• Title/Summary/Keyword: Information Behaviour

Search Result 428, Processing Time 0.022 seconds

Log Usage Analysis: What it Discloses about Use, Information Seeking and Trustworthiness

  • Nicholas, David;Clark, David;Jamali, Hamid R.;Watkinson, Anthony
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.1
    • /
    • pp.23-37
    • /
    • 2014
  • The Trust and Authority in Scholarly Communications in the Light of the Digital Transition research project1) was a study which investigated the behaviours and attitudes of academic researchers as producers and consumers of scholarly information resources in respect to how they determine authority and trustworthiness. The research questions for the study arose out of CIBER's studies of the virtual scholar. This paper focuses on elements of this study, mainly an analysis of a scholarly publisher's usage logs, which was undertaken at the start of the project in order to build an evidence base, which would help calibrate the main methodological tools used by the project: interviews and questionnaire. The specific purpose of the log study was to identify and assess the digital usage behaviours that potentially raise trustworthiness and authority questions. Results from the self-report part of the study were additionally used to explain the logs. The main findings were that: 1) logs provide a good indicator of use and information seeking behaviour, albeit in respect to just a part of the information seeking journey; 2) the 'lite' form of information seeking behaviour observed in the logs is a sign of users trying to make their mind up in the face of a tsunami of information as to what is relevant and to be trusted; 3) Google and Google Scholar are the discovery platforms of choice for academic researchers, which partly points to the fact that they are influenced in what they use and read by ease of access; 4) usage is not a suitable proxy for quality. The paper also provides contextual data from CIBER's previous studies.

The chaotic motion analysis by hardware implementation of Bonhoeffer Van der Pol oscillation model (Bonhoeffer Van der Pol 오실레이터 모델의 하드웨어 구현에 의한 카오스 운동 해석)

  • Bae, Yeong-Cheol;Seo, Sam-Mun;Im, Hwa-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.877-882
    • /
    • 1996
  • The effects of periodic and chaotic behaviour in the Bonhoeffer-Van der Pol (BVP) oscillation of the nerve membrane driven by a periodic stimulating current A1 coswtare investigated through hardware implementation.For hardware implementation of the BVP model. real element values were escaled with computer simulation results to determine the parameter real value.As the parameter A1 varied in the range 0 to 1.3, the BVP model showed an ordinary and reversed period-doubling cascade and a chaotic state. At the low driving amplitude ofa1 the period-doubling showed and at the high driving amplitude of A1 the chaotic state occured. To analyse the BVP model for chaotic behaviour Phase Plane, Time series are used to verify that properties.

  • PDF

A Study on the Assessment for Service Quality in Public Libraries (공공도서관의 서비스 질 평가에 관한 실증적 연구 -서비스 질 요인이 고객만족 및 고객행태에 미치는 영향 -)

  • Lee, Jong-Kwon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.36 no.2
    • /
    • pp.89-117
    • /
    • 2002
  • The purpose of this study is to construct a model for measuring and assessing service quality in public libraries based on the theory of service quality in marketing area. Firstly the degree of importance of service factors is measured and ranked according to the value of each factor. This importance ranking indicates the order of service improvement. Secondly the correlation model between service factors and customer's satisfaction and behaviour is established and verified in statistical method. The result shows that the order of service quality factors which have influence on the customer's satisfaction and behaviour is the order of service quality factors required preferential improvement.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

Investigation on structural behaviour of composite cold-formed steel and reinforced concrete flooring systems

  • Omar A., Shamayleh;Harry, Far
    • Steel and Composite Structures
    • /
    • v.45 no.6
    • /
    • pp.895-905
    • /
    • 2022
  • Composite flooring systems consisting of cold-formed steel joists and reinforced concrete slabs offer an efficient, lightweight solution. However, utilisation of composite action to achieve enhanced strength and economical design has been limited. In this study, finite element modelling was utilised to create a three-dimensional model which was then validated against experimental results for a composite flooring system consisting of cold-formed steel joists, reinforced concrete slab and steel bolt shear connectors. This validated numerical model was then utilised to perform parametric studies on the performance of the structural system. The results from the parametric study demonstrate that increased thickness of the concrete slab and increased thickness of the cold formed steel beam resulted in higher moment capacity and stiffness of the composite flooring system. In addition, reducing the spacing of bolts and spacing of the cold formed steel beams both resulted in enhanced load capacity of the composite system. Increasing the concrete grade was also found to increase the moment capacity of the composite flooring system. Overall, the results show that an efficient, lightweight composite flooring system can be achieved and optimised by selecting suitable concrete slab thickness, cold formed beam thickness, bolt spacing, cold formed beam spacing and concrete grade.

Tourists' Excursion Behavior Analysis Considering Their Information Usage (관광객의 정보이용이 관광주유행동에 미치는 영향분석)

  • Kim, Hyun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.4D
    • /
    • pp.339-349
    • /
    • 2010
  • The objective of this paper is to develop a structural equations model system for the purpose of tourists' excursion behaviour analysis with their information usage. A tourist' excursion behavior defined as activities in the sightseeing region between arriving and leaving time includes indexes with respect to activity' time use and the number of spots. Additionally, such indexes can be modeled as endogenous variables in the structural equation model system on the assumption that they are influenced by the degree of familarity on the sightseeing region, the degree of information usage, and individual attributes. The case study application involves excursion behaviour data such as one-day excursion activity and information usage diary that are observed in the Fuji Five Lakes, Japan. Since the models presented in the paper are available to statistically analyze the covariance among the endogenous variables, they have the advantage of effectiveness analysis on information usage in the excursion area, compared to the prior approaches such as discrete choice models.

Daily Travel Pattern using Public Transport Mode in Seoul:An Analysis of a Multi-Dimensional Motif Search (핵심정보배열 추출에 의한 서울시 대중교통 통행패턴 분석)

  • Joh, Chang-Hyeon
    • Journal of the Korean Geographical Society
    • /
    • v.44 no.2
    • /
    • pp.176-186
    • /
    • 2009
  • Transportation policy to facilitate the public mode use is of the foremost importance to the local governments of Metropolitan Seoul, regarding the economic and environmental consequences of the increasing use of car. Understanding the travel behaviour is essential to the establishment of proper policy to guide more people to the use of public modes instead of private. The paper reports a result of sequential analysis of individual travel behaviour in Metropolitan Seoul, using a multi-dimensional motif search technique applied to Smart Card data that integrates individuals' different public mode uses. Groups of travel patterns with similar sequential information identified distinctive travel behaviour between Seoul north and south and between metro and bus uses. Travel patterns are more bounded within north Seoul and south Seoul respectively than crossing Han River between north and south. Within north and south, travel patterns visiting northern CBD and southern CBD, respectively, as well as their local neighbour in north and south, often use metro and metro-local bus combination, while travel patterns visiting only the north and south locals without CBDs more use only the local bus line and even only the areal bus line.

The Comparative Study on the Differences among Choice of Information Source, Risk Perception and Benefits Sought According to the Purchase Type of the Men's Suits (남성복 구매형태에 따른 정보원 선택, 위험지각, 추구혜택의 차이에 관한 비교 연구)

  • 김노호;황선진
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.7
    • /
    • pp.123-134
    • /
    • 2001
  • The purpose of this study to compare the purchasing behaviour of men's business suits, among custom suits, system order, and ready-made suits, centering around the choice of information source, risk perception and benefits sought. The survey of this study was collected from 450 adult male in Seoul. The data was analyzed by factor analysis and ANOVA. The result of this study were as follows : 1. Custom suits, system order, and ready-made suits consumers have a significant difference in the choice of information source. The consumer attaching most importance to the impersonal information source is the system order users, custom suits users, and ready-made suits users respectively. However there was no significant difference in the personal source among 3 different purchasing behaviour of men's suits. 2. For the risk perception, 1) the group who perceived the highest in economic risk is the system order users, followed by custom suits users, and ready-made suits users. 2) the group who perceived performance risk as being the highest concern is the ready-made suits consumers, followed by system order user, and custom suits user. 3) the group who perceived the socio-psychological risk as the highest is the ready-made suits consumers, and followed by custom suits user and system order users. 4) there is no difference among the three groups with respect to the fashionability loss risk. 5) the group of the highest perceiving the useful loss risk is the ready-made suits consumers, and the next is system order users, custom suits users. 6) the group of the highest perceiving the time and convenience loss risk is ready-made suits users, and the next is system order users, custom suits users. 3. For the benefit sought, the group of the highest perceiving the aesthetics is custom suits consumers, and the next is system order users, ready-made suits users.

  • PDF

Information Pollution, a Mounting Threat: Internet a Major Causality

  • Pandita, Ramesh
    • Journal of Information Science Theory and Practice
    • /
    • v.2 no.4
    • /
    • pp.49-60
    • /
    • 2014
  • The present discourse lasts around, information pollution, causes and concerns of information pollution, internet as a major causality and how it affects the decision making ability of an individual. As, information producers in the process to not to lose the readership of their content, and to cater the information requirements of both the electronic and the print readers, reproduce almost the whole of the printed information in digital form as well. Abundant literature is also equally produced in electronic format only, thereon, sharing this information on hundreds of social networking sites, like, Facebook, Twitter, Blogs, Flicker, Digg, LinkedIn, etc. without attributions to original authors, have created almost a mess of this whole information produced and disseminated. Accordingly, the study discusses about the sources of information pollution, the aspects of unstructured information along with plagiarism. Towards the end of the paper stress has been laid on information literacy, as how it can prove handy in addressing the issue with some measures, which can help in regulating the behaviour of information producers.

Information Retrieval: A Communication Process in the 21st Century Library

  • Umeozor, Susan Nnadozie
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.2
    • /
    • pp.7-18
    • /
    • 2020
  • Communication is a process involving a group of interrelated elements working together for the purpose of information transfer. This paper discusses information retrieval as a communication process in the 21st century library. The difficulties associated with access to recorded knowledge through bibliographic control devices have been exacerbated by the interposition of additional encoding processes in the library and further decoding by the users. In addition, the innovation of internet/web has revolutionized the means and mode of communication process in the library by flooding information seekers with information and creating an illusion of self-sufficiency in many users. With these changes in information seeking behaviour and pattern, a cybernetic approach to information retrieval has emerged emphasizing adaptive control mechanisms and feedback processes. This paper argues that libraries should strive to continuously remain relevant by keeping abreast with changes in the behavior of information users. To this end, this paper proposes apomediatic-cybernetic model of communication, which illustrates information retrieval processes for the 21st-century library.