• Title/Summary/Keyword: User Problem Behaviors

Search Result 43, Processing Time 0.028 seconds

Internet Use Motivations and Problem Behaviors of Vocational High School Students according to Internet Addiction and Family System Type (실업계 고등학생의 인터넷 중독 수준과 가족체계유형에 따른 인터넷 사용동기 및 문제행동)

  • Shin, Soo-Jung;Jang, Yoon-Ok
    • Journal of Families and Better Life
    • /
    • v.25 no.5
    • /
    • pp.31-46
    • /
    • 2007
  • The purpose of this study was to determine the differences in internet use motivations and problem behaviors among vocational high school students according to internet addiction and family system type. Five hundred vocational high school students from Daegu took part in the survey. The questionnaire survey consisted of an internet addiction self-assessment scale, a family system type scale, an internet use motivation scale, and a problem behavior scale. The data was analysed using MANOVA and Cronbach a, and the $Scheff\acute{e}$ test was used for post-hoc analysis. The major findings of this study were as follows: First, the study found significant differences in adolescent internet use motivation according to internet addiction. Adolescents in the high dangerous user group showed higher communicative, experiential, and addictive motivations than adolescents in potentially dangerous and normal user groups. Also, there were no significant differences in informative motivation according to internet addiction. Regardless of internet addiction, adolescents tend to use the internet to search for information and to solve problems. Second, there were significant differences in adolescents' problem behaviors according to internet addiction. More specifically, adolescents who were in the high dangerous user group displayed more problem behaviors toward their body, family, school, and society than adolescents in the potentially dangerous and the normal user groups. Third, an adolescent's family system type significantly influenced his/her internet use motivation. Adolescents from an extreme family showed higher communicative and addictive motivations than adolescents from middle and balanced families. Fourth, there were significant differences in the problem behaviors of adolescents according to family system types. Adolescents from an extreme family showed more problem behaviors toward their body, family, school, and society than adolescents from middle and balanced families.

Product Adoption Maximization Leveraging Social Influence and User Interest Mining

  • Ji, Ping;Huang, Hui;Liu, Xueliang;Hu, Xueyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2069-2085
    • /
    • 2021
  • A Social Networking Service (SNS) platform provides digital footprints to discover users' interests and track the social diffusion of product adoptions. How to identify a small set of seed users in a SNS who is potential to adopt a new promoting product with high probability, is a key question in social networks. Existing works approached this as a social influence maximization problem. However, these approaches relied heavily on text information for topic modeling and neglected the impact of seed users' relation in the model. To this end, in this paper, we first develop a general product adoption function integrating both users' interest and social influence, where the user interest model relies on historical user behavior and the seed users' evaluations without any text information. Accordingly, we formulate a product adoption maximization problem and prove NP-hardness of this problem. We then design an efficient algorithm to solve this problem. We further devise a method to automatically learn the parameter in the proposed adoption function from users' past behaviors. Finally, experimental results show the soundness of our proposed adoption decision function and the effectiveness of the proposed seed selection method for product adoption maximization.

A Study on the User Problem Behavior in Overseas Public Libraries (국외 공공도서관의 이용자 문제행동에 대한 대처방안분석)

  • Lee Eun-Ju;Youn You-Ra
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.187-192
    • /
    • 2023
  • A problem user in a library refers to a person who harasses others or causes a disturbance through inappropriate behavior in the library. Users' continued problematic behavior reduces the work productivity of librarians and at the same time causes inconvenience to other users. This may cause a decline in the free use of public libraries. In Korea, a user response manual has been developed to guide librarians to respond wisely to user problem behavior. However, it is true that most of the content provides guidance on how to communicate with problem users, and there is a lack of countermeasures to stipulate and regulate follow-up measures against them. The goal of this study is to further systematize response and organize them into written regulations. To this end, this study to examine regulations and legal battles surrounding problem users in oversea public libraries and to examine what can be applied in Korea in the future.

An Interface Technique for Avatar-Object Behavior Control using Layered Behavior Script Representation (계층적 행위 스크립트 표현을 통한 아바타-객체 행위 제어를 위한 인터페이스 기법)

  • Choi Seung-Hyuk;Kim Jae-Kyung;Lim Soon-Bum;Choy Yoon-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.9
    • /
    • pp.751-775
    • /
    • 2006
  • In this paper, we suggested an avatar control technique using the high-level behavior. We separated behaviors into three levels according to level of abstraction and defined layered scripts. Layered scripts provide the user with the control over the avatar behaviors at the abstract level and the reusability of scripts. As the 3D environment gets complicated, the number of required avatar behaviors increases accordingly and thus controlling the avatar-object behaviors gets even more challenging. To solve this problem, we embed avatar behaviors into each environment object, which informs how the avatar can interact with the object. Even with a large number of environment objects, our system can manage avatar-object interactions in an object-oriented manner Finally, we suggest an easy-to-use user interface technique that allows the user to control avatars based on context menus. Using the avatar behavior information that is embedded into the object, the system can analyze the object state and filter the behaviors. As a result, context menu shows the behaviors that the avatar can do. In this paper, we made the virtual presentation environment and applied our model to the system. In this paper, we suggested the technique that we controling an the avatar control technique using the high-level behavior. We separated behaviors into three levels byaccording to level of abstract levelion and defined multi-levellayered script. Multi-leveILayered script offers that the user can control avatar behavior at the abstract level and reuses script easily. We suggested object models for avatar-object interaction. Because, TtThe 3D environment is getting more complicated very quickly, so that the numberss of avatar behaviors are getting more variableincreased. Therefore, controlling avatar-object behavior is getting complex and difficultWe need tough processing for handling avatar-object interaction. To solve this problem, we suggested object models that embedded avatar behaviors into object for avatar-object interaction. insert embedded ail avatar behaviors into object. Even though the numbers of objects areis large bigger, it can manage avatar-object interactions by very efficientlyobject-oriented manner. Finally Wewe suggested context menu for ease ordering. User can control avatar throughusing not avatar but the object-oriented interfaces. To do this, Oobject model is suggested by analyzeing object state and filtering the behavior, behavior and context menu shows the behaviors that avatar can do. The user doesn't care about the object or avatar state through the related object.

A Robust Bayesian Probabilistic Matrix Factorization Model for Collaborative Filtering Recommender Systems Based on User Anomaly Rating Behavior Detection

  • Yu, Hongtao;Sun, Lijun;Zhang, Fuzhi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4684-4705
    • /
    • 2019
  • Collaborative filtering recommender systems are vulnerable to shilling attacks in which malicious users may inject biased profiles to promote or demote a particular item being recommended. To tackle this problem, many robust collaborative recommendation methods have been presented. Unfortunately, the robustness of most methods is improved at the expense of prediction accuracy. In this paper, we construct a robust Bayesian probabilistic matrix factorization model for collaborative filtering recommender systems by incorporating the detection of user anomaly rating behaviors. We first detect the anomaly rating behaviors of users by the modified K-means algorithm and target item identification method to generate an indicator matrix of attack users. Then we incorporate the indicator matrix of attack users to construct a robust Bayesian probabilistic matrix factorization model and based on which a robust collaborative recommendation algorithm is devised. The experimental results on the MovieLens and Netflix datasets show that our model can significantly improve the robustness and recommendation accuracy compared with three baseline methods.

Real-time Intrusion-Detection Parallel System for the Prevention of Anomalous Computer Behaviours (비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구)

  • 유은진;전문석
    • Review of KIISC
    • /
    • v.5 no.2
    • /
    • pp.32-48
    • /
    • 1995
  • Our paper describes an Intrusion Detection Parallel System(IDPS) which detects an anomaly activity corresponding to the actions that interaction between near detection events. IDES uses parallel inductive approaches regarding the problem of real-time anomaly behavior detection on rule-based system. This approach uses sequential rule that describes user's behavior and characteristics dependent on time. and that audits user's activities by using rule base as data base to store user's behavior pattern. When user's activity deviates significantly from expected behavior described in rule base. anomaly behaviors are recorded. Observed behavior is flagged as a potential intrusion if it deviates significantly from the expected behavior or if it triggers a rule in the parallel inductive system.

  • PDF

A Traffic Assignment Model in Multiclass Transportation Networks (교통망에서 다차종 통행을 고려하는 통행배정모형 수립)

  • Park, Koo-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.3
    • /
    • pp.63-80
    • /
    • 2007
  • This study is a generalization of 'stable dynamics' recently suggested by Nesterov and de Palma[29]. Stable dynamics is a new model which describes and provides a stable state of congestion in urban transportation networks. In comparison with user equilibrium model that is common in analyzing transportation networks, stable dynamics requires few parameters and is coincident with intuitions and observations on the congestion. Therefore it is expected to be an useful analysis tool for transportation planners. An equilibrium in stable dynamics needs only maximum flow in each arc and Wardrop[33] Principle. In this study, we generalize the stable dynamics into the model with multiple traffic classes. We classify the traffic into the types of vehicle such as cars, buses and trucks. Driving behaviors classified by age, sex and income-level can also be classes. We develop an equilibrium with multiple traffic classes. We can find the equilibrium by solving the well-known network problem, multicommodity minimum cost network flow problem.

A Study on the Analysis of Users' Behaviors on the Underground Parking Space in an Apartment Complex (아파트 단지내 지하주차장의 이용행태 분석에 관한 연구)

  • 이상구;윤충열
    • Journal of the Korean housing association
    • /
    • v.14 no.6
    • /
    • pp.165-172
    • /
    • 2003
  • With the rate of spread of motors rapidly increased, but parking difficulties in an apartment complex was aggravated due to an insufficient parking lot. Visual interference on residential environment, various kinds of pollution and noise, decrease of open space in an apartment complex are also causes of parking difficulties. Therefore, this study is to suggest a theory of desirable direction for planning of the parking space by studying psychological characteristics of users' behaviors by the type of the circulation of motors and pedestrians. Consideration on the present situation, real conditions of underground parking space and the consciousness and parking habit of residents, the most important problem is required in this study.

A Study of Collection Development by Analyzing Users' Collection-Use Behaviors in Public Libraries (이용자 장서이용행태 분석을 통한 공공도서관의 장서개발에 관한 연구)

  • Lee, Adrianne;Lee, Jee-Yeon
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.22 no.3
    • /
    • pp.151-171
    • /
    • 2011
  • In public libraries, there are many difficulties in fulfilling requests by users, as typically have from diverse backgrounds and purposes for visiting the library. To overcome this problem, collection development for public libraries is required to enhance the satisfaction level of users regarding public library materials. Thus, in this study, a survey was conducted of users of 10 public libraries located in Seoul to analyze their collection-use behaviors and the study finally presents collection development for public libraries in Seoul based on data acquired.

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.