• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 17
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 35
  • 35
  • 10
  • 9
  • 8
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Socialt taggade användare eller sociala användare av taggar? : En kronologisk översikt av vetenskapliga artiklar under tidsperioden 2006-2019 / Socialy tagged users or users of social tagging? : A chronological overview of scientific articles during 2006-2019

Walter, Elisabeth January 2020 (has links)
The main focus of this study has been to give an overview of the view on user of social tagging in research in the field of library and information science. 19 scientific articles where analyzed using qualitative texual analysis. The main focus points have been to look at the research view on user behaviour, user groups or types and user motivation, and how, and if this view has changed over time. The result shows no indication of big changes in the research. The perspective on users is changing gradually over the chosen timeframe and a more nuanced view on users is slowly becoming morepopular.This view is more centered around looking beyond the prcess of tagging as the only influence on users.
22

Recent graduates’ usage and thoughts about LinkedIn

Larsen, Leonora January 2020 (has links)
This study examines how recent graduates with a Bachelor of Science in Media Technology use LinkedIn as a tool for job search and networking. It examines their thoughts around theirbehaviour in relation with how their behaviour can affect their future career opportunities. Thepurpose is to gain a deeper understanding of how LinkedIn is used which is based on the uses and gratifications theory. To examine this an abductive approach has been used, and four semistructured interviews have been done to gather data from the recent graduates. The study shows that recent graduates with a Bachelor of Science in Media Technology use LinkedIn as a tool for job search, but do not use the opportunity to network to its fullest potential. The recent graduates in this study are also passive users who use LinkedIn as a place to gather information that can be used later. This strengthens the earlier studies done in the field that students and recent graduates use LinkedIn passively and do not use the functions “liking”, “commenting”, “sharing” and “posting” to be more visible to the fullest. The recent graduates are aware of the opportunities LinkedIn provide and that it is beneficial for them to be more active there than they are today but find it difficult to know what they would contribute with by being more active.
23

L'amélioration de la performance du produit par l'intégration des tâches d'utilisation dès la phase de conception : une approche de conception comportementale / improving product performance by integration use taks during the design phase : a behavioural design approach

Sun, Huichao 06 March 2012 (has links)
Les processus de conception d'ingénierie mécanique sont souvent centrés sur la technologie et ont des difficultés à intégrer de façon adéquate les comportements des utilisateurs lors des utilisations du futur produit. Ce problème existe tout au long du cycle de vie du projet de développement du produit et est particulièrement visible lors des phases préliminaires de conception. Bien que les industries et les universités conviennent que les aspects humains sont importants pour le succès du produit, il existe peu de méthodes qui soutiennent les créateurs/concepteurs pour la prise encompte de ces facteurs lors des travaux de conception. Afin d'améliorer la performance du produit, notre recherche vise à apporter ou complémenter la conception technique fonctionnelle par une approche plus intégrée. Elle vise en particulier une meilleure intégration du comportement du couple produit/utilisateur dès la phase de conception. En effet, les concepteurs ont été obligés de mettre de côté l’objectif d’une machine entièrement automatisée et doit continuer à faire appel à l'utilisateur pour effectuer certaines tâches. Même si pour améliorer la productivité de la machine l'automatisation des systèmes de production est une voix intéressante, l'intervention humaine sur ces systèmes reste un besoin critique, or elle reste mal définie au stade de la conception. Dans notre cas, le système mécanique pourrait être un système de production, une machine, un produit ou tout autre outil manipulé par un utilisateur. Les conditions d'utilisation sont directement influencées par les travaux de conception, qui constituent également le principal facteur d'amélioration des performances du système. L'objectif de cette recherche est le développement d’une évaluation technique « top-down » et d’une conception d'ingénierie socio-technique pour intégrer les diverses bases de connaissances et en particulier le modèle de tâche. L’objectif est donc de développer une approche de conception comportementale non pas uniquement centrée sur la technologie mais aussi sur une approche socio-technique, afin d'aider les concepteurs à optimiser la performance du produit globalement dès les premières phases de conception. Ainsi, nous proposons une approche qui intègre lesdonnées comportementales système technique, utilisateur et utilisateur/technique. Ce travail porte sur la conception d'ingénierie multi-métiers et traite de l'élaboration d'une approche de conception comportementale pour aider les concepteurs à optimiser la performance du produit globalement dès la phase de conception grâce à la prise en compte des conditions d'utilisation et de la présence de l’utilisateur. Pour expérimenter ces travaux, un logiciel est en développement pour soutenir et permettre une utilisation systématique de cette «approche de conception comportementale» en l'intégrant dans le travail au quotidien du concepteur. / Mechanical engineering design processes are often technology-centered and have difficulties to integrate user’s behaviour in term of using the product adequately. This problem is encountered along the whole life cycle of a project, and is especially noticeable during the early design phase. Although, industry and academia agree that human aspects are important for the success of the product, there are few methods that support the designers concerning these factors in the synthesis part of the design works. Mechanical engineering design is connected with human behaviours targeted at and eventually leading to the development of the product. These behaviours take place all over the product lifecycle. In order to improve product performance, our research carefully thinks out a piece of research linking the user cantered and functional engineering design approached into an integrated package. It aims to a better integration of product and user behaviour during the early design phase. Designers have been obliged to set aside their dreams of a 100% machine due to the vitalrequirement of the user to perform some definite tasks with machines. While machine productivity and use conditions are the main reasons for automating production systems, human intervention on such systems remains a critical need and the tasks performed by the user remain poorly defined at the early design stage. The focus of this research is the development and evaluation of a top-down technical and socio-technical framework for engineering design, which integrates various knowledge bases and the task model. The rationale behind such a framework is to develop a behavioural design approach not in a technology-centered approach, but with a socio-technical approach, in order to help designers to optimize the product performance through taking into account using conditions and requirements during the early design phase. We propose here a design approach that integrates user’s and system’s behavioural data as design specifications. We attempt to provide seamless integration means by merging engineering data and user-centered data within the engineer’s toolkit. Otherwise, classical user-centered approach may seem difficult to handle by the whole design team : in this respect, this work provides a formal integration model in the framework in mechanical engineering design. This paper covers the multi-trade engineering design, and deals with the development of a behavioural design approach to help designers to optimize the product performance in the early design phase through taking into account utilization conditions and requirements. Finally, a software application is in development to support and allow a systematic utilization of the “behavioural design approach” by integrating it into the daily work of the designer.
24

Loyalität als Determinante des Benutzerverhaltens in sozialen Netzwerkdiensten

Pannicke, Danny, Erek, Koray, Zarnekow, Rüdiger 30 May 2014 (has links) (PDF)
No description available.
25

An agent-based Bayesian method for network intrusion detection

Pikoulas, John January 2003 (has links)
Security is one of the major issues in any network and on the Internet. It encapsulates many different areas, such as protecting individual users against intruders, protecting corporate systems against damage, and protecting data from intrusion. It is obviously impossible to make a network totally secure, as there are so many areas that must be protected. This thesis includes an evaluation of current techniques for internal misuse of computer systems, and tries to propose a new way of dealing with this problem. This thesis proposes that it is impossible to fully protect a computer network from intrusion, and shows how different methods are applied at differing levels of the OSI model. Most systems are now protected at the network and transport layer, with systems such as firewalls and secure sockets. A weakness, though, exists in the session layer that is responsible for user logon and their associated password. It is thus important for any highly secure system to be able to continually monitor a user, even after they have successfully logged into the system. This is because once an intruder has successfully logged into a system, they can use it as a stepping-stone to gain full access (often right up to the system administrator level). This type of login identifies another weakness of current intrusion detection systems, in that they are mainly focused on detecting external intrusion, whereas a great deal of research identifies that one of the main problems is from internal intruders, and from staff within an organisation. Fraudulent activities can often he identified by changes in user behaviour. While this type of behaviour monitoring might not be suited to most networks, it could be applied to high secure installations, such as in government, and military organisations. Computer networks are now one of the most rapidly changing and vulnerable systems, where security is now a major issue. A dynamic approach, with the capacity to deal with and adapt to abrupt changes, and be simple, will provide an effective modelling toolkit. Analysts must be able to understand how it works and be able to apply it without the aid of an expert. Such models do exist in the statistical world, and it is the purpose of this thesis to introduce them and to explain their basic notions and structure. One weakness identified is the centralisation and complex implementation of intrusion detection. The thesis proposes an agent-based approach to monitor the user behaviour of each user. It also proposes that many intrusion detection systems cannot cope with new types of intrusion. It thus applies Bayesian statistics to evaluate user behaviour, and predict the future behaviour of the user. The model developed is a unique application of Bayesian statistics, and the results show that it can improve future behaviour prediction than existing ARIMA models. The thesis argues that the accuracy of long-term forecasting questionable, especially in systems that have a rapid and often unexpected evolution and behaviour. Many of the existing models for prediction use long-term forecasting, which may not be the optimal type for intrusion detection systems. The experiments conducted have varied the number of users and the time interval used for monitoring user behaviour. These results have been compared with ARIMA, and an increased accuracy has been observed. The thesis also shows that the new model can better predict changes in user behaviour, which is a key factor in identifying intrusion detection. The thesis concludes with recommendations for future work, including how the statistical model could be improved. This includes research into changing the specification of the design vector for Bayesian. Another interesting area is the integration of standard agent communication agents, which will make the security agents more social in their approach and be able to gather information from other agents
26

Loyalität als Determinante des Benutzerverhaltens in sozialen Netzwerkdiensten

Pannicke, Danny, Erek, Koray, Zarnekow, Rüdiger January 2011 (has links)
No description available.
27

Pattern analysis of the user behaviour in a mobile application using unsupervised machine learning / Mönsteranalys av användarbeteenden i en mobilapp med hjälp av oövervakad maskininlärning

Hrstic, Dusan Viktor January 2019 (has links)
Continuously increasing amount of logged data increases the possibilities of finding new discoveries about the user interaction with the application for which the data is logged. Traces from the data may reveal some specific user behavioural patterns which can discover how to improve the development of the application by showing the ways in which the application is utilized. In this thesis, unsupervised machine learning techniques are used in order to group the users depending on their utilization of SEB Privat Android mobile application. The user interactions in the applications are first extracted, then various data preprocessing techniques are implemented to prepare the data for clustering and finally two clustering algorithms, namely, HDBSCAN and KMedoids are performed to cluster the data. Three types of user behaviour have been found from both K-medoids and HDBSCAN algorithm. There are users that tend to interact more with the application and navigate through its deeper layers, then the ones that consider only a quick check of their account balance or transaction, and finally regular users. Among the resulting features chosen with the help of feature selection methods, 73 % of them are related to user behaviour. The findings can be used by the developers to improve the user interface and overall functionalities of application. The user flow can thus be optimized according to the patterns in which the users tend to navigate through the application. / En ständigt växande datamängd ökar möjligheterna att hitta nya upptäckter om användningen av en mobil applikation för vilken data är loggad. Spår som visas i data kan avslöja vissa specifika användarbeteenden som kan förbättra applikationens utveckling genom att antyda hur applikationen används. I detta examensarbete används oövervakade maskininlärningstekniker för att gruppera användarna beroende på deras bruk av SEB Privat Android mobilapplikation. Användarinteraktionerna i applikationen extraheras ut först, sedan används olika databearbetningstekniker för att förbereda data för klustringen och slutligen utförs två klustringsalgoritmer, nämligen HDBSCAN och Kmedoids för att gruppera data. Tre distinkta typer av användarbeteende har hittats från både K-medoids och HDBSCAN-algoritmen. Det finns användare som har en tendens att interagera mer med applikationen och navigera genom sitt djupare lager, sedan finns det de som endast snabbt kollar på deras kontosaldo eller transaktioner och till slut finns det vanliga användare. Bland de resulterande attributen som hade valts med hjälp av teknikerna för val av attribut, är 73% av dem relaterade till användarbeteendet. Det som upptäcktes i denna avhandling kan användas för att utvecklarna ska kunna förbättra användargränssnittet och övergripande funktioner i applikationen. Användarflödet kan därmed optimeras med hänsyn till de sätt enligt vilka användarna har en speciell tendens att navigera genom applikationen.
28

Einsatz Virtueller Welten in der Aus- und Weiterbildung – Das Projekt Bio-VWe

Lattemann, Christoph, Stieglitz, Stefan 09 May 2014 (has links) (PDF)
No description available.
29

Case studies of the transfer of road safety knowledge and expertise from western countries to Thailand and Vietnam, using an ecological road safety space model : elephants in traffic and rice cooker helmets

King, Mark Johann January 2005 (has links)
International organisations such as the World Health Organisation highlight the road crash problem in less motorised (or developing, or low income) countries like those in Southeast Asia and recommend the adoption of Western road safety measures. However, there are many differences between highly motorised and less motorised countries which raise questions about how successfully Western road safety knowledge and expertise can be transferred.----- A review of the statistical information on road crashes shows a great deal of uncertainty about both the scale and likely trajectory of road fatalities globally, in less motorised countries and in Asia. It is generally agreed, however, that Asia accounts for around half of all road fatalities, and analysis of the limited available data shows both that Southeast Asia is not an atypical region of Asia in road safety terms, and that Thailand and Vietnam are not atypical of Southeast Asian countries.----- A literature review of recommended practice approaches to road safety transfer in Asia shows that there are many economic, institutional, social and cultural factors which potentially influence the success of transfer. The review also shows that there is no coherent, comprehensive approach which either conceptualises these factors and their relationship to transfer outcomes, or uses an analysis of these factors to plan or modify transfer. To address this gap, this thesis develops a 'road safety space' model as a tool for conceptualisation and analysis, based on a biological metaphor which views the transfer of road safety measures from one context to another as analogous to the transfer of a species into a new ecological space. The road safety space model explicitly considers economic, institutional, social and cultural factors (from specific to broad) which influence the particular road safety issue which a particular road safety transfer effort seeks to address. A central contention of this thesis is that the road safety space model is both a feasible and useful tool to improve the process of road safety transfer to less motorised countries. Road safety space analysis is seen to have a role in a broader process of selection of road safety measures for transfer, along with knowledge of how the measures are considered to operate.----- The research reported in this thesis is comprised of three studies. Study 1 reviewed evaluations of road safety transfer to Thailand and Vietnam. Studies 2 and 3 were case studies of road safety transfer to Thailand and Vietnam respectively.----- Study 1 was an analysis of existing evaluations of road safety transfer to Thailand and Vietnam. The aims were to analyse the evaluations for their consideration of contextual factors, as described in the road safety space model, and to discuss whether the road safety space model assisted in understanding the reasons for success or failure of transfer. However, very few such evaluations exist, and those that were found generally lacked information on whether contextual factors were considered. This indicated the need for a more detailed, in-depth qualitative investigation of particular cases of road safety transfer, in order to investigate the feasibility and utility of the road safety space model.----- Two case studies (Study 2 and Study 3) were conducted to test whether the road safety space approach was both feasible and useful as a means of improving road safety transfer efforts. Study 2 was a case study of the development and implementation in Thailand of a road safety education program for school children, which involved the transfer of Western research and techniques. The transfer agents (i.e. those who effected the road safety transfer) were Australian consultants working for the Australian Road Research Board (ARRB). The transfer was funded by the World Bank and managed by the Thai Ministry of Education (MOE). Study 3 was a case study of the development and implementation of a motorcycle helmet wearing program in Vietnam, which involved the transfer of Western knowledge, techniques and technology. The transfer agents were staff of Asia Injury (AI), a non-government organisation (NGO), and the program was funded initially by a charitable fund, with the intention of becoming self-funding through operation of a helmet factory.----- The case studies employed background research into existing information on economic, institutional, social and cultural factors relevant to the road safety issues (road use behaviour of school children in Thailand and motorcycle helmet purchase and wearing in Vietnam), and collected data through interviews with key informants, analysis of secondary sources and observations. This information was used to derive the road safety space for each road safety issue, to identify the road safety space recognised and addressed by the transfer agents (ARRB and AI), and to determine which factors they missed, or were aware of but took no action on. The focus of this analysis was on the processes used in transfer, not on the road safety outcomes of transfer, although these provided information on the processes as well. Available evaluation information was used to draw links between the omissions and the success of the transfer processes. It was noted that information on how the transferred measures operate should come from a road safety space analysis in the originating country, although this raised questions about selection of country and time (when the measure was first introduced, or in its maturity).----- The feasibility and utility of the road safety space model were discussed. It was clear that the model provided information on the cases which was missed by the transfer agents. The questions examined next were whether this information could have been obtained from an exercise conducted before the transfer had commenced, whether the required effort and cost justified the potential benefits, and whether the information on the road safety space could have been useful for the transfer agents. Comparisons between the road safety spaces for the two cases showed some areas of commonality, e.g. perceptions of police corruption, but also many differences. It was considered likely that some broad factors could be generic, and the possibility was mooted that less motorised countries share issues with police enforcement. This requires further research, however, and at this stage it is better to treat each road safety space as a unique combination of contextual factors influencing the road safety issue of interest.----- It is concluded that the road safety space model is feasible if used in such a way as to minimise the research involved, and useful, although the degree of utility needs to be further explored in a prospective study. The limitation introduced by restricting informants to those who could speak English are discussed. An approach using road safety space analysis is recommended, emphasising analysis of the country to which the road safety measure is being transferred, supplemented by analysis of the originating country road safety space. Gaps in knowledge are identified for further research and development, in particular the theoretical and practical understanding of road use behaviours and their modification in less motorised countries in Southeast Asia. Elaboration of the model is also recommended, to take into account the influence of the type of measure transferred, the role of the transfer agent, the area of road safety (education, engineering or enforcement), and the time dimension (the time which might be needed for a transfer to show its effects).----- The findings of this research are likely to be applicable to road safety transfer in other less motorised regions of the world, however prospective testing is needed. They may also be relevant to issues of transfer for areas other than road safety, in particular public health and traffic engineering, where similar economic, institutional, social and cultural issues come together.
30

Towards a framework to promote the development of secure and usable online information security applications

Mujinga, Mathias 01 1900 (has links)
The proliferation of the internet and associated online activities exposes users to numerous information security (InfoSec) threats. Such online activities attract a variety of online users who include novice computer users with no basic InfoSec awareness knowledge. Information systems that collect and use sensitive and confidential personal information of users need to provide reliable protection mechanisms to safeguard this information. Given the constant user involvement in these systems and the notion of users being the weakest link in the InfoSec chain, technical solutions alone are insufficient. The usability of online InfoSec systems can play an integral role in making sure that users use the applications effectively, thereby improving the overall security of the applications. The development of online InfoSec systems calls for addressing the InfoSec problem as a social problem, and such development must seek to find a balance between technical and social aspects. The research addressed the problem of usable security in online InfoSec applications by using an approach that enabled the consideration of both InfoSec and usability in viewing the system as a socio-technical system with technical and social sub-systems. Therefore, the research proposed a socio-technical framework that promotes the development of usable security for online information systems using online banking as a case study. Using a convergent mixed methods research (MMR) design, the research collected data from online banking users through a survey and obtained the views of online banking developers through unstructured interviews. The findings from the two research methods contributed to the selection of 12 usable security design principles proposed in the sociotechnical information security (STInfoSec) framework. The research contributed to online InfoSec systems theory by developing a validated STInfoSec framework that went through an evaluation process by seven field experts. Although intended for online banking, the framework can be applied to other similar online InfoSec applications, with minimum adaptation. The STInfoSec framework provides checklist items that allow for easy application during the development process. The checklist items can also be used to evaluate existing online banking websites to identify possible usable security problems. / Computer Science / D. Phil. (Computer Science)

Page generated in 0.4412 seconds