To see the other types of publications on this topic, follow the link: USER'S AWARENESS.

Dissertations / Theses on the topic 'USER'S AWARENESS'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'USER'S AWARENESS.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Guyon, David. "Supporting energy-awareness for cloud users." Thesis, Rennes 1, 2018. http://www.theses.fr/2018REN1S037/document.

Full text
Abstract:
Les centres de calcul cloud consomment d'importantes quantités d'énergie et il devient nécessaire de réduire leur consommation en raison des changements climatiques actuels. Bien que des propositions d'optimisations énergétiques existent, elles ne tiennent pas compte des utilisateurs finaux. Cette thèse propose d'inclure les utilisateurs cloud dans l'optimisation énergétique afin de réduire la consommation d'énergie des centres de calcul. L'inclusion se fait, dans un premier temps, en délivrant une information énergétique pour sensibiliser, puis dans un second temps, en fournissant des moyens d'action. Les contributions portent sur les couches cloud IaaS et PaaS. Nos résultats montrent que les utilisateurs tolérants à la variation des performances (e.g. retarder l'obtention de résultats) permettent de réduire la consommation d'énergie des centres de calcul
Cloud datacenters consume large amounts of energy and it becomes necessary to reduce their consumption due to current climate changes. Although energy optimization propositions exist, they do not take into account end-users. This thesis proposes to include cloud users in the energy optimization as a means to reduce datacenters energy consumption. The inclusion is done, first, by delivering energy related information to raise awareness, and second, by providing means of actions. Contributions are located at IaaS and PaaS cloud layers. Our results show that users tolerant to performance variation (e.g. delay in obtaining execution results) allow to reduce datacenters energy consumption
APA, Harvard, Vancouver, ISO, and other styles
2

Slonka, Kevin J. "Awareness of malicious social engineering among facebook users." Thesis, Robert Morris University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3620246.

Full text
Abstract:

With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The research examined differences in awareness among multiple generational groups; secondary research questions focused on how factors such as age, gender, education, Internet usage, and trust affected users' awareness of malicious activity. Results suggest that the Baby Boomer generation is the least aware of malicious social engineering tactics on Facebook, specifically in regard to the Donation scam category. In addition, education level and educational background are significantly associated with awareness. These findings indicate a need for future work to gain a deeper understanding of Facebook users' awareness of malicious social engineering and generate targeted training in order to increase said awareness.

APA, Harvard, Vancouver, ISO, and other styles
3

Chihani, Bachir. "Enterprise context-awareness : empowering service users and developers." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-01048688.

Full text
Abstract:
Context-aware applications must manage a continuous stream of context according to dedicated business logic. Research was limited on proposing frameworks and platforms that have predefined behavior toward applications. This thesis attempts to extend background works by proposing new concepts serving as foundation for a flexible approach for building context-aware applications. The thesis examines the state of the art of context-aware computing, then adopts well-established software design principles and a functional decomposition for designing a reference model for context management enabling seamless integration of context-awareness into applications. Also, the thesis studies the use of context in common applications and proposes a context-centric modeling approach which allows the creation of a graph-based representation where entities are connected to each other through links representing context. Furthermore, the context graph decouples the presentation and the semantics of context, leaving each application to manage the appropriate semantic for their context data. Case studies are conducted for the evaluation of the proposed system in terms of its support for the creation of applications enhanced with context-awareness. A simulation study is performed to analyze the performance properties of the proposed system. The result of this thesis is the introduction of a novel approach for supporting the creation of context-aware applications that supports the integration of context-awareness to existing applications. It empowers developers as well as users to participate in the creation process, thereby reducing usability issues
APA, Harvard, Vancouver, ISO, and other styles
4

Clarke, Lynne, Toufue Chang, Andrea Roderick, Walter Reel, Kimberly Alvarez, Galen Kennedy, Robert Ritchey, and Cop Le. "Extending Comprehensive Maritime Awareness to Disconnected Vessels and Users." Thesis, Monterey, California. Naval Postgraduate School, 2007. http://hdl.handle.net/10945/6932.

Full text
Abstract:
After the attacks of 9/11, increased security became a national priority that resulted in a focus on National Maritime Security. Maritime Domain Awareness (MDA) is an initiative developed by the Coast Guard, in partnership with the U.S. Navy and other agencies to increase awareness in the maritime domain in support of maritime security [Morgan and Wimmer, 2005]. The purpose of MDA is to generate actionable intelligence obtained via the collection, fusion and dissemination of information from U.S. joint forces, U.S. government agencies, international coalition partners and commercial entities. This actionable intelligence is the cornerstone of successful counterterrorist and maritime law enforcement operations and is critical to Maritime Security [Morgan and Wimmer, 2005]. The U.S. Navy, as a partner in the development and creation of MDA, has tasked its subordinate commands to identify and define capabilities to support this program. One effort sponsored is the Comprehensive Maritime Awareness (CMA) Joint Capabilities Technology Demonstration (JCTD) [CMA Architecture Team, 2007]. This project supports the CMA JCTD efforts by proposing a deployable system to enable a disconnected vessel to connect to the CMA network. A disconnected user can be seen as a merchant ship, hospital ship or any vessel that is not currently connected to the CMA network. This project's proposed deployable system, as a subset to the CMA network, facilitates information sharing in support of humanitarian efforts worldwide.
APA, Harvard, Vancouver, ISO, and other styles
5

Gamagedara, Arachchilage Nalin Asanka. "Security awareness of computer users : a game based learning approach." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7620.

Full text
Abstract:
The research reported in this thesis focuses on developing a framework for game design to protect computer users against phishing attacks. A comprehensive literature review was conducted to understand the research domain, support the proposed research work and identify the research gap to fulfil the contribution to knowledge. Two studies and one theoretical design were carried out to achieve the aim of this research reported in this thesis. A quantitative approach was used in the first study while engaging both quantitative and qualitative approaches in the second study. The first study reported in this thesis was focused to investigate the key elements that should be addressed in the game design framework to avoid phishing attacks. The proposed game design framework was aimed to enhance the user avoidance behaviour through motivation to thwart phishing attack. The results of this study revealed that perceived threat, safeguard effectiveness, safeguard cost, self-efficacy, perceived severity and perceived susceptibility elements should be incorporated into the game design framework for computer users to avoid phishing attacks through their motivation. The theoretical design approach was focused on designing a mobile game to educate computer users against phishing attacks. The elements of the framework were addressed in the mobile game design context. The main objective of the proposed mobile game design was to teach users how to identify phishing website addresses (URLs), which is one of many ways of identifying a phishing attack. The mobile game prototype was developed using MIT App inventor emulator. In the second study, the formulated game design framework was evaluated through the deployed mobile game prototype on a HTC One X touch screen smart phone. Then a discussion is reported in this thesis investigating the effectiveness of the developed mobile game prototype compared to traditional online learning to thwart phishing threats. Finally, the research reported in this thesis found that the mobile game is somewhat effective in enhancing the user’s phishing awareness. It also revealed that the participants who played the mobile game were better able to identify fraudulent websites compared to the participants who read the website without any training. Therefore, the research reported in this thesis determined that perceived threat, safeguard effectiveness, safeguard cost, self-efficacy, perceived threat and perceived susceptibility elements have a significant impact on avoidance behaviour through motivation to thwart phishing attacks as addressed in the game design framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Shepherd, Lynsay A. "Enhancing security risk awareness in end-users via affective feedback." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/e5af92fb-4936-43d2-878e-fbc16711e36d.

Full text
Abstract:
Background: Risky security behaviour displayed by end-users has the potential to leave devices vulnerable to compromise, despite the availability of security tools designed to aid users in defending themselves against potential online threats. This indicates a need to modify the behaviour of end-users, allowing them to consider the security implications of their actions online. Previous research has indicated affective feedback may serve as a successful method of educating users about risky security behaviours. Thus, by influencing end-users via affective feedback it may be possible to engage users, improving their security awareness. Aims: Develop and apply knowledge of monitoring techniques and affective feedback, establishing if this changes users’ awareness of risky security behaviour in the context of a browser-based environment. Methodology: The methodology employs the use of log files derived from the monitoring solution, and information provided by users during the experiments. Questionnaire data was compared against log files and information provided during experiments, providing an overall quantitative approach. Results: In the case of the log files and questionnaires, participants were found to have engaged in instances of risky security behaviours, which they were unaware of, and this indicated a low-level of awareness of risky security behaviour. Whilst the results indicate the affective feedback did not make a difference to behaviour during the course of the experiments, participants felt that the affective feedback delivered had an impact, raising their security awareness, encouraging them to learn about online security. Conclusions: This body of research has made a novel contribution to the field of affective feedback and usable security. Whilst the results indicate the affective feedback made no difference to behaviour, users felt it had an impact on them, persuading them to consider their security behaviours online, and encouraging them to increase their knowledge of risky security behaviours. The research highlights the potential application of affective feedback in the field of usable security. Future work seeks to explore different ways in which affective feedback can be positioned on-screen, and how feedback can be tailored to target specific groups, such as children, or elderly people, with the aim of raising security awareness.
APA, Harvard, Vancouver, ISO, and other styles
7

Brace, Dhimitris. "Users Awareness of Cyber threats and Consequences in Social Media." Thesis, Uppsala universitet, Institutionen för informatik och media, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-434979.

Full text
Abstract:
Year 2013, the year that the world faced one of the most critical whistleblower cases in the last decades. A government that was accused that intercepted personal information of many users. Nowadays people are using the internet, and many provided services such as emailing and social media. There are security principles and standards that are supposed to support users with information security and data safety, are based in human rights provided by law. The level of the security and safety provided is a case that every single user must be aware of it. Plenty of users’ awareness in the internet and the services that they are using is not what it should be. Internet and services such as social media or emailing have instant interaction with Information security of individuals and their personal security as well. The users that are using these services are facing threats and risks, and the business field as well. The law has defined a specific regulation in order to protect the human rights in information privacy and data protection. Social media usage has become a daily communication routine between users who are not informed about the consequences of their usage and what that might bring up. The overall purpose of this study was to warn the users of the internet and social media to be aware of the risk and threats, and to introduce the meaning and the importance of information security by increasing user awareness.
APA, Harvard, Vancouver, ISO, and other styles
8

Bauer, Stefan, Edward Bernroider, and Katharina Chudzikowski. "Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks." Elsevier, 2017. http://dx.doi.org/10.1016/j.cose.2017.04.009.

Full text
Abstract:
In organizations, users' compliance with information security policies (ISP) is crucial for minimizing information security (IS) incidents. To improve users' compliance, IS managers have implemented IS awareness (ISA) programs, which are systematically planned interventions to continuously transport security information to a target audience. The underlying research analyzes IS managers' efforts to design effective ISA programs by comparing current design recommendations suggested by scientific literature with actual design practices of ISA programs in three banks. Moreover, this study addresses how users perceive ISA programs and related implications for compliant IS behavior. Empirically, we utilize a multiple case design to investigate three banks from Central and Eastern Europe. In total, 33 semi-structured interviews with IS managers and users were conducted and internal materials of ISA programs such as intranet messages and posters were also considered. The paper contributes to IS compliance research by offering a comparative and holistic view on ISA program design practices. Moreover, we identified influences on users' perceptions centering on IS risks, responsibilities, ISP importance and knowledge, and neutralization behaviors. Finally, the study raises propositions regarding the relationship of ISA program designs and factors, which are likely to influence users' ISP compliance.
APA, Harvard, Vancouver, ISO, and other styles
9

Du, Tiantian, and Amro Agami. "Examining young users’ security perceptions of mobile banking : A qualitative study on users’ insights about mobile banking." Thesis, Umeå universitet, Företagsekonomi, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-141655.

Full text
Abstract:
The advancement of mobile technology and banking services enabled users to use the mobile banking for a variety of tasks with their smartphones, bringing increased flexibility and value-added services to the customers. However, users still have still concerns regarding the security of mobile banking services. The lack of knowledge of the user about different security threats and mechanisms to improve their security represent a major opportunity for hackers and cyberattacks. Despite the fact that the younger students are more knowledgeable about technologies yet awareness is still a concern. Perceived security in the context of young users has not been examined before, although it is considered important in building customer trust. Therefore, this thesis aims to form a good understanding of this topic. On analyzing prior research, the subjects of trust and perceived security in mobile banking is approached by the literature review and an exploratory study that was conducted through qualitative semi-structured interviews. The information collected was carefully analyzed with proper tools. After analyzing the information an analysis of the literature findings and study finds was presented. This thesis examined and revealed that perceived security in mobile banking is important for young users. However, it was noticed that users would not leave the service due to their reliance on the bank assurances to cover their security losses, which means that most of the mobile banking young users trust their bank and technology given the security threats. In addition, this study revealed that the majority of users are unaware of security threats surrounding the mobile banking environment. It was found also that the most important mechanism for the user is authentication mechanisms. This thesis provides a general understanding of the security in mobile banking. It highlights that perceived security is a complex concept and is affected by various factors such as device, information quality, user experience and type of network connections. These factors should be carefully considered by users when using the technology. In conclusion, this thesis also implies banks to communicate effectively security information to users in order to avoid mobile banking users’ errors.
APA, Harvard, Vancouver, ISO, and other styles
10

Narayana, Chaithanya Kumar. "Awareness and trust of web users on information sharing in social logins." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99038.

Full text
Abstract:
Accessing websites using social networking credentials, also known as social login, is becoming increasingly popular as users do not need to create and maintain accounts on each and every website they access. During these social logins, the private information of users is shared with third-party websites from their social profile, and much of this happens behind the scenes which is abstracted from the user. However, as social logins are widespread, it is essential to understand the users’ views and appreciation towards the information being shared in the background. There is also a possibility of data leak or misuse when information is exchanged between a website and social networking site. Accordingly, the purpose of this study is to explore the perception of users towards their awareness and trust in social login. In addition, based on users’ needs and desires, the study aims to formulate suggestions for improving the awareness and trust of social login. Semi-structured interviews were conducted with 6 students from Linnaeus University of Sweden to collect data. These interviews were transcribed and analyzed using thematic analysis. The findings revealed that users are conscious of their personal attributes being shared but are not aware that they can control, revise and revoke information sharing permissions. It was also found that users trust third parties to some extent but not the social networking sites. The study also suggested some improvement ideas for enhancing the awareness and trust of web users in social logins. In addition to contributing to the field of social login, the outcomes of this study also benefit users and web companies by helping to understand and increase the awareness and trust of web users on social logins.
APA, Harvard, Vancouver, ISO, and other styles
11

Utakrit, Nattakant. "Security awareness by online banking users in Western Australian of phishing attacks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/503.

Full text
Abstract:
Phishing involves sending e-mails pretending to be from the legitimate financial institutions to recipients and asking for personal information such as username and password. It also redirects network traffic to malicious sites, deny network traffic to web services, and modify protection mechanisms in the targeted computer systems. Consequences of successful attacks can include identity and financial losses, and unauthorised information disclosure. The purpose of this study was to investigate the experiences of Western Australian bank users in using online banking. The study considered the relationship between the background of the Western Australian bank users and their experience in using online banking security. The research analysed phishing through case studies that highlighted some of the experiences of phishing attacks and how to deal with the problems. Emphasis was placed on knowledge of phishing and threats and how they were actually implemented, or may be used, in undermining the security of users’ online banking services. The preferences and perspectives of Western Australian bank users about the deployment of online banking security protection and about future online banking services, in order to safeguard themselves against phishing attacks, are presented. The aim was to assist such Australian bank users through exploring potential solutions and making recommendations arising from this study. Research respondents had positive attitudes towards using online banking. Overall, they were satisfied with the security protection offered by their banks. However, although they believed that they had adequate knowledge of phishing and other online banking threats, their awareness of phishing attacks was not sufficient to protect themselves. Essentially, the respondents who had experienced a phishing attack believed it was due to weak security offered by their banks, rather than understanding that they needed more knowledge about security protection of their personal computers. Further education is required if users are to become fully aware of the need for security within their personal online banking.
APA, Harvard, Vancouver, ISO, and other styles
12

Hammarstrand, Johanna, and Tommy Fu. "Information security awareness and behaviour: of trained and untrained home users in Sweden." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10457.

Full text
Abstract:
Today we live in an information society that is constantly growing in terms of the amount of information that are processed, stored, and communicated. Information security is a field that is of concern for both the individual and the society as a whole, as both groups are exposed to information every day. A society like this will demand more emphasis on information security. Previous researchers that has addressed this problem argues that security awareness is the most significant factor in order to raise the general security level. They also mention education as a solution to increase the security awareness and thereby achieve a secure environment. The aim of this thesis is to examine the differences between trained and untrained home users in security awareness and behaviour. The research was conducted, using a quantitative method in form of a survey research with the distribution of self-completion questionnaires. The study has a total of 162 respondents that participated. The result was presented and analysed through the use of the software program, IBM SPSS. The results of the findings suggest that the awareness of the trained home users is higher than of those who are untrained home users. Additionally, the discussion suggests that the home users who have participated in awareness raising initiatives, such as education and training, does not necessarily apply more security measures in their home environment, than those who are regarded as untrained home users. Hence, this study suggests that the increase in awareness may not necessarily be the only factor that affects the user’s behaviour, since those who have not participated in awareness raising initiatives applies security measures, almost to the same extent to those who have. This thesis might be able to act as a foundation for future research within the field, considering that the research is a comparative study between trained and untrained home users of the variables security awareness and behaviour where the found results, does not fully agree with previous research. However, an increase in awareness is a good start, but may need to be paired with appropriate training from other parties, such as internet service providers (ISPs) and banks. Maybe the solution could be to develop and strive for a continuous information security culture of the Swedish society, which may result in a deeper learning and understanding of security issues and inspire home users to be engaged and proactive about their information security behaviour.
APA, Harvard, Vancouver, ISO, and other styles
13

Liccardi, Ilaria. "Improving users' awareness interactions in the collaborative document authoring process : the CAWS approach." Thesis, University of Southampton, 2010. https://eprints.soton.ac.uk/171677/.

Full text
Abstract:
Awareness of individual and group activities is critical to successful collaborative authoring. Participants require knowledge of what other contributors are doing and have done, what meaningful changes have been made to a document, and who is editing each section of a document and why. With this information, group dynamics can be improved and members can work more efficiently toward the final product. In this thesis, key problems in collaborative activities are identified through a review of previous research on the subject and from field research of authors engaged in collaborative work. From these initial observations we deduce that many problems in collaborative writing occur due to technology that hinders the proper distribution of information to members of the group. The concept of “awareness”, identified in past research, is discussed, and used as a model to explain the underlying causes behind these common problems. As a specific example of the importance of communication and coordination mechanisms, an analysis is presented of the Wikibooks website, an online collaborative writing site that allows volunteers to work together to develop free textbooks. Statistical analysis of historical data from the site is used to correlate successful books with efficient use of planning, communication and coordination techniques. These results help to further cement the importance of communication and awareness channels. From analysis of these issues, a set of requirements is defined for an effective collaboration tool, specifically the features that such a tool should include in order to support the types of awareness that are necessary for successful collaboration. Existing groupware systems are compared and judged against these requirements, with the discovery that most systems lack support for many different types of awareness. To investigate the subject further, a prototype co-authoring system with features to support awareness (CAWS), developed as part of this research, is described. It is explained how these features attempt to reproduce some of the communications channels implicitly present within an office environment. The results of a usability study using the CAWS system are then presented, with particular reference to the effectiveness of the features of the system. Feedback from participants was gathered with respect to usefulness and ease of gathering information about other users‟ progress and interactions with the workspace with these features present. Finally the observations, findings and the implications of a real world groupware evaluation are presented (undertaken over a period of 17 weeks with 85 students divided into 15 groups). The groupware evaluation gives insight into the effectiveness of awareness mechanisms. This includes the role and effect of planning, the effect of the choice of tool on perceptions of awareness, the relative importance of awareness and how awareness contributes to a successful collaboration. We discuss the outcomes of the research with respect to the research questions and contribution, presenting how the research could be continued in the future.
APA, Harvard, Vancouver, ISO, and other styles
14

Hamdani, Kamran Javed, and Muhammad Ijaz E. Mustafa. "Effectiveness of Online Anti-Phishing Delivery methods in raising Awareness among Internet Users." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-84318.

Full text
Abstract:
ABSTRACT  Cyberattacks are constantly evolving and phishing activities have risen steeply in the last few years. As the number of online users is increasing so as the phishing attacks and scams are increasing too. It is even more surprising in the presence of the most sophisticated technical security measures and online users are continually becoming the victim of phishing attacks that causing financial and emotional loss. Phishing attacks involve deceiving a target user into revealing their most important personal information such as ID, password, username, bank card, or other sensitive information to the cybercriminals. The typical way to instigate a phishing attack by sending malicious emails that may contain malware or a link to a phishing website. It is evident from various phishing reports that despite the most sophisticated and expensive technical security measures, the phishing attacks are proved to be still successful. This is happening because phishing techniques bypass technical security measures and try to exploit vulnerabilities associated with human and use social engineering to reach its target. Therefore, in this situation, anti-phishing awareness is the most effective tool that can protect internet users against phishing attacks. Anti-phishing awareness material can be delivered in a number of methods; however, the effectiveness of these awareness delivery methods is an open question among the researcher community and the anti-phishing awareness program designers. Which method is more effective in anti-phishing awareness-raising, increasing overall users’ confidence in dealing with phishing emails, and which method users preferred more? In an attempt to address all these questions, we conducted experimental research involving online users with different demographic backgrounds. We design and deliver and online anti-phishing awareness-raising material in three formats, video-based, text-based, and infographic-based. We found all training methods significantly improve the accuracy rate of identifying phishing and genuine emails. The training decreased the false-negative rate and also reduced the false positive rate among the participants of all training groups when compared with a control group. However, our study did not find one awareness delivery method significantly more effective than other methods in transferring knowledge. However, the study found video and infographic methods as most preferred by the users. This study also found an interesting result that the difference between the accuracy of identifying phishing emails of participants who received training in their preferred learning method and the accuracy of participants who received training in other methods was not significantly different. These results serve researchers, students, organizations, cybersecurity expert, and security awareness program designers, who are interested in understating the relationship between different awareness rising delivery methods and their effectiveness in educating internet users about prevention from phishing attacks.
APA, Harvard, Vancouver, ISO, and other styles
15

Barakat, Rahaf. "Automated Framework to Improve User’s Awareness and to Categorize Friends on Online Social Networks." Diss., North Dakota State University, 2015. http://hdl.handle.net/10365/25239.

Full text
Abstract:
The popularity of online social networks has brought up new privacy threats. These threats often arise after users willingly, but unwittingly reveal their information to a wider group of people than they actually intended. Moreover, the well adapted “friends-based” privacy control has proven to be ill-equipped to prevent dynamic information disclosure, such as in user text posts. Ironically, it fails to capture the dynamic nature of this data by reducing the problem to manual privacy management which is time-consuming, tiresome and error-prone task. This dissertation identifies an important problem with posting on social networks and proposes a unique two phase approach to the problem. First, we suggest an additional layer of security be added to social networking sites. This layer includes a framework for natural language to automatically check texts to be posted by the user and detect dangerous information disclosure so it warns the user. A set of detection rules have been developed for this purpose and tested with over 16,000 Facebook posts to confirm the detection quality. The results showed that our approach has an 85% detection rate which outperforms other existing approaches. Second, we propose utilizing trust between friends as currency to access dangerous posts. The unique feature of our approach is that the trust value is related to the absence of interaction on the given topic. To approach our goal, we defined trust metrics that can be used to determine trustworthy friends in terms of the given topic. In addition, we built a tool which calculates the metrics automatically, and then generates a list of trusted friends. Our experiments show that our approach has reasonably acceptable performance in terms of predicting friends’ interactions for the given posts. Finally, we performed some data analysis on a small set of user interaction records on Facebook to show that friends’ interaction could be triggered by certain topics.
APA, Harvard, Vancouver, ISO, and other styles
16

Gopisetty, Yugandhar. "A study of online users' cyber threat awareness and their use of threat countermeasures." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-115918.

Full text
Abstract:
The internet has permeated the lives of the modern men in more respects than can be tabulated simply. The ease of access to online shopping, social networking, simplified communication, etc. make the internet a modern panacea for a number of problems. However, the internet also opens up avenues that expose the user to vulnerabilities at the hand of hackers and malicious software coders. The use of the internet to exchange personal and fiscal information makes attacks all the more inviting. This is compounded by the fact that most online users are unaware of threats that affect them on a daily basis and how to protect themselves against such threats. Despite the fact that the level of awareness of the contemporary cyber threats, has significantly increased among online users within the last few years, there is a growing need to improve the efficiency and effectiveness of the countermeasures currently being used. Fortunately, there are a number of Human Computer Interaction (HCI) principles that can effectively be used to enhance online user interaction and reduce internet security threats.
APA, Harvard, Vancouver, ISO, and other styles
17

Edwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.

Full text
Abstract:
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the incentive to take security awareness training on their own. Research in security awareness and security behavior has produced conflicting results. Therefore, it is not clear, how security aware home computer users are or to what extent security awareness affects the security behavior of home computer users. The goal of this study was to determine if there is a relationship between security awareness and users practicing good security behavior. This study adapted its research model from the health belief model (HBM), which accesses a patient’s decision to perform health related activities. The research model included the HBM constructs of perceived severity, perceived susceptibility, perceived threat, perceived benefits, perceived barriers, cues to action, and self-efficacy. The research model also contained the security awareness (SA) and concern for information privacy (CFIP) constructs. The model used SA to ascertain the effect of security awareness on a person’s self-efficacy in information security (SEIS), perceived threat, CFIP, and security behavior. The research model included CFIP to ascertain its effect on security behavior. The developed survey measured the participants' security awareness, concern for information privacy, self-efficacy, expectations of security actions, perceived security threats, cues to action, and security behavior. SurveyMonkey administered the survey. SurveyMonkey randomly selected 267 participants from its 30 million-member base. The findings of this study indicate home computer users are security aware. SA does not have a direct effect on a user’s security behavior, perceived threat, or CFIP. However, it does have influence on SEIS. SEIS has a weak effect on expectations. CFIP has an effect on a user’s security behavior after removing perceived threat from the research model. Perceived susceptibility has a direct effect on a user’s security behavior, but perceived severity or perceived threat does not.
APA, Harvard, Vancouver, ISO, and other styles
18

Yu, Yi. "Enabling energy awareness of ICT users to improve energy efficiency during use of systems." Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/7037.

Full text
Abstract:
Data centres have been the primary focus of energy efficiency researches due to their expanding scales and increasing demands of energy. On the other hand, there are several orders of magnitude more end-users and personal computing devices worldwide. Even the modest energy savings from the users would scale up and yield significant impact. As a result, we take the approach towards energy-saving by working with the end-users. We recognise that users of ICT systems are often unaware of their power usage, and are therefore unable to take effective actions even if they wanted to save energy. Apart from energy awareness, the majority of end-users often lack of sufficient knowledge or skills to reduce their energy consumption while using computing devices. Moreover, there is no incentive for them to save energy, especially in public environments where they do not have financial responsibilities for their energy use. We propose a flexible energy monitor that gathers detailed energy usage across complex ICT systems, and provides end-users with accurate and timely feedback of their individual energy usage per workstation. We tailored our prototype energy monitor for a 2-year empirical study, with 83 student users of a university computer lab, and showed that end-users will change their use of computers to be more energy efficient, when sufficient feedback and incentives (rewards) are provided. In our measurements, weekly mean group power consumption as a whole reduced by up to 16%; and weekly individual user power usage reduced by up to 56% during active use. Based on our observations and collected data, we see possibilities of energy saving from both hardware and software components of personal computers. It requires coordination and collaboration between both system administrators and end-users to maximise energy savings. Institutional ‘green' policies are potentially helpful to enforce and regulate energy efficient use of ICT devices.
APA, Harvard, Vancouver, ISO, and other styles
19

Senter, Jasper W. Thornton Cayetano S. "Information technology (IT) ethics : training and awareness materials for the Department of the Navy /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FThornton%5FSenter.pdf.

Full text
Abstract:
Thesis (M.S.)--Naval Postgraduate School, 2002.
Thesis advisor(s): Cynthia E. Irvine, Floyd Brock. Jasper W. Senter graduated in September, 2002; Cayetano S. Thornton graduated in June, 2002. Includes bibliographical references (p. 59-61). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
20

Reese, Cassandra L. "Breath in Motion: Breath Awareness Design Research Study." Kent State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=kent1493048215472907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Rittenbruch, Markus. "Active awareness : supporting the intentional disclosure of awareness information in collaborative systems." Thesis, University of Queensland, 2011. https://eprints.qut.edu.au/70075/1/s4067813_phd_finalthesis.pdf.

Full text
Abstract:
This thesis opens up the design space for awareness research in CSCW and HCI. By challenging the prevalent understanding of roles in awareness processes and exploring different mechanisms for actively engaging users in the awareness process, this thesis provides a better understanding of the complexity of these processes and suggests practical solutions for designing and implementing systems that support active awareness. Mutual awareness, a prominent research topic in the fields of Computer-Supported Cooperative Work (CSCW) and Human-Computer Interaction (HCI) refers to a fundamental aspect of a person’s work: their ability to gain a better understanding of a situation by perceiving and interpreting their co-workers actions. Technologically-mediated awareness, used to support co-workers across distributed settings, distinguishes between the roles of the actor, whose actions are often limited to being the target of an automated data gathering processes, and the receiver, who wants to be made aware of the actors’ actions. This receiver-centric view of awareness, focusing on helping receivers to deal with complex sets of awareness information, stands in stark contrast to our understanding of awareness as social process involving complex interactions between both actors and receivers. It fails to take into account an actors’ intimate understanding of their own activities and the contribution that this subjective understanding could make in providing richer awareness information. In this thesis I challenge the prevalent receiver-centric notion of awareness, and explore the conceptual foundations, design, implementation and evaluation of an alternative active awareness approach by making the following five contributions. Firstly, I identify the limitations of existing awareness research and solicit further evidence to support the notion of active awareness. I analyse ethnographic workplace studies that demonstrate how actors engage in an intricate interplay involving the monitoring of their co-workers progress and displaying aspects of their activities that may be of relevance to others. The examination of a large body of awareness research reveals that while disclosing information is a common practice in face-to-face collaborative settings it has been neglected in implementations of technically mediated awareness. Based on these considerations, I introduce the notion of intentional disclosure to describe the action of users actively and deliberately contributing awareness information. I consider challenges and potential solutions for the design of active awareness. I compare a range of systems, each allowing users to share information about their activities at various levels of detail. I discuss one of the main challenges to active awareness: that disclosing information about activities requires some degree of effort. I discuss various representations of effort in collaborative work. These considerations reveal that there is a trade-off between the richness of awareness information and the effort required to provide this information. I propose a framework for active awareness, aimed to help designers to understand the scope and limitations of different types of intentional disclosure. I draw on the identified richness/effort trade-off to develop two types of intentional disclosure, both of which aim to facilitate the disclosure of information while reducing the effort required to do so. For both of these approaches, direct and indirect disclosure, I delineate how they differ from related approaches and define a set of design criteria that is intended to guide their implementation. I demonstrate how the framework of active awareness can be practically applied by building two proof-of-concept prototypes that implement direct and indirect disclosure respectively. AnyBiff, implementing direct disclosure, allows users to create, share and use shared representations of activities in order to express their current actions and intentions. SphereX, implementing indirect disclosure, represents shared areas of interests or working context, and links sets of activities to these representations. Lastly, I present the results of the qualitative evaluation of the two prototypes and analyse the results with regard to the extent to which they implemented their respective disclosure mechanisms and supported active awareness. Both systems were deployed and tested in real world environments. The results for AnyBiff showed that users developed a wide range of activity representations, some unanticipated, and actively used the system to disclose information. The results further highlighted a number of design considerations relating to the relationship between awareness and communication, and the role of ambiguity. The evaluation of SphereX validated the feasibility of the indirect disclosure approach. However, the study highlighted the challenges of implementing cross-application awareness support and translating the concept to users. The study resulted in design recommendations aimed to improve the implementation of future systems.
APA, Harvard, Vancouver, ISO, and other styles
22

Westerlund, Markus. "The Design & User Experiences of a Mobile Location-awareness Application: Meet App." Thesis, Södertörn University College, School of Communication, Media and it, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-3773.

Full text
Abstract:

This paper intends to describe the work and result of the design project Meet App. Meet App lets users interact around their current locations in a direct manner. The user experience is evaluated to get an understanding of the usefulness and interaction with this type of design. The project is related to the context-awareness research field where findings put the project in a greater whole. The result indicates usefulness and enjoyment interacting with the application, but because of the low number of participants the findings cannot be validated.

APA, Harvard, Vancouver, ISO, and other styles
23

Bang, Gihoon. "UX Gap : Analysis of User Experience Awareness in practitioners’ perspective." Thesis, Umeå universitet, Institutionen för informatik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-122519.

Full text
Abstract:
Many within the industry, including designers, recognize the need to consider UX as the key to designing new products and services. As a consequence of this, the territory of UX has extended into many different industries and different disciplines. However, some practitioners still claim a UX project does not pay off even if they have improved UX. This way of thinking is induced from an old issue of UX. The term itself does not have a clear theoretical definition and it even makes a contradiction of itself. This phenomenon further aggravates the issue. The rapid expansion of UX territory made a gap between academia and practitioners. This research attempts to measure and examine the gap between academia and practitioners. A survey was conducted to observe how aware practitioners are of UX and their ability to recognize it as compared to the recent academia’s research.
APA, Harvard, Vancouver, ISO, and other styles
24

Shen, Han. "Factors Related to Users’ Awareness of Information Security on Social Network Service --The Case of WeChat." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-73717.

Full text
Abstract:
Recent trends in social network services (SNS) have taken the rates of personal information sharing, storage and processing to an unprecedented level, which yield both benefits and undesirable consequences for their users. SNS is being exploited by criminals to fraudulently obtain information from unsuspecting users. User’s awareness of privacy protection has been far left behind by the increasing and popularizing utilization of social network services (SNS), the privacy security problems will become one of the important factors influencing the healthy development of social network service industry. This study was designed to collect data and produce knowledge about the security awareness of WeChat users (i.e., randomly selected from all over China), their preferences and their experience of using WeChat while facing security issues as well as the perspectives of how people perceive a specific security problems, in order to find out what factors influence user's security awareness. In order to carefully conduct the research process and explain the empirical findings, seven principles of interpretive field research and protection motivation theory is adopted as core theoretical foundation. Participants were asked to provide information about and their personal views of questions from their different experience and value. Eight persons interviewed for our research and their responses confirmed our objectives of the study. As a result, six factors are indentified in related to WeChat user’s security awareness. PMT helps to explain and understand that how six indentified concepts influence behaviour intention and security awareness of user.
APA, Harvard, Vancouver, ISO, and other styles
25

Chamsi, Abu Quba Rana. "On enhancing recommender systems by utilizing general social networks combined with users goals and contextual awareness." Thesis, Lyon 1, 2015. http://www.theses.fr/2015LYO10061/document.

Full text
Abstract:
Nous sommes amenés chaque jour à prendre un nombre important de décisions : quel nouveau livre lire ? Quel film regarder ce soir ou où aller ce week-end ? De plus en plus, nous utilisons les ressources en ligne pour nous aider à prendre des décisions. Comme la prise de décision est assistée par le domaine en ligne, l'utilisation de systèmes de recommandation est devenue essentielle dans la vie quotidienne. Dans le même temps, les réseaux sociaux sont devenus une partie indispensable de ce processus ; partout dans le monde on les utilise quotidiennement pour récupérer des données de personne et de sources d'information en qui on a confiance. Quand les internautes passent du temps sur les réseaux sociaux, ils laissent de précieuses informations sur eux-mêmes. Cela a attiré l'attention des chercheurs et les professionnels de nombreux domaines académiques et commerciaux. Comme le domaine de la recommandation est un domaine qui a assisté à des changements de grande ampleur attribuable à des réseaux sociaux, il y a un intérêt évident pour les systèmes de recommandation sociale. Cependant, dans la littérature de ce domaine, nous avons constaté que de nombreux systèmes de recommandation sociale ont été évalués en utilisant des réseaux sociaux spécialisés comme Epinions, Flixter et d'autres types des réseaux sociaux de recommandation, qui tendent à être composées d'utilisateurs, d'articles, de notes et de relations. Ces solutions ne peuvent pas être étendues directement à des réseaux sociaux à usage général (GPSNs) comme Facebook et Twitter, qui sont des réseaux sociaux ouverts où les utilisateurs peuvent réaliser une variété d'actions utiles pour l'aide à la recommandation
We are surrounded by decisions to take, what book to read next? What film to watch this night and in the week-end? As the number of items became tremendous the use of recommendation systems became essential in daily life. At the same time social network become indispensable in people’s daily lives; people from different countries and age groups use them on a daily basis. While people are spending time on social networks, they are leaving valuable information about them attracting researchers’ attention. Recommendation is one domain that has been affected by the social networks widespread; the result is the social recommenders’ studies. However, in the literature we’ve found that most of the social recommenders were evaluated over Epinions, flixter and other type of domains based recommender social networks, which are composed of (users, items, ratings and relations). The proposed solutions can’t be extended directly to General Purpose Social Networks (GPSN) like Facebook and Twitter which are open social networks where users can do a variety of useful actions that can be useful for recommendation, but as they can’t rate items, these information are not possible to be used in recommender systems! Moreover, evaluations are based on the known metrics like MAE, and RMSE. This can’t guarantee the satisfaction of users, neither the good quality of recommendation
APA, Harvard, Vancouver, ISO, and other styles
26

Diaz, Fatima Artiba. "Web Content Management System and accessibility awareness: A comparative study of novice users and accessibility outcomes." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2020. https://ro.ecu.edu.au/theses/2301.

Full text
Abstract:
Since its creation, the Web has progressively developed and become a vital source of information in every domain and for almost all people. It is crucial to guarantee that the information contained on the Web is available for everyone, especially for people with special needs. Removing accessibility barriers is fundamentally based on tools, skills and support of all contributors, particularly the content creators, to ensure information is navigable and usable in the context of the end users experience. Web Content Management Systems play a significant role in structuring, storing and provision content to the Web and have evolved to address the difficulties of manually coding web pages versus the convenience of manipulating their content without any programing skills. Web Content Management Systems have gradually evolved to contain features and functions that allow content authors to shape their content in ways that address web content accessibility expectations, though only if the content author knows how to use these features to maximum effect. This thesis explores such usage by participants deemed to be novices, in that they have limited technical skills in the context of web coding and have limited expose to Web Content Management Systems or the application/awareness of the Web Content Accessibility Guidelines (WCAG). This research places an emphasis on the outcome of these novice users when provided with some basic training and awareness raising of WCAG principles and the use of a modern Web Content Management System. This is explored in the literature as an area of some importance as organisations with significant web presence cannot simply tell their content authors to ‘oh, and make sure it is accessible’ and hope that the end product will somehow achieve that goal without an investment in some form of accessibility education. "For web managers and developers in all public sector organisations. “Make sure that all content commissioners and authors are fully trained in the importance of accessible content, and in the means that are made available for them to achieve this". (p. 58) The purpose of this research was to explore to what level the use of accessible Web Content Management System and novice users’ training impacted accessibility outcomes. This study emerged from the widespread role that Web Content Management Systems play in terms of storing and managing web content and the growing usage of these systems by experts or novices at an organisational or personal level. Through a selection process, this study identified a Web Content Management System that had a number of accessibility features, developed some training and ‘awareness raising’ materials and then asked novice users across two groups to apply what they had learned in order to develop an accessible website. The goal of the study was to ascertain if the two groups performed differently according to the training and awareness raising materials they received, and if even basic accessibility outcomes were achievable with just a few hours of training and from what was essentially an accessibility ‘cold start’. The study used a mixed methods approach encompassing three research methods; experimental method, survey method and observational method, to compare qualitative and quantitative data obtained from ‘accessibility awareness’ and ‘accessibility unaware’ participant groups. Thirty university students participated in this research and received accessibility awareness raising sessions, with additional accessibility-related examples for the accessibility awareness group. All participants undertook pre and post-tests that were designed to collect data allowing the researcher to compare the learning performance before and after the participants’ awareness session. At the end of the awareness session, the participants of both groups completed a survey which was designed to provide further data on the participant’s perception of web use and experience, the concept of web accessibility, web content accessibility guidelines, the system used, and their opinion of the accessibility awareness session. Data collected from the survey, pre and post-tests and the recording provided a holistic set of data from which the primary and supporting research questions were addressed. The results of the research indicated that the accessibility awareness group demonstrated measurably better accessibility outcomes than the unawareness group; these results being attributed to the awareness training session, participants’ searching behaviour, time spent on tasks, and effort made to implement accessible features and complete the required tasks. The participants in both groups had some prior knowledge in the use of the Web but limited or no skills in HyperText Markup Language (HTML) or the use of a Web Content Management System. While performing tasks, the participants in the awareness group attempted to apply the accessibility concepts learnt during the training session and spent more time in searching those concepts on the Web in order to provide accessible web page content. Conversely, most of the participants in the unawareness group were concerned by the “look” of the web page, rather than focusing on actual accessible content; they only mimicked the exemplar website they have been provided as an ‘end product’, but did not explore the how and why of accessible content. All the participants at the end of this study were aware of the significance of web accessibility and were favourable to consider it in any future website development they may be involved in. The outcome of the study shows that the use of accessible Web Content Management System with example-based accessibility awareness sessions can lead to improved accessibility outcomes for novice web content authors. This research strongly suggests that even small, focussed and example-based training/awareness raising session can drive an accessibility mindset in web content authors, even those with limited or no technical, accessibility or web authoring experience.
APA, Harvard, Vancouver, ISO, and other styles
27

Hartmann, Fabian [Verfasser], and M. [Akademischer Betreuer] Zitterbart. "User-Centric Networking : Privacy- and Resource-Awareness in User-to-User Communication / Fabian Hartmann ; Betreuer: M. Zitterbart." Karlsruhe : KIT-Bibliothek, 2017. http://d-nb.info/1135266212/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Findlater, Leah. "Supporting feature awareness and improving performance with personalized graphical user interfaces." Thesis, University of British Columbia, 2009. http://hdl.handle.net/2429/11622.

Full text
Abstract:
Personalized graphical user interfaces have the potential to reduce visual complexity and improve efficiency by modifying the interface to better suit an individual user's needs. Working in a personalized interface can make users faster, more accurate and more satisfied; in practice, however, personalization also comes with costs, such as a reliance on user effort to control the personalization, or the introduction of spatial instability when interface items are reorganized automatically. We conducted a series of studies to examine both the costs and benefits of personalization, and to identify techniques and contexts that would be the most likely to provide an overall benefit. We first interviewed long-term users of a software application that provides adaptable (user-controlled) personalization. A design trade-off that emerged is that while personalization can increase the accessibility of features useful to a user's current task, it may in turn negatively impact the user's awareness of the full set of available features. To assess this potential trade-off, we introduced awareness as an evaluation metric to be used alongside more standard performance measures and we ran a series of three studies to understand how awareness relates to core task performance. These studies used two different measures to assess awareness, showing that personalization can impact both the recognition rate of unused features in the interface and user performance on new tasks requiring those features. We investigated both adaptive (system-controlled) and adaptable personalization techniques to help us understand the generalizability of the awareness concept. In addition to introducing and incorporating awareness into our evaluations, we studied how specific contextual and design characteristics impact the user's experience with adaptive interfaces. In one study, we evaluated the impact of screen size on performance and user satisfaction with adaptive split menus. Results showed that the performance and satisfaction benefits of spatially reorganizing items in the interface are more likely to outweigh the costs when screen size is small. We also introduced a new adaptive personalization technique that maintains spatial stability, called ephemeral adaptation, and evaluated it through two studies. Ephemeral adaptation improves performance over both another closely related adaptive technique and a traditional interface.
APA, Harvard, Vancouver, ISO, and other styles
29

Axtelius, Andreas, and Simon Asplund. "Designing technology promoting increased user body awareness: Using Microsoft Kinect V2." Thesis, KTH, Maskinkonstruktion (Inst.), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176277.

Full text
Abstract:
This master thesis investigates Kinect V2’s ability to be used as a sensor when designing technology with the aim of increasing the body awareness of a user. With a transition to an increasing number of different devices operating close to the user’s body, an interest in this subject has increased alongside it. These technologies demand a new approach which includes the user’s body into the design. This thesis was conducted at Mobile Life, a research center focused on the field human-computer interaction. Mobile Life uses a new approach based on Somaesthetics to include the complexity of humans in the interaction, mainly by exploring the therapy form Feldenkrais. Building prototypes based on Feldenkrais exercises, integrating technology into them, Mobile Life explores new ideas for fundamental user design. In this thesis the perspective of Somaesthetics is kept, but the functionality of Kinect V2 is used as a base point when investigating how to include the body in technology design. By utilizing research through design and the double diamond model, different prototypes were built to investigate various approaches. Initially three paths were chosen to investigate Kinect V2 from; the characteristics of breathing, heart rate and small movements related to balance. Based on this, four different prototypes were built. The most promising prototypes were then evaluated in user tests and the input was analyzed and used in the next prototype iteration. The thesis concludes that Kinect V2 is a potent sensor when facing the challenge of including the body in the interaction. It has the ability to detect the small movements related to a user’s respiratory cycle. However, the implemented algorithm was not capable of sufficiently mapping the breathing to an actuator with the requirements set up for the prototype. Small movements related to balance were measured without issue and the noise present in the sampled signal was filtered successfully without any delay affecting the prototype performance. Based on the knowledge gained during the master thesis, a new design concept is proposed for future investigation. This concept states that: “To build a system that helps the user reflect on a specific part of their body, the system must highlight or provide a similar sensation as the one felt in the user’s own body.”
Detta examensarbete undersöker möjligheten att använda Microsoft Kinect V2 som sensor vid design av teknik med syfte att öka en användares kroppsförståelse. Då den digitala tekniken både fysiskt samt funktionellt kommer närmare användarens kropp har ett intresse väckts rörande hur dessa digitala apparater bör förhålla sig till användaren. Detta kräver nya perspektiv som tillåter att designen inkluderar en användares kropp och dennes förhållande till sin kropp. Detta examensarbete utfördes vid Mobile Life, ett forskningscenter med fokus på människadatorinteraktion. Mobile Life använder sig av ett nytt förhållningsätt baserat på Somaestetik för att möta utmaningen med kroppsnära teknik. Tidigare har prototyper konstruerats med syftet att förstärka Feldenkreis-övningar med syfte att dra slutsatser angående fundamentala riktlinjer vid design av kroppsnära teknik. I detta examensarbete har även förhållningsättet hämtats från Somaestetik. Utgånsgpunkten för arbetet ligger dock i hur Kinect V2:s funktionalitet kan användas för att inkludera kroppen i design av teknik. Genom att använda metoderna ”Research through design” och ”double diamond model” utvecklades en rad prototyper med syfte att undersöka olika tillvägagångsätt. Inledningsvis utforskades Kinect V2 genom tre inriktningar. Dessa var andningscykeln, puls och små rörelser relaterade till balans. Med dessa tre utgångpunkter utvecklades fyra prototyper. De mest lovande versionerna av prototyperna utvärderades genom användartester där användarreflektion låg till grund för vidare utveckling under en iterationsbaserad prototypframtagningsprocess. Resultatet av examensarbetet visar att Kinect V2 är en sensor väl anpassad för denna typ av design. Studien visar att Kinect V2 har förmågan att finna små rörelser som är relaterade till en användares andningscykel. Algoritmen som utvecklades för att mäta andningsförloppet bedömdes dock otillräcklig för vidare implementation på grund av sporadiskt beteende. Kinect V2 har god förmåga att mäta små balansrelaterade rörelser och implementerades som styrsignal för en av de utvecklade prototyperna. Baserat på slutsatser från användartester genomförda under examensarbetet samt resultat från de prototyper som tidigare utvecklats av Mobile Life föreslås ett designkoncept för vidare utforskning. Detta koncept lyder: ”Ett system med mål att hjälpa en användare reflektera över en specifik del av sin kropp måste i sin interaktion med användaren framhäva eller förmedla en liknande förnimmelse som de användaren upplever.”
APA, Harvard, Vancouver, ISO, and other styles
30

Massochin, Marília Cristiane 1984, Edson Roberto 1965 Scharf, and Universidade Regional de Blumenau Programa de Pós-Graduação em Administração. "O brand awareness no contexto de vulnerabilidade de produtos o entendimento do heavy users da marca Apple /." reponame:Biblioteca Digital de Teses e Dissertações FURB, 2016. http://www.bc.furb.br/docs/DS/2016/361892_1_1.pdf.

Full text
Abstract:
Orientador: Edson Roberto Scharf.
Dissertação (Mestrado em Administração) - Programa de Pós-Graduação em Administração, Centro de Ciências Sociais Aplicadas, Universidade Regional de Blumenau, Blumenau,
APA, Harvard, Vancouver, ISO, and other styles
31

Baker, William. "Intercultural awareness and intercultural communication through English : an investigation of Thai English language users in higher education." Thesis, University of Southampton, 2009. https://eprints.soton.ac.uk/66542/.

Full text
Abstract:
Over the previous few decades there has been an increased emphasis on the cultural aspects of English language teaching. However, in settings where English is used as a global lingua franca the cultural associations of the language are complex and the role culture plays in successful communication has yet to be extensively investigated. To conduct such a study it is necessary to explicate the role and nature of English in global contexts and particularly how English functions as a lingua franca (ELF). Furthermore, a theoretical understanding of the relationships between languages and cultures in intercultural communication is needed, which emphasises the fluid and dynamic nature of any connections. The thesis focuses on cultural awareness (CA) as an approach to equipping learners and users of English for the diversity of intercultural communication. However, it is suggested that CA has still not incorporated an understanding of the multifarious uses of English in global contexts where no clear cultural associations can be established. Thus, intercultural awareness (ICA) is offered as an alternative which addresses these needs. This results in the formulation of research questions which aim to explore how ICA can best be characterised in an expanding circle setting and the role it plays in intercultural communication. Furthermore, this research also aims to explicate the relationships between the English language and cultures in such an environment and how this reflects on language use and attitudes. The study was predominantly qualitative utilising approaches associated with ethnography with the aim of producing a rich description of the research participants and their environment. The fieldwork took place over a six month period in a Thai university and seven participants formed the core of this study. The main data sources were recordings of the participants engaged in intercultural communication and interviews with the participants. These were supplemented with a survey, diaries, observations and documents from the research site. The findings of the study suggest that in successful intercultural communication culturally based forms, practices and frames of reference are employed as emergent, dynamic and liminal resources in a manner that moves between individual, local, national and global references. Furthermore, the results also indicated that ICA was a valid construct in the context investigated for explaining the types of cultural knowledge and related skills needed by participants to take part in successful intercultural communication through English.
APA, Harvard, Vancouver, ISO, and other styles
32

Eagan, James R. "The buzz supporting extensively customizable information awareness applications /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26628.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2009.
Committee Chair: Stasko, John T.; Committee Member: Edwards, Keith; Committee Member: Greenberg, Saul; Committee Member: Grinter, Beki; Committee Member: Guzdial, Mark. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
33

Könings, Bastian [Verfasser]. "User-centered awareness and control of privacy in Ubiquitous Computing / Bastian Könings." Ulm : Universität Ulm. Fakultät für Ingenieurwissenschaften und Informatik, 2015. http://d-nb.info/1073947912/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Grønli, Tor-Morten. "Cloud computing and context-awareness : a study of the adapted user experience." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/6524.

Full text
Abstract:
Today, mobile technology is part of everyday life and activities and the mobile ecosystems are blossoming, with smartphones and tablets being the major growth drivers. The mobile phones are no longer just another device, we rely on their capabilities in work and in private. We look to our mobile phones for timely and updated information and we rely on this being provided any time of any day at any place. Nevertheless, no matter how much you trust and love your mobile phone the quality of the information and the user experience is directly associated with the sources and presentation of information. In this perspective, our activities, interactions and preferences help shape the quality of service, content and products we use. Context-aware systems use such information about end-users as input mechanisms for producing applications based on mobile, location, social, cloud and customized content services. This represents new possibilities for extracting aggregated user-centric information and includes novel sources for context-aware applications. Accordingly, a Design Research based approach has been taken to further investigate the creation, presentation and tailoring of user-centric information. Through user evaluated experiments findings show how multi-dimensional context-aware information can be used to create adaptive solutions tailoring the user experience to the users’ needs. Research findings in this work; highlight possible architectures for integration of cloud computing services in a heterogeneous mobile environment in future context-aware solutions. When it comes to combining context-aware results from local computations with those of cloud based services, the results provide findings that give users tailored and adapted experiences based on the collective efforts of the two.
APA, Harvard, Vancouver, ISO, and other styles
35

Oliveira, Állan César Moreira de. "Model-based design of user interfaces to support situation awareness in maintenance." Universidade Federal de São Carlos, 2016. https://repositorio.ufscar.br/handle/ufscar/8686.

Full text
Abstract:
Submitted by Alison Vanceto (alison-vanceto@hotmail.com) on 2017-04-19T14:31:07Z No. of bitstreams: 1 TeseACMO.pdf: 3842026 bytes, checksum: 7081c677ee2f15ff2fd1eb1c4a5281da (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-04-27T14:02:11Z (GMT) No. of bitstreams: 1 TeseACMO.pdf: 3842026 bytes, checksum: 7081c677ee2f15ff2fd1eb1c4a5281da (MD5)
Approved for entry into archive by Ronildo Prado (ronisp@ufscar.br) on 2017-04-27T14:02:30Z (GMT) No. of bitstreams: 1 TeseACMO.pdf: 3842026 bytes, checksum: 7081c677ee2f15ff2fd1eb1c4a5281da (MD5)
Made available in DSpace on 2017-04-27T18:11:36Z (GMT). No. of bitstreams: 1 TeseACMO.pdf: 3842026 bytes, checksum: 7081c677ee2f15ff2fd1eb1c4a5281da (MD5) Previous issue date: 2016-12-13
Não recebi financiamento
Situation Awareness (SAW) is a cognitive process defined as the perception of elements and events within a time frame, the understanding of their situation and the projection of their status. SAW is a prerequisite for decision-making in dynamic and complex systems and errors in SAW are an acknowledged source of human errors and accidents. Its study is pivotal in many industries, such as aviation, military, oil, gas and rails, and it is being increasingly considered for maintenance, since this activity is deemed critical for every industry. New technologies to support maintenance, such as E-Maintenance, will provide easier access to the desired information to technicians, but the way new technologies lead to improved SAW is influenced by how information is presented in the User Interface (UI), and many UIs for maintenance technicians support their decision-making regarding procedural and technical criteria, but not economical, legal, ethical and political. Therefore, they only allow a partial development of the user SAW, but not the complete comprehension and projection of a situation. These UIs ignore information requirements such as: risks and conditions of the environment; automations; actions and decisions of team members; rules, regulations and policies of enterprises. Therefore, the design and development of UIs to improve SAW in maintenance is compromised by the few solutions in the state of the art for SAW supportive UI design, for model-based design process and for frameworks and reference architectures. Cognizant to this gap, this thesis proposes a solution for the design and development of Situation Awareness support User Interfaces (SASUI) for maintenance work. For that three contributions are proposed: a conceptual framework of Situation Awareness Aspects (FSA) that assists developers in structuring heterogeneous sources of data into a knowledge representation model, to obtain a state oriented view of SAW; a multiagent architecture that instantiates and controls UIs to improve their support of SAW, by using a blend of SAW and UI agents to express the situation (and its projection) of real world entities in the UI; a methodology to create Model-based SAW User Interfaces (MBSAW-UI), in which designers model agents that will assist users in acquiring the SAW necessary for their decision-making process. These contributions follow a Cognitive Engineering approach to guide software developers in the UI design process and also empower domain experts to model their UIs, enabling an End-User Development (EUD) paradigm that facilitate future updates to the system. A study case of a maintenance activity was developed to evaluate these solutions, with two interfaces: a UI designed using MBSAW-UI; a UI designed using solely a Hierarchical Task Analysis. An experiment was performed and showed a 78% increase in SAW with the UI designed to support SAW, which lead to enhanced efficacy (3,85x less errors) and safety (3,87x less errors regarding unsafe behavior).
Consciência Situacional (SAW) é um processo cognitivo definido como a percepção de elementos e eventos em um volume de tempo e espaço, o entendimento da situação atual e a projeção do seu estado futuro. SAW é um pré-requisito para a tomada de decisão em sistemas complexos e dinâmicos, e os problemas em SAW são uma fonte reconhecida de erros humanos e acidentes. O estudo de SAW não só é fundamental em muitos setores (como, por exemplo, aviação, forças armadas, óleo, gás e ferrovias), como vem sendo considerado, de forma crescente, em áreas como a manutenção, que é uma atividade crítica para todas as indústrias. Novas tecnologias para apoio a manutenção, como a E-Manutenção, vão prover melhor acesso a informações desejadas, porém a SAW de um trabalhador que lida com tecnologia está correlacionada a Interface do Usuário (IU) do sistema, e diversas IUs para manutenção apoiam a tomada de decisão considerando critérios procedurais e técnicos, mas não econômicos, legais, éticos e políticos. Portanto elas somente apoiam um desenvolvimento parcial da SAW de seu usuário, mas não a completa compreensão e projeção da situação. Estas interfaces ignoram requisitos de informação como: riscos e condições do ambiente; automações; ações e decisões de colegas de equipe; regras, regulamentos e políticas das empresas. Dessa forma, o design e desenvolvimento de IUs para aprimorar a SAW na manutenção são comprometidos pelas poucas soluções no estado da arte de design de IU para apoio a SAW, de processos de design baseado em modelos e de frameworks e arquiteturas de referência. Ciente desta lacuna, esta tese propõe uma solução para design e desenvolvimento de Interfaces do Usuário que apoiam o estabelecimento de SAW (SASUI) em trabalhos de manutenção. Três contribuições foram geradas: um framework conceitual de aspectos de SAW (FSA) que auxilia desenvolvedores a estruturar fontes de dados heterogêneas em um modelo de representação do conhecimento, para obter uma visão de SAW orientada a estado; uma arquitetura multiagente que instancia e controla IUs para aprimorar o apoio a SAW, usando uma combinação de agentes de SAW e IU que expressam a situação (e projeção) de entidades do mundo real; e, finalmente, uma metodologia para criar IUs para SAW baseada em modelos (MBSAW-UI), na qual designers modelam agentes que irão auxiliar usuários a adquirir a SAW necessária para seu processo de tomada de decisão. Estas contribuições seguem uma abordagem de Engenharia Cognitiva para guiar desenvolvedores de software no processo de design de IU e para permitir especialistas de domínio a modelar suas IUs, habilitando um paradigma de End-User Development (EUD) que facilita futuras atualizações ao sistema. Foi desenvolvido um estudo de caso de uma atividade de manutenção para avaliar as soluções propostas, usando duas interfaces: uma projetada usando a metodologia MBSAWUI; e outra usando somente análise hierárquica de tarefas. Experimentos realizados mostram que as interfaces geradas com a metodologia proposta neste trabalho proporcionaram um aumento de 78% na SAW, o que levou a uma melhor eficácia (3,85x menos erros) e segurança (3,87x menos erros relacionados a comportamentos arriscados).
APA, Harvard, Vancouver, ISO, and other styles
36

Könings, Bastian Albert Josef [Verfasser]. "User-centered awareness and control of privacy in Ubiquitous Computing / Bastian Könings." Ulm : Universität Ulm. Fakultät für Ingenieurwissenschaften und Informatik, 2015. http://d-nb.info/1073947912/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Li, Ting. "The impact of users’ awareness and self-efficacy of control options on disclosure intention in online social networks." Thesis, University of British Columbia, 2015. http://hdl.handle.net/2429/54600.

Full text
Abstract:
Online social networks (OSN) such as Facebook have changed people’s communication patterns. Along with new OSN feature development, control options in OSNs have accumulated in an unprecedented speed, yet the impact of the awareness of the abundance of control features has not been fully studied. This study addresses this research gap by proposing and validating a theoretical model that explains how awareness and two specific awareness-influencing constructs, namely perceived self-efficacy and perceived usefulness of control options, jointly affect OSN users’ personalization-enabled privacy controls and their disclosure intention in the OSN environments (e.g. posting intention). Data was collected from 297 active Facebook users through an online survey, and the research model was tested using structural equation modeling (SEM). It was found that 1) OSN users only possess a medium level of awareness of available control options; 2) the impact of awareness of control options on privacy control is fully mediated by individuals’ self-efficacy; 3) both self-efficacy and perceived usefulness of control options are positively associated with OSN users’ perceived control over their privacy; 4) function tutorial of control options alone is effective in improving OSN users’ awareness, self-efficacy and PU of the control features, while the presence of warning messages lead to no further privacy control improvement but have a mitigating impact on individuals’ disclosure intention; and 5) ‘too much’ awareness of control options will exert a negative influence on OSN users’ disclosure intention through constructs (e.g. perceived risk) other than privacy control. Theoretical and practical implications of this study are discussed at the end of the thesis.
Business, Sauder School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
38

GESSO, IADE. "Making end-users autonomous in the design of their active documents." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2013. http://hdl.handle.net/10281/41974.

Full text
Abstract:
Documents are a fundamental player in professional practices. Since the introduction of computer-based systems, an ever increasing number of organizations considered the full transition to digital documents in order to manage the exponential amount of information that they generate with their activities. However, this "imposed" transition has not been painless: usually the employees work together to reach a common goal, and during time they develop and constantly maintain some unwritten conventions with the aim to support them in performing their collaborative activities. Several field studies demonstrated that in these work settings documents are a fundamental part of these conventions, highlighting at the same time the problems that arose after the transition to a document-based system. Actually, the flexibility of paper-based documents is lost with the transitions to digital documents, since employees can not autonomously adapt both the informative content and the arrangement of their digital documents. Consequently, the limits of document-based systems hinder their acceptance among employees, with the risk of nullifying the advantages that the organization management expected with the transition to digital documents. In order to avoid this kind of problems, collaborative systems should be conceived to not force users to change their work habits, and in particular these systems should provide users with (i) a flexible support for their work practices, taking into account the existence of local and informal conventions and proactively promoting "collaboration awareness" among users, and (ii) a customizable environment that they can autonomously adapt to their actual and constantly evolving needs. These two requirements are at the basis of the work that is presented in this thesis, which focuses on document-based collaborative systems. In order to meet such requirements in the design of this kind of applications, this work puts its roots in both the Computer-Supported Cooperative Work (CSCW) and End-User Development (EUD) research fields. In particular, the aim of the presented research work is to give a contribution to the design and implementation of technologies supportive of cooperative work that allow users to autonomously tailor their document-based systems to their needs with the flexibility of paper-based documents. More specifically, tailoring activities must not only involve the flexible definition of the informative content of documents, even if this possibility does not have to be considered trivial; rather, users must be autonomous in performing those tailoring activities that allow them to customize their systems to support the local conventions of the group in which they work. Putting in the hands of users the ability to customize systems they use every day strongly contributes in making the transition from paper-based documents to digital documents less painful, with positive effects on work practices of users. Moreover, leveraging the possibility to autonomously customize systems to support local conventions, users can also be supported in the improvement of their work habits, through a collaborative learning process.
APA, Harvard, Vancouver, ISO, and other styles
39

Ikhalia, Ehinome. "A malware threat avoidance model for online social network users." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16039.

Full text
Abstract:
The main purpose of this thesis is to develop a malware threat avoidance model for users of online social networks (OSNs). To understand the research domain, a comprehensive and systematic literature review was conducted and then the research scope was established. Two design science iterations were carried out to achieve the research aim reported in this thesis. In the first iteration, the research extended the Technology Threat Avoidance Theory (TTAT) to include a unique characteristic of OSN - Mass Interpersonal Persuasion (MIP). The extended model (TTAT-MIP), focused on investigating the factors that needs to be considered in a security awareness system to motivate OSN users to avoid malware threats. Using a quantitative approach, the results of the first iteration suggests perceived severity, perceived threat, safeguard effectiveness, safeguard cost, self-efficacy and mass interpersonal persuasion should be included in a security awareness system to motivate OSN users to avoid malware threats. The second iteration was conducted to further validate TTAT-MIP through a Facebook video animation security awareness system (referred in this thesis as Social Network Criminal (SNC)). SNC is a Web-based application integrated within Facebook to provide security awareness to OSN users. To evaluate TTAT-MIP through SNC, three research techniques were adopted: lab experiments, usability study and semi-structured interviews. The results suggest that participants perceived SNC as a useful tool for malware threat avoidance. In addition, SNC had a significant effect on the malware threat avoidance capabilities of the study participants. Moreover, the thematic analysis of the semi-structured interviews demonstrated that the study participants' found SNC to be highly informative; persuasive; interpersonally persuasive; easy to use; relatable; fun to use; engaging; and easy to understand. These findings were strongly related to the constructs of TTAT-MIP. The research contributes to theory by demonstrating a novel approach to design and deploy security awareness systems in a social context. This was achieved by including users' behavioural characteristic on the online platform where malware threats occur within a security awareness system. Besides, this research shows how practitioners keen on developing systems to improve security behaviours could adopt the TTAT-MIP model for other related contexts.
APA, Harvard, Vancouver, ISO, and other styles
40

Rydefelt, Calatayud Leonor. "A holistic model to create organizational information security awareness programs – iSAP." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-48050.

Full text
Abstract:
There is a large number of information security awareness programs (iSAP) found in the literature with multiple approaches. Considering that the number of security breaches performed by insiders is as high as 48%, the effectiveness of such programs is questionable. This leaves a considerable space for external, but also internal criminals, to perform and succeed in their attacks, something that can cause heavy losses (both economical and less tangible as reputation) to organizations. This thesis decided to study some of those iSAP to see their strengths and weaknesses. After studying the approaches in focus for this thesis, and following an inductive research method, a new model to develop iSAP from a holistic point of view was presented. The solution has been aligned with subject matter experts (SME) at “Company X” and with end-users external to that company. The model is now ready to be studied empirically in organizations to evaluate its effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
41

Ball, Albert. "A Comparison of Users' Personal Information Sharing Awareness, Habits, and Practices in Social Networking Sites and E-Learning Systems." NSUWorks, 2012. http://nsuworks.nova.edu/gscis_etd/84.

Full text
Abstract:
Although reports of identity theft continue to be widely published, users continue to post an increasing amount of personal information online, especially within social networking sites (SNS) and e-learning systems (ELS). Research has suggested that many users lack awareness of the threats that risky online personal information sharing poses to their personal information. However, even among users who claim to be aware of security threats to their personal information, actual awareness of these security threats is often found to be lacking. Although attempts to raise users' awareness about the risks of sharing their personal information have become more common, it is unclear if users are unaware of the risks, or are simply unwilling or unable to protect themselves. Research has also shown that users' habits may also have an influence on their practices. However, user behavior is complex, and the relationship between habit and practices is not clear. Habit theory has been validated across many disciplines, including psychology, genetics, and economics, with very limited attention in IS. Thus, the main goal of this study was to assess the influence of users' personal information sharing awareness (PISA) on their personal information sharing habits (PISH) and personal information sharing practices (PISP), as well as to compare the three constructs between SNS and ELS. Although habit has been studied significantly in other disciplines, a limited number of research studies have been conducted regarding IS usage and habit. Therefore, this study also investigated the influence of users' PISH on their PISP within the contexts of SNS and ELS. An empirical survey instrument was developed based on prior literature to collect and analyze data relevant to these three constructs. Path analysis was conducted on the data to determine the influence of users' PISA on their PISH and PISP, as well as the influence of users' PISH on their PISP. This study also utilized ANCOVA to determine if, and to what extent, any differences may exist between users' PISA, PISH, and PISP within SNS and ELS. The survey was deployed to the student body and faculty members at a small private university in the Southeast United States; a total of 390 responses was received. Prior to final data analysis, pre-analysis data screening was performed to ensure the validity and accuracy of the collected data. Cronbach's Alpha was performed on PISA, PISH, and PISP, with all three constructs demonstrating high reliability. PISH was found to be the most significant factor evaluated in this study, as users' habits were determined to have the strongest influence on their PISP within the contexts of SNS and ELS. The main contribution of this study was to advance the understanding of users' awareness of information security threats, their personal information sharing habits, and their personal information sharing practices. Information gained from this study may help organizations in the development of better approaches to the securing of users' personal information.
APA, Harvard, Vancouver, ISO, and other styles
42

Ruhwanya, Zainab Said. "Attitudes toward, and awareness of, online privacy and security: a quantitative comparison of East Africa and U.S. internet users." Thesis, Kansas State University, 2015. http://hdl.handle.net/2097/20409.

Full text
Abstract:
Master of Science
Computing and Information Sciences
Eugene Vasserman
The increase in penetration of Internet technology throughout the world is bringing an increasing volume of user information online, and developing countries such as those of East Africa are included as contributors and consumers of this voluminous information. While we have seen concerns from other parts of the world regarding user privacy and security, very little is known of East African Internet users’ concern with their online information exposure. The aim of this study is to compare Internet user awareness and concerns regarding online privacy and security between East Africa (EA) and the United States (U.S.) and to determine any common attitudes and differences. The study followed a quantitative research approach, with the EA population sampled from the Open University of Tanzania, an open and distance-learning university in East Africa, and the U.S. population sampled from Kansas State University, a public university in the U.S. Online questionnaires were used as survey instruments. The results show no significant difference in awareness of online privacy between Internet users from East Africa and the U.S. There is however, significant difference in concerns about online privacy, which differ with the type of information shared. Moreover, the results have shown that the U.S. Internet users are more aware of online privacy concerns, and more likely to have taken measure to protect their online privacy and conceal their online presence, than the East African Internet users. This study has also shown that East Africans Internet users are more likely to be victims of online identity theft, security issues and reputation damage.
APA, Harvard, Vancouver, ISO, and other styles
43

Blair, Kevin J., Eddy R. Segura, Alex Garner, Jianchao Lai, Amy Ritterbusch, Sebastian Leon-Giraldo, Vincent Guilamo-Ramos, Jordan E. Lake, Jesse Clark, and Ian W. Holloway. "PrEP Awareness, Use, Intention to Use, and Information Source Among Geosocial Networking Application Users in Mexico in 2018–2019." Springer, 2021. http://hdl.handle.net/10757/655887.

Full text
Abstract:
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.
Pre-exposure prophylaxis (PrEP) has limited availability across Latin America, though access is increasing. We explored PrEP uptake in Mexico via an online survey completed by Spanish-speaking, Hornet geosocial networking application (GSN app) users without HIV (n = 2020). Most (81.3%) had heard of PrEP, 3.5% were current users, and 34.2% intended to take PrEP within six months. Current PrEP use was associated with PrEP eligibility (aOR 26.07 [95%CI 13.05–52.09], p < 0.001), recent STI testing (aOR 3.79 [95%CI 1.10–13.11], p = 0.035), and recent chemsex (aOR 3.02 [95%CI 1.02–8.93], p = 0.046). Recent STI testing was associated with hearing about PrEP from a doctor (aOR 3.26 [95%CI 1.98–5.36], p < 0.001), and those who lived in large cities were less likely to have learned about PrEP via Hornet (aOR 0.52 [95%CI 0.32–0.85], p = 0.009). Interventions to increase PrEP uptake in Mexico should build upon existing health networks and utilize GSN apps for PrEP information dissemination, particularly in less populated areas.
University of California
Revisión por pares
APA, Harvard, Vancouver, ISO, and other styles
44

Nilsson, Andreas. "User, Form and Confrontation : - Awareness and Attitudinal Dynamics in Observance of Unconventional Features." Thesis, Högskolan i Halmstad, Sektionen för humaniora (HUM), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15403.

Full text
Abstract:
The present work is a sample study in which the investigator asks a number of randomly selected informants[1]to evaluate a number of items and to answer questions on their take on and understanding of, unconventional language. The focus of the investigation is on the relationship between the interviewees’ understanding and recognition of unconventional language and their particular attitudes towards the same as their ability to recognise slang is compared with their respective attitudes. To fully appreciate the linguistic scope within which this exists, one must acknowledge what it is that generates an informant’s attitudes. The American linguist Penelope Eckert (2000) has in her Linguistic variation as Social Practice written something that quite well captures what it is all about. Here is what she writes: “In many cases it is easy to identity the common endeavour that assembles a community of practice (using language): a garage band, a day care cooperative, a research group, a kindergarten class. That endeavour develops a life of its own as local practices develop around it, transforming the enterprise, the activity, and knowledge. The practices that emerge as a rock’n roll band works together include such things as the choice of songs the band plays, the kind of music, a view of its place in the wider landscape of music, an attitude towards other kinds of music, the band’s “sound” and the contribution of each instrument of that sound, ways of dressing, ways of getting and choosing gigs, ways of performing and behaving on gigs, ways of developing new songs and rehearsing, ways of behaving and talking in encounters with band members and when representing the band. This practise is one that develops – it grows out of the band’s mutual engagement in being that particular band. The individual musicians, through their particular form of participation, simultaneously construct identities of participation in that band. At the same time, that process of construction, engaged in jointly by the various members of the bank, yields a band – or a (speech) community of practice – with a particular character. The character of that band in turn enters into the individual members’ interactions with people outside the band, in the members’ personae at work, at home, and at other bands’ gigs” (Eckert 2000: 35-36). The above captures what attitude ‘is’ in many ways, not merely the explicit attitudes one actively display such as clothes, personal attire or style, but it prevails the sense of what linguistic attitudes are. The use of language, ergo speaking, is what generates our attitudes, or rather linguistic attitudes are maintained and constructed in line with how we like to be perceived, thus what language we wish to use. This is what the present study aims to unfold – what command of unconventional features would a user of language have and what does the informants’ attitudes toward language of this nature look reveal. [1]This is not to say perfectly ‘randomly selected’ but more in the sense that the study is not set against a particular group but rather the contrary, no particular group at all. This is in order to, to the point it is possible, enable the informants to form a model of a general cut of speakers in a society. This should preferably then include people from all segments of a society, as well socially, economically as ethnically. The informants in this kind of segment should further be naturally distributed on the age scale.
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, XiaoTong. "Privacy exposure on WeChat from users' perspective : A study among the university students in China." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-80610.

Full text
Abstract:
In 21st century, social media has become one necessary part in people’s life, different kinds of social media emerge in endlessly. In younger generation, it is popular to use social media as a communication tool to get closer to each other. During using social media, it is important to have awareness to protect their personal information. Comparing with Western countries, the topic of privacy is not often discussed in China and some privacy issues might be ignored due to people have not enough knowledge in this area. In this study, the focus is to investigate Chinese university students’ perception of privacy risks and WeChat personal information exposure. Based on this, this study also explores the users’ attitudes toward WeChat and how it influences the future usage of it. The adopted research method is qualitative research method, by doing interviews with 15 students from different school, city and major. From the study, eight essential concepts are used to answer two research questions. Though analysis, the situation of the privacy perception can be found, the reasons and attitudes toward WeChat are also figured out. At the end of the thesis, the contribution of this study and suggestions to future research are shown.
APA, Harvard, Vancouver, ISO, and other styles
46

Eklöf, Sophi, and Therese Hellberg. "Strengthening the relationship between librarians and library users : A study of librarians’ and library users’ views on librarianship, services and resources at the Library of National University of Rwanda." Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-19522.

Full text
Abstract:
In this thesis we aim to study the librarians’ and library users’ views on librarianship and the library at National University of Rwanda. Accordingly, we have gathered information from these groups. The information is based on qualitative interviews as well as observations and participation in a work group for library promotion. The latter made it possible to investigate how respondents consider these issues and how librarians’ self image is expressed in their daily work and in promotion. We analyze the most important frame factors that impede on librarians’ self image and library users’ perception of library services. This makes it possible to understand what probably affects the actual situation at NUR’s library. Marked impeding frame factors established are for example the economy and the organization. Information provided through this thesis could to be shared among library personnel and used as a base for their further development of library services. Our thesis points out library users’ opinions about the library in general as well as the areas that are most critical to improve. These areas are service at the circulation desk, acquisitions and courses in how to retrieve information. It also points out the need for a more explicit professional librarian identity and that the librarians need to work more as knowledge librarians. An explicit identity would imply unified library personnel that would make it possible to work towards common goals and clarify how to conduct daily work.
APA, Harvard, Vancouver, ISO, and other styles
47

Sandor, Ovidiu. "Social Awareness Support for Cooperation : Design Experience and Theoretical Models." Doctoral thesis, KTH, Människa-datorinteraktion, MDI, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24482.

Full text
Abstract:
This thesis addresses the research question of how social awareness support in computer systems for groups and communities can be designed in a successful way. While the field of human-computer interaction has been working with similar questions for more than 20 years, many aspects of people’s cooperation and the way those should be considered in system design still need further consideration and research. The thesis presents a number of projects where systems for cooperation have been designed for different settings and different kinds of use with a particular interest in social awareness. Drawing from the experiences of the different projects, design sensitivities around awareness, as a central prerequisite for collaboration, are suggested. Another contribution of the thesis is the presentation of a theoretical model for awareness, called Aether, introduced by us a number of years ago. We will discuss the theoretical implications of the model as well as a number of applications of it based on our own work as well as based on the work of other researchers who used Aether, by this providing confirmation of our model. Based on the findings around awareness, the thesis argues for a ‘translucent’ approach to the issue of socio-technical balance that one has to consider in the design process. Instead of trying to understand and model human behaviour or the social organization of cooperation, in order to ‘code’ them into the computer system, this approach advocates for systems that mediate information in a ‘translucent’ way so that people can retain the control of the organization of cooperation in their given context. By using a ‘reflective practitioner’ approach, the thesis discusses how people-centred methods have been used throughout these projects and looks into how awareness could be considered by using these methods. The focus of this investigation is twofold: on one hand to understand how the used methods have influenced our discussion about awareness and on the other hand it aims to address the practitioners of the field by questioning some of the common beliefs in the field. By investigating social awareness support in collaborative systems, the thesis contributes to theoretical arguments in the field of humancomputer interaction, and the area of CSCW in particular, while at the same time it provides the interaction design practitioner with a number of considerations for practical use.
QC 20100913
APA, Harvard, Vancouver, ISO, and other styles
48

Eskandari, Naddaf Neda. "Observability based techniques to analyze and design user-interfaces : situation-awareness and displayed information." Thesis, University of British Columbia, 2015. http://hdl.handle.net/2429/54721.

Full text
Abstract:
For continuous-time LTI systems under human control and under shared control, this thesis studies techniques to determine whether or not a given user-interface provides the information required to accomplish a certain task. It is well known that attaining Situation Awareness (SA) is essential to the safe operation of the systems involving human-automation interaction. Hence, through two different approaches, the work in this thesis evaluates and designs user-interfaces based on the satisfaction of SA requirements by the user. In the first approach, observability-based conditions under which a user-interface provides the user with adequate information to accomplish a given task are identified. The user is considered to be a special type of observer, with capabilities corresponding to different levels of knowledge regarding the input and output derivatives. Through this approach, the ``user-observable/user-predictable'' subspaces for systems under shared control are defined and formulated. In addition, state estimation is considered to incorporate a processing delay. Hence, the ``delay-incorporating user-observable/user-predictable'' subspaces are formulated and are compared with the space spanned by the combination of the states which create the task. If the task subspace does not lie in the relevant space, then the user-interface is incorrect, meaning that the user cannot accomplish the desired task with the given user-interface. In the second approach, to determine the required information to be displayed, a model of attaining SA for the users is proposed. In this model, the user is modeled as an extended delayed functional estimator. Then, the information needed for such an estimator to make correct estimations as well as the desired expansion of the functional of the states to let the user precisely reconstruct and accurately predict the desired task is determined. Additionally, it is considered that in practice, to attain the situation awareness, the estimation of the task states does not necessarily need to be precise but can be bounded within certain margins. Hence, the model of the user attaining SA is also modified as a ``bounded-error delayed functional observation/prediction''. Such an observer/predictor has to exist for a system with a given user-interface, otherwise, the safety of the operation may be compromised.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
49

Prather, James. "Beyond Automated Assessment: Building Metacognitive Awareness in Novice Programmers in CS1." Diss., NSUWorks, 2018. https://nsuworks.nova.edu/gscis_etd/1030.

Full text
Abstract:
The primary task of learning to program in introductory computer science courses (CS1) cognitively overloads novices and must be better supported. Several recent studies have attempted to address this problem by understanding the role of metacognitive awareness in novices learning programming. These studies have focused on teaching metacognitive awareness to students by helping them understand the six stages of learning so students can know where they are in the problem-solving process, but these approaches are not scalable. One way to address scalability is to implement features in an automated assessment tool (AAT) that build metacognitive awareness in novice programmers. Currently, AATs that provide feedback messages to students can be said to implement the fifth and sixth learning stages integral to metacognitive awareness: implement solution (compilation) and evaluate implemented solution (test cases). The computer science education (CSed) community is actively engaged in research on the efficacy of compile error messages (CEMs) and how best to enhance them to maximize student learning and it is currently heavily disputed whether or not enhanced compile error messages (ECEMs) in AATs actually improve student learning. The discussion on the effectiveness of ECEMs in AATs remains focused on only one learning stage critical to metacognitive awareness in novices: implement solution. This research carries out an ethnomethodologically-informed study of CS1 students via think-aloud studies and interviews in order to propose a framework for designing an AAT that builds metacognitive awareness by supporting novices through all six stages of learning. The results of this study provide two important contributions. The first is the confirmation that ECEMs that are designed from a human-factors approach are more helpful for students than standard compiler error messages. The second important contribution is that the results from the observations and post-assessment interviews revealed the difficulties novice programmers often face to developing metacognitive awareness when using an AAT. Understanding these barriers revealed concrete ways to help novice programmers through all six stages of the problem-solving process. This was presented above as a framework of features, which when implemented properly, provides a scalable way to implicitly produce metacognitive awareness in novice programmers.
APA, Harvard, Vancouver, ISO, and other styles
50

Grant, Lionel DeShaun. "Recreational Water Users, Aquatic Invasive Species and Fish Disease: Examining the Usage of Tailored Messaging to Increase Environmental Responsible Behaviors." OpenSIUC, 2012. https://opensiuc.lib.siu.edu/theses/893.

Full text
Abstract:
The purpose of this study was to discover how to efficiently use tailored messaging to increase recreational water users' behavioral intentions to perform specific behaviors that prevent the spread of Aquatic Invasive Species (AIS) and Viral Hemorrhagic Septicemia (VHS). The objectives were to identify the most effective message structure and message order for signs targeting seven behaviors that reduce the spread of AIS and VHS, and to examine the moderating effect of AIS and VHS knowledge and awareness on behavioral intentions. The population of this study consisted of students 31 years of age and younger attending Southern Illinois University Carbondale (μ = 21.06; n = 680). The study design tested messages according to the Optimal Arousal Theory. The respondents completed an 11-item questionnaire that measured knowledge, awareness, and behavioral intentions, and included one of 34 sign treatments. When asked how knowledgeable respondents were about AIS and VHS, 48% of respondents indicated that they were not knowledgeable. Respondents were also asked the extent to which they believed AIS is a problem in Illinois; 43% reported AIS to be a "moderate" problem. Seven (7) items on the questionnaire measured intention to perform specific behaviors that may reduce the spread of AIS and fish disease between water bodies. Knowledge and awareness (only when interacting with knowledge) were found to be covariates of behavioral intentions. Complex results were revealed regarding the most effective tailored message, as no one sign significantly increased all seven behavioral intentions and the number of treatments significantly increasing behavioral intentions varied by behavior (i.e., 11 treatments had a significant influence on the behavioral intention for "visual inspections;" 4 treatments had a significant influence on the behavioral intention for "drain water;" 8 treatments had a significant influence on the behavioral intention for "avoid bait release;" 6 treatments had a significant influence on the behavioral intention for "remove plants and animals;" 4 treatments had a significant influence on the behavioral intention for "flush motor;" and, 11 treatments had a significant influence on the behavioral intention for "rinse boat". Results suggest mainly positively phrased messages works best when trying to stimulate environmentally responsible behavior (ERB). The recommendations from this study encourage strategic use of communication to enhance natural resource management as this study yielded gains in predicted behaviors of respondents to reduce the spread of AIS and VHS. The study also demonstrates the need to increase recreational water users' AIS and VHS knowledge improve the likelihood that they will perform desired behaviors.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography