Journal articles on the topic 'Users information behavior'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Users information behavior.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
A. Kalisdha, A. Kalisdha. "Information Need and Information Seeking Behavior of Users in a Library and Information System." International Journal of Scientific Research 2, no. 11 (June 1, 2012): 274–76. http://dx.doi.org/10.15373/22778179/nov2013/87.
Full textChiang, I. Ping. "Exploring Smartphone Users’ Social Information Behavior." Contemporary Management Research 15, no. 1 (March 1, 2019): 53–67. http://dx.doi.org/10.7903/cmr.18461.
Full textHuang, Chun-Yao, Yung-Cheng Shen, I.-Ping Chiang, and Chen-Shun Lin. "Characterizing Web users' online information behavior." Journal of the American Society for Information Science and Technology 58, no. 13 (2007): 1988–97. http://dx.doi.org/10.1002/asi.20669.
Full textWu, Dan, Rui Qiao, and Yi Li. "A study on location-based mobile map search behavior." Program 50, no. 3 (July 4, 2016): 246–69. http://dx.doi.org/10.1108/prog-11-2015-0074.
Full textSun, Yuan, Shuyue Fang, and Yujong Hwang. "Investigating Privacy and Information Disclosure Behavior in Social Electronic Commerce." Sustainability 11, no. 12 (June 15, 2019): 3311. http://dx.doi.org/10.3390/su11123311.
Full textLiu, Shuangji, Yongzhong Yang, and Yiwei Wang. "Integration of Museum User Behavior Information Based on Wireless Network." Mobile Information Systems 2021 (July 9, 2021): 1–8. http://dx.doi.org/10.1155/2021/6847144.
Full textRanganathan, C., DongBack Seo, and Yair Babad. "Switching behavior of mobile users: do users' relational investments and demographics matter?" European Journal of Information Systems 15, no. 3 (June 2006): 269–76. http://dx.doi.org/10.1057/palgrave.ejis.3000616.
Full textZhang, Pei Ying, Ya Jun Du, and Chang Wang. "Clustering Users According to Common Interest Based on User Search Behavior." Advanced Materials Research 143-144 (October 2010): 851–55. http://dx.doi.org/10.4028/www.scientific.net/amr.143-144.851.
Full textRuiz, Miguel E., and Pok Chin. "Users' seeking behavior and multilingual image tags." Proceedings of the American Society for Information Science and Technology 47, no. 1 (November 2010): 1–2. http://dx.doi.org/10.1002/meet.14504701407.
Full textFagan, Derek, Brian Caulfield, and René Meier. "Analyzing the Behavior of Smartphone Service Users." International Journal of Ambient Computing and Intelligence 5, no. 2 (April 2013): 1–16. http://dx.doi.org/10.4018/jaci.2013040101.
Full textChen, Wanyu, Zepeng Hao, Taihua Shao, and Honghui Chen. "Personalized query suggestion based on user behavior." International Journal of Modern Physics C 29, no. 04 (April 2018): 1850036. http://dx.doi.org/10.1142/s0129183118500365.
Full textVoordijk, Hans, and Ruth Sloot. "BIM mediation and users’ behavior." International Journal of Managing Projects in Business 13, no. 7 (August 28, 2019): 1561–77. http://dx.doi.org/10.1108/ijmpb-11-2018-0255.
Full textHong, Ying, Meng Wan, and Zheng Li. "Understanding the Health Information Sharing Behavior of Social Media Users." Journal of Organizational and End User Computing 33, no. 5 (September 2021): 180–203. http://dx.doi.org/10.4018/joeuc.20210901.oa9.
Full textHalilovic, Semina, and Muris Cicic. "Segmentation of Information Systems Users." Journal of Organizational and End User Computing 25, no. 4 (October 2013): 1–26. http://dx.doi.org/10.4018/joeuc.2013100101.
Full textMa, Liang, Xin Zhang, and Xiao Yan Ding. "Social media users’ share intention and subjective well-being." Online Information Review 42, no. 6 (October 8, 2018): 784–801. http://dx.doi.org/10.1108/oir-02-2017-0058.
Full textZhao, Yueshu, and Mingsheng Zhao. "WeChat Users’ Information Protection Behavior Based on Prospect Theory." International Journal of Information and Education Technology 9, no. 6 (2019): 390–95. http://dx.doi.org/10.18178/ijiet.2019.9.6.1233.
Full textChen, Yang, Chulu Liang, and Danqing Cai. "Understanding WeChat Users’ Behavior of Sharing Social Crisis Information." International Journal of Human–Computer Interaction 34, no. 4 (January 24, 2018): 356–66. http://dx.doi.org/10.1080/10447318.2018.1427826.
Full textFrank, Jonathan, Boas Shamir, and Warren Briggs. "Security-related behavior of PC users in organizations." Information & Management 21, no. 3 (October 1991): 127–35. http://dx.doi.org/10.1016/0378-7206(91)90059-b.
Full textOrso, Valeria, Tuukka Ruotsalo, Jukka Leino, Luciano Gamberini, and Giulio Jacucci. "Overlaying social information: The effects on users’ search and information-selection behavior." Information Processing & Management 53, no. 6 (November 2017): 1269–86. http://dx.doi.org/10.1016/j.ipm.2017.06.001.
Full textChen, Hao, and Wenli Li. "Mobile device users’ privacy security assurance behavior." Information & Computer Security 25, no. 3 (July 10, 2017): 330–44. http://dx.doi.org/10.1108/ics-04-2016-0027.
Full textLiu, Guo-qi, Yi-jia Zhang, Ying-mao Fu, and Ying Liu. "Behavior Identification Based on Geotagged Photo Data Set." Scientific World Journal 2014 (2014): 1–6. http://dx.doi.org/10.1155/2014/616030.
Full textMaity, Moutusy, Kallol Bagchi, Arunima Shah, and Ankita Misra. "Explaining normative behavior in information technology use." Information Technology & People 32, no. 1 (February 4, 2019): 94–117. http://dx.doi.org/10.1108/itp-11-2017-0384.
Full textLiu, Li, Xin Su, Umair Akram, and Muhammad Abrar. "The User Acceptance Behavior to Mobile Digital Libraries." International Journal of Enterprise Information Systems 16, no. 2 (April 2020): 38–53. http://dx.doi.org/10.4018/ijeis.2020040103.
Full textFeng, Y., D. S. Liu, Chun Hua Ju, and Hao Tian. "Manufacturing Information Recommendation Model Based on Pattern Mining." Advanced Materials Research 121-122 (June 2010): 294–99. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.294.
Full textZhitomirsky-Geffet, Maayan, and Maya Blau. "Cross-generational analysis of information seeking behavior of smartphone users." Aslib Journal of Information Management 69, no. 6 (November 20, 2017): 721–39. http://dx.doi.org/10.1108/ajim-04-2017-0083.
Full textHarati, Hadi, Fatemeh Nooshinfard, Alireza Isfandyari-Moghaddam, Fahimeh Babalhavaeji, and Nadjla Hariri. "Factors affecting the unplanned use behavior of academic libraries users." Aslib Journal of Information Management 71, no. 2 (March 18, 2019): 138–54. http://dx.doi.org/10.1108/ajim-04-2018-0092.
Full textJovanović, Tamara, Sanja Božić, Bojana Bodroža, and Uglješa Stankov. "Influence of users’ psychosocial traits on Facebook travel–related behavior patterns." Journal of Vacation Marketing 25, no. 2 (April 24, 2018): 252–63. http://dx.doi.org/10.1177/1356766718771420.
Full textHariri, Nadjla, Maryam Asadi, and Yazdan Mansourian. "The impact of users’ verbal/imagery cognitive styles on their Web search behavior." Aslib Journal of Information Management 66, no. 4 (July 15, 2014): 401–23. http://dx.doi.org/10.1108/ajim-02-2013-0019.
Full textXia, Rong Ze, Yan Jia, Wang Qun Lin, and Hu Li. "Mining Information Spreading Based on Users' Retweet Behavior in Twitter." Applied Mechanics and Materials 380-384 (August 2013): 2866–70. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2866.
Full textWang, Chen-Ya, Yi-Chun Lin, Hsia-Ching Chang, and Seng-cho T. Chou. "Consumer Sentiment in Tweets and Coupon Information-Sharing Behavior." International Journal of Online Marketing 7, no. 3 (July 2017): 1–19. http://dx.doi.org/10.4018/ijom.2017070101.
Full textShi, Juan, Ping Hu, Kin Keung Lai, and Gang Chen. "Determinants of users’ information dissemination behavior on social networking sites." Internet Research 28, no. 2 (April 4, 2018): 393–418. http://dx.doi.org/10.1108/intr-01-2017-0038.
Full textSpiller, Joan, Anthony Vlasic, and Philip Yetton. "Post-adoption behavior of users of Internet Service Providers." Information & Management 44, no. 6 (September 2007): 513–23. http://dx.doi.org/10.1016/j.im.2007.01.003.
Full textAlohali, Manal, Nathan Clarke, Fudong Li, and Steven Furnell. "Identifying and predicting the factors affecting end-users’ risk-taking behavior." Information & Computer Security 26, no. 3 (July 9, 2018): 306–26. http://dx.doi.org/10.1108/ics-03-2018-0037.
Full textYi-wen, ZHANG, BAI Yan-qi, and YANG An-ju. "Statistical analysis of city and the villages Internet users based on user logs." MATEC Web of Conferences 176 (2018): 03011. http://dx.doi.org/10.1051/matecconf/201817603011.
Full textHsu, Chin-Lung, and Judy Chuan-Chuan Lin. "An Empirical Study of Smartphone User Behavior." International Journal of Mobile Human Computer Interaction 7, no. 1 (January 2015): 1–24. http://dx.doi.org/10.4018/ijmhci.2015010101.
Full textYu, Dingguo, Nan Chen, and Xu Ran. "Computational modeling of Weibo user influence based on information interactive network." Online Information Review 40, no. 7 (November 14, 2016): 867–81. http://dx.doi.org/10.1108/oir-12-2015-0391.
Full textOh, Se-Na, and Jee-Yeon Lee. "A Study on Information Searching Behavior of Smart Phone Users." Journal of the Korean Society for information Management 29, no. 1 (March 30, 2012): 191–209. http://dx.doi.org/10.3743/kosim.2012.29.1.191.
Full textRajawat, Kumkum. "Information Seeking Behavior of Users of Pharmacy Colleges in Rajasthan." Pearl : A Journal of Library and Information Science 13, no. 3 (2019): 263. http://dx.doi.org/10.5958/0975-6922.2019.00033.0.
Full textMaisiak, Richard, Sandra Koplon, and Louis W. Heck. "Subsequent behavior of users of an arthritis information telephone service." Arthritis & Rheumatism 33, no. 2 (February 1990): 212–18. http://dx.doi.org/10.1002/art.1780330209.
Full textTuhina Choudhury, Tuhina Choudhury. "Information Needs and Seeking Behavior of Assam University Library Users." IOSR Journal of Humanities and Social Science 11, no. 6 (2013): 10–23. http://dx.doi.org/10.9790/0837-1161023.
Full textSheremeta, Roman M., and Timothy W. Shields. "Deception and reception: The behavior of information providers and users." Journal of Economic Behavior & Organization 137 (May 2017): 445–56. http://dx.doi.org/10.1016/j.jebo.2017.03.019.
Full textAl-Samarraie, Hosam, Atef Eldenfria, and Husameddin Dawoud. "The impact of personality traits on users’ information-seeking behavior." Information Processing & Management 53, no. 1 (January 2017): 237–47. http://dx.doi.org/10.1016/j.ipm.2016.08.004.
Full textOh, Dong-Geun. "Complaining behavior of public library users in South Korea." Library & Information Science Research 25, no. 1 (March 2003): 43–62. http://dx.doi.org/10.1016/s0740-8188(02)00165-2.
Full textZhang, Xiangmin. "Expertise, search behavior, and search performance of engineering users." Proceedings of the American Society for Information Science and Technology 40, no. 1 (January 31, 2005): 546–47. http://dx.doi.org/10.1002/meet.14504001117.
Full textShi, Yancui, Jianhua Cao, Congcong Xiong, and Xiankun Zhang. "A Prediction Method of Mobile User Preference Based on the Influence between Users." International Journal of Digital Multimedia Broadcasting 2018 (July 19, 2018): 1–12. http://dx.doi.org/10.1155/2018/8081409.
Full textZhang, Xiao Juan, Zhenzhen Li, and Hepu Deng. "Information security behaviors of smartphone users in China: an empirical analysis." Electronic Library 35, no. 6 (November 6, 2017): 1177–90. http://dx.doi.org/10.1108/el-09-2016-0183.
Full textSubahi, Alanoud, and George Theodorakopoulos. "Detecting IoT User Behavior and Sensitive Information in Encrypted IoT-App Traffic." Sensors 19, no. 21 (November 3, 2019): 4777. http://dx.doi.org/10.3390/s19214777.
Full textChen, Zhenguo, Liqin Tian, and Chuang Lin. "Trust evaluation model of cloud user based on behavior data." International Journal of Distributed Sensor Networks 14, no. 5 (May 2018): 155014771877692. http://dx.doi.org/10.1177/1550147718776924.
Full textSingal, Himani, and Shruti Kohli. "Mitigating Information Trust." International Journal of Technoethics 7, no. 1 (January 2016): 16–33. http://dx.doi.org/10.4018/ijt.2016010102.
Full textShwartz-Asher, Daphna, Soon Ae Chun, and Nabil R. Adam. "Knowledge behavior model of e-government social media users." Transforming Government: People, Process and Policy 11, no. 3 (August 21, 2017): 456–75. http://dx.doi.org/10.1108/tg-02-2017-0014.
Full text