Purpose:Explore the factors affecting medical data sharing in clinical research scenarios from the user’s perspective,reveal the differences between different user groups,and deepen the understanding of medical data ...Purpose:Explore the factors affecting medical data sharing in clinical research scenarios from the user’s perspective,reveal the differences between different user groups,and deepen the understanding of medical data sharing mechanisms.Design/methodology/approach:By integrating the UTAUT model,trust theory and self-efficacy theory,introducing the concepts of data transparency and individual innovation,and combining internal and external motivators,we constructed a conceptual model of medical data users’sharing behavior in clinical research scenarios.We conducted empirical research by collecting 360 pieces of first-hand data from clinical researchers.Findings:Among the internal motivators,effort expectation had a higher impact on sharing intention than performance expectation,individual innovation and self-efficacy had a higher impact on sharing behavior than trust.Trust does not show a significant impact on sharing intention,but it has a significant positive influence on sharing behavior.Among the external motivators,community influence and data transparency both positively affect sharing intention.In addition,users with different working years,professional status,data level needs,and different sharing experiences showed significant differences in healthcare data sharing.Research limitations:Our sample of clinical researchers from China was used as empirical data.Further research is needed to examine the generality of the study findings.Practical implications:The findings enhance healthcare data stakeholders’understanding of healthcare data sharing in clinical research scenarios and provide theoretical and practical insights for relevant researchers.Originality/value:In this study,the UTAUT model,trust theory and self-efficacy theory were integrated and applied to clinical research scenarios for the first time,and the concepts of data transparency and individual innovation were introduced,and the CRS-USB conceptual model was constructed and validated to extend the UTAUT model.展开更多
Understanding the underlying goal behind a user's Web query has been proved to be helpful to improve the quality of search. This paper focuses on the problem of automatic identification of query types according to th...Understanding the underlying goal behind a user's Web query has been proved to be helpful to improve the quality of search. This paper focuses on the problem of automatic identification of query types according to the goals. Four novel entropy-based features extracted from anchor data and click-through data are proposed, and a support vector machines (SVM) classifier is used to identify the user's goal based on these features. Experi- mental results show that the proposed entropy-based features are more effective than those reported in previous work. By combin- ing multiple features the goals for more than 97% of the queries studied can be correctly identified. Besides these, this paper reaches the following important conclusions: First, anchor-based features are more effective than click-through-based features; Second, the number of sites is more reliable than the number of links; Third, click-distribution- based features are more effective than session-based ones.展开更多
Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a...Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.展开更多
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ...In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.展开更多
基金supported by the National Natural Science Foundation of China(Grant No.72374081)the Key Research and Development Project of the Department of Science and Technology of Jilin Province(Grant No.20240304164SF).
文摘Purpose:Explore the factors affecting medical data sharing in clinical research scenarios from the user’s perspective,reveal the differences between different user groups,and deepen the understanding of medical data sharing mechanisms.Design/methodology/approach:By integrating the UTAUT model,trust theory and self-efficacy theory,introducing the concepts of data transparency and individual innovation,and combining internal and external motivators,we constructed a conceptual model of medical data users’sharing behavior in clinical research scenarios.We conducted empirical research by collecting 360 pieces of first-hand data from clinical researchers.Findings:Among the internal motivators,effort expectation had a higher impact on sharing intention than performance expectation,individual innovation and self-efficacy had a higher impact on sharing behavior than trust.Trust does not show a significant impact on sharing intention,but it has a significant positive influence on sharing behavior.Among the external motivators,community influence and data transparency both positively affect sharing intention.In addition,users with different working years,professional status,data level needs,and different sharing experiences showed significant differences in healthcare data sharing.Research limitations:Our sample of clinical researchers from China was used as empirical data.Further research is needed to examine the generality of the study findings.Practical implications:The findings enhance healthcare data stakeholders’understanding of healthcare data sharing in clinical research scenarios and provide theoretical and practical insights for relevant researchers.Originality/value:In this study,the UTAUT model,trust theory and self-efficacy theory were integrated and applied to clinical research scenarios for the first time,and the concepts of data transparency and individual innovation were introduced,and the CRS-USB conceptual model was constructed and validated to extend the UTAUT model.
基金the Tianjin Applied Fundamental Research Plan (07JCYBJC14500)
文摘Understanding the underlying goal behind a user's Web query has been proved to be helpful to improve the quality of search. This paper focuses on the problem of automatic identification of query types according to the goals. Four novel entropy-based features extracted from anchor data and click-through data are proposed, and a support vector machines (SVM) classifier is used to identify the user's goal based on these features. Experi- mental results show that the proposed entropy-based features are more effective than those reported in previous work. By combin- ing multiple features the goals for more than 97% of the queries studied can be correctly identified. Besides these, this paper reaches the following important conclusions: First, anchor-based features are more effective than click-through-based features; Second, the number of sites is more reliable than the number of links; Third, click-distribution- based features are more effective than session-based ones.
基金supported by the National Natural Science Foundation of China(Grant No.:71203163)the Foundation for Humanities and Social Sciences of the Chinese Ministry of Education(Grant No.:12YJC870011)
文摘Purpose:The goal of our research is to suggest specific Web metrics that are useful for evaluating and improving user navigation experience on informational websites.Design/methodology/approach:We revised metrics in a Web forensic framework proposed in the literature and defined the metrics of footprint,track and movement.Data were obtained from user clickstreams provided by a real estate site’s administrators.There were two phases of data analysis with the first phase on navigation behavior based on user footprints and tracks,and the second phase on navigational transition patterns based on user movements.Findings:Preliminary results suggest that the apartment pages were heavily-trafficked while the agent pages and related information pages were underused to a great extent.Navigation within the same category of pages was prevalent,especially when users navigated among the regional apartment listings.However,navigation of these pages was found to be inefficient.Research limitations:The suggestions for navigation design optimization provided in the paper are specific to this website,and their applicability to other online environments needs to be verified.Preference predications or personal recommendations are not made during the current stage of research.Practical implications:Our clickstream data analysis results offer a base for future research.Meanwhile,website administrators and managers can make better use of the readily available clickstream data to evaluate the effectiveness and efficiency of their site navigation design.Originality/value:Our empirical study is valuable to those seeking analysis metrics for evaluating and improving user navigation experience on informational websites based on clickstream data.Our attempts to analyze the log file in terms of footprint,track and movement will enrich the utilization of such trace data to engender a deeper understanding of users’within-site navigation behavior.
文摘In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works.