Academic literature on the topic 'Users information behavior'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Users information behavior.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Users information behavior"
A. Kalisdha, A. Kalisdha. "Information Need and Information Seeking Behavior of Users in a Library and Information System." International Journal of Scientific Research 2, no. 11 (June 1, 2012): 274–76. http://dx.doi.org/10.15373/22778179/nov2013/87.
Full textChiang, I. Ping. "Exploring Smartphone Users’ Social Information Behavior." Contemporary Management Research 15, no. 1 (March 1, 2019): 53–67. http://dx.doi.org/10.7903/cmr.18461.
Full textHuang, Chun-Yao, Yung-Cheng Shen, I.-Ping Chiang, and Chen-Shun Lin. "Characterizing Web users' online information behavior." Journal of the American Society for Information Science and Technology 58, no. 13 (2007): 1988–97. http://dx.doi.org/10.1002/asi.20669.
Full textWu, Dan, Rui Qiao, and Yi Li. "A study on location-based mobile map search behavior." Program 50, no. 3 (July 4, 2016): 246–69. http://dx.doi.org/10.1108/prog-11-2015-0074.
Full textSun, Yuan, Shuyue Fang, and Yujong Hwang. "Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce." Sustainability 11, no. 12 (June 15, 2019): 3311. http://dx.doi.org/10.3390/su11123311.
Full textLiu, Shuangji, Yongzhong Yang, and Yiwei Wang. "Integration of Museum User Behavior Information Based on Wireless Network." Mobile Information Systems 2021 (July 9, 2021): 1–8. http://dx.doi.org/10.1155/2021/6847144.
Full textRanganathan, C., DongBack Seo, and Yair Babad. "Switching behavior of mobile users: do users' relational investments and demographics matter?" European Journal of Information Systems 15, no. 3 (June 2006): 269–76. http://dx.doi.org/10.1057/palgrave.ejis.3000616.
Full textZhang, Pei Ying, Ya Jun Du, and Chang Wang. "Clustering Users According to Common Interest Based on User Search Behavior." Advanced Materials Research 143-144 (October 2010): 851–55. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.851.
Full textRuiz, Miguel E., and Pok Chin. "Users' seeking behavior and multilingual image tags." Proceedings of the American Society for Information Science and Technology 47, no. 1 (November 2010): 1–2. http://dx.doi.org/10.1002/meet.14504701407.
Full textFagan, Derek, Brian Caulfield, and René Meier. "Analyzing the Behavior of Smartphone Service Users." International Journal of Ambient Computing and Intelligence 5, no. 2 (April 2013): 1–16. http://dx.doi.org/10.4018/jaci.2013040101.
Full textDissertations / Theses on the topic "Users information behavior"
Li, Y. (Ying). "Users’ information systems (IS) security behavior in different contexts." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526209395.
Full textTiivistelmä Tietokoneenkäyttäjien tietoturvakäyttäytyminen on jatkuvan kiinnostuksen kohteena niin tutkijoiden kuin käytännön ammatinharjoittajienkin keskuudessa. Aiempi tutkimus on keskittynyt tarkastelemaan tietoturvakäyttäytymistä yleensä yhdessä kontekstissa (esim. työntekijöiden tietoturvaohjeiden noudattaminen organisaatiokontekstissa), kun taas vähemmälle huomiolle on jäänyt se, kuinka kontekstin muuttuminen selittää tietoturvakäyttäytymistä. Tämä väitöskirja vastaa kyseiseen ongelmaan, sillä se käsittelee kontekstin roolia tietoturvakäyttäytymistutkimuksessa. Tutkimuksessa analysoidaan organisaatiokontekstin ja kotikontekstin eroja. Analyysi osoittaa, että on tarpeellista tutkia tietokoneen käyttäjien tietoturvakäyttäytymistä tietyissä konteksteissa, kuten esimerkiksi kotikontekstissa. Tutkimus tarjoaa ohjeita siihen, kuinka kontekstisidonnaisia teorioita sovelletaan ja kehitetään tietoturvakäyttäytymistutkimuksessa. Väitöskirja sisältää 2 empiiristä tutkimusta, jotka pohjautuvat edellä mainittuihin ohjeisiin. Ensimmäisessä vaiheessa tutkimuksessa sovelletaan rational choice -teoriaa, jonka pohjalta vertaillaan tiettyä tietoturvakäyttäytymistyyppiä 2 kontekstissa: työkonteksti (N = 210) ja henkilökohtaisen käytön konteksti (N = 202). Toiseksi, tutkimus soveltaa stewardship -teoriaa ja kehittää siihen pohjautuen kontekstisidonnaisen teorian, joka selittää organisaation työntekijöiden käyttäytymistä liittyen tietoturvariskin ottamiseen (N = 170). Väitöskirjan tutkimustulokset esittävät erilaisia selityksiä tietokoneen käyttäjien tie-toturvakäyttäytymiselle eri konteksteissa. Tutkimus korostaa sitä, kuinka tärkeää on ottaa konteksti huomioon tutkittaessa tietoturvakäyttäytymistä. Kummankin empiirisen tutkimuksen tulokset tarjoavat teoreettisen kontribuution lisäksi käytännöllisiä neuvoja tietoturvan toteuttamiseen
Burns, Mary B. "Examining Multiple Stages of Protective Behavior of Information System End-Users." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/243094.
Full textBeaudoin, Joan Elizabeth Abels Eileen G. "An investigation of image users across professions : a framework of their image needs, retrieval and use /." Philadelphia, Pa. : Drexel University, 2009. http://hdl.handle.net/1860/3160.
Full textChumo, Caroline J. "A model web interface for youth in Tanzania /." Diss., Portal website, 2006. http://www.jeruto.org.
Full textWhite, Mel. "Information Seeking Behaviors in a Population of Assistive Mobility Device Users." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc799517/.
Full textEdwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.
Full textHadidi, Rachel. "Exploration of Information Sharing Structures within Makerspaces: A Mixed Methods Case Study of Dallas Makerspace and Its Users." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157598/.
Full textKenney, Brian Figa Elizabeth Gremore. "The transformative library a narrative inquiry into the outcomes of information use /." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9764.
Full textIlhan, Aylin [Verfasser], Wolfgang G. [Gutachter] Stock, and Gerhard [Gutachter] Reichmann. "Health Information Behavior of Activity Tracking Technologies Users / Aylin Ilhan ; Gutachter: Wolfgang G. Stock, Gerhard Reichmann." Düsseldorf : Universitäts- und Landesbibliothek der Heinrich-Heine-Universität Düsseldorf, 2021. http://d-nb.info/1225931940/34.
Full textGiwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.
Full textBooks on the topic "Users information behavior"
Association, Information Resources Management. Cyber behavior: Concepts, methodologies, tools, and applications. Hershey, PA: Information Science Reference, 2014.
Find full textSudatta, Chowdhury, ed. Information users and usability in the digital age. New York: Neal-Schuman Publishers, Inc., 2011.
Find full textWang luo shou zhong xin li xing wei yan jiu: Yi zhong xin xi cha xun de yan jiu fan shi. Beijing: Xin hua chu ban she, 2002.
Find full textSiegfried, Doreen. Nutzerbezogene Marktforschung für Bibliotheken: Eine Praxiseinführung. Berlin: De Gruyter Saur, 2014.
Find full textFoster, Jonathan. Collaborative information behavior: User engagement and communication sharing. Hershey PA: Information Science Reference, 2010.
Find full textFoster, Jonathan. Collaborative information behavior: User engagement and communication sharing. Hershey PA: Information Science Reference, 2010.
Find full textPlanning and implementing resource discovery tools in academic libraries. Hershey PA: Information Science Reference, 2012.
Find full textWood, Frances. Effect of postings information on user searching behaviour. Wetherby: British Library Research and Development Department, 1994.
Find full textWood, Frances. Effect of postings information on user searching behaviour. London: British Library Research and Development Department, 1994.
Find full textBarden, Phil. Information flows into industrial research: A survey of users' attitudes and behaviour, November 1989. [Boston Spa]: British Library Document Supply Centre, 1989.
Find full textBook chapters on the topic "Users information behavior"
Medjani, Fares. "Empirical Study of Algerian Web Users’ Behavior." In Lecture Notes in Business Information Processing, 55–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62737-3_5.
Full textKang, SeokHoon, Hangil Won, Gwanggil Jeon, and Young-Sup Lee. "Call Prediction Model Based on Smartphone Users Behavior." In Convergence and Hybrid Information Technology, 180–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32692-9_24.
Full textBen Chaabene, Nour El Houda, Amel Bouzeghoub, Ramzi Guetari, Samar Balti, and Henda Hajjami Ben Ghezala. "Detection of Users’ Abnormal Behavior on Social Networks." In Advanced Information Networking and Applications, 617–29. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44041-1_55.
Full textSpence, Mike, and Siobhán Clarke. "Improving Pervasive Application Behavior Using Other Users’ Information." In Case-Based Reasoning. Research and Development, 495–509. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14274-1_36.
Full textNguyen, Jimmy H., and Kim-Phuong L. Vu. "Does Privacy Information Influence Users’ Online Purchasing Behavior?" In Lecture Notes in Computer Science, 349–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21793-7_39.
Full textKaiya, Haruhiko, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, and Takafumi Tanaka. "Eliciting Requirements for Improving Users’ Behavior Using Transparency." In Communications in Computer and Information Science, 41–56. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7796-8_4.
Full textRen, Xiaoya, Guotao Hui, Yanhong Luo, Yingchun Wang, Dongsheng Yang, and Ge Qi. "Power Users Behavior Analysis and Application Based on Large Data." In Neural Information Processing, 105–14. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70139-4_11.
Full textVassilakaki, Evgenia, Emmanouel Garoufallou, Frances Johnson, and R. J. Hartley. "Users’ Information Search Behavior in a Professional Search Environment:." In Professional Search in the Modern World, 23–44. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12511-4_3.
Full textChiang, I.-Ping, and Sie-Yun Yang. "Exploring Users’ Information Behavior on Facebook Through Online and Mobile Devices." In Communications in Computer and Information Science, 354–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48319-0_28.
Full textJing, Xiaomin, Shaofu Lin, and Zhisheng Huang. "Research on the Behavior Pattern of Microblog “Tree Hole” Users with Their Temporal Characteristics." In Health Information Science, 25–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61951-0_3.
Full textConference papers on the topic "Users information behavior"
Machin Mastromatteo, Juan Daniel. "Exploring Users' Information Behavior in Social Networks." In Proceedings of the International Conference on QQML2010. WORLD SCIENTIFIC, 2011. http://dx.doi.org/10.1142/9789814350303_0021.
Full textYanbin, Liu, and Yuan Ping. "Processing Online Market Information Based on Users' Online Information Behavior." In 2010 Third International Symposium on Information Processing (ISIP). IEEE, 2010. http://dx.doi.org/10.1109/isip.2010.84.
Full textZou Jin and Yan Yu. "The study of information users satisfaction model based on the user behavior." In 2012 International Symposium on Information Technology in Medicine and Education (ITME 2012). IEEE, 2012. http://dx.doi.org/10.1109/itime.2012.6291469.
Full textShioda, Shigeo, and Yusuke Nakajima. "Information Spread across Social Network Services with Users’ Information Indifference Behavior." In 2019 11th Computer Science and Electronic Engineering (CEEC). IEEE, 2019. http://dx.doi.org/10.1109/ceec47804.2019.8974335.
Full textNiu, Guolin, Yi Long, and Victor O. K. Li. "Temporal Behavior of Social Network Users in Information Diffusion." In 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). IEEE, 2014. http://dx.doi.org/10.1109/wi-iat.2014.92.
Full textLi, Suming, and Xianqin Li. "A Personalized Recommendation Model Based on Users' Information Behavior." In 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/mmebc-16.2016.254.
Full textSrivastava, Varnika, Varuni Sutrave, and Bhaskarjyoti Das. "Predicting Users’ Adoptive Behavior From Review Data." In 2019 1st International Conference on Advances in Information Technology (ICAIT). IEEE, 2019. http://dx.doi.org/10.1109/icait47043.2019.8987351.
Full textChen, Yang. "Understanding how educational gamification impacts users' behavior." In ICIET '18: 2018 6th International Conference on Information and Education Technology. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3178158.3178188.
Full textWen, Li, Ping Lingdi, Lu Kuijun, and Chen Xiaoping. "Trust Model of Users' Behavior in Trustworthy Internet." In 2009 WASE International Conference on Information Engineering (ICIE). IEEE, 2009. http://dx.doi.org/10.1109/icie.2009.33.
Full textTawileh, Wissam. "Exploring web search behavior of Arab internet users." In 2011 International Conference on Innovations in Information Technology (IIT). IEEE, 2011. http://dx.doi.org/10.1109/innovations.2011.5893840.
Full textReports on the topic "Users information behavior"
Ravindran, Kaliappa. Tools for User-Assisted Behavioral Monitoring of Distributed Information Networks. Fort Belvoir, VA: Defense Technical Information Center, June 2005. http://dx.doi.org/10.21236/ada450972.
Full textSaito, Kazumi. Learnable Models for Information Diffusion and its Associated User Behavior in Micro-blogosphere. Fort Belvoir, VA: Defense Technical Information Center, August 2012. http://dx.doi.org/10.21236/ada578681.
Full textSarofim, Samer. Developing an Effective Targeted Mobile Application to Enhance Transportation Safety and Use of Active Transportation Modes in Fresno County: The Role of Application Design & Content. Mineta Transportation Institute, July 2021. http://dx.doi.org/10.31979/mti.2021.2013.
Full textSturzenegger, Germán, Cecilia Vidal, and Sebastián Martínez. The Last Mile Challenge of Sewage Services in Latin America and the Caribbean. Edited by Anastasiya Yarygina. Inter-American Development Bank, November 2020. http://dx.doi.org/10.18235/0002878.
Full text