• Title/Summary/Keyword: Behavioural Characteristics

Search Result 23, Processing Time 0.017 seconds

A Study of the Behaviours in Searching Full-Text Databases- Subject Specialists vs. Professional Searchers - (전문데이터베이스의 탐색특성에 관한 연구 - 주제전문가와 탐색전문가 -)

  • Lee Eung-Bong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.30 no.2
    • /
    • pp.51-86
    • /
    • 1996
  • The primary purpose of this study is to verify the difference of behavioural characteristics between the subject specialists and professional searchers in searching full-text databases. The major findings and conclusions from this study are summarized as follows. Analyses of Search questions(the degree of understanding with search questions, the degree of difficulty in selecting terms, and the degree of expectation of search results), search processes(the number of search terms used, the number of Boolean operators and qualifiers used, the number of documents browsed and the search time(the connecting time, time to spend per one output document, time to spend per one relevant output document) and search results(the searching efficiency(the number of relevant documents, the ,recall ratio and the precision ratio), the search cost(the total search cost. the search cost per one output document and the search cost per one relevant output document) and the degree of satisfaction with search results) are significantly different between the subject specialists and professional searchers in searching full-text databases.

  • PDF

Early dropout predictive factors in obesity treatment

  • Michelini, Ilaria;Falchi, Anna Giulia;Muggia, Chiara;Grecchi, Ilaria;Montagna, Elisabetta;De Silvestri, Annalisa;Tinelli, Carmine
    • Nutrition Research and Practice
    • /
    • v.8 no.1
    • /
    • pp.94-102
    • /
    • 2014
  • Diet attrition and failure of long term treatment are very frequent in obese patients. This study aimed to identify pre-treatment variables determining dropout and to customise the characteristics of those most likely to abandon the program before treatment, thus making it possible to modify the therapy to increase compliance. A total of 146 outpatients were consecutively enrolled; 73 patients followed a prescriptive diet while 73 followed a novel brief group Cognitive Behavioural Treatment (CBT) in addition to prescriptive diet. The two interventions lasted for six months. Anthropometric, demographic, psychological parameters and feeding behaviour were assessed, the last two with the Italian instrument VCAO Ansisa; than, a semi-structured interview was performed on motivation to lose weight. To identify the baseline dropout risk factors among these parameters, univariate and multivariate logistic models were used. Comparison of the results in the two different treatments showed a higher attrition rate in CBT group, despite no statistically significant difference between the two treatment arms (P = 0.127). Dropout patients did not differ significantly from those who did not dropout with regards to sex, age, Body Mass Index (BMI), history of cycling, education, work and marriage. Regardless of weight loss, the most important factor that determines the dropout appears to be a high level of stress revealed by General Health Questionnaire-28 items (GHQ-28) score within VCAO test. The identification of hindering factors during the assessment is fundamental to reduce the dropout risk. For subjects at risk, it would be useful to dedicate a stress management program before beginning a dietary restriction.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.