In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mo...In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobileapps. The use of these apps eases our daily lives, and all customers who need any type of service can accessit easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digitalservices to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services,particularly during two large occasions, Umrah and Hajj. However, pilgrims encounter mobile app issues such asslowness, conflict, unreliability, or user-unfriendliness. Pilgrims comment on these issues on mobile app platformsthrough reviews of their experiences with these digital services. Scholars have made several attempts to solve suchmobile issues by reporting bugs or non-functional requirements by utilizing user comments.However, solving suchissues is a great challenge, and the issues still exist. Therefore, this study aims to propose a hybrid deep learningmodel to classify and predict mobile app software issues encountered by millions of pilgrims during the Hajj andUmrah periods from the user perspective. Firstly, a dataset was constructed using user-generated comments fromrelevant mobile apps using natural language processing methods, including information extraction, the annotationprocess, and pre-processing steps, considering a multi-class classification problem. Then, several experimentswere conducted using common machine learning classifiers, Artificial Neural Networks (ANN), Long Short-TermMemory (LSTM), and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) architectures, toexamine the performance of the proposed model. Results show 96% in F1-score and accuracy, and the proposedmodel outperformed the mentioned models.展开更多
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest...The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.展开更多
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in...The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.展开更多
This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and...This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example.展开更多
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities ...This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities at such a network.The represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users.Thus,the model can recognize frequencies of regular behavior to profile the user manner in the network.The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular behavior.The importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the network.Typically detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including users.Therefore,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workflow.In contrast,the irregular patterns can trigger an alert for a potential cyber-attack.The framework has been fully described where the evaluation metrics have also been introduced.The experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM 1.The paper has been concluded with pro-viding the potential directions for future improvements.展开更多
As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain ...As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.展开更多
Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a...Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.展开更多
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego...This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns.展开更多
Recently, Hsieh and Horng [1] published the paper entitled as above. In section 3 results and discussion, the authors mentioned the first and the second order kinetic models without any quotations. In fact these two k...Recently, Hsieh and Horng [1] published the paper entitled as above. In section 3 results and discussion, the authors mentioned the first and the second order kinetic models without any quotations. In fact these two kinetic models have been published [2-5]. In order to distinguish a kinetics model based on the ad- sorption capacity of a solid from the one based on the concentration of a solution, Lagergren's first-order rate equation has been called pseudo-first-order [6-7]. The Lagergren's equation has been widely cited, but there are far more mistakes made in the quotation and in the reference section of papers, including the title, the author's name, journal title, year of publishing, volume, and page number [3]. In addition, the second order kinetic expression for the adsorption systems of divalent metal ions using sphagnum moss peat has been reported by Ho [8].展开更多
As e-commerce continues to mature,the advantages of live streaming within the industry have become increasingly apparent,offering significant growth opportunities.Social e-commerce platforms,which are user-centered,in...As e-commerce continues to mature,the advantages of live streaming within the industry have become increasingly apparent,offering significant growth opportunities.Social e-commerce platforms,which are user-centered,integrate social networks with e-commerce by leveraging social interactions to drive product sales and enhance the overall consumer shopping experience.This type of e-commerce fosters engagement and promotes products by merging online communities with shopping behavior,creating a more interactive and dynamic marketplace.It not only retains the traditional e-commerce trading and marketing functions but also adds a social dimension,making live stream anchors crucial figures connecting consumers with products.These anchors can attract consumers with their appearance and charm,and use their expertise on live streaming platforms to guide consumers by recommending live content.They can also interact with their audiences and potentially influence them to purchase the recommended goods.It is evident that the attributes of anchors in live streaming rooms significantly impact consumers’online behavior.Therefore,researching how platform contextual factors regulate consumers’online behavior is of great practical significance.This study employs multilevel regression analysis to support its hypotheses using data.The findings indicate that contextual factors of the platform significantly influence online behavior,enhancing the positive relationship between user attachment and online activities.展开更多
With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other ...With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective.展开更多
The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital acce...The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital accessing. A questionnaire survey was formulated and distributed online for these research purposes. There were 1,267 responses collected. The data were analyzed with descriptive statistics, Chi-square testing and contingency table analyses. Results revealed the following findings. Tagging has already played an important role in Web2.0 communication for China's Web users. China users rely greatly on all kinds of taxonomies in browsing and have also an awareness of them in effective searching. These imply that the classified languages in digital environment may aid Chinese Web users in a more satisfying manner. Highly subject-specific words, especially those from authorized tools, yielded better results in searching. Chinese users have high recognition for related terms. As to the demographic aspect, there is little difference between different genders in the utilization of information retrieval languages. Age may constitute a variable element to a certain degree. Educational background has a complex effect on language utilizations in searching. These research findings characterize China Web users' behaviors in digital information accessing. They also can be potentially valuable for the modeling and further refinement of digital accessing services.展开更多
Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing...Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing effective intervention strategies. Methods: Face to face interviews were conducted and serum samples from injection drug users from detoxification centers and the community were collected for HIV screening. Results: 655 drug users were recruited and interviewed. The HIV seropositive rate was 29.0%. 99.5 % of subjects were injection drug users (IDUs), of whom,75.4% reported sharing injection equipment. Conclusion: HIV prevalence among injection drug users is high in the PRDR of Guangdong. Injection drug use is the principal behavioral risk factor for HIV transmission. Pragmatic harm reduction programs should be implemented to prevent the spread of HIV infection.展开更多
Since the development of organic food,to a great extent,depends on the needs of consumers,the studies on the consumer behavior of organic food would have far-reaching significance to the development of the whole organ...Since the development of organic food,to a great extent,depends on the needs of consumers,the studies on the consumer behavior of organic food would have far-reaching significance to the development of the whole organic food industry. The recent studies in this field mainly include the following four aspects: the consumers' recognition of organic food; the consumers' attitude towards organic food; the consumers' purchase of organic food; the consumers' willingness to pay. The paper would review the recent domestic and foreign studies on the four aspects mentioned above,aiming to provide references to the researches in this field.展开更多
In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user b...In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems.展开更多
Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-...Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical resources. In a container-based virtualization environment, container networking is an important component. To evaluate the impact of different networking methods between the containers on the simulation performance, the typical container networking methods such as none, bridge, macvlan were analyzed, and the performance of different networking methods was evaluated according to the throughput and latency metrics. The experiments show that under the same physical resource constraints, the macvlan networking method has the best network performance, while the bridge method has the worst performance. This result provides a reference for selecting the appropriate networking method in the user behavior simulation process.展开更多
Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese S...Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.展开更多
Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/meth...Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/methodology/approach: Our study investigates the mobile library system’s acceptance by using a context-specific extension of the theory of reasoned action(TRA) and the technology acceptance model(TAM), which includes such factors as mobile self-efficacy, personal innovativeness and perceived playfulness. Structural equation modeling was used to test the validity of the proposed model based on the empirical data which was collected from 210 questionnaire survey participants.Findings: The result shows that 1) for both current users and potential adopters, attitude toward use and subjective norm both have a significant and positive impact on behavioral intention to use; 2) perceived usefulness and perceived ease of use are significantly correlated to potential adopters’ attitude toward use whereas perceived usefulness and perceived playfulness are significantly related to current users’ attitude toward use; 3) as for the comparison between the two groups of users, personal innovativeness not only affects perceived usefulness of both current users and potential adopters, but also affects potential adopters’ perceived playfulness positively. Mobile self-efficacy has a significant effect on perceived ease of use for both types of users.Research limitations: Although the sample size met the basic statistics requirements for the social research, the participants were mainly college students, and other mobile system users like faculty members and researchers were not investigated. In addition, some influencing factors, such as information quality, system quality and service quality were not considered in the research model.Practical implications: This study reveals main factors which influence both current users and potential adopters’ intention to use the mobile system, providing academic libraries withinsights into management strategies to offer customized mobile services to different types of users. Originality/value: Previous studies did not distinguish current users from potential adopters, which is not conducive for academic libraries to provide customized services and attract potential users. We presented an exploratory study to address this issue.展开更多
The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third partie...The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required.展开更多
As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents cause...As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software(malware)in real-time.Failing to do so may cause a serious loss of reputation as well as business.At the same time,modern network traffic has dynamic patterns,high complexity,and large volumes that make it more difficult to detect malware early.The ability to learn tasks sequentially is crucial to the development of artificial intelligence.Existing neurogenetic computation models with deep-learning techniques are able to detect complex patterns;however,the models have limitations,including catastrophic forgetfulness,and require intensive computational resources.As defense systems using deep-learning models require more time to learn new traffic patterns,they cannot perform fully online(on-the-fly)learning.Hence,an intelligent attack/malware detection system with on-the-fly learning capability is required.For this paper,a memory-prediction framework was adopted,and a simplified single cell assembled sequential hierarchical memory(s.SCASHM)model instead of the hierarchical temporal memory(HTM)model is proposed to speed up learning convergence to achieve onthe-fly learning.The s.SCASHM consists of a Single Neuronal Cell(SNC)model and a simplified Sequential Hierarchical Superset(SHS)platform.The s.SCASHMis implemented as the prediction engine of a user behavior analysis tool to detect insider attacks/anomalies.The experimental results show that the proposed memory model can predict users’traffic behavior with accuracy level ranging from 72%to 83%while performing on-the-fly learning.展开更多
文摘In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobileapps. The use of these apps eases our daily lives, and all customers who need any type of service can accessit easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digitalservices to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services,particularly during two large occasions, Umrah and Hajj. However, pilgrims encounter mobile app issues such asslowness, conflict, unreliability, or user-unfriendliness. Pilgrims comment on these issues on mobile app platformsthrough reviews of their experiences with these digital services. Scholars have made several attempts to solve suchmobile issues by reporting bugs or non-functional requirements by utilizing user comments.However, solving suchissues is a great challenge, and the issues still exist. Therefore, this study aims to propose a hybrid deep learningmodel to classify and predict mobile app software issues encountered by millions of pilgrims during the Hajj andUmrah periods from the user perspective. Firstly, a dataset was constructed using user-generated comments fromrelevant mobile apps using natural language processing methods, including information extraction, the annotationprocess, and pre-processing steps, considering a multi-class classification problem. Then, several experimentswere conducted using common machine learning classifiers, Artificial Neural Networks (ANN), Long Short-TermMemory (LSTM), and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) architectures, toexamine the performance of the proposed model. Results show 96% in F1-score and accuracy, and the proposedmodel outperformed the mentioned models.
文摘The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater.
基金sponsored by the National Natural Science Foundation of China under grant number No.61100008,61201084the China Postdoctoral Science Foundation under Grant No.2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund(Postdoctoral Youth Talent Program)under Grant No.LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No.LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No.QC2015076The Fundamental Research Funds for the Central Universities of China under grant number HEUCF100602
文摘The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.
文摘This paper explores the uses’ influences on microblog. At first, according to the social network theory, we present an analysis of information transmitting network structure based on the relationship of following and followed phenomenon of microblog users. Informed by the microblog user behavior analysis, the paper also addresses a model for calculating weights of users’ influence. It proposes a U-R model, using which we can evaluate users’ influence based on PageRank algorithms and analyzes user behaviors. In the U-R model, the effect of user behaviors is explored and PageRank is applied to evaluate the importance and the influence of every user in a microblog network by repeatedly iterating their own U-R value. The users’ influences in a microblog network can be ranked by the U-R value. Finally, the validity of U-R model is proved with a real-life numerical example.
基金supported by the fund received from Al Baha University,8/1440.
文摘This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior Analytics.The framework models the user behavior as sequences of events representing the user activities at such a network.The represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual users.Thus,the model can recognize frequencies of regular behavior to profile the user manner in the network.The subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular behavior.The importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the network.Typically detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including users.Therefore,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workflow.In contrast,the irregular patterns can trigger an alert for a potential cyber-attack.The framework has been fully described where the evaluation metrics have also been introduced.The experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM 1.The paper has been concluded with pro-viding the potential directions for future improvements.
文摘As social media and online activity continue to pervade all age groups, it serves as a crucial platform for sharing personal experiences and opinions as well as information about attitudes and preferences for certain interests or purchases. This generates a wealth of behavioral data, which, while invaluable to businesses, researchers, policymakers, and the cybersecurity sector, presents significant challenges due to its unstructured nature. Existing tools for analyzing this data often lack the capability to effectively retrieve and process it comprehensively. This paper addresses the need for an advanced analytical tool that ethically and legally collects and analyzes social media data and online activity logs, constructing detailed and structured user profiles. It reviews current solutions, highlights their limitations, and introduces a new approach, the Advanced Social Analyzer (ASAN), that bridges these gaps. The proposed solutions technical aspects, implementation, and evaluation are discussed, with results compared to existing methodologies. The paper concludes by suggesting future research directions to further enhance the utility and effectiveness of social media data analysis.
基金supported by the National Natural Science Foundation of China(Grant No.:71203163)the Foundation for Humanities and Social Sciences of the Chinese Ministry of Education(Grant No.:12YJC870011)
文摘Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.
文摘This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns.
文摘Recently, Hsieh and Horng [1] published the paper entitled as above. In section 3 results and discussion, the authors mentioned the first and the second order kinetic models without any quotations. In fact these two kinetic models have been published [2-5]. In order to distinguish a kinetics model based on the ad- sorption capacity of a solid from the one based on the concentration of a solution, Lagergren's first-order rate equation has been called pseudo-first-order [6-7]. The Lagergren's equation has been widely cited, but there are far more mistakes made in the quotation and in the reference section of papers, including the title, the author's name, journal title, year of publishing, volume, and page number [3]. In addition, the second order kinetic expression for the adsorption systems of divalent metal ions using sphagnum moss peat has been reported by Ho [8].
文摘As e-commerce continues to mature,the advantages of live streaming within the industry have become increasingly apparent,offering significant growth opportunities.Social e-commerce platforms,which are user-centered,integrate social networks with e-commerce by leveraging social interactions to drive product sales and enhance the overall consumer shopping experience.This type of e-commerce fosters engagement and promotes products by merging online communities with shopping behavior,creating a more interactive and dynamic marketplace.It not only retains the traditional e-commerce trading and marketing functions but also adds a social dimension,making live stream anchors crucial figures connecting consumers with products.These anchors can attract consumers with their appearance and charm,and use their expertise on live streaming platforms to guide consumers by recommending live content.They can also interact with their audiences and potentially influence them to purchase the recommended goods.It is evident that the attributes of anchors in live streaming rooms significantly impact consumers’online behavior.Therefore,researching how platform contextual factors regulate consumers’online behavior is of great practical significance.This study employs multilevel regression analysis to support its hypotheses using data.The findings indicate that contextual factors of the platform significantly influence online behavior,enhancing the positive relationship between user attachment and online activities.
基金This research is sponsored by the National Science Foundation of China No. 60703116, 61063006 and 61462049, and the Application Basic Research Plan in Yunnan Province of China No. 2013FZ020.
文摘With the popularity of mobile intelligent terminal, user comments of App software is viewed as one of the research interests of social computing. Faced with the massive App software, most users usually view the other users’ comments and marks to selecting the desired App software. Due to the freedom and randomness of the network comments, the inconsistence between the user’s comment and mark makes it difficult to choose App software. This paper presents a method by analyzing the relationships among user’s comment information, the user’s mark and App software information. Firstly, the consistency between user’s comment information and App software information is judged. Then, through analyzing the grammar relationships among the feature-words, adverbs and the feature-sentiment-words in App software’s feature-sentimentword- pairs, the user’s emotional tendency about App software is quantified quantified combining with the dictionary and the network sentiment words. After calculating the user’s comprehensive score of App software, the consistency of App software’s user comment is judged by comparing this score and the user’s mark. Finally, the experimental results show that the method is effective.
文摘The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital accessing. A questionnaire survey was formulated and distributed online for these research purposes. There were 1,267 responses collected. The data were analyzed with descriptive statistics, Chi-square testing and contingency table analyses. Results revealed the following findings. Tagging has already played an important role in Web2.0 communication for China's Web users. China users rely greatly on all kinds of taxonomies in browsing and have also an awareness of them in effective searching. These imply that the classified languages in digital environment may aid Chinese Web users in a more satisfying manner. Highly subject-specific words, especially those from authorized tools, yielded better results in searching. Chinese users have high recognition for related terms. As to the demographic aspect, there is little difference between different genders in the utilization of information retrieval languages. Age may constitute a variable element to a certain degree. Educational background has a complex effect on language utilizations in searching. These research findings characterize China Web users' behaviors in digital information accessing. They also can be potentially valuable for the modeling and further refinement of digital accessing services.
文摘Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing effective intervention strategies. Methods: Face to face interviews were conducted and serum samples from injection drug users from detoxification centers and the community were collected for HIV screening. Results: 655 drug users were recruited and interviewed. The HIV seropositive rate was 29.0%. 99.5 % of subjects were injection drug users (IDUs), of whom,75.4% reported sharing injection equipment. Conclusion: HIV prevalence among injection drug users is high in the PRDR of Guangdong. Injection drug use is the principal behavioral risk factor for HIV transmission. Pragmatic harm reduction programs should be implemented to prevent the spread of HIV infection.
文摘Since the development of organic food,to a great extent,depends on the needs of consumers,the studies on the consumer behavior of organic food would have far-reaching significance to the development of the whole organic food industry. The recent studies in this field mainly include the following four aspects: the consumers' recognition of organic food; the consumers' attitude towards organic food; the consumers' purchase of organic food; the consumers' willingness to pay. The paper would review the recent domestic and foreign studies on the four aspects mentioned above,aiming to provide references to the researches in this field.
基金This work was partly supported by 2012 Outstanding Talents Project of Beijing Organization Department under Grant No.2012D00501700005,Science and Technology Project of Beijing Municipal Education Commission under Grant No.KM201110016006,National Natural Science Foundation of China under Grant No.61100205
文摘In order to inhibit Free Riding in Peer-toPeer(P2P) file-sharing systems,the Free Riding Inhibition Mechanism Based on User Behavior(IMBUB) is proposed.IMBUB considers the regularity of user behavior and models user behavior by analyzing many definitions and formulas.In IMBUB,Bandwidth Allocated Ratio,Incentive Mechanism Based on User Online Time,Double Reward Mechanism,Incentive Mechanism of Sharing for Permission and Inhibition Mechanism of White-washing Behavior are put forward to inhibit Free Riding and encourage user sharing.A P2P file system BITShare is designed and realized under the conditions of a campus network environment.The test results show that BITShare's Query Hit Ratio has a significant increase from 22% to 99%,and the sharing process in BITShare is very optimistic.Most users opt to use online time to exchange service quality instead of white-washing behavior,and the real white-ishing ratio in BITShare is lower than 1%.We confirm that IMBUB can effectively inhibit Free Riding behavior in P2P file-sharing systems.
文摘Accurately simulating large-scale user behavior is important to improve the similarity between the cyber range and the real network environment. The Linux Container provides a method to simulate the behavior of large-scale users under the constraints of limited physical resources. In a container-based virtualization environment, container networking is an important component. To evaluate the impact of different networking methods between the containers on the simulation performance, the typical container networking methods such as none, bridge, macvlan were analyzed, and the performance of different networking methods was evaluated according to the throughput and latency metrics. The experiments show that under the same physical resource constraints, the macvlan networking method has the best network performance, while the bridge method has the worst performance. This result provides a reference for selecting the appropriate networking method in the user behavior simulation process.
基金supported by the Foundation for Key Program of Ministry of Education, China under Grant No.311007National Science Foundation Project of China under Grants No. 61202079, No.61170225, No.61271199+1 种基金the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-09-015Athe Fundamental Research Funds in Beijing Jiaotong University under Grant No.W11JB00630
文摘Nowadays, an increasing number of web applications require identification registration. However, the behavior of website registration has not ever been thoroughly studied. We use the database provided by the Chinese Software Develop Net (CSDN) to provide a complete perspective on this research point. We concentrate on the following three aspects: complexity, correlation, and preference. From these analyses, we draw the following conclusions: firstly, a considerable number of users have not realized the importance of identification and are using very simple identifications that can be attacked very easily. Secondly, there is a strong complexity correlation among the three parts of identification. Thirdly, the top three passwords that users like are 123456789, 12345678 and 11111111, and the top three email providers that they prefer are NETEASE, qq and sina. Further, we provide some suggestions to improve the quality of user passwords.
文摘Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/methodology/approach: Our study investigates the mobile library system’s acceptance by using a context-specific extension of the theory of reasoned action(TRA) and the technology acceptance model(TAM), which includes such factors as mobile self-efficacy, personal innovativeness and perceived playfulness. Structural equation modeling was used to test the validity of the proposed model based on the empirical data which was collected from 210 questionnaire survey participants.Findings: The result shows that 1) for both current users and potential adopters, attitude toward use and subjective norm both have a significant and positive impact on behavioral intention to use; 2) perceived usefulness and perceived ease of use are significantly correlated to potential adopters’ attitude toward use whereas perceived usefulness and perceived playfulness are significantly related to current users’ attitude toward use; 3) as for the comparison between the two groups of users, personal innovativeness not only affects perceived usefulness of both current users and potential adopters, but also affects potential adopters’ perceived playfulness positively. Mobile self-efficacy has a significant effect on perceived ease of use for both types of users.Research limitations: Although the sample size met the basic statistics requirements for the social research, the participants were mainly college students, and other mobile system users like faculty members and researchers were not investigated. In addition, some influencing factors, such as information quality, system quality and service quality were not considered in the research model.Practical implications: This study reveals main factors which influence both current users and potential adopters’ intention to use the mobile system, providing academic libraries withinsights into management strategies to offer customized mobile services to different types of users. Originality/value: Previous studies did not distinguish current users from potential adopters, which is not conducive for academic libraries to provide customized services and attract potential users. We presented an exploratory study to address this issue.
文摘The problem of privacy in social networks is well documented within literature;users have pri- vacy concerns however, they consistently disclose their sensitive information and leave it open to unintended third parties. While numerous causes of poor behaviour have been suggested by re- search the role of the User Interface (UI) and the system itself is underexplored. The field of Per- suasive Technology would suggest that Social Network Systems persuade users to deviate from their normal or habitual behaviour. This paper makes the case that the UI can be used as the basis for user empowerment by informing them of their privacy at the point of interaction and remind- ing them of their privacy needs. The Theory of Planned Behaviour is introduced as a potential theoretical foundation for exploring the psychology behind privacy behaviour as it describes the salient factors that influence intention and action. Based on these factors of personal attitude, subjective norms and perceived control, a series of UIs are presented and implemented in con- trolled experiments examining their effect on personal information disclosure. This is combined with observations and interviews with the participants. Results from this initial, pilot experiment suggest groups with privacy salient information embedded exhibit less disclosure than the control group. This work reviews this approach as a method for exploring privacy behaviour and propos- es further work required.
基金This research was funded by Scientific Research Deanship,Albaha University,under the Grant Number:[24/1440].
文摘As nearly half of the incidents in enterprise security have been triggered by insiders,it is important to deploy a more intelligent defense system to assist enterprises in pinpointing and resolving the incidents caused by insiders or malicious software(malware)in real-time.Failing to do so may cause a serious loss of reputation as well as business.At the same time,modern network traffic has dynamic patterns,high complexity,and large volumes that make it more difficult to detect malware early.The ability to learn tasks sequentially is crucial to the development of artificial intelligence.Existing neurogenetic computation models with deep-learning techniques are able to detect complex patterns;however,the models have limitations,including catastrophic forgetfulness,and require intensive computational resources.As defense systems using deep-learning models require more time to learn new traffic patterns,they cannot perform fully online(on-the-fly)learning.Hence,an intelligent attack/malware detection system with on-the-fly learning capability is required.For this paper,a memory-prediction framework was adopted,and a simplified single cell assembled sequential hierarchical memory(s.SCASHM)model instead of the hierarchical temporal memory(HTM)model is proposed to speed up learning convergence to achieve onthe-fly learning.The s.SCASHM consists of a Single Neuronal Cell(SNC)model and a simplified Sequential Hierarchical Superset(SHS)platform.The s.SCASHMis implemented as the prediction engine of a user behavior analysis tool to detect insider attacks/anomalies.The experimental results show that the proposed memory model can predict users’traffic behavior with accuracy level ranging from 72%to 83%while performing on-the-fly learning.