54 resultados para Internet users -- Attitudes

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Internet has had a greater impact on consumer behaviour than any other innovation in recent years. Previous research has identified certain demographic traits of consumer who complain yet these demographic triggers are markedly different to the demographic profile of Internet users. This leads to the generation of several research questions that need to be considered to enable the development of effective strategies that need to be implemented to deal with the issues raised by this most important group of stakeholders - the users.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article presents the findings from a survey of Australian Internet users (n = 1172), conducted in 2007, investigating their overall experience of connectivity at home. Experience of connectivity is defined to mean how people use the Internet to achieve general outcomes of value to them in their everyday lives, and includes both the range of outcomes and the significance of the Internet in achieving them. The survey, thus, reports on the experience of a single behaviour – ‘using the Internet’ – rather than, as common in other research, multiple specific behaviours conducted while online. The article analyses the data collected to draw conclusions that provide greater depth of understanding of connectivity understood as the phenomenon in, and of, itself. This article contributes important information about the experiences of Australian Internet users, about which there have been only a few and relatively superficial studies. It also provides an example of a new approach to surveying Internet users that can lead to more direct conclusions about the value and extent of their uses of connectivity in their lives.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The ‘single most important technological discovery since the birth of the p.c.’, (Gates, 1996). The swift increase in Internet utilisation within businesses and surveying has changed working methods within UK based Surveying practices. User numbers expanded rapidly since the early 1990’s and estimates place a figure of 150 million internet users globally (www.Yahoo.com, 2000). Sloan and Kee Low (2000) established that ‘e-commerce’ is a revolutionary way of trading and conducting business activities. There are opportunities for surveying practices including, reducing communication time, increasing revenues from new and existing sources, enhanced client satisfaction and competitive advantage (Cronin, 1996). Others (Dixon, 1998) perceive threats, such as ‘disintermediation’, to the traditional role of the surveyor.

This research examined the levels of internet and intranet access within the UK Building and Quantity Surveying practices and corporate firms to establish how the internet has affected working methods and client requirements. The research method comprised a qualitative approach using an email and postal questionnaire survey of a random sample of practices. The questionnaire findings formed the basis of semi structured interviews conducted with senior management of large practices to gain a deeper understanding of the issues identified within the survey.

Data analysis revealed the traditional role of the surveyor as a broker of information may be under threat in the long term. Generally levels of internet access in the sample exceed that of general business levels (Dti, 2000) with the largest growth pre 1997. The perceived advantages and barriers to Intranet and Internet usage were identified by the research.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This article presents a case study on roles of online communities in development and commercialization of Chinese Internet literature (CIL). Online communities are widely used in ethnic Chinese communities for publication of CIL works. Uses of online communities in publication of CIL works enhance authors’ and readers’ experience and facilitate the growth of the CIL market. In turn, the growth of the CIL market creates new business opportunities that eventually lead to CIL commercialization. Evidences from the case show that the roles of online communities on CIL commercialization are much larger than simply being a new product development platform.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

OBJECTIVE: Almost 80% of Australian Internet users seek out health information online so the readability of this information is important. This study aimed to evaluate the readability of Australian online health information and determine if it matches the average reading level of Australians. METHODS: Two hundred and fifty-one web pages with information on 12 common health conditions were identified across sectors. Readability was assessed by the Flesch-Kincaid (F-K), Simple Measure of Gobbledygook (SMOG) and Flesch Reading Ease (FRE) formulas, with grade 8 adopted as the average Australian reading level. RESULTS: The average reading grade measured by F-K and SMOG was 10.54 and 12.12 respectively. The mean FRE was 47.54, a 'difficult-to-read' score. Only 0.4% of web pages were written at or below grade 8 according to SMOG. Information on dementia was the most difficult to read overall, while obesity was the most difficult among government websites. CONCLUSIONS AND IMPLICATIONS: The findings suggest that the readability of Australian health websites is above the average Australian levels of reading. A quantifiable guideline is needed to ensure online health information accommodates the reading needs of the general public to effectively use the Internet as an enabler of health literacy.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

There is considerable international interest in online education of patients with bipolar disorder, yet little understanding of how patients use the Internet and other sources to seek information. 1171 patients with a diagnosis of bipolar disorder in 17 countries completed a paper-based, anonymous survey. 81% of the patients used the Internet, a percentage similar to the general public. Older age, less education, and challenges in country telecommunications infrastructure and demographics decreased the odds of using the Internet. About 78% of the Internet users looked online for information on bipolar disorder or 63% of the total sample. More years of education in relation to the country mean, and feeling very confident about managing life decreased the odds of seeking information on bipolar disorder online, while having attended support groups increased the odds. Patients who looked online for information on bipolar disorder consulted medical professionals plus a mean of 2.3 other information sources such as books, physician handouts, and others with bipolar disorder. Patients not using the Internet consulted medical professionals plus a mean of 1.6 other information sources. The percentage of patients with bipolar disorder who use the Internet is about the same as the general public. Other information sources remain important.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Social network worms, such as email worms and facebook worms, pose a critical security threat to the Internet. Modeling their propagation dynamics is essential to predict their potential damages and develop countermeasures. Although several analytical models have been proposed for modeling propagation dynamics of social network worms, there are two critical problems unsolved: temporal dynamics and spatial dependence. First, previous models have not taken into account the different time periods of Internet users checking emails or social messages, namely, temporal dynamics. Second, the problem of spatial dependence results from the improper assumption that the states of neighboring nodes are independent. These two problems seriously affect the accuracy of the previous analytical models. To address these two problems, we propose a novel analytical model. This model implements a spatial-temporal synchronization process, which is able to capture the temporal dynamics. Additionally, we find the essence of spatial dependence is the spreading cycles. By eliminating the effect of these cycles, our model overcomes the computational challenge of spatial dependence and provides a stronger approximation to the propagation dynamics. To evaluate our susceptible-infectious-immunized (SII) model, we conduct both theoretical analysis and extensive simulations. Compared with previous epidemic models and the spatial-temporal model, the experimental results show our SII model achieves a greater accuracy. We also compare our model with the susceptible-infectious-susceptible and susceptible-infectious- recovered models. The results show that our model is more suitable for modeling the propagation of social network worms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Increasingly, web applications are being developed over the Internet. Securing these web applications is becoming important as they hold critical security features. However, cybercriminals are becoming smarter by developing a crime toolkit, and employing sophisticated techniques to evade detection. These crime toolkits can be used by any person to target Internet users. In this paper, we explore the techniques used in crime toolkits. We present a current state-of-the-art analysis of crime toolkits and focus on attacks against web applications. The crime toolkit techniques are compared with the vulnerability of web applications to help reveal particular behaviour such as popular web application vulnerabilities that malicious writers prefer. In addition, we outline the existing protection mechanism, and observe that the possibility for damage is rising, particularly as specialization and scale increase in cybercrime.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tagging recommender systems allow Internet users to annotate resources with personalized tags. The connection among users, resources and these annotations, often called afolksonomy, permits users the freedom to explore tags, and to obtain recommendations. Releasing these tagging datasets accelerates both commercial and research work on recommender systems. However, adversaries may re-identify a user and her/his sensitivity information from the tagging dataset using a little background information. Recently, several private techniques have been proposed to address the problem, but most of them lack a strict privacy notion, and can hardly resist the number of possible attacks. This paper proposes an private releasing algorithm to perturb users' profile in a strict privacy notion, differential privacy, with the goal of preserving a user's identity in a tagging dataset. The algorithm includes three privacy preserving operations: Private Tag Clustering is used to shrink the randomized domain and Private Tag Selection is then applied to find the most suitable replacement tags for the original tags. To hide the numbers of tags, the third operation, Weight Perturbation, finally adds Lap lace noise to the weight of tags We present extensive experimental results on two real world datasets, Delicious and Bibsonomy. While the personalization algorithmis successful in both cases.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Phishing attacks continue unabated to plague Internet users and trick them into providing personal and confidential information to phishers. In this paper, an approach for email-born phishing detection based on profiling and clustering techniques is proposed. We formulate the profiling problem as a clustering problem using various features present in the phishing emails as feature vectors and generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of the emails. We carried out extensive experimental analysis of the proposed approach in order to evaluate its effectiveness to various factors such as sensitivity to the type of data, number of data sizes and cluster sizes. We compared the performance of the proposed approach against the Modified Global Kmeans (MGKmeans) approach. The results show that the proposed approach is efficient as compared to the baseline approach. © 2014 Elsevier Ltd. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tagging recommender system allows Internet users to annotate resources with personalized tags and provides users the freedom to obtain recommendations. However, It is usually confronted with serious privacy concerns, because adversaries may re-identify a user and her/his sensitive tags with only a little background information. This paper proposes a privacy preserving tagging release algorithm, PriTop, which is designed to protect users under the notion of differential privacy. The proposed PriTop algorithm includes three privacy preserving operations: Private Topic Model Generation structures the uncontrolled tags, Private Weight Perturbation adds Laplace noise into the weights to hide the numbers of tags; while Private Tag Selection finally finds the most suitable replacement tags for the original tags. We present extensive experimental results on four real world datasets and results suggest the proposed PriTop algorithm can successfully retain the utility of the datasets while preserving privacy. © 2014 Springer International Publishing.