دانلود و نمایش مقالات مرتبط با رفتار کاربر::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - رفتار کاربر

تعداد مقالات یافته شده: 14
ردیف عنوان نوع
1 نسبت جنبه های فنی به روانشناختی در مفاهیم آموزش امنیت اطلاعات تخصصی
سال انتشار: 2020 - تعداد صفحات فایل pdf انگلیسی: 6 - تعداد صفحات فایل doc فارسی: 14
نیاز به ایجاد تغییر در ساختار مهارتهای مورد نیاز برای متخصص امنیت اطلاعات (IS) توجیه پذیر است. در اینجا، ویژگیهای خاص مربوط به وضعیت فعلی فعالیتهای داخلی و مسائل کلاهبرداری داخلی، مشخصات اصلی توسعه سیستم های نگهداری فنی IS شامل آنالیز رفتار کاربر ، و مفهوم سیستم عامل در تنظیم امنیت ، اتوماسیون و پاسخ مورد بحث قرار می گیرد. همچنین اهمیت نقش انسان در حصول اطمینان از IS نشان داده خواهد شد. برخی رویکرد ها به منظور ارزیابی الگوهای رفتاری برای اطمینان از IS شرح داده شد. در این مقاله به آنالیز تجارب در زمینه تشکل در بین دانشجویان MEPhI ، تحصیل در رشته IS ، مهارت پیش بینی رفتار سایر افراد بر اساس داده های به دست آمده با استفاده از ماژول برنامه "سیستم آزمایش روانشناسی حرفه ای" در چارچوب آزمایشگاه تخصصی پرداخته شد.
واژه های کلیدی: آموزش امنیت اطلاعات | تحلیل رفتار | جنبه های روانشناختی امنیت | ارزیابی الگوهای رفتاری | مهارت های شناسایی کارمند داخلی
مقاله ترجمه شده
2 استفاده از رسانه های اجتماعی برای شناسایی جذابیت گردشگری در شش شهر ایتالیا
سال انتشار: 2019 - تعداد صفحات فایل pdf انگلیسی: 7 - تعداد صفحات فایل doc فارسی: 18
تکامل فناوری و گسترش شبکه های اجتماعی به افراد اجازه داده است که مقادیر زیادی داده را در هر روز تولید کنند. شبکه های اجتماعی کاربرانی را فارهم می کند که به اطلاعات دسترسی دارند. هدف این مقاله تعیین جذابیت های شهرهای مختلف گردشگری ازطریق بررسی رفتار کاربران در شبکه های اجتماعی می باشد. پایگاه داده ای شامل عکس های جغرافیایی واقع شده در شش شهر می باشد که به عنوان یک مرکز فرهنگی و هنری در ایتالیا عمل می کنند. عکس ها از فلیکر که یک بستر به اشتراک گذاری داده می باشد دانلود شدند. تحلیل داده ها با استفاده از دیدگاه مدلهای یادگیری ریاضی و ماشینی انجام شد. نتایج مطالعه ما نشانگر نقشه های شناسایی رفتار کاربران، گرایش سالانه به فعالیت تصویری در شهرها و تاکید بر سودمند بودن روش پیشنهادی می باشد که قادر به تامین اطلاعات مکانی و کاربری است. این مطالعه تاکید می کند که چگونه تحلیل داده های اجتماعی می تواند یک مدل پیشگویانه برای فرموله کردن طرح های گردشگری خلق کند. در انتها، راهبردهای عمومی بازاریابی گردشگری مورد بحث قرار می گیرند.
مقاله ترجمه شده
3 User preferences modeling using dirichlet process mixture model for a content-based recommender system
مدل سازی تنظیمات برگزیده کاربر با استفاده از مدل مخلوط فرآیند dirichlet برای یک سیستم توصیه گر مبتنی بر محتوا-2019
Recommender systems have been developed to assist users in retrieving relevant resources. Collaborative and content-based filtering are two basic approaches that are used in recommender systems. The former employs the feedback of users with similar interests, while the latter is based on the feature of the selected resources by each user. Recommender systems can consider users’ behavior to more accurately estimate their preferences via a list of recommendations. However, the existing approaches rarely consider both interests and preferences of the users. Also, the dynamic nature of user behavior poses an additional challenge for recommender systems. In this paper, we consider the interactions of each individual user, and analyze them to propose a user model and capture user’s interests.Weconstruct the user model based on a Bayesian nonparametric framework, called the Dirichlet Process Mixture Model. The proposed model evolves following the dynamic nature of user behavior to adapt both the user interests and preferences. We implemented the proposed model and evaluated it using both the MovieLens dataset, and a realworld dataset that contains news tweets fromfive news channels (New York Times, BBC, CNN, Reuters and Associated Press). The experimental results and comparisons with several recently developed approaches show the superiority in accuracy of the proposed approach, and its ability to adapt with user behavior over time.
Keywords: User preferences modeling | Temporal content-based recommender | systems | User behavior modeling
مقاله انگلیسی
4 The role of location and social strength for friendship prediction in location-based social networks
نقش مکان و قدرت اجتماعی برای پیش بینی دوستی در شبکه های اجتماعی مبتنی بر مکان-2018
Recent advances in data mining and machine learning techniques are focused on exploiting location data. These advances, combined with the increased availability of location-acquisition technology, have encouraged social networking services to offer to their users different ways to share their location information. These social networks, called location-based social networks (LBSNs), have attracted millions of users and the attention of the research community. One fundamental task in the LBSN context is the friendship prediction due to its role in different applications such as recommendation systems. In the literature exists a variety of friendship prediction methods for LBSNs, but most of them give more importance to the location information of users and disregard the strength of relationships existing between these users. The contributions of this article are threefold, we: 1) carried out a comprehensive survey of methods for friendship prediction in LBSNs and proposed a taxonomy to organize the existing methods; 2) put forward a proposal of five new methods addressing gaps identified in our survey while striving to find a balance between optimizing computational resources and improving the predictive power; and 3) used a comprehensive evaluation to quantify the prediction abilities of ten current methods and our five proposals and selected the top-5 friendship prediction methods for LBSNs. We thus present a general panorama of friendship prediction task in the LBSN domain with balanced depth so as to facilitate research and real-world application design regarding this important issue.
keywords: Location-based social networks| Link prediction| Friendship recommendation| Human mobility| User behavior
مقاله انگلیسی
5 A weighted multi-attribute-based recommender system using extended user behavior analysis
یک سیستم توصیه گر وزنی مبتنی بر چند برخوردی با استفاده از تحلیل مبسوط رفتار کاربر-2018
A new weighted multi-attribute based recommender system (WMARS) has been developed using extended user behavior analysis. WMARS obtained data from number of clicked items in the recommendation list, sequence of the clicked items in recommendation the list, duration of tracking, number of tracking same item, likes/dislikes, association rules of clicked items, remarks for items. WMARS has been applied to a movie web site. The experimental results have been obtained from a total of 567 heterogeneous users, including employers in different sectors, different demographic groups, and undergraduate and graduate students. Using different weighted sets of the attributes’ parameters, WMARS has been tested and compared extensively with collaborative filtering. The experimental results show that WMARS is more successful than collaborative filtering for the data set that was used.
keywords: Collaborative filtering |Evolutionary algorithms |Recommender systems |Relevance feedback |User behavior analysis
مقاله انگلیسی
6 Analyzing user interactions with biomedical ontologies: A visual perspective
تجزیه و تحلیل تعاملات کاربر با هستی شناسی زیست پزشکی: چشم انداز بصری-2018
Biomedical ontologies are large: Several ontologies in the BioPortal repository contain thousands or even hundreds of thousands of entities. The development and maintenance of such large ontologies is difficult. To support ontology authors and repository developers in their work, it is crucial to improve our understanding of how these ontologies are explored, queried, reused, and used in downstream applications by biomedical researchers. We present an exploratory empirical analysis of user activities in the BioPortal ontology repository by analyzing BioPortal interaction logs across different access modes over several years. We investigate how users of BioPortal query and search for ontologies and their classes, how they explore the ontologies, and how they reuse classes from different ontologies. Additionally, through three real-world scenarios, we not only analyze the usage of ontologies for annotation tasks but also compare it to the browsing and querying behaviors of BioPortal users. For our investigation, we use several different visualization techniques. To inspect large amounts of interaction, reuse, and real world usage data at a glance, we make use of and extend PolygOnto, a visualization method that has been successfully used to analyze reuse of ontologies in previous work. Our results show that exploration, query, reuse, and actual usage behaviors rarely align, suggesting that different users tend to explore, query and use different parts of an ontology. Finally, we highlight and discuss differences and commonalities among users of BioPortal.
Keywords: Data visualization ، Ontology reuse ، Ontology exploration ، User behavior ، Knowledge exploration ، Log analysis
مقاله انگلیسی
7 Characterizing Flow, Application, and User Behavior in Mobile Networks: A Framework for Mobile Big Data
مشخص کردن جریان، برنامه، و رفتار کاربر در شبکه های سیار:یک چارچوب برای داده های بزرگ سیار-2018
The recent explosion of data traffic calls for specialized systems to monitor the status of networks. Traditionally, Internet service providers collect and analyze IP flow data as they present an aggregated view of traffic. In the era of mobile big data, new approaches are required to address new challenges regarding the flow characterization in the next generation wireless networks. In this article, we propose a framework for mobile big data, referred to as FMBD, which provides massive data traffic collection, storage, processing, analysis, and management functions, to cope with the tremendous amount of data traffic. In particular, by analyzing the specific characteristics of the mobile big data from flow, application, and user behavior, such as high volume, diversity of applications, and spatio-temporal distribution, our proposed FMBD demonstrates its capability to offer real data-based advice to address new challenges for future wireless networks from the viewpoints of both operators and individuals. Tested by real mobile big data, FMBD has been operational for more than five years, and can be generalized to other environments with massive data traffic or big data.
Keywords: Big Data, Internet, IP networks, mobile computing, mobile radio, telecommunication traffic
مقاله انگلیسی
8 Psychological needs as motivators for security and privacy actions on smartphones
نیازهای روانشناختی به عنوان انگیزه برای اقدامات امنیتی و حریم خصوصی بر روی گوشی های هوشمند-2017
Article history:Keywords: Psychological needs Security and privacy SmartphonesUser behavior User experienceMuch work has been conducted to investigate the obstacles that keep users from using mitigations against security and privacy threats on smartphones. By contrast, we conducted in-depth interviews (N = 19) to explore users’ motivations for voluntarily applying security and privacy actions on smart- phones. Our work focuses on analyzing intrinsic motivation in terms of psychological need fulfillment. The findings from the interview study provide first insights on the salience of basic psychological needs in the context of smartphone security and privacy. They illustrate how security and privacy actions on smartphones are motivated by a variety of psychological needs, only one of them being the need for Security. We further conducted an online survey (N = 70) in which we used questionnaires on psycho- logical need fulfillment from the literature. The online survey is a first attempt to quantify psychological need fulfillment for security and privacy actions on smartphones. Whereas the results of the interview study indicate that Security and other needs play a role as motivators for employing security and privacy actions on smartphones, the online study does not support the need for Security as an outstanding mo- tivator. Instead, in the online study, other needs such as Keeping the meaningful, Stimulation, Autonomy, and Competence show to be rather salient as motivators for security and privacy actions. Furthermore, the mean need fulfillment for security and privacy actions is in general rather low in the online survey. We conclude that there is scope for improvement to maximize psychological need fulfillment with security and privacy actions. In order to achieve a positive user experience with security and privacy technologies on smartphones, we suggest addressing additional psychological needs, beyond the need for Security, in the design of such technologies.© 2017 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license. (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Keywords: Psychological needs | Security and privacy | Smartphones User behavior | User experience
مقاله انگلیسی
9 How brand post content contributes to users Facebook brand-page engagement: The experiential route of active participation
چگونه محتوای پست نام تجاری به کاربران فیس بوک کمک میکند تا با نام تجاری صفحه تعامل داشته باشند: مسیر تجربی مشارکت فعال-2017
Creating and developing a firm-hosted virtual brand community forms part of a relationship marketing strategy; therefore, it makes sense to evaluate its effectiveness in terms of relational outcomes. In an attempt to know how marketers can foster the relationship with the brand through virtual communities, we posit and estimate a model of relational efficacy for a firm-managed Facebook brand page (FBP) in which the brand posts created by the firm influence the behavioural engagement of individual users through the utilitarian and hedonic values derived from their interactive experiences within the FBP. The findings highlight that information posts stimulate user behavioural engagement through the utilitarian experiential route. Aside from any experiential route and adopting a more direct path, interaction posts are the main drivers of engagement behaviour. Image posts contribute towards the perception of utility, but in no way affect engagement. Finally, in order to gain a deeper insight, we explore the moderating effect of user brand purchase intensity on the relations posited in the model.
KEYWORDS : Facebook brand page | Brand post content | Experiential value | User behavioural | engagement
مقاله انگلیسی
10 The structure of user equilibria: Dynamic coevolutionary simulations vs: cyclically expanded networks
ساختار تعادل کاربر: شبیه سازی های تکاملی پویا در مقابل: چرخه شبکه های گسترش یافته -2017
A variety of approaches exist that model traffic time-dependently. While all approaches have their advantages and disadvantages but have to find a balance between modeling traffic as realistic as possible and being still manageable in combinational terms. While transport simulations are efficient in evaluating user equilibria in large scale scenarios, their potential to be used for optimization is limited. On the other hand, analytical formulations like models based on cyclically time-expanded networks can be used to optimize traffic flow, but are not suitable for large scale scenarios. By optimizing the network structure in a mathematical model and evaluating its effect in a more realistic transport simulation, two models can benefit from each other. Detailed knowledge about model properties and differences in traffic flow behavior help to understand results and potential difficulties of such a model combination. In this paper, properties of two such models are compared regarding traffic flow modeling. It is shown that the set of user equilibria in both models and, therefore, the resulting route distributions can be structurally different.
Keywords: transport modeling | transport simulation | cyclically time expanded networks | user behavior | user equilibria | system optimum
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 2676 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 2676 :::::::: افراد آنلاین: 62