users

The Roles of Challenge and Skill in the Flow Experiences of Web Users




users

Development and Validation of an Instrument for Assessing Users’ Views about the Usability of Digital Libraries




users

Development of the Web Users Self-Efficacy Scale (WUSE)




users

ICT Strategy in an ICT User Perspective: Exploring Alignment between ICT Users and Managers




users

Users’ Learning of Principles of Computer Operations




users

Evaluation of Web Based Information Systems: Users’ Informing Criteria




users

Towards a Methodology to Elicit Tacit Domain Knowledge from Users




users

External Variables as Antecedents of Users Perception in Virtual Library Usage

Several studies extended the Technology Acceptance Model (TAM) by examining the antecedents of perceived usefulness and perceived ease of use; the present study looks at demographic aspect of external variables in virtual library use among undergraduate students. The purpose of this study is to identify the demographic factors sex, level of study, cumulative grade point average, and computer knowledge that act as external factors that are antecedents of perceived usefulness and perceived ease of use. The university management makes a large investment in the provision of a virtual library; investigation of the virtual library acceptance by students is important. TAM and theory of reasoned action (TRA) are utilised to theoretically test a model for the extension and to predict virtual library acceptance and usage. In a survey study, data was collected by using a structured questionnaire given to 394 randomly selected participants in a private university. Data were analysed by Pearson product moment correlation, multiple and hierarchical regression. The result of the study is consistent with TAM factors examined for explaining virtual library usage. The extension model accounts for 2.5% variance in perceived usefulness, 2.1% in perceived ease of use, 11.7% - 15.2% on intention to use and 7.2% on actual use of virtual library. Implications of the findings of the study on user’s virtual library training are discussed.




users

Modelling End Users’ Continuance Intention to Use Information Systems in Academic Settings: Expectation-Confirmation and Stress Perspective

Aim/Purpose: The main aim of this study is to identify the factors that influence the continuance intention of use of innovative systems by non-academic employees of a private university and associated academic institutions in Bangladesh. Background: The targeted academic institutions have introduced many new online services aimed at improving students’ access to information and services, including a new online library, ERP or online forum, and the jobs-tracking system (JTS). This research is focused only on the JTS for two reasons. First, it is one of the most crucial systems for the Daffodil Family, as it enables efficient working across many institutes spread across the country and abroad. Second, it is employed in a wide variety of organisational institutes, not just the university. This study aims to discover negative factors that lead to a decrease in users’ intentions to continue using the system. The ultimate goal is to improve the motivation among administrative staff to use technology-related innovation by reducing or eliminating the problems. Methodology: G* power analysis was employed to determine the expected sample size. A questionnaire survey was conducted of 211 users of a new job tracking system from a private university in Bangladesh, to collect data for testing the suggested research model. The data was analysed using the structural equation technique, which is a powerful multivariate analysis mechanism. Contribution: This research contributes to the body of literature and helps better understand users’ continuance intention in the post-implementation phase of the JTS. It complements the micro-level examinations of continuance intention of using IT, by building on our understanding of the phenomenon at the individual level. Specifically, this study examines the role of technostress where organisations invest in IT to make their users more comfortable with innovative and new technologies like the JTS. Findings: This research develops a theoretical advancement of the expectation-confirmation theory, with implications for IT managers and senior management dealing with IT-related behaviour. All proposed hypotheses were supported. Specifically, the predictors of exhaustion – work overload, work–life balance, and role ambiguity – are significant. The core factors for satisfaction, perceived usefulness, and confirmation, are also found to be significant. Finally, satisfaction and exhaustion significantly influence continuance intention, in both positive and negative ways. Recommendations for Practitioners: This study gives an idea about some of the difficulties that people face when implementing new and innovative IT, particularly in academia in Bangladesh. It offers insights into strategies the management may want to follow when implementing new technology like the JTS. This study suggests strategies to increase satisfaction and reduce technostress among new users to enhance organisational support for change. Recommendation for Researchers: Methodologically, the study provides researchers about the technique that reduces the threat of the common method bias. First, it created a psychological separation between criterion and predictor variables. Second, the threat of common method variance was actively controlled by modelling a latent method factor and by using marker variables that researchers can use in their work. This study complements the micro-level examinations of continuance intention of using IT by building on our understanding of the phenomenon at the individual level. Researchers can extend this model by integrating other theories. Impact on Society: The findings of the study indicate that work overload, work–life conflict, and role ambiguity create tiredness, leading to lower user satisfaction with the system. Perceived usefulness and confirmation have an increasingly similar effect on users’ satisfaction with the system and their subsequent continuance intention. These findings tell university administrators what measures they should take to improve continuance intention of using innovative technology. Future Research: Future studies could conceptualise a five-factor personality model from the personal perspective of users. This model can also be extended by including the dimensions of absorptive capacity, i.e., the dynamic capabilities of users. Absorptive capacity of understanding, assimilating, and applying might influence the user’s perception of usefulness and confirmation of using JTS.




users

The Segmentation of Mobile Application Users in The Hotel Booking Journey

Aim/Purpose: This study aims to create customer segmentation who use Online Travel Agent (OTA) mobile applications in Indonesia throughout their hotel booking journey. Background: In the context of mobile hotel booking applications, research analyzing the customer experience at each customer journey stage is scarce. However, literature increasingly acknowledges the significance of this stage in comprehending customer behavior and revenue streams. Methodology: This study employs a mixed-method and exploratory approach by doing in-depth interviews with 20 participants and questionnaires from 207 participants. Interview data are analyzed using thematic analysis, while the questionnaires are analyzed using descriptive statistics. Contribution: This study enriches knowledge in understanding customer behavior that considers the usage of mobile apps as a segmentation criterion in the hotel booking journey. Findings: We developed four user personas (no sweat player, spotless seeker, social squad, and bargain hunter) that show customer segmentation based on the purpose, motivation, and actions in each journey stage (inspiration, consideration, reservation, and experience). Recommendations for Practitioners: The resulting customer segmentation enables hospitality firms to improve their current services by adapting to the needs of various segments and avoiding unanticipated customer pain points, such as incomplete information, price changes, no social proof, and limited payment options. Recommendation for Researchers: The quality and robustness of the customer segment produced in this study can be further tested based on the criteria of homogeneity, size, potential benefits, segment stability, segment accessibility, segment compatibility, and segment actionability. Impact on Society: This study has enriched the existing literature by establishing a correlation between user characteristics and how they use smartphones for tourism planning, focusing on hotel booking in mobile applications. Future Research: For future research, each customer segment’s demographic and behavioral factors can be explored further.




users

Use of Mobile Health Applications by Lay Users in Kuwait

Aim/Purpose: This study aims to explore the use of mobile health applications (mHealth apps) by lay users in Kuwait. Specifically, it seeks to: (i) identify and highlight the impact of factors that contribute to their use of mHealth apps and (ii) validate a model of these users’ usage of mHealth apps. Background: The advancement of information technologies has paved the way for efficiency and effectiveness in healthcare sectors in developed countries. Kuwait has attempted to revolutionise healthcare systems through mobile applications of information technology solutions to educate users on better methods of receiving customised health services. However, end-user usage of mHealth apps remains in the infancy in developing countries, including Kuwait. Lay users are often vulnerable and frequently overlooked by researchers and health technology providers. Methodology: A cross-sectional study was conducted among 225 lay users of mHealth apps in Kuwait using an online questionnaire to achieve the study objectives. A purposive sampling method utilising convenience and snowballing sampling techniques was used in which all the respondents were lay users. Descriptive statistics, Pearson correlation, and regression analyses were employed to analyse the collected data. Contribution: The study contributes to the extant literature on health informatics and mHealth by providing a comprehensive understanding of how technological, social, and functional factors are related to mHealth apps in the context of developing countries. It identifies key drivers of mHealth app use, suggests expanding the TAM model, and facilitates comparisons with developed countries, addressing gaps in mHealth research. Findings: Four factors (i.e., perceived trust (PT), perceived ease of use (PEU) and behaviour control (PBC), perceived usefulness (PU), and subjective norms (SN)) were identified that influence the use of mHealth apps. These four identified factors also contributed to lay users’ use of these mHealth apps. Among these four factors, perceived trust (PT) was the main contributor to lay users’ use of these mHealth apps. Recommendations for Practitioners: Based on the empirical results, this study provides feasible recommendations for the government, healthcare providers, and developers of mHealth apps. The findings urge developers to enhance app functionality by prioritising privacy and security to build user trust while outlining guidelines for future development focused on user-centric design and compliance with data privacy regulations. Additionally, the government should establish supportive policies and funding, ensure regulatory oversight, and promote public awareness to foster trust. Healthcare providers should integrate mHealth apps into their services, train staff for practical use, gather users’ feedback, and collaborate with developers to create tailored healthcare solutions. Future Research: Additional research is required to apply probability sampling techniques and increase the sample size to generate more reliable and generalisable findings. Additionally, the young age segment must be considered here, and research must be extended to consider the moderating role of demographic factors like age, gender, and educational levels to better understand the adoption of mHealth apps.




users

CAPTCHA: Impact on User Experience of Users with Learning Disabilities

CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading and comprehension of what is presented in the test. Various types of CAPTCHA tests have been developed in order to address accessibility and security issues. The objective of this study is to investigate how the differences between various CAPTCHA tests affect user experience among populations with and without learning disabilities. A questionnaire accompanied by experiencing five different tests was administered to 212 users, 60 of them with learning disabilities. Response rates for each test and levels of success were collected automatically. Findings suggest that users with learning disabilities have more difficulties in solving the tests, especially those with distorted texts, have more negative attitudes towards the CAPTCHA tests, but the response time has no statistical difference from users without learning disabilities. These insights can help to develop and implement solutions suitable for many users and especially for population with learning disabilities.




users

Measuring IS System Service Quality with SERVQUAL: Users' Perceptions of Relative Importance of the Five SERVPERF Dimensions




users

Testing a Model of Users’ Web Risk Information Seeking Intention




users

Social Networks in which Users are not Small Circles

Understanding of social network structure and user behavior has important implications for site design, applications (e.g., ad placement policies), accurate modeling for social studies, and design of next-generation infrastructure and content distribution systems. Currently, characterizations of social networks have been dominated by topological studies in which graph representations are analyzed in terms of connectivity using techniques such as degree distribution, diameter, average degree, clustering coefficient, average path length, and cycles. The problem is that these parameters are not completely satisfactory in the sense that they cannot account for individual events and have only limited use, since one can produce a set of synthetic graphs that have the exact same metrics or statistics but exhibit fundamentally different connectivity structures. In such an approach, a node drawn as a small circle represents an individual. A small circle reflects a black box model in which the interior of the node is blocked from view. This paper focuses on the node level by considering the structural interiority of a node to provide a more fine-grained understanding of social networks. Node interiors are modeled by use of six generic stages: creation, release, transfer, arrival, acceptance, and processing of the artifacts that flow among and within nodes. The resulting description portrays nodes as comprising mostly creators (e.g., of data), receivers/senders (e.g., bus boys), and processors (re-formatters). Two sample online social networks are analyzed according to these features of nodes. This examination points to the viability of the representational method for characterization of social networks.




users

Influence of Information Product Quality on Informing Users: A Web Portal Context

Web portals have been used as information products to deliver personalized, feature-rich, and flexible information needs to Internet users. However, all portals are not equal. Most of them have relatively a small number of visitors, while a few capture the majority of surfers. This study seeks to uncover the factors that contribute the perceived quality of a general portal. Based on 21 factors derived from an extensive literature review on Information Product Quality (IPQ), web usage, and media use, an experimental study was conducted to identify the factors that are perceived by web portal users as most relevant. The literature categorizes quality factors of an information product in three dimensions: information, physical, and service. This experiment suggests a different clustering of factors: Content relevancy, Communication interactiveness, Information currency, and Instant gratification. The findings in this study will help developers find a more customer-oriented approach to developing high-traffic portals.




users

Ladies First: The Influence of Mobile Dating Applications on the Psychological Empowerment of Female Users

Aim/Purpose: This study was undertaken to shed light on how the use of a heteronormative mobile dating application creates an environment to promote psychological empowerment among female users within the online dating scene. The study focused on a mobile dating application which specifically challenges traditional gender roles, namely Bumble. Background: Mobile dating applications have become an increasingly popular medium for people to meet potential partners. However, users’ pre-existing social norms and biases inform how they communicate on these platforms, and stereotyped judgment about women perpetuates ideologies which continue to oppress them within the cyber world. Despite this, very little research has investigated the experiences of female users of mobile dating applications. Methodology: The study was qualitative in nature, and 10 semi-structured interviews of female Bumble users were conducted. The data were analyzed using thematic analysis. Contribution: The study contributes to knowledge by highlighting how key features of mobile dating applications influence various aspects of psychological empowerment as articulated in the findings. Findings: The findings show that the Bumble application supports Intrapersonal variables of Psychological Empowerment of female users relative to Domain Specific Perceived Control and Self-Efficacy, Motivation to Control and Perceived Competence. However, Domain Specific Perceived Control can also be negatively impacted due to self-doubt when female users receive little to no matches. Interactional variables of psychological empowerment are also supported, as Bumble allows female users to be critically aware of the need to screen potential partners, understand relevant causal agents, develop skills relative to initiating conversations and mobilize resources. However, Bumble is not effective in supporting behavioral variables of psychological empowerment because of limitations in the tool’s functionality and the behavior of the people interacting on the platform. Recommendations for Practitioners: The findings are important as they suggest the need to enhance the features available to female users in order to better suit their needs and desire to take control of their lives in the context of dating and/or friendship. Recommendation for Researchers: The findings reveal the need for a change of perceptions and attitudes on the part of some users to create a safer and more considerate virtual dating space, to truly achieve psychological empowerment. Future Research: More research is required on how male and female users domesticate mobile dating applications and how the use of these applications influence their daily lives from a socio-cultural point of view.




users

The Good, the Bad, and the Neutral: Twitter Users’ Opinion on the ASUU Strike

Aim/Purpose: Nigeria’s university education goes through incessant strikes by the Academic Staff Union of Universities (ASUU). This strike has led to shared emotion on micro-blogging sites like Twitter. This study analyzed selected historical tweets from the “ASUU” to understand citizens’ opinions. Background: The researchers conducted sentiment analysis and topic modelling to understand Twitter users’ opinions on the strike. Methodology: The researchers used the Valence Aware Dictionary for Sentiment Reasoning (VADER) technique for sentiment analysis, and the Latent Dirichlet allocation (LDA) was used for topic modelling. A total of 10,000 tweets were first extracted for the study. After data cleaning, 1323 tweets were left. Contribution: To the researcher’s best knowledge, no published study has presented a sentiment analysis on the topic of the ASUU strike using the Twitter dataset. This research will fill this gap by providing a sentiment analysis and drawing out subjects by exploring the tweets on the phrase “ASUU.” Findings: The sentiment analysis result using VADER returned 567 tweets as ‘Negative,’ with the remaining 544 and 212 categorized as Positive and Neutral. The result of the LDA returned six topics, all comprising seven keywords. The topics were the solution to the strike, ASUU strike effect, strike Call-off, appeal to ASUU, student protest and student appeal. Recommendation for Researchers: Researchers can use this study’s findings to compare with other contexts of opinion mining. Practitioners may also use the research to understand better the attitudes of their staff and students about the strikes to create actionable solutions before the suspension of the strike. Future Research: Future studies can collect information from other social networking and blogging sites.




users

Just crossed over 1100 Active Users of the yToggle Extension - and 5 Star Rated! Thanks!!!!!

...




users

OpenAI reaches 1 million business users

OpenAI hits one million paying business users for ChatGPT Enterprise, Team, and Edu, with global adoption.




users

Facebook and Instagram users in Europe can opt for less personalized ads

Facebook and Instagram users in Europe will get the option to see less personalized ads if they don't want to pay for an ad-free subscription, social media company Meta said Tuesday, bowing to pressure from Brussels over digital competition concerns.





users

CDC: Construction tops list of industries with highest percentage of tobacco users

Washington – Although tobacco use continues to decrease among working adults overall, a significant number of workers in the construction, mining, and transportation and warehousing industries still use some form of tobacco product, according to a report from the Centers for Disease Control and Prevention.




users

Axis Notifies Users of Image Quality Issues

AXIS Image Health Analytics notifies users of any issues with image quality and ensures that the cameras being used are capturing the right images at all times.




users

Login changes coming for users of DOT’s drug-testing database

Washington — The Department of Transportation is changing how users access the Drug and Alcohol Testing Management Information System.




users

Snap One Enhances Clare Software for Integrators & End Users

The update includes several new features for integrator partners and end users designed to help increase safety and improve the overall user experience with greater visibility into systems, flexibility, and additional third party integrations.




users

How to Talk to End Users About AI

Much like IT and cybersecurity, the AI world is changing and evolving so quickly it can be  difficult to keep up. 




users

NIOSH seeks users of spray polyurethane foam for study

Washington – NIOSH is looking for companies that use spray polyurethane foam to participate in a study about the health effects of occupational exposure to flame retardants.




users

Wheelchair users and fire safety

Creating a safe evacuation plan means all employees should be accounted for in it – including workers who use a wheelchair.




users

Can better truck design help protect vulnerable road users?

Washington — The Government Accountability Office has agreed to look into how vehicle design – including that of large commercial trucks – could improve safety for pedestrians, bicyclists and other road users.




users

Vital Pursuit Designed for GLP-1 Users

Vital Pursuit delivers the nutrients this consumer group needs with thoughtfully portioned products that offer at least 20g of protein, great taste, and options with vibrant vegetables. 




users

Android MDM for Home Users

I am finding some of my aging family members are increasingly in need of guardrails where their Android phones and tablets are concerned as they keep downloading shady apps and falling for fake virus ads and fake shopify hosted stores that pollute...





users

R. Kelly calls accusers 'liars' in sex abuse case

The singer, out on bail following his Feb. 22 arrest in Chicago, said he has done "lots of things wrong" when it comes to women, but said he has apologized. He denies doing anything against their will.




users

86% of smartphone users at risk of being secretly recorded

“In an age when your digital privacy can be invaded by several types of software unconsciously, it turns into a vital skill to learn how to protect your PC and your private conversations,” said Thibeau Maerevoet, ProxyScrape CEO.




users

Borrowing privileges at Lenoir-Rhyne U. Library for users of Hickory Public & Catawba County Libraries

A new agreement extends borrowing privileges at Lenoir-Rhyne University Library to registered users of Hickory Public and Catawba County Libraries.




users

How Arid Viper spies on Android users in the Middle East – Week in security with Tony Anscombe

The spyware, called AridSpy by ESET, is distributed through websites that pose as various messaging apps, a job search app, and a Palestinian Civil Registry app




users

How a signed driver exposed users to kernel-level threats – Week in Security with Tony Anscombe

A purported ad blocker marketed as a security solution leverages a Microsoft-signed driver that inadvertently exposes victims to dangerous threats




users

Report says over 700 million active internet users in India as of December 2022

The active internet user base aged 12 years and older has grown more than 20% year-on-year to reach 595 million in 2022.




users

Facebook has 3 billion users. Many of them are old.

The once-cool social media platform born before the iPhone is approaching two decades in existence. For those who came of age around the time Mark Zuckerberg launched thefacebook.com from his Harvard dorm room in 2004, it's been inextricably baked into daily life - even if it's somewhat faded into the background over the years.




users

Meta's Threads swiftly signs up 30 million users, in clear threat to Twitter

Meta's Threads racked up more than 30 million sign-ups within about 18 hours of its launch, emerging as the first real threat to Elon Musk-owned Twitter, as it took advantage of its access to billions of Instagram users and a similar look to that of its rival.




users

Meta prepares AI-powered chatbots in attempt to retain users

Meta has been designing prototypes for chatbots that can have humanlike discussions with its users, as the company attempts to boost its engagement with its social media platforms, according to the report, citing people with knowledge of the plans.




users

Apple TV users may need an iPhone or iPad to accept iCloud terms and conditions

Previously, users were able to access Apple TV without needing any other Apple hardware. Users were allowed to set up the Apple TV, install apps, and make purchases completely independently. Sometimes users needed a web browser on a PC to perform the typical Apple ID management duties (if its necessary).




users

Users can now mark messages as important or urgent in Microsoft Teams

Navigate to the "Mark as important" button which is present beneath the compose box and select either the "Important" or "Urgent" option depending on the level of attention the message requires.




users

OpenAI to enable more customizations for enterprise and individual users

Speaking to investors at a Morgan Stanley conference, Altman said the AI company will focus on building a platform that sells APIs to others and creates killer apps like ChatGPT.




users

Oppo aims to make GenAI accessible to 50 mn users in 2024, collaborates with Google, Microsoft

Oppo aims to make generative artificial intelligence accessible to 50 million users by 2024 through collaborations with Google and Microsoft, joining other handset makers like Samsung and Xiaomi in leveraging AI for sales growth.




users

Study highlights serious security threat to many internet users

RIVERSIDE, Calif. -- Researchers at the University of California, Riverside have identified a weakness in the Transmission Control Protocol (TCP) of all Linux operating systems since late 2012 that enables attackers to hijack users' internet communications completely remotely.

read more



  • Mathematics & Economics

users

Researchers find that Android apps can secretly track users' whereabouts

Three years ago, the Federal Trade Commission dimmed hopes for the Brightest Flashlight app for Android, slapping its developer with charges of consumer deception. Why? The app was transmitting users' locations and device IDs to third parties without telling the users or getting their permission.

read more



  • Mathematics & Economics

users

CERT-In finds multiple bugs in Microsoft Edge, advises users to update

"Multiple vulnerabilities have been reported in Microsoft Edge (chromium-based) which could allow the remote attacker to cause a denial of service condition, remote code execution, sensitive information disclosure and security restriction bypass on the targeted system," said the CERT-In advisory.




users

Vital Pursuit debuts meals designed for GLP-1 users

Introducing a line of high-protein meals with essential nutrients, Vital Pursuit lands at national retailers to provide dietary support for GLP-1 users and consumers focused on weight management.