Search results

1 – 10 of over 22000
Article
Publication date: 15 March 2023

Qiao Li, Chunfeng Liu, Jingrui Hou and Ping Wang

As an emerging tool for data discovery, data retrieval systems fail to effectively support users' cognitive processes during data search and access. To uncover the relationship…

Abstract

Purpose

As an emerging tool for data discovery, data retrieval systems fail to effectively support users' cognitive processes during data search and access. To uncover the relationship between data search and access and the cognitive mechanisms underlying this relationship, this paper examines the associations between affective memories, perceived value, search effort and the intention to access data during users' interactions with data retrieval systems.

Design/methodology/approach

This study conducted a user experiment for which 48 doctoral students from different disciplines were recruited. The authors collected search logs, screen recordings, questionnaires and eye movement data during the interactive data search. Multiple linear regression was used to test the hypotheses.

Findings

The results indicate that positive affective memories positively affect perceived value, while the effects of negative affective memories on perceived value are nonsignificant. Utility value positively affects search effort, while attainment value negatively affects search effort. Moreover, search effort partially positively affects the intention to access data, and it serves a full mediating role in the effects of utility value and attainment value on the intention to access data.

Originality/value

Through the comparison between the findings of this study and relevant findings in information search studies, this paper reveals the specificity of behaviour and cognitive processes during data search and access and the special characteristics of data discovery tasks. It sheds light on the inhibiting effect of attainment value and the motivating effect of utility value on data search and the intention to access data. Moreover, this paper provides new insights into the role of memory bias in the relationships between affective memories and data searchers' perceived value.

Details

Journal of Documentation, vol. 79 no. 5
Type: Research Article
ISSN: 0022-0418

Keywords

Article
Publication date: 7 September 2018

Hatice Sadikoglu Asan and Ahsen Ozsoy

Housing quality is determined by both objective and subjective dynamics. This research was conducted to explore the importance of usersmemory as a tool for assessing housing…

Abstract

Purpose

Housing quality is determined by both objective and subjective dynamics. This research was conducted to explore the importance of usersmemory as a tool for assessing housing quality. While objective features of the surroundings generally require physical measurements, subjective features can be supported by residents’ memories. Memory studies can therefore be used as a research tool to understand the housing environment as they provide important references to the past, present, and future. The purpose of this paper is to explore the relationship between users’ (residents) memory and housing quality.

Design/methodology/approach

The methodology comprised a literature review of spatial quality studies and a field study of a modern housing estate in Istanbul. For the field study, housing quality was examined through the memories of residents in the neighbourhood, buildings, and units. With the research, site observations were made, a questionnaire was issued to residents, and in-depth interviews were conducted with residents who had lived there the longest. New dimensions of housing quality problems were then discussed in the conclusion with reference to residents’ memories.

Findings

Memory studies can be used as a research tool to understand the housing environment, as they provide important references to the past, present and future. In the conclusion, new dimensions of the housing quality problems were discussed with the help of the residents’ memories. It was seen that different dimensions of housing quality can be revealed with the help of user memory.

Research limitations/implications

In all, 40 of the total residents (101) accepted to make questionnaires. In-depth interviews were conducted with three long-term residents that are the only ones still alive and had lived the area since the beginning of the life after construction.

Originality/value

With the aim of developing new tools and methods to analyse housing quality, this research presents a new perspective by utilising usersmemories to evaluate spatial quality.

Details

International Journal of Building Pathology and Adaptation, vol. 36 no. 4
Type: Research Article
ISSN: 2398-4708

Keywords

Article
Publication date: 9 November 2015

Alain Forget, Sonia Chiasson and Robert Biddle

This paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text passwords…

1342

Abstract

Purpose

This paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text passwords persist despite several decades of evidence of their security and usability challenges. It seems extremely unlikely that a single scheme will globally replace text passwords, suggesting that a diverse ecosystem of multiple authentication schemes designed for specific environments is needed. Authentication scheme research has thus far proceeded in an unstructured manner.

Design/methodology/approach

This paper presents the User-Centred Authentication Feature Framework, a conceptual framework that classifies the various features that knowledge-based authentication schemes may support. This framework can used by researchers when designing, comparing and innovating authentication schemes, as well as administrators and users, who can use the framework to identify desirable features in schemes available for selection.

Findings

This paper illustrates how the framework can be used by demonstrating its applicability to several authentication schemes, and by briefly discussing the development and user testing of two framework-inspired schemes: Persuasive Text Passwords and Cued Gaze-Points.

Originality/value

This framework is intended to support the increasingly diverse ecosystem of authentication schemes by providing authentication researchers, professionals and users with the increased ability to design, develop and select authentication schemes better suited for particular applications, environments and contexts.

Details

Information & Computer Security, vol. 23 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 22 November 2011

Tangjian Deng and Ling Feng

Observing that people re‐access what they have seen or used in the past is very common in real lives. The purpose of this paper is to review the subject of information re‐finding…

Abstract

Purpose

Observing that people re‐access what they have seen or used in the past is very common in real lives. The purpose of this paper is to review the subject of information re‐finding comprehensively, and introduce to readers the underlying techniques and mechanisms used in information re‐finding.

Design/methodology/approach

After analyzing users' information re‐finding behaviors and their requirements, the paper studies the natural way of re‐finding in human memory, and reviews state‐of‐the‐art techniques and tools developed in the fields of web and personal information management for information re‐finding.

Findings

Four main re‐finding support techniques on the Web are: re‐finding tools in Web browsers; history service; re‐finding search engine; and voice‐based re‐finding. Three main re‐finding approaches are used in PIM: browse‐based approaches; content‐based search; and context‐based search.

Practical implications

Following the recalling mechanisms in human memory, the method of recall‐by‐context in both fields of web usage and personal information management can make users feel easy to re‐find information.

Originality/value

The paper gives a comprehensive overview of information re‐finding techniques.

Details

International Journal of Web Information Systems, vol. 7 no. 4
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 11 September 2017

Jens Stach

This paper aims to illuminate mechanisms through which memorable experiences with brands create lasting preferences. It is based on the proposition that intense positive…

2729

Abstract

Purpose

This paper aims to illuminate mechanisms through which memorable experiences with brands create lasting preferences. It is based on the proposition that intense positive (negative) affective consumption in the consumer’s youth creates powerful imprints, which influence brand preference (distaste) throughout life.

Design/methodology/approach

Autobiographical memories with Nutella are retrieved from three different user groups, i.e. heavy-, light- and non-users. The retrieved memory narratives are analysed using conditioning theory, i.e. operant, classical or no conditioning are identified and compared across groups.

Findings

The research’s central proposition is affirmed, yet the dominant form of conditioning mechanism differs per group. Operant conditioning outperforms classical conditioning in creating strong and lasting preferences. Heavy- and non-users predominantly exhibit in-tensely positive and negative operant conditioning, respectively. Light-users on the other hand recall less affectively intense consumption experiences, mainly featuring classical conditioning. The light-users’ recollections suggest a mere exposure effect to be more appropriate in describing the preference formation in this user group.

Research limitations/implications

Users not having experienced affectively intense consumption, i.e. light-users, are likely to be influenced in their preference over time through other factors, which this paper does not focus on.

Practical implications

Memory elicitation and exploration provides valuable insights to shape both promotional as well as advertising strategies.

Originality/value

The study extends existing theory on conditioning in marketing by first using a novel qualitative approach to analyse conditioning procedures in real-life settings, and second, it highlights operant conditioning’s superior ability in creating lasting preferences.

Details

Qualitative Market Research: An International Journal, vol. 20 no. 4
Type: Research Article
ISSN: 1352-2752

Keywords

Article
Publication date: 1 June 2005

Laurie Gemmill and Angela O'Neal

To provide a model for statewide collaborative digitization projects, based on the development of the Ohio Memory Online Scrapbook.

1370

Abstract

Purpose

To provide a model for statewide collaborative digitization projects, based on the development of the Ohio Memory Online Scrapbook.

Design/methodology/approach

Using Ohio Memory as a model, this paper establishes a three‐pronged approach to creation of a digital library. Creation of content, development of tools and a focus on outreach were critical to the success of Ohio Memory, a statewide digitization project involving 330 historical societies, libraries and museums throughout Ohio.

Findings

This paper establishes a three‐pronged approach to digitization. Creation of content, development of tools and a focus on outreach were critical to the success of Ohio Memory. The collaborative nature of the project is an underlying aspect of Ohio Memory, it led to the creation of a standardized, central point of access for digitized primary source materials relating to Ohio's history.

Practical implications

This paper provides helpful advice to organizations considering digitizing their collections and details a model framework for statewide collaborative projects.

Originality/value

As more organizations establish digital libraries to enhance access to collections, this paper offers an example of a successful project. It also details significant considerations to take into account when building a digital library.

Details

Library Hi Tech, vol. 23 no. 2
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 10 October 2016

Mahdi Nasrullah Al-Ameen, S.M. Taiabul Haque and Matthew Wright

Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords…

Abstract

Purpose

Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a one-time code, either via e-mail or text message. The prevalence of smartphones, however, creates security risks in which a stolen phone leads to user’s accounts being accessed. Physical tokens such as RSA’s SecurID create extra burdens for users and cannot be used on many accounts at once. This study aims to improve the usability and security for two-factor online authentication.

Design/methodology/approach

The authors propose a novel second authentication factor that, similar to passwords, is also based on something the user knows but operates similarly to a one-time code for security purposes. The authors design this component to provide higher security guarantee with minimal memory burden and does not require any additional communication channels or hardware. Motivated by psychology research, the authors leverage users’ autobiographical memory in a novel way to create a secure and memorable component for two-factor authentication.

Findings

In a multi-session lab study, all of the participants were able to log in successfully on the first attempt after a one-week delay from registration and reported satisfaction on the usability of the scheme.

Originality/value

The results indicate that the proposed approach to leverage autobiographical memory is a promising direction for further research on second authentication factor based on something the user knows.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 15 February 2008

Walter Butler

This paper seeks to re‐establish memory's role within reference librarianship, and to argue that continued research on how memory affects the reference librarian can encourage…

1421

Abstract

Purpose

This paper seeks to re‐establish memory's role within reference librarianship, and to argue that continued research on how memory affects the reference librarian can encourage growth within the profession.

Design/methodology/approach

Neuroscience and psychological explanations of memory are introduced and then utilized to show how reference librarians access and impress memory. Perspectives on reference librarianship in relation to memory, service, education, and knowledge management are also presented and scrutinized.

Findings

Memory is an integral part of librarianship, yet often overlooked. Memory is also a complex tool which comprising overlapping systems. Owing to the nature of these systems, it is sometimes difficult to decipher when one system is being utilized and another is not.

Research limitations/implications

Memory is not tangible, though neuroscience has been able to map out some processes. Because of memory's elusive quality, the paper relies heavily on present biological and psychological theories. There is a need to assess memory practices further in the realm of librarianship and to determine more ways in which memory can contribute to the enhancement of library services.

Practical implications

The paper provides insight for the role of memory within reference librarianship, and suggests a structural basis to analyze librarian service through memory systems.

Originality/value

Utilizing both psychological views and biological constructs of memory, the author systematically incorporates these ideas into roles which are beneficial to the development of the reference librarian and enhancement of reference services.

Details

Reference Services Review, vol. 36 no. 1
Type: Research Article
ISSN: 0090-7324

Keywords

Article
Publication date: 30 November 2021

Bhaveer Bhana and Stephen Vincent Flowerday

The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting…

Abstract

Purpose

The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting or mistyping the password (usually because of character switching). The source of this issue is that while a password containing combinations of lowercase characters, uppercase characters, digits and special characters (LUDS) offers a reasonable level of security, it is complex to type and/or memorise, which prolongs the user authentication process. This results in much time being spent for no benefit (as perceived by users), as the user authentication process is merely a prerequisite for whatever a user intends to accomplish. This study aims to address this issue, passphrases that exclude the LUDS guidelines are proposed.

Design/methodology/approach

To discover constructs that create security and to investigate usability concerns relating to the memory and typing issues concerning passphrases, this study was guided by three theories as follows: Shannon’s entropy theory was used to assess security, chunking theory to analyse memory issues and the keystroke level model to assess typing issues. These three constructs were then evaluated against passwords and passphrases to determine whether passphrases better address the security and usability issues related to text-based user authentication. A content analysis was performed to identify common password compositions currently used. A login assessment experiment was used to collect data on user authentication and user – system interaction with passwords and passphrases in line with the constructs that have an impact on user authentication issues related to security, memory and typing. User–system interaction data was collected from a purposeful sample size of 112 participants, logging in at least once a day for 10 days. An expert review, which comprised usability and security experts with specific years of industry and/or academic experience, was also used to validate results and conclusions. All the experts were given questions and content to ensure sufficient context was provided and relevant feedback was obtained. A pilot study involving 10 participants (experts in security and/or usability) was performed on the login assessment website and the content was given to the experts beforehand. Both the website and the expert review content was refined after feedback was received from the pilot study.

Findings

It was concluded that, overall, passphrases better support the user during the user authentication process in terms of security, memory issues and typing issues.

Originality/value

This research aims at promoting the use of a specific type of passphrase instead of complex passwords. Three core aspects need to be assessed in conjunction with each other (security, memorisation and typing) to determine whether user-friendly passphrases can support user authentication better than passwords.

Details

Information & Computer Security, vol. 30 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 September 2013

Ofer Bergman

Personal information management (PIM) is an activity in which an individual stores personal information items in order to retrieve them later on. As PIM research moves from an…

4476

Abstract

Purpose

Personal information management (PIM) is an activity in which an individual stores personal information items in order to retrieve them later on. As PIM research moves from an infant stage of exploratory studies to more rigorous quantitative ones, there is a need to identify and map variables that characterize and account for the variety of PIM behaviour. This is the aim of the current research.

Design/methodology/approach

In an exploratory study, 20 semi-structured 90-minute interviews were recorded and transcribed. Variables were found by comparing the behaviors of participants who represent the two extreme poles of each variable's axis (i.e. when two participants showed a high and low degree of document redundancy, the redundancy variable was identified). In a later analysis, the variables were grouped into categories.

Findings

The paper identifies 15 variables grouped in five categories: organization related variables (order, redundancy and name meaning), structure variables (collection size, folder depth, folder breadth and folder size), work process variables (attendance time and modality), memory related variables (memory reliance, dominant memory) and retrieval variables (retrieval type, retrieval success, retrieval time and ubiquity).

Research limitations/implications

Future research could make use of these variables in order to: measure their distribution, find relations between them, test how they are affected by variables external to PIM (e.g. systems design) and find how they affect other dependent variables (e.g. productivity).

Originality/value

This is the first research that systematically explores PIM variables.

Details

Aslib Proceedings: New Information Perspectives, vol. 65 no. 5
Type: Research Article
ISSN: 0001-253X

Keywords

1 – 10 of over 22000