Purpose: In order to explain and predict the adoption of personal cloud storage, this study explores the critical factors involved in the adoption of personal cloud storage and empirically validates their relationshi...Purpose: In order to explain and predict the adoption of personal cloud storage, this study explores the critical factors involved in the adoption of personal cloud storage and empirically validates their relationships to a user's intentions.Design/methodology/approach: Based on technology acceptance model(TAM), network externality, trust, and an interview survey, this study proposes a personal cloud storage adoption model. We conducted an empirical analysis by structural equation modeling based on survey data obtained with a questionnaire.Findings: Among the adoption factors we identified, network externality has the salient influence on a user's adoption intention, followed by perceived usefulness, individual innovation, perceived trust, perceived ease of use, and subjective norms. Cloud storage characteristics are the most important indirect factors, followed by awareness to personal cloud storage and perceived risk. However, although perceived risk is regarded as an important factor by other cloud computing researchers, we found that it has no significant influence. Also, subjective norms have no significant influence on perceived usefulness. This indicates that users are rational when they choose whether to adopt personal cloud storage.Research limitations: This study ignores time and cost factors that might affect a user's intention to adopt personal cloud storage.Practical implications: Our findings might be helpful in designing and developing personal cloud storage products, and helpful to regulators crafting policies.Originality/value: This study is one of the first research efforts that discuss Chinese users' personal cloud storage adoption, which should help to further the understanding of personal cloud adoption behavior among Chinese users.展开更多
Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information quickly.The use of cloud computing has realized the rapid increase ...Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information quickly.The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently.This cloud is nowadays highly affected by internal threats of the user.Sensitive applications such as banking,hospital,and business are more likely affected by real user threats.An intruder is presented as a user and set as a member of the network.After becoming an insider in the network,they will try to attack or steal sensitive data during information sharing or conversation.The major issue in today's technological development is identifying the insider threat in the cloud network.When data are lost,compromising cloud users is difficult.Privacy and security are not ensured,and then,the usage of the cloud is not trusted.Several solutions are available for the external security of the cloud network.However,insider or internal threats need to be addressed.In this research work,we focus on a solution for identifying an insider attack using the artificial intelligence technique.An insider attack is possible by using nodes of weak users’systems.They will log in using a weak user id,connect to a network,and pretend to be a trusted node.Then,they can easily attack and hack information as an insider,and identifying them is very difficult.These types of attacks need intelligent solutions.A machine learning approach is widely used for security issues.To date,the existing lags can classify the attackers accurately.This information hijacking process is very absurd,which motivates young researchers to provide a solution for internal threats.In our proposed work,we track the attackers using a user interaction behavior pattern and deep learning technique.The usage of mouse movements and clicks and keystrokes of the real user is stored in a database.The deep belief neural network is designed using a restricted Boltzmann machine(RBM)so that the layer of RBM communicates with the previous and subsequent layers.The result is evaluated using a Cooja simulator based on the cloud environment.The accuracy and F-measure are highly improved compared with when using the existing long short-term memory and support vector machine.展开更多
To meet the needs of today’s library users,institutions are developing library mobile apps(LMAs),as their libraries are increasingly intelligent and rely on deep learning.This paper explores the influencing factors a...To meet the needs of today’s library users,institutions are developing library mobile apps(LMAs),as their libraries are increasingly intelligent and rely on deep learning.This paper explores the influencing factors and differences in the perception of LMAs at different time points after a user has downloaded an LMA.A research model was constructed based on the technology acceptance model.A questionnaire was designed and distributed twice to LMA users with an interval of three months to collect dynamic data.The analysis was based on structural equation modeling.The empirical results show that the perceived ease of use,the perceived usefulness,the social influence,and the facilitating conditions affected the users’behavioral intention,but their impacts were different at different times.As the usage time increases,the technology acceptance model is still universal for understanding the user perception of LMA.In addition,two extended variables(social impact and convenience)also affect the user’s behavior intention.User behavior is dynamic and changed over time.This study is important both theoretically and practically,as the results could be used to improve the service quality of LMAs and reduce the loss rate of users.Its findings may help the designers and developers of LMAs to optimize them from the perspective of a user and improve the service experience by providing a deeper understanding of the adoption behavior of information systems by LMA users.展开更多
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas o...Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation.The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data breach.The single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling.The data analysis did not support threat severity relationship with conscious care behaviour.The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.展开更多
This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (laaS). The security of such VMs is cri...This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (laaS). The security of such VMs is critical to laaS security. Many studies have been done on cloud computing security issues, but research into VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate. More and more studies show that communication among internal nodes exhibits complex patterns. Communication among VMs in cloud computing is invisible. Researchers find such issues challenging, and few solutions have been proposed--leaving cloud computing vulnerable to network attacks. This paper proposes a model that uses Software-Defined Networks (SDN) to implement traffic redirection. Our model can capture inter-VM traffic, detect known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behaviors, and control network systems. The experimental results indicate that the effectiveness of our approach is greater than 90%, and prove the feasibility of the model.展开更多
Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/meth...Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/methodology/approach: Our study investigates the mobile library system’s acceptance by using a context-specific extension of the theory of reasoned action(TRA) and the technology acceptance model(TAM), which includes such factors as mobile self-efficacy, personal innovativeness and perceived playfulness. Structural equation modeling was used to test the validity of the proposed model based on the empirical data which was collected from 210 questionnaire survey participants.Findings: The result shows that 1) for both current users and potential adopters, attitude toward use and subjective norm both have a significant and positive impact on behavioral intention to use; 2) perceived usefulness and perceived ease of use are significantly correlated to potential adopters’ attitude toward use whereas perceived usefulness and perceived playfulness are significantly related to current users’ attitude toward use; 3) as for the comparison between the two groups of users, personal innovativeness not only affects perceived usefulness of both current users and potential adopters, but also affects potential adopters’ perceived playfulness positively. Mobile self-efficacy has a significant effect on perceived ease of use for both types of users.Research limitations: Although the sample size met the basic statistics requirements for the social research, the participants were mainly college students, and other mobile system users like faculty members and researchers were not investigated. In addition, some influencing factors, such as information quality, system quality and service quality were not considered in the research model.Practical implications: This study reveals main factors which influence both current users and potential adopters’ intention to use the mobile system, providing academic libraries withinsights into management strategies to offer customized mobile services to different types of users. Originality/value: Previous studies did not distinguish current users from potential adopters, which is not conducive for academic libraries to provide customized services and attract potential users. We presented an exploratory study to address this issue.展开更多
In a cloud computing environment, users using the pay-as-you-go billing model can relinquish their services at any point in time and pay accordingly. From the perspective of the Cloud Service Providers (CSPs), this is...In a cloud computing environment, users using the pay-as-you-go billing model can relinquish their services at any point in time and pay accordingly. From the perspective of the Cloud Service Providers (CSPs), this is not beneficial as they may lose the opportunity to earn from the relinquished resources. Therefore, this paper tackles the resource assignment problem while considering users relinquishment and its impact on the net profit of CSPs. As a solution, we first compare different ways to predict user behavior (i.e. how likely a user will leave the system before its scheduled end time) and deduce a better prediction technique based on linear regression. Then, based on the RACE (Relinquishment-Aware Cloud Economics) model proposed in [1], we develop a relinquishment-aware resource optimization model to estimate the amount of resources to assign on the basis of predicted user behavior. Simulations performed with CloudSim show that cloud service providers can gain more by estimating the amount of resources using better prediction techniques rather than blindly assigning resources to users. They also show that the proposed prediction-based resource assignment scheme typically generates more profit for a lower or similar utilization.展开更多
受用户行为和商品属性的影响,线上商品推荐的可靠性难以得到保障,为此,设计基于云计算的线上商品智能推荐系统。将密集计算型ic5云服务器作为系统的硬件装置;在软件设计阶段,利用云计算技术对用户行为进行综合分析,并将其与商品属性进...受用户行为和商品属性的影响,线上商品推荐的可靠性难以得到保障,为此,设计基于云计算的线上商品智能推荐系统。将密集计算型ic5云服务器作为系统的硬件装置;在软件设计阶段,利用云计算技术对用户行为进行综合分析,并将其与商品属性进行匹配分析,确定最终的推荐结果。应用测试结果显示,该系统在不同数据集上的接受者操作特性曲线下面积(Area Under Curve,AUC)表现出了较高的稳定性,且均在0.88以上,表明该系统具有较高的应用价值。展开更多
资源分配策略是云计算研究领域中的一项重要研究点,研究人员提出了多种资源共享与分配策略,然而很少有工作关注不同云计算用户群体的行为习惯对资源分配策略的影响.提出的基于用户行为特征的资源分配策略就是通过统计用户工作习惯与任...资源分配策略是云计算研究领域中的一项重要研究点,研究人员提出了多种资源共享与分配策略,然而很少有工作关注不同云计算用户群体的行为习惯对资源分配策略的影响.提出的基于用户行为特征的资源分配策略就是通过统计用户工作习惯与任务完成时间期望值的变化规律,建立用户行为特征信息表,从而预测出不同时间片内用户的任务提交规律以及用户期望完成时间,动态调整云计算系统的资源分配策略,使得系统在满足用户预期任务完成时间的前提下实现任务并发最大化,提升单位资源的用户满意度.HUTAF(Huawei unitfied test automation framework)云测试平台是华为公司自行研发的云测试平台,并基于该平台开展各种策略下的资源利用率与用户满意度实验.实验结果表明,该策略提升了整个系统在满足用户期望完成时间的前提下的总任务并发数,有效降低了IaaS供应商的运营成本.展开更多
基金supported by Social Science Fund of Hebei Province (Grant No.:HB15TQ019)
文摘Purpose: In order to explain and predict the adoption of personal cloud storage, this study explores the critical factors involved in the adoption of personal cloud storage and empirically validates their relationships to a user's intentions.Design/methodology/approach: Based on technology acceptance model(TAM), network externality, trust, and an interview survey, this study proposes a personal cloud storage adoption model. We conducted an empirical analysis by structural equation modeling based on survey data obtained with a questionnaire.Findings: Among the adoption factors we identified, network externality has the salient influence on a user's adoption intention, followed by perceived usefulness, individual innovation, perceived trust, perceived ease of use, and subjective norms. Cloud storage characteristics are the most important indirect factors, followed by awareness to personal cloud storage and perceived risk. However, although perceived risk is regarded as an important factor by other cloud computing researchers, we found that it has no significant influence. Also, subjective norms have no significant influence on perceived usefulness. This indicates that users are rational when they choose whether to adopt personal cloud storage.Research limitations: This study ignores time and cost factors that might affect a user's intention to adopt personal cloud storage.Practical implications: Our findings might be helpful in designing and developing personal cloud storage products, and helpful to regulators crafting policies.Originality/value: This study is one of the first research efforts that discuss Chinese users' personal cloud storage adoption, which should help to further the understanding of personal cloud adoption behavior among Chinese users.
文摘Cloud computing is a high network infrastructure where users,owners,third users,authorized users,and customers can access and store their information quickly.The use of cloud computing has realized the rapid increase of information in every field and the need for a centralized location for processing efficiently.This cloud is nowadays highly affected by internal threats of the user.Sensitive applications such as banking,hospital,and business are more likely affected by real user threats.An intruder is presented as a user and set as a member of the network.After becoming an insider in the network,they will try to attack or steal sensitive data during information sharing or conversation.The major issue in today's technological development is identifying the insider threat in the cloud network.When data are lost,compromising cloud users is difficult.Privacy and security are not ensured,and then,the usage of the cloud is not trusted.Several solutions are available for the external security of the cloud network.However,insider or internal threats need to be addressed.In this research work,we focus on a solution for identifying an insider attack using the artificial intelligence technique.An insider attack is possible by using nodes of weak users’systems.They will log in using a weak user id,connect to a network,and pretend to be a trusted node.Then,they can easily attack and hack information as an insider,and identifying them is very difficult.These types of attacks need intelligent solutions.A machine learning approach is widely used for security issues.To date,the existing lags can classify the attackers accurately.This information hijacking process is very absurd,which motivates young researchers to provide a solution for internal threats.In our proposed work,we track the attackers using a user interaction behavior pattern and deep learning technique.The usage of mouse movements and clicks and keystrokes of the real user is stored in a database.The deep belief neural network is designed using a restricted Boltzmann machine(RBM)so that the layer of RBM communicates with the previous and subsequent layers.The result is evaluated using a Cooja simulator based on the cloud environment.The accuracy and F-measure are highly improved compared with when using the existing long short-term memory and support vector machine.
文摘To meet the needs of today’s library users,institutions are developing library mobile apps(LMAs),as their libraries are increasingly intelligent and rely on deep learning.This paper explores the influencing factors and differences in the perception of LMAs at different time points after a user has downloaded an LMA.A research model was constructed based on the technology acceptance model.A questionnaire was designed and distributed twice to LMA users with an interval of three months to collect dynamic data.The analysis was based on structural equation modeling.The empirical results show that the perceived ease of use,the perceived usefulness,the social influence,and the facilitating conditions affected the users’behavioral intention,but their impacts were different at different times.As the usage time increases,the technology acceptance model is still universal for understanding the user perception of LMA.In addition,two extended variables(social impact and convenience)also affect the user’s behavior intention.User behavior is dynamic and changed over time.This study is important both theoretically and practically,as the results could be used to improve the service quality of LMAs and reduce the loss rate of users.Its findings may help the designers and developers of LMAs to optimize them from the perspective of a user and improve the service experience by providing a deeper understanding of the adoption behavior of information systems by LMA users.
基金Taif University Researchers Supporting Project number(TURSP-2020/98).
文摘Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation.The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data breach.The single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling.The data analysis did not support threat severity relationship with conscious care behaviour.The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management.
基金supported by the National Natural Science Foundation of China (No.61272447)the National Key Technologies Research and Development Program of China (No.2012BAH18B05)
文摘This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (laaS). The security of such VMs is critical to laaS security. Many studies have been done on cloud computing security issues, but research into VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate. More and more studies show that communication among internal nodes exhibits complex patterns. Communication among VMs in cloud computing is invisible. Researchers find such issues challenging, and few solutions have been proposed--leaving cloud computing vulnerable to network attacks. This paper proposes a model that uses Software-Defined Networks (SDN) to implement traffic redirection. Our model can capture inter-VM traffic, detect known and unknown anomalous network behaviors, adopt hybrid techniques to analyze VM network behaviors, and control network systems. The experimental results indicate that the effectiveness of our approach is greater than 90%, and prove the feasibility of the model.
文摘Purpose: The study intends to examine the factors influencing the behavioral intention to use academic libraries’ mobile systems from the perspective of current users and potential adopters, respectively. Design/methodology/approach: Our study investigates the mobile library system’s acceptance by using a context-specific extension of the theory of reasoned action(TRA) and the technology acceptance model(TAM), which includes such factors as mobile self-efficacy, personal innovativeness and perceived playfulness. Structural equation modeling was used to test the validity of the proposed model based on the empirical data which was collected from 210 questionnaire survey participants.Findings: The result shows that 1) for both current users and potential adopters, attitude toward use and subjective norm both have a significant and positive impact on behavioral intention to use; 2) perceived usefulness and perceived ease of use are significantly correlated to potential adopters’ attitude toward use whereas perceived usefulness and perceived playfulness are significantly related to current users’ attitude toward use; 3) as for the comparison between the two groups of users, personal innovativeness not only affects perceived usefulness of both current users and potential adopters, but also affects potential adopters’ perceived playfulness positively. Mobile self-efficacy has a significant effect on perceived ease of use for both types of users.Research limitations: Although the sample size met the basic statistics requirements for the social research, the participants were mainly college students, and other mobile system users like faculty members and researchers were not investigated. In addition, some influencing factors, such as information quality, system quality and service quality were not considered in the research model.Practical implications: This study reveals main factors which influence both current users and potential adopters’ intention to use the mobile system, providing academic libraries withinsights into management strategies to offer customized mobile services to different types of users. Originality/value: Previous studies did not distinguish current users from potential adopters, which is not conducive for academic libraries to provide customized services and attract potential users. We presented an exploratory study to address this issue.
文摘In a cloud computing environment, users using the pay-as-you-go billing model can relinquish their services at any point in time and pay accordingly. From the perspective of the Cloud Service Providers (CSPs), this is not beneficial as they may lose the opportunity to earn from the relinquished resources. Therefore, this paper tackles the resource assignment problem while considering users relinquishment and its impact on the net profit of CSPs. As a solution, we first compare different ways to predict user behavior (i.e. how likely a user will leave the system before its scheduled end time) and deduce a better prediction technique based on linear regression. Then, based on the RACE (Relinquishment-Aware Cloud Economics) model proposed in [1], we develop a relinquishment-aware resource optimization model to estimate the amount of resources to assign on the basis of predicted user behavior. Simulations performed with CloudSim show that cloud service providers can gain more by estimating the amount of resources using better prediction techniques rather than blindly assigning resources to users. They also show that the proposed prediction-based resource assignment scheme typically generates more profit for a lower or similar utilization.
文摘受用户行为和商品属性的影响,线上商品推荐的可靠性难以得到保障,为此,设计基于云计算的线上商品智能推荐系统。将密集计算型ic5云服务器作为系统的硬件装置;在软件设计阶段,利用云计算技术对用户行为进行综合分析,并将其与商品属性进行匹配分析,确定最终的推荐结果。应用测试结果显示,该系统在不同数据集上的接受者操作特性曲线下面积(Area Under Curve,AUC)表现出了较高的稳定性,且均在0.88以上,表明该系统具有较高的应用价值。
文摘资源分配策略是云计算研究领域中的一项重要研究点,研究人员提出了多种资源共享与分配策略,然而很少有工作关注不同云计算用户群体的行为习惯对资源分配策略的影响.提出的基于用户行为特征的资源分配策略就是通过统计用户工作习惯与任务完成时间期望值的变化规律,建立用户行为特征信息表,从而预测出不同时间片内用户的任务提交规律以及用户期望完成时间,动态调整云计算系统的资源分配策略,使得系统在满足用户预期任务完成时间的前提下实现任务并发最大化,提升单位资源的用户满意度.HUTAF(Huawei unitfied test automation framework)云测试平台是华为公司自行研发的云测试平台,并基于该平台开展各种策略下的资源利用率与用户满意度实验.实验结果表明,该策略提升了整个系统在满足用户期望完成时间的前提下的总任务并发数,有效降低了IaaS供应商的运营成本.