To see the other types of publications on this topic, follow the link: Users information behavior.

Dissertations / Theses on the topic 'Users information behavior'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Users information behavior.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Y. (Ying). "Users’ information systems (IS) security behavior in different contexts." Doctoral thesis, Oulun yliopisto, 2015. http://urn.fi/urn:isbn:9789526209395.

Full text
Abstract:
Abstract Users’ information systems (IS) security behavior continuously draws attentions from scholars and practitioners. While previous studies usually focused on one context (e.g., employees’ compliance with IS security policies in an organizational context), little research has focused on the possible explanations for users’ IS security behavior if the context changes. To address this gap, this dissertation discusses the role of context in IS security behavior research. An analysis of the differences between the organizational context and the home context suggests a need to study users’ IS security behavior solely in a specific context, such as home. This study provides guidelines for applying and developing contextualized theories in IS security behavior research. Based on the guidelines, this dissertation includes two empirical studies. First, drawing on rational choice theory, it compares specific IS security behavior in two contexts: the work context (N = 210) and the personal context (N = 202). Second, drawing on stewardship theory, this dissertation develops a contextualized theory explaining employees’ IS security risk-taking behavior in the organizational context (N = 170). The findings of this dissertation show different explanations for users’ IS security behavior in different contexts and highlight the importance of taking context into account when doing IS security behavior research. The results of each empirical study provide both theoretical contributions to research as well as actionable advice to practice
Tiivistelmä Tietokoneenkäyttäjien tietoturvakäyttäytyminen on jatkuvan kiinnostuksen kohteena niin tutkijoiden kuin käytännön ammatinharjoittajienkin keskuudessa. Aiempi tutkimus on keskittynyt tarkastelemaan tietoturvakäyttäytymistä yleensä yhdessä kontekstissa (esim. työntekijöiden tietoturvaohjeiden noudattaminen organisaatiokontekstissa), kun taas vähemmälle huomiolle on jäänyt se, kuinka kontekstin muuttuminen selittää tietoturvakäyttäytymistä. Tämä väitöskirja vastaa kyseiseen ongelmaan, sillä se käsittelee kontekstin roolia tietoturvakäyttäytymistutkimuksessa. Tutkimuksessa analysoidaan organisaatiokontekstin ja kotikontekstin eroja. Analyysi osoittaa, että on tarpeellista tutkia tietokoneen käyttäjien tietoturvakäyttäytymistä tietyissä konteksteissa, kuten esimerkiksi kotikontekstissa. Tutkimus tarjoaa ohjeita siihen, kuinka kontekstisidonnaisia teorioita sovelletaan ja kehitetään tietoturvakäyttäytymistutkimuksessa. Väitöskirja sisältää 2 empiiristä tutkimusta, jotka pohjautuvat edellä mainittuihin ohjeisiin. Ensimmäisessä vaiheessa tutkimuksessa sovelletaan rational choice -teoriaa, jonka pohjalta vertaillaan tiettyä tietoturvakäyttäytymistyyppiä 2 kontekstissa: työkonteksti (N = 210) ja henkilökohtaisen käytön konteksti (N = 202). Toiseksi, tutkimus soveltaa stewardship -teoriaa ja kehittää siihen pohjautuen kontekstisidonnaisen teorian, joka selittää organisaation työntekijöiden käyttäytymistä liittyen tietoturvariskin ottamiseen (N = 170). Väitöskirjan tutkimustulokset esittävät erilaisia selityksiä tietokoneen käyttäjien tie-toturvakäyttäytymiselle eri konteksteissa. Tutkimus korostaa sitä, kuinka tärkeää on ottaa konteksti huomioon tutkittaessa tietoturvakäyttäytymistä. Kummankin empiirisen tutkimuksen tulokset tarjoavat teoreettisen kontribuution lisäksi käytännöllisiä neuvoja tietoturvan toteuttamiseen
APA, Harvard, Vancouver, ISO, and other styles
2

Burns, Mary B. "Examining Multiple Stages of Protective Behavior of Information System End-Users." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/243094.

Full text
Abstract:
The adage, "old habits die hard", is especially relevant when humans learn new protective behaviors (i.e., dental flossing, IS security behaviors). The foundation that underlies many social-cognitive theories used in IS research is that intention to change predicts actual behavior change. Despite intentions to change, humans do not always change their habits due to actual or perceived obstacles, for example. In this study, user behavior, particularly with respect to vigilance over phishing attempts, was investigated via the theoretical lens of a hybrid continuum-stage behavior change model adapted from health-related fields. This type of model helps us to understand whether there are qualitatively different stages for adopting a more vigilant action plan toward phishing attempts, the number and ordering of distinct stages that a user must move through between forming an intention and subsequent behavior, what characterizes those stages, and how appropriate interventions at these stages can move a user to a higher stage of vigilant behavior. The goal of this research was to gain a better understanding of: a) whether there are distinct stages that distinguish end-users' vigilance toward phishing attempts; b) how many qualitatively different stages there are; and, c) what characterizes these stages. This study profiled IS end-users based on the model's constructs (e.g., coping self-efficacy, intention, action/coping planning, and risk perception) that examined end-users' protective behavior toward phishing attempts. In an exploratory analysis of survey data, stages of IS end-users were determined via cluster analysis techniques (hierarchical followed by K-means). A survey was administered to respondents (n= 394). Next, an agglomerative hierarchical cluster analysis using within-groups method of average linkage and Euclidean distance measures was performed on the model's constructs. Three clusters emerged as the optimal number to be used in the subsequent K-means cluster analysis. After conducting analyses for stability and validity for the 3-cluster solution, I compared the means of the model's constructs to develop profiles for the distinct three stages. I conclude that exploratory cluster analysis is an effective technique to discover natural groupings for protective behavior of IS end-users and propose future research to investigate stage-appropriate interventions to move users to higher stages.
APA, Harvard, Vancouver, ISO, and other styles
3

Beaudoin, Joan Elizabeth Abels Eileen G. "An investigation of image users across professions : a framework of their image needs, retrieval and use /." Philadelphia, Pa. : Drexel University, 2009. http://hdl.handle.net/1860/3160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chumo, Caroline J. "A model web interface for youth in Tanzania /." Diss., Portal website, 2006. http://www.jeruto.org.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

White, Mel. "Information Seeking Behaviors in a Population of Assistive Mobility Device Users." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc799517/.

Full text
Abstract:
The author explores the current state of information exchange and access in the procurement process for mobility assistive equipment. While the idealized model is of a linear process starting with a need and ending with the purchase, in practice the procedures for acquiring a device such as a wheelchair or electric scooter can be a time consuming task that involves client, family, medical care specialists, vendors, manufacturers, insurance companies and possibly alternate sources of funding. This study utilized Participatory Action Research (PAR) to collect both qualitative and quantitative data about information sources such as the Internet, the medical community, and vendors. The findings of this study suggest that in spite of the presence of the Internet, overall primary sources are similar to the traditional model and that for most there is no one source that could be easily accessed for information. A brief examination is made of the “Information landscape” utilized in the process and a brief discussion of two relatively unmentioned information sources: expos and the wheelchair sports community.
APA, Harvard, Vancouver, ISO, and other styles
6

Edwards, Keith. "Examining the Security Awareness, Information Privacy, and the Security Behaviors of Home Computer Users." NSUWorks, 2015. http://nsuworks.nova.edu/gscis_etd/947.

Full text
Abstract:
Attacks on computer systems continue to be a problem. The majority of the attacks target home computer users. To help mitigate the attacks some companies provide security awareness training to their employees. However, not all people work for a company that provides security awareness training and typically, home computer users do not have the incentive to take security awareness training on their own. Research in security awareness and security behavior has produced conflicting results. Therefore, it is not clear, how security aware home computer users are or to what extent security awareness affects the security behavior of home computer users. The goal of this study was to determine if there is a relationship between security awareness and users practicing good security behavior. This study adapted its research model from the health belief model (HBM), which accesses a patient’s decision to perform health related activities. The research model included the HBM constructs of perceived severity, perceived susceptibility, perceived threat, perceived benefits, perceived barriers, cues to action, and self-efficacy. The research model also contained the security awareness (SA) and concern for information privacy (CFIP) constructs. The model used SA to ascertain the effect of security awareness on a person’s self-efficacy in information security (SEIS), perceived threat, CFIP, and security behavior. The research model included CFIP to ascertain its effect on security behavior. The developed survey measured the participants' security awareness, concern for information privacy, self-efficacy, expectations of security actions, perceived security threats, cues to action, and security behavior. SurveyMonkey administered the survey. SurveyMonkey randomly selected 267 participants from its 30 million-member base. The findings of this study indicate home computer users are security aware. SA does not have a direct effect on a user’s security behavior, perceived threat, or CFIP. However, it does have influence on SEIS. SEIS has a weak effect on expectations. CFIP has an effect on a user’s security behavior after removing perceived threat from the research model. Perceived susceptibility has a direct effect on a user’s security behavior, but perceived severity or perceived threat does not.
APA, Harvard, Vancouver, ISO, and other styles
7

Hadidi, Rachel. "Exploration of Information Sharing Structures within Makerspaces: A Mixed Methods Case Study of Dallas Makerspace and Its Users." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157598/.

Full text
Abstract:
Makerspaces are a popular, new concept being implemented in public, academic, and school libraries, and as stand-alone spaces. The literature reflects the newness of the topic with a limited number of articles and studies and even less about the users of makerspaces themselves. This study explored information sharing behaviors in the Dallas Makerspace as an informal learning environment and described their preferred method of information transfer from one member to another. It employed a mixed methods methodology using surveys, interviews and observations. The study identified how the rules and policies in place at the makerspace influence the information seeking process and how the Dallas Makerspace exchanges information effectively. Dallas Makerspace is one of the largest non-profit work groups in its size, and this research study answers how information is exchanged in an informal environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Kenney, Brian Figa Elizabeth Gremore. "The transformative library a narrative inquiry into the outcomes of information use /." [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ilhan, Aylin [Verfasser], Wolfgang G. [Gutachter] Stock, and Gerhard [Gutachter] Reichmann. "Health Information Behavior of Activity Tracking Technologies Users / Aylin Ilhan ; Gutachter: Wolfgang G. Stock, Gerhard Reichmann." Düsseldorf : Universitäts- und Landesbibliothek der Heinrich-Heine-Universität Düsseldorf, 2021. http://d-nb.info/1225931940/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Giwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.

Full text
Abstract:
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
APA, Harvard, Vancouver, ISO, and other styles
11

Bizid, Imen. "Prominent microblog users prediction during crisis events : using phase-aware and temporal modeling of users behavior." Thesis, La Rochelle, 2016. http://www.theses.fr/2016LAROS026/document.

Full text
Abstract:
Durant les situations de crise, telles que les catastrophes, le besoin de recherche d’informations (RI) pertinentes partagées dans les microblogs en temps réel est inévitable. Cependant, le grand volume et la variété des flux d’informations partagées en temps réel dans de telles situations compliquent cette tâche. Contrairement aux approches existantes de RI basées sur l’analyse du contenu, nous proposons de nous attaquer à ce problème en nous basant sur les approches centrées utilisateurs tout en levant un certain nombre de verrous méthodologiques et technologiques inhérents : 1) à la collection des données partagées par les utilisateurs à évaluer, 2) à la modélisation de leurs comportements, 3) à l’analyse des comportements, et 4) à la prédiction et le suivi des utilisateurs primordiaux en temps réel. Dans ce contexte, nous détaillons les approches proposées dans cette thèse afin de prédire les utilisateurs primordiaux qui sont susceptibles de partager les informations pertinentes et exclusives ciblées et de permettre aux intervenants d’urgence d’accéder aux informations requises quel que soit le format (i.e. texte, image, vidéo, lien hypertexte) et en temps réel. Ces approches sont centrées sur trois principaux aspects. Nous avons tout d’abord étudié l’efficacité de différentes catégories de mesures issues de la littérature et proposées dans cette thèse pour représenter le comportement des utilisateurs. En nous basant sur les mesures pertinentes résultant de cette étude, nous concevons des nouvelles caractéristiques permettant de mettre en évidence la qualité des informations partagées par les utilisateurs selon leurs comportements. Le deuxième aspect consiste à proposer une approche de modélisation du comportement de chaque utilisateur en nous basant sur les critères suivants : 1) la modélisation des utilisateurs selon l’évolution de l’évènement, 2) la modélisation de l’évolution des activités des utilisateurs au fil du temps à travers une représentation sensible au temps, 3) la sélection des caractéristiques les plus discriminantes pour chaque phase de l’évènement. En se basant sur cette approche de modélisation, nous entraînons différents modèles de prédiction qui apprennent à différencier les comportements des utilisateurs primordiaux de ceux qui ne le sont pas durant les situations de crise. Les algorithmes SVM et MOG-HMMs ont été utilisés durant la phase d’apprentissage. La pertinence et l’efficacité des modèles de prédiction appris ont été validées à l’aide des données collectées par notre système multi-agents MASIR durant deux inondations qui ont eu lieu en France et des vérités terrain appropriées à ces collections
During crisis events such as disasters, the need of real-time information retrieval (IR) from microblogs remains inevitable. However, the huge amount and the variety of the shared information in real time during such events over-complicate this task. Unlike existing IR approaches based on content analysis, we propose to tackle this problem by using user-centricIR approaches with solving the wide spectrum of methodological and technological barriers inherent to : 1) the collection of the evaluated users data, 2) the modeling of user behavior, 3) the analysis of user behavior, and 4) the prediction and tracking of prominent users in real time. In this context, we detail the different proposed approaches in this dissertation leading to the prediction of prominent users who are susceptible to share the targeted relevant and exclusive information on one hand and enabling emergency responders to have a real-time access to the required information in all formats (i.e. text, image, video, links) on the other hand. These approaches focus on three key aspects of prominent users identification. Firstly, we have studied the efficiency of state-of-the-art and new proposed raw features for characterizing user behavior during crisis events. Based on the selected features, we have designed several engineered features qualifying user activities by considering both their on-topic and off-topic shared information. Secondly, we have proposed a phase-aware user modeling approach taking into account the user behavior change according to the event evolution over time. This user modeling approach comprises the following new novel aspects (1) Modeling microblog users behavior evolution by considering the different event phases (2) Characterizing users activity over time through a temporal sequence representation (3) Time-series-based selection of the most discriminative features characterizing users at each event phase. Thirdly, based on this proposed user modeling approach, we train various prediction models to learn to differentiate between prominent and non-prominent users behavior during crisis event. The learning task has been performed using SVM and MoG-HMMs supervised machine learning algorithms. The efficiency and efficacy of these prediction models have been validated thanks to the data collections extracted by our multi-agents system MASIR during two flooding events who have occured in France and the different ground-truths related to these collections
APA, Harvard, Vancouver, ISO, and other styles
12

Kong, Wei. "EXPLORING HEALTH WEBSITE USERS BY WEB MINING." Thesis, Universal Access in Human-Computer Interaction. Applications and Services Lecture Notes in Computer Science, 2011, Volume 6768/2011, 376-383, DOI: 10.1007/978-3-642-21657-2_40, 2011. http://hdl.handle.net/1805/2810.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)
With the continuous growth of health information on the Internet, providing user-orientated health service online has become a great challenge to health providers. Understanding the information needs of the users is the first step to providing tailored health service. The purpose of this study is to examine the navigation behavior of different user groups by extracting their search terms and to make some suggestions to reconstruct a website for more customized Web service. This study analyzed five months’ of daily access weblog files from one local health provider’s website, discovered the most popular general topics and health related topics, and compared the information search strategies for both patient/consumer and doctor groups. Our findings show that users are not searching health information as much as was thought. The top two health topics which patients are concerned about are children’s health and occupational health. Another topic that both user groups are interested in is medical records. Also, patients and doctors have different search strategies when looking for information on this website. Patients get back to the previous page more often, while doctors usually go to the final page directly and then leave the page without coming back. As a result, some suggestions to redesign and improve the website are discussed; a more intuitive portal and more customized links for both user groups are suggested.
APA, Harvard, Vancouver, ISO, and other styles
13

Saqr, Raneem. "Blind and Visually Impaired Users Adaptation to Web Environments: A Qualitative Study." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6380.

Full text
Abstract:
Although much research exists on human behavior in online environments, research on users with disabilities is still rare. To draw more attention to this population, this dissertation explored browsing patterns and adaptive behaviors of people with visual disability across different online environments common in daily activities: social network, e-commerce, online information, and search engines’ websites. The main objective of this study is to propose a conceptual framework of how blind and visually impaired users browse and adapt to different web environments. We achieve this objective using a qualitative approach through three studies. In the first study, the researchers collect data by means of in-depth, semi-structured interviews with six users with different levels of visual impairment. In the second study, we use survey questionnaires with open-ended questions to reach a larger sample of study participants. Finally, we conduct a follow-up observational study as means to confirm our results. Open, axial, and selective coding are used for data reduction and analysis as part of the grounded theory method.
APA, Harvard, Vancouver, ISO, and other styles
14

Al, Smadi Duha. "Information Sharing and Storage Behavior via Cloud Computing: Security and Privacy in Research and Practice and Users' Trust." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1505164/.

Full text
Abstract:
This research contributes to the cloud computing (CC) literature and information science research by addressing the reality of information sharing and storage behavior (ISSB) of the users' personal information via CC. Gathering information about usage also allows this research to address the paradox between the research and practice. Additionally, this research explores the concept of trust and its role in the behavioral change relative to CC. The findings help reconcile the paradox between the two realms. Essay1 develops and tests cloud computing usage model (CCUM) that assesses ISSB. This model considers the main adoption determinants and the main drawbacks of CC. The study measures the main concerns of users found in the literature, perceived security and perceived privacy. The findings prove surprising on these concerns. Using multiple regression to analyze 129 valid survey responses, the results find that CC users are less concerned about the major issues of security and privacy and will use the technology based on peer usage. Essay 2 examines why users ignore the technology issues and elect to replace the traditional mechanisms for handling their personal information. The results of an interview-based study conducted on 11 normal users and 11 IT professionals clarify their perceptions about CC and examine its readiness to handle their information from an end-user perspective. Essay 3 explores the CC literature to identify the major factors associated with the users' trust beliefs. The research conducted in this essay groups these factors into three categories. The posited and tested model examines the effect of perceived trust on ISSB. A structural equation modeling approach is used to analyze 1228 valid responses and tests the developed cloud computing trust model. The results provide multiple implications for CC researchers, managers, and service providers.
APA, Harvard, Vancouver, ISO, and other styles
15

Berger, Victor. "Anomaly detection in user behavior of websites using Hierarchical Temporal Memories : Using Machine Learning to detect unusual behavior from users of a web service to quickly detect possible security hazards." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-206979.

Full text
Abstract:
This Master's Thesis focuses on the recent Cortical Learn-ing Algorithm (CLA), designed for temporal anomaly detection. It is here applied to the problem of anomaly detec-tion in user behavior of web services, which is getting moreand more important in a network security context. CLA is here compared to more traditional state-of-the-art algorithms of anomaly detection: Hidden Markov Models (HMMs) and t-stide (an N-gram-based anomaly detector), which are among the few algorithms compatible withthe online processing constraint of this problem. It is observed that on the synthetic dataset used forthis comparison, CLA performs signicantly better thanthe other two algorithms in terms of precision of the detection. The two other algorithms don't seem to be able tohandle this task at all. It appears that this anomaly de-tection problem (outlier detection in short sequences overa large alphabet) is considerably different from what hasbeen extensively studied up to now.
APA, Harvard, Vancouver, ISO, and other styles
16

Sylvan, Robin. "Hur söker de? : En kvalitativ studie av informationssökningsbeteende hos masterstudenter vid Uppsala universitet." Thesis, Uppsala universitet, Institutionen för ABM, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-307594.

Full text
Abstract:
Purpose – The purpose of this study is to investigate the information seeking behaviour of graduate students at Uppsala University, Sweden. Using a qualitative method I gain deeper knowledge of the students’ information behaviour. Method – I interview four master students concerning their information seeking. Two of the students are from the social sciences and two from the medical sciences. Findings – The findings show that students primarily use electronic information resources. The students prefer to access scientific articles electronically, and they rarely use printed books in their studies. The students prefer to use library databases over Google Scholar. The reason for this is not only the access to material, but also that they prefer the more advanced search options provided by the library. Further results show that the students tend to avoid interaction with librarians. Paper type – Two years master’s thesis in Archive, Library and Museum studies.
APA, Harvard, Vancouver, ISO, and other styles
17

Kenney, Brian. "The transformative library: A narrative inquiry into the outcomes of information use." Thesis, University of North Texas, 2008. https://digital.library.unt.edu/ark:/67531/metadc9764/.

Full text
Abstract:
This qualitative study uses narrative analysis to explore the outcomes of information seeking and use among public library users. Twelve women between the ages of 51 and 72, all residents of Fayetteville, Arkansas who self-identified as regular library users, were interviewed to gather their life stories and their experiences using the public library. The participants in this study used information to enable learning and, often, a change in their affective state. The participants used the new information they encountered constructively, to engage with the knowledge and experience they possessed; this use of information always involved reflection, dialogue, or both. The outcomes from these actions are the creation of new knowledge, a change in the participants' meaning schemes, and/or an affective change. In addition, the narratives strongly suggest that information seeking and use by adults in public libraries can sometimes facilitate or, on its own, precipitate a perspective transformation and the adoption of new meanings. Overall, the findings support Mezirow's theory of transformative learning as a model for understanding information use and outcomes among users of the public library. The major implications of this study are two-fold. One, it introduces to information science Mezirow's theory of transformative learning which could provide greater understanding of how adults use information, and the outcomes that arise from this use. Two, it provides library professionals with information about the library in the lives of their users and concrete information about how libraries can enable transformative learning.
APA, Harvard, Vancouver, ISO, and other styles
18

Wiley-Patton, Sonja. "A test of the Extended Technology Acceptance Model for understanding the Internet adoption behavior of physicians." Thesis, University of Hawaii at Manoa, 2002. http://hdl.handle.net/10125/3046.

Full text
Abstract:
Information technology (IT) has become pervasive in the healthcare industry. Many view the Internet as a strategic healthcare tool. The Medical Records Institute suggests that Internet-based health applications (IHA), for example, electronic health records, e-prescribing, and mobile health are the goals of most healthcare organizations (2002). The use of the Internet for electronic medical records, e-billing and patient scheduling can enable the health care industry to reduce its inefficiencies and errors in care delivery (HlMSS/IBM Leadership Survey, 2000). While the use of IT in healthcare has increased tremendously, key players, specifically physicians still have not fully embraced the valuable resource of the Internet. Despite the purported advantages of lT investments in healthcare many doctors do not widely use Internet-based health applications in their clinical practices. Physicians often misunderstand the functions and full potential of the Internet (Wang & Song, 1997). Health & Health Care 20 I0 report that less than 5% of physicians use computers to record all clinical information for an average patient. The present study examined physicians' intentions to adopt Internet-based health applications for use in their clinical practices. This research reports on the test-retest reliability of the extended Technology Acceptance Model-TAM2 (Venkatesh & Davis, 2000). Data were collected from a survey of pediatricians to evaluate the effectiveness and appropriateness of the model in the medical environment. Results from the study indicate that TAM2 is appropriate but not completely applicable to the unique characteristic of physicians. The test-retest indicated reliable results with the exception of the result demonstrability construct. The results of multiple regression analyses indicated that perceived ease of use was not significant in predicting physicians' behavioral intentions in this study. As theorized the primary predictor variable perceived usefulness was a strong determinant of intention to use. Results indicate that physicians tend to be pragmatic in their IT acceptance decisions. Physicians focus more on the technology's usefulness rather than its ease of use. This dissertation discusses the implications, limitations and presents possible explanations for the inconsistencies within the extended technology acceptance model when it is applied to a professional group not commonly examined in IS research.
Thesis (Ph. D.)--University of Hawaii at Manoa, 2002.
Includes bibliographical references (leaves 168-180).
Mode of access: World Wide Web.
Also available by subscription via World Wide Web
xv, 180 leaves, bound ill. 29 cm
APA, Harvard, Vancouver, ISO, and other styles
19

Deetjen, Ulrike. "Internet use and health : a mixed methods analysis using spatial microsimulation and interviews." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:92b1d35c-1aed-435d-8daa-18b1cd9ccaa1.

Full text
Abstract:
Internet use is considered a lever for empowering patients, levelling inequalities and reducing healthcare expenditure. However, with digital inclusion, health provision quality and health system efficiency high on the UK and EU policy agendas, we need to better understand the relationship between Internet use and health outcomes to assess potential benefits and adverse effects. This research addresses the question of how Internet use influences individuals' health service use and their perceived health in the context of England. Focusing on health information-seeking, it analyses variations across different kinds of users, mechanisms between Internet use and both health outcomes, and the role of individual and contextual factors in this relationship. To answer this question, this research uses a mixed methods approach. Quantitative data from the Oxford Internet Surveys (OxIS), the English census and Hospital Episode Statistics (HES) was connected through spatial microsimulation based on output areas. Qualitative data was collected through semi-structured, face-to-face interviews, primarily with former OxIS participants from output areas in the quantitative strand. The quantitative data was revisited based on emerging interview themes. The results indicate that Internet use influences perceived health and health service use via various mechanisms based on the Internet's content, mediation and connection affordances. However, the boundaries between users and non-users are blurry and outcomes vary for different types of individuals, classified here as learners, pragmatists, sceptics, worriers, delegators and adigitals. Age, education, socioeconomic status, long-term health conditions, and geographic context influence Internet use and health outcomes separately, while the social context shapes their relationship too. These findings advance the theoretical understanding of Internet-based health outcomes, and provide practical implications for health professionals and policymakers with insights down to the local level. Moreover, this research demonstrates how novel insights for public wellbeing can be derived from qualitatively enriched secondary data in privacy-preserving and cost-effective ways.
APA, Harvard, Vancouver, ISO, and other styles
20

Fang, Yuting. "A Case Study on How Chinese Students Use Their Cell Phones in Sweden Compared to That in China." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-2271.

Full text
Abstract:

This study focuses on cell phone usage. By comparing how a group of students use their cell phones in Sweden with that in China, alterant cell phone usage behaviors will be concluded. The study includes a case study. In order to do the research, the author selects a specific group and holds interviews. Three theories are used in this thesis which are: 1) mobile context, 2) switching behavior of mobile users and 3) transaction utility and reference situation. After introducing these three theories, the author concludes six theoretical factors which are combined into one competent framework. Base on the new framework, the author analyzes the result from the case study. After presenting the interview and the results, the author finds that Chinese students use their cell phones less frequent in Sweden compared to that in China. In order to find out the reasons, the author creates goal, emotion, fee, location and habit as the five matching factors which result in those changes. The matching factors are the bridge between the theories and the case study. After generalizing how those factors affect people while using cell phones, future work is to raise up some thoughts of how cell phones will be like in the future which is relevant to how to adapt information technology to human lives.

APA, Harvard, Vancouver, ISO, and other styles
21

Creel, Stacy Hastings Samantha K. "Are online catalogs for children giving them what they need? children's cognitive development and information seeking and their impact on design /." [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3984.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Swartz, Barbara Dawn. "A study of the information-seeking behaviour of the researchers in the Parliamentary Research Unit at the Parliament of the Republic of South Africa." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/50283.

Full text
Abstract:
Thesis (MPhil)--Stellenbosch University, 2005.
ENGLISH ABSTRACT: This study examined the information seeking behaviour of the researchers attached to the Parliamentary Research Unit in Parliament. It looked at their use of the Parliamentary Library, their use of the library and its resources, what other avenues for information they use and what suggestions they have for improving the service. A questionnaire was developed and e-rnailed to researchers. As the response rate was poor, it limited the conclusions that could be drawn from the research. In line with other studies, it was found that electronic resources and the Internet played a great role in how they sourced information. Researchers frequented the Internet to find information more than they use the library and they have difficulties with accessing online resources and the catalogue. The manual circulation system was a source of frustration as well. They made use of personal contacts to a certain extent to find unpublished information and very recent information. These categories of information, especially government information, are crucial to their work. Suggestions for improvement centred on the online catalogue, instruction in the use of the online resources, updating the collection of books and journals and consulting researchers where necessary.
AFRIKAANSE OPSOMMING: Hierdie ondersoek fokus op die inligtingsgedrag van die navorsers in die Parlementêre Navorsingseenheid. Dit ondersoek hul gebruik van die Parlementêre biblioteek en sy bronne, die alternatiewe inligtingskanale tot hul beskikking en watter voorstelle hulle het vir die verbetering van dienste. 'n Vraelys is ontwerp en per e-pos aan navorsers gestuur. Swak terugvoering het die proses om finale gevolgtrekkings te maak, beperk. In ooreenstemming met ander studies, is wel gevind dat die Internet en elektroniese bronne 'n groot rol speel in die proses om inligting te bekom. Daar is ook gevind dat navorsers hierdie tipe bronne verkies bo traditionele biblioteekbesoeke. Opleiding om die elektroniese bronne en die katalogus te gebruik is noodsaaklik. Alternatiewe bronne van inligting soos persoonlike kontakte met ander kundiges word tot 'n sekere mate gebruik om inligting te kry wat beide op datum en ongepubliseer is. Voorstelle vir verbetering fokus op die elektroniese katalogus, opleiding in die gebruik van elektroniese bronne, die kwaliteit en inhoud van die versameling en konsultasie met die navorsers.
APA, Harvard, Vancouver, ISO, and other styles
23

Forte, Jofrany Dayana Pessoa. "Comportamento informacional dos docentes dos PPGCIS da região nordeste." Universidade Federal da Paraíba, 2014. http://tede.biblioteca.ufpb.br:8080/handle/tede/7503.

Full text
Abstract:
Submitted by Viviane Lima da Cunha (viviane@biblioteca.ufpb.br) on 2015-05-27T11:17:34Z No. of bitstreams: 1 arquivototal.pdf: 2312161 bytes, checksum: 48e879d8c2275fe997250abf0e6e2dd1 (MD5)
Made available in DSpace on 2015-05-27T11:17:34Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2312161 bytes, checksum: 48e879d8c2275fe997250abf0e6e2dd1 (MD5) Previous issue date: 2014-02-21
It analyzes the informational demands of the PPGCIs' professors from the Northeast Region concerned with both teaching and research practice. The Sense-Making approach, by the American – Brenda Dervin, was applied in order to base the research, so as to understand the meaning the individual assign to information at the moment in which one realizes a cognitive gap, while proceeding to a determined task, configurating the situation-gap-use triad. It refers to a descriptive research on a quantitative qualitative basis. A mixed questionnaire was employed as the data gathering‟s tool. Bardin‟s categorization technique was used to analyze the researched users‟responses. Twenty-two Professors took part in the research. The achieved results displayed that they usually search for information in Information Units, such as libraries, archives and documentation centers. Furthermore, to respond to informational needs, the greatest part of the researched individuals use the internet as information source. Concerning information channnels, they make use of books, journal articles, monographs, dissertations, theses, research reports, special collections.The major part of the researched perceive that such channels improve teaching practice because they keep themselves up to date with the following aspects: issues that are being discussed in classroom, the discovery of new methodological approaches, the updating of the existing knowledge as well as new experiences. As to the search process and to the information use, the greatest aim is to update knowledge on the researcheds‟ area, and to seek to information in order to apply on researches. The most recent problem which has led them to information search and use has been the demand for informational material that could have been applied as the support to carry on researches in process. The Professors state that whenever they are engaged in such a process, they – as a whole – become satisfied. In this context, normally, the feeling that prevails the mentioned search process is, somehow, some questioning; in other words, the need to find out something new about a certain issue, a gap, a cognitive empty. Barrier time is one of the informational obstacles that mostly hampers the information search process and use, as well as the information excess to which everyone is subject nowadays. The most used strategy to overcome such a barrier is the selection by means of the trustfulness criterion. Therefore, the knowledge about the informational behavior has demonstrated itself, considering the Professors‟ speech, as an alternative to know how they are doing to handle the informational bulk and to retrieve relevant information to use in their teaching practice.
Analisa as necessidades informacionais dos docentes dos PPGCIS da Região Nordeste na prática docente de ensino e pesquisa. A Abordagem Sense Making, da americana Brenda Dervin, foi utilizada para nortear a pesquisa no intuito de compreender o sentido que o indivíduo atribui à informação no momento em que ele percebe um vazio cognitivo para dar prosseguimento a uma determinada atividade do seu cotidiano configurando a tríade situação-lacuna-uso. Trata-se de uma pesquisa descritiva e de cunho quanti-qualitativo. O instrumento de coleta de dados utilizado foi um questionário misto. A técnica de categorização de Bardin foi usada para analisar as respostas dos usuários pesquisados. Vinte e dois docentes participaram da pesquisa. Os resultados encontrados revelaram que eles costumam suprir as necessidades informacionais em unidades de informação como bibliotecas, arquivos e centros de documentação, bem como a maioria deles faz uso da internet como fonte de informação. Quando se trata de canais de informação eles utilizam os livros, artigos de periódicos, monografias, dissertações, teses, relatórios de pesquisa, coleções especiais. A maior parte dos pesquisados disse que eles contribuem com a prática docente no sentido de mantê-los atualizados com relação aos temas que estão sendo trabalhados em sala de aula, na descoberta de novas abordagens metodológicas, atualização dos conhecimentos já existentes e novas experiências. Com relação ao processo de busca e uso de informação o maior objetivo é atualizar o conhecimento em sua área de atuação, assim como buscar informações para utilizar em pesquisas. O problema/situação mais recente que os levou à busca e uso da informação foi à necessidade de material informacional que servisse de apoio para dar continuidade às pesquisas em andamento. Os docentes afirmam que quando se envolvem nesse processo geralmente saem satisfeitos. Nesse contexto, o sentimento que normalmente permeia esse processo de busca é uma inquietação, a necessidade de descobrir algo novo sobre um determinado tema, ou seja, uma lacuna, um vazio cognitivo. A barreira de tempo é um dos obstáculos informacionais que mais dificultam o processo de busca e uso da informação, bem como também o excesso de informações do qual estão todos submetidos na atualidade. A estratégia mais utilizada para driblar essa barreira é a seleção por critério de confiabilidade. Portanto, o conhecimento do comportamento informacional se mostrou, a partir da fala dos docentes, uma alternativa para saber como eles estão fazendo para driblar a explosão informacional e recuperar informações relevantes para utilizar em razão do fazer docente.
APA, Harvard, Vancouver, ISO, and other styles
24

Procháček, Jan. "Dezinformace v ekonomickém světě." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-74482.

Full text
Abstract:
In the presented thesis I study new media and their possible misuse in misinformation. In the first part I describe basics of misinformation theory, categorization and present real example of misinformation by using traditional and new media and warn against risks related to its anonymous using. A characteristic of concrete new media is complemented with specific user behavior patterns. On last part I suggest concrete prospective ways of creating misinformation campaign with minimal cost and risk.
APA, Harvard, Vancouver, ISO, and other styles
25

Ammari, Ahmad N. "Transforming user data into user value by novel mining techniques for extraction of web content, structure and usage patterns : the development and evaluation of new Web mining methods that enhance information retrieval and improve the understanding of users' Web behavior in websites and social blogs." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5269.

Full text
Abstract:
The rapid growth of the World Wide Web in the last decade makes it the largest publicly accessible data source in the world, which has become one of the most significant and influential information revolution of modern times. The influence of the Web has impacted almost every aspect of humans' life, activities and fields, causing paradigm shifts and transformational changes in business, governance, and education. Moreover, the rapid evolution of Web 2.0 and the Social Web in the past few years, such as social blogs and friendship networking sites, has dramatically transformed the Web from a raw environment for information consumption to a dynamic and rich platform for information production and sharing worldwide. However, this growth and transformation of the Web has resulted in an uncontrollable explosion and abundance of the textual contents, creating a serious challenge for any user to find and retrieve the relevant information that he truly seeks to find on the Web. The process of finding a relevant Web page in a website easily and efficiently has become very difficult to achieve. This has created many challenges for researchers to develop new mining techniques in order to improve the user experience on the Web, as well as for organizations to understand the true informational interests and needs of their customers in order to improve their targeted services accordingly by providing the products, services and information that truly match the requirements of every online customer. With these challenges in mind, Web mining aims to extract hidden patterns and discover useful knowledge from Web page contents, Web hyperlinks, and Web usage logs. Based on the primary kinds of Web data used in the mining process, Web mining tasks can be categorized into three main types: Web content mining, which extracts knowledge from Web page contents using text mining techniques, Web structure mining, which extracts patterns from the hyperlinks that represent the structure of the website, and Web usage mining, which mines user's Web navigational patterns from Web server logs that record the Web page access made by every user, representing the interactional activities between the users and the Web pages in a website. The main goal of this thesis is to contribute toward addressing the challenges that have been resulted from the information explosion and overload on the Web, by proposing and developing novel Web mining-based approaches. Toward achieving this goal, the thesis presents, analyzes, and evaluates three major contributions. First, the development of an integrated Web structure and usage mining approach that recommends a collection of hyperlinks for the surfers of a website to be placed at the homepage of that website. Second, the development of an integrated Web content and usage mining approach to improve the understanding of the user's Web behavior and discover the user group interests in a website. Third, the development of a supervised classification model based on recent Social Web concepts, such as Tag Clouds, in order to improve the retrieval of relevant articles and posts from Web social blogs.
APA, Harvard, Vancouver, ISO, and other styles
26

Creel, Stacy. "Are Online Catalogs for Children Giving Them What They Need? Children's Cognitive Development and Information Seeking and Their Impact on Design." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc3984/.

Full text
Abstract:
Research shows children in an online environment often search by browsing, which relies heavily on recognition and content knowledge, so catalog systems for children must use effective symbols or pictorial representations, which correspond with children's own cognitive schema and level of recognition knowledge. This study was designed to look at the success of young children (ages 5 to 8) in searching 3 online public library catalogs designed for them, and it focused specifically on the pictorial representations and text descriptors used in the systems' browsing hierarchy. The research sought answer whether young children (ages 5 to 8) are really poor searchers because of cognitive development and lack of technology skills or if system design is the major reason for poor search results; i.e., Do current children's online catalog designs function in a manner that is compatible with information seeking by children? Although these results can not be generalized, this study indicates that there was a disconnect between the cognitive abilities of young users and catalog design. The study looked at search success on the 3 catalogs in relation to the catalog characteristics and individual user characteristics and makes 3 significant contributions to the field of library and information science. The first contribution is the modification of an existing model posed by Cooper and O'Connor and modified by Abbas (2002). The second significant contribution is the proposal of a new model, Creel's second best choice (SBC) model, that addresses the cognitive gap and design flaws that impact the choices participants made. The third significant contribution is that this study addresses and fills a gap in the literature.
APA, Harvard, Vancouver, ISO, and other styles
27

Giordano, Rafaela Boeira. "Da necessidade ao conhecimento: recuperação da informação na web em Ciência da Informação." Universidade Federal do Rio de Janeiro / Instituto Brasileiro de Informação em Ciência e Tecnologia, 2011. http://ridi.ibict.br/handle/123456789/746.

Full text
Abstract:
Made available in DSpace on 2015-10-19T11:50:18Z (GMT). No. of bitstreams: 1 giordano2011.pdf: 2582955 bytes, checksum: c0171aa80d31dbb90fb7d12e09f88c6d (MD5) Previous issue date: 2011-03-22
In the Information Science‟s constitutive origin, the information search and retrieval process has represented new challenges for its development, given the changes determined by the advent and growth of the web. Given the exponentially increase of information‟s volume on the web, the number and diversity of users, and the increasing use of search engines, this research contributes to enhancing the understanding of users‟ information behavior. This work is focused on the identification and analysis of the behavior adopted by postgraduate students in Information Science at an experience of scientific information search and retrieval on the web. Subjects related to information retrieval for scientific production, information retrieval on web, information and digital literacy, as well as user‟s information behavior are specially studied. The field research encompassed the application of an integrated set of instruments, such as questionnaire and interview, developed from the critical incident technique, methodology related to the investigation‟s field Cognitive Task Analysis (CTA). From the data collected was possible to identify the paths chosen by the target population, as well as the decision making, strategies selected, difficulties experienced, and the improvements recognized along the process of scientific information search and retrieval on the web. The results show essentially deficiency of planning and reflection during the process. The results showed different aspects of planning and completion of the search and recovery, relevant to the professional development in relation to the collection and use of information
Na origem constitutiva da Ciência da Informação, o processo de busca e recuperação da informação tem representado novos desafios para seu desenvolvimento, face às mudanças determinadas pelo advento e crescimento da web. Diante do volume exponencialmente crescente de informações nesta depositadas, do número e diversidade de usuários e do aumento crescente da utilização de mecanismos de busca, esta pesquisa contribui para ampliar o entendimento do comportamento informacional de usuários especializados neste cenário. O trabalho visa à identificação e à análise do comportamento adotado por pós-graduandos em Ciência da Informação ao realizarem busca e recuperação de informação científica na web. Aprofundou-se especialmente o estudo sobre assuntos relacionados a recuperação da informação para produção científica, recuperação da informação na web, letramento informacional e digital, bem como comportamento informacional dos usuários. Na pesquisa de campo, foi realizada a aplicação de um conjunto integrado de instrumentos, composto por um questionário e pela realização de uma entrevista, desenvolvidos sob a perspectiva da técnica do incidente crítico, metodologia pertinente ao campo de investigação de Análise da Tarefa Cognitiva (CTA). A partir dos dados coletados, mapeou-se o percurso adotado pela população-alvo, assim como foram identificadas as tomadas de decisão, as estratégias adotadas, as dificuldades encontradas e o aprendizado adquirido no processo de busca e recuperação de informação científica na web. Os resultados apontaram diferentes aspectos sobre o planejamento e a realização do processo de busca e recuperação, relevantes para o aprimoramento profissional em relação à obtenção e utilização da informação
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Jesse Han-Leng. "Identifying users' information needs: A case of SIDC library." School of Communication & Information, Nanyang Technological University, 2006. http://hdl.handle.net/10150/105258.

Full text
Abstract:
The Securities Industry Development Centre (SIDC) is the education and training arm of the Securities Commission (SC), and the SIDC Library serves both SC staff and the securities industry. The SIDC Library is a specialised library that has its resources focused on the capital market. Identifying usersâ information needs is a first step towards analysing the information needs of SIDC Library members and the SC staff. The study was motivated by the fact that an analysis of information needs help identify the SIDC Library resources for further development to ensure the delivery of information services matches usersâ needs. In this paper, we would like to share a study that was conducted to analyse how the SIDC Library services were tailored to meet the information needs of users. By studying this aspect, we will be able to see how the library defines and classifies its user types, and addresses issues impacting information services through proper operation planning and practices. The respondents for this paper were mainly SIDC Library members and SC staff. The result of the study is based on a collection of survey questionnaires, personal interviews and records of user requests for documents. From this study, a profile of user information needs was established; enabling the library management to identify, support and provide an efficient delivery mechanism for meeting usersâ information needs. This study helped SIDC librarians identify the kind of information that was needed and generated, and to support those which are not readily available by further developing a comprehensive new subject/collection of SIDC Library information resources. This will also provide an insight into the users' expectations on content resources and services of the SIDC Library, as well as for developing library user education programmes. Thus, the study of usersâ information needs is one tool that enables SIDC Librarians to discover, evaluate, implement, maintain and improve its management of information resources.
APA, Harvard, Vancouver, ISO, and other styles
29

Johnson, David Philip. "How Attitude Toward the Behavior, Subjective Norm, and Perceived Behavioral Control Affects Information Security Behavior Intention." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4454.

Full text
Abstract:
The education sector is at high risk for information security (InfoSec) breaches and in need of improved security practices. Achieving data protections cannot be through technical means alone. Addressing the human behavior factor is required. Security education, training, and awareness (SETA) programs are an effective method of addressing human InfoSec behavior. Applying sociobehavioral theories to InfoSec research provides information to aid IT security program managers in developing improved SETA programs. The purpose of this correlational study was to examine through the theoretical lens of the theory of planned behavior (TPB) how attitude toward the behavior (ATT), subjective norm (SN), and perceived behavioral control (PBC) affected the intention of computer end users in a K-12 environment to follow InfoSec policy. Data collection was from 165 K-12 school administrators in Northeast Georgia using an online survey instrument. Data analysis occurred applying multiple linear regression and logistic regression. The TPB model accounted for 30.8% of the variance in intention to comply with InfoSec policies. SN was a significant predictor of intention in the model. ATT and PBC did not show to be significant. These findings suggest improvement to K-12 SETA programs can occur by addressing normative beliefs of the individual. The application of improved SETA programs by IT security program managers that incorporate the findings and recommendations of this study may lead to greater information security in K-12 school systems. More secure school systems can contribute to social change through improved information protection as well as increased freedoms and privacy for employees, students, the organization, and the community.
APA, Harvard, Vancouver, ISO, and other styles
30

Albar, Ali Aldroos. "Development of an Instrument to Measure the Level of Acceptability and Tolerability of Cyber Aggression: Mixed-Methods Research on Saudi Arabian Social Media Users." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc849766/.

Full text
Abstract:
Cyber aggression came about as a result of advances in information communication technology and the aggressive usage of the technology in real life. Cyber aggression can take on many forms and facets. However, the main focus of this study is cyberbullying and cyberstalking through information sharing practices that might constitute digital aggressive acts. Human aggression has been extensively investigated. Studies focusing on understanding the causes and effects that can lead to physical and digital aggression have shown the prevalence of cyber aggression in different settings. Moreover, these studies have shown strong relationship between cyber aggression and the physiological and physical trauma on both perpetrators and their victims. Nevertheless, the literature shows a lack of studies that could measure the level of acceptance and tolerance of these dangerous digital acts. This study is divided into two main stages; Stage one is a qualitative pilot study carried out to explore the concept of cyber aggression and its existence in Saudi Arabia. In-depth interviews were conducted with 14 Saudi social media users to collect understanding and meanings of cyber aggression. The researcher followed the Colaizzi’s methods to analyze the descriptive data. A proposed model was generated to describe cyber aggression in social media applications. The results showed that there is a level of acceptance to some cyber aggression acts due to a number of factors. The second stage of the study is focused on developing scales with reliable items that could determine acceptability and tolerability of cyber aggression. In this second stage, the researcher used the factors discovered during the first stage as source to create the scales’ items. The proposed methods and scales were analyzed and tested to increase reliability as indicated by the Cronbach’s Alpha value. The scales were designed to measure how acceptable and tolerable is cyber-bullying, cyber-stalking in Saudi Arabia and the sharing of some information in social media applications. The results show a strong tolerance level of those activities. This study is a valuable resource for advanced-level students, educators, and researchers who focus on cyber security, cyber psychology, and cyber aggression in social network sites.
APA, Harvard, Vancouver, ISO, and other styles
31

McMillan, Tyson DeShaun. "Web Information Behaviors of Users Interacting with a Metadata Navigator." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407784/.

Full text
Abstract:
The web information behaviors of users as they interacted with a metadata navigator, the Personal Information (PI) Agent, and reflected upon their interaction experiences were studied. The process included studying the complete iterative (repeated) cycle of information needs, information seeking, and information use of users interacting with an internet-based prototype metadata PI Agent tool. Detlor’s theory of web information behaviors of organizational users was utilized as a theoretical foundation for studying human-information interactions via the PI Agent tool. The qualitative research design allowed for the use of triangulation within the context of a one-group pretest-posttest design. Triangulation occurred in three phases: (a) observe, (b) collect, and (c) reflect. Observations were made as participants solved three problem situations. Participants’ computer log and print screen data were collected, and follow-up interviews were conducted once all posttest sessions ended to enable users to reflect on their experiences. The three triangulation phases ensured saturation of data and greater depth regarding the participants’ information behaviors. Content analysis occurred via exploratory pattern analysis using the posttest Problem Steps Recorder (PSR) log data and on the six interviewees’ follow-up interview data. Users engaged in iterative cycles of information needs, information seeking, and information use to resolve the presented problem situations. The participants utilized the PI Agent tool iteratively to eliminate their knowledge gaps regarding the presented problem situations. This study was the first to use PSR log data for capturing evidence of the iterative search process as defined by Detlor. The implications for best practices were inspired by participant feedback, and recommendations for further study are made.
APA, Harvard, Vancouver, ISO, and other styles
32

TABOSA, Hamilton Rodrigues. "Modelo integrativo sobre o comportamento do usuário na busca e uso da informação: aplicação na área da Saúde." reponame:Repositório Institucional da UFC, 2016. http://www.repositorio.ufc.br/handle/riufc/18419.

Full text
Abstract:
TABOSA, Hamilton Rodrigues. Modelo integrativo sobre o comportamento do usuário na busca e uso da informação: aplicação na área da Saúde. 2016. 177 f. Tese (Doutorado) - Universidade Federal da Paraíba, Programa de Pós-graduação em Ciência da Informação, Paraíba, 2016.
Submitted by Lidya Silva (nagylla.lidya@gmail.com) on 2016-07-15T15:23:28Z No. of bitstreams: 1 2016_tese_hrtabosa.pdf: 2037939 bytes, checksum: d343dfd86868f06692a8617698c8b448 (MD5)
Approved for entry into archive by Maria Josineide Góis (josineide@ufc.br) on 2016-07-15T18:01:02Z (GMT) No. of bitstreams: 1 2016_tese_hrtabosa.pdf: 2037939 bytes, checksum: d343dfd86868f06692a8617698c8b448 (MD5)
Made available in DSpace on 2016-07-15T18:01:02Z (GMT). No. of bitstreams: 1 2016_tese_hrtabosa.pdf: 2037939 bytes, checksum: d343dfd86868f06692a8617698c8b448 (MD5) Previous issue date: 2016
The objective of this thesis is to build an integrative model of search behavior and use of information based on the models of Ellis (1989), Krikelas (1983), Kuhlthau (1991), Taylor (1986) and Wilson (1981, 1996 and 1999) and validate it through the application with the information of users not specialized in healthcare (patients, except for students and professionals). The theoretical foundation came from the study of these models, as well as specialized literature in relation to the identification of information needs, search processes and use of information, in addition to addressing the concepts of Information and Health Science, as well as behavioral studies from theoretical psychology area. Through a phenomenological study, we build an integration of models and consolidate the final proposal for a single integrative model of search behavior and use of information. For validation, interviews were conducted in-depth and technical application of the critical incident with General Hospital patients of the Dr. Carls César de Oliveira, in Fortaleza. The theoretical and practical research presented validates the integrative model of search behavior and use of the proposed information as a tool to identify regularities about the search behavior and use of information unskilled users in healthcare and is also capable of application in the study of other audiences, characterized as a general model of search behavior and use of information. This statement stems from the fact that all aspects, phases and stages of the information behavior of the subjects in this study fall (are represented) in the integrative model built, being able to bring these results: the subjects of this research feel the need for information as soon realize a disease in themselves or a family member; they throw themselves in the search for information immediately, even without knowing formal sources of information in the area, through the Web, performing Google searches through popular terms and description of symptoms; at the beginning of the search, they feel insecure for not knowing the most effective words to use in the search strategies, but rely on Google's capability to provide information they deem relevant; they don´t admit, but prefer informal sources of information, which spread testimonials from others who have experienced the same health problems, and are able to identify drugs; there are users who only seek medical attention when they can not find treatment and healing on their own Web; there are users who seek information to better understand and talk about her condition with the doctor; they have urgency in the search for information because they rush in curing the disease not only because of the physical nuisance they cause, but also for fear of losing their jobs due to the delivery of medical certificates and away from social contact with family and friends; the Web is used as a means of access to information that is used for self-diagnosis and self-medication. Research on the search behavior and use of information made from the application of integrative model will bring wider results and provide scientific inputs that can be used by managers of information units at the planning and implementation of products and services.
O objetivo desta tese é construir um modelo integrativo de comportamento de busca e uso de informação com base nos modelos de Ellis (1989), Krikelas (1983), Kuhlthau (1991), Taylor (1986) e Wilson (1981, 1996 e 1999), e validá-lo por meio da aplicação junto a usuários de informação não especializados na área da Saúde (pacientes, excetuando-se estudantes e profissionais da área). A fundamentação teórica partiu do estudo desses modelos, bem como da literatura especializada no que se refere à identificação de necessidades informacionais, processos de busca e uso da informação, além de abordar os conceitos de Ciência da Informação e Saúde, bem como dos estudos comportamentais a partir de teóricos da área de Psicologia. Por meio de um estudo fenomenológico, construímos uma integração dos modelos supracitados e consolidamos a proposta final de um único modelo integrativo de comportamento de busca e uso de informação. Para sua validação, foram realizadas entrevistas em profundidade e aplicação da técnica do incidente crítico com pacientes do Hospital Geral Dr. César Carls de Oliveira, em Fortaleza. A investigação teórico-prática apresentada valida o modelo integrativo de comportamento de busca e uso da informação proposto, como uma ferramenta capaz de identificar regularidades quanto ao comportamento de busca e uso de informação de usuários não especializados na área da saúde, sendo também passível de aplicação no estudo de outros públicos-alvo, caracterizando-se como um modelo generalista de comportamento de busca e uso de informação. Essa afirmação decorre do fato de que todos os aspectos, fases e etapas do comportamento informacional dos sujeitos desta pesquisa se inserem (estão representados) no modelo integrativo construído, sendo capaz de trazer resultados dentre os quais destacamos: os sujeitos desta pesquisa sentem necessidade de informação tão logo percebem uma doença em si próprio ou em alguém de sua família; eles se lançam na busca por informação imediatamente, mesmo sem conhecer fontes formais de informação na área, por meio da Web, realizando buscas no Google, através de termos populares e descrição dos sintomas; no início das buscas, eles se sentem inseguros por desconhecerem os termos mais eficientes para usar nas estratégias de busca, mas confiam na potencialidade do Google de fornecer informações que possam julgar relevantes; não admitem, mas preferem fontes de informação informais, que veiculem depoimentos de outros indivíduos que passaram pelos mesmos problemas de saúde, e que sejam capazes de indicar medicamentos; há usuários de informação que só procuram assistência médica quando não conseguem encontrar tratamento e cura por conta própria na Web; há usuários que procuram informação para melhor compreender e dialogar sobre seu problema de saúde com o médico; eles têm urgência na busca por informação por terem pressa na cura da doença não só por causa dos incômodos físicos que elas causam, mas também por temerem perder seus empregos devido à entrega de atestados médicos e se afastar do convívio social com a família e amigos; a Web é utilizada como forma de acesso a informações que são utilizadas para o autodiagnóstico e automedicação. Pesquisas sobre o comportamento de busca e uso de informação realizados a partir da aplicação do modelo integrativo trarão resultados mais amplos e fornecerão insumos científicos que poderão ser utilizados por gestores de unidades de informação no momento do planejamento e implementação de produtos e serviços.
APA, Harvard, Vancouver, ISO, and other styles
33

Shan, Min. "What matters in the digital shopping mall? : A study of Chinese consumers’ adoption of E-business platforms and vendors." Thesis, Umeå universitet, Institutionen för informatik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-57104.

Full text
Abstract:
E-business is growing rapidly all over the world and especially in China, which now has the largest C2C market in the world. Most studies of users’ experience of E-business either focus on the platform usage, platform adoption or include platform usage and vendors’ behavior as variables in general e-retailing models. However, we do not know much about what effect the interplay between E-business platforms and vendors operating on the platform has on consumers E-business behavior. In this paper, buyers' behavior in terms of choosing platforms and choosing stores is examined separately, while measurements for influencing factors such as size of vendor base and trust of platform owner is included to capture second order effects. Data was gathered through a questionnaire, published on a professional Chinese survey website for collecting data. Afterwards, SPSS was used for analyzing data. Similarities and differences between the outcomes for the two research questions were analyzed. The main patterns in the two models are similar, suggesting that the interaction between platform owners and vendors has impact on buyers as well. Price, which was one of the most important features of E-business, proved to be of minor importance for choosing both E-business platform and vendors. However, there are some differences between adoption of platforms and vendors, range of market is important for platform adoption, while it is not a indicator for consumers to choose a certain vendor. These findings suggest that there are second order effects involved in E-business platforms. Further, they indicate that once an E-business platform has acquired a large enough user base, the owner might consider increasing revenues from vendor fees, as long as they translate to small product price increases rather than a decreased vendor user base.
APA, Harvard, Vancouver, ISO, and other styles
34

Chudamani, K. S., and H. C. Nagarathna. "A model of information use behavior by scientists." School of Communication & Information, Nanyang Technological University, 2006. http://hdl.handle.net/10150/105351.

Full text
Abstract:
Poster paper
The services that are provided in a library are at various levels and varieties. Library automation services such as computerized OPAC, e-mail based reference service etc., are be-ing provided. Also, Web based services like Web Opac, E-Journals, CD-ROM Collection search, Bibliographical database services such as Engineering village 2, Compendex, Chemi-cal Abstract, Web of science, are being provided.
APA, Harvard, Vancouver, ISO, and other styles
35

Hotle, Susan Lisa. "Applications of clickstream information in estimating online user behavior." Diss., Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/53507.

Full text
Abstract:
The internet has become a more prominent part of people’s lives. Clickstream and other online data have enabled researchers to better understand consumers’ decision-making behavior in a variety of application areas. This dissertation focuses on using clickstream data in two application areas: the airline industry and the field of education. The first study investigates if airline passengers departing from or arriving to a multi-airport city actually consider itineraries at the airports not considered to be their preferred airport. It was found that customers do consider fares at multiple airports in multi-airport cities. However, other trip characteristics, typically linked to whether a customer is considered business or leisure, were found to have a larger impact on customer behavior than offered fares at competing airports. The second study evaluates airline customer search and purchase behavior near the advance purchase deadlines, which typically signify a price increase. Search and purchase demand models were constructed using instrumented two-stage least squares (2SLS) models with valid instruments to correct for endogeneity. Increased demand was found before each deadline, even though these deadlines are not well-known among the general public. It is hypothesized that customers are able to use two methods to unintentionally book right before these price increases: (1) altering their travel dates by one or two days using the flexible dates tools offered by an airline’s or online travel agency’s (OTA) website to receive a lower fare, (2) booking when the coefficient of variation across competitor fares is high, as the dynamics of one-way and roundtrip pricing differ near these deadlines. The third study uses clickstream data in the field of education to compare the success of the traditional, flipped, and micro-flipped classrooms as well as their impacts on classroom attitudes. Students’ quiz grades were not significantly different between the traditional and flipped classrooms. The flipped classroom reduced the impact of procrastination on success. In the end, it was found that micro-flipped was most preferred by students as it incorporated several benefits of the flipped classroom without the effects of a learning curve.
APA, Harvard, Vancouver, ISO, and other styles
36

Blount, Charles Lenward. "Users' privacy and security behaviors on mobile devices." Thesis, University of Maryland, Baltimore County, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1571723.

Full text
Abstract:

Preferences and behaviors for privacy management with mobile applications are difficult to capture. Previous measures are mostly based on self-report data, which often does not accurately predict actual user behavior. A deeper understanding was sought, gleaned from observing actual practices. This thesis analyzes 11,777 applications from the Google Play marketplace in order to determine the impact of privacy settings on purchase behavior. This was done by looking at the effect of the number of privacy concessions as well as the effect of individual concessions and category on number of downloads. It was found that users of paid applications do not have a preference for fewer privacy concessions. This study further reinforces the disconnect between the user's often stated preference for privacy and their actual behavior -- a discrepancy known as the “privacy paradox ”. Theoretical and practical implications are discussed.

APA, Harvard, Vancouver, ISO, and other styles
37

Grimmer, David. "Representations of data for repetitive user behaviors using Markov Chains." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18653.

Full text
Abstract:
This report presents problematic issues with analyzing user behaviors of a repetitive nature for Anomaly Detection using the Markov Chain model. The users in the data tend to use certain events in succession for a long period of time. Doing the same thing in succession can be normal but when can these users be considered to have an abnormal behavior? The work done in this report presents two alterative ways of representing the data for letting the Markov Chain capture large sections of repeating events without needing to increase the order of the Markov Chain. The presented representations show promising results for an increase in the Markov Chain capability to distinguish users of repetitive nature from each other, as well as suggestions for future development.
APA, Harvard, Vancouver, ISO, and other styles
38

Tabosa, Hamilton Rodrigues. "Modelo integrativo sobre o comportamento do usuário na Busca e uso da informação: aplicação na área de saúde." Universidade Federal da Paraíba, 2016. http://tede.biblioteca.ufpb.br:8080/handle/tede/8310.

Full text
Abstract:
Submitted by Morgana Silva (morgana_linhares@yahoo.com.br) on 2016-06-27T19:00:07Z No. of bitstreams: 1 arquivototal.pdf: 2034852 bytes, checksum: 58edc98ea145ae168d1582b70b0e2a3b (MD5)
Made available in DSpace on 2016-06-27T19:00:07Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 2034852 bytes, checksum: 58edc98ea145ae168d1582b70b0e2a3b (MD5) Previous issue date: 2016-03-23
The objective of this thesis is to build an integrative model of search behavior and use of information based on the models of Ellis (1989), Krikelas (1983), Kuhlthau (1991), Taylor (1986) and Wilson (1981, 1996 and 1999) and validate it through the application with the information of users not specialized in healthcare (patients, except for students and professionals). The theoretical foundation came from the study of these models, as well as specialized literature in relation to the identification of information needs, search processes and use of information, in addition to addressing the concepts of Information and Health Science, as well as behavioral studies from theoretical psychology area. Through a phenomenological study, we build an integration of models and consolidate the final proposal for a single integrative model of search behavior and use of information. For validation, interviews were conducted in-depth and technical application of the critical incident with General Hospital patients of the Dr. Carls César de Oliveira, in Fortaleza. The theoretical and practical research presented validates the integrative model of search behavior and use of the proposed information as a tool to identify regularities about the search behavior and use of information unskilled users in healthcare and is also capable of application in the study of other audiences, characterized as a general model of search behavior and use of information. This statement stems from the fact that all aspects, phases and stages of the information behavior of the subjects in this study fall (are represented) in the integrative model built, being able to bring these results: the subjects of this research feel the need for information as soon realize a disease in themselves or a family member; they throw themselves in the search for information immediately, even without knowing formal sources of information in the area, through the Web, performing Google searches through popular terms and description of symptoms; at the beginning of the search, they feel insecure for not knowing the most effective words to use in the search strategies, but rely on Google's capability to provide information they deem relevant; they don´t admit, but prefer informal sources of information, which spread testimonials from others who have experienced the same health problems, and are able to identify drugs; there are users who only seek medical attention when they can not find treatment and healing on their own Web; there are users who seek information to better understand and talk about her condition with the doctor; they have urgency in the search for information because they rush in curing the disease not only because of the physical nuisance they cause, but also for fear of losing their jobs due to the delivery of medical certificates and away from social contact with family and friends; the Web is used as a means of access to information that is used for self-diagnosis and self-medication. Research on the search behavior and use of information made from the application of integrative model will bring wider results and provide scientific inputs that can be used by managers of information units at the planning and implementation of products and services.
O objetivo desta tese é construir um modelo integrativo de comportamento de busca e uso de informação com base nos modelos de Ellis (1989), Krikelas (1983), Kuhlthau (1991), Taylor (1986) e Wilson (1981, 1996 e 1999), e validá-lo por meio da aplicação junto a usuários de informação não especializados na área da Saúde (pacientes, excetuando-se estudantes e profissionais da área). A fundamentação teórica partiu do estudo desses modelos, bem como da literatura especializada no que se refere à identificação de necessidades informacionais, processos de busca e uso da informação, além de abordar os conceitos de Ciência da Informação e Saúde, bem como dos estudos comportamentais a partir de teóricos da área de Psicologia. Por meio de um estudo fenomenológico, construímos uma integração dos modelos supracitados e consolidamos a proposta final de um único modelo integrativo de comportamento de busca e uso de informação. Para sua validação, foram realizadas entrevistas em profundidade e aplicação da técnica do incidente crítico com pacientes do Hospital Geral Dr. César Carls de Oliveira, em Fortaleza. A investigação teórico-prática apresentada valida o modelo integrativo de comportamento de busca e uso da informação proposto, como uma ferramenta capaz de identificar regularidades quanto ao comportamento de busca e uso de informação de usuários não especializados na área da saúde, sendo também passível de aplicação no estudo de outros públicos-alvo, caracterizando-se como um modelo generalista de comportamento de busca e uso de informação. Essa afirmação decorre do fato de que todos os aspectos, fases e etapas do comportamento informacional dos sujeitos desta pesquisa se inserem (estão representados) no modelo integrativo construído, sendo capaz de trazer resultados dentre os quais destacamos: os sujeitos desta pesquisa sentem necessidade de informação tão logo percebem uma doença em si próprio ou em alguém de sua família; eles se lançam na busca por informação imediatamente, mesmo sem conhecer fontes formais de informação na área, por meio da Web, realizando buscas no Google, através de termos populares e descrição dos sintomas; no início das buscas, eles se sentem inseguros por desconhecerem os termos mais eficientes para usar nas estratégias de busca, mas confiam na potencialidade do Google de fornecer informações que possam julgar relevantes; não admitem, mas preferem fontes de informação informais, que veiculem depoimentos de outros indivíduos que passaram pelos mesmos problemas de saúde, e que sejam capazes de indicar medicamentos; há usuários de informação que só procuram assistência médica quando não conseguem encontrar tratamento e cura por conta própria na Web; há usuários que procuram informação para melhor compreender e dialogar sobre seu problema de saúde com o médico; eles têm urgência na busca por informação por terem pressa na cura da doença não só por causa dos incômodos físicos que elas causam, mas também por temerem perder seus empregos devido à entrega de atestados médicos e se afastar do convívio social com a família e amigos; a Web é utilizada como forma de acesso a informações que são utilizadas para o autodiagnóstico e automedicação. Pesquisas sobre o comportamento de busca e uso de informação realizados a partir da aplicação do modelo integrativo trarão resultados mais amplos e fornecerão insumos científicos que poderão ser utilizados por gestores de unidades de informação no momento do planejamento e implementação de produtos e serviços.
APA, Harvard, Vancouver, ISO, and other styles
39

Al-Daihani, Sultan M. M. "Information behaviour of Kuwaiti legal professionals." Thesis, Loughborough University, 2003. https://dspace.lboro.ac.uk/2134/7600.

Full text
Abstract:
This thesis reports results of a research study into the information behaviour of Kuwaiti legal professionals. The main aims of the research were to investigate the information behaviour and the information needs of Kuwaiti legal professionals, and examine whether the existing legal information sources and services meet their needs. The theoretical framework for this research was derived from the investigation of information behaviour in general, and studies of legal professionals in particular. Wilson's (1996) model of information behaviour was also used to develop the conceptual framework of this research. This model takes into account four types of information seeking behaviour: active search, passive search, passive attention and ongoing search. This model helped in formulating research questions and hypotheses and the design of data collections methods. It was used also as a tool for organising the interpretation and discussion of the research findings. The research methods were designed from a user-centred perspective, including using data collection methods that are supportive of user-centred research. Triangulation was used in data collection by the use of questionnaires, interviews and critical incidents technique. The participants of the research included legal academics, legal practitioners such as state lawyers, prosecutors and private lawyers, law librarians, legal publishers and legal database producers in Kuwait. The results showed that a personal collection is the source used most by Kuwaiti legal professionals. The majority did not use electronic sources such as databases and the Internet. A large percentage also did not use law libraries. The majority of academics sought information themselves, whereas the majority of practitioners relied on the assistance of others. The majority of respondents had no training on the use of information sources. The majority also relied on internal communication as a channel for information exchange more than external communication. The majority of respondents scanned between one or two journals, although journals should be among the major information sources for legal professionals. On the other hand, newspapers ranked first for serendipity for both academics and practitioners. New books were ranked as a first source by practitioners for updating information, whereas journals were ranked first for academics. These results showed the information seeking problems of the legal professionals. This led to the development of the interface requirement for the design of a prototype Kuwaiti Legal Information System (KLIS) interface. The aim of the system was to provide relevant and up-to-date information, and links to other information sources and services in order to improve communication channels at both national and international level. The system also sought to be cost-effective. Finally, a heuristic usability evaluation was undertaken by consulting a number of experts on the system's usability and contents. Conclusions are drawn and recommendations for further research and to stakeholders are made.
APA, Harvard, Vancouver, ISO, and other styles
40

Enwald, H. (Heidi). "Tailoring health communication:the perspective of information users' health information behaviour in relation to their physical health status." Doctoral thesis, Oulun yliopisto, 2013. http://urn.fi/urn:isbn:9789526202792.

Full text
Abstract:
Abstract The aim of this thesis was twofold: firstly, to increase understanding about the user of health information; namely about differences of users´ characteristics of health information behaviour, and secondly, to contribute to the research on factors that could be used as bases to tailor health information. Health information behaviour was scrutinised as information needs and seeking and information use in particular. It was also studied in relation to individuals´ physical health status. More studies on information use are needed, because understanding individual characteristics in issues related to information use has been considered critical for promoting healthy behaviours. Moreover, the thesis addressed the gap in research on the relationship between health information behaviour and tailoring health information. The thesis consists of three empirical studies and a literature review. The empirical research environments were provided by an intervention study aiming to prevent type 2 diabetes among a high risk population and by a population-based study among military conscription aged men. The setting was the City of Oulu in Northern Finland with the University of Oulu and the Oulu Deaconess Institute as the main operators of the studies. The empirical data were collected through questionnaires as well as through physiological and biochemical measurements during years 2010 and 2011. The data were analysed with statistical methods. Moreover, a literature review of tailored interventions studies using a computer as the medium of delivery in the context of physical activity, nutrition and weight management, was conducted. The findings indicate differences in health information users´ characteristics related to their information use as such and in relation to the indicators of their physical health status. It is suggested that, for example, health information presentation could be tailored on the basis of found differences and different message strategies and tactics could be used for different kinds of individuals. In addition, in the literature review the biases of tailored intervention studies stood out as influential on their outcomes. The thesis contributes to the current field of research on both health information behaviour and tailoring health communication. Moreover, the findings can support the development of more effective health promotion programs and intervention studies
Tiivistelmä Väitöskirjatutkimukseni tavoitteena on lisätä ymmärrystä terveystiedon käyttäjistä ja erityisesti heidän terveysinformaatiokäyttäytymiseensä liittyvistä ominaisuuksista. Tutkimukseni tuottaa tietoa tekijöistä, joita voidaan käyttää terveystiedon räätälöinnin lähtökohtana. Terveysinformaatiokäyttäytymistä tarkastelen tiedontarpeiden ja -hankinnan sekä erityisesti tiedon käytön näkökulmasta. Informaatiokäyttäytymistä tutkitaan myös suhteessa tiedon käyttäjän fyysiseen terveydentilaan. Tutkimukseni vastaa tarpeeseen tutkia tiedon käyttäjiä, sillä tiedon käyttöön liittyvien yksilöllisten ominaisuuksien ymmärtäminen on keskeistä terveyden edistämisessä. Väitöskirja tuottaa uutta tietoa myös informaatiokäyttäytymisen ja terveystiedon räätälöinnin välisestä suhteesta. Väitöskirjani käsittää neljä osajulkaisua: kolme empiiristä tutkimusta ja kirjallisuuskatsauksen. Empiiriset tutkimukset toteutettiin tyypin 2 diabeteksen ehkäisyyn tähtäävän interventiotutkimuksen (PreDiabEx) ja väestöpohjaisen tutkimuksen (MOPO) tarjoamissa tutkimusympäristöissä. Tutkimusten kohteina olivat miehet ja naiset, joiden riski sairastua tyypin 2 diabetekseen oli korkea sekä kutsuntaikäiset miehet. Tutkimukset toteutettiin Oulussa ja päätoteuttajia olivat Oulun yliopisto ja Oulun Diakonissalaitos. Empiirinen aineisto kerättiin kyselyillä sekä fysiologisilla ja biokemiallisilla terveydentilaa ilmaisevilla mittareilla vuosien 2010 ja 2011 aikana. Aineisto analysoitiin tilastollisesti. Kirjallisuuskatsauksessa analysoidaan fyysisen aktiivisuuden, ravitsemuksen ja painonhallinnan interventiotutkimuksia, joissa tarkastellaan terveystiedon räätälöinnin vaikuttavuutta silloin, kun tiedonvälitykseen käytetään tietokonetta. Empiiristen tutkimusten tulokset viittaavat siihen, että niin terveystiedonkäyttäjien ominaisuuksissa informaatiokäyttäytymisessä kuin sen suhteessa heidän fyysisen terveydentilaansa on eroja. Terveystietoa tulisikin esittää eri tavoin erilaisille ihmisille, muun muassa erilaisia viestistrategioita ja -taktiikoita käyttäen. Kirjallisuuskatsauksen tulokset lisäsivät ymmärrystä siitä, miten tutkimusasetelman vinoumat voivat vaikuttaa interventiotutkimusten tuloksiin
APA, Harvard, Vancouver, ISO, and other styles
41

Thorsson, Petra. ""There is no bad weather..." : The weather information behaviour of everyday users and meteorologists view on information." Thesis, Uppsala universitet, Institutionen för ABM, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-295389.

Full text
Abstract:
The aim of this thesis is to investigate the use of weather information from an information science perspective. By using Everyday Life Information Seeking theories and a qualitative method this thesis takes a novel approach on how weather information is used and viewed by the everyday users and meteorologists. Thus the material, based on seven interviews with everyday users and two focus group interviews with meteorologists, manages to convey new aspects on how weather information is used in an everyday setting and how meteorologists view their role as information providers. The analysis show that for everyday users there is a difference in how weather information is used depending on age. While apps on mobile phones are used by both younger and older informants, other media types, such as TV and webpages, tend to be used by either older or younger age groups. The results also show that there are non-traditional sources used for weather information among everyday users, such as non-weather web cameras and social media. The results also show that there is a difference in how meteorological forecasters and researchers view different aspects of weather information. Both groups have an understanding of information as being dependent on how it is presented, though forecast meteorologists express a more nuanced view. The results from this study show that information science can be a vital tool for studying weather information habits. It is the firm belief of the author that using information science could gain new insights for the meteorological community in the future. This is a two-year master thesis in Archive, Library and Museum studies.
Syftet med denna uppsats är att undersöka väderinformation från ett informationsvetenskapligt perspektiv. Genom att använda Everyday Life Information Seeking teorier och en kvalitativ metod ger denna uppsats ett nydanande angreppsätt på hur väderinformation används och ses av vardagsanvändare och meteorologer. Således kan materialet, som baseras på sju intervjuer med vardagsanvändare och två fokusgruppsintervjuer med meteorologer, frambära nya aspekter på hur väderinformation används i vardagen och hur meteorologer ser på sin roll som informationsförmedlare. Analysen visar att det för vardagsanvändare finns en skillnad i hur väderinformation används beroende på åldersgrupp. Medan appar på mobiltelefoner används av både yngre och äldre informanter, så tenderar övriga media typer, som TV och hemsidor, att användas främst av endast en ålderskategori. Vidare visar resultaten på att icketraditionella källor för väderprognoser används av vardaganvändare, så som webkameror och sociala medier. Resultaten visar även på att det finns en skillnad i hur prognosmeteorologer och meteorologiska forskare ser på olika aspekter av väderinformation. Båda grupperna visar på en förståelse för att information är beroende på hur den presenteras, så ger prognosmeteorologer uttryck för en mer nyanserad bild. Resultaten från studien visa på att informationsvetenskap kan vara ett viktigt verktyg för att studera väderinformationsvanor. Författaren menar på att informationsvetenskap skulle kunna ge nya insikter inom det meteorologiska området i framtiden. Detta är en tvåårig masteruppsats inom Arkiv-, Bibliotek- och Museumstudier.
APA, Harvard, Vancouver, ISO, and other styles
42

Jonsson, Gustav, and Linn Ståhl. "Users’ Perception and Evaluation of a Search Engine Result Page." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-9916.

Full text
Abstract:
In order to find information before an e-commerce purchase, Swedish young adults almost exclusively uses the Google search engine. Previous research contains quantitative data, which showcases how the users utilize search engines as online tools. However, qualitative data regarding the user behaviour on generic search engines were lacking and a gap in the literature was found. In order to collect empirical data to try to fill the gap, six participants were interviewed about their behaviour when using Google. The interviews aimed to discover how the user chooses one result over another at the search engine result page and why. The empirical data showed that the users used the search engine in order to obtain quick and accurate information, in the most convenient process possible. Two major factors were shown to highly contribute to the choice of a user’s perception of the search engine result page. Previous experience and the trustworthiness of a result, strongly affected if a user would choose to click on that result. As a support to both these factors, the user used the technical components: title, URL and snippet. We believe that our findings will contribute to a deeper understanding within search engine user behaviour.
För att hitta information inför ett köp av produkter över Internet, används sökmotorn Google av merparten av svenska unga vuxna. Tidigare forskning inom området innehåller uteslutande ett kvantitativt undersökningsperspektiv, som belyser hur användarna utnyttjar sökmotorerna som ett verktyg. Dock saknas det kvalitativ forskning som utförligt beskriver användarbeteendet. Med målet att hitta empirisk data för att fylla tomrummet, intervjuades sex deltagare om deras beteende och användning av sökmotorn Google. Intervjuerna syftade till att undersöka hur och varför användaren väljer ett resultat framför ett annat. Den empiriska undersökningen visade att användarna nyttjade sökmotorn för att få snabb och korrekt information, på ett så bekvämt sätt som möjligt. Framförallt två faktorer visade sig vara starkt bidragande till varför användarna väljer ett resultat på sökresultat sidan. Tidigare erfarenhet och tillförlitligheten av ett resultat, var båda starkt bidragande orsaker till om användaren skulle välja ett specifikt resultat. Som ett stöd till båda dessa faktorer, använde sig användaren av tekniska funktioner såsom resultats titel, URL och beskrivningen, för att bilda sig en egen uppfattning. Vi tror att vårt resultat kommer att bidra till en djupare förståelse för användarbeteendet inom sökmotorer.
APA, Harvard, Vancouver, ISO, and other styles
43

Robbin, Alice. "Social scientists at work on the electronic network." Meckler, 1992. http://hdl.handle.net/10150/105712.

Full text
Abstract:
The purpose of this article is to contribute to our stock of knowledge about who uses networks, how they are used, and what contribution the networks make to advancing the scientific enterprise. Between 1985 and 1990, the Survey of Income and Program Participation (SIPP) ACCESS data facility at the University of Wisconsin-Madison provided social scientists in the United States and elsewhere with access through the electronic networks to complex and dynamic statistical data; the 1984 SIPP is a longitudinal panel survey designed to examine economic well-being in the United States. This article describes the conceptual framework and design of SIPP ACCESS; examines how network users communicated with the SIPP ACCESS project staff about the SIPP data; and evaluates one outcome derived from the communications, the improvement of the quality of the SIPP data. The direct and indirect benefits to social scientists of electronic networks are discussed. The author concludes with a series of policy recommendations that link the assessment of our inadequate knowledge base for evaluating how electronic networks advance the scientific enterprise and the SIPP ACCESS research network experience to the policy initiatives of the High Performance Computing Act of 1991 (P.L. 102-194) and the related extensive recommendations embodied in Grand Challenges 1993 High Performance Computing and Communications (The FY 1993 U.S. Research and Development Program).
APA, Harvard, Vancouver, ISO, and other styles
44

Hammarstrand, Johanna, and Tommy Fu. "Information security awareness and behaviour: of trained and untrained home users in Sweden." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10457.

Full text
Abstract:
Today we live in an information society that is constantly growing in terms of the amount of information that are processed, stored, and communicated. Information security is a field that is of concern for both the individual and the society as a whole, as both groups are exposed to information every day. A society like this will demand more emphasis on information security. Previous researchers that has addressed this problem argues that security awareness is the most significant factor in order to raise the general security level. They also mention education as a solution to increase the security awareness and thereby achieve a secure environment. The aim of this thesis is to examine the differences between trained and untrained home users in security awareness and behaviour. The research was conducted, using a quantitative method in form of a survey research with the distribution of self-completion questionnaires. The study has a total of 162 respondents that participated. The result was presented and analysed through the use of the software program, IBM SPSS. The results of the findings suggest that the awareness of the trained home users is higher than of those who are untrained home users. Additionally, the discussion suggests that the home users who have participated in awareness raising initiatives, such as education and training, does not necessarily apply more security measures in their home environment, than those who are regarded as untrained home users. Hence, this study suggests that the increase in awareness may not necessarily be the only factor that affects the user’s behaviour, since those who have not participated in awareness raising initiatives applies security measures, almost to the same extent to those who have. This thesis might be able to act as a foundation for future research within the field, considering that the research is a comparative study between trained and untrained home users of the variables security awareness and behaviour where the found results, does not fully agree with previous research. However, an increase in awareness is a good start, but may need to be paired with appropriate training from other parties, such as internet service providers (ISPs) and banks. Maybe the solution could be to develop and strive for a continuous information security culture of the Swedish society, which may result in a deeper learning and understanding of security issues and inspire home users to be engaged and proactive about their information security behaviour.
APA, Harvard, Vancouver, ISO, and other styles
45

Rawstorne, Patrick. "A systematic analysis of the theory of reasoned action, the theory of planned behaviour and the technology acceptance model when applied to the prediction and explanation of information systems use in mandatory usage contexts." Access electronically, 2005. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20060815.154410/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Örblom, Markus. "Effects of Network Performance on Smartphone User Behavior." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177547.

Full text
Abstract:
While the relation between smartphone user behavior and contextual factors have been explored in previous research, the mobile networks’ influence on the smartphone user behavior is largely unknown. Through statistical analysis of a data set collected globally from ˜ 1000 users by an Android app called Ericsson Apps, this study investigates how the users’ app choices and app usage depend on the network performance. The results show, for instance, that the choice of app depends strongly on the network performance, suggesting that it is a factor in the users’ app choices. For example, Swedish users are ˜ 3 times more likely to use Facebook on LTE than when disconnected, i.e., no access to the mobile networks, while ˜ 4.6 times more likely to make a phone call when disconnectedthan on LTE. Additionally, the data analysis finds a demand for better performance in the mobile networks as the downlink data consumption grows linearly without decline, with respect to network performance, for media and video types of apps.
APA, Harvard, Vancouver, ISO, and other styles
47

Ben, Qingyan. "Flight Sorting Algorithm Based on Users’ Behaviour." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-294132.

Full text
Abstract:
The model predicts the best flight order and recommend best flight to users. The thesis could be divided into the following three parts: Feature choosing, data-preprocessing, and various algorithms experiment. For feature choosing, besides the original information of flight itself, we add the user’s selection status into our model, which the flight class is, together with children or not. In the data preprocessing stage, data cleaning is used to process incomplete and repeated data. Then a normalization method removes the noise in the data. After various balancing processing, the class-imbalance data is corrected best with SMOTE method. Based on our existing data, I choose the classification model and Sequential ranking algorithm. Use price, direct flight or not, travel time, etc. as features, and click or not as label. The classification algorithms I used includes Logistic Regression, Gradient Boosting, KNN, Decision Tree, Random Forest, Gaussian Process Classifier, Gaussian NB Bayesian and Quadratic Discriminant Analysis. In addition, we also adopted Sequential ranking algorithm. The results show that Random Forest-SMOTE performs best with AUC of ROC=0.94, accuracy=0.8998.
Modellen förutsäger den bästa flygordern och rekommenderar bästa flyg till användarna. Avhandlingen kan delas in i följande tre delar: Funktionsval, databehandling och olika algoritms experiment. För funktionsval, förutom den ursprungliga informationen om själva flygningen, lägger vi till användarens urvalsstatus i vår modell, vilken flygklassen är , tillsammans med barn eller inte. Datarengöring används för att hantera dubbletter och ofullständiga data. Därefter tar en normaliserings metod bort bruset i data. Efter olika balanserings behandlingar är SMOTE-metoden mest lämplig för att korrigera klassobalans flyg data. Baserat på våra befintliga data väljer jag klassificerings modell och sekventiell ranknings algoritm. Använd pris, direktflyg eller inte, restid etc. som funktioner, och klicka eller inte som etikett. Klassificerings algoritmerna som jag använde inkluderar Logistic Regression, Gradient Boost, KNN, Decision Tree, Random Forest, Gaussian Process Classifier, Gaussian NB Bayesian and Quadratic Discriminant Analysis. Dessutom antog vi också Sequential ranking algoritm. Resultaten visar att Random Forest-SMOTE presterar bäst med AUC för ROC = 0.94, noggrannhet = 0.8998.
APA, Harvard, Vancouver, ISO, and other styles
48

Tramullas, Jesús, and Ana I. Sánchez-Casabón. "Scientific information retrieval behavior: A case study in students of Philosophy." Madrid: Univ. Autónoma de Madrid, 2010. http://hdl.handle.net/10150/252852.

Full text
Abstract:
The behavior and patterns of recovery and processing of digital information by users is a recurring theme in the literature. The study of these behaviors are carried out through observation techniques and analysis of processes, actions and decisions undertaken by users in different situations. This paper presents the data resulting from the study of patterns of recovery and management of reference information of three consecutive courses of a specialized subject. The findings obtained showed a clear difference between patterns of information retrieval and obtained prior to the end of the training process, but there has been a significant change in the ultimate goal of users or appreciable changes in their prospects for application in other environments.
APA, Harvard, Vancouver, ISO, and other styles
49

Mamun, Md Rasel. "An Analysis of Information Technology (IT) Post-Adoption Behavior." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1707339/.

Full text
Abstract:
The primary focus of this research is explicating the role of emotion in IT post-adoption behavior. Studied in the context of intelligent personal assistants (IPA), a class of conversational artificial intelligence (AI), the first study integrates elements from computer science, communications, and IS disciplines. The research identifies two constructs vital for speech-based technologies, natural language understanding, and feedback, and examines their role in use decisions. This work provides guidance to practice on how best to allocate R&D investments in conversational AI. The second essay examines the IT continuance through the theoretical lens of the expectation-confirmation model (ECM), incorportating cognitive and emotional satisfaction into the ECM framework. Empirical testing of the model suggests that it offers additional clarity on IT continuance phenomena and provides a significant improvement to the explanatory power of ECM in the context of an emerging technology. The third essay is one of the earliest efforts to conceptualize and test a theoretical model that considers emotional attachment in IT continuance behavior. This essay develops a novel model to investigate this phenomenon based on emotional attachment theory, and empirically validates the proposed model in the context of conversational artificial intelligence systems. While the existing theories of IT continuance focus on purely rational, goal-oriented factors, this study incorporates non-cognitive aspects by including the emotional consequences of IT continuance and offers evidence that attachment can exist even in the absence of cognitive factors.
APA, Harvard, Vancouver, ISO, and other styles
50

YANG, JIE-YUN, and 楊絜雲. "Exploring Smartphone Users' Social Information Behavior." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/v6y77h.

Full text
Abstract:
碩士
國立臺北大學
資訊管理研究所
104
Surfing the web has become most important and indispensable behavior recently. With the surge of social network services (SNSs), browsing the SNSs has become one of the main sources of people’s information behavior. This study will use social network sites as the core sites to analyze smartphone users’ social information behavior, by collecting three-month period of users’ clickstream data, in order to find out users’ online behavior between SNSs and other sites include news, shopping, search, forum, video and blog. First, user-centric approach will be conducted for correlation analysis to quantify the association between SNSs and other categories, and then use the results as the standard to conduct fixed effect model by exploring the duration of gender, age and weekdays/weekend at 24hrs. Second, site-centric approach will conduct correspondence analysis and association rules by using users' session to gather all categories in the graph and explore the relationship between the SNSs and the other categories. Finally, based on the findings, this study to provide a stepping stone for marketers and researchers to understand web users’ social information behavior.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography