Search results
1 – 10 of over 22000Qiao Li, Chunfeng Liu, Jingrui Hou and Ping Wang
As an emerging tool for data discovery, data retrieval systems fail to effectively support users' cognitive processes during data search and access. To uncover the relationship…
Abstract
Purpose
As an emerging tool for data discovery, data retrieval systems fail to effectively support users' cognitive processes during data search and access. To uncover the relationship between data search and access and the cognitive mechanisms underlying this relationship, this paper examines the associations between affective memories, perceived value, search effort and the intention to access data during users' interactions with data retrieval systems.
Design/methodology/approach
This study conducted a user experiment for which 48 doctoral students from different disciplines were recruited. The authors collected search logs, screen recordings, questionnaires and eye movement data during the interactive data search. Multiple linear regression was used to test the hypotheses.
Findings
The results indicate that positive affective memories positively affect perceived value, while the effects of negative affective memories on perceived value are nonsignificant. Utility value positively affects search effort, while attainment value negatively affects search effort. Moreover, search effort partially positively affects the intention to access data, and it serves a full mediating role in the effects of utility value and attainment value on the intention to access data.
Originality/value
Through the comparison between the findings of this study and relevant findings in information search studies, this paper reveals the specificity of behaviour and cognitive processes during data search and access and the special characteristics of data discovery tasks. It sheds light on the inhibiting effect of attainment value and the motivating effect of utility value on data search and the intention to access data. Moreover, this paper provides new insights into the role of memory bias in the relationships between affective memories and data searchers' perceived value.
Details
Keywords
Hatice Sadikoglu Asan and Ahsen Ozsoy
Housing quality is determined by both objective and subjective dynamics. This research was conducted to explore the importance of users’ memory as a tool for assessing housing…
Abstract
Purpose
Housing quality is determined by both objective and subjective dynamics. This research was conducted to explore the importance of users’ memory as a tool for assessing housing quality. While objective features of the surroundings generally require physical measurements, subjective features can be supported by residents’ memories. Memory studies can therefore be used as a research tool to understand the housing environment as they provide important references to the past, present, and future. The purpose of this paper is to explore the relationship between users’ (residents) memory and housing quality.
Design/methodology/approach
The methodology comprised a literature review of spatial quality studies and a field study of a modern housing estate in Istanbul. For the field study, housing quality was examined through the memories of residents in the neighbourhood, buildings, and units. With the research, site observations were made, a questionnaire was issued to residents, and in-depth interviews were conducted with residents who had lived there the longest. New dimensions of housing quality problems were then discussed in the conclusion with reference to residents’ memories.
Findings
Memory studies can be used as a research tool to understand the housing environment, as they provide important references to the past, present and future. In the conclusion, new dimensions of the housing quality problems were discussed with the help of the residents’ memories. It was seen that different dimensions of housing quality can be revealed with the help of user memory.
Research limitations/implications
In all, 40 of the total residents (101) accepted to make questionnaires. In-depth interviews were conducted with three long-term residents that are the only ones still alive and had lived the area since the beginning of the life after construction.
Originality/value
With the aim of developing new tools and methods to analyse housing quality, this research presents a new perspective by utilising users’ memories to evaluate spatial quality.
Details
Keywords
Alain Forget, Sonia Chiasson and Robert Biddle
This paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text passwords…
Abstract
Purpose
This paper aims to propose that more useful novel schemes could develop from a more principled examination and application of promising authentication features. Text passwords persist despite several decades of evidence of their security and usability challenges. It seems extremely unlikely that a single scheme will globally replace text passwords, suggesting that a diverse ecosystem of multiple authentication schemes designed for specific environments is needed. Authentication scheme research has thus far proceeded in an unstructured manner.
Design/methodology/approach
This paper presents the User-Centred Authentication Feature Framework, a conceptual framework that classifies the various features that knowledge-based authentication schemes may support. This framework can used by researchers when designing, comparing and innovating authentication schemes, as well as administrators and users, who can use the framework to identify desirable features in schemes available for selection.
Findings
This paper illustrates how the framework can be used by demonstrating its applicability to several authentication schemes, and by briefly discussing the development and user testing of two framework-inspired schemes: Persuasive Text Passwords and Cued Gaze-Points.
Originality/value
This framework is intended to support the increasingly diverse ecosystem of authentication schemes by providing authentication researchers, professionals and users with the increased ability to design, develop and select authentication schemes better suited for particular applications, environments and contexts.
Details
Keywords
Observing that people re‐access what they have seen or used in the past is very common in real lives. The purpose of this paper is to review the subject of information re‐finding…
Abstract
Purpose
Observing that people re‐access what they have seen or used in the past is very common in real lives. The purpose of this paper is to review the subject of information re‐finding comprehensively, and introduce to readers the underlying techniques and mechanisms used in information re‐finding.
Design/methodology/approach
After analyzing users' information re‐finding behaviors and their requirements, the paper studies the natural way of re‐finding in human memory, and reviews state‐of‐the‐art techniques and tools developed in the fields of web and personal information management for information re‐finding.
Findings
Four main re‐finding support techniques on the Web are: re‐finding tools in Web browsers; history service; re‐finding search engine; and voice‐based re‐finding. Three main re‐finding approaches are used in PIM: browse‐based approaches; content‐based search; and context‐based search.
Practical implications
Following the recalling mechanisms in human memory, the method of recall‐by‐context in both fields of web usage and personal information management can make users feel easy to re‐find information.
Originality/value
The paper gives a comprehensive overview of information re‐finding techniques.
Details
Keywords
This paper aims to illuminate mechanisms through which memorable experiences with brands create lasting preferences. It is based on the proposition that intense positive…
Abstract
Purpose
This paper aims to illuminate mechanisms through which memorable experiences with brands create lasting preferences. It is based on the proposition that intense positive (negative) affective consumption in the consumer’s youth creates powerful imprints, which influence brand preference (distaste) throughout life.
Design/methodology/approach
Autobiographical memories with Nutella are retrieved from three different user groups, i.e. heavy-, light- and non-users. The retrieved memory narratives are analysed using conditioning theory, i.e. operant, classical or no conditioning are identified and compared across groups.
Findings
The research’s central proposition is affirmed, yet the dominant form of conditioning mechanism differs per group. Operant conditioning outperforms classical conditioning in creating strong and lasting preferences. Heavy- and non-users predominantly exhibit in-tensely positive and negative operant conditioning, respectively. Light-users on the other hand recall less affectively intense consumption experiences, mainly featuring classical conditioning. The light-users’ recollections suggest a mere exposure effect to be more appropriate in describing the preference formation in this user group.
Research limitations/implications
Users not having experienced affectively intense consumption, i.e. light-users, are likely to be influenced in their preference over time through other factors, which this paper does not focus on.
Practical implications
Memory elicitation and exploration provides valuable insights to shape both promotional as well as advertising strategies.
Originality/value
The study extends existing theory on conditioning in marketing by first using a novel qualitative approach to analyse conditioning procedures in real-life settings, and second, it highlights operant conditioning’s superior ability in creating lasting preferences.
Details
Keywords
Laurie Gemmill and Angela O'Neal
To provide a model for statewide collaborative digitization projects, based on the development of the Ohio Memory Online Scrapbook.
Abstract
Purpose
To provide a model for statewide collaborative digitization projects, based on the development of the Ohio Memory Online Scrapbook.
Design/methodology/approach
Using Ohio Memory as a model, this paper establishes a three‐pronged approach to creation of a digital library. Creation of content, development of tools and a focus on outreach were critical to the success of Ohio Memory, a statewide digitization project involving 330 historical societies, libraries and museums throughout Ohio.
Findings
This paper establishes a three‐pronged approach to digitization. Creation of content, development of tools and a focus on outreach were critical to the success of Ohio Memory. The collaborative nature of the project is an underlying aspect of Ohio Memory, it led to the creation of a standardized, central point of access for digitized primary source materials relating to Ohio's history.
Practical implications
This paper provides helpful advice to organizations considering digitizing their collections and details a model framework for statewide collaborative projects.
Originality/value
As more organizations establish digital libraries to enhance access to collections, this paper offers an example of a successful project. It also details significant considerations to take into account when building a digital library.
Details
Keywords
Mahdi Nasrullah Al-Ameen, S.M. Taiabul Haque and Matthew Wright
Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords…
Abstract
Purpose
Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a one-time code, either via e-mail or text message. The prevalence of smartphones, however, creates security risks in which a stolen phone leads to user’s accounts being accessed. Physical tokens such as RSA’s SecurID create extra burdens for users and cannot be used on many accounts at once. This study aims to improve the usability and security for two-factor online authentication.
Design/methodology/approach
The authors propose a novel second authentication factor that, similar to passwords, is also based on something the user knows but operates similarly to a one-time code for security purposes. The authors design this component to provide higher security guarantee with minimal memory burden and does not require any additional communication channels or hardware. Motivated by psychology research, the authors leverage users’ autobiographical memory in a novel way to create a secure and memorable component for two-factor authentication.
Findings
In a multi-session lab study, all of the participants were able to log in successfully on the first attempt after a one-week delay from registration and reported satisfaction on the usability of the scheme.
Originality/value
The results indicate that the proposed approach to leverage autobiographical memory is a promising direction for further research on second authentication factor based on something the user knows.
Details
Keywords
This paper seeks to re‐establish memory's role within reference librarianship, and to argue that continued research on how memory affects the reference librarian can encourage…
Abstract
Purpose
This paper seeks to re‐establish memory's role within reference librarianship, and to argue that continued research on how memory affects the reference librarian can encourage growth within the profession.
Design/methodology/approach
Neuroscience and psychological explanations of memory are introduced and then utilized to show how reference librarians access and impress memory. Perspectives on reference librarianship in relation to memory, service, education, and knowledge management are also presented and scrutinized.
Findings
Memory is an integral part of librarianship, yet often overlooked. Memory is also a complex tool which comprising overlapping systems. Owing to the nature of these systems, it is sometimes difficult to decipher when one system is being utilized and another is not.
Research limitations/implications
Memory is not tangible, though neuroscience has been able to map out some processes. Because of memory's elusive quality, the paper relies heavily on present biological and psychological theories. There is a need to assess memory practices further in the realm of librarianship and to determine more ways in which memory can contribute to the enhancement of library services.
Practical implications
The paper provides insight for the role of memory within reference librarianship, and suggests a structural basis to analyze librarian service through memory systems.
Originality/value
Utilizing both psychological views and biological constructs of memory, the author systematically incorporates these ideas into roles which are beneficial to the development of the reference librarian and enhancement of reference services.
Details
Keywords
Bhaveer Bhana and Stephen Vincent Flowerday
The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting…
Abstract
Purpose
The average employee spends a total of 18.6 h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting or mistyping the password (usually because of character switching). The source of this issue is that while a password containing combinations of lowercase characters, uppercase characters, digits and special characters (LUDS) offers a reasonable level of security, it is complex to type and/or memorise, which prolongs the user authentication process. This results in much time being spent for no benefit (as perceived by users), as the user authentication process is merely a prerequisite for whatever a user intends to accomplish. This study aims to address this issue, passphrases that exclude the LUDS guidelines are proposed.
Design/methodology/approach
To discover constructs that create security and to investigate usability concerns relating to the memory and typing issues concerning passphrases, this study was guided by three theories as follows: Shannon’s entropy theory was used to assess security, chunking theory to analyse memory issues and the keystroke level model to assess typing issues. These three constructs were then evaluated against passwords and passphrases to determine whether passphrases better address the security and usability issues related to text-based user authentication. A content analysis was performed to identify common password compositions currently used. A login assessment experiment was used to collect data on user authentication and user – system interaction with passwords and passphrases in line with the constructs that have an impact on user authentication issues related to security, memory and typing. User–system interaction data was collected from a purposeful sample size of 112 participants, logging in at least once a day for 10 days. An expert review, which comprised usability and security experts with specific years of industry and/or academic experience, was also used to validate results and conclusions. All the experts were given questions and content to ensure sufficient context was provided and relevant feedback was obtained. A pilot study involving 10 participants (experts in security and/or usability) was performed on the login assessment website and the content was given to the experts beforehand. Both the website and the expert review content was refined after feedback was received from the pilot study.
Findings
It was concluded that, overall, passphrases better support the user during the user authentication process in terms of security, memory issues and typing issues.
Originality/value
This research aims at promoting the use of a specific type of passphrase instead of complex passwords. Three core aspects need to be assessed in conjunction with each other (security, memorisation and typing) to determine whether user-friendly passphrases can support user authentication better than passwords.
Details
Keywords
Personal information management (PIM) is an activity in which an individual stores personal information items in order to retrieve them later on. As PIM research moves from an…
Abstract
Purpose
Personal information management (PIM) is an activity in which an individual stores personal information items in order to retrieve them later on. As PIM research moves from an infant stage of exploratory studies to more rigorous quantitative ones, there is a need to identify and map variables that characterize and account for the variety of PIM behaviour. This is the aim of the current research.
Design/methodology/approach
In an exploratory study, 20 semi-structured 90-minute interviews were recorded and transcribed. Variables were found by comparing the behaviors of participants who represent the two extreme poles of each variable's axis (i.e. when two participants showed a high and low degree of document redundancy, the redundancy variable was identified). In a later analysis, the variables were grouped into categories.
Findings
The paper identifies 15 variables grouped in five categories: organization related variables (order, redundancy and name meaning), structure variables (collection size, folder depth, folder breadth and folder size), work process variables (attendance time and modality), memory related variables (memory reliance, dominant memory) and retrieval variables (retrieval type, retrieval success, retrieval time and ubiquity).
Research limitations/implications
Future research could make use of these variables in order to: measure their distribution, find relations between them, test how they are affected by variables external to PIM (e.g. systems design) and find how they affect other dependent variables (e.g. productivity).
Originality/value
This is the first research that systematically explores PIM variables.
Details