-
81
Research of actual characteristics for describing of the target audience for digital marketing
Published 2022-01-01Get full text
Article -
82
Anomaly Usage Behavior Detection Based on Multi-Source Water and Electricity Consumption Information
Published 2025-01-01“…Current resident anomaly detection technologies rely on single-source energy data, lacking detailed behavior pattern analysis. Hence, this paper proposes a method to detect abnormal residential water and electricity usage by incorporating multi-source information. …”
Get full text
Article -
83
Evaluation and visualization of multiaxial fatigue behavior under random non-proportional loading condition
Published 2017-07-01Get full text
Article -
84
Towards a Conceptual Model of Users’ Expectations of an Autonomous In-Vehicle Multimodal Experience
Published 2024-01-01Get full text
Article -
85
Research on Personalized Recommender System Adapting to Different Business
Published 2014-08-01“…A design of personalized recommender system adapting to different business was presented, including the collection and analysis of user's all explicit and implicit behavior, using user behavior profiles and entropy method to determine the weight of the behavior for analyzing user interest, the introduction of time forgetting function to solve the problem of user interest drift, and getting a list of the user's personalized recommendation based on collaborative filtering technology. …”
Get full text
Article -
86
-
87
-
88
Analysis of Tobacco Cessation Programs in Dental Settings
Published 2024-12-01“…Participants included 400 adult tobacco users who were randomly assigned to either an intervention group (n = 200) or a control group (n = 200). …”
Get full text
Article -
89
The Sustainability of Knowledge-Sharing Behavior Based on the Theory of Planned Behavior in Q&A Social Network Community
Published 2021-01-01“…It is very important and urgent to explore the factors that affect users’ willingness to share knowledge. In response to this problem, this paper builds a theoretical model of the factors that are affecting users’ willingness to share knowledge and uses questionnaire research methods to conduct research design and collect sample data and uses methods such as correlation analysis and structural equation modeling to verify the model and hypothesis. …”
Get full text
Article -
90
Investigating the impact of user perception and gamification elements on repurchase decisions in game live broadcasting
Published 2025-01-01“…Based on the theory of affordance-psychological outcome-behavioral (A-P-B), this paper introduces three gamification elements of user activity visibility, user level visibility and purchase effect visibility, and three user-perceived experience values of perceived hedonic value, perceived cognitive value and perceived social value to establish the model. …”
Get full text
Article -
91
Deceptive Self-Presentation: The Role of Social Media User Motivation and the Dark Triad Personality
Published 2023-12-01“…It was conducted quantitatively through structural equation model (SEM) analysis based on partial least squares (PLS) using data collected from 400 early adult Instagram users between the ages of 20 and 34 years in Indonesia. …”
Get full text
Article -
92
-
93
An integrated optimization model of network behavior victimization identification based on association rule feature extraction
Published 2023-08-01“…The identification of the risk of network behavior victimization was of great significance for the prevention and warning of telecom network fraud.Insufficient mining of network behavior features and difficulty in determining relationships, an integrated optimization model for network behavior victimization identification based on association rule feature extraction was proposed.The interactive traffic data packets generated when users accessed websites were captured by the model, and the implicit and explicit behavior features in network traffic were extracted.Then, the association rules between features were mined, and the feature sequences were reconstructed using the FP-Growth algorithm.Finally, an analysis model of telecom network fraud victimization based on network traffic analysis was established, combined with the stochastic forest algorithm of particle swarm optimization.The experiments show that compared with general binary classification models, the proposed model has better precision and recall rates and can effectively improve the accuracy of network fraud victimization identification.…”
Get full text
Article -
94
User Segmentation Based on Purchasing Habits and Preferences on the Amazon Platform Using K-Means Clustering
Published 2023-12-01“…The research process involves Knowledge Data Discovery (KDD) stages, including data processing, attribute selection, and applying the K-Means Clustering algorithm. The analysis results reveal five distinct user clusters, each with unique characteristics reflecting user behavior and preferences. …”
Get full text
Article -
95
Development of Fuzzy Level of Service Criteria for Bus Rapid Transit considering User Heterogeneities in China
Published 2020-01-01“…Transit passengers are heterogeneous in their perceptions, needs, and behavior. The traditional hard LOS criteria have an inherent weakness, because of which the accuracy of an LOS analysis is limited. …”
Get full text
Article -
96
Cross-Cultural Perspectives on Fake News: A Comparative Study of Instagram Users in Greece and Portugal
Published 2025-01-01“…The results reveal distinct user behaviors: Greeks exhibit a unique inclination towards social connections, displaying an increased trust in friends’ content and investing more time on Instagram, reflecting the importance of personal connections in their media consumption. …”
Get full text
Article -
97
An exploration of the influencing factors of privacy fatigue among mobile social media users from the configuration perspective
Published 2025-01-01“…This study not only provides theoretical reference for understanding the antecedents of privacy fatigue among users but also offers new practical solutions for user privacy management.…”
Get full text
Article -
98
-
99
Engagement With an Internet-Administered, Guided, Low-Intensity Cognitive Behavioral Therapy Intervention for Parents of Children Treated for Cancer: Analysis of Log-Data From the...
Published 2025-01-01“…User engagement was measured behaviorally, for example, through log-data tracking, and future research should measure emotional and cognitive components of engagement. …”
Get full text
Article -
100
Ethical Considerations of Influencing Behavior Using Computer Technology
Published 2025-01-01“…Today, the use of various psychological techniques in the design of products and services based on computer technology is being pursued seriously to gradually and unconsciously influence the behavior and mind of users, and frameworks have been developed in this direction to achieve this goal. …”
Get full text
Article