References
- Abd Elmonem, M. A., E. S. Nasr, and M. H. Geith. 2016. “Benefits and Challenges of Cloud ERP Systems – A Systematic Literature Review.” Future Computing and Informatics Journal, 1–9. doi:https://doi.org/10.1016/j.fcij.2017.03.003.
- Albu, Veaceslav. 2016. “Measuring Customer Behavior with Deep Convolutional Neural Networks.” Brain Broad Research in Artificial Intelligence & Neuroence 7: 74–79.
- Ali, Z., Syed Khurram Shahzad, and Waseem Shahzad. 2017. “Performance Analysis of Statistical Pattern Recognition Methods in KELL.” Procedia Computer Science 112: 2022–2030. doi:https://doi.org/10.1016/j.procs.2017.08.144.
- Baker, L. M. 2006. “Observation: A Complex Research Method.” Library Trends 55 (1): 171–189. doi:https://doi.org/10.1353/lib.2006.0045.
- Balasubramanian, M., S. Palanivel, and V. Ramalingam. 2011. “Video-based Person Recognition Using Fovea Intensity Comparison Code.” Behavior & Information Technology 30 (6): 747–760. doi:https://doi.org/10.1080/01449290903353047.
- Bleidorn, W., C. J. Hopwood, and A. G. Wright. 2017. “Using Big Data to Advance Personality Theory.” Current Opinion in Behavioral Sciences 18: 79–82. doi:https://doi.org/10.1016/j.cobeha.2017.08.004.
- Bradley, J. 2008. “Management Based Critical Success Factors in the Implementation of Enterprise Resource Planning Systems.” International Journal of Accounting Information Systems 9 (3): 175–200. doi:https://doi.org/10.1016/j.accinf.2008.04.001.
- Bunian, Sara, Alessandro Canossa, Randy Colvin, and Magy Seif El-Nasr. 2016. “Modeling Individual Differences in Game Behavior Using HMM.” The Thirteenth AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment AIIDE-17.
- Champa, H. N., K. R. Anandakumar, H. N. Champa, and K. R. Anandakumar. 2010. “Artificial Neural Network for Human Behavior Prediction Through Handwriting Analysis.” International Journal of Computer Applications 2 (2): 36–41. doi:https://doi.org/10.5120/629-878.
- Chang, M. K., W. Cheung, and M. Tang. 2013. “Building Trust Online: Interactions Among Trust Building Mechanisms.” Information & Management 50 (7): 439–445. doi:https://doi.org/10.1016/j.im.2013.06.003.
- Chung, P. C., and C. D. Liu. 2008. “A Daily Behavior Enabled Hidden Markov Model for Human Behavior Understanding.” Pattern Recognition 41 (5): 1572–1580. doi:https://doi.org/10.1016/j.patcog.2007.10.022.
- Costa, C. J., E. Ferreira, F. Bento, and M. Aparicio. 2016. “Enterprise Resource Planning Adoption and Satisfaction Determinants.” Computers in Human Behavior 63: 659–671. doi:https://doi.org/10.1016/j.chb.2016.05.090.
- Denning, D. E. 1987. “An Intrusion-Detection Model.” IEEE Transactions on Software Engineering SE-13 (2): 222–232. doi:https://doi.org/10.1109/TSE.1987.232894.
- Devarakonda, N., S. Pamidi, V. V. Kumari, and A. Govardhan. 2012. “Intrusion Detection System Using Bayesian Network and Hidden Markov Model.” Procedia Technology 4: 506–514. doi:https://doi.org/10.1016/j.protcy.2012.05.081.
- DHS. 2018. Malicious Cyber Activity Targeting ERP Applications. Accessed August 7, 2019. https://www.us-cert.gov/ncas/current-activity/2018/07/25/Malicious-Cyber-Activity-Targeting-ERP-Applications.
- Doulamis, Nikolaos, and Theodora Varvarigou. 2010. “Enhanced Human Behavior Recognition Using HMM and Evaluative Rectification.” In Acm International Workshop on Analysis & Retrieval of Tracked Events & Motion in Imagery Streams. ACM.
- Gong, A., C. Chen, and M. T. Peng. 2019. “Human Interaction Recognition Based on Deep Learning and HMM.” IEEE Access 7: 161123–161130. doi:https://doi.org/10.1109/ACCESS.2019.2951937.
- Gorman, G. E., and P. Clayton. 2005. Qualitative Research for the Information Professional. 2nd ed. London: Neal-Schuman Publishers.
- Hocking, C. G., S. M. Furnell, N. L. Clarke, and P. L. Reynolds. 2013. “Co-operative User Identity Verification Using an Authentication Aura.” Computers & Security 39: 486–502. doi:https://doi.org/10.1016/j.cose.2013.09.011.
- Holsapple, C. W., A. Lee, and J. Otto. 1998. “Refining the Behavior of Multiple Expert Systems: A Concept and Empirical Results.” International Journal of Intelligent Systems in Accounting, Finance & Management 7 (2): 81–90. doi:https://doi.org/10.1002/(SICI)1099-1174(199806)7:2<81::AID-ISAF142>3.0.CO;2-7.
- Hosseini, S. B., A. Shojaee, and N. Agheli. 2015. “A New Method for Evaluating Cloud Computing User Behavior Trust.” 7th Conference on Information & Knowledge Technology. IEEE.
- Huang, Y. W., and M. Q. Chen. 2015. “Artificial Neural Network Modeling of Thin Layer Drying Behavior of Municipal Sewage Sludge.” Measurement 73: 640–648. doi:https://doi.org/10.1016/j.measurement.2015.06.014.
- Itano, F., R. Pires, M. A. D. A. de Sousa, and E. Del-Moral-Hernandez. 2019. “Human Actions Recognition in Video Scenes from Multiple Camera Viewpoints.” Cognitive Systems Research 56: 223–232. doi:https://doi.org/10.1016/j.cogsys.2019.03.010.
- Jain, A. K., and R. C. Dubes. 1988. Algorithms for Clustering Data. Prentice Hall Professional Technical Reference. Upper Saddle River, NJ, USA.
- Jøsang, A. 2014. “Identity Management and Trusted Interaction in Internet and Mobile Computing.” IET Information Security 8 (2): 67–79. doi:https://doi.org/10.1049/iet-ifs.2012.0133.
- Kallath, D. 2005. “Trust in Trusted Computing – The End of Security as We Know It.” Computer Fraud Security 2005: 4–7. doi:https://doi.org/10.1016/S1361-3723(05)70283-9.
- Kent, A. D., L. M. Liebrock, and J. C. Neil. 2015. “Authentication Graphs: Analyzing User Behavior Within an Enterprise Network.” Computers & Security 48: 150–166. doi:https://doi.org/10.1016/j.cose.2014.09.001.
- Kroemer, K. H. E., H. B. Kroemer, and Katrin E. Kroemer-Elbert. 2018. Ergonomics: How to Design for Ease and Efficiency. 3rd ed. London: Academic Press.
- Lin, C., L. Q. Tian, and Y. Z. Wang. 2008. “Research on User Behavior Trust in Trustworthy Network.” Journal of Computer Research and Development 45 (12): 2033–2043.
- Liu, W.-H. 2018. “Hidden Markov Model Analysis of Extreme Behaviors of Foreign Exchange Rates.” Physica A: Statistical Mechanics and its Applications 503: 1007–1019. doi:https://doi.org/10.1016/j.physa.2018.07.060.
- Lu, Y., W. Li, J. Z. Luo, J. Jiang, and Y. Xia. 2014. “A Network User’s Abnormal Behavior Detection Approach Based on Selective Collaborative Learning.” Chinese Journal of Computers 37 (1): 28–40.
- Mabrouk, A. B., and E. Zagrouba. 2018. “Abnormal Behavior Recognition for Intelligent Video Surveillance Systems: A Review.” Expert Systems with Applications 91: 480–491. doi:https://doi.org/10.1016/j.eswa.2017.09.029.
- Mat-Hassan, M., and M. Levene. 2014. “Associating Search and Navigation Behavior Through Log Analysis.” Journal of the American Society for Information Science and Technology 56 (9): 913–934. doi:https://doi.org/10.1002/asi.20185.
- Mohammadfam, I., F. Ghasemi, O. Kalatpour, and A. Moghimbeigi. 2017. “Constructing a Bayesian Network Model for Improving Safety Behavior of Employees at Workplaces.” Applied Ergonomics 58: 35–47. doi:https://doi.org/10.1016/j.apergo.2016.05.006.
- Murray, M. C. 2010. “Database Security: What Students Need to Know.” Journal of Information Technology 9: 17.
- Nikookar, G., S. Y. Safavi, A. Hakim, and A. Homayoun. 2010. “Competitive Advantage of Enterprise Resource Planning Vendors in Iran.” Information Systems 35 (3): 271–277. doi:https://doi.org/10.1016/j.is.2009.09.002.
- Norris, S. P. 1984. “Defining Observational Competence.” Science Education 68 (2): 129–142. doi:https://doi.org/10.1002/sce.3730680206.
- Ren, H., Z. Ye, and Z. Li. 2017. “Anomaly Detection Based on a Dynamic Markov Model.” Information Sciences 411: 52–65. doi:https://doi.org/10.1016/j.ins.2017.05.021.
- Saad, S., Traoré, I., A. Ghorbani, B. Sayed, and P. Hakimian. 2011. “Detecting P2P Botnets Through Network Behavior Analysis and Machine Learning.” Ninth International Conference on Privacy, 174–180. IEEE.
- Sadagopan, S. 2003. “Enterprise Resource Planning.” Encyclopedia of Information Systems 26 (2): 169–184. doi:https://doi.org/10.1016/B0-12-227240-4/00060-5.
- Selvakumar, B., and K. Muneeswaran. 2019. “Firefly Algorithm Based Feature Selection for Network Intrusion Detection.” Computers & Security 81: 148–155. doi:https://doi.org/10.1016/j.cose.2018.11.005.
- Shen, C., Z. M. Cai, X. M. Liu, X. H. Guan, and Roy A. Maxion. 2016. “Mouseidentity: Modeling Mouse-Interaction Behavior for a User Verification System.” IEEE Transactions on Human-Machine Systems 46 (5): 734–748. doi:https://doi.org/10.1109/THMS.2016.2558623.
- Sindiren, E., and B. Ciylan. 2019. “Application Model for Privileged Account Access Control System in Enterprise Networks.” Computers & Security 83: 52–67. doi:https://doi.org/10.1016/j.cose.2019.01.008.
- Song, Xuan, Quanshi Zhang, Yoshihide Sekimoto, Teerayut Horanont, Satoshi Ueyama, and Ryosuke Shibasaki. 2013. “Intelligent System for Human Behavior Analysis and Reasoning Following Large-Scale Disasters.” IEEE Intelligent Systems 28 (4): 35–42. doi:https://doi.org/10.1109/MIS.2013.35.
- Tan, W. H., K. B. Ooi, L. Y. Leong, and B. Lin. 2014. “Predicting the Drivers of Behavioral Intention to Use Mobile Learning: A Hybrid Sem-Neural Networks Approach.” Computers in Human Behavior 36: 198–213. doi:https://doi.org/10.1016/j.chb.2014.03.052.
- Tzafilkou, K., and N. Protogeros. 2018. “Mouse Behavioral Patterns and Keystroke Dynamics in End-User Development: What Can They Tell us About Users’ Behavioral Attributes?” Computers in Human Behavior 83: 288–305. doi:https://doi.org/10.1016/j.chb.2018.02.012.
- Xiao, B., P. Georgiou, B. Baucom, and S. S. Narayanan. 2015. “Head Motion Modeling for Human Behavior Analysis in Dyadic Interaction.” IEEE Transactions on Multimedia 17 (7): 1107–1119. doi:https://doi.org/10.1109/TMM.2015.2432671.
- Yan, Q., L. Wu, and L. Zheng. 2013. “Social Network Based Microblog User Behavior Analysis.” Physica A: Statistical Mechanics and its Applications 392 (7): 1712–1723. doi:https://doi.org/10.1016/j.physa.2012.12.008.
- Yang, S. B., K. Lee, H. Lee, and C. Koo. 2018. “In Airbnb We Trust: Understanding Consumers’ Trust-Attachment Building Mechanisms in the Sharing Economy.” International Journal of Hospitality Management 83: 198–209. doi:https://doi.org/10.1016/j.ijhm.2018.10.016.
- Yang, L., Y. L. Wang, Y. Zhou, J. Wang, C. J. Fan, and C. Zhu. 2019. “OA User Behavior Analysis with the Heterogeneous Information Network Model.” Physica A: Statistical Mechanics and its Applications 516: 552–562. doi:https://doi.org/10.1016/j.physa.2018.09.116.
- Ying, B., and A. Nayak. 2019. “Lightweight Remote User Authentication Protocol for Multi-Server 5G Networks Using Self-Certified Public key Cryptography.” Journal of Network and Computer Applications 131: 66–74. doi:https://doi.org/10.1016/j.jnca.2019.01.017.
- Zhang, L., S. P. Yi, and R. Zhao. 2011. “Research on Agent-based Human-Information System Trusted Interaction in Distributed Cooperative Work Environment.” The Open Automation and Control Systems Journal 3 (1): 1–7. doi:https://doi.org/10.2174/1874444301103010001.
- Zhang, S. M., Y. S. Zhi, R. He, and J. P. Li. 2020. “Research on Traffic Vehicle Behavior Prediction Method Based on Game Theory and HMM.” IEEE Access 8: 30210–30222. doi:https://doi.org/10.1109/ACCESS.2020.2971705.
- Zhang, T., and Q. Zhu. 2018. “Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for Vanets.” IEEE Transactions on Signal & Information Processing Over Networks 4 (1): 148–161. doi:https://doi.org/10.1109/TSIPN.2018.2801622.
- Zhu, G., Q. Huang, C. Xu, L. Xing, W. Gao, and H. Yao. 2007. “Human Behavior Analysis for Highlight Ranking in Broadcast Racket Sports Video.” IEEE Transactions on Multimedia 9 (6): 1167–1182. doi:https://doi.org/10.1109/TMM.2007.902847.