• 제목/요약/키워드: information behaviour

검색결과 427건 처리시간 0.026초

Log Usage Analysis: What it Discloses about Use, Information Seeking and Trustworthiness

  • Nicholas, David;Clark, David;Jamali, Hamid R.;Watkinson, Anthony
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제4권1호
    • /
    • pp.23-37
    • /
    • 2014
  • The Trust and Authority in Scholarly Communications in the Light of the Digital Transition research project1) was a study which investigated the behaviours and attitudes of academic researchers as producers and consumers of scholarly information resources in respect to how they determine authority and trustworthiness. The research questions for the study arose out of CIBER's studies of the virtual scholar. This paper focuses on elements of this study, mainly an analysis of a scholarly publisher's usage logs, which was undertaken at the start of the project in order to build an evidence base, which would help calibrate the main methodological tools used by the project: interviews and questionnaire. The specific purpose of the log study was to identify and assess the digital usage behaviours that potentially raise trustworthiness and authority questions. Results from the self-report part of the study were additionally used to explain the logs. The main findings were that: 1) logs provide a good indicator of use and information seeking behaviour, albeit in respect to just a part of the information seeking journey; 2) the 'lite' form of information seeking behaviour observed in the logs is a sign of users trying to make their mind up in the face of a tsunami of information as to what is relevant and to be trusted; 3) Google and Google Scholar are the discovery platforms of choice for academic researchers, which partly points to the fact that they are influenced in what they use and read by ease of access; 4) usage is not a suitable proxy for quality. The paper also provides contextual data from CIBER's previous studies.

Bonhoeffer Van der Pol 오실레이터 모델의 하드웨어 구현에 의한 카오스 운동 해석 (The chaotic motion analysis by hardware implementation of Bonhoeffer Van der Pol oscillation model)

  • 배영철;서삼문;임화영
    • 한국정보처리학회논문지
    • /
    • 제3권4호
    • /
    • pp.877-882
    • /
    • 1996
  • Bonhoeffer-Van der Pol(BVP)모델을 실제 소자값을 이용하여 하드웨어를 구현하고 A1 coswt를 인가하여 주기 운동과 카오스 운동을 조사하였다. BVP모델의 하드웨어를 구성하기 위해 컴퓨터 시뮬레이션〔11〕에 의해 구현된 결과를 이용하여 실제 소자값 으로 Rescaling 하였으며 각 계수의 값을 a=0.7, b=0.8, c=0.1로 정하고 주기적 자극 전류의 진폭을 0에서 1.3까지 변화시켜 주기운동에서 카오스 운동으로 천이됨을 위 상공간, 시계열 데이터로 확인하였다.

  • PDF

공공도서관의 서비스 질 평가에 관한 실증적 연구 -서비스 질 요인이 고객만족 및 고객행태에 미치는 영향 - (A Study on the Assessment for Service Quality in Public Libraries)

  • 이종권
    • 한국문헌정보학회지
    • /
    • 제36권2호
    • /
    • pp.89-117
    • /
    • 2002
  • 본 연구의 목적은 마케팅분야의 서비스 질 이론을 활용하여 공공도서관의 서비스 질을 측정하고 평가할 수 있는 모형을 구축하는 데 있다. 이를 위해 본 연구는 우선 고객이 기대하는 서비스 질의 중요 요인을 측정, 분석하여 중요도에 따른 우선 개선 요인의 순위를 도출하였다. 또한 서비스 질 요인과 고객만족의 상관관계 및 서비스 질 요인과 고객행태의 상관관계 모형을 구축하고 이를 통계적 방법으로 검증하여 고객만족과 고객행태에 영향을 미치는 서비스 질 요인들의 우선 순위를 도출하였다.

An IPSO-KELM based malicious behaviour detection and SHA256-RSA based secure data transmission in the cloud paradigm

  • Ponnuviji, N.P.;Prem, M. Vigilson
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권11호
    • /
    • pp.4011-4027
    • /
    • 2021
  • Cloud Computing has emerged as an extensively used technology not only in the IT sector but almost in all sectors. As the nature of the cloud is distributed and dynamic, the jeopardies present in the current implementations of virtualization, numerous security threats and attacks have been reported. Considering the potent architecture and the system complexity, it is indispensable to adopt fundamentals. This paper proposes a secure authentication and data sharing scheme for providing security to the cloud data. An efficient IPSO-KELM is proposed for detecting the malicious behaviour of the user. Initially, the proposed method starts with the authentication phase of the data sender. After authentication, the sender sends the data to the cloud, and the IPSO-KELM identifies if the received data from the sender is an attacked one or normal data i.e. the algorithm identifies if the data is received from a malicious sender or authenticated sender. If the data received from the sender is identified to be normal data, then the data is securely shared with the data receiver using SHA256-RSA algorithm. The upshot of the proposed method are scrutinized by identifying the dissimilarities with the other existing techniques to confirm that the proposed IPSO-KELM and SHA256-RSA works well for malicious user detection and secure data sharing in the cloud.

Investigation on structural behaviour of composite cold-formed steel and reinforced concrete flooring systems

  • Omar A., Shamayleh;Harry, Far
    • Steel and Composite Structures
    • /
    • 제45권6호
    • /
    • pp.895-905
    • /
    • 2022
  • Composite flooring systems consisting of cold-formed steel joists and reinforced concrete slabs offer an efficient, lightweight solution. However, utilisation of composite action to achieve enhanced strength and economical design has been limited. In this study, finite element modelling was utilised to create a three-dimensional model which was then validated against experimental results for a composite flooring system consisting of cold-formed steel joists, reinforced concrete slab and steel bolt shear connectors. This validated numerical model was then utilised to perform parametric studies on the performance of the structural system. The results from the parametric study demonstrate that increased thickness of the concrete slab and increased thickness of the cold formed steel beam resulted in higher moment capacity and stiffness of the composite flooring system. In addition, reducing the spacing of bolts and spacing of the cold formed steel beams both resulted in enhanced load capacity of the composite system. Increasing the concrete grade was also found to increase the moment capacity of the composite flooring system. Overall, the results show that an efficient, lightweight composite flooring system can be achieved and optimised by selecting suitable concrete slab thickness, cold formed beam thickness, bolt spacing, cold formed beam spacing and concrete grade.

관광객의 정보이용이 관광주유행동에 미치는 영향분석 (Tourists' Excursion Behavior Analysis Considering Their Information Usage)

  • 김현
    • 대한토목학회논문집
    • /
    • 제30권4D호
    • /
    • pp.339-349
    • /
    • 2010
  • 본 논문은 관광객의 정보이용을 고려한 관광주유행동 분석 목적으로 구조방정식 시스템을 적용한 모형을 구축하였다. 관광주유행동은 관광지 도착이후부터 귀가까지를 다루는 것으로 관광지내 활동과 시간, 관광지점수 등의 지표로 설명하고 있다. 이러한 관광주유행동지표들은 상호 상관관계가 있다는 가정에 구조방정식의 내생변수로 취급하였다. 또한 내생변수들은 지역인지도, 정보이용행동, 개인속성 등에 영향을 받는 것으로 가정하고 있다. 본 모형의 사례분석은 일본 후지 5호 관광지의 관광실태자료를 이용해 수행하였다. 본 연구에서 제안한 관광주유행동 모형은 내생변수간의 공분산관계를 통계적 분석으로 다루는 것이 가능해 기존 이산선택 방법론보다 간단하게 관광지의 정보이용 효과를 분석할 수 있는 장점이 있다.

핵심정보배열 추출에 의한 서울시 대중교통 통행패턴 분석 (Daily Travel Pattern using Public Transport Mode in Seoul:An Analysis of a Multi-Dimensional Motif Search)

  • 조창현
    • 대한지리학회지
    • /
    • 제44권2호
    • /
    • pp.176-186
    • /
    • 2009
  • 경제적, 환경적 이유에서, 승용차 이용을 억제하고 대중교통수단 분담율을 제고하는 교통정책은 수도권 지자체에게 있어 매우 중요한 과제이다. 통행행태를 근본적으로 이해하는 것은 이러한 정책의 수립과 집행에 매우 중요한 필요조건이다. 소규모 샘플자료를 이용, 특정한 통행 행태와 몇몇의 사회경제적 혹은 지리공간적 변수들 간의 상관관계에 대한 횡단면적 분석을 행하는 것이 이 분야 전통적인 연구주제였다. 연구결과는 스냅샷과 유사한, 시공간적으로 제한된 정보만을 제공한다. 그러나, 통행은 공간적으로 상이한 장소에서 벌어지는 일상활동 참여로부터 파생되며, 일상 활동계획 상에서의 활동-통행 간 순서 관계는 통행 행태의 중요한 틀이다. 본 연구는 다차원 정보배열비교법과 핵심정보배열추출기법을 이용, 서울시민의 일일 대중교통 이용 자료인 스마트 카드 자료를 분석하여 서울시내 대중교통 이용 행태의 일반 특성을 탐구한다. 분석 결과 서울 강남/북 간 버스-전철 연계통행과 간선버스 통행간 통행 행태의 중요한 차이를 확인할 수 있었다. 즉 통행패턴은 보통 강북과 강남 권역 안에서 형성이 되어 있어, 자연 장애물인 한강을 건너 강남/북을 가로지르는 통행패턴은 상대적으로 적었다. 또한 강북과 강남 각각의 권역 안에서 CBD를 들르는 통행패턴은 보통 전철 혹은 지선버스-전철의 연계교통수단을 이용하는 데 반해 지선버스 혹은 간선버스만을 이용하는 통행패턴은 CBD가 아닌 지역으로 목적지가 국한되는 경향이 있다.

남성복 구매형태에 따른 정보원 선택, 위험지각, 추구혜택의 차이에 관한 비교 연구 (The Comparative Study on the Differences among Choice of Information Source, Risk Perception and Benefits Sought According to the Purchase Type of the Men's Suits)

  • 김노호;황선진
    • 복식
    • /
    • 제51권7호
    • /
    • pp.123-134
    • /
    • 2001
  • The purpose of this study to compare the purchasing behaviour of men's business suits, among custom suits, system order, and ready-made suits, centering around the choice of information source, risk perception and benefits sought. The survey of this study was collected from 450 adult male in Seoul. The data was analyzed by factor analysis and ANOVA. The result of this study were as follows : 1. Custom suits, system order, and ready-made suits consumers have a significant difference in the choice of information source. The consumer attaching most importance to the impersonal information source is the system order users, custom suits users, and ready-made suits users respectively. However there was no significant difference in the personal source among 3 different purchasing behaviour of men's suits. 2. For the risk perception, 1) the group who perceived the highest in economic risk is the system order users, followed by custom suits users, and ready-made suits users. 2) the group who perceived performance risk as being the highest concern is the ready-made suits consumers, followed by system order user, and custom suits user. 3) the group who perceived the socio-psychological risk as the highest is the ready-made suits consumers, and followed by custom suits user and system order users. 4) there is no difference among the three groups with respect to the fashionability loss risk. 5) the group of the highest perceiving the useful loss risk is the ready-made suits consumers, and the next is system order users, custom suits users. 6) the group of the highest perceiving the time and convenience loss risk is ready-made suits users, and the next is system order users, custom suits users. 3. For the benefit sought, the group of the highest perceiving the aesthetics is custom suits consumers, and the next is system order users, ready-made suits users.

  • PDF

Information Pollution, a Mounting Threat: Internet a Major Causality

  • Pandita, Ramesh
    • Journal of Information Science Theory and Practice
    • /
    • 제2권4호
    • /
    • pp.49-60
    • /
    • 2014
  • The present discourse lasts around, information pollution, causes and concerns of information pollution, internet as a major causality and how it affects the decision making ability of an individual. As, information producers in the process to not to lose the readership of their content, and to cater the information requirements of both the electronic and the print readers, reproduce almost the whole of the printed information in digital form as well. Abundant literature is also equally produced in electronic format only, thereon, sharing this information on hundreds of social networking sites, like, Facebook, Twitter, Blogs, Flicker, Digg, LinkedIn, etc. without attributions to original authors, have created almost a mess of this whole information produced and disseminated. Accordingly, the study discusses about the sources of information pollution, the aspects of unstructured information along with plagiarism. Towards the end of the paper stress has been laid on information literacy, as how it can prove handy in addressing the issue with some measures, which can help in regulating the behaviour of information producers.

Information Retrieval: A Communication Process in the 21st Century Library

  • Umeozor, Susan Nnadozie
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제10권2호
    • /
    • pp.7-18
    • /
    • 2020
  • Communication is a process involving a group of interrelated elements working together for the purpose of information transfer. This paper discusses information retrieval as a communication process in the 21st century library. The difficulties associated with access to recorded knowledge through bibliographic control devices have been exacerbated by the interposition of additional encoding processes in the library and further decoding by the users. In addition, the innovation of internet/web has revolutionized the means and mode of communication process in the library by flooding information seekers with information and creating an illusion of self-sufficiency in many users. With these changes in information seeking behaviour and pattern, a cybernetic approach to information retrieval has emerged emphasizing adaptive control mechanisms and feedback processes. This paper argues that libraries should strive to continuously remain relevant by keeping abreast with changes in the behavior of information users. To this end, this paper proposes apomediatic-cybernetic model of communication, which illustrates information retrieval processes for the 21st-century library.