Dissertations / Theses on the topic 'Users’ behaviors'

To see the other types of publications on this topic, follow the link: Users’ behaviors.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Users’ behaviors.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Noe, Heeju. "Fashion Renting: An Exploratory Study of Users and Non-users Behaviors." Kent State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1628301642984733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Blount, Charles Lenward. "Users' privacy and security behaviors on mobile devices." Thesis, University of Maryland, Baltimore County, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571723.

Full text
Abstract:

Preferences and behaviors for privacy management with mobile applications are difficult to capture. Previous measures are mostly based on self-report data, which often does not accurately predict actual user behavior. A deeper understanding was sought, gleaned from observing actual practices. This thesis analyzes 11,777 applications from the Google Play marketplace in order to determine the impact of privacy settings on purchase behavior. This was done by looking at the effect of the number of privacy concessions as well as the effect of individual concessions and category on number of downloads. It was found that users of paid applications do not have a preference for fewer privacy concessions. This study further reinforces the disconnect between the user's often stated preference for privacy and their actual behavior -- a discrepancy known as the “privacy paradox ”. Theoretical and practical implications are discussed.

APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Jesse Han-Leng. "Identifying users' information needs: A case of SIDC library." School of Communication & Information, Nanyang Technological University, 2006. http://hdl.handle.net/10150/105258.

Full text
Abstract:
The Securities Industry Development Centre (SIDC) is the education and training arm of the Securities Commission (SC), and the SIDC Library serves both SC staff and the securities industry. The SIDC Library is a specialised library that has its resources focused on the capital market. Identifying usersâ information needs is a first step towards analysing the information needs of SIDC Library members and the SC staff. The study was motivated by the fact that an analysis of information needs help identify the SIDC Library resources for further development to ensure the delivery of information services matches usersâ needs. In this paper, we would like to share a study that was conducted to analyse how the SIDC Library services were tailored to meet the information needs of users. By studying this aspect, we will be able to see how the library defines and classifies its user types, and addresses issues impacting information services through proper operation planning and practices. The respondents for this paper were mainly SIDC Library members and SC staff. The result of the study is based on a collection of survey questionnaires, personal interviews and records of user requests for documents. From this study, a profile of user information needs was established; enabling the library management to identify, support and provide an efficient delivery mechanism for meeting usersâ information needs. This study helped SIDC librarians identify the kind of information that was needed and generated, and to support those which are not readily available by further developing a comprehensive new subject/collection of SIDC Library information resources. This will also provide an insight into the users' expectations on content resources and services of the SIDC Library, as well as for developing library user education programmes. Thus, the study of usersâ information needs is one tool that enables SIDC Librarians to discover, evaluate, implement, maintain and improve its management of information resources.
APA, Harvard, Vancouver, ISO, and other styles
4

McMillan, Tyson DeShaun. "Web Information Behaviors of Users Interacting with a Metadata Navigator." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407784/.

Full text
Abstract:
The web information behaviors of users as they interacted with a metadata navigator, the Personal Information (PI) Agent, and reflected upon their interaction experiences were studied. The process included studying the complete iterative (repeated) cycle of information needs, information seeking, and information use of users interacting with an internet-based prototype metadata PI Agent tool. Detlor’s theory of web information behaviors of organizational users was utilized as a theoretical foundation for studying human-information interactions via the PI Agent tool. The qualitative research design allowed for the use of triangulation within the context of a one-group pretest-posttest design. Triangulation occurred in three phases: (a) observe, (b) collect, and (c) reflect. Observations were made as participants solved three problem situations. Participants’ computer log and print screen data were collected, and follow-up interviews were conducted once all posttest sessions ended to enable users to reflect on their experiences. The three triangulation phases ensured saturation of data and greater depth regarding the participants’ information behaviors. Content analysis occurred via exploratory pattern analysis using the posttest Problem Steps Recorder (PSR) log data and on the six interviewees’ follow-up interview data. Users engaged in iterative cycles of information needs, information seeking, and information use to resolve the presented problem situations. The participants utilized the PI Agent tool iteratively to eliminate their knowledge gaps regarding the presented problem situations. This study was the first to use PSR log data for capturing evidence of the iterative search process as defined by Detlor. The implications for best practices were inspired by participant feedback, and recommendations for further study are made.
APA, Harvard, Vancouver, ISO, and other styles
5

Xiao, Guang Yi. "Personalized scheduling search advertisement by mining the history behaviors of users." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2119532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hashem, Yassir. "Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc1248460/.

Full text
Abstract:
Insider threat is one of the greatest concerns for information security that could cause more significant financial losses and damages than any other attack. However, implementing an efficient detection system is a very challenging task. It has long been recognized that solutions to insider threats are mainly user-centric and several psychological and psychosocial models have been proposed. A user's psychophysiological behavior measures can provide an excellent source of information for detecting user's malicious behaviors and mitigating insider threats. In this dissertation, we propose a multi-modal framework based on the user's psychophysiological measures and computer-based behaviors to distinguish between a user's behaviors during regular activities versus malicious activities. We utilize several psychophysiological measures such as electroencephalogram (EEG), electrocardiogram (ECG), and eye movement and pupil behaviors along with the computer-based behaviors such as the mouse movement dynamics, and keystrokes dynamics to build our framework for detecting malicious insiders. We conduct human subject experiments to capture the psychophysiological measures and the computer-based behaviors for a group of participants while performing several computer-based activities in different scenarios. We analyze the behavioral measures, extract useful features, and evaluate their capability in detecting insider threats. We investigate each measure separately, then we use data fusion techniques to build two modules and a comprehensive multi-modal framework. The first module combines the synchronized EEG and ECG psychophysiological measures, and the second module combines the eye movement and pupil behaviors with the computer-based behaviors to detect the malicious insiders. The multi-modal framework utilizes all the measures and behaviors in one model to achieve better detection accuracy. Our findings demonstrate that psychophysiological measures can reveal valuable knowledge about a user's malicious intent and can be used as an effective indicator in designing insider threat monitoring and detection frameworks. Our work lays out the necessary foundation to establish a new generation of insider threat detection and mitigation mechanisms that are based on a user's involuntary behaviors, such as psychophysiological measures, and learn from the real-time data to determine whether a user is malicious.
APA, Harvard, Vancouver, ISO, and other styles
7

White, Mel. "Information Seeking Behaviors in a Population of Assistive Mobility Device Users." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc799517/.

Full text
Abstract:
The author explores the current state of information exchange and access in the procurement process for mobility assistive equipment. While the idealized model is of a linear process starting with a need and ending with the purchase, in practice the procedures for acquiring a device such as a wheelchair or electric scooter can be a time consuming task that involves client, family, medical care specialists, vendors, manufacturers, insurance companies and possibly alternate sources of funding. This study utilized Participatory Action Research (PAR) to collect both qualitative and quantitative data about information sources such as the Internet, the medical community, and vendors. The findings of this study suggest that in spite of the presence of the Internet, overall primary sources are similar to the traditional model and that for most there is no one source that could be easily accessed for information. A brief examination is made of the “Information landscape” utilized in the process and a brief discussion of two relatively unmentioned information sources: expos and the wheelchair sports community.
APA, Harvard, Vancouver, ISO, and other styles
8

Seymour, Zakiya Ayo-Zahra. "Understanding what sanitation users value - examining preferences and behaviors for sanitation systems." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/52168.

Full text
Abstract:
Over the last two decades, sanitation policy and development has undergone a paradigm shift away from heavily-subsidized, supply-driven approaches towards behavioral-based demand-driven approaches. These current approaches to increase sanitation demand are multi-faceted, requiring multiple stakeholders with varying degrees of interest, knowledge, and capacity. Although efforts exist to increase sanitation access by incorporating engineering design principles with implementation planning approaches, these groups generally work independently without strong connections, thus reducing the potential of their impact. As a result, the design of appropriate sanitation technology is disengaged from the implementation of acceptable technology into communities, disconnecting user preference integration from sanitation technology design and resulting in fewer sanitation technologies being adopted and used. To address these challenges in developing successful interventions, this research examined how user preferences for specific attributes of appropriate sanitation technologies and their respective implementation arrangements influence their adoption and usage. Data for the study included interviews of 1002 sanitation users living in a peri-urban area of South Africa; the surveyed respondents were asked about their existing sanitation technology, their preferences for various sanitation technology design attributes, as well as their perspectives on current and preferred sanitation implementation arrangements. The data revealed that user acceptability of appropriate sanitation technology is influenced by the adoption classification of the users. Through the identification of motives and barriers to sanitation usage that were statistically significant, it exhibited the need to differentiate users who share private sanitation from those use communal sanitation facilities. Results also indicated that user acceptability of appropriate sanitation systems is dependent on the technical design attributes of sanitation. The development of utility functions detailed the significance of seven technical design attributes and determined their respective priorities. An agent-based simulation examined how user preferences for sanitation technology design and implementation influence its adoption and usage. Findings suggest that user acceptability of sanitation technology is dependent on both the technology design and the implementation arrangement being preferred.
APA, Harvard, Vancouver, ISO, and other styles
9

Hashem, Yassir. "A Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1248460/.

Full text
Abstract:
Insider threat is one of the greatest concerns for information security that could cause more significant financial losses and damages than any other attack. However, implementing an efficient detection system is a very challenging task. It has long been recognized that solutions to insider threats are mainly user-centric and several psychological and psychosocial models have been proposed. A user's psychophysiological behavior measures can provide an excellent source of information for detecting user's malicious behaviors and mitigating insider threats. In this dissertation, we propose a multi-modal framework based on the user's psychophysiological measures and computer-based behaviors to distinguish between a user's behaviors during regular activities versus malicious activities. We utilize several psychophysiological measures such as electroencephalogram (EEG), electrocardiogram (ECG), and eye movement and pupil behaviors along with the computer-based behaviors such as the mouse movement dynamics, and keystrokes dynamics to build our framework for detecting malicious insiders. We conduct human subject experiments to capture the psychophysiological measures and the computer-based behaviors for a group of participants while performing several computer-based activities in different scenarios. We analyze the behavioral measures, extract useful features, and evaluate their capability in detecting insider threats. We investigate each measure separately, then we use data fusion techniques to build two modules and a comprehensive multi-modal framework. The first module combines the synchronized EEG and ECG psychophysiological measures, and the second module combines the eye movement and pupil behaviors with the computer-based behaviors to detect the malicious insiders. The multi-modal framework utilizes all the measures and behaviors in one model to achieve better detection accuracy. Our findings demonstrate that psychophysiological measures can reveal valuable knowledge about a user's malicious intent and can be used as an effective indicator in designing insider threat monitoring and detection frameworks. Our work lays out the necessary foundation to establish a new generation of insider threat detection and mitigation mechanisms that are based on a user's involuntary behaviors, such as psychophysiological measures, and learn from the real-time data to determine whether a user is malicious.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhang, Guili. "HIV infection and risk behaviors among methamphetamine-dependent drug users in northern California /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2005. http://uclibs.org/PID/11984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Wood, Michele Marie. "Elaborating the relationship between age and HIV risk behaviors among illicit drug users." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1581646911&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wu, Justin Chun. "Peering Through the Cloud—Investigating the Perceptions and Behaviors of Cloud Storage Users." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6175.

Full text
Abstract:
We present the results of a survey and interviews focused on user perceptions and behaviors with respect to cloud storage services. In particular, we study behaviors such as which services are used, what types of data are stored, and how collaboration and sharing are performed. We also investigate user attitudes toward cloud storage on topics such as payment, privacy, security, and robustness. We find that users are drawn to cloud storage because it enables robust, ubiquitous access to their files, as well as enabling sharing and collaborative efforts. However, users' preferred medium for file sharing continues to be email, due to its ubiquity and role as "lowest common denominator." Privacy and security are of great concern to users, and though users vocally describe feeling "safe" on the cloud, this is because they actively filter the content they store in cloud services. Payment is a sensitive issue, with users exhibiting a strong aversion to any form of direct payment, preferring even disliked alternative funding mechanisms such as targeted advertising. Finally, the cloud serves as an important backup location for users, although space limitations prevent them from using it as a full backup solution.
APA, Harvard, Vancouver, ISO, and other styles
13

Ahuama-Jonas, Chizara. "Trauma, PTSD, and HIV Risk among African-American Women Substance Users." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1515508139231446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Reyes-Ortiz, Victor Emanuel. "Social Network Correlates of HCV and HIV Transmission Risk Behaviors among Injecting Drug Users." Thesis, Walden University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3742821.

Full text
Abstract:

Drug injection is an increasingly important risk factor in the transmission of blood-borne pathogens, including the hepatitis C virus (HCV) and human immunodeficiency virus (HIV). The purpose of the study was to examine the influence of social network factors on HCV and HIV. The study was grounded in social network theory and sought to determine whether social network characteristics affect high-risk sexual and drug injection behavior as well as self-reported HIV and HCV status. The study design was a quantitative cross-sectional survey. A total of 181 participants in a needle exchange program completed a survey in Spanish assessing individual drug and sex risk practices as well as gathering information to describe the characteristics of participants’ personal networks from an egocentric perspective. General estimating equation techniques were used to analyze the data. Results showed that only social network size was related to risky sexual behavior. Injecting risk behaviors were only impacted by personal network exposures, measured by the average number of years network members had injected. HIV self-reported serum status was correlated with trust, closeness, and number of family members named among the closest 5 network members. Last, HCV self-reported serum status was only related to the years that network members had been injecting drugs. This study has implications for positive social change in that public health practitioners may gain a better understanding of the social network characteristics associated with high-risk behaviors of those infected with HCV and HIV in order to develop health promotion programs to lower infections and mortality.

APA, Harvard, Vancouver, ISO, and other styles
15

Edwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.

Full text
Abstract:
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the incentive to take security awareness training on their own. Research in security awareness and security behavior has produced conflicting results. Therefore, it is not clear, how security aware home computer users are or to what extent security awareness affects the security behavior of home computer users. The goal of this study was to determine if there is a relationship between security awareness and users practicing good security behavior. This study adapted its research model from the health belief model (HBM), which accesses a patient’s decision to perform health related activities. The research model included the HBM constructs of perceived severity, perceived susceptibility, perceived threat, perceived benefits, perceived barriers, cues to action, and self-efficacy. The research model also contained the security awareness (SA) and concern for information privacy (CFIP) constructs. The model used SA to ascertain the effect of security awareness on a person’s self-efficacy in information security (SEIS), perceived threat, CFIP, and security behavior. The research model included CFIP to ascertain its effect on security behavior. The developed survey measured the participants' security awareness, concern for information privacy, self-efficacy, expectations of security actions, perceived security threats, cues to action, and security behavior. SurveyMonkey administered the survey. SurveyMonkey randomly selected 267 participants from its 30 million-member base. The findings of this study indicate home computer users are security aware. SA does not have a direct effect on a user’s security behavior, perceived threat, or CFIP. However, it does have influence on SEIS. SEIS has a weak effect on expectations. CFIP has an effect on a user’s security behavior after removing perceived threat from the research model. Perceived susceptibility has a direct effect on a user’s security behavior, but perceived severity or perceived threat does not.
APA, Harvard, Vancouver, ISO, and other styles
16

Simpson, Joseph P. "Empirical Analysis of Socio-Cognitive Factors Affecting Security Behaviors and Practices of Smartphone Users." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/951.

Full text
Abstract:
The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence of organizational proprietary information and sensitive customer information. In addition to users being the greatest risk to IS security, several studies have shown that many people do not implement even the most basic security countermeasures on their smartphones. The lack of security countermeasures implementation, risky user behavior, and the amount of sensitive information stored and transmitted on smartphones is becoming an ever-increasing problem. A literature review revealed a significant gap in literature pertaining to smartphone security. This study identified six socio-cognitive factors from the domain of traditional computer security which have shown to have an impact on user security behaviors and practices. The six factors this study identified and analyzed are mobile information security self-efficacy, institutional trust, party trust, and awareness of smartphone risks, threats, and vulnerabilities and their influence on smartphone security practices and behaviors. The analysis done in this research was confirmatory factor analysis (CFA) – structural equation modeling (SEM). The goal of this study was to cross-validate previously validated factors within the context of traditional computer security and assess their applicability in the context of smartphone security. Additionally, this study assessed the influential significance of these factors on the security behaviors and practices of smartphone users. This study used a Web-based survey and was distributed to approximately 539 users through Facebook® and LinkedIn® social media outlets which resulted in 275 responses for a 51% response rate. After pre-analysis data screening was completed, there were a total of 19 responses that had to be eliminated due to unengaged responses and outliers leaving 256 responses left to analyze. The results of the analysis found that vulnerability awareness, threat awareness, and risk awareness are interrelated to one another which all in turn had significance in predicting self-efficacy, security practices, and behaviors. This intricate relationship revealed in this study indicates that a user has to have an increased awareness in all three categories of awareness before they can fully understand how to protect themselves. Having an increased awareness in one category does not impact the overall security posture of the user and that risk, threat, and vulnerability awareness all work together. Another interesting find was that as risk awareness increased the less the smartphone users protected themselves. This finding warrants additional research to investigate why the user is more averse to risk, and willing to accept the risk, despite their increased awareness. Finally, institutional trust and party trust was found not to have any significance on any of the factors. These findings should give smartphone users and organizations insight into specific areas to focus on in minimizing inappropriate security behaviors and practices of smartphone users. More specifically, users and organizations need to focus on educating users on all three factors of threats, risks, and vulnerabilities in order for there to have any impact on increasing self-efficacy and reducing inappropriate security behaviors and practices.
APA, Harvard, Vancouver, ISO, and other styles
17

Christensen, Desire Kay. "Characteristics of sunless tanning product users among sorority and fraternity students." Thesis, University of Iowa, 2011. https://ir.uiowa.edu/etd/937.

Full text
Abstract:
As skin cancer rates increase, it has become more important for at risk individuals to reduce ultraviolet radiation (UVR) exposure. Limited information is available on characteristics and behaviors of sunless tanning product users in populations with high sun-seeking behaviors. This information is important because use of sunless tanning products could reduce tanning through UVR exposure thereby leading to a reduction in skin cancer. Sorority and fraternity students (n=163) completed a self-administered questionnaire examining sun exposure and tanning attitudes, behaviors and beliefs. Characteristics of sunless tanning product users were compared to non-users using logistic regression accounting for potential clustering effects within sororities and fraternities. Among students surveyed, 34% reported ever using sunless tanning products. Ever users of sunless tanning products were significantly more likely to be female (OR=7.5), have fair skin (OR=1.4), have used tanning beds greater than 50 times (OR=2.5), and reapply sunscreen when outside on a sunny day (OR=1.3). Ever users of sunless tanning products and those with a preference for these products because they are safer than tanning beds or sunbathing were more likely to reapply sunscreen on a sunny day in the summer. However, other sun protection behaviors (i.e. sunscreen use, amount of sunscreen used, and avoidance of midday sun while on spring break) were not more likely to be adopted by these students. Prevention efforts could target these fair-skinned females to increase their use of sunless tanning products in combination with sunscreen use and reapplication along with avoidance of midday sun.
APA, Harvard, Vancouver, ISO, and other styles
18

Salinero, Sandra C. Pollock. "Understanding the technology usage and acceptance behaviors of healthcare information technology users| A comparative cross-case analysis." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10179208.

Full text
Abstract:

User acceptance and usage of technology is an established field of academic inquiry with distinct applications to health information technology adoption. Healthcare systems lag behind in technological advancements related to information systems. The recent push toward health information exchange (HIE) systems to enable the sharing of electronic medical records (EMR) between healthcare organizations has many working to upgrade to the latest EMR system technology. Healthcare organizations strive to lower costs, improve patient care, streamline processes, and meet regulatory requirements. Leading EMR systems promise the realization of attaining these goals. User acceptance and usage of technology is a challenge when implementing new technology. In more recent years, a growing need appeared to study user acceptance and usage behavior in healthcare organizations. The central question of this study is: What deeper understanding can be developed when evaluating the similarities and differences of healthcare and business users’ experiences and behaviors through the lens of the unified theory of acceptance and usage of technology (UTAUT)? A subset of related research questions focuses on factors influencing users’ acceptance and usage, similarities and differences among healthcare users, and similarities and differences between healthcare and non-healthcare users. This study explores participants’ experiences using a comparative cross-case approach applying the theoretical framework of the UTUAT by Venkatesh, Morris, Davis, and Davis (2003). Twenty-one participants were interviewed to ascertain their lived experiences of learning and using computer systems. Areas of inquiry included new system implementations; the importance of factors in the UTAUT model such as effort expectancy, facilitating conditions, performance expectancy, and social influence; and the impact of these on users’ experiences. The majority indicated sub-elements of facilitating conditions and effort expectancy as critical factors. Training is dominant among the majority of cases, while ease to learn and use, process alignment, and time are interwoven with training and usage experiences. Social influence and voluntariness of use were seldom observed, with shared experiences being circumstantial and situational. The success of EMR systems hinges on how the foundational system is built, which involves understanding detailed clinical and business processes, and ensuring the new system is built on forward-thinking practices.

APA, Harvard, Vancouver, ISO, and other styles
19

Do, Viet Dung Aphichat Chamratrithirong. "The relationship between risk behaviors and HIV infection among male injecting drug users in Son La province, Vietnam /." Abstract, 2007. http://mulinet3.li.mahidol.ac.th/thesis/2550/cd404/4938541.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Grant, Lionel DeShaun. "Recreational Water Users, Aquatic Invasive Species and Fish Disease: Examining the Usage of Tailored Messaging to Increase Environmental Responsible Behaviors." OpenSIUC, 2012. https://opensiuc.lib.siu.edu/theses/893.

Full text
Abstract:
The purpose of this study was to discover how to efficiently use tailored messaging to increase recreational water users' behavioral intentions to perform specific behaviors that prevent the spread of Aquatic Invasive Species (AIS) and Viral Hemorrhagic Septicemia (VHS). The objectives were to identify the most effective message structure and message order for signs targeting seven behaviors that reduce the spread of AIS and VHS, and to examine the moderating effect of AIS and VHS knowledge and awareness on behavioral intentions. The population of this study consisted of students 31 years of age and younger attending Southern Illinois University Carbondale (μ = 21.06; n = 680). The study design tested messages according to the Optimal Arousal Theory. The respondents completed an 11-item questionnaire that measured knowledge, awareness, and behavioral intentions, and included one of 34 sign treatments. When asked how knowledgeable respondents were about AIS and VHS, 48% of respondents indicated that they were not knowledgeable. Respondents were also asked the extent to which they believed AIS is a problem in Illinois; 43% reported AIS to be a "moderate" problem. Seven (7) items on the questionnaire measured intention to perform specific behaviors that may reduce the spread of AIS and fish disease between water bodies. Knowledge and awareness (only when interacting with knowledge) were found to be covariates of behavioral intentions. Complex results were revealed regarding the most effective tailored message, as no one sign significantly increased all seven behavioral intentions and the number of treatments significantly increasing behavioral intentions varied by behavior (i.e., 11 treatments had a significant influence on the behavioral intention for "visual inspections;" 4 treatments had a significant influence on the behavioral intention for "drain water;" 8 treatments had a significant influence on the behavioral intention for "avoid bait release;" 6 treatments had a significant influence on the behavioral intention for "remove plants and animals;" 4 treatments had a significant influence on the behavioral intention for "flush motor;" and, 11 treatments had a significant influence on the behavioral intention for "rinse boat". Results suggest mainly positively phrased messages works best when trying to stimulate environmentally responsible behavior (ERB). The recommendations from this study encourage strategic use of communication to enhance natural resource management as this study yielded gains in predicted behaviors of respondents to reduce the spread of AIS and VHS. The study also demonstrates the need to increase recreational water users' AIS and VHS knowledge improve the likelihood that they will perform desired behaviors.
APA, Harvard, Vancouver, ISO, and other styles
21

Cheng, Wei-Woon Susan. "Sociodemographic and drug use characteristics, sex behaviors, and motivations for drug use among HIV-seronegative, heterosexual, methamphetamine users in San Diego, CA." Diss., [La Jolla, Calif.] : [San Diego] : University of California, San Diego ; San Diego State University, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p3355791.

Full text
Abstract:
Thesis (Ph. D.)--University of California, San Diego, and San Diego State University, 2009.
Title from first page of PDF file (viewed June 25, 2009). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
22

Ashouri, Rad Armin. "Three Essays on Dynamics of Online Communities." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71641.

Full text
Abstract:
Essay #1: Reconstructing Online Behavior through Effort Minimization Data from online interactions increasingly informs our understanding of fundamental patterns of human behavior as well as commercial and social enterprises. However, this data is often limited to traces of users' interactions with digital objects (e.g. votes, likes, shares) and does not include potentially relevant data on what people actually observe online. Estimating what users see could therefore enhance understanding and prediction in a variety of problems. We propose a method to reconstruct online behavior based on data available in many practical settings. The method infers a user's most likely browsing trajectory assuming that people minimize effort exertion in online browsing. We apply this method to data from a social news website to distinguish between items not observed by a user and those observed but not liked. This distinction allows us to obtain significant improvements in prediction and inference in comparison with multiple alternatives across a collaborative filtering and a regression validation problem. Essay #2: Measuring Individual differences: A Big Data Approach The amount of behavioral and attitudinal data we generate every day has grown significantly. This era of Big Data has enormous potential to help psychologists and social scientists understand human behavior. Online interactions may not always signify a deep illustration of individuals' beliefs, yet large-scale data on individuals interacting with a variety of contents on specific topics can approximate individuals' attitudes toward those topics. We propose a novel automated method to measure individuals' attitudes empirically and implicitly using their digital footprints on social media platforms. The method evaluates content orientation and individuals' attitudes on dimensions (i.e. subjects) to explain individual-content ratings in social media, optimizing a pre-defined cost function. By applying this method to data from a social news website, we observed a significant test-retest correlation and substantial agreement in inter-rater reliability testing. Essay #3: Social Media and User Activity: An Opinion-Based Study An increasing fraction of social communications is conducted online, where physical constraints no longer structure interactions. This has significantly widened the circle of people with whom one can interact and has increased exposure to diverse opinions. Yet individuals may act and respond differently when faced with opinions far removed from their own, and in an online community such actions could activate important mechanisms in the system that form the future of the outlet. Studying such mechanisms can help us understand the social behaviors of communities in general and individuals in particular. It can also assist social media outlets with their platform design. We propose models that capture the changes in individuals' activities in social media caused by interacting with a variety of opinions. Estimating the parameters of the models using data available from a social news website (Balatarin) as a case study, we extracted mechanisms affecting the communities on this platform. We studied the effect of these mechanisms on the future formation and the lifecycle of the platform using an agent-based simulation model. Having examined the effect of biased communities on the social media, the results imply that individuals increase their online activity as a result of interacting with contents closely aligned to their own opinion.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
23

Stark, Jessica. "A Day in the Life of a Sim: Making Meaning of Video Game Avatars and Behaviors." Antioch University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1497718914530561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Shiri, Ali Asghar, and Crawford Revie. "User-Thesaurus Interaction on a Web-based Database: An Evaluation of Users' term Selection Behaviour." University of Oulu; Infotech Oulu, 2001. http://hdl.handle.net/10150/105448.

Full text
Abstract:
A major challenge faced by users during the information search and retrieval process is the selection of search terms for query formulation and expansion. Thesauri are recognised as one source of search terms which can assist users in query construction and expansion. As the number of electronic thesauri attached to information retrieval systems has grown, a range of interface facilities and features have been developed to aid users in formulating their queries. The pilot study reported here aimed to explore and evaluate how a thesaurus-enhanced search interface assisted end-users in selecting search terms. Specifically, it focused on the evaluation of users' attitudes toward both the thesaurus and its interface as tools for facilitating search term selection for query expansion. Thesaurus-based searching and browsing behaviours adopted by users while interacting with a thesaurus-enhanced search interface were also examined
APA, Harvard, Vancouver, ISO, and other styles
25

Cheung, Yee-tak. "Suicidal behaviours among illicit drug users." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/HKUTO/record/B39556992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

張懿德 and Yee-tak Cheung. "Suicidal behaviours among illicit drug users." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B39556992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Jóhannsson, Jökull. "Detecting fraudulent users using behaviour analysis." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224196.

Full text
Abstract:
With the increased global use of online media platforms, there are more opportunities than ever to misuse those platforms or perpetrate fraud. One such fraud is within the music industry, where perpetrators create automated programs, streaming songs to generate revenue or increase popularity of an artist. With growing annual revenue of the digital music industry, there are significant financial incentives for perpetrators with fraud in mind. The focus of the study is extracting user behavioral patterns and utilising them to train and compare multiple supervised classification method to detect fraud.  The machine learning algorithms examined are Logistic Regression, Support Vector Machines, Random Forest and Artificial Neural Networks. The study compares performance of these algorithms trained on imbalanced datasets carrying different fractions of fraud. The trained models are evaluated using the Precision Recall Area Under the Curve (PR AUC) and a F1-score. Results show that the algorithms achieve similar performance when trained on balanced and imbalanced datasets. It also shows that Random Forest outperforms the other methods for all datasets tested in this experiment.
Med den ökande användningen av strömmande media ökar också möjligheterna till missbruk av dessa platformar samt bedrägeri. Ett typiskt fall av bedrägeri är att använda automatiserade program för att strömma media, och därigenom generera intäkter samt att öka en artist popularitet. Med den växande ekonomin kring strömmande media växer också incitamentet till bedrägeriförsök. Denna studies fokus är att finna användarmönster och använda denna kunskap för att träna modeller som kan upptäcka bedrägeriförsök. The maskininlärningsalgoritmer som undersökts är Logistic Regression, Support Vector Machines, Random Forest och Artificiella Neurala Nätverk. Denna studie jämför effektiviteten och precisionen av dessa algoritmer, som tränats på obalanserad data som innehåller olika procentandelar av bedrägeriförsök. Modellerna som genererats av de olika algoritmerna har sedan utvärderas med hjälp av Precision Recall Area Under the Curve (PR AUC) och F1-score. Resultaten av studien visar på liknande prestanda mellan modellerna som genererats av de utvärderade algoritmerna. Detta gäller både när de tränats på balanserad såväl som obalanserad data. Resultaten visar också att Random Forestbaserade modeller genererar bättre resultat för alla dataset som testats i detta experiment.
APA, Harvard, Vancouver, ISO, and other styles
28

Hiler, Marzena M. "Electronic Cigarette User Plasma Nicotine Concentration and Puff Topography: Influence of Liquid Nicotine Concentration and User Experience." VCU Scholars Compass, 2016. http://scholarscompass.vcu.edu/etd/4613.

Full text
Abstract:
Electronic cigarettes (ECIGs) aerosolize an often nicotine-containing solution for user inhalation. ECIG nicotine delivery may depend on liquid nicotine concentration and user puffing behavior (topography). This study examined the relationship among liquid nicotine concentration, puff topography, and plasma nicotine concentration. Thirty-three ECIG-experienced and 31 ECIG-naïve individuals completed four laboratory sessions that differed by ECIG liquid nicotine concentration (0, 8, 18, or 36 mg/ml). A 3.3 volt “eGo” ECIG battery attached to a 1.5 Ohm dual coil “cartomizer” filled with 1 ml of 70% propylene glycol/30% vegetable glycerin nicotine liquid was used in two ECIG-bouts (10 puffs; 30 s IPI). Plasma nicotine concentration, puff topography, and HR were evaluated. Some ECIG/liquid combinations can deliver physiologically active doses of nicotine to users, and nicotine delivery depends on liquid nicotine concentration and user puffing behavior. Liquid contents, device characteristics, and user behavior should be considered when regulating ECIGs.
APA, Harvard, Vancouver, ISO, and other styles
29

Johnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.

Full text
Abstract:
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and perceived behavioral control (PBC) affected the intention of computer end users in a K-12 environment to follow InfoSec policy. Data collection was from 165 K-12 school administrators in Northeast Georgia using an online survey instrument. Data analysis occurred applying multiple linear regression and logistic regression. The TPB model accounted for 30.8% of the variance in intention to comply with InfoSec policies. SN was a significant predictor of intention in the model. ATT and PBC did not show to be significant. These findings suggest improvement to K-12 SETA programs can occur by addressing normative beliefs of the individual. The application of improved SETA programs by IT security program managers that incorporate the findings and recommendations of this study may lead to greater information security in K-12 school systems. More secure school systems can contribute to social change through improved information protection as well as increased freedoms and privacy for employees, students, the organization, and the community.
APA, Harvard, Vancouver, ISO, and other styles
30

Rawstorne, Patrick. "A systematic analysis of the theory of reasoned action, the theory of planned behaviour and the technology acceptance model when applied to the prediction and explanation of information systems use in mandatory usage contexts." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060815.154410/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Pike, Erika. "THE INFLUENCE OF COCAINE-RELATED IMAGES ON INHIBITORY CONTROL IN COCAINE USERS." UKnowledge, 2017. http://uknowledge.uky.edu/psychology_etds/120.

Full text
Abstract:
Cocaine users display impaired inhibitory control. The influence of cocaine-related stimuli on inhibitory control has not been assessed. The Attentional Bias-Behavioral Activation (ABBA) task uses cocaine and neutral images as cues to determine if drug-related images impair inhibitory control in cocaine users. This dissertation was designed to assess the influence of cocaine images on inhibitory control in cocaine users through the conduct of studies designed to address four aims. The first aim was to demonstrate that cocaine users display impaired inhibitory control following cocaine images compared to neutral images on the ABBA task. This was accomplished through the conduct of two experiments. The first experiment piloted the ABBA task and cocaine users completed the cocaine go (n = 15) or neutral go condition (n = 15) of the task. The second experiment consisted of two studies designed to develop a within-subjects methodology for using the ABBA task. In the first study, cocaine users completed either the cocaine go (n = 20) or neutral go (n = 20) condition of the ABBA task and all participants also completed the Cued Go/No-Go task, with geometric shapes as cues. In the second study, cocaine users (n = 18) completed the cocaine go condition of the ABBA task and a modified version of the ABBA task with all neutral images as cues to further refine a possible within-subjects methodology. The second aim was to demonstrate that inhibitory failures occur most often when cues are presented for short compared to longer durations of time. Data collected during other protocols (n = 91) were combined to investigate the influence of stimulus onset asynchrony (SOA; i.e., the amount of time a cue is presented before a target indicated a response should be executed or withheld) on inhibitory control following cocaine-related and neutral cues on the ABBA task. The third aim was to demonstrate impaired inhibitory control following cocaine images on the ABBA task is specific to cocaine users. Cocaine users (data collected in the second experiment of the first aim) and non-using control participants (n = 16) completed the cocaine go and all neutral conditions of the ABBA task and the Cued Go/No-Go task. The fourth aim was to demonstrate the feasibility and acceptability of inhibitory control training to cocaine-related stimuli with cocaine users. A small pilot clinical trial was conducted and cocaine users were randomly assigned to complete inhibitory control training to cocaine images or geometric shapes. Cocaine images impaired inhibitory control on the ABBA task, as demonstrated by an increased proportion of inhibitory failures in the cocaine go condition compared to the neutral go condition in Experiments 1, 2, and 4. The proportion of inhibitory failures following cocaine images in Experiment 4 was increased at short (i.e., 100, 200) compared to long SOAs. Cocaine images also impaired inhibitory control compared to the Cued Go/No-Go Task in Experiment 2, however there were no differences in the proportion of inhibitory failures between the cocaine go and all neutral conditions of the ABBA task. There were no differences between cocaine users and controls in Experiment 3 for the proportion of inhibitory failures on the ABBA or Cued Go/No-Go tasks, but controls responded faster indicating a speed/accuracy trade off occurred in the control group. Inhibitory control training as an approach to improve treatment outcomes is feasible, as indicated by attendance and accuracy on the training task, and participants rated the overall procedure as satisfactory in Experiment 5. A better understanding of inhibitory control in the presence of cocaine related cues could be crucial to better understand how drug cues contribute to the risk for relapse and the continued use of drugs because both occur in the presence of drug cues.
APA, Harvard, Vancouver, ISO, and other styles
32

Hung, Jui-Huang, and 洪瑞凰. "Information Sharing Behaviors among Users of Delicacy Blog." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/80318371148520860573.

Full text
Abstract:
碩士
輔仁大學
圖書資訊學系
98
In recent years, delicacies have stepped into our lives and become an important part of our life. Various dining experiences and delicacies recorded by photos and shared on the blogs becomes a common way of connecting new friends and forming a delicacy virtual community. This research mainly focused on information sharing behaviors among users of delicacy Blog, including the content, intent and uses of interaction tools among blog users. Content analysis and online interviews were employed for collecting research data. From content analysis, various information sharing behaviors were observed from blog posts of bloggers (proposing) and readers (responding). Sharing behaviors among the bloggers included food content, dining experiences, emotion expressions, recommendations/suggestions, and information about specific restaurants. Sharing behaviors among readers included the information about the preferences of tastes in different areas, recommendation of food content, expression of their dining experience, various other information, and queries about specific restaurants. Online interviews were summarized from proposers’ (bloggers’) and respondents’ (readers’) perspectives. From the bloggers’ perspective, the reasons for proposing information included recording lives and their interest about delicacies. The variety of sharing tools also allowed proposers to benefit from the sharing processes. From the readers’ perspective, the reasons for responding included interests, care and encouragement for the bloggers, and benefits from reading the blogs. It was also observed that bloggers were not willing to reveal their identity in the real world, but expected to establish social relationship in the virtual world.
APA, Harvard, Vancouver, ISO, and other styles
33

HUI-CHING, LEE, and 李惠晴. "A Study on Forwarding Behaviors Among E-mail Users." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/y572t6.

Full text
Abstract:
碩士
淡江大學
大眾傳播學系
89
As the electronic mail has become more and more popular in the internet age, forwarded mails become the important mails among these e-mails. Many e-mail users forward mails to others in cyberspace. Responding to the above phenomena, this study aims to explore e-mail users’ forwarding behaviors. This study first reviews the related literatures to explore which variables influence forwarding behaviors. What is people’s attitude toward forwarding mails among e-mail users? What are their motives? What types of messages are forwarded? How frequent are their forwarding behaviors? We also try to understand the relationships among variables like demographic characteristics, values, communication features, forwarding attitude, forwarding motivation, and forwarding behaviors. After a pilot study, the study adopts internet survey to collect data, exam all hypothesis and find out email users’ forwarding behaviors. Besides, this study further interviews people to explain the conclusion deeply. The study finds three main attitude dimensions toward forwarding mails among e-mail users: passive-optimistic attitude, pessimistic-doubtful attitude, and negative-critic attitude. Principal component analysis in this study identifies three motivations for forwarding behavior: sharing information, social-entertainment, and passive factor. The study finds the universality and particularity of forwarding behaviors. Among all statistically significant variables, passive-optimistic attitude and social-entertainment attitude are the most influential variables in affecting forwarding behaviors. Synthesizing all the following aspects, demographic variables, values, communication features, forward attitudes and forward motivations, most of these variables have some correlation with forwarding behaviors. The study finds that demographic variables have influences on the content types of forwarding mails, the frequency and quantity of forwarding mails. For example, women tend to forward soft information, elders tend to forward assistant and enterprise information, users with higher education and lower income forward mails less frequently, and the quantity of forwarding mail is small. We also find that value is the most influential variables in affecting the content types of forwarding mails. Users with stronger communication features forward mails more frequently. As to the internet use experience, the more time one uses internet, the more possibility he will forward mails to others. Variables like the frequency of e-mail use, the quantity and frequency of received forwarding mails all have predictive ability to forwarding behaviors. Besides, forwarding behaviors and replying behaviors have some correlation.
APA, Harvard, Vancouver, ISO, and other styles
34

HUI-JOU, SHEN, and 沈蕙柔. "The Relationship between Smartphone Users' Using Behaviors and Characteristics." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/87y6tr.

Full text
Abstract:
碩士
國立彰化師範大學
輔導與諮商學系所
102
The purpose of this study is to understand the relationship between smartphone users’ social network sites, and mobile game using behaviors and the characteristics of personality, boredom proneness, and interpersonal relationship. Furthermore, we can understand the predictability of the three aspects to using behaviors. The research tools used in this study are “Personality Self-rating Scale”, “Boredom Proneness Scale-Short Form” (BPS-SF), and “Real and Internet Relationships Scales”. The valid samples are 389 smartphone users in Taiwan by an electronic questionnaire on the internet. The statistic methods adopted in the study were descriptive statistic, Pearson’s product-moment correlation, and stepwise multiple regression analysis. All of the data were analyzed by SPSS12.0. The main results are listed as follows: 1. Most of the background factors are females, students, age between 21-25, and most of them live in the north Taiwan. 2. The personality of “Intellect-openness”, “Conscientiousness”, “Extroversion”, and “Agreeableness” are negative relates to the boredom proneness; and the personality of “Narcissistic Tendency”, and ”Neuroticism” are positive relates to the boredom proneness. 3. The personality of all the six factors are positive relates to the “Real interpersonal relationship”; and the personality of “Neuroticism” are positive relates to the “Internet interpersonal relationship”. 4. The boredom proneness of all the factors are negative relates to the “Real interpersonal relationship”; and the boredom proneness of “Internal boredom proneness” are negative relates to the “Internet interpersonal relationship”. 5. The personality can effectively predict the spending time in social network and mobile games. In addition, the personality has both the direct effect and indirect effect to boredom proneness by interpersonal relationship. According to the results, this research might be helpful as reference for counseling psychologist, practitioners in fields like family- or school-education, to fit some cases.
APA, Harvard, Vancouver, ISO, and other styles
35

Yi-Wei, Wong, and 翁怡葳. "A Study on RSS Users’ Subscription and Navigation Behaviors." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/99745694236648020658.

Full text
Abstract:
碩士
國立臺灣師範大學
圖書資訊學研究所
98
The current Internet users search for web information are roughly divided into two ways: one is the use of search engine keyword search function to access to relevant pages, another is to subscribe to topics of interest, and then the system provide users relevant information, which is called RSS (Really Simple Syndication). This study attempt to study the users’ RSS subscriptions and navigation behavioral characteristics, including the motivations of subscribe to RSS, subscribe to the contents of the categories and quantity, and users navigating behaviors. Object of study is the 12 heavy RSS users who subscribe to more than 100 kinds of FEED. At the same time, researchers have tried to conduct non-invasive type of observation, to ensure that the objects of the operation can be carried out smoothly. It were recorded for the work of a total of 21 days, collected 26 hours of navigating records, then coding and analysis of these data. The main research findings show that users to subscribe to the contents with low repetition rate. Motivations to subscribe is curiosity and to meet the information needs and personal interest-based. In the course of reading, often the first to read a large number of titles and abstracts, then the priorities to reading articles according to the level of users’ interest, then defined the users’ model of navigation behavior as follows: writing type, knowledge-based, system type and random pattern. Finally, the study provides some suggestions on improving the services of personal information, system functions of RSS Reader and benefit further research, such as RSS content providers to attract users’ attention can write the funny title, to facilitate the increase in clicking rates, or to provide information-based summary to facilitate the users to quickly understand the information content. Or if the RSS reader can display interfaces with self-adjustment of the function to meet the individual navigating habits, and so on. Direction for future studies include expanding the scope of study, to develop a model describing the structure of RSS navigation of users, and compare RSS and other information access methods.
APA, Harvard, Vancouver, ISO, and other styles
36

Yang, Kai-Cunng, and 楊鎧仲. "A Study on Young Users'' Behaviors of Music Mobile Phone." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/58506067494105667571.

Full text
Abstract:
碩士
朝陽科技大學
設計研究所
97
The study takes the young group who is between 15 and 30 years old as the research object. First of all, using the In-deep Interview gets the general information of preference, needs, and etc. of music mobile phone. And then lifestyle analysis was used to separate young group into 4 groups in order to find out the difference between each group. Young group usually choose music player by the reasonable price and convenience. Music mobile phone is in the 3rd place of music player frequently. “The group 4” prefers to use music mobile phone to listen music more than the others. And the younger the age is, the more people prefer to use music mobile phone. By observation of operating the functions which are frequently used of music mobile phone, we can understand the users’ behaviors more and find out that “visibility” is not good enough to let people know what to do next. There is a serious interface problem, especially in making ringtone and connecting Bluetooth earphone. And the designers should consider the “mapping” between keys and the screen when separating the music access key. In the end, by using the Focus Group Interview to discuss the issue about making ringtone, it comes to conclusions that vocal mode or composing the melody boxes is easier for young group to make the ringtone. And using “mood” to replace “style” is much easier for young group to understand how to do the arrangement.
APA, Harvard, Vancouver, ISO, and other styles
37

Kim, Kyung-Sun. "Experienced Web Users' Search Behavior: Effects of Focus and Emotion Control." 2005. http://hdl.handle.net/10150/105638.

Full text
Abstract:
This study investigates how usersâ cognitive and affective characteristics influence the navigational and search behaviors on the Web among experienced Web users. Sixty-seven undergraduate students participated in the study. Two standardized tests and a questionnaire were used to collect information on the participantsâ cognitive style, problem-solving style, and demographics. Factor analysis was performed on the scores from the two standardized tests (Group Embedded Figures Test and Problem Solving Inventory), and extracted two user factors (Focus Control and Emotion Control). The Focus Control factor seemed to influence usersâ navigational behaviors, such as the use of links and back buttons, whereas the Emotion Control factor affected search behaviors including keyword searching, and also search performance measured by precision and recall.
APA, Harvard, Vancouver, ISO, and other styles
38

Hsiao, Kuo-Lun, and 蕭國倫. "Studies on the behaviors of Internet users in Web 2.0 environment." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/07088607032819565579.

Full text
Abstract:
博士
國立臺灣科技大學
資訊管理系
97
Web 2.0 services, such as blogs and Youtube, have been popular on the Internet recently. Web 2.0 services’ aim is to facilitate creativity, collaboration, and sharing between users. However, little research has been conducted to understand what motivations influence individual users to continuously share information through Web 2.0 services. Among Web 2.0 services, most services were widely used for communication and social purpose. In these services, blog services have the largest number of users and many of them used to post information on their blogs frequently. Therefore, we propose a research model based on Social Cognitive Theory and survey blog users to examine what factors influence people to share information continuously on the Web in the study 1. Meanwhile, this study intends to understand the gender difference in the factors. The casual model was validated using structural equation modeling (SEM) techniques with 525 samples. The results found that environmental factors (subjective norms) had more significant influence than did personal factors (personal outcome expectations and self-expression) on the intention to post information on blogs. Additionally, we found that females were mainly influenced by self-expression while males were mainly affected by personal outcome expectations. Additionally, there is another issue that few users are willing to pay fees for Web 2.0 services. In the Web 2.0 services, social networking sites (SNS) are the success cases that made profits from the members’ subscription fees. For the reason, our study proposed a model which based on value-based theory to examine factors affecting the SNS members’ intention to pay through an empirical survey in the study 2. We received 288 SNS members’ responses and used SEM techniques to test our hypotheses. The results showed that perceived value had strong impact on the intention to pay for the service and members’ satisfaction. Surprisingly, we found that satisfaction did not significantly influence the intention. Moreover, the result indicated that there are gender and personality differences in the perceived value. Finally, this study discusses the implications of these findings and offer directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
39

Lin, Jia-Ling, and 林家菱. "A study of Users’ Behaviors in a Social Network Website: Facebook." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/25358935648250426296.

Full text
Abstract:
碩士
長榮大學
資訊管理學系碩士班
101
Virtual community activities are booming in the 21th century. Of all exiting Social Network Websites, Facebook is the most popular one around Taiwan and the world. It offers great convenience for people in communication, interaction, and relationship building. Unfortunately, the convenience comes along with certain problems and challenges, such as possible worsening inter-relationship, over usage and indulging, security of personal information, etc. It demands research on users’ behaviors in dealing with such issues, which few studies in Taiwan have explored. This research attempts to study users’ behaviors on Facebook in a more comprehensive way. The research model includes several variables, such as motivation, behaviors, perceived risks, and reinforced engagement factors. Personal characteristics and demographics are served for users’ segmentation analysis. A survey was conducted using a questionnaire designed based upon the model. 220 effective samples were collected and statistical methods such as descriptive, ANOVA and correlation are employed for data analysis. The analysis has shown that different user groups, such as sex, age, job and personal characteristics, have significant differences in motivation and behavior patterns, while motivation is positively correlated with behaviors. Most reinforced engagement factors are also positively correlated with their respective behaviors. These results can be a valuable reference for the academic and related stakeholders of any virtual community.
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, Ya-Ting, and 楊雅婷. "A Study in Motivation and Reading Behaviors of e-Book Users." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/10736572149552371595.

Full text
Abstract:
碩士
國立雲林科技大學
資訊管理系碩士班
101
Electronic reading media has become a trend, but many students still rely on paper-based books. Besides, there are different reading behaviors between e-books and paper-based books. In our study, we conduct a case study to explore the motivation and reading behavior on e-books. Our subjects are undergraduate students in National Yunlin University of Science and Technology. We collect data through observation and interview, and we use protocol analysis to analyze the data. The result of our study shows that most users read e-books for making school reports. The motivations of selecting e-book are free, convenient, and fast. However, most users still like to read paper-based books. Paper-based books have the advantages of being real and convenient for users when they are in the library or take the public transportation. If e-books can improve the shortcomings and add some functions like eye tracking technique, we believe that more users will choose e-books in the future.
APA, Harvard, Vancouver, ISO, and other styles
41

LIN, HENG-SHENG, and 林恆生. "Using Decomposed Theory of Planned Behavior to Study the Trip Information Sharing Behaviors of Facebook Group Users." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/83348563470177145709.

Full text
Abstract:
碩士
銘傳大學
新媒體暨傳播管理學系碩士班
105
Owing to its rapid development and ubiquity, the Internet has become one of the fastest channels to obtain information and knowledge in the daily life nowadays. Internet users are able to gain useful and updated information and also to share the information they own through the interaction with other members in a certain social networking service virtual group. Given the necessity of having the most updated information for planning an overseas trip, Facebook's networking service group for sharing trip experiences turns out to be one of the most efficient tools to undergo information and knowledge sharing as well. Through studying a major networking group of Facebook that exchanges overseas trip information, by using the decomposed theory of planned behavior the main purpose of the research is to explore the aspects that influence the information sharing behaviors of the member users and meantime to identify the modes of their information sharing behaviors. The methodology of the research is basically derived from the theory of planned behavior. Besides, according to the literature study, there are twelve hypothesis presented in the research, by including aspects such as perceived usefulness, perceived ease of use, compatibility, altruism, influence from the major group, influence from the minor group, self efficacy, and resource facilitating conditions. The research applied the method of questionnaire survey techniques in collecting the sample data. There were 303 copies of questionnaires returned as complete and valid, out of the 320 questionnaires disseminated. The research used SPSS to make statistical analysis and LISREL to validate the research model of the study. The research found that the subjective norm and perceived behavior control has a significant influence toward the intention of information sharing behaviors of the users in the trip community of Facebook. The perceived usefulness, perceived ease of use, and compatibility all have a significant influence to the users' attitude. The major group shows a significant influence to the subjective norm. And, the self efficacy is significantly influenced by the perceived behavior control. At the end of it , based on the outcomes, the research has made some suggestions for a reference for any further studies that may follow.
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Jia-Ying, and 劉佳穎. "The Effects of Computer Agents' Nonverbal Behaviors on Users' Cognitions and Perceptions." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/29219219419935502074.

Full text
Abstract:
碩士
國立清華大學
資訊系統與應用研究所
98
This research explores the external stimuli to human cognition and perception and also discusses the human information reception during the interaction. The experimental system involves embodied computer agents in an interaction scenario. The agents communicate with users via vocal messages and different nonverbal behavior in distinct groups. The independent variable is “nonverbal behavior of computer agents” in four groups: non-semantics, mismatch, hyperactivity, and control. Non-semantics refers to the scenario where the behavior is irrelevant to the communication; mismatch refers to the scenario where the behavior is opposing to the communication. The computer agent in the hyperactivity group exhibits an excessive amount of behaviors. The computer agent in the control group performs no behavior. The dependent variables include “cognitive load, recall and comprehension efficiency, perception, satisfaction and further interaction will”. The experimental results verify that the effect of nonverbal behaviors on human-computer interaction is similar with interpersonal communication. The mismatch group and the hyperactivity group present a high cognitive load than the non-semantics group and the control group. The semantic-mismatched nonverbal behavior of a computer agent distracts uses’ attention and decreases user perception, satisfaction and the will of further interaction. In particular, according to the qualitative data, nonverbal behavior in high frequency not only leads to cognitive load and decrease the information communication efficiency but also creates positive and lively impression of the computer agent to users. This further improves user satisfaction.
APA, Harvard, Vancouver, ISO, and other styles
43

Ma, Shih-Hua, and 馬世驊. "A Study on the Behaviors of e-Learning Users for IT Courses." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/45890347269858641950.

Full text
Abstract:
碩士
世新大學
資訊傳播學研究所(含碩專班)
98
There are three sets of explanations in newly illiteracy from United Nations: first: people who can’t read or write in the old –fashioned way; second: people who can’t recognize social symbols; third: people who can’t operate computers to learn, communicate, and manage in daily lives. As the matter of fact, last two categories have been assumed to be functional illiteracy, even though some of them had been educated well; however, in terms of “innovated technology skills”, they seems to be lack of them. The raise of new technology illiterates can now improve their skills and working habits in various ways. Currently, the recession downturn in the society forced employees to stay at work for a longer period of time; hence, mostly they still would consider to further studies or continue taking training courses to advance their personal careers. Therefore, e-Learning is the most convenient way to match everyone’s needs in learning anytime and anywhere for continues learning. Base on the huge popularity of e-Learning, new illiterates and normal users have got to have prior knowledge in order to use e-Learning platform. Generally speaking, commonly used IT related e-Learning platforms were made for users in first category. Thus, the study is focus on integrated Technology Acceptance Model 3 on a user’s behaviors towards to a IT e-Learning platform; the expectation of this study is to find out the crucial factors for learner’s using effectiveness and learning outcomes with on-line IT courses.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Nai-Chia, and 陳乃嘉. "A Study of Factors Affecting Users’ Customer Citizenship Behaviors on Food Blogs." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/06810105163920602461.

Full text
Abstract:
碩士
國立高雄應用科技大學
觀光與餐旅管理研究所
101
Food blog is an information sharing channel that allows community with similar interest to share enjoyment to the ones without similar experiences before. General speaking, food blog is a voluntarily action and there is no commercial behavior involved among the users. Compared with the past research, which focus on explore customers' behavioral intentions or factors that could influence people’s consuming behavior on blogs or forums, this particular research intends to investigate non-profit oriented food blogs’ factors that influence users’ customer citizenship behaviors. The subject of this research utilized six food blogs, which chosen based on blog traffic and the proportion of food articles, is to conduct an online questionnaire survey and collect samples needed for the research purpose. For the final step, this research has utilized SPSS and LISREL statistical software to conduct the analysis according to the 323 valid questionnaires survey feedback that we received. The Structural Equation Modeling is adopted as the tool to examine confirmatory factor analysis and the causality relationship between the variables. The result is that food blog users’ psychological need, customer satisfaction and customer-company identification have significant directly positive effect on customer citizenship behaviors. Through the proposed model of this study, building a complete model for food blog and using it as a reference for future bloggers. From a managerial perspective, food blog encourages users’ customer citizenship behaviors to increase more traffic for blog and also get more information or comments from users. Therefore, it benefits not only the users of blogs but also development of the blog in the long run.
APA, Harvard, Vancouver, ISO, and other styles
45

Yang, Po-Yi, and 楊柏毅. "Behaviors of Digital Consumers in Privacy DilemmaA Case of Taiwanese Facebook Users." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/c25k44.

Full text
Abstract:
碩士
國立臺灣大學
商學研究所
106
As the advancement of the techniques of personal data collection, digital consumers are increasingly faced with the dilemma of choosing between protecting personal privacy and the benefits of online services, which usually require the access to users’ personal data. This research aims to explore the pattern of Taiwanese digital consumers’ behaviors when they are making decisions whether to compromise privacy in exchange for the benefits of online services and find the factors causing privacy paradox from qualitative behavior analysis. This research was focused on the Facebook users’ behaviors regarding to logging in via Facebook accounts on third-party websites and apps. By observing and analyzing the users’ decisions, the attitude and decision-making processes will be discovered. Based on the in-depth interviews with 15 interviewees and the analysis, it was found that only a tiny minority of interviewees would like to provide access to sensitive personal information for the convenience, while a generous portion of the interviewees use the services selectively and tend to protect or not to disclose sensitive personal information.
APA, Harvard, Vancouver, ISO, and other styles
46

"Characterization of HIV related risk behaviors of injecting drug users in Hong Kong." 2008. http://library.cuhk.edu.hk/record=b5893518.

Full text
Abstract:
Li, Huizhen.
"March 2008."
Thesis (M.Phil.)--Chinese University of Hong Kong, 2008.
Includes bibliographical references (leaves 139-150).
Abstracts in English and Chinese.
Abstract --- p.ii
Acknowledgement --- p.vii
Abbreviations --- p.ix
Introduction --- p.1
Chapter 1.1 --- HIV and AIDS --- p.4
Chapter 1.1.1 --- HIV Transmission Routes --- p.5
Chapter 1.1.2 --- HIV Related Risk Behaviors --- p.6
Chapter 1.2 --- HIV Burden --- p.7
Chapter 1.2.1 --- HIV Infection in China --- p.7
Chapter 1.2.2 --- HIV Infection in Hong Kong --- p.9
Chapter 1.2.3 --- Methadone Treatment in Hong Kong --- p.10
Chapter 1.3 --- Objectives and Hypothesis --- p.14
Chapter 1.4 --- Organization of This Thesis --- p.15
Literature Review --- p.16
Chapter 2.1 --- Search Methods --- p.18
Chapter 2.1.1 --- Formulating Review Questions --- p.18
Chapter 2.1.2 --- Search Strategy --- p.19
Chapter 2.1.3 --- Inclusion and Exclusion Criteria --- p.21
Chapter 2.2 --- Assessing the Quality of Studies --- p.22
Chapter 2.3 --- Search Results --- p.23
Chapter 2.3.1 --- Descriptive Summary --- p.25
Chapter 2.3.2 --- Critique of Reviewed Articles --- p.33
Chapter 2.4 --- Implication on Planning of Current Study --- p.37
Chapter 2.4.1 --- Summary of Reviewed Articles --- p.37
Methods for Exploring Predictors of HIV Risk --- p.40
Chapter 3.1 --- Data Source --- p.42
Chapter 3.1.1 --- Data Management in Methadone Clinics --- p.42
Chapter 3.1.2 --- Source of Data --- p.43
Chapter 3.2 --- Data Transformation --- p.45
Chapter 3.3 --- Framework for assessing outcome --- p.48
Chapter 3.3.1 --- Study population in different analyses --- p.48
Chapter 3.3.2 --- Risk Score --- p.49
Chapter 3.3.3 --- Independent Variables --- p.50
Chapter 3.4 --- Generalized Linear Model --- p.52
Chapter 3.5 --- Logistic Regression Model --- p.54
Chapter 3.6 --- Multilevel Analyses --- p.55
Chapter 3.6.1 --- Variables --- p.56
Chapter 3.6.2 --- Definition of 'Neighborhood' --- p.56
Chapter 3.6.3 --- Individual Variables --- p.60
Chapter 3.6.4 --- Framework for Analyses --- p.60
Chapter 3.7 --- Field Study --- p.63
Results: Community Variation of HIV Risk --- p.65
Chapter 4.1 --- Demographic Description --- p.67
Chapter 4.1.1 --- Age distribution --- p.67
Chapter 4.1.2 --- Gender Distribution --- p.68
Chapter 4.1.3 --- Proportion of New Admission --- p.72
Chapter 4.2 --- Drug Taking Profile --- p.74
Chapter 4.2.1 --- Heroin Use --- p.74
Chapter 4.2.2 --- Injecting Heroin Users --- p.77
Chapter 4.3 --- HIV related risk behaviors --- p.81
Chapter 4.3.1 --- Injection History --- p.81
Chapter 4.3.2 --- Risky Injection Practices --- p.87
Chapter 4.3.3 --- Sexual Behaviors --- p.93
Chapter 4.4 --- Correlation between Demographics and Risk Score --- p.94
Chapter 4.4.1 --- General Linear Regression Model Coefficient --- p.94
Chapter 4.4.2 --- Risk Predictors in Logistic Regressions --- p.95
Chapter 4.5 --- Neighborhood Effect --- p.100
Chapter 4.6 --- On-site Observation --- p.103
Chapter 4.6.1 --- Demographic Variations --- p.103
Chapter 4.6.2 --- Drug Use Variations --- p.104
Chapter 4.6.3 --- Social Background --- p.105
Discussion --- p.111
Chapter 5.1 --- Neighborhood Effect --- p.113
Chapter 5.1.1 --- Variation across Communities --- p.113
Chapter 5.1.2 --- Implication on Social Network of IDUs --- p.115
Chapter 5.2 --- Decline of Admissions --- p.117
Chapter 5.2.1 --- Decrease of New Admissions --- p.117
Chapter 5.2.2 --- Decline of Readmission in 2003 --- p.119
Chapter 5.3 --- Female IDU Population --- p.121
Chapter 5.4 --- Limitations --- p.125
Chapter 5.4.1 --- Importance of Individual Level Variables and Community Level Variables --- p.125
Chapter 5.4.2 --- Reliability of Self-reported Data --- p.126
Chapter 5.4.3 --- Duplicates of Readmissions --- p.126
Chapter 5.4.4 --- Definition of Syringe Reuse --- p.127
Chapter 5.4.5 --- Choice of Models --- p.129
Conclusion and Future Directions --- p.131
Chapter 6.1 --- Summary of Results --- p.133
Chapter 6.2 --- Implication of results --- p.134
Chapter 6.3 --- Future Directions --- p.136
Bibliography --- p.139
APA, Harvard, Vancouver, ISO, and other styles
47

SHIH, EN-LUN, and 石恩綸. "The Web Site Image and the Internet Using Behaviors of Female Internet Users." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/46614748295086503767.

Full text
Abstract:
碩士
國立臺北大學
企業管理學系
88
Internet has changed the society. The revolution of information technology not only influences every daily life but also becomes the biggest challenge which the business managers or owners must adapt themselves to. The rapid growth of female internet users has reconstructed the internet society. This research attempts to describe the preferences and the internet behaviors of female internet users. "Protal websites" are taken as examples to study the three main points as below: 1. The evaluation of the importance and satisfaction of the website attributions by female internet users. 2. The relationship between the image of the protal website and the using behaviors of female internet users 3. The relationship between the users'' characters and the internet using behaviors of female internet users The reference works which focus on "protal website attributions," "website image," and "female internet users'' characters" were collected to construct the research variables and the research frame. Through analyzing the data from the online questionary, the most important and dissatisfied wedsite attributions are found. Further, the cross analysis between the users'' characters, website attributions, images and the internet using behaviors, the efficient market variables are shown. The data of this research was collected by the online questionary and there are 236 effective samples. The brief summery of the research result is listed as below: 1. The most important website attributions of the interviewees are "response ability" and "information" and the least important attribution is "interactivity". 2. The statistic analysis result of the website images and users'' characters shows that the website image varies in accordance with education levels. 3. The result of Pearson''s correlation analysis claims that the website image and the internet using behavior are correlative. But about the online shopping behavior, the result can not to prove that the website image and the online shopping behavior are correlative. 4. The result of the statistic analysis indicates that "the average weekly frequency of visiting the most common used protal website" varies different according to the users'' "age," "family situation," and "the online motive;" "the average time of visiting the most common used protal website" is different owing to the users'' "age," "online experience," and "the online motive."
APA, Harvard, Vancouver, ISO, and other styles
48

Chien, Ke-Hsing, and 簡克興. "A Study on users'' behaviors of neighborhood parks with shrines in Taichung City." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/82378555522837678393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Fuh, Shing-Ching, and 傅世卿. "The Analysis of The Amateur Radio Users'' Life-Style and Behaviors at Taiwan." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/65465624356930584481.

Full text
Abstract:
碩士
國立交通大學
傳播科技研究所
82
At Taiwan the liberalization for the use of amateur radio was made in 1984. In spite of having 1382 licences up the end of 1993, illegal user were estimated conservatively up to more than 100,000 persons. Therefore, focussing on investigating the understanding of its readers, as well as serving as reference for decision-making. Eight remarkable factors of users'' life style, namely, ''freedom-democracy'', ''fashion-social'', ''science of thinking'', ''conservative-stability'', ''recreation-natural'', ''introversion- peaceful'', ''practical-contentment'', ''misanthropic'' and four motication, namely, ''information- service'', ''freind-study'', ''learning language'', ''entertainmemt'' are found. Among the sample, male users are 18 times for female users, and most of them are married and have children, also they are live in the house with the roof that can use by himself. In sum, the study was made by the life-style analysis, and all the finding will make readers to understand the amateur radio users'' behaviors. The present research is an initial one employed to explore the relationship existing between the life- style and behaviors of local amateur radio users. It is expected that it would be of future related studies, to the ultimate effect of upgrading the reserch to be conducted in this specific field by local scholars and the authority.
APA, Harvard, Vancouver, ISO, and other styles
50

Melleu, Anna Clara De Figueiredo. "Exploring online users´ attitudes and behaviors: the privacy paradox and its current motivations." Master's thesis, 2021. http://hdl.handle.net/10362/129105.

Full text
Abstract:
Individuals' privacy has become an essential theme to be addressed in today's growing digital world" Privacy Paradox" is the discrepancy between privacy concerns and actual behaviors This research aims to explore whether:- Users are still concerned about their online privacy- The elements of Privacy Cynicism has an impact on users' online behavior
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography