Losing the ability to communicate inhibits social contact, creates feelings of frustration and isolation and complicates personal comfort and medical care. Progressive diseases such as amyotrophic ...lateral sclerosis (ALS) and multiple sclerosis (MS) can cause severe motor disabilities that make communication through traditional means difficult, slow, and exhausting, even with the support of augmentative and alternative communication (AAC) systems. Using a design science research approach, we seek to improve the communication process for individuals with severe motor disabilities. We develop a series of design requirements to inform the creation and evaluation of an artefact, an AAC system that incorporates context‐aware user profiles to improve the communication process for individuals with severe motor disabilities. We derive prescriptive knowledge through the creation of design principles based on our findings and justify these design principles using the lens of media synchronicity theory (MST). This research identifies opportunities for further research related to MST and provides insights to inform those designing communication systems for individuals that rely on AAC systems.
Releasing social network data could seriously breach user privacy. User profile and friendship relations are inherently private. Unfortunately, sensitive information may be predicted out of released ...data through data mining techniques. Therefore, sanitizing network data prior to release is necessary. In this paper, we explore how to launch an inference attack exploiting social networks with a mixture of non-sensitive attributes and social relationships. We map this issue to a collective classification problem and propose a collective inference model. In our model, an attacker utilizes user profile and social relationships in a collective manner to predict sensitive information of related victims in a released social network dataset. To protect against such attacks, we propose a data sanitization method collectively manipulating user profile and friendship relations. Besides sanitizing friendship relations, the proposed method can take advantages of various data-manipulating methods. We show that we can easily reduce adversary's prediction accuracy on sensitive information, while resulting in less accuracy decrease on non-sensitive information towards three social network datasets. This is the first work to employ collective methods involving various data-manipulating methods and social relationships to protect against inference attacks in social networks.
By matching attributes in user profiles, social networking services (SNSs) are able to create certain social relationships between different users. However, user profiles often contain sensitive ...information about users. If data matching is done in plaintext, users’ privacy and security will face serious challenges. Most recently, the hacking incident of Ashley Madison website, which incurred more than 60 GB of data being leaked, has prompted researchers to explore the privacy of user data in social networks urgently. Existing schemes may be able to achieve privacy-preserving user profile matching, but they require high communication bandwidth and complex computational costs. To address them, we proposed a private user profile matching protocol for social networks using Formula Omitted-out-of-Formula Omitted matching servers. Applying the Chinese remainder theorem (CRT), Bloom filter technique, and skyline computation idea, the matching users are efficiently returned with the help of any Formula Omitted matching server without disclosing their identities. In addition, our scheme allows up to Formula Omitted matching servers to collude while simultaneously ensuring user profile privacy and query privacy. Finally, compared with two recent user profile matching protocols, the performance results demonstrate that our scheme outperforms them.
The purpose of the user profile is to use the latter's preferences in order to personalize the responses to his requests and to carry out targeted recommendations. A user profile can be built both ...manually or automatically, except that the manual way remains time consuming and complex for the user. And that’s the reason why we present in this article an automatic method based on data mining techniques. The approach that we intend to suggest in this article consists of two main phases, the first consists of extracting the contextual preference rules, the second is the construction of the user profile which allows us to eliminate all the redundant and super fluous rules extracted from the first phase, the goal is to have a consistent and concise user profile. A consistent user profile ensures that the preference rules defining the profile match the maximum of this user's preferences and contradict few of them. A concise user profile implies that the profiles consists of a small number of preference rules. In this article, we will mainly define the concepts used in order to understand the extraction problem that we intend to solve and define formalization of the problem. We Validated Our Approach on a film database. The approach that we intend to suggest in this article consists of two main phases, the first consists of extracting the contextual preferencerules, the second is the construction of the user profile which allows us to eliminate all the redundant and superfluous rules extracted from the first phase, the goal is to have a consistent and concise user profile. A consistent user profile ensures that the preference rules defining the profile match the maximum of this user’s preferences and contradict few of them. A concise user profile implies that the profiles consists of a small number of preference rules.
Query expansion has been widely adopted in Web search as a way of tackling the ambiguity of queries. Personalized search utilizing folksonomy data has demonstrated an extreme vocabulary mismatch ...problem that requires even more effective query expansion methods. Co-occurrence statistics, tag-tag relationships, and semantic matching approaches are among those favored by previous research. However, user profiles which only contain a user's past annotation information may not be enough to support the selection of expansion terms, especially for users with limited previous activity with the system. We propose a novel model to construct enriched user profiles with the help of an external corpus for personalized query expansion. Our model integrates the current state-of-the-art text representation learning framework, known as word embeddings, with topic models in two groups of pseudo-aligned documents. Based on user profiles, we build two novel query expansion techniques. These two techniques are based on topical weights-enhanced word embeddings, and the topical relevance between the query and the terms inside a user profile, respectively. The results of an in-depth experimental evaluation, performed on two real-world datasets using different external corpora, show that our approach outperforms traditional techniques, including existing non-personalized and personalized query expansion methods.
Las pantallas se han convertido en la nueva forma de comunicación y autoexpresión de la mayoría de los jóvenes. Cada vez más las formas de relacionarse, de entretenerse, e incluso de desconectar, ...quedan atravesadas por la hiperconectividad que entrañan estos dispositivos tecnológicos. Con el objetivo de conocer el perfil de uso, comportamientos y riesgos en relación con el uso de las pantallas de los jóvenes españoles se llevó a cabo un estudio de tipo cuantitativo en el que participaron un total de 2066 jóvenes españoles entre los 12 y los 18 años. Para ello se utilizó un cuestionario diseñado y validado para esta investigación. Los datos se analizaron mediante la aplicación de pruebas estadísticas de tipo descriptivo e inferencial. Los resultados ponen de manifiesto que los jóvenes utilizan el smartphone principalmente en su tiempo de ocio para comunicarse y relacionarse a través de redes sociales, preferentemente de WhatsApp o Instagram. Conforme van creciendo los jóvenes pasan más tiempo conectados y comparten más información personal. En este sentido se precisa de una pedagogía encaminada a atender los procesos afectivos, relacionales y comunicacionales de la juventud que les permita gestionar de forma adecuada su exposición en las redes sociales.
The following work aims to identify the characteristics of users and suitable channels for the design and development of C2C (consumer to consumer) e-commerce websites between rural producers and ...entrepreneurs in Ecuador and their potential customers. To achieve this, a mixed-methodological approach was used, starting with qualitative research and concluding with the collection of data through quantitative tools aimed at confirming the qualitative results. ...of this work, information was collected from different types of users participating in the commerce model, consolidating the analysis through the development of two user profile sheets, generating informative input that establishes important considerations for the development of e-commerce projects aimed at generating commercial transactions between producers in the rural areas of Ecuador and potential consumers. Siendo así, al hablar de plataformas de e-commerce nos referimos a sitios web o aplicaciones que nos permiten realizar compras y ventas,como son las tiendas virtuales o los Marketplace de internet.
The primary purpose of this study was to explore whether the discrepancy between gratifications obtained (GO) and gratifications sought (GS) from social networking sites (SNSs) affected users' ...satisfaction and continuance intention. The study was guided by the uses and gratifications theory along with the functional approach. It examined the role of SNS use habits in predicting an underlying psychological process that helped initiate and maintain SNS use. Data were collected via a diary survey; responses were collected from 265 adults. A path model revealed that socialization, social support, and entertainment GO-GS discrepancies had significant impacts on satisfaction with SNS use. Satisfaction with SNS use had a significant impact on SNS continuance intention. A multi-group comparison showed that media use habits negatively moderated the effect of GO-GS discrepancy on satisfaction. In the low-habit group, socialization, convenience, social support, information, entertainment, and escapism GO-GS discrepancies had significant positive impacts on satisfaction; in the high-habit group, only socialization, social support, and entertainment GO-GS discrepancies had significant positive impacts on satisfaction. The relationship between satisfaction and continuance intention significantly decreased in the high-habit group, indicating the negatively moderating role of habitual SNS use. The study highlights the importance of habitual SNS use in the achievement of SNS user retention.
•Distinguished gratification obtained from gratification sought.•Moderating role of media use habit.•Crucial role of media use habit in the achievement of SNS user retention.