100+ datasets found
  1. Desserts and toppings usage (not cakes and gateaux) in France 2023, by user...

    • statista.com
    Updated Oct 26, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Desserts and toppings usage (not cakes and gateaux) in France 2023, by user type [Dataset]. https://www.statista.com/statistics/435837/desserts-and-toppings-usage-by-user-type-in-france/
    Explore at:
    Dataset updated
    Oct 26, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    France
    Description

    This statistic presents the consumption frequency of desserts and toppings (not cakes and gateaux) in France from 2023. In 2023, an estimated 19 million people in France were heavy users of desserts and toppings.

  2. Most undesirable user permission types on mobile apps in China 2020

    • statista.com
    Updated Apr 21, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2023). Most undesirable user permission types on mobile apps in China 2020 [Dataset]. https://www.statista.com/statistics/1111571/china-most-common-user-permissions-with-privacy-violation-doubts-among-mobile-users-by-type/
    Explore at:
    Dataset updated
    Apr 21, 2023
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    China
    Description

    As of the early of 2020, around 65.3 percent of the surveyed respondents in China perceived mobile apps that ask to access to phone call records as a privacy violation. Other risky mobile app user permissions included accesses to contacts and messages.

  3. Z

    Data from: Login Data Set for Risk-Based Authentication

    • data.niaid.nih.gov
    • zenodo.org
    Updated Jun 30, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Thunem, Sigurd (2022). Login Data Set for Risk-Based Authentication [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_6782155
    Explore at:
    Dataset updated
    Jun 30, 2022
    Dataset provided by
    Wiefling, Stephan
    Jørgensen, Paul René
    Lo Iacono, Luigi
    Thunem, Sigurd
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Login Data Set for Risk-Based Authentication

    Synthesized login feature data of >33M login attempts and >3.3M users on a large-scale online service in Norway. Original data collected between February 2020 and February 2021.

    This data sets aims to foster research and development for Risk-Based Authentication (RBA) systems. The data was synthesized from the real-world login behavior of more than 3.3M users at a large-scale single sign-on (SSO) online service in Norway.

    The users used this SSO to access sensitive data provided by the online service, e.g., a cloud storage and billing information. We used this data set to study how the Freeman et al. (2016) RBA model behaves on a large-scale online service in the real world (see Publication). The synthesized data set can reproduce these results made on the original data set (see Study Reproduction). Beyond that, you can use this data set to evaluate and improve RBA algorithms under real-world conditions.

    WARNING: The feature values are plausible, but still totally artificial. Therefore, you should NOT use this data set in productive systems, e.g., intrusion detection systems.

    Overview

    The data set contains the following features related to each login attempt on the SSO:

        Feature
        Data Type
        Description
        Range or Example
    
    
    
    
        IP Address
        String
        IP address belonging to the login attempt
        0.0.0.0 - 255.255.255.255
    
    
        Country
        String
        Country derived from the IP address
        US
    
    
        Region
        String
        Region derived from the IP address
        New York
    
    
        City
        String
        City derived from the IP address
        Rochester
    
    
        ASN
        Integer
        Autonomous system number derived from the IP address
        0 - 600000
    
    
        User Agent String
        String
        User agent string submitted by the client
        Mozilla/5.0 (Windows NT 10.0; Win64; ...
    
    
        OS Name and Version
        String
        Operating system name and version derived from the user agent string
        Windows 10
    
    
        Browser Name and Version
        String
        Browser name and version derived from the user agent string
        Chrome 70.0.3538
    
    
        Device Type
        String
        Device type derived from the user agent string
        (mobile, desktop, tablet, bot, unknown)1
    
    
        User ID
        Integer
        Idenfication number related to the affected user account
        [Random pseudonym]
    
    
        Login Timestamp
        Integer
        Timestamp related to the login attempt
        [64 Bit timestamp]
    
    
        Round-Trip Time (RTT) [ms]
        Integer
        Server-side measured latency between client and server
        1 - 8600000
    
    
        Login Successful
        Boolean
        True: Login was successful, False: Login failed
        (true, false)
    
    
        Is Attack IP
        Boolean
        IP address was found in known attacker data set
        (true, false)
    
    
        Is Account Takeover
        Boolean
        Login attempt was identified as account takeover by incident response team of the online service
        (true, false)
    

    Data Creation

    As the data set targets RBA systems, especially the Freeman et al. (2016) model, the statistical feature probabilities between all users, globally and locally, are identical for the categorical data. All the other data was randomly generated while maintaining logical relations and timely order between the features.

    The timestamps, however, are not identical and contain randomness. The feature values related to IP address and user agent string were randomly generated by publicly available data, so they were very likely not present in the real data set. The RTTs resemble real values but were randomly assigned among users per geolocation. Therefore, the RTT entries were probably in other positions in the original data set.

    The country was randomly assigned per unique feature value. Based on that, we randomly assigned an ASN related to the country, and generated the IP addresses for this ASN. The cities and regions were derived from the generated IP addresses for privacy reasons and do not reflect the real logical relations from the original data set.

    The device types are identical to the real data set. Based on that, we randomly assigned the OS, and based on the OS the browser information. From this information, we randomly generated the user agent string. Therefore, all the logical relations regarding the user agent are identical as in the real data set.

    The RTT was randomly drawn from the login success status and synthesized geolocation data. We did this to ensure that the RTTs are realistic ones.

    Regarding the Data Values

    Due to unresolvable conflicts during the data creation, we had to assign some unrealistic IP addresses and ASNs that are not present in the real world. Nevertheless, these do not have any effects on the risk scores generated by the Freeman et al. (2016) model.

    You can recognize them by the following values:

    ASNs with values >= 500.000

    IP addresses in the range 10.0.0.0 - 10.255.255.255 (10.0.0.0/8 CIDR range)

    Study Reproduction

    Based on our evaluation, this data set can reproduce our study results regarding the RBA behavior of an RBA model using the IP address (IP address, country, and ASN) and user agent string (Full string, OS name and version, browser name and version, device type) as features.

    The calculated RTT significances for countries and regions inside Norway are not identical using this data set, but have similar tendencies. The same is true for the Median RTTs per country. This is due to the fact that the available number of entries per country, region, and city changed with the data creation procedure. However, the RTTs still reflect the real-world distributions of different geolocations by city.

    See RESULTS.md for more details.

    Ethics

    By using the SSO service, the users agreed in the data collection and evaluation for research purposes. For study reproduction and fostering RBA research, we agreed with the data owner to create a synthesized data set that does not allow re-identification of customers.

    The synthesized data set does not contain any sensitive data values, as the IP addresses, browser identifiers, login timestamps, and RTTs were randomly generated and assigned.

    Publication

    You can find more details on our conducted study in the following journal article:

    Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service (2022) Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, and Luigi Lo Iacono. ACM Transactions on Privacy and Security

    Bibtex

    @article{Wiefling_Pump_2022, author = {Wiefling, Stephan and Jørgensen, Paul René and Thunem, Sigurd and Lo Iacono, Luigi}, title = {Pump {Up} {Password} {Security}! {Evaluating} and {Enhancing} {Risk}-{Based} {Authentication} on a {Real}-{World} {Large}-{Scale} {Online} {Service}}, journal = {{ACM} {Transactions} on {Privacy} and {Security}}, doi = {10.1145/3546069}, publisher = {ACM}, year = {2022} }

    License

    This data set and the contents of this repository are licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. See the LICENSE file for details. If the data set is used within a publication, the following journal article has to be cited as the source of the data set:

    Stephan Wiefling, Paul René Jørgensen, Sigurd Thunem, and Luigi Lo Iacono: Pump Up Password Security! Evaluating and Enhancing Risk-Based Authentication on a Real-World Large-Scale Online Service. In: ACM Transactions on Privacy and Security (2022). doi: 10.1145/3546069

    Few (invalid) user agents strings from the original data set could not be parsed, so their device type is empty. Perhaps this parse error is useful information for your studies, so we kept these 1526 entries.↩︎

  4. Z

    Cloud-based User Entity Behavior Analytics Log Data Set

    • data.niaid.nih.gov
    • zenodo.org
    Updated Oct 30, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Landauer, Max (2023). Cloud-based User Entity Behavior Analytics Log Data Set [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_7119952
    Explore at:
    Dataset updated
    Oct 30, 2023
    Dataset provided by
    Skopik, Florian
    Höld, Georg
    Landauer, Max
    Wurzenberger, Markus
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This respository contains the CLUE-LDS (CLoud-based User Entity behavior analytics Log Data Set). The data set contains log events from real users utilizing a cloud storage suitable for User Entity Behavior Analytics (UEBA). Events include logins, file accesses, link shares, config changes, etc. The data set contains around 50 million events generated by more than 5000 distinct users in more than five years (2017-07-07 to 2022-09-29 or 1910 days). The data set is complete except for 109 events missing on 2021-04-22, 2021-08-20, and 2021-09-05 due to database failure. The unpacked file size is around 14.5 GB. A detailed analysis of the data set is provided in [1]. The logs are provided in JSON format with the following attributes in the first level:

    id: Unique log line identifier that starts at 1 and increases incrementally, e.g., 1. time: Time stamp of the event in ISO format, e.g., 2021-01-01T00:00:02Z. uid: Unique anonymized identifier for the user generating the event, e.g., old-pink-crane-sharedealer. uidType: Specifier for uid, which is either the user name or IP address for logged out users. type: The action carried out by the user, e.g., file_accessed. params: Additional event parameters (e.g., paths, groups) stored in a nested dictionary. isLocalIP: Optional flag for event origin, which is either internal (true) or external (false). role: Optional user role: consulting, administration, management, sales, technical, or external. location: Optional IP-based geolocation of event origin, including city, country, longitude, latitude, etc. In the following data sample, the first object depicts a successful user login (see type: login_successful) and the second object depicts a file access (see type: file_accessed) from a remote location:

    {"params": {"user": "intact-gray-marlin-trademarkagent"}, "type": "login_successful", "time": "2019-11-14T11:26:43Z", "uid": "intact-gray-marlin-trademarkagent", "id": 21567530, "uidType": "name"}

    {"isLocalIP": false, "params": {"path": "/proud-copper-orangutan-artexer/doubtful-plum-ptarmigan-merchant/insufficient-amaranth-earthworm-qualitycontroller/curious-silver-galliform-tradingstandards/incredible-indigo-octopus-printfinisher/wicked-bronze-sloth-claimsmanager/frantic-aquamarine-horse-cleric"}, "type": "file_accessed", "time": "2019-11-14T11:26:51Z", "uid": "graceful-olive-spoonbill-careersofficer", "id": 21567531, "location": {"countryCode": "AT", "countryName": "Austria", "region": "4", "city": "Gmunden", "latitude": 47.915, "longitude": 13.7959, "timezone": "Europe/Vienna", "postalCode": "4810", "metroCode": null, "regionName": "Upper Austria", "isInEuropeanUnion": true, "continent": "Europe", "accuracyRadius": 50}, "uidType": "ipaddress"} The data set was generated at the premises of Huemer Group, a midsize IT service provider located in Vienna, Austria. Huemer Group offers a range of Infrastructure-as-a-Service solutions for enterprises, including cloud computing and storage. In particular, their cloud storage solution called hBOX enables customers to upload their data, synchronize them with multiple devices, share files with others, create versions and backups of their documents, collaborate with team members in shared data spaces, and query the stored documents using search terms. The hBOX extends the open-source project Nextcloud with interfaces and functionalities tailored to the requirements of customers. The data set comprises only normal user behavior, but can be used to evaluate anomaly detection approaches by simulating account hijacking. We provide an implementation for identifying similar users, switching pairs of users to simulate changes of behavior patterns, and a sample detection approach in our github repo. Acknowledgements: Partially funded by the FFG project DECEPT (873980). The authors thank Walter Huemer, Oskar Kruschitz, Kevin Truckenthanner, and Christian Aigner from Huemer Group for supporting the collection of the data set. If you use the dataset, please cite the following publication: [1] M. Landauer, F. Skopik, G. Höld, and M. Wurzenberger. "A User and Entity Behavior Analytics Log Data Set for Anomaly Detection in Cloud Computing". 2022 IEEE International Conference on Big Data - 6th International Workshop on Big Data Analytics for Cyber Intelligence and Defense (BDA4CID 2022), December 17-20, 2022, Osaka, Japan. IEEE. [PDF]

  5. Hot drink usage (except coffee or tea) in France 2023, by user type

    • statista.com
    Updated Oct 9, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Hot drink usage (except coffee or tea) in France 2023, by user type [Dataset]. https://www.statista.com/statistics/439633/hot-drink-usage-by-user-type-in-france/
    Explore at:
    Dataset updated
    Oct 9, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    France
    Description

    This statistic shows the frequency of hot drink usage (except coffee or tea) in France in 2023. In 2023, an estimated 4.9 million people in France were heavy users of hot drinks.

  6. Complementary services current results per user by type of service and type...

    • ine.es
    csv, html, json +4
    Updated Nov 24, 2022
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    INE - Instituto Nacional de Estadística (2022). Complementary services current results per user by type of service and type of institute [Dataset]. https://www.ine.es/jaxi/Tabla.htm?tpx=54991&L=1
    Explore at:
    xlsx, csv, txt, xls, text/pc-axis, json, htmlAvailable download formats
    Dataset updated
    Nov 24, 2022
    Dataset provided by
    National Statistics Institutehttp://www.ine.es/
    Authors
    INE - Instituto Nacional de Estadística
    License

    https://www.ine.es/aviso_legalhttps://www.ine.es/aviso_legal

    Variables measured
    Type of centre, Results by user and complementary service
    Description

    Complementary services current results per user by type of service and type of institute. National.

  7. Rum usage in France 2023, by user type

    • statista.com
    Updated Oct 25, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Rum usage in France 2023, by user type [Dataset]. https://www.statista.com/statistics/440121/rum-usage-by-user-type-in-france/
    Explore at:
    Dataset updated
    Oct 25, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    France
    Description

    This statistic shows the frequency of rum consumption in France in 2023, by user type. In 2023, an estimated 2.8 million people in France were heavy rum users.

  8. w

    Global Advanced Authentication Market Research Report: By Authentication...

    • wiseguyreports.com
    Updated Dec 3, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    wWiseguy Research Consultants Pvt Ltd (2024). Global Advanced Authentication Market Research Report: By Authentication Type (Password-Based Authentication, Two-Factor Authentication, Biometric Authentication, Token-Based Authentication), By Deployment Type (On-Premises, Cloud-Based, Hybrid), By End User (BFSI, Healthcare, Government, Retail, Telecommunications), By User Type (Individual Users, Enterprise Users) and By Regional (North America, Europe, South America, Asia Pacific, Middle East and Africa) - Forecast to 2032. [Dataset]. https://www.wiseguyreports.com/reports/advanced-authentication-market
    Explore at:
    Dataset updated
    Dec 3, 2024
    Dataset authored and provided by
    wWiseguy Research Consultants Pvt Ltd
    License

    https://www.wiseguyreports.com/pages/privacy-policyhttps://www.wiseguyreports.com/pages/privacy-policy

    Area covered
    Global
    Description
    BASE YEAR2024
    HISTORICAL DATA2019 - 2024
    REPORT COVERAGERevenue Forecast, Competitive Landscape, Growth Factors, and Trends
    MARKET SIZE 20235.48(USD Billion)
    MARKET SIZE 20246.13(USD Billion)
    MARKET SIZE 203215.0(USD Billion)
    SEGMENTS COVEREDAuthentication Type, Deployment Type, End User, User Type, Regional
    COUNTRIES COVEREDNorth America, Europe, APAC, South America, MEA
    KEY MARKET DYNAMICSGrowing cybersecurity threats, Regulatory compliance requirements, Increased mobile transactions, Rising demand for customer authentication, Adoption of biometric technologies
    MARKET FORECAST UNITSUSD Billion
    KEY COMPANIES PROFILEDCyberArk, Entrust, Fortinet, Microsoft, IBM, F5 Networks, Ping Identity, Oracle, Duo Security, NetIQ, RSA Security, Auth0, SailPoint, Symantec, Okta
    MARKET FORECAST PERIOD2025 - 2032
    KEY MARKET OPPORTUNITIESIncreasing cybersecurity threats, Rising demand for biometric solutions, Growth in digital payment services, Expanding IoT security needs, Regulatory compliance requirements.
    COMPOUND ANNUAL GROWTH RATE (CAGR) 11.85% (2025 - 2032)
  9. User Experience (UX) Research Software Market Report | Global Forecast From...

    • dataintelo.com
    csv, pdf, pptx
    Updated Sep 18, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2023). User Experience (UX) Research Software Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/user-experience-ux-research-software-market
    Explore at:
    pdf, pptx, csvAvailable download formats
    Dataset updated
    Sep 18, 2023
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    DataIntelo recently published a report, titled Global User Experience (UX) Research Software Market Insights, Forecast to 2025. The research includes collation of data that is gathered using primary and secondary research methodologies. The research is conducted by professionals who have remarkable expertise in the field. The report elaborates on all the aspect of the market for a comprehensive understanding of the market dynamics. The market is divided into various segments and all the segments follow a similar format for a detailed explanation of the market.
    In report covers both sales and revenue and studies the segments pertaining to application, products, services, and regions. To assess the market’s future the research report also discusses the competitive landscape present in the global User Experience (UX) Research Software market.
    In 2018 the global User Experience (UX) Research Software market size was 130 million US$ and will reach 417.1 million US$ by 2025, with a CAGR of 18.2% during the forecast period.
    Global User Experience (UX) Research Software Market: Scope of the Market
    User Experience (UX) research is the process of discovering the behaviors, motivations and needs of your customers through observation, task analysis, and other types of user feedback.
    The report first uses historic data from different companies. The data collected is used to analyses the growth of industries in the past years. It includes data from the year 2014 to the year 2019. The forecast data provides the reader with an understating of the future of the market. The same data is used to predict the expectation of the companies and how they are expected to evolve in the coming years. The research provides historical as well as estimated data from the year 2019 to 2025. The details in the report give a brief overview of the market by examining its historical data, the current data, and forecast data to understand the growth of the market.
    Global User Experience (UX) Research Software Market: Segment Analysis
    The report also outlines the sales and revenue generated by the global User Experience (UX) Research Software market. It is broken down in many segments, such as regional, country level, by type, application, and others. This enables a granular view of the market, focusing on the government policies that could change the dynamics. It also assesses the research and development plans of the companies for better product innovation.
    The report is based on research done specifically on consumer goods. The goods have bifurcated depending on their use and type. The type segment contains all the necessary information about the different forms and their scope in the global User Experience (UX) Research Software market. The application segment defines the uses of the product. It points out the various changes that these products have been through over the years and the innovation that players are bringing in. The focus of the report on the consumer goods aspect helps in explaining changing consumer behavior that will impact the global User Experience (UX) Research Software market.
    The main consumer market is located in developed countries. North America is the largest consumption region, with the total market share of 44.69% in 2018, and USA accounts most of the North America market, with the market share of 88.08%, and account the total market share of 39.36% in 2018. Followed by Europe, accounting for 32.70%. In the coming years there is an increasing demand for User Experience (UX) Research Software in the regions of APAC and Europe.
    Global User Experience (UX) Research Software Market: Regional Segment Analysis
    Based on region, the global User Experience (UX) Research Software market is segmented into North America and Europe.. Asia Pacific has a large population, which makes its market potential a significant one. It is the fastest-growing and most lucrative region in the global economy. This chapter specifically explains the impact of population on the global User Experience (UX) Research Software market. Research views it through a regional lens, giving the readers a microscopic understanding of the changes to prepare for.
    The report covers different aspects of the market from a consumer goods point of view. It aims to be a guiding hand to interested readers for making profitable business decisions.
    The following players are covered in this report:
    UserTesting
    Qualtrics
    Hotjar
    Lookback
    UserZoom
    Validately
    Userlytics
    UsabilityHub
    TryMyUI
    Woopra
    Usabilla
    TechSmith
    20 | 20
    User Interviews
    User Experience (UX) Research Software Breakdown Data by Type
    Cloud Based
    On-Premises
    User Experience (UX) Rese

  10. c

    Land Use Scene Classification Dataset

    • cubig.ai
    Updated Oct 12, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    CUBIG (2024). Land Use Scene Classification Dataset [Dataset]. https://cubig.ai/store/products/519/land-use-scene-classification-dataset
    Explore at:
    Dataset updated
    Oct 12, 2024
    Dataset authored and provided by
    CUBIG
    License

    https://cubig.ai/store/terms-of-servicehttps://cubig.ai/store/terms-of-service

    Measurement technique
    Privacy-preserving data transformation via differential privacy, Synthetic data generation using AI techniques for model training
    Description

    1) Data Introduction • The Land-Use Scene Classification Dataset is an image dataset built to classify land-use types in different regions based on Landsat satellite imagery.

    2) Data Utilization (1) Characteristics of the Land-Use Scene Classification Dataset: • The images are collected from a diverse range of geographic environments, including urban, rural, coastal, and forested areas, making the dataset suitable for evaluating domain generalization performance. • It is based on low-resolution Landsat satellite images, yet designed to effectively distinguish various terrain and structural patterns even with limited spatial resolution.

    (2) Applications of the Land-Use Scene Classification Dataset: • Development of land-use classification models: The dataset can be used to train deep learning models that automatically classify land-use types such as residential areas, roads, and farmlands from satellite imagery. • GIS-based land-use change analysis: It can support geographic information system (GIS) research to analyze land-use pattern changes over time and infer spatial utilization trends.

  11. f

    Auto clustering information of rented car usage.

    • plos.figshare.com
    xls
    Updated Jun 6, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Mengwei Chen; Yilin Sun; E. Owen D. Waygood; Jincheng Yu; Kai Zhu (2023). Auto clustering information of rented car usage. [Dataset]. http://doi.org/10.1371/journal.pone.0263476.t003
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jun 6, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Mengwei Chen; Yilin Sun; E. Owen D. Waygood; Jincheng Yu; Kai Zhu
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Auto clustering information of rented car usage.

  12. w

    Global Authorization Software Market Research Report: By Application...

    • wiseguyreports.com
    Updated Dec 3, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    wWiseguy Research Consultants Pvt Ltd (2024). Global Authorization Software Market Research Report: By Application (Identity Management, Access Control, API Security, Data Protection), By Deployment Type (Cloud-Based, On-Premise, Hybrid), By End User (Healthcare, Banking, Retail, IT and Telecom), By Functionality (Single Sign-On, Multi-Factor Authentication, User Provisioning) and By Regional (North America, Europe, South America, Asia Pacific, Middle East and Africa) - Forecast to 2032. [Dataset]. https://www.wiseguyreports.com/reports/authorization-software-market
    Explore at:
    Dataset updated
    Dec 3, 2024
    Dataset authored and provided by
    wWiseguy Research Consultants Pvt Ltd
    License

    https://www.wiseguyreports.com/pages/privacy-policyhttps://www.wiseguyreports.com/pages/privacy-policy

    Area covered
    Global
    Description
    BASE YEAR2024
    HISTORICAL DATA2019 - 2024
    REPORT COVERAGERevenue Forecast, Competitive Landscape, Growth Factors, and Trends
    MARKET SIZE 20235.61(USD Billion)
    MARKET SIZE 20246.1(USD Billion)
    MARKET SIZE 203212.0(USD Billion)
    SEGMENTS COVEREDApplication, Deployment Type, End User, Functionality, Regional
    COUNTRIES COVEREDNorth America, Europe, APAC, South America, MEA
    KEY MARKET DYNAMICSIncreased cybersecurity threats, Rising demand for automation, Regulatory compliance requirements, Growing adoption of cloud solutions, Advanced authentication technologies
    MARKET FORECAST UNITSUSD Billion
    KEY COMPANIES PROFILEDCyberArk, Salesforce, Microsoft, IBM, Ping Identity, Oracle, Identiv, Duo Security, OneLogin, RSA Security, Auth0, SailPoint, SAP, Okta, ForgeRock
    MARKET FORECAST PERIOD2025 - 2032
    KEY MARKET OPPORTUNITIESCloud-based solutions growth, Increasing demand for automation, Rising cybersecurity threats, Regulatory compliance requirements, Integration with AI technologies
    COMPOUND ANNUAL GROWTH RATE (CAGR) 8.82% (2025 - 2032)
  13. d

    Percentage of Electronic Cigarettes Users By Gender, and Type of User

    • data.qa
    • data.gov.qa
    csv, excel, json
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Percentage of Electronic Cigarettes Users By Gender, and Type of User [Dataset]. https://www.data.qa/explore/dataset/percentage-of-electronic-cigarettes-users-by-gender-and-type-of-user/export/?flg=en-gb
    Explore at:
    csv, json, excelAvailable download formats
    Dataset updated
    May 26, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This dataset contains statistical data on the percentage of electronic cigarette users, categorized by gender and type of user, for the year 2013. The data includes information on the percentage of male and female users, as well as the overall percentage of users.

  14. w

    Global Consumer Identity and Access Management Market Research Report: By...

    • wiseguyreports.com
    Updated Dec 3, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    wWiseguy Research Consultants Pvt Ltd (2024). Global Consumer Identity and Access Management Market Research Report: By Deployment Type (Cloud-Based, On-Premises, Hybrid), By Component (Software, Hardware, Services), By Application (Customer Authentication, Access Management, User Provisioning, Identity Verification), By End User (BFSI, Healthcare, Retail, Telecommunications, Government) and By Regional (North America, Europe, South America, Asia Pacific, Middle East and Africa) - Forecast to 2032. [Dataset]. https://www.wiseguyreports.com/reports/consumer-identity-and-access-management-market
    Explore at:
    Dataset updated
    Dec 3, 2024
    Dataset authored and provided by
    wWiseguy Research Consultants Pvt Ltd
    License

    https://www.wiseguyreports.com/pages/privacy-policyhttps://www.wiseguyreports.com/pages/privacy-policy

    Area covered
    Global
    Description
    BASE YEAR2024
    HISTORICAL DATA2019 - 2024
    REPORT COVERAGERevenue Forecast, Competitive Landscape, Growth Factors, and Trends
    MARKET SIZE 202313.04(USD Billion)
    MARKET SIZE 202414.26(USD Billion)
    MARKET SIZE 203229.03(USD Billion)
    SEGMENTS COVEREDDeployment Type, Component, Application, End User, Regional
    COUNTRIES COVEREDNorth America, Europe, APAC, South America, MEA
    KEY MARKET DYNAMICSRising cyber threats, Increasing regulatory compliance, Growing digital transformations, Demand for seamless user experiences, Adoption of multi-factor authentication
    MARKET FORECAST UNITSUSD Billion
    KEY COMPANIES PROFILEDCyberArk, IdentityNow, Microsoft, IBM, SailPoint Technologies, Ping Identity, Gemalto, OneLogin, Oracle, Duo Security, RSA Security, Auth0, SAP, Okta, ForgeRock
    MARKET FORECAST PERIOD2025 - 2032
    KEY MARKET OPPORTUNITIESGrowing demand for seamless authentication, Increasing regulatory compliance requirements, Rise in mobile identity solutions, Expansion of IoT devices integration, Adoption of AI-driven identity management
    COMPOUND ANNUAL GROWTH RATE (CAGR) 9.3% (2025 - 2032)
  15. v

    User and Entity Behavior Analytics Market By Type (Solutions, Services),...

    • verifiedmarketresearch.com
    Updated Aug 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    VERIFIED MARKET RESEARCH (2024). User and Entity Behavior Analytics Market By Type (Solutions, Services), Deployment Type (On-Premises, Cloud-Based), & Region for 2024-2031 [Dataset]. https://www.verifiedmarketresearch.com/product/user-and-entity-behavior-analytics-market/
    Explore at:
    Dataset updated
    Aug 23, 2024
    Dataset authored and provided by
    VERIFIED MARKET RESEARCH
    License

    https://www.verifiedmarketresearch.com/privacy-policy/https://www.verifiedmarketresearch.com/privacy-policy/

    Time period covered
    2024 - 2031
    Area covered
    Global
    Description

    User And Entity Behavior Analytics Market size was valued at USD 1035.54 Million in 2024 and is projected to reach USD 11215.59 Million by 2031, growing at a CAGR of 40.50% from 2024 to 2031.

    Global User And Entity Behavior Analytics Market Drivers

    Growing Cybersecurity Risks: As a result of an increase in data breaches and cyberattacks, enterprises are depending more and more on UEBA solutions to identify and neutralize insider threats as well as advanced persistent threats (APTs).

    Regulatory Compliance: Organizations are using UEBA solutions to ensure compliance with data protection and privacy legislation due to stringent regulatory requirements, including GDPR, HIPAA, and others.

    Growing Adoption of Cloud Services: As more businesses shift their data and apps to the cloud, there's a growing demand for UEBA solutions that can secure and monitor cloud settings.

    Focus on Insider Threats: Due to the fact that insider threats can be harder to identify than external threats, organizations are realizing the importance of monitoring and analyzing user and entity behavior in order to identify and stop insider attacks.

    Developments in AI and Machine Learning: Organizations seeking more sophisticated threat detection capabilities are adopting UEBA solutions because they utilize AI and machine learning algorithms to analyze large volumes of data and identify abnormalities in user and entity behavior.

  16. f

    Various Types of Users Passing Through Each Gate.

    • plos.figshare.com
    xls
    Updated Jun 4, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Hedieh Wojgani; Catherine Kehsa; Elaine Cloutman-Green; Colin Gray; Vanya Gant; Nigel Klein (2023). Various Types of Users Passing Through Each Gate. [Dataset]. http://doi.org/10.1371/journal.pone.0040171.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jun 4, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Hedieh Wojgani; Catherine Kehsa; Elaine Cloutman-Green; Colin Gray; Vanya Gant; Nigel Klein
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    No. denotes the number of individuals moving through a gate. This is then expressed as a percentage broken down by their reason for being on the ward.

  17. F

    Trajectories in a shared space

    • data.uni-hannover.de
    csv
    Updated Jan 20, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Institut für Kartographie und Geoinformatik (2022). Trajectories in a shared space [Dataset]. https://data.uni-hannover.de/dataset/trajectories-in-a-shared-space
    Explore at:
    csv(2200779)Available download formats
    Dataset updated
    Jan 20, 2022
    Dataset authored and provided by
    Institut für Kartographie und Geoinformatik
    License

    Attribution-NonCommercial 3.0 (CC BY-NC 3.0)https://creativecommons.org/licenses/by-nc/3.0/
    License information was derived automatically

    Description

    The data contains trajectories and basic information about road users in a shared space.

    Trajectories are denoted with time step, object id, x-coordinate, y-coordinate, and user type. Each time step last 0.5 seconds. Coordinates are in pixel and can be transferred to real-world scale using the scale provided. There are three types of users: pedestrian, cyclist, and vehicle.

    In addition, the data also provides demographic attributes for road users. Pedestrians walking in groups are annotated.

  18. Scented product usage in France 2014-2020, by user type

    • statista.com
    Updated Mar 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Scented product usage in France 2014-2020, by user type [Dataset]. https://www.statista.com/statistics/439059/scented-product-usage-by-user-type-in-france/
    Explore at:
    Dataset updated
    Mar 19, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    France
    Description

    This statistic shows the frequency of air freshener, scented candle and fabric freshener usage in France from 2014 to 2020. In 2020, an estimated 1.4 million people in France were heavy users of air fresheners, scented candles and fabric fresheners.

  19. G

    Internet use, by location of access, household type and geography

    • open.canada.ca
    • www150.statcan.gc.ca
    • +2more
    csv, html, xml
    Updated Jan 17, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statistics Canada (2023). Internet use, by location of access, household type and geography [Dataset]. https://open.canada.ca/data/en/dataset/9f16faf4-961d-4c45-8267-c0541269dfe6
    Explore at:
    html, csv, xmlAvailable download formats
    Dataset updated
    Jan 17, 2023
    Dataset provided by
    Statistics Canada
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Description

    Canadian Internet use survey, Internet use, by location of access and household type for Canada, urban area or rural area from 2005 to 2009. (Terminated)

  20. A

    ‘Star dataset to predict star types’ analyzed by Analyst-2

    • analyst-2.ai
    Updated Aug 14, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Analyst-2 (analyst-2.ai) / Inspirient GmbH (inspirient.com) (2020). ‘Star dataset to predict star types’ analyzed by Analyst-2 [Dataset]. https://analyst-2.ai/analysis/kaggle-star-dataset-to-predict-star-types-22fb/1b295ecf/?iid=004-260&v=presentation
    Explore at:
    Dataset updated
    Aug 14, 2020
    Dataset authored and provided by
    Analyst-2 (analyst-2.ai) / Inspirient GmbH (inspirient.com)
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Analysis of ‘Star dataset to predict star types’ provided by Analyst-2 (analyst-2.ai), based on source dataset retrieved from https://www.kaggle.com/deepu1109/star-dataset on 28 January 2022.

    --- Dataset description provided by original source is as follows ---

    Dataset Info:

    This is a dataset consisting of several features of stars.

    Some of them are: - Absolute Temperature (in K) - Relative Luminosity (L/Lo) - Relative Radius (R/Ro) - Absolute Magnitude (Mv) - Star Color (white,Red,Blue,Yellow,yellow-orange etc) - Spectral Class (O,B,A,F,G,K,,M) - Star Type **(Red Dwarf, Brown Dwarf, White Dwarf, Main Sequence , SuperGiants, HyperGiants)**

    Lo = 3.828 x 10^26 Watts (Avg Luminosity of Sun) Ro = 6.9551 x 10^8 m (Avg Radius of Sun)

    Purpose:

    The purpose of making the dataset is to prove that the stars follows a certain graph in the celestial Space , specifically called Hertzsprung-Russell Diagram or simply HR-Diagram so that we can classify stars by plotting its features based on that graph.

    https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F3791628%2F14338bbebf77d18e1faef582bccdbdd6%2Fhr.jpg?generation=1597349509841965&alt=media" alt="hr-1"> https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F3791628%2F9fc57334a9b9fafbc71aacdd6e5cd69c%2F310px-Hertzsprung-Russel_StarData.png?generation=1597349661801284&alt=media" alt="hr-2">

    https://www.googleapis.com/download/storage/v1/b/kaggle-user-content/o/inbox%2F3791628%2Ffe9436bf4e2d23b5b18fb3db1f1fcbcb%2FHRDiagram.png?generation=1597348809674507&alt=media" alt="hr-3">

    Data Collection and Preparation techniques:

    The dataset is created based on several equations in astrophysics. They are given below:

    1. Stefan-Boltzmann's law of Black body radiation (To find the luminosity of a star)
    2. Wienn's Displacement law (for finding surface temperature of a star using wavelength)
    3. Absolute magnitude relation
    4. Radius of a star using parallax .

    The dataset took 3 weeks to collect for 240 stars which are mostly collected from web. The missing data were manually calculated using those equations of astrophysics given above.

    Acknowledgements:

    • Wikipedia
    • Stars and Galaxies by SEEDS | Backman

    Repo Link:

    AstroML

    --- Original source retains full ownership of the source dataset ---

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2024). Desserts and toppings usage (not cakes and gateaux) in France 2023, by user type [Dataset]. https://www.statista.com/statistics/435837/desserts-and-toppings-usage-by-user-type-in-france/
Organization logo

Desserts and toppings usage (not cakes and gateaux) in France 2023, by user type

Explore at:
Dataset updated
Oct 26, 2024
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
2023
Area covered
France
Description

This statistic presents the consumption frequency of desserts and toppings (not cakes and gateaux) in France from 2023. In 2023, an estimated 19 million people in France were heavy users of desserts and toppings.

Search
Clear search
Close search
Google apps
Main menu