The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last two decades, scientific research has explored the problematic use of internet, videogames and mobile phones. However, there is still little consistent knowledge regarding the co‐occurrence of problematic technology use and the role of maladaptive personality characteristics in adolescence. The present study aimed to investigate adolescents' styles of technology use with a cluster analysis...
Behaviour of students on social networks is very interesting subject to explore. Services such as social networks offer various possibilities of interaction — chats, news, emails or forums. We made a questionnaire survey for comparison of social networks utilization with students of the Faculty of Economics and Administration at the University of Pardubice. The survey was aimed on using specific types...
A large part of Web traffic on e-commerce sites is generated not by human users but by Internet robots: search engine crawlers, shopping bots, hacking bots, etc. In practice, not all robots, especially the malicious ones, disclose their identities to a Web server and thus there is a need to develop methods for their detection and identification. This paper proposes the application of a Bayesian approach...
Exploratory empirical studies of the digital divide exist for various nations including the United States. The contribution of this paper is to enhance understanding of factors associated with availability and utilization of information and communication technologies (ICTs) at the state level in the US. In our conceptual model of technology utilization, eight dependent technology availability and...
Internet of Things (IoT) services and technologies become more and more predominant in the current and future era of the Internet. Lot of devices and applications are developed and connected to the classical IP networks. As for any new network services testing and evaluation is made in the intranet environment in these days. Neither the efficiency measurement methods of the energy usage nor communication...
With the development of the information techniques, Internet of Things has caused extensive concern. The burden of Internet of Things increases as the number of users rises. In order to ease the burden on Internet of Things and improve efficiency of user accessing the Internet of Things, this paper proposed a control strategy of group behavior. We count resources user interested in, and do cluster...
Aiming at better understanding the functioning mechanism of factors affecting consumers to adopt e-commerce, the paper adopted empirical methods such as questionnaire investigation, regression analysis, and cluster analysis, provided a quantitative analysis. Based on an analysis of the overall data, the degree of affecting on adopting motives was obtained. Consequently, firms can make effective decisions...
Engineered assembly may be treated mathematically as a clustering problem, in which cluster analysis hinges critically on the relationships between objects and attributes. This paper explores an analogical approach, via the evaluation of relationships against conventional assembly means, to derive and reveal the necessary relationships in collaborative virtual assembly. The inherent relationships...
During the last decade e-learning has become a widely accepted and commonly used educational tool. The main aim of our paper was to compare students' attitudes towards e-learning in Croatia and Scotland, and also to identify two relatively homogeneous groups of students according to their perceptions. T-tests and cluster analysis, in a data mining context, were used in this study and results confirm...
The article presents data exploration and regression analysis of the percentage of individuals using the Internet in their job search and six independent variables (averages for the period 2004–2008) for EU-27 countries, Iceland, Turkey and Croatia. Among the four regression models, this paper favours the multiple linear regression model with two regressors (the percentage of households with an Internet...
It is obvious that internet has become a key media to share resources and exchange information. As a special category of social activities, the behavior from network users normally shows its complexity and diversity, which makes people pay an increased attention to study and manage it. Based upon the formation mechanism of ant colony, this paper proposes an ant colony algorithm to do cluster analysis...
During the last few years, the search result clustering has attracted a substantial amount of research. In this paper, we present a comparative study of the performance of fuzzy clustering algorithms, namely Fuzzy C-Means (FCM), and Gustafson-Kessel (GK) algorithms with clustering search results. Therefore, there is a need to reduce the information, help filtering out irrelevant items, and favors...
High definition video streams are gaining larger shares of the Internet usage for typical users on daily basis. This is an expected result of the current boom in the online standard and high definition (HD) video streaming services such as YouTube and Hulu. Because of these video streams' unique statistical characteristics and their high bandwidth requirements, they are considered to be a continuous...
The consumers' risk perceptions in online shopping were studied using the questionnaire data from which five factors including psychological risk, performance risk, social risk, time risk and financial risk were extracted. And the consumers in the sample were classified to five types, i.e., the fashionable, the individualistic, the henchman, the busy-man and the moneygrubber, based on the differences...
Internet has being increasingly playing an important role in searching tourism information for tourists before making a purchase decision. However, there exit benefits and costs for tourists during Internet information search. The aim of this study is to discuss relationship between tourists' motivation and benefits and risks of Internet information search from information economics. The finding shows...
Frictionless electronic commerce is a made-up story and online price dispersion is high and steady. There is not enough proof that online prices are decreasing and becoming alike. Although the studies show that prices dispersion on the Internet is decreased, they are steady yet. Therefore, this study aims to determine the important dimensions of electronic retailers' heterogeneity and examine the...
Phishing is a form of online fraud with drastic consequences for the victims and institutions being defrauded. A phishing attack tries to create a believable environment for the intended victim to enter their confidential data such that the attacker can use or sell this information later. In order to apprehend phishers, law enforcement agencies need automated systems capable of tracking the size and...
This paper focuses on web pages clustering as a tool for typical Web patterns searching and using. Traditional methods of cluster analysis, self-organizing map and nonnegative matrix factorization were applied. Web pages on products sale and automatically detected Web patterns were used as a testing data. The application of GD-CLS (gradient descent constrained least squares) which combines some of...
Network coordinate system provides a method to predict distances between network nodes by geometric space embedding, which can help distributed applications such as P2P and Grid select the best node to transfer data. However, how to select the suitable embedding space dimension is still an open problem. In this paper, firstly we give an experimental study on the relationship between distance prediction...
Recent years have witnessed a huge increase in the number and variety of Internet applications, as well as on the number and diversity of security attacks to network users and systems. Consequently, the need for an accurate mapping of traffic to its corresponding applications has also raised in order to allow ISPs to provide better Quality-of-Service (QoS) standards, implement traffic engineering...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.