Academic literature on the topic 'Profiling and Behavioral Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Profiling and Behavioral Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Profiling and Behavioral Analysis"
FINTZY, ROBERT T. "Criminal Profiling: An Introduction to Behavioral Evidence Analysis." American Journal of Psychiatry 157, no. 9 (September 2000): 1532–34. http://dx.doi.org/10.1176/appi.ajp.157.9.1532.
Full textMartineau, Melissa, Elena Spiridon, and Mary Aiken. "A Comprehensive Framework for Cyber Behavioral Analysis Based on a Systematic Review of Cyber Profiling Literature." Forensic Sciences 3, no. 3 (July 22, 2023): 452–77. http://dx.doi.org/10.3390/forensicsci3030032.
Full textYu, Szde. "BEHAVIORAL EVIDENCE ANALYSIS ON FACEBOOK: A TEST OF CYBER-PROFILING." Defendologija 16, no. 33 (May 10, 2013): 19–30. http://dx.doi.org/10.5570/dfnd.en.1333.02.
Full textLi, Hai, Luke Lunhua Mao, James Jianhui Zhang, and Jiaxi Xu. "Classifying and Profiling Sports Lottery Gamblers: A Cluster Analysis Approach." Social Behavior and Personality: an international journal 43, no. 8 (September 18, 2015): 1299–317. http://dx.doi.org/10.2224/sbp.2015.43.8.1299.
Full textHarini, Karthick, Suliman Yousef Alomar, Mohammed Vajagathali, Salim Manoharadas, Anbazhagan Thirumalai, Koyeli Girigoswami, and Agnishwar Girigoswami. "Niosomal Bupropion: Exploring Therapeutic Frontiers through Behavioral Profiling." Pharmaceuticals 17, no. 3 (March 12, 2024): 366. http://dx.doi.org/10.3390/ph17030366.
Full textSABUNCU, Ä°brahim, Edanur TÃœRKAN, and Hilal POLAT. "CUSTOMER SEGMENTATION AND PROFILING WITH RFM ANALYSIS." TURKISH JOURNAL OF MARKETING 5, no. 1 (April 25, 2020): 22–36. http://dx.doi.org/10.30685/tujom.v5i1.84.
Full textvon Ziegler, Lukas, Oliver Sturman, and Johannes Bohacek. "Big behavior: challenges and opportunities in a new era of deep behavior profiling." Neuropsychopharmacology 46, no. 1 (June 29, 2020): 33–44. http://dx.doi.org/10.1038/s41386-020-0751-7.
Full textAdeyiga, J. A., S. O. Olabiyisi, and E. O. Omidiora. "A comparative analysis of selected clustering algorithms for criminal profiling." Nigerian Journal of Technology 39, no. 2 (July 16, 2020): 464–71. http://dx.doi.org/10.4314/njt.v39i2.16.
Full textCantore, Daniele. "On Biometrics and Profiling." International Journal of Technoethics 2, no. 4 (October 2011): 84–93. http://dx.doi.org/10.4018/jte.2011100106.
Full textTrusov, Michael, Liye Ma, and Zainab Jamal. "Crumbs of the Cookie: User Profiling in Customer-Base Analysis and Behavioral Targeting." Marketing Science 35, no. 3 (May 2016): 405–26. http://dx.doi.org/10.1287/mksc.2015.0956.
Full textDissertations / Theses on the topic "Profiling and Behavioral Analysis"
Lane, Erin C. "Urban disadvantage, social disorganization, and racial profiling an analysis of ecology and police officers' race-specific search behaviors /." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012660.
Full textSchmidt, Elisabeth. "Profiling the german Gazela vinho verde consumer: a market segmentation based on product quality." Master's thesis, [s.n.], 2013. http://hdl.handle.net/10284/4105.
Full textThe core objective of this study was to find out what preferences and wine consumer patterns characterize specific segments in the German market for Vinho Verde. For this purpose an exploratory research using a self-administered questionnaire was applied. The basis for a cluster analysis was a measurement scale about the perceived product quality of Gazela. Four segments were derived from the cluster analysis: (1) refusing, (2) enthusiastic, (3) indifferent and (4) enjoying Vinho Verde drinker. The second and the fourth segments were found to be the main target groups for Gazela. The findings about the associations between Portugal as the country of origin of Gazela and Portuguese wine were rather negative. The managerial implications suggest developing an advertising campaign in order to successfully promote Gazela in Germany. Two alternatives are suggested: keeping the country of origin on the label or removing it. The first suggestion requires extensive measures and actions to improve the image of wine, which is “made in Portugal”. The results of this study show the need of increasing the awareness of Vinho Verde among German consumers and indicate the need of improvement of the perceptions about Portugal and Portuguese wine and examine possibilities for enhancing the acceptance of Portuguese wine, especially Vinho Verde in Germany.
O objetivo principal deste estudo foi o de descobrir as preferências e os padrões de consumo de vinho que caracterizam os segmentos específicos do mercado alemão para o Vinho Verde. Para este objectivo esta pesquisa exploratória utilizou um questionário auto-administrado. A escala base escolhida para a análise de cluster foi a de medição sobre a qualidade do produto percebida aplicada à marca Gazela. Foram obtidos quatros segmentos a partir da análise de cluster: (1) Objector (2), entusiasta, (3) indiferente e (4) Fruidor de Vinho Verde. Os segmentos 2 e 4 são os grupos alvos de Gazela. Os resultados sobre as associações com Portugal, o país de origem do Gazela, e vinho português demostraram relações bastante negativas. As implicações ao nível da gestão sugerem o desenvolvimento de uma campanha publicitária para promover o sucesso de Gazela na alemanha. Duas alternativas são sugeridas: manter o país de origem no rótulo ou removê-lo. A primeira sugestão requer medidas e ações mais abrangentes para melhorar a imagem do vinho "made in Portugal". Os resultados deste estudo apontam para a necessidade de aumentar a consciência sobre o Vinho Verde entre os consumidores alemães e indicam a necessidade de melhoria das percepções sobre Portugal e sobre o vinho português e de estudar as possibilidades de aumentar a aceitação de vinho português, especialmente o Vinho Verde na Alemanha.
Yan, Dacong. "Program Analyses for Understanding the Behavior and Performance of Traditional and Mobile Object-Oriented Software." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1406064286.
Full textFarahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012/document.
Full textPopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Farahbakhsh, Reza. "Profiling professional and regular users on popular Internet services based on implementation of large scale Internet measurement tools." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0012.
Full textPopular Internet services are fundamentally shaping and reshaping traditional ways of people communication, thus having a major impact on their social life. Two of the very popular Internet services with this characteristic are Online Social Networks (OSNs) and Peer-to-Peer (P2P) systems. OSNs provide a virtual environment where people can share their information and interests as well as being in contact with other people. On the other hand, P2P systems, which are still one of the popular services with a large proportion of the whole Internet traffic, provide a golden opportunity for their customers to share different type of content including copyrighted content. Apart from the huge popularity of OSNs and P2P systems among regular users, they are being intensively used by professional players (big companies, politician, athletes, celebrities in case of OSNs and professional content publishers in case of P2P) in order to interact with people for different purposes (marketing campaigns, customer feedback, public reputation improvement, etc.). In this thesis, we characterize the behavior of regular and professional users in the two mentioned popular services (OSNs and P2P systems) in terms of publishing strategies, content consumption and behavioral analysis. To this end, five of our conducted studies are presented in this manuscript as follows: - “The evolution of multimedia contents", which presents a thorough analysis on the evolution of multimedia content available in BitTorrent by focusing on four relevant metrics across different content categories: content availability, content popularity, content size and user's feedback. - “The reaction of professional users to antipiracy actions", by examining the impact of two major antipiracy actions, the closure of Megaupload and the implementation of the French antipiracy law (HADOPI), on professional publishers behavior in the largest BitTorrent portal who are major providers of online copyrighted content. - “The amount of disclosed information on Facebook", by investigating the public exposure of Facebook users' profile attributes in a large dataset including half million regular users. - “Professional users Cross Posting Activity", by analyzing the publishing pattern of professional users which includes same information over three major OSNs namely Facebook, Google+ and Twitter. - “Professional Users' Strategies in OSNs", where we investigate the global strategy of professional users by sector (e.g., Cars companies, Clothing companies, Politician, etc.) over Facebook, Google+ and Twitter. The outcomes of this thesis provide an overall vision to understand some important behavioral aspects of different types of users on popular Internet services and these contributions can be used in various domains (e.g. marketing analysis and advertising campaign, etc.) and different parties can benefit from the results and the implemented methodologies such as ISPs and owners of the Services for their future planning or expansion of the current services as well as professional players to increase their success on social media
Casserly, Alison P. "Integrated Analysis of miRNA/mRNA Expression in the Neurocircuitry Underlying Nicotine Dependence." eScholarship@UMMS, 2018. https://escholarship.umassmed.edu/gsbs_diss/985.
Full textKumar, Tushar. "Characterizing and controlling program behavior using execution-time variance." Diss., Georgia Institute of Technology, 2016. http://hdl.handle.net/1853/55000.
Full textGao, Wei. "CONSTRUCTING USER BEHAVIORAL PROFILES USING DATA-MINING-BASED APPROACH." Diss., Tucson, Arizona : University of Arizona, 2005. http://etd.library.arizona.edu/etd/GetFileServlet?file=file:///data1/pdf/etd/azu%5Fetd%5F1261%5F1%5Fm.pdf&type=application/pdf.
Full textToure, Almamy. "Collection, analysis and harnessing of communication flows for cyber-attack detection." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Full textThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Wu, Burton. "New variational Bayesian approaches for statistical data mining : with applications to profiling and differentiating habitual consumption behaviour of customers in the wireless telecommunication industry." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/46084/1/Burton_Wu_Thesis.pdf.
Full textBooks on the topic "Profiling and Behavioral Analysis"
Turvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3rd ed. Burlington, MA: Academic Press, 2008.
Find full textTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3rd ed. Burlington, MA: Academic Press, 2008.
Find full textTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 3rd ed. Burlington, MA: Academic Press, 2008.
Find full textTurvey, Brent E. Criminal profiling: An introduction to behavioral evidence analysis. 2nd ed. London: Academic Press, 2001.
Find full textAinswoth, Peter B. Offender profiling and crime analysis. Cullompton: Willan Pub., 2001.
Find full textDonna, Youngs, ed. Investigative psychology: Offender profiling and the analysis of criminal action. Chichester: John Wiley & Sons, 2009.
Find full textNapier, Mike R. Behavior, truth and deception: applying profiling and analysis to the interview process. Boca Raton, FL: CRC Press, 2010.
Find full textBartol, Curt R. Criminal and behavioral profiling. Thousand Oaks, Calif: SAGE Publications, 2013.
Find full textGroff, Elizabeth (Elizabeth R.) and Yang Sue-Ming, eds. The criminology of place: Street segments and our understanding of the crime problem. New York: Oxford University Press, 2012.
Find full textFederspiel, Florian M., Gilberto Montibeller, and Matthias Seifert, eds. Behavioral Decision Analysis. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-44424-1.
Full textBook chapters on the topic "Profiling and Behavioral Analysis"
Hlioui, Fedia, Nadia Aloui, and Faiez Gargouri. "Automatic Deduction of Learners’ Profiling Rules Based on Behavioral Analysis." In Computational Collective Intelligence, 233–43. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67074-4_23.
Full textAcien, Alejandro, Aythami Morales, Ruben Vera-Rodriguez, and Julian Fierrez. "Keystroke Mobile Authentication: Performance of Long-Term Approaches and Fusion with Behavioral Profiling." In Pattern Recognition and Image Analysis, 12–24. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31321-0_2.
Full textShosha, Ahmed F., Joshua I. James, Alan Hannaway, Chen-Ching Liu, and Pavel Gladyshev. "Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 66–80. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39891-9_5.
Full textFan, Xiao-Xi, Kam-Pui Chow, and Fei Xu. "Web User Profiling Based on Browsing Behavior Analysis." In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, 57–71. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-662-44952-3_5.
Full textNordahl, Christian, Veselka Boeva, Håkan Grahn, and Marie Persson Netz. "Profiling of Household Residents’ Electricity Consumption Behavior Using Clustering Analysis." In Lecture Notes in Computer Science, 779–86. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-22750-0_78.
Full textColombini, Clara Maria, Antonio Colella, Marco Mattiucci, and Aniello Castiglione. "Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel." In Lecture Notes in Computer Science, 416–29. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32498-7_31.
Full textPatterson, Wayne, and Cynthia E. Winston-Proctor. "Profiling." In Behavioral Cybersecurity, 35–44. First edition. | Boca Raton : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003052029-5.
Full textPatterson, Wayne, and Cynthia E. Winston-Proctor. "Profiling." In Behavioral Cybersecurity, 43–50. Boca Raton : Taylor & Francis, CRC Press, 2019.: CRC Press, 2019. http://dx.doi.org/10.1201/9780429461484-5.
Full textBarkhashree and Parneeta Dhaliwal. "Reinforcing Digital Forensics Through Intelligent Behavioural Evidence Analysis: Social Media Hate Speech Profiling." In Artificial Intelligence and Speech Technology, 641–50. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95711-7_52.
Full textKhera, Varin, Anand R. Prasad, and Suksit Kwanoran. "Online Tracking and Behavioral Profiling." In Open Source Intelligence (OSINT) – A practical Introduction, 23–31. New York: River Publishers, 2024. http://dx.doi.org/10.1201/9788770047180-3.
Full textConference papers on the topic "Profiling and Behavioral Analysis"
Drachen, Anders, James Green, Chester Gray, Elie Harik, Patty Lu, Rafet Sifa, and Diego Klabjan. "Guns and guardians: Comparative cluster analysis and behavioral profiling in destiny." In 2016 IEEE Conference on Computational Intelligence and Games (CIG). IEEE, 2016. http://dx.doi.org/10.1109/cig.2016.7860423.
Full textSingh, Malvika, B. M. Mehtre, and S. Sangeetha. "User Behavior Profiling using Ensemble Approach for Insider Threat Detection." In 2019 IEEE 5th International Conference on Identity, Security, and Behavior Analysis (ISBA). IEEE, 2019. http://dx.doi.org/10.1109/isba.2019.8778466.
Full textChen, Cheng-Yu, and Shun-Wen Hsiao. "IoT Malware Dynamic Analysis Profiling System and Family Behavior Analysis." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9005981.
Full textXu, Kuai, Feng Wang, and Bin Wang. "Behavior Profiling and Analysis in Wireless Home Networks." In 2010 7th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2010. http://dx.doi.org/10.1109/ccnc.2010.5421571.
Full textShen, Xipeng, Michael L. Scott, Chengliang Zhang, Sandhya Dwarkadas, Chen Ding, and Mitsunori Ogihara. "Analysis of input-dependent program behavior using active profiling." In the 2007 workshop. New York, New York, USA: ACM Press, 2007. http://dx.doi.org/10.1145/1281700.1281705.
Full textBerube, Paul, and Jose Nelson Amaral. "Combined profiling: A methodology to capture varied program behavior across multiple inputs." In 2012 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS). IEEE, 2012. http://dx.doi.org/10.1109/ispass.2012.6189227.
Full textGopal, Akshay C., and Lija Jacob. "Customer Behavior Analysis Using Unsupervised Clustering and Profiling: A Machine Learning Approach." In 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). IEEE, 2022. http://dx.doi.org/10.1109/icacite53722.2022.9823646.
Full textNeal, Tempestt, and Damon Woodard. "Mobile Biometrics, Replay Attacks, and Behavior Profiling: An Empirical Analysis of Impostor Detection." In 2019 International Conference on Biometrics (ICB). IEEE, 2019. http://dx.doi.org/10.1109/icb45273.2019.8987407.
Full textMao, Yilin, Caroline Godefroy, and Michel Gysen. "Field Applications of Quantitative Fracture Diagnostic From Distributed Temperature Warmback Analysis." In SPE Hydraulic Fracturing Technology Conference and Exhibition. SPE, 2023. http://dx.doi.org/10.2118/212380-ms.
Full textAdil, Mohamed, Lingies Santhirasekaran, Nabilla Arief Tham, and Brian Seabrook. "Injection Profiling for Intelligently Completed Wells Equipped with Fiber Optics." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211402-ms.
Full textReports on the topic "Profiling and Behavioral Analysis"
Del Valle, Emiliano Diaz, Chaning Jang, and Steve Wendel. Behavioral Systems: Combining behavioral science and systems analysis. Busara, January 2024. http://dx.doi.org/10.62372/fmjl3064.
Full textStevenson, Mark. Individual Profiling Using Text Analysis. Fort Belvoir, VA: Defense Technical Information Center, April 2016. http://dx.doi.org/10.21236/ad1009417.
Full textKolencik, Marian. A critical evaluation of the risk indicators of criminal conduct involving CBRN and explosive materials - Behavioural and observational analysis in crime detection and investigation. ISEM Institute, n.p.o., October 2023. http://dx.doi.org/10.52824/vzrb5079.
Full textMarinucci, Antonio. ACIP Pile Installation, Installation Monitoring, Full-scale Load Testing, and Extraction Program. Deep Foundations Institute, December 2017. http://dx.doi.org/10.37308/cpf-2016-acip-1.
Full textBrauer, Douglas C., Daniel Henry, and George A. Matzkanin. ACE/AACE Inspection and Analysis Handbook. Part 3. Profiling. Fort Belvoir, VA: Defense Technical Information Center, June 1985. http://dx.doi.org/10.21236/ada210049.
Full textAcemoglu, Daron, and Martin Kaae Jensen. Equilibrium Analysis in the Behavioral Neoclassical Growth Model. Cambridge, MA: National Bureau of Economic Research, December 2018. http://dx.doi.org/10.3386/w25363.
Full textPetry, Nancy, and Warren Bickel. A Behavioral Economic Analysis of Polydrug Abuse in Heroin Addicts. Cambridge, MA: National Bureau of Economic Research, February 1998. http://dx.doi.org/10.3386/w6415.
Full textSilverman, Kenneth, and Elias Robles. Employment as a Drug Abuse Treatment Intervention: A Behavioral Economic Analysis. Cambridge, MA: National Bureau of Economic Research, February 1998. http://dx.doi.org/10.3386/w6402.
Full textCoker, Ray. Toward a behavioral analysis of attentiveness as a style of communication. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.3227.
Full textBernheim, B. Douglas, and Antonio Rangel. Behavioral Public Economics: Welfare and Policy Analysis with Non-Standard Decision-Makers. Cambridge, MA: National Bureau of Economic Research, August 2005. http://dx.doi.org/10.3386/w11518.
Full text