Дисертації з теми "Users’ behaviors"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Users’ behaviors".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Noe, Heeju. "Fashion Renting: An Exploratory Study of Users and Non-users Behaviors." Kent State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent1628301642984733.
Повний текст джерелаBlount, Charles Lenward. "Users' privacy and security behaviors on mobile devices." Thesis, University of Maryland, Baltimore County, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571723.
Повний текст джерелаPreferences and behaviors for privacy management with mobile applications are difficult to capture. Previous measures are mostly based on self-report data, which often does not accurately predict actual user behavior. A deeper understanding was sought, gleaned from observing actual practices. This thesis analyzes 11,777 applications from the Google Play marketplace in order to determine the impact of privacy settings on purchase behavior. This was done by looking at the effect of the number of privacy concessions as well as the effect of individual concessions and category on number of downloads. It was found that users of paid applications do not have a preference for fewer privacy concessions. This study further reinforces the disconnect between the user's often stated preference for privacy and their actual behavior -- a discrepancy known as the “privacy paradox ”. Theoretical and practical implications are discussed.
Lee, Jesse Han-Leng. "Identifying users' information needs: A case of SIDC library." School of Communication & Information, Nanyang Technological University, 2006. http://hdl.handle.net/10150/105258.
Повний текст джерелаMcMillan, Tyson DeShaun. "Web Information Behaviors of Users Interacting with a Metadata Navigator." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407784/.
Повний текст джерелаXiao, Guang Yi. "Personalized scheduling search advertisement by mining the history behaviors of users." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2119532.
Повний текст джерелаHashem, Yassir. "Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc1248460/.
Повний текст джерелаWhite, Mel. "Information Seeking Behaviors in a Population of Assistive Mobility Device Users." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc799517/.
Повний текст джерелаSeymour, Zakiya Ayo-Zahra. "Understanding what sanitation users value - examining preferences and behaviors for sanitation systems." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/52168.
Повний текст джерелаHashem, Yassir. "A Multi-Modal Insider Threat Detection and Prevention based on Users' Behaviors." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1248460/.
Повний текст джерелаZhang, Guili. "HIV infection and risk behaviors among methamphetamine-dependent drug users in northern California /." For electronic version search Digital dissertations database. Restricted to UC campuses. Access is free to UC campus dissertations, 2005. http://uclibs.org/PID/11984.
Повний текст джерелаWood, Michele Marie. "Elaborating the relationship between age and HIV risk behaviors among illicit drug users." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1581646911&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Повний текст джерелаWu, Justin Chun. "Peering Through the Cloud—Investigating the Perceptions and Behaviors of Cloud Storage Users." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6175.
Повний текст джерелаAhuama-Jonas, Chizara. "Trauma, PTSD, and HIV Risk among African-American Women Substance Users." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1515508139231446.
Повний текст джерелаReyes-Ortiz, Victor Emanuel. "Social Network Correlates of HCV and HIV Transmission Risk Behaviors among Injecting Drug Users." Thesis, Walden University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3742821.
Повний текст джерелаDrug injection is an increasingly important risk factor in the transmission of blood-borne pathogens, including the hepatitis C virus (HCV) and human immunodeficiency virus (HIV). The purpose of the study was to examine the influence of social network factors on HCV and HIV. The study was grounded in social network theory and sought to determine whether social network characteristics affect high-risk sexual and drug injection behavior as well as self-reported HIV and HCV status. The study design was a quantitative cross-sectional survey. A total of 181 participants in a needle exchange program completed a survey in Spanish assessing individual drug and sex risk practices as well as gathering information to describe the characteristics of participants’ personal networks from an egocentric perspective. General estimating equation techniques were used to analyze the data. Results showed that only social network size was related to risky sexual behavior. Injecting risk behaviors were only impacted by personal network exposures, measured by the average number of years network members had injected. HIV self-reported serum status was correlated with trust, closeness, and number of family members named among the closest 5 network members. Last, HCV self-reported serum status was only related to the years that network members had been injecting drugs. This study has implications for positive social change in that public health practitioners may gain a better understanding of the social network characteristics associated with high-risk behaviors of those infected with HCV and HIV in order to develop health promotion programs to lower infections and mortality.
Edwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.
Повний текст джерелаSimpson, Joseph P. "Empirical Analysis of Socio-Cognitive Factors Affecting Security Behaviors and Practices of Smartphone Users." NSUWorks, 2016. http://nsuworks.nova.edu/gscis_etd/951.
Повний текст джерелаChristensen, Desire Kay. "Characteristics of sunless tanning product users among sorority and fraternity students." Thesis, University of Iowa, 2011. https://ir.uiowa.edu/etd/937.
Повний текст джерелаSalinero, Sandra C. Pollock. "Understanding the technology usage and acceptance behaviors of healthcare information technology users| A comparative cross-case analysis." Thesis, Capella University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10179208.
Повний текст джерелаUser acceptance and usage of technology is an established field of academic inquiry with distinct applications to health information technology adoption. Healthcare systems lag behind in technological advancements related to information systems. The recent push toward health information exchange (HIE) systems to enable the sharing of electronic medical records (EMR) between healthcare organizations has many working to upgrade to the latest EMR system technology. Healthcare organizations strive to lower costs, improve patient care, streamline processes, and meet regulatory requirements. Leading EMR systems promise the realization of attaining these goals. User acceptance and usage of technology is a challenge when implementing new technology. In more recent years, a growing need appeared to study user acceptance and usage behavior in healthcare organizations. The central question of this study is: What deeper understanding can be developed when evaluating the similarities and differences of healthcare and business users’ experiences and behaviors through the lens of the unified theory of acceptance and usage of technology (UTAUT)? A subset of related research questions focuses on factors influencing users’ acceptance and usage, similarities and differences among healthcare users, and similarities and differences between healthcare and non-healthcare users. This study explores participants’ experiences using a comparative cross-case approach applying the theoretical framework of the UTUAT by Venkatesh, Morris, Davis, and Davis (2003). Twenty-one participants were interviewed to ascertain their lived experiences of learning and using computer systems. Areas of inquiry included new system implementations; the importance of factors in the UTAUT model such as effort expectancy, facilitating conditions, performance expectancy, and social influence; and the impact of these on users’ experiences. The majority indicated sub-elements of facilitating conditions and effort expectancy as critical factors. Training is dominant among the majority of cases, while ease to learn and use, process alignment, and time are interwoven with training and usage experiences. Social influence and voluntariness of use were seldom observed, with shared experiences being circumstantial and situational. The success of EMR systems hinges on how the foundational system is built, which involves understanding detailed clinical and business processes, and ensuring the new system is built on forward-thinking practices.
Do, Viet Dung Aphichat Chamratrithirong. "The relationship between risk behaviors and HIV infection among male injecting drug users in Son La province, Vietnam /." Abstract, 2007. http://mulinet3.li.mahidol.ac.th/thesis/2550/cd404/4938541.pdf.
Повний текст джерелаGrant, Lionel DeShaun. "Recreational Water Users, Aquatic Invasive Species and Fish Disease: Examining the Usage of Tailored Messaging to Increase Environmental Responsible Behaviors." OpenSIUC, 2012. https://opensiuc.lib.siu.edu/theses/893.
Повний текст джерелаCheng, Wei-Woon Susan. "Sociodemographic and drug use characteristics, sex behaviors, and motivations for drug use among HIV-seronegative, heterosexual, methamphetamine users in San Diego, CA." Diss., [La Jolla, Calif.] : [San Diego] : University of California, San Diego ; San Diego State University, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p3355791.
Повний текст джерелаTitle from first page of PDF file (viewed June 25, 2009). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
Ashouri, Rad Armin. "Three Essays on Dynamics of Online Communities." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/71641.
Повний текст джерелаPh. D.
Stark, Jessica. "A Day in the Life of a Sim: Making Meaning of Video Game Avatars and Behaviors." Antioch University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1497718914530561.
Повний текст джерелаShiri, Ali Asghar, and Crawford Revie. "User-Thesaurus Interaction on a Web-based Database: An Evaluation of Users' term Selection Behaviour." University of Oulu; Infotech Oulu, 2001. http://hdl.handle.net/10150/105448.
Повний текст джерелаCheung, Yee-tak. "Suicidal behaviours among illicit drug users." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/HKUTO/record/B39556992.
Повний текст джерела張懿德 and Yee-tak Cheung. "Suicidal behaviours among illicit drug users." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B39556992.
Повний текст джерелаJóhannsson, Jökull. "Detecting fraudulent users using behaviour analysis." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224196.
Повний текст джерелаMed den ökande användningen av strömmande media ökar också möjligheterna till missbruk av dessa platformar samt bedrägeri. Ett typiskt fall av bedrägeri är att använda automatiserade program för att strömma media, och därigenom generera intäkter samt att öka en artist popularitet. Med den växande ekonomin kring strömmande media växer också incitamentet till bedrägeriförsök. Denna studies fokus är att finna användarmönster och använda denna kunskap för att träna modeller som kan upptäcka bedrägeriförsök. The maskininlärningsalgoritmer som undersökts är Logistic Regression, Support Vector Machines, Random Forest och Artificiella Neurala Nätverk. Denna studie jämför effektiviteten och precisionen av dessa algoritmer, som tränats på obalanserad data som innehåller olika procentandelar av bedrägeriförsök. Modellerna som genererats av de olika algoritmerna har sedan utvärderas med hjälp av Precision Recall Area Under the Curve (PR AUC) och F1-score. Resultaten av studien visar på liknande prestanda mellan modellerna som genererats av de utvärderade algoritmerna. Detta gäller både när de tränats på balanserad såväl som obalanserad data. Resultaten visar också att Random Forestbaserade modeller genererar bättre resultat för alla dataset som testats i detta experiment.
Hiler, Marzena M. "Electronic Cigarette User Plasma Nicotine Concentration and Puff Topography: Influence of Liquid Nicotine Concentration and User Experience." VCU Scholars Compass, 2016. http://scholarscompass.vcu.edu/etd/4613.
Повний текст джерелаJohnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.
Повний текст джерелаRawstorne, Patrick. "A systematic analysis of the theory of reasoned action, the theory of planned behaviour and the technology acceptance model when applied to the prediction and explanation of information systems use in mandatory usage contexts." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060815.154410/index.html.
Повний текст джерелаPike, Erika. "THE INFLUENCE OF COCAINE-RELATED IMAGES ON INHIBITORY CONTROL IN COCAINE USERS." UKnowledge, 2017. http://uknowledge.uky.edu/psychology_etds/120.
Повний текст джерелаHung, Jui-Huang, and 洪瑞凰. "Information Sharing Behaviors among Users of Delicacy Blog." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/80318371148520860573.
Повний текст джерела輔仁大學
圖書資訊學系
98
In recent years, delicacies have stepped into our lives and become an important part of our life. Various dining experiences and delicacies recorded by photos and shared on the blogs becomes a common way of connecting new friends and forming a delicacy virtual community. This research mainly focused on information sharing behaviors among users of delicacy Blog, including the content, intent and uses of interaction tools among blog users. Content analysis and online interviews were employed for collecting research data. From content analysis, various information sharing behaviors were observed from blog posts of bloggers (proposing) and readers (responding). Sharing behaviors among the bloggers included food content, dining experiences, emotion expressions, recommendations/suggestions, and information about specific restaurants. Sharing behaviors among readers included the information about the preferences of tastes in different areas, recommendation of food content, expression of their dining experience, various other information, and queries about specific restaurants. Online interviews were summarized from proposers’ (bloggers’) and respondents’ (readers’) perspectives. From the bloggers’ perspective, the reasons for proposing information included recording lives and their interest about delicacies. The variety of sharing tools also allowed proposers to benefit from the sharing processes. From the readers’ perspective, the reasons for responding included interests, care and encouragement for the bloggers, and benefits from reading the blogs. It was also observed that bloggers were not willing to reveal their identity in the real world, but expected to establish social relationship in the virtual world.
HUI-CHING, LEE, and 李惠晴. "A Study on Forwarding Behaviors Among E-mail Users." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/y572t6.
Повний текст джерела淡江大學
大眾傳播學系
89
As the electronic mail has become more and more popular in the internet age, forwarded mails become the important mails among these e-mails. Many e-mail users forward mails to others in cyberspace. Responding to the above phenomena, this study aims to explore e-mail users’ forwarding behaviors. This study first reviews the related literatures to explore which variables influence forwarding behaviors. What is people’s attitude toward forwarding mails among e-mail users? What are their motives? What types of messages are forwarded? How frequent are their forwarding behaviors? We also try to understand the relationships among variables like demographic characteristics, values, communication features, forwarding attitude, forwarding motivation, and forwarding behaviors. After a pilot study, the study adopts internet survey to collect data, exam all hypothesis and find out email users’ forwarding behaviors. Besides, this study further interviews people to explain the conclusion deeply. The study finds three main attitude dimensions toward forwarding mails among e-mail users: passive-optimistic attitude, pessimistic-doubtful attitude, and negative-critic attitude. Principal component analysis in this study identifies three motivations for forwarding behavior: sharing information, social-entertainment, and passive factor. The study finds the universality and particularity of forwarding behaviors. Among all statistically significant variables, passive-optimistic attitude and social-entertainment attitude are the most influential variables in affecting forwarding behaviors. Synthesizing all the following aspects, demographic variables, values, communication features, forward attitudes and forward motivations, most of these variables have some correlation with forwarding behaviors. The study finds that demographic variables have influences on the content types of forwarding mails, the frequency and quantity of forwarding mails. For example, women tend to forward soft information, elders tend to forward assistant and enterprise information, users with higher education and lower income forward mails less frequently, and the quantity of forwarding mail is small. We also find that value is the most influential variables in affecting the content types of forwarding mails. Users with stronger communication features forward mails more frequently. As to the internet use experience, the more time one uses internet, the more possibility he will forward mails to others. Variables like the frequency of e-mail use, the quantity and frequency of received forwarding mails all have predictive ability to forwarding behaviors. Besides, forwarding behaviors and replying behaviors have some correlation.
HUI-JOU, SHEN, and 沈蕙柔. "The Relationship between Smartphone Users' Using Behaviors and Characteristics." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/87y6tr.
Повний текст джерела國立彰化師範大學
輔導與諮商學系所
102
The purpose of this study is to understand the relationship between smartphone users’ social network sites, and mobile game using behaviors and the characteristics of personality, boredom proneness, and interpersonal relationship. Furthermore, we can understand the predictability of the three aspects to using behaviors. The research tools used in this study are “Personality Self-rating Scale”, “Boredom Proneness Scale-Short Form” (BPS-SF), and “Real and Internet Relationships Scales”. The valid samples are 389 smartphone users in Taiwan by an electronic questionnaire on the internet. The statistic methods adopted in the study were descriptive statistic, Pearson’s product-moment correlation, and stepwise multiple regression analysis. All of the data were analyzed by SPSS12.0. The main results are listed as follows: 1. Most of the background factors are females, students, age between 21-25, and most of them live in the north Taiwan. 2. The personality of “Intellect-openness”, “Conscientiousness”, “Extroversion”, and “Agreeableness” are negative relates to the boredom proneness; and the personality of “Narcissistic Tendency”, and ”Neuroticism” are positive relates to the boredom proneness. 3. The personality of all the six factors are positive relates to the “Real interpersonal relationship”; and the personality of “Neuroticism” are positive relates to the “Internet interpersonal relationship”. 4. The boredom proneness of all the factors are negative relates to the “Real interpersonal relationship”; and the boredom proneness of “Internal boredom proneness” are negative relates to the “Internet interpersonal relationship”. 5. The personality can effectively predict the spending time in social network and mobile games. In addition, the personality has both the direct effect and indirect effect to boredom proneness by interpersonal relationship. According to the results, this research might be helpful as reference for counseling psychologist, practitioners in fields like family- or school-education, to fit some cases.
Yi-Wei, Wong, and 翁怡葳. "A Study on RSS Users’ Subscription and Navigation Behaviors." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/99745694236648020658.
Повний текст джерела國立臺灣師範大學
圖書資訊學研究所
98
The current Internet users search for web information are roughly divided into two ways: one is the use of search engine keyword search function to access to relevant pages, another is to subscribe to topics of interest, and then the system provide users relevant information, which is called RSS (Really Simple Syndication). This study attempt to study the users’ RSS subscriptions and navigation behavioral characteristics, including the motivations of subscribe to RSS, subscribe to the contents of the categories and quantity, and users navigating behaviors. Object of study is the 12 heavy RSS users who subscribe to more than 100 kinds of FEED. At the same time, researchers have tried to conduct non-invasive type of observation, to ensure that the objects of the operation can be carried out smoothly. It were recorded for the work of a total of 21 days, collected 26 hours of navigating records, then coding and analysis of these data. The main research findings show that users to subscribe to the contents with low repetition rate. Motivations to subscribe is curiosity and to meet the information needs and personal interest-based. In the course of reading, often the first to read a large number of titles and abstracts, then the priorities to reading articles according to the level of users’ interest, then defined the users’ model of navigation behavior as follows: writing type, knowledge-based, system type and random pattern. Finally, the study provides some suggestions on improving the services of personal information, system functions of RSS Reader and benefit further research, such as RSS content providers to attract users’ attention can write the funny title, to facilitate the increase in clicking rates, or to provide information-based summary to facilitate the users to quickly understand the information content. Or if the RSS reader can display interfaces with self-adjustment of the function to meet the individual navigating habits, and so on. Direction for future studies include expanding the scope of study, to develop a model describing the structure of RSS navigation of users, and compare RSS and other information access methods.
Yang, Kai-Cunng, and 楊鎧仲. "A Study on Young Users'' Behaviors of Music Mobile Phone." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/58506067494105667571.
Повний текст джерела朝陽科技大學
設計研究所
97
The study takes the young group who is between 15 and 30 years old as the research object. First of all, using the In-deep Interview gets the general information of preference, needs, and etc. of music mobile phone. And then lifestyle analysis was used to separate young group into 4 groups in order to find out the difference between each group. Young group usually choose music player by the reasonable price and convenience. Music mobile phone is in the 3rd place of music player frequently. “The group 4” prefers to use music mobile phone to listen music more than the others. And the younger the age is, the more people prefer to use music mobile phone. By observation of operating the functions which are frequently used of music mobile phone, we can understand the users’ behaviors more and find out that “visibility” is not good enough to let people know what to do next. There is a serious interface problem, especially in making ringtone and connecting Bluetooth earphone. And the designers should consider the “mapping” between keys and the screen when separating the music access key. In the end, by using the Focus Group Interview to discuss the issue about making ringtone, it comes to conclusions that vocal mode or composing the melody boxes is easier for young group to make the ringtone. And using “mood” to replace “style” is much easier for young group to understand how to do the arrangement.
Kim, Kyung-Sun. "Experienced Web Users' Search Behavior: Effects of Focus and Emotion Control." 2005. http://hdl.handle.net/10150/105638.
Повний текст джерелаHsiao, Kuo-Lun, and 蕭國倫. "Studies on the behaviors of Internet users in Web 2.0 environment." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/07088607032819565579.
Повний текст джерела國立臺灣科技大學
資訊管理系
97
Web 2.0 services, such as blogs and Youtube, have been popular on the Internet recently. Web 2.0 services’ aim is to facilitate creativity, collaboration, and sharing between users. However, little research has been conducted to understand what motivations influence individual users to continuously share information through Web 2.0 services. Among Web 2.0 services, most services were widely used for communication and social purpose. In these services, blog services have the largest number of users and many of them used to post information on their blogs frequently. Therefore, we propose a research model based on Social Cognitive Theory and survey blog users to examine what factors influence people to share information continuously on the Web in the study 1. Meanwhile, this study intends to understand the gender difference in the factors. The casual model was validated using structural equation modeling (SEM) techniques with 525 samples. The results found that environmental factors (subjective norms) had more significant influence than did personal factors (personal outcome expectations and self-expression) on the intention to post information on blogs. Additionally, we found that females were mainly influenced by self-expression while males were mainly affected by personal outcome expectations. Additionally, there is another issue that few users are willing to pay fees for Web 2.0 services. In the Web 2.0 services, social networking sites (SNS) are the success cases that made profits from the members’ subscription fees. For the reason, our study proposed a model which based on value-based theory to examine factors affecting the SNS members’ intention to pay through an empirical survey in the study 2. We received 288 SNS members’ responses and used SEM techniques to test our hypotheses. The results showed that perceived value had strong impact on the intention to pay for the service and members’ satisfaction. Surprisingly, we found that satisfaction did not significantly influence the intention. Moreover, the result indicated that there are gender and personality differences in the perceived value. Finally, this study discusses the implications of these findings and offer directions for future research.
Lin, Jia-Ling, and 林家菱. "A study of Users’ Behaviors in a Social Network Website: Facebook." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/25358935648250426296.
Повний текст джерела長榮大學
資訊管理學系碩士班
101
Virtual community activities are booming in the 21th century. Of all exiting Social Network Websites, Facebook is the most popular one around Taiwan and the world. It offers great convenience for people in communication, interaction, and relationship building. Unfortunately, the convenience comes along with certain problems and challenges, such as possible worsening inter-relationship, over usage and indulging, security of personal information, etc. It demands research on users’ behaviors in dealing with such issues, which few studies in Taiwan have explored. This research attempts to study users’ behaviors on Facebook in a more comprehensive way. The research model includes several variables, such as motivation, behaviors, perceived risks, and reinforced engagement factors. Personal characteristics and demographics are served for users’ segmentation analysis. A survey was conducted using a questionnaire designed based upon the model. 220 effective samples were collected and statistical methods such as descriptive, ANOVA and correlation are employed for data analysis. The analysis has shown that different user groups, such as sex, age, job and personal characteristics, have significant differences in motivation and behavior patterns, while motivation is positively correlated with behaviors. Most reinforced engagement factors are also positively correlated with their respective behaviors. These results can be a valuable reference for the academic and related stakeholders of any virtual community.
Yang, Ya-Ting, and 楊雅婷. "A Study in Motivation and Reading Behaviors of e-Book Users." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/10736572149552371595.
Повний текст джерела國立雲林科技大學
資訊管理系碩士班
101
Electronic reading media has become a trend, but many students still rely on paper-based books. Besides, there are different reading behaviors between e-books and paper-based books. In our study, we conduct a case study to explore the motivation and reading behavior on e-books. Our subjects are undergraduate students in National Yunlin University of Science and Technology. We collect data through observation and interview, and we use protocol analysis to analyze the data. The result of our study shows that most users read e-books for making school reports. The motivations of selecting e-book are free, convenient, and fast. However, most users still like to read paper-based books. Paper-based books have the advantages of being real and convenient for users when they are in the library or take the public transportation. If e-books can improve the shortcomings and add some functions like eye tracking technique, we believe that more users will choose e-books in the future.
LIN, HENG-SHENG, and 林恆生. "Using Decomposed Theory of Planned Behavior to Study the Trip Information Sharing Behaviors of Facebook Group Users." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/83348563470177145709.
Повний текст джерела銘傳大學
新媒體暨傳播管理學系碩士班
105
Owing to its rapid development and ubiquity, the Internet has become one of the fastest channels to obtain information and knowledge in the daily life nowadays. Internet users are able to gain useful and updated information and also to share the information they own through the interaction with other members in a certain social networking service virtual group. Given the necessity of having the most updated information for planning an overseas trip, Facebook's networking service group for sharing trip experiences turns out to be one of the most efficient tools to undergo information and knowledge sharing as well. Through studying a major networking group of Facebook that exchanges overseas trip information, by using the decomposed theory of planned behavior the main purpose of the research is to explore the aspects that influence the information sharing behaviors of the member users and meantime to identify the modes of their information sharing behaviors. The methodology of the research is basically derived from the theory of planned behavior. Besides, according to the literature study, there are twelve hypothesis presented in the research, by including aspects such as perceived usefulness, perceived ease of use, compatibility, altruism, influence from the major group, influence from the minor group, self efficacy, and resource facilitating conditions. The research applied the method of questionnaire survey techniques in collecting the sample data. There were 303 copies of questionnaires returned as complete and valid, out of the 320 questionnaires disseminated. The research used SPSS to make statistical analysis and LISREL to validate the research model of the study. The research found that the subjective norm and perceived behavior control has a significant influence toward the intention of information sharing behaviors of the users in the trip community of Facebook. The perceived usefulness, perceived ease of use, and compatibility all have a significant influence to the users' attitude. The major group shows a significant influence to the subjective norm. And, the self efficacy is significantly influenced by the perceived behavior control. At the end of it , based on the outcomes, the research has made some suggestions for a reference for any further studies that may follow.
Liu, Jia-Ying, and 劉佳穎. "The Effects of Computer Agents' Nonverbal Behaviors on Users' Cognitions and Perceptions." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/29219219419935502074.
Повний текст джерела國立清華大學
資訊系統與應用研究所
98
This research explores the external stimuli to human cognition and perception and also discusses the human information reception during the interaction. The experimental system involves embodied computer agents in an interaction scenario. The agents communicate with users via vocal messages and different nonverbal behavior in distinct groups. The independent variable is “nonverbal behavior of computer agents” in four groups: non-semantics, mismatch, hyperactivity, and control. Non-semantics refers to the scenario where the behavior is irrelevant to the communication; mismatch refers to the scenario where the behavior is opposing to the communication. The computer agent in the hyperactivity group exhibits an excessive amount of behaviors. The computer agent in the control group performs no behavior. The dependent variables include “cognitive load, recall and comprehension efficiency, perception, satisfaction and further interaction will”. The experimental results verify that the effect of nonverbal behaviors on human-computer interaction is similar with interpersonal communication. The mismatch group and the hyperactivity group present a high cognitive load than the non-semantics group and the control group. The semantic-mismatched nonverbal behavior of a computer agent distracts uses’ attention and decreases user perception, satisfaction and the will of further interaction. In particular, according to the qualitative data, nonverbal behavior in high frequency not only leads to cognitive load and decrease the information communication efficiency but also creates positive and lively impression of the computer agent to users. This further improves user satisfaction.
Ma, Shih-Hua, and 馬世驊. "A Study on the Behaviors of e-Learning Users for IT Courses." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/45890347269858641950.
Повний текст джерела世新大學
資訊傳播學研究所(含碩專班)
98
There are three sets of explanations in newly illiteracy from United Nations: first: people who can’t read or write in the old –fashioned way; second: people who can’t recognize social symbols; third: people who can’t operate computers to learn, communicate, and manage in daily lives. As the matter of fact, last two categories have been assumed to be functional illiteracy, even though some of them had been educated well; however, in terms of “innovated technology skills”, they seems to be lack of them. The raise of new technology illiterates can now improve their skills and working habits in various ways. Currently, the recession downturn in the society forced employees to stay at work for a longer period of time; hence, mostly they still would consider to further studies or continue taking training courses to advance their personal careers. Therefore, e-Learning is the most convenient way to match everyone’s needs in learning anytime and anywhere for continues learning. Base on the huge popularity of e-Learning, new illiterates and normal users have got to have prior knowledge in order to use e-Learning platform. Generally speaking, commonly used IT related e-Learning platforms were made for users in first category. Thus, the study is focus on integrated Technology Acceptance Model 3 on a user’s behaviors towards to a IT e-Learning platform; the expectation of this study is to find out the crucial factors for learner’s using effectiveness and learning outcomes with on-line IT courses.
Chen, Nai-Chia, and 陳乃嘉. "A Study of Factors Affecting Users’ Customer Citizenship Behaviors on Food Blogs." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/06810105163920602461.
Повний текст джерела國立高雄應用科技大學
觀光與餐旅管理研究所
101
Food blog is an information sharing channel that allows community with similar interest to share enjoyment to the ones without similar experiences before. General speaking, food blog is a voluntarily action and there is no commercial behavior involved among the users. Compared with the past research, which focus on explore customers' behavioral intentions or factors that could influence people’s consuming behavior on blogs or forums, this particular research intends to investigate non-profit oriented food blogs’ factors that influence users’ customer citizenship behaviors. The subject of this research utilized six food blogs, which chosen based on blog traffic and the proportion of food articles, is to conduct an online questionnaire survey and collect samples needed for the research purpose. For the final step, this research has utilized SPSS and LISREL statistical software to conduct the analysis according to the 323 valid questionnaires survey feedback that we received. The Structural Equation Modeling is adopted as the tool to examine confirmatory factor analysis and the causality relationship between the variables. The result is that food blog users’ psychological need, customer satisfaction and customer-company identification have significant directly positive effect on customer citizenship behaviors. Through the proposed model of this study, building a complete model for food blog and using it as a reference for future bloggers. From a managerial perspective, food blog encourages users’ customer citizenship behaviors to increase more traffic for blog and also get more information or comments from users. Therefore, it benefits not only the users of blogs but also development of the blog in the long run.
Yang, Po-Yi, and 楊柏毅. "Behaviors of Digital Consumers in Privacy DilemmaA Case of Taiwanese Facebook Users." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/c25k44.
Повний текст джерела國立臺灣大學
商學研究所
106
As the advancement of the techniques of personal data collection, digital consumers are increasingly faced with the dilemma of choosing between protecting personal privacy and the benefits of online services, which usually require the access to users’ personal data. This research aims to explore the pattern of Taiwanese digital consumers’ behaviors when they are making decisions whether to compromise privacy in exchange for the benefits of online services and find the factors causing privacy paradox from qualitative behavior analysis. This research was focused on the Facebook users’ behaviors regarding to logging in via Facebook accounts on third-party websites and apps. By observing and analyzing the users’ decisions, the attitude and decision-making processes will be discovered. Based on the in-depth interviews with 15 interviewees and the analysis, it was found that only a tiny minority of interviewees would like to provide access to sensitive personal information for the convenience, while a generous portion of the interviewees use the services selectively and tend to protect or not to disclose sensitive personal information.
"Characterization of HIV related risk behaviors of injecting drug users in Hong Kong." 2008. http://library.cuhk.edu.hk/record=b5893518.
Повний текст джерела"March 2008."
Thesis (M.Phil.)--Chinese University of Hong Kong, 2008.
Includes bibliographical references (leaves 139-150).
Abstracts in English and Chinese.
Abstract --- p.ii
Acknowledgement --- p.vii
Abbreviations --- p.ix
Introduction --- p.1
Chapter 1.1 --- HIV and AIDS --- p.4
Chapter 1.1.1 --- HIV Transmission Routes --- p.5
Chapter 1.1.2 --- HIV Related Risk Behaviors --- p.6
Chapter 1.2 --- HIV Burden --- p.7
Chapter 1.2.1 --- HIV Infection in China --- p.7
Chapter 1.2.2 --- HIV Infection in Hong Kong --- p.9
Chapter 1.2.3 --- Methadone Treatment in Hong Kong --- p.10
Chapter 1.3 --- Objectives and Hypothesis --- p.14
Chapter 1.4 --- Organization of This Thesis --- p.15
Literature Review --- p.16
Chapter 2.1 --- Search Methods --- p.18
Chapter 2.1.1 --- Formulating Review Questions --- p.18
Chapter 2.1.2 --- Search Strategy --- p.19
Chapter 2.1.3 --- Inclusion and Exclusion Criteria --- p.21
Chapter 2.2 --- Assessing the Quality of Studies --- p.22
Chapter 2.3 --- Search Results --- p.23
Chapter 2.3.1 --- Descriptive Summary --- p.25
Chapter 2.3.2 --- Critique of Reviewed Articles --- p.33
Chapter 2.4 --- Implication on Planning of Current Study --- p.37
Chapter 2.4.1 --- Summary of Reviewed Articles --- p.37
Methods for Exploring Predictors of HIV Risk --- p.40
Chapter 3.1 --- Data Source --- p.42
Chapter 3.1.1 --- Data Management in Methadone Clinics --- p.42
Chapter 3.1.2 --- Source of Data --- p.43
Chapter 3.2 --- Data Transformation --- p.45
Chapter 3.3 --- Framework for assessing outcome --- p.48
Chapter 3.3.1 --- Study population in different analyses --- p.48
Chapter 3.3.2 --- Risk Score --- p.49
Chapter 3.3.3 --- Independent Variables --- p.50
Chapter 3.4 --- Generalized Linear Model --- p.52
Chapter 3.5 --- Logistic Regression Model --- p.54
Chapter 3.6 --- Multilevel Analyses --- p.55
Chapter 3.6.1 --- Variables --- p.56
Chapter 3.6.2 --- Definition of 'Neighborhood' --- p.56
Chapter 3.6.3 --- Individual Variables --- p.60
Chapter 3.6.4 --- Framework for Analyses --- p.60
Chapter 3.7 --- Field Study --- p.63
Results: Community Variation of HIV Risk --- p.65
Chapter 4.1 --- Demographic Description --- p.67
Chapter 4.1.1 --- Age distribution --- p.67
Chapter 4.1.2 --- Gender Distribution --- p.68
Chapter 4.1.3 --- Proportion of New Admission --- p.72
Chapter 4.2 --- Drug Taking Profile --- p.74
Chapter 4.2.1 --- Heroin Use --- p.74
Chapter 4.2.2 --- Injecting Heroin Users --- p.77
Chapter 4.3 --- HIV related risk behaviors --- p.81
Chapter 4.3.1 --- Injection History --- p.81
Chapter 4.3.2 --- Risky Injection Practices --- p.87
Chapter 4.3.3 --- Sexual Behaviors --- p.93
Chapter 4.4 --- Correlation between Demographics and Risk Score --- p.94
Chapter 4.4.1 --- General Linear Regression Model Coefficient --- p.94
Chapter 4.4.2 --- Risk Predictors in Logistic Regressions --- p.95
Chapter 4.5 --- Neighborhood Effect --- p.100
Chapter 4.6 --- On-site Observation --- p.103
Chapter 4.6.1 --- Demographic Variations --- p.103
Chapter 4.6.2 --- Drug Use Variations --- p.104
Chapter 4.6.3 --- Social Background --- p.105
Discussion --- p.111
Chapter 5.1 --- Neighborhood Effect --- p.113
Chapter 5.1.1 --- Variation across Communities --- p.113
Chapter 5.1.2 --- Implication on Social Network of IDUs --- p.115
Chapter 5.2 --- Decline of Admissions --- p.117
Chapter 5.2.1 --- Decrease of New Admissions --- p.117
Chapter 5.2.2 --- Decline of Readmission in 2003 --- p.119
Chapter 5.3 --- Female IDU Population --- p.121
Chapter 5.4 --- Limitations --- p.125
Chapter 5.4.1 --- Importance of Individual Level Variables and Community Level Variables --- p.125
Chapter 5.4.2 --- Reliability of Self-reported Data --- p.126
Chapter 5.4.3 --- Duplicates of Readmissions --- p.126
Chapter 5.4.4 --- Definition of Syringe Reuse --- p.127
Chapter 5.4.5 --- Choice of Models --- p.129
Conclusion and Future Directions --- p.131
Chapter 6.1 --- Summary of Results --- p.133
Chapter 6.2 --- Implication of results --- p.134
Chapter 6.3 --- Future Directions --- p.136
Bibliography --- p.139
SHIH, EN-LUN, and 石恩綸. "The Web Site Image and the Internet Using Behaviors of Female Internet Users." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/46614748295086503767.
Повний текст джерела國立臺北大學
企業管理學系
88
Internet has changed the society. The revolution of information technology not only influences every daily life but also becomes the biggest challenge which the business managers or owners must adapt themselves to. The rapid growth of female internet users has reconstructed the internet society. This research attempts to describe the preferences and the internet behaviors of female internet users. "Protal websites" are taken as examples to study the three main points as below: 1. The evaluation of the importance and satisfaction of the website attributions by female internet users. 2. The relationship between the image of the protal website and the using behaviors of female internet users 3. The relationship between the users'' characters and the internet using behaviors of female internet users The reference works which focus on "protal website attributions," "website image," and "female internet users'' characters" were collected to construct the research variables and the research frame. Through analyzing the data from the online questionary, the most important and dissatisfied wedsite attributions are found. Further, the cross analysis between the users'' characters, website attributions, images and the internet using behaviors, the efficient market variables are shown. The data of this research was collected by the online questionary and there are 236 effective samples. The brief summery of the research result is listed as below: 1. The most important website attributions of the interviewees are "response ability" and "information" and the least important attribution is "interactivity". 2. The statistic analysis result of the website images and users'' characters shows that the website image varies in accordance with education levels. 3. The result of Pearson''s correlation analysis claims that the website image and the internet using behavior are correlative. But about the online shopping behavior, the result can not to prove that the website image and the online shopping behavior are correlative. 4. The result of the statistic analysis indicates that "the average weekly frequency of visiting the most common used protal website" varies different according to the users'' "age," "family situation," and "the online motive;" "the average time of visiting the most common used protal website" is different owing to the users'' "age," "online experience," and "the online motive."
Chien, Ke-Hsing, and 簡克興. "A Study on users'' behaviors of neighborhood parks with shrines in Taichung City." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/82378555522837678393.
Повний текст джерелаFuh, Shing-Ching, and 傅世卿. "The Analysis of The Amateur Radio Users'' Life-Style and Behaviors at Taiwan." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/65465624356930584481.
Повний текст джерела國立交通大學
傳播科技研究所
82
At Taiwan the liberalization for the use of amateur radio was made in 1984. In spite of having 1382 licences up the end of 1993, illegal user were estimated conservatively up to more than 100,000 persons. Therefore, focussing on investigating the understanding of its readers, as well as serving as reference for decision-making. Eight remarkable factors of users'' life style, namely, ''freedom-democracy'', ''fashion-social'', ''science of thinking'', ''conservative-stability'', ''recreation-natural'', ''introversion- peaceful'', ''practical-contentment'', ''misanthropic'' and four motication, namely, ''information- service'', ''freind-study'', ''learning language'', ''entertainmemt'' are found. Among the sample, male users are 18 times for female users, and most of them are married and have children, also they are live in the house with the roof that can use by himself. In sum, the study was made by the life-style analysis, and all the finding will make readers to understand the amateur radio users'' behaviors. The present research is an initial one employed to explore the relationship existing between the life- style and behaviors of local amateur radio users. It is expected that it would be of future related studies, to the ultimate effect of upgrading the reserch to be conducted in this specific field by local scholars and the authority.
Melleu, Anna Clara De Figueiredo. "Exploring online users´ attitudes and behaviors: the privacy paradox and its current motivations." Master's thesis, 2021. http://hdl.handle.net/10362/129105.
Повний текст джерела