science》 2014年第4期63-76,共14页
Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a... Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior. 展开更多
关键词 Web navigation user behavior Clickstream data analysis Metrics Resale apartment website
下载PDF
Research on the Influence of Family Education on Children’s Behavioral Habits
16
作者 Jiayi Wen 《Journal of Contemporary Educational Research》 2024年第8期176-180,共5页
Under the background of the all-round deepening of quality education,the cultivation of comprehensive quality has become the main theme of contemporary education reform.Good behavior and habits are of great significan... Under the background of the all-round deepening of quality education,the cultivation of comprehensive quality has become the main theme of contemporary education reform.Good behavior and habits are of great significance to children’s future learning,growth,and development.Through literature review and other methods,this paper analyzes the current situation of children’s family education and the influence of family education on the cultivation of children’s behavioral habits and provides some strategies for cultivating children’s good behavioral habits in family education. 展开更多
关键词 Family education Children’s behavior Habit cultivation PARENTs
下载PDF
On-Line Privacy Behavior: Using User Interfaces for Salient Factors
17
作者 Thomas Hughes-Roberts Elahe Kani-Zabihi 《Journal of Computer and Communications》 2014年第4期220-231,共12页
The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third partie... The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required. 展开更多
关键词 ON-LINE PRIVACY social NETWORKING site user Interface users behavior Theory of PLANNED behavior
下载PDF
User Behavior Traffic Analysis Using a Simplified Memory-Prediction Framework
18
作者 Rahmat Budiarto Ahmad A.Alqarni +3 位作者 Mohammed YAlzahrani Muhammad Fermi Pasha Mohamed FazilMohamed Firdhous Deris Stiawan 《Computers, Materials & Continua》 SCIE EI 2022年第2期2679-2698,共20页
As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents cause... As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software(malware)in real-time.Failing to do so may cause a serious loss of reputation as well as business.At the same time,modern network traffic has dynamic patterns,high complexity,and large volumes that make it more difficult to detect malware early.The ability to learn tasks sequentially is crucial to the development of artificial intelligence.Existing neurogenetic computation models with deep-learning techniques are able to detect complex patterns;however,the models have limitations,including catastrophic forgetfulness,and require intensive computational resources.As defense systems using deep-learning models require more time to learn new traffic patterns,they cannot perform fully online(on-the-fly)learning.Hence,an intelligent attack/malware detection system with on-the-fly learning capability is required.For this paper,a memory-prediction framework was adopted,and a simplified single cell assembled sequential hierarchical memory(s.SCASHM)model instead of the hierarchical temporal memory(HTM)model is proposed to speed up learning convergence to achieve onthe-fly learning.The s.SCASHM consists of a Single Neuronal Cell(SNC)model and a simplified Sequential Hierarchical Superset(SHS)platform.The s.SCASHMis implemented as the prediction engine of a user behavior analysis tool to detect insider attacks/anomalies.The experimental results show that the proposed memory model can predict users’traffic behavior with accuracy level ranging from 72%to 83%while performing on-the-fly learning. 展开更多
关键词 Machine learning memory prediction framework insider attacks user behavior analytics
下载PDF
A Dynamic Bandwidth Allocation Solution Based on User Behavior and Software Defined EPS
19
作者 Bo Zhu Hao Jiang +2 位作者 Lihua Wu Shuwen Yi Hai Wang 《China Communications》 SCIE CSCD 2016年第9期80-90,共11页
For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load burstin... For telecommunication operators, how to improve the utilization of bandwidth resources is always a problem which worthy of study, nowadays, this issue has become more and more important, since the traffic load bursting in the mobile Internet. So the key to solving this problem is that we need to find a kind of traffic model to predict the traffic load that users need. According to the predicted traffic load to allocate bandwidth to each base station dynamically.But the traffic consumption behavior of a single base station is random, it is difficult to predict[ 1 ]. For this reason, we based on reality that, when the user moves, it may get traffic load from different base stations, therefore, there will have some kind of relationship between those base stations.We use this relationship to establish a kind of Spatial Collaborative Network.consequently, we make use of stability algorithm to divided those base station cluster into different communities, According to the traffic load usage rules which these communities indicated to us, we get a traffic model.At the same time, we studied bow to use this traffic model in the future networks to dynamically allocate bandwidth resources, then we propose a new kind of EPS architecture based on SDN, on this platform, we can deploy our strategy through it's programmable interface.Finally, we designed an experiment to test the performance of our dynamic strategy, and the result shows that our method enables bandwidth utilization has been greatly improved. 展开更多
关键词 bandwidth utilization user's behaviour traffic module sDN
下载PDF
A Study on the Impacting Path Mechanism of User Behavior Habits for Tourism Social Website
20
作者 GUO Ying-zhi DONG Kun +1 位作者 XU Ning-ning WANG Qiu-lin 《Journal of Tourism and Hospitality Management》 2021年第1期1-13,共13页
Along with the development of socialized media and self-help tourism,tourism industry has been going into tourism social times.Based on technology acceptance model,use and gratifications approach,and weighted and calc... Along with the development of socialized media and self-help tourism,tourism industry has been going into tourism social times.Based on technology acceptance model,use and gratifications approach,and weighted and calculated needs theory,this study explored the impact of perceived popularity,perceived characteristics,and perceived need on the use of tourism social network site and being a member of it.This study also discussed the interaction of perceived popularity,perceived characteristics,and perceived need.The findings of this paper could be used to help the management operator pay attention to strengthen the function of tourism social network site in order to provide better information for users and satisfied the needs of users. 展开更多
关键词 social media times tourism social website behavior habit of user weighted and calculated needs
下载PDF
上一页 1 2 194 下一页 到第
使用帮助 返回顶部