Academic literature on the topic 'Users information behavior'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Users information behavior.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Users information behavior"

1

A. Kalisdha, A. Kalisdha. "Information Need and Information Seeking Behavior of Users in a Library and Information System." International Journal of Scientific Research 2, no. 11 (June 1, 2012): 274–76. http://dx.doi.org/10.15373/22778179/nov2013/87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chiang, I. Ping. "Exploring Smartphone Users’ Social Information Behavior." Contemporary Management Research 15, no. 1 (March 1, 2019): 53–67. http://dx.doi.org/10.7903/cmr.18461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huang, Chun-Yao, Yung-Cheng Shen, I.-Ping Chiang, and Chen-Shun Lin. "Characterizing Web users' online information behavior." Journal of the American Society for Information Science and Technology 58, no. 13 (2007): 1988–97. http://dx.doi.org/10.1002/asi.20669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wu, Dan, Rui Qiao, and Yi Li. "A study on location-based mobile map search behavior." Program 50, no. 3 (July 4, 2016): 246–69. http://dx.doi.org/10.1108/prog-11-2015-0074.

Full text
Abstract:
Purpose – Mobile users increasingly employ location-based map searches in their daily lives. However, it is still relatively unknown about mobile users’ map related search behaviors. The purpose of this paper is to discover the interactions between the users and mobile map search systems, to reveal the shortcomings of existing mobile map search functions, and to propose improvement suggestions. Design/methodology/approach – Based on a set of controlled user experiments performed on the Baidu mobile phone map, this paper empirically examines users’ location-based mobile search behaviors, such as timing, metering, judging and so on. This paper also conducts statistical correlation tests to generate relation tables and diagrams regarding each variable, for example, the relation between the retrieval time and the retrieval steps. Findings – The results indicate that mobile map users have two important characteristics in their search behaviors: first, mobile map users always follow the single search path. Second, the mobile map search efficiency of users is always low. Research limitations/implications – The situation simulation testing method is mainly used for the construction of a mobile information search behavior environment, which may make the users be nervous and have some effect on the search efficiency. Practical implications – Based on the identification of user behaviors, this paper provides suggestions to optimize and improve mobile map search systems. Originality/value – This paper studies users’ mobile map search behavior based on location and explores the features of user behavior from the perspective of human-computer interaction.
APA, Harvard, Vancouver, ISO, and other styles
5

Sun, Yuan, Shuyue Fang, and Yujong Hwang. "Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce." Sustainability 11, no. 12 (June 15, 2019): 3311. http://dx.doi.org/10.3390/su11123311.

Full text
Abstract:
Social e-commerce has steadily emerged as a current trend for an enormous amount of Internet users. Despite the popularity and prevalence of social e-commerce, many users hesitate to disclose their information due to privacy concerns. This resistance from users impedes the development of social e-commerce enterprises. In order to help enterprises collect more user information and establish better development strategies, this research builds on the Privacy Antecedent-Privacy Concern-Outcomes (APCO) model and the theory of privacy calculus. This research investigates how the privacy antecedents of hot topic interactivity and group buying experience influence users’ privacy concerns and perceived benefits as well as how to further influence users’ information disclosure behavior. The results from 406 questionnaire responses indicate that hot topic interactivity and group buying experience have significant negative impacts on privacy concerns and significant positive impacts on perceived benefits. Privacy concerns negatively influence the behavior of information disclosure while perceived benefits positively influence the behavior of information disclosure. Based on these results, social e-commerce enterprises should promote users’ behaviors of hot topic interactivity and group buying to stimulate users’ information disclosure behavior.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Shuangji, Yongzhong Yang, and Yiwei Wang. "Integration of Museum User Behavior Information Based on Wireless Network." Mobile Information Systems 2021 (July 9, 2021): 1–8. http://dx.doi.org/10.1155/2021/6847144.

Full text
Abstract:
Online museum information resource systems are getting popular these days which allow the users to get detailed information about the objects of their interest, and the user preferences are stored to search for related artifacts considering his/her online behavior. The behavior of users browsing online is integrated to capture relevant information which is integrated into museum information resources. Unfortunately, present implementations have errors in integration and optimization system, so a wireless network-based museum user behavior information integration system is proposed to calculate the user’s interest in museum’s cultural relics. The user behavior information resource model is developed based upon the degree of user interest, and forgetting functions with different decay rates are employed to describe changes in the interest level. This information is then used to construct users’ interest matrices. This matrix also contains information regarding the cultural relics that users have not yet visited. The system will introduce the interest weights of feature words to take the top features of the user behavior information for the integration of the users’ behavior and to combine the feature vectors that can represent the overall trajectory. Moreover, those feature vectors are described that can represent the local trajectory into feature vector to identify the slow-moving sparse targets, which is then utilized for the integration of users’ behavior information. The simulation tests prove that the proposed method can achieve low error in the integration process of user behavior information resources, thereby yielding good results.
APA, Harvard, Vancouver, ISO, and other styles
7

Ranganathan, C., DongBack Seo, and Yair Babad. "Switching behavior of mobile users: do users' relational investments and demographics matter?" European Journal of Information Systems 15, no. 3 (June 2006): 269–76. http://dx.doi.org/10.1057/palgrave.ejis.3000616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Pei Ying, Ya Jun Du, and Chang Wang. "Clustering Users According to Common Interest Based on User Search Behavior." Advanced Materials Research 143-144 (October 2010): 851–55. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.851.

Full text
Abstract:
The paper presents a novel method to cluster users who share the common interest and discover their common interest domain by mining different users’ search behaviors in the user session, mainly the consecutive search behavior and the click sequence considering the click order and the syntactic similarity. The community is generated and this information will be used in the recommendation system in the future. Also the method is ‘content-ignorant’ to avoid the storage and manipulation of a large amount of data when clustering the web pages by content. The experiment proved it an available and effective way.
APA, Harvard, Vancouver, ISO, and other styles
9

Ruiz, Miguel E., and Pok Chin. "Users' seeking behavior and multilingual image tags." Proceedings of the American Society for Information Science and Technology 47, no. 1 (November 2010): 1–2. http://dx.doi.org/10.1002/meet.14504701407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fagan, Derek, Brian Caulfield, and René Meier. "Analyzing the Behavior of Smartphone Service Users." International Journal of Ambient Computing and Intelligence 5, no. 2 (April 2013): 1–16. http://dx.doi.org/10.4018/jaci.2013040101.

Full text
Abstract:
This paper reports the findings of a study into the behavior of the users of a mobile service. The study analyses the behavior of travelers using a Smartphone application to access real-time transit information and contrasts such user behavior with that of users accessing a transit information service from a website. Previous research in this field has tended to focus upon the perceived benefits of providing real-time transit information and without investigating when and how often passengers would use such real-time transit information services. This paper specifically explores the behavior patterns of travelers using a Smartphone service and those of using a website to provide real-time transit information. Based on empirical data derived from real information services, the impact on user behavior of providing a mobile service is analyzed and contrasted to traditional Web-based service provision. The Smartphone service is furthermore used to conduct a passenger survey to obtain information on the individuals using the mobile service. The results of the analysis presented demonstrate that the demand for information from the website is constant throughout the working week whereas demand for Smartphone information increases during the week peaking during late afternoons and on Fridays. The results of the passenger survey demonstrate that over 80 percent of Smartphone application users are between 18 and 49 years of age and perhaps most importantly, that Smartphone survey questions are twice as likely to be answered compared to the response rates for Web or mail surveys.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Users information behavior"

1

Li, Y. (Ying). "Users’ information systems (IS) security behavior in different contexts." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526209395.

Full text
Abstract:
Abstract Users’ information systems (IS) security behavior continuously draws attentions from scholars and practitioners. While previous studies usually focused on one context (e.g., employees’ compliance with IS security policies in an organizational context), little research has focused on the possible explanations for users’ IS security behavior if the context changes. To address this gap, this dissertation discusses the role of context in IS security behavior research. An analysis of the differences between the organizational context and the home context suggests a need to study users’ IS security behavior solely in a specific context, such as home. This study provides guidelines for applying and developing contextualized theories in IS security behavior research. Based on the guidelines, this dissertation includes two empirical studies. First, drawing on rational choice theory, it compares specific IS security behavior in two contexts: the work context (N = 210) and the personal context (N = 202). Second, drawing on stewardship theory, this dissertation develops a contextualized theory explaining employees’ IS security risk-taking behavior in the organizational context (N = 170). The findings of this dissertation show different explanations for users’ IS security behavior in different contexts and highlight the importance of taking context into account when doing IS security behavior research. The results of each empirical study provide both theoretical contributions to research as well as actionable advice to practice
Tiivistelmä Tietokoneenkäyttäjien tietoturvakäyttäytyminen on jatkuvan kiinnostuksen kohteena niin tutkijoiden kuin käytännön ammatinharjoittajienkin keskuudessa. Aiempi tutkimus on keskittynyt tarkastelemaan tietoturvakäyttäytymistä yleensä yhdessä kontekstissa (esim. työntekijöiden tietoturvaohjeiden noudattaminen organisaatiokontekstissa), kun taas vähemmälle huomiolle on jäänyt se, kuinka kontekstin muuttuminen selittää tietoturvakäyttäytymistä. Tämä väitöskirja vastaa kyseiseen ongelmaan, sillä se käsittelee kontekstin roolia tietoturvakäyttäytymistutkimuksessa. Tutkimuksessa analysoidaan organisaatiokontekstin ja kotikontekstin eroja. Analyysi osoittaa, että on tarpeellista tutkia tietokoneen käyttäjien tietoturvakäyttäytymistä tietyissä konteksteissa, kuten esimerkiksi kotikontekstissa. Tutkimus tarjoaa ohjeita siihen, kuinka kontekstisidonnaisia teorioita sovelletaan ja kehitetään tietoturvakäyttäytymistutkimuksessa. Väitöskirja sisältää 2 empiiristä tutkimusta, jotka pohjautuvat edellä mainittuihin ohjeisiin. Ensimmäisessä vaiheessa tutkimuksessa sovelletaan rational choice -teoriaa, jonka pohjalta vertaillaan tiettyä tietoturvakäyttäytymistyyppiä 2 kontekstissa: työkonteksti (N = 210) ja henkilökohtaisen käytön konteksti (N = 202). Toiseksi, tutkimus soveltaa stewardship -teoriaa ja kehittää siihen pohjautuen kontekstisidonnaisen teorian, joka selittää organisaation työntekijöiden käyttäytymistä liittyen tietoturvariskin ottamiseen (N = 170). Väitöskirjan tutkimustulokset esittävät erilaisia selityksiä tietokoneen käyttäjien tie-toturvakäyttäytymiselle eri konteksteissa. Tutkimus korostaa sitä, kuinka tärkeää on ottaa konteksti huomioon tutkittaessa tietoturvakäyttäytymistä. Kummankin empiirisen tutkimuksen tulokset tarjoavat teoreettisen kontribuution lisäksi käytännöllisiä neuvoja tietoturvan toteuttamiseen
APA, Harvard, Vancouver, ISO, and other styles
2

Burns, Mary B. "Examining Multiple Stages of Protective Behavior of Information System End-Users." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/243094.

Full text
Abstract:
The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not always change their habits due to actual or perceived obstacles, for example. In this study, user behavior, particularly with respect to vigilance over phishing attempts, was investigated via the theoretical lens of a hybrid continuum-stage behavior change model adapted from health-related fields. This type of model helps us to understand whether there are qualitatively different stages for adopting a more vigilant action plan toward phishing attempts, the number and ordering of distinct stages that a user must move through between forming an intention and subsequent behavior, what characterizes those stages, and how appropriate interventions at these stages can move a user to a higher stage of vigilant behavior. The goal of this research was to gain a better understanding of: a) whether there are distinct stages that distinguish end-users' vigilance toward phishing attempts; b) how many qualitatively different stages there are; and, c) what characterizes these stages. This study profiled IS end-users based on the model's constructs (e.g., coping self-efficacy, intention, action/coping planning, and risk perception) that examined end-users' protective behavior toward phishing attempts. In an exploratory analysis of survey data, stages of IS end-users were determined via cluster analysis techniques (hierarchical followed by K-means). A survey was administered to respondents (n= 394). Next, an agglomerative hierarchical cluster analysis using within-groups method of average linkage and Euclidean distance measures was performed on the model's constructs. Three clusters emerged as the optimal number to be used in the subsequent K-means cluster analysis. After conducting analyses for stability and validity for the 3-cluster solution, I compared the means of the model's constructs to develop profiles for the distinct three stages. I conclude that exploratory cluster analysis is an effective technique to discover natural groupings for protective behavior of IS end-users and propose future research to investigate stage-appropriate interventions to move users to higher stages.
APA, Harvard, Vancouver, ISO, and other styles
3

Beaudoin, Joan Elizabeth Abels Eileen G. "An investigation of image users across professions : a framework of their image needs, retrieval and use /." Philadelphia, Pa. : Drexel University, 2009. http://hdl.handle.net/1860/3160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chumo, Caroline J. "A model web interface for youth in Tanzania /." Diss., Portal website, 2006. http://www.jeruto.org.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

White, Mel. "Information Seeking Behaviors in a Population of Assistive Mobility Device Users." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc799517/.

Full text
Abstract:
The author explores the current state of information exchange and access in the procurement process for mobility assistive equipment. While the idealized model is of a linear process starting with a need and ending with the purchase, in practice the procedures for acquiring a device such as a wheelchair or electric scooter can be a time consuming task that involves client, family, medical care specialists, vendors, manufacturers, insurance companies and possibly alternate sources of funding. This study utilized Participatory Action Research (PAR) to collect both qualitative and quantitative data about information sources such as the Internet, the medical community, and vendors. The findings of this study suggest that in spite of the presence of the Internet, overall primary sources are similar to the traditional model and that for most there is no one source that could be easily accessed for information. A brief examination is made of the “Information landscape” utilized in the process and a brief discussion of two relatively unmentioned information sources: expos and the wheelchair sports community.
APA, Harvard, Vancouver, ISO, and other styles
6

Edwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.

Full text
Abstract:
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the incentive to take security awareness training on their own. Research in security awareness and security behavior has produced conflicting results. Therefore, it is not clear, how security aware home computer users are or to what extent security awareness affects the security behavior of home computer users. The goal of this study was to determine if there is a relationship between security awareness and users practicing good security behavior. This study adapted its research model from the health belief model (HBM), which accesses a patient’s decision to perform health related activities. The research model included the HBM constructs of perceived severity, perceived susceptibility, perceived threat, perceived benefits, perceived barriers, cues to action, and self-efficacy. The research model also contained the security awareness (SA) and concern for information privacy (CFIP) constructs. The model used SA to ascertain the effect of security awareness on a person’s self-efficacy in information security (SEIS), perceived threat, CFIP, and security behavior. The research model included CFIP to ascertain its effect on security behavior. The developed survey measured the participants' security awareness, concern for information privacy, self-efficacy, expectations of security actions, perceived security threats, cues to action, and security behavior. SurveyMonkey administered the survey. SurveyMonkey randomly selected 267 participants from its 30 million-member base. The findings of this study indicate home computer users are security aware. SA does not have a direct effect on a user’s security behavior, perceived threat, or CFIP. However, it does have influence on SEIS. SEIS has a weak effect on expectations. CFIP has an effect on a user’s security behavior after removing perceived threat from the research model. Perceived susceptibility has a direct effect on a user’s security behavior, but perceived severity or perceived threat does not.
APA, Harvard, Vancouver, ISO, and other styles
7

Hadidi, Rachel. "Exploration of Information Sharing Structures within Makerspaces: A Mixed Methods Case Study of Dallas Makerspace and Its Users." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157598/.

Full text
Abstract:
Makerspaces are a popular, new concept being implemented in public, academic, and school libraries, and as stand-alone spaces. The literature reflects the newness of the topic with a limited number of articles and studies and even less about the users of makerspaces themselves. This study explored information sharing behaviors in the Dallas Makerspace as an informal learning environment and described their preferred method of information transfer from one member to another. It employed a mixed methods methodology using surveys, interviews and observations. The study identified how the rules and policies in place at the makerspace influence the information seeking process and how the Dallas Makerspace exchanges information effectively. Dallas Makerspace is one of the largest non-profit work groups in its size, and this research study answers how information is exchanged in an informal environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Kenney, Brian Figa Elizabeth Gremore. "The transformative library a narrative inquiry into the outcomes of information use /." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ilhan, Aylin [Verfasser], Wolfgang G. [Gutachter] Stock, and Gerhard [Gutachter] Reichmann. "Health Information Behavior of Activity Tracking Technologies Users / Aylin Ilhan ; Gutachter: Wolfgang G. Stock, Gerhard Reichmann." Düsseldorf : Universitäts- und Landesbibliothek der Heinrich-Heine-Universität Düsseldorf, 2021. http://d-nb.info/1225931940/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Giwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.

Full text
Abstract:
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Users information behavior"

1

Association, Information Resources Management. Cyber behavior: Concepts, methodologies, tools, and applications. Hershey, PA: Information Science Reference, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sudatta, Chowdhury, ed. Information users and usability in the digital age. New York: Neal-Schuman Publishers, Inc., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang luo shou zhong xin li xing wei yan jiu: Yi zhong xin xi cha xun de yan jiu fan shi. Beijing: Xin hua chu ban she, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Siegfried, Doreen. Nutzerbezogene Marktforschung für Bibliotheken: Eine Praxiseinführung. Berlin: De Gruyter Saur, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Foster, Jonathan. Collaborative information behavior: User engagement and communication sharing. Hershey PA: Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Foster, Jonathan. Collaborative information behavior: User engagement and communication sharing. Hershey PA: Information Science Reference, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Planning and implementing resource discovery tools in academic libraries. Hershey PA: Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wood, Frances. Effect of postings information on user searching behaviour. Wetherby: British Library Research and Development Department, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wood, Frances. Effect of postings information on user searching behaviour. London: British Library Research and Development Department, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Barden, Phil. Information flows into industrial research: A survey of users' attitudes and behaviour, November 1989. [Boston Spa]: British Library Document Supply Centre, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Users information behavior"

1

Medjani, Fares. "Empirical Study of Algerian Web Users’ Behavior." In Lecture Notes in Business Information Processing, 55–63. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-62737-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kang, SeokHoon, Hangil Won, Gwanggil Jeon, and Young-Sup Lee. "Call Prediction Model Based on Smartphone Users Behavior." In Convergence and Hybrid Information Technology, 180–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32692-9_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ben Chaabene, Nour El Houda, Amel Bouzeghoub, Ramzi Guetari, Samar Balti, and Henda Hajjami Ben Ghezala. "Detection of Users’ Abnormal Behavior on Social Networks." In Advanced Information Networking and Applications, 617–29. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44041-1_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spence, Mike, and Siobhán Clarke. "Improving Pervasive Application Behavior Using Other Users’ Information." In Case-Based Reasoning. Research and Development, 495–509. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14274-1_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nguyen, Jimmy H., and Kim-Phuong L. Vu. "Does Privacy Information Influence Users’ Online Purchasing Behavior?" In Lecture Notes in Computer Science, 349–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21793-7_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kaiya, Haruhiko, Nobukazu Yoshioka, Hironori Washizaki, Takao Okubo, Atsuo Hazeyama, Shinpei Ogata, and Takafumi Tanaka. "Eliciting Requirements for Improving Users’ Behavior Using Transparency." In Communications in Computer and Information Science, 41–56. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7796-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ren, Xiaoya, Guotao Hui, Yanhong Luo, Yingchun Wang, Dongsheng Yang, and Ge Qi. "Power Users Behavior Analysis and Application Based on Large Data." In Neural Information Processing, 105–14. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70139-4_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vassilakaki, Evgenia, Emmanouel Garoufallou, Frances Johnson, and R. J. Hartley. "Users’ Information Search Behavior in a Professional Search Environment:." In Professional Search in the Modern World, 23–44. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-12511-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chiang, I.-Ping, and Sie-Yun Yang. "Exploring Users’ Information Behavior on Facebook Through Online and Mobile Devices." In Communications in Computer and Information Science, 354–62. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-48319-0_28.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jing, Xiaomin, Shaofu Lin, and Zhisheng Huang. "Research on the Behavior Pattern of Microblog “Tree Hole” Users with Their Temporal Characteristics." In Health Information Science, 25–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-61951-0_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Users information behavior"

1

Machin Mastromatteo, Juan Daniel. "Exploring Users' Information Behavior in Social Networks." In Proceedings of the International Conference on QQML2010. WORLD SCIENTIFIC, 2011. http://dx.doi.org/10.1142/9789814350303_0021.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yanbin, Liu, and Yuan Ping. "Processing Online Market Information Based on Users' Online Information Behavior." In 2010 Third International Symposium on Information Processing (ISIP). IEEE, 2010. http://dx.doi.org/10.1109/isip.2010.84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zou Jin and Yan Yu. "The study of information users satisfaction model based on the user behavior." In 2012 International Symposium on Information Technology in Medicine and Education (ITME 2012). IEEE, 2012. http://dx.doi.org/10.1109/itime.2012.6291469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shioda, Shigeo, and Yusuke Nakajima. "Information Spread across Social Network Services with Users’ Information Indifference Behavior." In 2019 11th Computer Science and Electronic Engineering (CEEC). IEEE, 2019. http://dx.doi.org/10.1109/ceec47804.2019.8974335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Niu, Guolin, Yi Long, and Victor O. K. Li. "Temporal Behavior of Social Network Users in Information Diffusion." In 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). IEEE, 2014. http://dx.doi.org/10.1109/wi-iat.2014.92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Suming, and Xianqin Li. "A Personalized Recommendation Model Based on Users' Information Behavior." In 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/mmebc-16.2016.254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Srivastava, Varnika, Varuni Sutrave, and Bhaskarjyoti Das. "Predicting Users’ Adoptive Behavior From Review Data." In 2019 1st International Conference on Advances in Information Technology (ICAIT). IEEE, 2019. http://dx.doi.org/10.1109/icait47043.2019.8987351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Yang. "Understanding how educational gamification impacts users' behavior." In ICIET '18: 2018 6th International Conference on Information and Education Technology. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3178158.3178188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wen, Li, Ping Lingdi, Lu Kuijun, and Chen Xiaoping. "Trust Model of Users' Behavior in Trustworthy Internet." In 2009 WASE International Conference on Information Engineering (ICIE). IEEE, 2009. http://dx.doi.org/10.1109/icie.2009.33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tawileh, Wissam. "Exploring web search behavior of Arab internet users." In 2011 International Conference on Innovations in Information Technology (IIT). IEEE, 2011. http://dx.doi.org/10.1109/innovations.2011.5893840.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Users information behavior"

1

Ravindran, Kaliappa. Tools for User-Assisted Behavioral Monitoring of Distributed Information Networks. Fort Belvoir, VA: Defense Technical Information Center, June 2005. http://dx.doi.org/10.21236/ada450972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saito, Kazumi. Learnable Models for Information Diffusion and its Associated User Behavior in Micro-blogosphere. Fort Belvoir, VA: Defense Technical Information Center, August 2012. http://dx.doi.org/10.21236/ada578681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sarofim, Samer. Developing an Effective Targeted Mobile Application to Enhance Transportation Safety and Use of Active Transportation Modes in Fresno County: The Role of Application Design & Content. Mineta Transportation Institute, July 2021. http://dx.doi.org/10.31979/mti.2021.2013.

Full text
Abstract:
This research empirically investigates the need for, and the effective design and content of, a proposed mobile application that is targeted at pedestrians and cyclists in Fresno County. The differential effect of the proposed mobile app name and colors on the target audience opinions was examined. Further, app content and features were evaluated for importance and the likelihood of use. This included design appeal, attractiveness, relevance, ease of navigation, usefulness of functions, personalization and customization, message recipients’ attitudes towards message framing, and intended behaviors related to pedestrian, cyclist, and motorist traffic safety practices. Design mobile application features tested included image aesthetics, coherence and organization, and memorability and distinction. Potential engagement with the mobile app was assessed via measuring the users’ perceived enjoyment while using the app. The behavioral intentions to adopt the app and likelihood to recommend the app were assessed. The willingness to pay for purchasing the app was measured. This research provided evidence that a mobile application designed for pedestrians and cyclists is needed, with high intentions for its adoption. Functions, such as Safety Information, Weather Conditions, Guide to Trails, Events for Walkers and Bikers, and Promotional Offers are deemed important by the target population. This research was conducted in an effort to increase active transportation mode utilization and to enhance the safety of vulnerable road users. The public, city administrators, transportation authorities, and policy makers shall benefit from the results of this study by adapting the design and the features that are proposed in this research and were found appealing and useful for the target vulnerable road user groups. The need of the proposed mobile application and its main functions are established, based on the results of this research, which propagates further steps of implementation by city administrators and transportation authorities.
APA, Harvard, Vancouver, ISO, and other styles
4

Sturzenegger, Germán, Cecilia Vidal, and Sebastián Martínez. The Last Mile Challenge of Sewage Services in Latin America and the Caribbean. Edited by Anastasiya Yarygina. Inter-American Development Bank, November 2020. http://dx.doi.org/10.18235/0002878.

Full text
Abstract:
Access to piped sewage in Latin America and the Caribbean (LAC) cities has been on the rise in recent decades. Yet achieving high rates of end-user connection between dwellings and sewage pipelines remains a challenge for water and sanitation utilities. Governments throughout the region are investing millions in increasing access to sewage services but are failing in the last mile. When households do not connect to the sewage system, the full health and social benefits of sanitation investments fail to accrue, and utilities can face lost revenue and higher operating costs. Barriers to connect are diverse, including low willingness to pay for connection costs and/or the associated tariffs, liquidity and credit constrains to cover the cost of upgrades or repairs, information gaps on the benefits of connecting, behavioral obstacles, and collective action failures. In contexts of weak regulation and strong social pressure, utilities typically lack the ability to enforce connection through fines and legal action. This paper explores the scope of the connectivity problem, identifies potential connection barriers, and discusses policy solutions. A research agenda is proposed in support of evidence-based interventions that have the potential to achieve higher effective sanitation coverage more rapidly and cost-effectively in LAC. This research agenda must focus on: i) quantifying the scope of the problem; ii) understanding the barriers that trigger it; and iii) identifying the most cost-effective policy and market-based solutions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography