Search results for "User profile"
showing 10 items of 26 documents
The Current and Future Role of Carsharing in Palermo: Analysis of Collected Data and Results of a Customer Satisfaction Survey
2018
In recent years many cities, both in Italy and abroad, have adopted Sustainable Urban Mobility Plans, in which one of the key action is the developing of the sharing mobility. The aim of the paper is to define the role that carsharing plays in Palermo today and it will play in the future, thanks to the adoption of new strategies, such as the introduction of the free-floating system, and transport demand orientation policies, such as the increase in the parking fees for private cars or the expansion of the ZTL. The average user profile of carsharing in Palermo has been identified through a customer satisfaction survey and the potential demand of carsharing in Palermo has been studied using G…
Using continuous user authentication to detect masqueraders
2003
Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…
A Methodology to Detect Temporal Regularities in User Behavior for Anomaly Detection
2001
Network security, and intrusion detection in particular, represents an area of increased in security community over last several years. However, the majority of work in this area has been concentrated upon implementation of misuse detection systems for intrusion patterns monitoring among network traffic. In anomaly detection the classification was mainly based on statistical or sequential analysis of data often neglect ion temporal events' information as well as existing relations between them. In this paper we consider an anomaly detection problem as one of classification of user behavior in terms of incoming multiple discrete sequences. We present and approach that allows creating and mai…
Automatic ontology-based user profile learning from heterogeneous web resources in a big data context
2013
The Web has developed to the biggest source of information and entertainment in the world. By its size, its adaptability and flexibility, it challenged our current paradigms on information sharing in several areas. By offering everybody the opportunity to release own contents in a fast and cheap way, the Web already led to a revolution of the traditional publishing world and just now, it commences to change the perspective on advertisements. With the possibility to adapt the contents displayed on a page dynamically based on the viewer's context, campaigns launched to target rough customer groups will become an element of the past. However, this new ecosystem, that relates advertisements wit…
Privacy in Social Network Sites
2011
Are we running out of privacy? Nowadays, for example, we are concerned about whether the maintenance of a private sphere in online environments has become a luxury commodity (Papacharissi 2009). Questions of this kind are justified as online communication plays an increasingly important role in people’s everyday life (cf., e.g., Lundby 2009). While it seems exaggerated to stigmatize today’s youth as “communication junkies” (Patalong 2010), online conversations are increasingly becoming a functional equivalent to face to face communication (Beer 2008). However, some significant differences between online and “offline” communication remain. Face to face communication may remain largely intima…
Navigating high-choice European political information environments : a comparative analysis of news user profiles and political knowledge
2021
The transition from low- to high-choice media environments has had far-reaching implications for citizens’ media use and its relationship with political knowledge. However, there is still a lack of comparative research on how citizens combine the usage of different media and how that is related to political knowledge. To fill this void, we use a unique cross-national survey about the online and offline media use habits of more than 28,000 individuals in 17 European countries. Our aim is to (i) profile different types of news consumers and (ii) understand how each user profile is linked to political knowledge acquisition. Our results show that five user profiles – news minimalists, social m…
Découverte des relations dans les réseaux sociaux
2011
In recent years, social network sites exploded in popularity and become an important part of the online activities on the web. This success is related to the various services/functionalities provided by each site (ranging from media sharing, tagging, blogging, and mainly to online social networking) pushing users to subscribe to several sites and consequently to create several social networks for different purposes and contexts (professional, private, etc.). Nevertheless, current tools and sites provide limited functionalities to organize and identify relationship types within and across social networks which is required in several scenarios such as enforcing users’ privacy, and enhancing t…
A global service level guarantee in NGN networks
2010
In this paper, we propose an end-to-end service level negotiation protocol which enables a global service offer covering quality of service (QoS) and security while taking into account user's mobility in this offer. This protocol provides all the domains involved in the transport of a various offered services with a negotiation capability to achieve an agreement on a service level. This paper shows also results of measurements evaluating the performances of the considered negotiation protocol and security impact on QoS.
Research Directions of OLAP Personalizaton
2011
In this paper we have highlighted five existing approaches for introducing personalization in OLAP: preference constructors, dynamic personalization, visual OLAP, recommendations with user session analysis and recommendations with user profile analysis and have analyzed research papers within these directions. We have provided an evaluation in order to point out (i) personalization options, described in these approaches, and its applicability to OLAP schema elements, aggregate functions, OLAP operations, (ii) the type of constraints (hard, soft or other), used in each approach, (iii) the methods for obtaining user preferences and collecting user information. The goal of our paper is to syst…
2021
In COVID-19 related infodemic, social media becomes a medium for wrongdoers to spread rumors, fake news, hoaxes, conspiracies, astroturf memes, clickbait, satire, smear campaigns, and other forms of deception. It puts a tremendous strain on society by damaging reputation, public trust, freedom of expression, journalism, justice, truth, and democracy. Therefore, it is of paramount importance to detect and contain unreliable information. Multiple techniques have been proposed to detect fake news propagation in tweets based on tweets content, propagation on the network of users, and the profile of the news generators. Generating human-like content allows deceiving content-based methods. Networ…