Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and ...Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and C viruses among drug users in Burkina Faso. Methodology: This was a cross-sectional biological and behavioral survey conducted between June and August 2022, among drug users in Ouagadougou and Bobo Dioulasso, the two main cities of Burkina Faso. A respondent-driven sampling (RDS) was used to recruit drug users. Hepatitis B surface antigen was determined using lateral flow rapid test kits and antibodies to hepatitis C virus in serum determined using an Enzyme-Linked Immunosorbent Assay. Data were entered and analyzed using Stata 17 software. Weighted binary logistic regression was used to identify the associated factors of hepatitis B and C infections and a p-value Results: A total of 323 drug users were recruited with 97.5% males. The mean age was 32.7 years old. The inhaled or smoked mode was the most used by drug users. The adjusted hepatitis B and hepatitis C prevalence among study participants were 11.1% and 2.3% respectively. The marital status (p = 0.001), and the nationality (p = 0.011) were significantly associated with hepatitis B infection. The type of drug used was not significantly associated with hepatitis B infection or hepatitis C infection. Conclusion: The prevalence of HBsAg and anti-HCV antibodies among DUs are comparable to those reported in the general population in Burkina Faso. This result suggests that the main routes of contamination by HBV and HCV among DUs are similar to those in the population, and could be explained by the low use of the injectable route by DUs in Burkina Faso.展开更多
Autonomous vehicles (AVs) hold immense promises in revolutionizing transportation, and their potential benefits extend to individuals with impairments, particularly those with vision and hearing impairments. However, ...Autonomous vehicles (AVs) hold immense promises in revolutionizing transportation, and their potential benefits extend to individuals with impairments, particularly those with vision and hearing impairments. However, the accommodation of these individuals in AVs requires developing advanced user interfaces. This paper describes an explorative study of a multimodal user interface for autonomous vehicles, specifically developed for passengers with sensory (vision and/or hearing) impairments. In a driving simulator, 32 volunteers with simulated sensory impairments, were exposed to multiple drives in an autonomous vehicle while freely interacting with standard and inclusive variants of the infotainment and navigation system interface. The two user interfaces differed in graphical layout and voice messages, which adopted inclusive design principles for the inclusive variant. Questionnaires and structured interviews were conducted to collect participants’ impressions. The data analysis reports positive user experiences, but also identifies technical challenges. Verified guidelines are provided for further development of inclusive user interface solutions.展开更多
During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to coo...During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to cooperatives concerned. Due to lack of financial resources, but also because of poor management, everywhere in Niger we are witnessing an accelerated deterioration of the irrigation infrastructure of hydro-agricultural developments. Institutional studies carried out on this situation led the State of Niger to initiate a reform of the governance of hydro-agricultural developments, by streng-thening the status of ONAHA, by creating an Association of Irrigation Water Users (AUEI) and by restructuring the old cooperatives. Indeed, this research aims to analyze the creation of functional and sustainable Irrigation Water User Associations (AUEI) in Niger in a context of reform of the irrigation sector, and based on the experience of the Konni AHA. It is based on a methodological approach which takes into account documentary research and the collection of data from 115 farmers, selected by reasoned choice and directly concerned by the management of the irrigated area. The data collected was analyzed and the results were analyzed using the systemic approach and the diagnostic process. The results show that the main mission of the AUEI is to ensure better management of water, hydraulic equipment and infrastructure on the hydro-agricultural developments of Konni. The creation of the Konni AUEI was possible thanks to massive support from the populations and authorities in the implementation process. After its establishment, the AUEI experienced a certain lethargy for some time due to the rehabilitation work of the AHA but currently it is functional and operational in terms of associative life and governance. Thus, the constraints linked to the legal system, the delay in the completion of the work, the uncertainties of access to irrigation water but also the problems linked to the change in mentality of certain ONAHA agents constitute the challenges that must be resolved in the short term for the operationalization of the Konni AUEI.展开更多
In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interact...In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users.展开更多
Online shopping in Cameroon is growing rapidly and gaining considerable ground.The phenomenon is relatively new as compared to the traditional brick-and-mortar store(serving customers face-to-face in a building rather...Online shopping in Cameroon is growing rapidly and gaining considerable ground.The phenomenon is relatively new as compared to the traditional brick-and-mortar store(serving customers face-to-face in a building rather than online).As the world faces digital transformations,businesses in Cameroon are seeking new ways to reach their customers and create favourable environments to effectively carryout online purchase.This study examines the factors that affect consumer online buying behaviour in Cameroon.Three theories guided this investigation:the Technology Acceptance Model(Davis,1989),Diffusion of Innovations Theory(Rogers,1995),and Uses and Gratifications Theory(Katz&Blumler,1974).The study focuses on students of the University of Buea who carry out online shopping.Purposive sampling is used,and data are collected from 365 respondents through a questionnaire with open and closed ended questions.Analysis of data is done with the use of the Statistical Package for Social Scientists(SPSS)Version 21 to determine the types of products consumers buy online;the degree to which consumer trust and satisfaction affect consumer loyalty;and the specific social,economic,and market factors that affect online buying behaviour.Findings indicate that:Consumers mostly buy fashion items(74.3%),electronics(44.7%),cosmetics(37.3%),and house equipment(34%)online.Consumers will repeat purchase from a marketer if they trust and are satisfied with the product and service quality(81.1%);hence,they will also encourage others to buy.If they are dissatisfied,they will not repeat purchase from the online store.Advertisement(76.1%),attractive pricing/discount(71.7%),product quality(71%),service quality(64.1%),convenience(72.3%),available income/money(49.6%),word of mouth recommendation(41.9%),and personal motivation(62.7%)constitute the major factors that affect consumer online buying behaviour.Results of the hypotheses testing show that:H1=Consumers buy more of fashion items online(X^(2)=9.950;df=16;p=0.869);H2=There is a significant relationship between trust and satisfaction and consumers online buying behaviour(X^(2)=270.765;df=16;p=0.000);and H3=Social,economic,and market factors significantly affect consumer online buying behaviour(X^(2)=106.328;df=16;p=0.000).The study recommends online marketers to develop their marketing strategies towards customer orientation and focus on the ease of use of their online shopping services.展开更多
This paper presents HumanBoost, an approach that aims at improving the accuracy of detecting so-called phishing sites by utilizing users’ past trust decisions (PTDs). Web users are generally required to make trust de...This paper presents HumanBoost, an approach that aims at improving the accuracy of detecting so-called phishing sites by utilizing users’ past trust decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. We assume that a database of user PTDs would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. For our pilot study, in November 2007, we invited 10 participants and performed a subject experiment. The participants browsed 14 simulated phishing sites and six legitimate sites, and judged whether or not the site appeared to be a phishing site. We utilize participants’ trust decisions as a new heuristic and we let AdaBoost incorporate it into eight existing heuristics. The results show that the average error rate for HumanBoost was 13.4%, whereas for participants it was 19.0% and for AdaBoost 20.0%. We also conducted two follow-up studies in March 2010 and July 2010, observed that the average error rate for HumanBoost was below the others. We therefore conclude that PTDs are available as new heuristics, and HumanBoost has the potential to improve detection accuracy for Web user.展开更多
This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions...This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost.展开更多
This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can...This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can leverage “nudges” to encourage users towards privacy-friendly choices. We analyze the limitations of rational choice in the context of privacy decision-making and identify key opportunities for integrating behavioral economics into PbD. We propose a user-centered design framework for integrating behavioral economics into PbD, which includes strategies for simplifying complex choices, making privacy visible, providing feedback and control, and testing and iterating. Our analysis highlights the need for a more nuanced understanding of user behavior and decision-making in the context of privacy, and demonstrates the potential of behavioral economics to inform the design of more effective PbD solutions.展开更多
In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously int...In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.展开更多
Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing...Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing effective intervention strategies. Methods: Face to face interviews were conducted and serum samples from injection drug users from detoxification centers and the community were collected for HIV screening. Results: 655 drug users were recruited and interviewed. The HIV seropositive rate was 29.0%. 99.5 % of subjects were injection drug users (IDUs), of whom,75.4% reported sharing injection equipment. Conclusion: HIV prevalence among injection drug users is high in the PRDR of Guangdong. Injection drug use is the principal behavioral risk factor for HIV transmission. Pragmatic harm reduction programs should be implemented to prevent the spread of HIV infection.展开更多
New idea studying urban parks was opened up by "Reflection on Urban Park:Public Space and Multi-culture". By introducing anthropology into planning and design methodology of urban public space, it provided a...New idea studying urban parks was opened up by "Reflection on Urban Park:Public Space and Multi-culture". By introducing anthropology into planning and design methodology of urban public space, it provided a new research method for the planning of urban park in our country. Through introduction and assessment of the book, existing problems and suggestions of the construction of our urban parks were proposed. In the perspective of urban parks' users, by the method of ethnology and anthropology, cultural diversity of urban public space would be investigated, paying attention to the usage behavior and different cultural characteristics, thinking about how to respect ecology and environmental construction of parks and coordinate the relation between culture and ecology while cultural diversity was respected. What should be considered in the construction of urban parks was not only culture but also ecological environment protection when culture was respected and citizens' interests during environment construction. These were also the fundamental problems needed to be considered and solved in parks' planning, construction and operation.展开更多
The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related in...The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.展开更多
When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes ...When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes an improved algorithm based on classification and user trust.It firstly classifies all the ratings by the categories of items.And then,for each category,it evaluates the trustworthy degree of each user on the category and imposes the degree on the ratings of the user.Finally,the algorithm explores the similarities between users,finds the nearest neighbors,and makes recommendations within each category.Simulations show that the improved algorithm outperforms the traditional collaborative filtering algorithms and enhances the accuracy of recommendation.展开更多
AIM:To characterize the prevalence of hepatitis C virus(HCV)infection among Chinese intravenous drug users(IDUs).METHODS:A total of 432 adult IDUs(95 women and337 men)in Shanghai were included in the study.The third-g...AIM:To characterize the prevalence of hepatitis C virus(HCV)infection among Chinese intravenous drug users(IDUs).METHODS:A total of 432 adult IDUs(95 women and337 men)in Shanghai were included in the study.The third-generation Elecsys Anti-HCV assay(Roche Diagnostics GmbH,Sandhofer Strasse 116,D-68305,Mannheim,Germany)was used to screen for antibodies against HCV.The RIBA strip,a supplemental antiHCV test with high specificity,was performed on all of the samples that tested positive during the initial screening.All of the anti-HCV positive samples were analyzed with a Cobas TaqMan 48 Analyzer(Roche Diagnostics)for direct detection of HCV RNA.All of the HCV RNA-positive samples were sequenced for genotype determination.RESULTS:The preliminary screening identified 262(60.6%)subjects who were seropositive for HCV.Of the 62 females and 200 males seropositive subjects,16(16.7%)and 65(19.3%),respectively,were confirmed by RIBA,yielding an overall HCV seropositive rate of18.8%.Four female(6.5%)and 14 male(7.0%)subjects tested positive for HCV RNA,indicating an active infection rate of 4.2%for the entire study population.The 18 HCV RNA-positive serum samples were genotyped.Seven individuals were genotype 1b,and four were genotype 1a.One individual each was infected with genotypes 2a,2b and 3a.Four subjects were coinfected with multiple strains:two with genotypes 1a and 2a,and two with genotypes 1b and 2a.The active infection rate among HCV-seropositive individuals was22.2%,which was significantly lower than most estimates.CONCLUSION:The prevalence of HCV is relatively low among IDUs in Shanghai,with a spontaneous recovery rate much higher than previous estimates.展开更多
The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on acc...The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.展开更多
Hong Kong is a hyper-dense city with 7x10(6) people living in an area of 1100km(2). One way to improve the livability of compacted and congested cities like Hong Kong is through the provision of urban parks, an aspect...Hong Kong is a hyper-dense city with 7x10(6) people living in an area of 1100km(2). One way to improve the livability of compacted and congested cities like Hong Kong is through the provision of urban parks, an aspect that has largely been under-researched. This study focuses on how users perceive and utilize various facilities in the Kowloon Park. The findings revealed that the Kowloon Park is one of the most preferred parks in Hong Kong for both local residents and tourists. Users were quite satisfied with the park's facilities. Notably, the most important component of an urban park is its greenery. This is followed by water elements, seating places, and facilities for various recreational activities. The improvements users would like to see in urban parks include good design and management, meeting users' needs, overcoming barriers to use, and providing a high quality and varied experience for different groups in the community. The findings of this study provide a good basis to address park management issues from the users' perspective. In particular, parks should provide easy access, encourage optimum usage and enable complimentary improvements to the environment.展开更多
According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respecti...According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users.展开更多
文摘Introduction: The epidemiology of both hepatitis B virus (HBV) and hepatitis C virus (HCV) infections among drug users (DUs) is little known in West Africa. The study aimed to assess the prevalence of hepatitis B and C viruses among drug users in Burkina Faso. Methodology: This was a cross-sectional biological and behavioral survey conducted between June and August 2022, among drug users in Ouagadougou and Bobo Dioulasso, the two main cities of Burkina Faso. A respondent-driven sampling (RDS) was used to recruit drug users. Hepatitis B surface antigen was determined using lateral flow rapid test kits and antibodies to hepatitis C virus in serum determined using an Enzyme-Linked Immunosorbent Assay. Data were entered and analyzed using Stata 17 software. Weighted binary logistic regression was used to identify the associated factors of hepatitis B and C infections and a p-value Results: A total of 323 drug users were recruited with 97.5% males. The mean age was 32.7 years old. The inhaled or smoked mode was the most used by drug users. The adjusted hepatitis B and hepatitis C prevalence among study participants were 11.1% and 2.3% respectively. The marital status (p = 0.001), and the nationality (p = 0.011) were significantly associated with hepatitis B infection. The type of drug used was not significantly associated with hepatitis B infection or hepatitis C infection. Conclusion: The prevalence of HBsAg and anti-HCV antibodies among DUs are comparable to those reported in the general population in Burkina Faso. This result suggests that the main routes of contamination by HBV and HCV among DUs are similar to those in the population, and could be explained by the low use of the injectable route by DUs in Burkina Faso.
文摘Autonomous vehicles (AVs) hold immense promises in revolutionizing transportation, and their potential benefits extend to individuals with impairments, particularly those with vision and hearing impairments. However, the accommodation of these individuals in AVs requires developing advanced user interfaces. This paper describes an explorative study of a multimodal user interface for autonomous vehicles, specifically developed for passengers with sensory (vision and/or hearing) impairments. In a driving simulator, 32 volunteers with simulated sensory impairments, were exposed to multiple drives in an autonomous vehicle while freely interacting with standard and inclusive variants of the infotainment and navigation system interface. The two user interfaces differed in graphical layout and voice messages, which adopted inclusive design principles for the inclusive variant. Questionnaires and structured interviews were conducted to collect participants’ impressions. The data analysis reports positive user experiences, but also identifies technical challenges. Verified guidelines are provided for further development of inclusive user interface solutions.
文摘During the 1980s, as part of a policy of liberalization, following budgetary cuts linked to the implementation of structural adjustment programs, management responsibilities for AHAs were transferred from ONAHA to cooperatives concerned. Due to lack of financial resources, but also because of poor management, everywhere in Niger we are witnessing an accelerated deterioration of the irrigation infrastructure of hydro-agricultural developments. Institutional studies carried out on this situation led the State of Niger to initiate a reform of the governance of hydro-agricultural developments, by streng-thening the status of ONAHA, by creating an Association of Irrigation Water Users (AUEI) and by restructuring the old cooperatives. Indeed, this research aims to analyze the creation of functional and sustainable Irrigation Water User Associations (AUEI) in Niger in a context of reform of the irrigation sector, and based on the experience of the Konni AHA. It is based on a methodological approach which takes into account documentary research and the collection of data from 115 farmers, selected by reasoned choice and directly concerned by the management of the irrigated area. The data collected was analyzed and the results were analyzed using the systemic approach and the diagnostic process. The results show that the main mission of the AUEI is to ensure better management of water, hydraulic equipment and infrastructure on the hydro-agricultural developments of Konni. The creation of the Konni AUEI was possible thanks to massive support from the populations and authorities in the implementation process. After its establishment, the AUEI experienced a certain lethargy for some time due to the rehabilitation work of the AHA but currently it is functional and operational in terms of associative life and governance. Thus, the constraints linked to the legal system, the delay in the completion of the work, the uncertainties of access to irrigation water but also the problems linked to the change in mentality of certain ONAHA agents constitute the challenges that must be resolved in the short term for the operationalization of the Konni AUEI.
文摘In the era of network live broadcasting for everyone,the development of live broadcasting platforms is also more intelligent and diversified.However,in the face of a large group of elderly users,the interface interaction design mode used is still mainly based on the interaction mode for young groups,and is not designed for elderly users.Therefore,a design method for optimizing the interaction interface of live broadcasting platform for elderly users was proposed in this study.Firstly,the case study method and Delphi expert survey method were used to determine the design needs of elderly users and the design mode was analysed.Secondly,the orthogonal design principle was used to design a test sample of the interactive interface of live broadcasting platform applicable for the elderly users,and then a user evaluation system was established to calculate the weights of the design elements using hierarchical analysis,and then the predictive relationship between the design mode of the interactive interface of live broadcasting platform and the elderly users was established by Quantitative Theory I.Finally,Genetic Algorithm was applied to generate the optimized design scheme.The results showed that the design method based on the Genetic Algorithm and the combination of Quantitative Theory can scientifically and effectively optimize the design of the interactive interface of the live broadcasting platform for the elderly users,and improve the experience of the elderly users.
文摘Online shopping in Cameroon is growing rapidly and gaining considerable ground.The phenomenon is relatively new as compared to the traditional brick-and-mortar store(serving customers face-to-face in a building rather than online).As the world faces digital transformations,businesses in Cameroon are seeking new ways to reach their customers and create favourable environments to effectively carryout online purchase.This study examines the factors that affect consumer online buying behaviour in Cameroon.Three theories guided this investigation:the Technology Acceptance Model(Davis,1989),Diffusion of Innovations Theory(Rogers,1995),and Uses and Gratifications Theory(Katz&Blumler,1974).The study focuses on students of the University of Buea who carry out online shopping.Purposive sampling is used,and data are collected from 365 respondents through a questionnaire with open and closed ended questions.Analysis of data is done with the use of the Statistical Package for Social Scientists(SPSS)Version 21 to determine the types of products consumers buy online;the degree to which consumer trust and satisfaction affect consumer loyalty;and the specific social,economic,and market factors that affect online buying behaviour.Findings indicate that:Consumers mostly buy fashion items(74.3%),electronics(44.7%),cosmetics(37.3%),and house equipment(34%)online.Consumers will repeat purchase from a marketer if they trust and are satisfied with the product and service quality(81.1%);hence,they will also encourage others to buy.If they are dissatisfied,they will not repeat purchase from the online store.Advertisement(76.1%),attractive pricing/discount(71.7%),product quality(71%),service quality(64.1%),convenience(72.3%),available income/money(49.6%),word of mouth recommendation(41.9%),and personal motivation(62.7%)constitute the major factors that affect consumer online buying behaviour.Results of the hypotheses testing show that:H1=Consumers buy more of fashion items online(X^(2)=9.950;df=16;p=0.869);H2=There is a significant relationship between trust and satisfaction and consumers online buying behaviour(X^(2)=270.765;df=16;p=0.000);and H3=Social,economic,and market factors significantly affect consumer online buying behaviour(X^(2)=106.328;df=16;p=0.000).The study recommends online marketers to develop their marketing strategies towards customer orientation and focus on the ease of use of their online shopping services.
文摘This paper presents HumanBoost, an approach that aims at improving the accuracy of detecting so-called phishing sites by utilizing users’ past trust decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. We assume that a database of user PTDs would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. For our pilot study, in November 2007, we invited 10 participants and performed a subject experiment. The participants browsed 14 simulated phishing sites and six legitimate sites, and judged whether or not the site appeared to be a phishing site. We utilize participants’ trust decisions as a new heuristic and we let AdaBoost incorporate it into eight existing heuristics. The results show that the average error rate for HumanBoost was 13.4%, whereas for participants it was 19.0% and for AdaBoost 20.0%. We also conducted two follow-up studies in March 2010 and July 2010, observed that the average error rate for HumanBoost was below the others. We therefore conclude that PTDs are available as new heuristics, and HumanBoost has the potential to improve detection accuracy for Web user.
文摘This paper analyzes users’ trust decision patterns for detecting phishing sites. Our previous work proposed HumanBoost [1] which improves the accuracy of detecting phishing sites by using users’ Past Trust Decisions (PTDs). Web users are generally required to make trust decisions whenever their personal information is requested by a website. Human-Boostassumed that a database of Web user’s PTD would be transformed into a binary vector, representing phishing or not-phishing, and the binary vector can be used for detecting phishing sites, similar to the existing heuristics. Here, this paper explores the types of the users whose PTDs are useful by running a subject experiment, where 309 participants- browsed 40 websites, judged whether the site appeared to be a phishing site, and described the criterion while assessing the credibility of the site. Based on the result of the experiment, this paper classifies the participants into eight groups by clustering approach and evaluates the detection accuracy for each group. It then clarifies the types of the users who can make suitable trust decisions for HumanBoost.
文摘This paper conducts a comprehensive review of existing research on Privacy by Design (PbD) and behavioral economics, explores the intersection of Privacy by Design (PbD) and behavioral economics, and how designers can leverage “nudges” to encourage users towards privacy-friendly choices. We analyze the limitations of rational choice in the context of privacy decision-making and identify key opportunities for integrating behavioral economics into PbD. We propose a user-centered design framework for integrating behavioral economics into PbD, which includes strategies for simplifying complex choices, making privacy visible, providing feedback and control, and testing and iterating. Our analysis highlights the need for a more nuanced understanding of user behavior and decision-making in the context of privacy, and demonstrates the potential of behavioral economics to inform the design of more effective PbD solutions.
文摘In the digital age, the global character of the Internet has significantly improved our daily lives by providing access to large amounts of knowledge and allowing for seamless connections. However, this enormously interconnected world is not without its risks. Malicious URLs are a powerful menace, masquerading as legitimate links while holding the intent to hack computer systems or steal sensitive personal information. As the sophistication and frequency of cyberattacks increase, identifying bad URLs has emerged as a critical aspect of cybersecurity. This study presents a new approach that enables the average end-user to check URL safety using Microsoft Excel. Using the powerful VirusTotal API for URL inspections, this study creates an Excel add-in that integrates Python and Excel to deliver a seamless, user-friendly interface. Furthermore, the study improves Excel’s capabilities by allowing users to encrypt and decrypt text communications directly in the spreadsheet. Users may easily encrypt their conversations by simply typing a key and the required text into predefined cells, enhancing their personal cybersecurity with a layer of cryptographic secrecy. This strategy democratizes access to advanced cybersecurity solutions, making attentive digital integrity a feature rather than a daunting burden.
文摘Objective: To understand the prevalence and behavioral risk factors of HIV infection among injection drug users in the Pearl River Delta Region (PRDR) of Guangdong province, and to provide evidence for establishing effective intervention strategies. Methods: Face to face interviews were conducted and serum samples from injection drug users from detoxification centers and the community were collected for HIV screening. Results: 655 drug users were recruited and interviewed. The HIV seropositive rate was 29.0%. 99.5 % of subjects were injection drug users (IDUs), of whom,75.4% reported sharing injection equipment. Conclusion: HIV prevalence among injection drug users is high in the PRDR of Guangdong. Injection drug use is the principal behavioral risk factor for HIV transmission. Pragmatic harm reduction programs should be implemented to prevent the spread of HIV infection.
文摘New idea studying urban parks was opened up by "Reflection on Urban Park:Public Space and Multi-culture". By introducing anthropology into planning and design methodology of urban public space, it provided a new research method for the planning of urban park in our country. Through introduction and assessment of the book, existing problems and suggestions of the construction of our urban parks were proposed. In the perspective of urban parks' users, by the method of ethnology and anthropology, cultural diversity of urban public space would be investigated, paying attention to the usage behavior and different cultural characteristics, thinking about how to respect ecology and environmental construction of parks and coordinate the relation between culture and ecology while cultural diversity was respected. What should be considered in the construction of urban parks was not only culture but also ecological environment protection when culture was respected and citizens' interests during environment construction. These were also the fundamental problems needed to be considered and solved in parks' planning, construction and operation.
基金sponsored by the National Natural Science Foundation of China under grant number No.61100008,61201084the China Postdoctoral Science Foundation under Grant No.2013M541346+3 种基金Heilongiiang Postdoctoral Special Fund(Postdoctoral Youth Talent Program)under Grant No.LBH-TZ0504Heilongjiang Postdoctoral Fund under Grant No.LBH-Z13058the Natural Science Foundation of Heilongjiang Province of China under Grant No.QC2015076The Fundamental Research Funds for the Central Universities of China under grant number HEUCF100602
文摘The e-mail network is a type of social network. This study analyzes user behavior in e-mail subject participation in organizations by using social network analysis. First, the Enron dataset and the position-related information of an employee are introduced, and methods for deletion of false data are presented. Next, the three-layer model(User, Subject, Keyword) is proposed for analysis of user behavior. Then, the proposed keyword selection algorithm based on a greedy approach, and the influence and propagation of an e-mail subject are defined. Finally, the e-mail user behavior is analyzed for the Enron organization. This study has considerable significance in subject recommendation and character recognition.
基金supported by Phase 4,Software Engineering(Software Service Engineering)under Grant No.XXKZD1301
文摘When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes an improved algorithm based on classification and user trust.It firstly classifies all the ratings by the categories of items.And then,for each category,it evaluates the trustworthy degree of each user on the category and imposes the degree on the ratings of the user.Finally,the algorithm explores the similarities between users,finds the nearest neighbors,and makes recommendations within each category.Simulations show that the improved algorithm outperforms the traditional collaborative filtering algorithms and enhances the accuracy of recommendation.
基金Supported by Science and Technology Commission Xuhui District and Xuhui Health Bureau of ShanghaiNo.SHXH201226
文摘AIM:To characterize the prevalence of hepatitis C virus(HCV)infection among Chinese intravenous drug users(IDUs).METHODS:A total of 432 adult IDUs(95 women and337 men)in Shanghai were included in the study.The third-generation Elecsys Anti-HCV assay(Roche Diagnostics GmbH,Sandhofer Strasse 116,D-68305,Mannheim,Germany)was used to screen for antibodies against HCV.The RIBA strip,a supplemental antiHCV test with high specificity,was performed on all of the samples that tested positive during the initial screening.All of the anti-HCV positive samples were analyzed with a Cobas TaqMan 48 Analyzer(Roche Diagnostics)for direct detection of HCV RNA.All of the HCV RNA-positive samples were sequenced for genotype determination.RESULTS:The preliminary screening identified 262(60.6%)subjects who were seropositive for HCV.Of the 62 females and 200 males seropositive subjects,16(16.7%)and 65(19.3%),respectively,were confirmed by RIBA,yielding an overall HCV seropositive rate of18.8%.Four female(6.5%)and 14 male(7.0%)subjects tested positive for HCV RNA,indicating an active infection rate of 4.2%for the entire study population.The 18 HCV RNA-positive serum samples were genotyped.Seven individuals were genotype 1b,and four were genotype 1a.One individual each was infected with genotypes 2a,2b and 3a.Four subjects were coinfected with multiple strains:two with genotypes 1a and 2a,and two with genotypes 1b and 2a.The active infection rate among HCV-seropositive individuals was22.2%,which was significantly lower than most estimates.CONCLUSION:The prevalence of HCV is relatively low among IDUs in Shanghai,with a spontaneous recovery rate much higher than previous estimates.
基金Supported by Specialized Research Fund for theDoctoral Programof Higher Education of China (20050013011)
文摘The conception of trusted network connection (TNC) is introduced, and the weakness of TNC to control user's action is analyzed. After this, the paper brings out a set of secure access and control model based on access, authorization and control, and related authentication protocol. At last the security of this model is analyzed. The model can improve TNC's security of user control and authorization.
基金Under the auspices of the Germany-Hong Kong Joint Research Scheme (No.GER/99-00/01) and the Faculty Re-search Grant of the Hong Kong Baptist University (No.FRG/00-01/I-38)
文摘Hong Kong is a hyper-dense city with 7x10(6) people living in an area of 1100km(2). One way to improve the livability of compacted and congested cities like Hong Kong is through the provision of urban parks, an aspect that has largely been under-researched. This study focuses on how users perceive and utilize various facilities in the Kowloon Park. The findings revealed that the Kowloon Park is one of the most preferred parks in Hong Kong for both local residents and tourists. Users were quite satisfied with the park's facilities. Notably, the most important component of an urban park is its greenery. This is followed by water elements, seating places, and facilities for various recreational activities. The improvements users would like to see in urban parks include good design and management, meeting users' needs, overcoming barriers to use, and providing a high quality and varied experience for different groups in the community. The findings of this study provide a good basis to address park management issues from the users' perspective. In particular, parks should provide easy access, encourage optimum usage and enable complimentary improvements to the environment.
基金The National Natural Science Foundation of China(No.60972026,61271207)the National Science and Technology Major Project(No.2010ZX03006-002-01)+1 种基金the Specialized Research Fund for the Doctoral Program of Higher Education(No.20090092110009)the Specialized Development Foundation for the Achievement Transformation of Jiangsu Province(No.BA2010023)
文摘According to the fact that the secondary users' delay requirements for data transmission are not unitary in cognitive radio networks, the secondary users are divided into two classes, denoted by SU1 and SU2, respectively. It is assumed that SU1 has a higher priority to occupy the primary users' unutilized channels than SU2. A preemptive resume priority M/G/1 queuing network is used to model the multiple spectrum handoffs processing. By using a state transition probability matrix and a cost matrix, the average cumulative delays of SU1 and SU2 are calculated, respectively. Numerical results show that the more the primary user's traffic load, the more rapidly the SU2's cumulative handoff delay grows. Compared with the networks where secondary users are unitary, the lower the SUI's arrival rate, the more obviously both SUI's and SU2's handoff delays decrease. The admission access regions limited by the maximum tolerable delay can also facilitate the design of admission control rules for graded secondary users.