期刊文献+
共找到5,697篇文章
< 1 2 250 >
每页显示 20 50 100
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
1
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Privacy-Preserving Information Fusion Technique for Device to Server-Enabled Communication in the Internet of Things:A Hybrid Approach
2
作者 Amal Al-Rasheed Rahim Khan +3 位作者 Tahani Alsaed Mahwish Kundi Mohamad Hanif Md.Saad Mahidur R.Sarker 《Computers, Materials & Continua》 SCIE EI 2024年第7期1305-1323,共19页
Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both cus... Due to the overwhelming characteristics of the Internet of Things(IoT)and its adoption in approximately every aspect of our lives,the concept of individual devices’privacy has gained prominent attention from both customers,i.e.,people,and industries as wearable devices collect sensitive information about patients(both admitted and outdoor)in smart healthcare infrastructures.In addition to privacy,outliers or noise are among the crucial issues,which are directly correlated with IoT infrastructures,as most member devices are resource-limited and could generate or transmit false data that is required to be refined before processing,i.e.,transmitting.Therefore,the development of privacy-preserving information fusion techniques is highly encouraged,especially those designed for smart IoT-enabled domains.In this paper,we are going to present an effective hybrid approach that can refine raw data values captured by the respectivemember device before transmission while preserving its privacy through the utilization of the differential privacy technique in IoT infrastructures.Sliding window,i.e.,δi based dynamic programming methodology,is implemented at the device level to ensure precise and accurate detection of outliers or noisy data,and refine it prior to activation of the respective transmission activity.Additionally,an appropriate privacy budget has been selected,which is enough to ensure the privacy of every individualmodule,i.e.,a wearable device such as a smartwatch attached to the patient’s body.In contrast,the end module,i.e.,the server in this case,can extract important information with approximately the maximum level of accuracy.Moreover,refined data has been processed by adding an appropriate nose through the Laplace mechanism to make it useless or meaningless for the adversary modules in the IoT.The proposed hybrid approach is trusted from both the device’s privacy and the integrity of the transmitted information perspectives.Simulation and analytical results have proved that the proposed privacy-preserving information fusion technique for wearable devices is an ideal solution for resource-constrained infrastructures such as IoT and the Internet ofMedical Things,where both device privacy and information integrity are important.Finally,the proposed hybrid approach is proven against well-known intruder attacks,especially those related to the privacy of the respective device in IoT infrastructures. 展开更多
关键词 Internet of things information fusion differential privacy dynamic programming Laplace function
下载PDF
Age of Information Based User Scheduling and Data Assignment in Multi-User Mobile Edge Computing Networks:An Online Algorithm
3
作者 Ge Yiyang Xiong Ke +3 位作者 Dong Rui Lu Yang Fan Pingyi Qu Gang 《China Communications》 SCIE CSCD 2024年第5期153-165,共13页
This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization pr... This paper investigates the age of information(AoI)-based multi-user mobile edge computing(MEC)network with partial offloading mode.The weighted sum AoI(WSA)is first analyzed and derived,and then a WSA minimization problem is formulated by jointly optimizing the user scheduling and data assignment.Due to the non-analytic expression of the WSA w.r.t.the optimization variables and the unknowability of future network information,the problem cannot be solved with known solution methods.Therefore,an online Joint Partial Offloading and User Scheduling Optimization(JPOUSO)algorithm is proposed by transforming the original problem into a single-slot data assignment subproblem and a single-slot user scheduling sub-problem and solving the two sub-problems separately.We analyze the computational complexity of the presented JPO-USO algorithm,which is of O(N),with N being the number of users.Simulation results show that the proposed JPO-USO algorithm is able to achieve better AoI performance compared with various baseline methods.It is shown that both the user’s data assignment and the user’s AoI should be jointly taken into account to decrease the system WSA when scheduling users. 展开更多
关键词 age of information(aoi) mobile edge computing(mec) user scheduling
下载PDF
Database Search Behaviors: Insight from a Survey of Information Retrieval Practices
4
作者 Babita Trivedi Brijender Dahiya +2 位作者 Anjali Maan Rajesh Giri Vinod Prasad 《Intelligent Information Management》 2024年第5期195-218,共24页
This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, catego... This study examines the database search behaviors of individuals, focusing on gender differences and the impact of planning habits on information retrieval. Data were collected from a survey of 198 respondents, categorized by their discipline, schooling background, internet usage, and information retrieval preferences. Key findings indicate that females are more likely to plan their searches in advance and prefer structured methods of information retrieval, such as using library portals and leading university websites. Males, however, tend to use web search engines and self-archiving methods more frequently. This analysis provides valuable insights for educational institutions and libraries to optimize their resources and services based on user behavior patterns. 展开更多
关键词 information Retrieval Database Search user Behavior Patterns
下载PDF
Research on Information Architecture Design of Short-Form Video Social Platforms Based on Cognitive Psychology
5
作者 Zhengyang Liu Albert Young Choi 《Psychology Research》 2024年第1期1-13,共13页
This study investigates how cognitive psychology principles can be integrated into the information architecture design of short-form video platforms,like TikTok,to enhance user experience,engagement,and sharing.Using ... This study investigates how cognitive psychology principles can be integrated into the information architecture design of short-form video platforms,like TikTok,to enhance user experience,engagement,and sharing.Using a questionnaire,it explores TikTok users’habits and preferences,highlighting how social media fatigue(SMF)impacts their interaction with the platform.The paper offers strategies to optimize TikTok’s design.It suggests refining the organizational system using principles like chunking,schema theory,and working memory capacity.Additionally,it proposes incorporating shopping features within TikTok’s interface to personalize product suggestions and enable monetization for influencers and content creators.Furthermore,the study underlines the need to consider gender differences and user preferences in improving TikTok’s sharing features,recommending streamlined and customizable sharing options,collaborative sharing,and a system to acknowledge sharing milestones.Aiming to strengthen social connections and increase sharing likelihood,this research provides insights into enhancing information architecture for short-form video platforms,contributing to their growth and success. 展开更多
关键词 information architecture design short-form video social cognitive psychology user experience
下载PDF
IAM Excellence: Exploring Saviynt’s Role in Modern Information Technology
6
作者 Sampath Talluri 《Journal of Information Security》 2024年第1期40-52,共13页
Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution... Organizations may increase data security and operational efficiency by connecting Salesforce with Identity and Access Management (IAM) systems like Saviynt. This study delves deeply into the details of this revolution that is being encouraged to shift towards IAM software and potential drawbacks such as excessive provisioning and implementation issues. The study illuminated excellent practices and emphasized the importance of constant monitoring by using secondary theme analysis and qualitative research as proof. The findings indicate Saviynt as a viable solution and provide detailed information for firms seeking a smooth and secure integration path. 展开更多
关键词 information Technology (IT) Identity and Access Management (IAM) Saviynt user Identities Access Privileges Authentication Processes Risk Management
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
7
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Short Video Recommendation Algorithm Incorporating Temporal Contextual Information and User Context
8
作者 Weihua Liu Haoyang Wan Boyuan Yan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第4期239-258,共20页
With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.He... With the popularity of 5G and the rapid development of mobile terminals,an endless stream of short video software exists.Browsing short-form mobile video in fragmented time has become the mainstream of user’s life.Hence,designing an efficient short video recommendation method has become important for major network platforms to attract users and satisfy their requirements.Nevertheless,the explosive growth of data leads to the low efficiency of the algorithm,which fails to distill users’points of interest on one hand effectively.On the other hand,integrating user preferences and the content of items urgently intensify the requirements for platform recommendation.In this paper,we propose a collaborative filtering algorithm,integrating time context information and user context,which pours attention into expanding and discovering user interest.In the first place,we introduce the temporal context information into the typical collaborative filtering algorithm,and leverage the popularity penalty function to weight the similarity between recommended short videos and the historical short videos.There remains one more point.We also introduce the user situation into the traditional collaborative filtering recommendation algorithm,considering the context information of users in the generation recommendation stage,and weight the recommended short-formvideos of candidates.At last,a diverse approach is used to generate a Top-K recommendation list for users.And through a case study,we illustrate the accuracy and diversity of the proposed method. 展开更多
关键词 Recommendation algorithm user contexts short video temporal contextual information
下载PDF
Reliable and Privacy-Preserving Federated Learning with Anomalous Users
9
作者 ZHANG Weiting LIANG Haotian +1 位作者 XU Yuhua ZHANG Chuan 《ZTE Communications》 2023年第1期15-24,共10页
Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accu... Recently,various privacy-preserving schemes have been proposed to resolve privacy issues in federated learning(FL).However,most of them ignore the fact that anomalous users holding low-quality data may reduce the accuracy of trained models.Although some existing works manage to solve this problem,they either lack privacy protection for users’sensitive information or introduce a two-cloud model that is difficult to find in reality.A reliable and privacy-preserving FL scheme named reliable and privacy-preserving federated learning(RPPFL)based on a single-cloud model is proposed.Specifically,inspired by the truth discovery technique,we design an approach to identify the user’s reliability and thereby decrease the impact of anomalous users.In addition,an additively homomorphic cryptosystem is utilized to provide comprehensive privacy preservation(user’s local gradient privacy and reliability privacy).We give rigorous theoretical analysis to show the security of RPPFL.Based on open datasets,we conduct extensive experiments to demonstrate that RPPEL compares favorably with existing works in terms of efficiency and accuracy. 展开更多
关键词 federated learning anomalous user privacy preservation reliability homomorphic cryptosystem
下载PDF
Research on Residents’Willingness to Protect Privacy in the Context of the Personal Information Protection Law:A Survey Based on Foshan Residents’Data
10
作者 Xiying Huang Qizhao Xie +5 位作者 Xunxun Jiang Zhihang Zhou Xiao Zhang Yiyuan Cheng Yu’nan Wang Chien Chi Chu 《Journal of Sustainable Business and Economics》 2023年第3期37-54,共18页
The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremel... The Personal Information Protection Law,as the first law on personal information protection in China,hits the people’s most concerned,realistic and direct privacy and information security issues,and plays an extremely important role in promoting the development of the digital economy,the legalization of socialism with Chinese characteristics and social public security,and marks a new historical development stage in the protection of personal information in China.However,the awareness of privacy protection and privacy protection behavior of the public in personal information privacy protection is weak.Based on the literature review and in-depth understanding of current legal regulations,this study integrates the relevant literature and theoretical knowledge of the Personal Protection Law to construct a conceptual model of“privacy information protection willingness-privacy information protection behavior”.Taking the residents of Foshan City as an example,this paper conducts a questionnaire survey on their attitudes toward the Personal Protection Law,analyzes the factors influencing their willingness to protect their privacy and their behaviors,and explores the mechanisms of their influencing variables,to provide advice and suggestions for promoting the protection of privacy information and building a security barrier for the high-quality development of public information security. 展开更多
关键词 Personal information Protection Law privacy security privacy protection will
下载PDF
Adjusting the information service strategies according to users' requirements—A survey of the library users' information requirements in the four library systems of Zhejiang province
11
作者 XU Puying 《Chinese Journal of Library and Information Science》 2009年第2期83-102,共20页
Based on a survey of the circumstances of the information requirements in social science from more than 3,800 library users in 48 libraries of the four major library systems in Zhejiang Province,this paper analyzes th... Based on a survey of the circumstances of the information requirements in social science from more than 3,800 library users in 48 libraries of the four major library systems in Zhejiang Province,this paper analyzes the present main characteristics of the users' requirements to the social science document information and puts forward some proposals for adjusting the document information service strategies for the library and information institutions. 展开更多
关键词 Zhejiang province LIBRARY Social science information service user survey information service strategy
下载PDF
A survey of the information needs of visually impaired library users
12
作者 Wanbin LI Yanna LI 《Chinese Journal of Library and Information Science》 2014年第1期57-68,共12页
Purpose:The research aims to investigate the information needs of visually impaired library users in China in order to increase our understanding of these users and help the Chinese public libraries improve their serv... Purpose:The research aims to investigate the information needs of visually impaired library users in China in order to increase our understanding of these users and help the Chinese public libraries improve their services for them.Design/methodology/approach:A questionnaire survey was used to study the library users’ information needs.Eleven large public libraries in different areas of China,which were pioneers in implementing services for visually impaired people,were chosen to conduct the survey.Data analysis was based on 97 valid questionnaires retrieved.Findings:Radio and television were still the preferred sources of information for visually impaired users.In information seeking,they had a strong preference for obtaining information in the most convenient way,and accessing a vast amount of information,which was updated quickly.They paid more attention to the information closely related to their work and life.Their purposes of seeking information were mainly for learning,relaxation and intercommunication.Visually impaired users felt some barriers in their access to library services such as a lack of time or a sighted companion who can come along for the trip to the library.Moreover,it was difficult for them to use the Internet to search for information,because many websites do not support the auxiliary software designed especially for visually impaired users or the websites offer only a paid subscriber service.Research limitations:A majority of the respondents were young and middle-aged people and engaged in work.The sample size needs to be enlarged,and different groups of users such as old people and students should be included to yield more useful results.Practical implications:The survey results provide insights into the information needs of the Chinese visually impaired library users.Meanwhile,the research can serve as a reference source for the future studies of the service for visually impaired library users.Originality/value:So far,few studies were conducted to investigate the information needs of visually impaired library users in China. 展开更多
关键词 Public library Visually impaired user information need
下载PDF
A study of changing information needs of contemporary public library users in China
13
作者 LI Guihua CHEN Xueqiao 《Chinese Journal of Library and Information Science》 2009年第1期62-76,共15页
Public libraries should be vigilant and responsive to the ever changing information needs of their clientele functioning in a society undergoing through rapid change due to technological innovations. China is currentl... Public libraries should be vigilant and responsive to the ever changing information needs of their clientele functioning in a society undergoing through rapid change due to technological innovations. China is currently experiencing a social and technological transformation of great magnitude in terms of metamorphosing itself from a traditional society to one that is driven by information technologies. Our research study, taking this proposition into account, did a questionnaire survey on 954 library information users at five major public libraries. This research study has discovered that the information needs of public library users today reflect some of the peculiar characteristics of their society in changing times which is driven largely by the rapid development and application of new information technologies. It shows that there is a newly added demand emphasis on certain categories of library resources and services by the Chinese reading public. Our research findings have identified such needs basically in the following five functional areas of public libraries, namely, 1) Increased demands for economic resources, 2) rising expectations for more effective and efficient library services, 3) a convenient location and an amicable environment congenial to learning, 4) a suitable place for engaging in intellectual dialogues and in socialization, and 5) a few other technological amenities and information technology-based digital resources and facilities in addition to a rich repository of library materials in print format. Finally, our paper concludes its discussion with a few observation remarks about the changing trend of public libraries' visions, missions and operations vis-à-vis a contextual background of the ever heightened public expectations for getting quality information services in a timely manner in order for them to function effectively in an information-oriented society such as that of ours today. 展开更多
关键词 Library information user needs Public libraries Library survey
下载PDF
Design of User Interface for Tractor Cab Real-time Information Management System 被引量:2
14
作者 Weiwei ZHOU Yang LU +2 位作者 Chunxia JIANG Zhixiong LU Wenxin JIN 《Asian Agricultural Research》 2015年第11期53-57,61,共6页
In this paper,the user interface of tractor cab real-time information management system was designed. Based on the principle of "user friendly",it reasonably arranged spatial position of information manageme... In this paper,the user interface of tractor cab real-time information management system was designed. Based on the principle of "user friendly",it reasonably arranged spatial position of information management system according to spatial distribution of tractor cab. Then,it analyzed operation habits and thinking ways of drivers,and formulated design principle meeting demands of drivers. Besides,it used LabView software to design user interface,including interface layout and interface design. User interface includes basic information interface,job information interface,camera monitoring interface,and fault diagnosis interface. Finally,it made evaluation of the user interface from color,indicator lamp,dial,and pointer. Results indicate that the designed user interface layout conforms to cognition mentality and operation habits and easy to get familiar and grasp; graphical interface is vivid and easy to stimulate pleasure of drivers in operation; interface color matching is coordinated; the layout of controls is hierarchical and logic,and operating mode is consistent with Windows system. 展开更多
关键词 TRACTOR information management system user INTERFACE LABVIEW
下载PDF
MULTILEVEL INDEX STRUCTURE FOR INFORMATION FILTERING BASED ON USER CHARACTERISTIC 被引量:1
15
作者 He jun Zhou Mingtian (College of Computer Sci. and Eng., UEST of China, Chengdu 610054) 《Journal of Electronics(China)》 2001年第3期267-271,共5页
Aimed at information overload and personalized characteristic of user information requirement, this letter presents a type of multilevel index structure and algorithm which is applied to large scale information filter... Aimed at information overload and personalized characteristic of user information requirement, this letter presents a type of multilevel index structure and algorithm which is applied to large scale information filtering system and has better performance and stronger scalability. 展开更多
关键词 information FILTERING user model MULTILEVEL INDEX
下载PDF
A mixed stochastic user equilibrium model considering influence of advanced traveller information systems in degradable transport network 被引量:4
16
作者 程琳 楼小明 +1 位作者 周静 马捷 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第5期1182-1194,共13页
Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network cap... Advanced traveler information systems (ATIS) can not only improve drivers' accessibility to the more accurate route travel time information, but also can improve drivers' adaptability to the stochastic network capacity degradations. In this paper, a mixed stochastic user equilibrium model was proposed to describe the interactive route choice behaviors between ATIS equipped and unequipped drivers on a degradable transport network. In the proposed model the information accessibility of equipped drivers was reflected by lower degree of uncertainty in their stochastic equilibrium flow distributions, and their behavioral adaptability was captured by multiple equilibrium behaviors over the stochastic network state set. The mixed equilibrium model was formulated as a fixed point problem defined in the mixed route flows, and its solution was achieved by executing an iterative algorithm. Numerical experiments were provided to verify the properties of the mixed network equilibrium model and the efficiency of the iterative algorithm. 展开更多
关键词 mixed stochastic user equilibrium model degradable transport network advanced traveler information systems (ATIS) drivers' behavioral adaptability multiple equilibrium behaviors fixed point problem
下载PDF
A Method to Improve the Accuracy of Personal Information Detection
17
作者 Chih-Chieh Chiu Chu-Sing Yang Ce-Kuen Shieh 《Journal of Computer and Communications》 2023年第6期131-141,共11页
It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automat... It is necessary to confirm the personal data factors and the rules of verification before conducting personal data detection. So that the detection method can be written in the subsequent implementation of the automatic detection tool. This paper will conduct experiments on common personal data factor rules, including domestic personal identity numbers and credit card numbers with checksums. We use ChatGPT to test the accuracy of identifying personal information like ID card identification numbers or credit card numbers. And then use personal data correlation to reduce the time for personal data identification. Although the number of personal information factors found has decreased, it has had a better effect on the actual manual personal data identification. The result shows that it saves about 45% of the calculation time, and the execution efficiency of the accuracy is also improved with the original method by about 22%, which is about 2.2 times higher than the general method. Therefore, the method proposed in this paper can accurately and effectively find out the leftover personal information in the enterprise. . 展开更多
关键词 Data Leakage privacy Personal information Factors
下载PDF
How the Information and Communications Technology Threaten Our Privacy: The Case of Email and P2P Propagation Models 被引量:1
18
作者 Han-Wei Hsiao Cathy S. Lin Kun-Yu Chert 《Computer Technology and Application》 2011年第10期765-773,共9页
With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat... With the rapid growth of information and communication technology (ICT), the violation of information privacy has increased in recent years. The privacy concerns now re-emerge right because people perceives a threat from new ICT that are equipped with enhanced capabilities for surveillance, storage, retrieval, and diffusion of personal information. With the trend in the prevalence and the easy use of ICT, it is of necessary to pay much attention to the issue how the ICT can threaten the privacy of individuals on the Internet. While the Email and P2P (Peer-to-Peer) tools are the most popular ICT, this paper aims at understanding their respectively dissemination patterns in spreading of personal private information. To this purpose, this paper using dynamic model technique to simulate the pattern of sensitive or personal private information propagating situation. In this study, an Email propagation model and a Susceptible-lnfected-Removed (SIR) model are proposed to simulate the propagation patterns of Email and P2P network respectively. Knowing their dissemination patterns would be helpful for system designers, ICT manager, corporate IT personnel, educators, policy makers, and legislators to incorporate consciousness of social and ethical information issues into the protection of information privacy. 展开更多
关键词 information privacy propagation model EMAIL peer-to-peer (P2P)
下载PDF
AMachine Learning Approach to User Profiling for Data Annotation of Online Behavior
19
作者 Moona Kanwal Najeed AKhan Aftab A.Khan 《Computers, Materials & Continua》 SCIE EI 2024年第2期2419-2440,共22页
The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interest... The user’s intent to seek online information has been an active area of research in user profiling.User profiling considers user characteristics,behaviors,activities,and preferences to sketch user intentions,interests,and motivations.Determining user characteristics can help capture implicit and explicit preferences and intentions for effective user-centric and customized content presentation.The user’s complete online experience in seeking information is a blend of activities such as searching,verifying,and sharing it on social platforms.However,a combination of multiple behaviors in profiling users has yet to be considered.This research takes a novel approach and explores user intent types based on multidimensional online behavior in information acquisition.This research explores information search,verification,and dissemination behavior and identifies diverse types of users based on their online engagement using machine learning.The research proposes a generic user profile template that explains the user characteristics based on the internet experience and uses it as ground truth for data annotation.User feedback is based on online behavior and practices collected by using a survey method.The participants include both males and females from different occupation sectors and different ages.The data collected is subject to feature engineering,and the significant features are presented to unsupervised machine learning methods to identify user intent classes or profiles and their characteristics.Different techniques are evaluated,and the K-Mean clustering method successfully generates five user groups observing different user characteristics with an average silhouette of 0.36 and a distortion score of 1136.Feature average is computed to identify user intent type characteristics.The user intent classes are then further generalized to create a user intent template with an Inter-Rater Reliability of 75%.This research successfully extracts different user types based on their preferences in online content,platforms,criteria,and frequency.The study also validates the proposed template on user feedback data through Inter-Rater Agreement process using an external human rater. 展开更多
关键词 user intent CLUSTER user profile online search information sharing user behavior search reasons
下载PDF
Measurement of Incompatible Probability in Information Retrieval:A Case Study with User Clicks 被引量:1
20
作者 王博 侯越先 《Transactions of Tianjin University》 EI CAS 2013年第1期37-42,共6页
The incompatible probability represents an important non-classical phenomenon, and it describes conflicting observed marginal probabilities, which cannot be satisfied with a joint probability. First, the incompatibili... The incompatible probability represents an important non-classical phenomenon, and it describes conflicting observed marginal probabilities, which cannot be satisfied with a joint probability. First, the incompatibility of random variables was defined and discussed via the non-positive semi-definiteness of their covariance matrixes. Then, a method was proposed to verify the existence of incompatible probability for variables. A hypothesis testing was also applied to reexamine the likelihood of the observed marginal probabilities being integrated into a joint probability space, thus showing the statistical significance of incompatible probability cases. A case study with user click-through data provided the initial evidence of the incompatible probability in information retrieval (IR), particularly in user interaction. The experiments indicate that both incompatible and compatible cases can be found in IR data, and informational queries are more likely to be compatible than navigational queries. The results inspire new theoretical perspectives of modeling the complex interactions and phenomena in IR. 展开更多
关键词 incompatible probability semi-definiteness hypothesis testing information retrieval user clicks
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部