Search results

1 – 10 of over 46000
Article
Publication date: 31 December 2006

Daniel Pakkala and Juhani Latvakoski

A novel distributed middleware service platform, called MidGate platform, is presented in this paper. The central contribution is description of the developed MidGate platform and…

Abstract

A novel distributed middleware service platform, called MidGate platform, is presented in this paper. The central contribution is description of the developed MidGate platform and its architecture focusing especially on the adaptation, context‐awareness, and personalization of mobile and pervasive services. The research problem addressed is how to facilitate the development of interoperable applications and services into heterogeneous and distributed service gateway based environments. A requirement analysis of future mobile and pervasive services and key technologies has been carried out to establish a solid base and requirements for the development of the MidGate platform. The key mechanisms supporting adaptation, context‐awareness, and personalization of applications and services are presented. The novel middleware architecture solution of the MidGate platform utilizing these key mechanisms is also described. The MidGate architecture utilizes the emerging Generic Service Elements (GSE) approach, where generic and collectively utilizable services are provided to applications as middleware services that are part of a service platform. The main contribution of this research is the definition of a set of GSEs, the related MidGate platform architecture and its evaluation. The evaluation of the MidGate platform has been carried out in series of laboratory prototypes. The evaluation indicates that the MidGate platform solution is well applicable in various service gateway‐based distributed systems and extends well into resource‐constrained mobile environments.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 February 2004

A.S. Sodiya, H.O.D. Longe and A.T. Akinwale

Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work is to combine…

1066

Abstract

Researchers have used many techniques in designing intrusion detection systems (IDS) and yet we still do not have an effective IDS. The interest in this work is to combine techniques of data mining and expert systems in designing an effective anomaly‐based IDS. Combining methods may give better coverage, and make the detection more effective. The idea is to mine system audit data for consistent and useful patterns of user behaviour, and then keep these normal behaviours in profiles. An expert system is used as the detection system that recognizes anomalies and raises an alarm. The evaluation of the intrusion detection system design was carried out to justify the importance of the work.

Details

Information Management & Computer Security, vol. 12 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 February 1997

JAN CHOWN

The topic of user profiling appears to be neglected in the records management literature although there is more on profiling in other fields, especially in education. An efficient…

Abstract

The topic of user profiling appears to be neglected in the records management literature although there is more on profiling in other fields, especially in education. An efficient and effective records management system is one which meets the needs of its users and therefore the techniques of user profiling would seem highly relevant to the records manager. In this article the author investigates what is meant by a profile of users of a Records Management System (RMS) and explains why and when it is needed. Drawing on general experience of local government and particular experience gained in undertaking a user survey as part of a computer security audit throughout Gateshead MBC, she goes on to explore how such a profile could be produced, using Tynedale DC Planning Department as an example.

Details

Records Management Journal, vol. 7 no. 2
Type: Research Article
ISSN: 0956-5698

Article
Publication date: 5 December 2023

Agnieszka Maria Koziel and Chien-wen Shen

This research aims to comprehend the factors that impact the emerging inclination of consumers toward mobile finance technology (fintech) services over banking institutions. The…

Abstract

Purpose

This research aims to comprehend the factors that impact the emerging inclination of consumers toward mobile finance technology (fintech) services over banking institutions. The study focuses on users' demographics and psychographics to delineate their unique segments and profiles.

Design/methodology/approach

The study proposes a segmentation and profiling framework that includes variance analysis, two-step cluster analysis and pairwise statistical tests. This framework is applied to a dataset of customers using a range of mobile fintech services, specifically robo-investment, peer-to-peer (P2P) payments, robo-advisory and digital savings. The analysis creates distinct customer profile clusters, which are later validated using pairwise statistical tests based on segmentation output.

Findings

Empirical results reveal that P2P payment service users exhibit a higher frequency of usage, proficiency and intention to continue using the service compared to users of robo-investment or digital savings platforms. In contrast, individuals utilizing robo-advisory services are identified to have a significantly greater familiarity and intention to sustain engagement with the service compared to digital savings users.

Practical implications

The findings provide financial institutions, especially traditional banks with actionable insights into their customer base. This information enables them to identify specific customer needs and preferences, thereby allowing them to tailor products and services accordingly. Ultimately, this understanding may strategically position traditional banks to maintain competitiveness amidst the increasing prominence of fintech enterprises.

Originality/value

This research provides an in-depth examination of customer segments and profiles within the mobile fintech services sphere, thus giving a nuanced understanding of customer behavior and preferences and generating practical recommendations for banks and other financial institutions. This study thereby sets the stage for further research and paves the way for developing personalized products and services in the evolving fintech landscape.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Open Access
Article
Publication date: 13 February 2024

Ke Zhang and Ailing Huang

The purpose of this paper is to provide a guiding framework for studying the travel patterns of PT users. The combination of public transit (PT) users’ travel data and user

Abstract

Purpose

The purpose of this paper is to provide a guiding framework for studying the travel patterns of PT users. The combination of public transit (PT) users’ travel data and user profiling (UP) technology to draw a portrait of PT users can effectively understand users’ travel patterns, which is important to help optimize the scheduling of PT operations and planning of the network.

Design/methodology/approach

To achieve the purpose, the paper presents a three-level classification method to construct the labeling framework. A station area attribute mining method based on the term frequency-inverse document frequency weighting algorithm is proposed to determine the point of interest attributes of user travel stations, and the spatial correlation patterns of user travel stations are calculated by Moran’s Index. User travel feature labels are extracted from travel data containing Beijing PT data for one consecutive week.

Findings

In this paper, a universal PT user labeling system is obtained and some related methods are conducted including four categories of user-preferred travel area patterns mining and a station area attribute mining method. In the application of the Beijing case, a precise exploration of the spatiotemporal characteristics of PT users is conducted, resulting in the final Beijing PTUP system.

Originality/value

This paper combines UP technology with big data analysis techniques to study the travel patterns of PT users. A user profile label framework is constructed, and data visualization, statistical analysis and K-means clustering are applied to extract specific labels instructed by this system framework. Through these analytical processes, the user labeling system is improved, and its applicability is validated through the analysis of a Beijing PT case.

Details

Smart and Resilient Transportation, vol. 6 no. 1
Type: Research Article
ISSN: 2632-0487

Keywords

Article
Publication date: 1 November 2006

Yuval Elovici, Bracha Shapira and Adlay Meshiach

The purpose of this paper is to prove the ability of PRivAte Web (PRAW) – a system for private web browsing – to stand possible attacks.

Abstract

Purpose

The purpose of this paper is to prove the ability of PRivAte Web (PRAW) – a system for private web browsing – to stand possible attacks.

Design/methodology/approach

Attacks on the systems were simulated, manipulating systems variables. A privacy measure was defined to evaluate the capability of the systems to stand the attacks. Analysis of results was performed.

Findings

It was shown that, even if the attack is optimised to provide the attacker's highest utility, the similarity between the user profile and the approximated profile is pretty low and does not enable the eavesdropper to derive an accurate estimation of the user profile.

Research limitations/implications

One limitation is the “cold start” problem – in the current version, an observer might detect the first transaction, which is always a real user transaction. As a remedy for this problem, the first transaction will be randomly delayed and a random number of fake transactions played before the real one (according to Tr). Another limitation is that PRAW supports only link browsing, originated in search engine interactions (since it is the most common interaction on the web. It should be extended to include concealment of browsing to links originating in the “Favourites” list, that users tend to browse regularly (even a few times a day) for professional or personal reasons.

Practical implications

PRAW is feasible and preserves the privacy of web browsers. It is now undergoing commercialisation to become a shelf tool for privacy preservation.

Originality/value

The paper presents a practical statistical method for privacy preservation and proved that it is standing possible attacks. Methods usually proposed for this problem are not statistical, but cryptography oriented, and are too expensive in processing‐time to be practical.

Details

Online Information Review, vol. 30 no. 6
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 22 February 2024

Yumeng Feng, Weisong Mu, Yue Li, Tianqi Liu and Jianying Feng

For a better understanding of the preferences and differences of young consumers in emerging wine markets, this study aims to propose a clustering method to segment the super-new…

Abstract

Purpose

For a better understanding of the preferences and differences of young consumers in emerging wine markets, this study aims to propose a clustering method to segment the super-new generation wine consumers based on their sensitivity to wine brand, origin and price and then conduct user profiles for segmented consumer groups from the perspectives of demographic attributes, eating habits and wine sensory attribute preferences.

Design/methodology/approach

We first proposed a consumer clustering perspective based on their sensitivity to wine brand, origin and price and then conducted an adaptive density peak and label propagation layer-by-layer (ADPLP) clustering algorithm to segment consumers, which improved the issues of wrong centers' selection and inaccurate classification of remaining sample points for traditional DPC (DPeak clustering algorithm). Then, we built a consumer profile system from the perspectives of demographic attributes, eating habits and wine sensory attribute preferences for segmented consumer groups.

Findings

In this study, 10 typical public datasets and 6 basic test algorithms are used to evaluate the proposed method, and the results showed that the ADPLP algorithm was optimal or suboptimal on 10 datasets with accuracy above 0.78. The average improvement in accuracy over the base DPC algorithm is 0.184. As an outcome of the wine consumer profiles, sensitive consumers prefer wines with medium prices of 100–400 CNY and more personalized brands and origins, while casual consumers are fond of popular brands, popular origins and low prices within 50 CNY. The wine sensory attributes preferred by super-new generation consumers are red, semi-dry, semi-sweet, still, fresh tasting, fruity, floral and low acid.

Practical implications

Young Chinese consumers are the main driver of wine consumption in the future. This paper provides a tool for decision-makers and marketers to identify the preferences of young consumers quickly which is meaningful and helpful for wine marketing.

Originality/value

In this study, the ADPLP algorithm was introduced for the first time. Subsequently, the user profile label system was constructed for segmented consumers to highlight their characteristics and demand partiality from three aspects: demographic characteristics, consumers' eating habits and consumers' preferences for wine attributes. Moreover, the ADPLP algorithm can be considered for user profiles on other alcoholic products.

Details

Kybernetes, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 9 February 2015

Javier De Andrés, Beatriz Pariente, Martin Gonzalez-Rodriguez and Daniel Fernandez Lanvin

The purpose of this paper is to identify demographic differences based on how users interact with web applications. The research is needed to develop future systems able to adapt…

Abstract

Purpose

The purpose of this paper is to identify demographic differences based on how users interact with web applications. The research is needed to develop future systems able to adapt the representation of online information to the user’s specific needs and preferences improving its usability. The following question guides this quest: is there a direct relationship between age and/or gender and interaction?

Design/methodology/approach

GOMS (goals, operators, methods, and selection rules) analysis was used to reduce complex interaction tasks into basic operators like pointing, dragging, typing, etc. An experiment was designed to analyse the user performance in the use of these operators through five complex tasks: point-and-click, drag-and-drop, text selection, text edition and menu selection. The sample comprises 592 individuals which took part in the experiment. The performance was analysed using multivariate regression analysis. User laterality and the the user experience were used as control variables.

Findings

The factors studied are significant enough to support user classification. The analysis evidenced that men performed significantly better than women when executing interaction pointing and dragging GOMS’s operators, but no significant differences arose with regard to the performance in the typing operators. Older users performed worse in all the interaction tasks. No significant performance differences were detected between left and right-handed users.

Research limitations/implications

The study pretends to lay the ground for developing artificial intelligence-based classification systems (e.g. neural networks, decision trees, etc.) able to detect significant differences in user performance, classifying users according to their age, gender and laterality.

Practical implications

This user profiling would drive the organisation, selection and representation of the online information according to the specific preferences and needs of each user. This would allow the design of new personalisation algorithms able to perform dynamic adaptation of user interfaces in order to improve the usability of online information systems.

Originality/value

This work extends previous research on user performance under a new approach and improved accuracy. First, it relies on the combined and simultaneous analysis of ageing and gender and the use of user laterality and experience as control variables. Second, the use of the GOMS analysis allowed the design of tests that closely resemble the user interaction in online information systems. Third, the size of the sample used in this analysis is much bigger than those used in previous works, allowing a more thorough data analysis which includes the estimation of an advanced model which is quantile regression.

Details

Online Information Review, vol. 39 no. 1
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 21 December 2021

Luciana Monteiro-Krebs, Bieke Zaman, Sonia Elisa Caregnato, David Geerts, Vicente Grassi-Filho and Nyi-Nyi Htun

The use of recommender systems is increasing on academic social media (ASM). However, distinguishing the elements that may be influenced and/or exert influence over content that…

Abstract

Purpose

The use of recommender systems is increasing on academic social media (ASM). However, distinguishing the elements that may be influenced and/or exert influence over content that is read and disseminated by researchers is difficult due to the opacity of the algorithms that filter information on ASM. In this article, the purpose of this paper is to investigate how algorithmic mediation through recommender systems in ResearchGate may uphold biases in scholarly communication.

Design/methodology/approach

The authors used a multi-method walkthrough approach including a patent analysis, an interface analysis and an inspection of the web page code.

Findings

The findings reveal how audience influences on the recommendations and demonstrate in practice the mutual shaping of the different elements interplaying within the platform (artefact, practices and arrangements). The authors show evidence of the mechanisms of selection, prioritization, datafication and profiling. The authors also substantiate how the algorithm reinforces the reputation of eminent researchers (a phenomenon called the Matthew effect). As part of defining a future agenda, we discuss the need for serendipity and algorithmic transparency.

Research limitations/implications

Algorithms change constantly and are protected by commercial secrecy. Hence, this study was limited to the information that was accessible within a particular period. At the time of publication, the platform, its logic and its effects on the interface may have changed. Future studies might investigate other ASM using the same approach to distinguish potential patterns among platforms.

Originality/value

Contributes to reflect on algorithmic mediation and biases in scholarly communication potentially afforded by recommender algorithms. To the best of our knowledge, this is the first empirical study on automated mediation and biases in ASM.

Details

Online Information Review, vol. 46 no. 5
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 18 October 2018

Corinne Amel Zayani, Leila Ghorbel, Ikram Amous, Manel Mezghanni, André Péninou and Florence Sèdes

Generally, the user requires customized information reflecting his/her current needs and interests that are stored in his/her profile. There are many sources which may provide…

Abstract

Purpose

Generally, the user requires customized information reflecting his/her current needs and interests that are stored in his/her profile. There are many sources which may provide beneficial information to enrich the user’s interests such as his/her social network for recommendation purposes. The proposed approach rests basically on predicting the reliability of the usersprofiles which may contain conflictual interests. The paper aims to discuss this issue.

Design/methodology/approach

This approach handles conflicts by detecting the reliability of neighbors’ profiles of a user. The authors consider that these profiles are dependent on one another as they may contain interests that are enriched from non-reliable profiles. The dependency relationship is determined between profiles, each of which contains interests that are structured based on k-means algorithm. This structure takes into consideration not only the evolutionary aspect of interests but also their semantic relationships.

Findings

The proposed approach was validated in a social-learning context as evaluations were conducted on learners who are members of Moodle e-learning system and Delicious social network. The quality of the created interest structure is assessed. Then, the result of the profile reliability is evaluated. The obtained results are satisfactory. These results could promote recommendation systems as the selection of interests that are considered of enrichment depends on the reliability of the profiles where they are stored.

Research limitations/implications

Some specific limitations are recorded. As the quality of the created interest structure would evolve in order to improve the profile reliability result. In addition, as Delicious is used as a main data source for the learner’s interest enrichment, it was necessary to obtain interests from other sources, such as e-recruitement systems.

Originality/value

This research is among the pioneer papers to combine the semantic as well as the hierarchical structure of interests and conflict resolution based on a profile reliability approach.

Details

Online Information Review, vol. 44 no. 2
Type: Research Article
ISSN: 1468-4527

Keywords

1 – 10 of over 46000