Spelling suggestions: "subject:"[een] MOBILE COMPUTING"" "subject:"[enn] MOBILE COMPUTING""
351 |
Usabilidade da interface de dispositivos móveis: heurísticas e diretrizes para o design / Usability of mobile device\'s interface: heuristics and guidelines for the designOlibario José Machado Neto 28 May 2013 (has links)
Do ponto de vista do usuário, a interface é uma das partes mais importantes dos sistemas computacionais, porque por meio dela o usuário vê, ouve e sente. Essa relevância motiva pesquisadores da área de Interação Humano-Computador a estudarem maneiras de se criarem interfaces com design focado em usabilidade. A avaliação da usabilidade de interfaces visa verificar se elas atendem aos requisitos do usuário de forma que as funcionalidades do sistema sejam realizadas de modo efetivo, eficiente e que satisfaça as expectativas do usuário. Tendo em vista que o ciclo de desenvolvimento de software costuma ser longo, avaliações da usabilidade de diferentes versões de interfaces devem ser realizadas no decorrer do processo, como forma de minimizar erros e reduzir custos de produção do sistema. Uma das avaliações de usabilidade mais conhecidas é a avaliação heurística, criada por Jacob Nielsen, que se destaca pelo baixo custo e rapidez de aplicação. Nela, especialistas avaliam as interfaces e os diálogos do sistema com base em um conjunto de regras gerais, as heurísticas, que lhes permitem identificar problemas de usabilidade. Apesar de respeitadas e amplamente usadas, as heurísticas de Nielsen foram criadas sem foco em interfaces de dispositivos móveis, muito difundidos atualmente. Por meio deste trabalho, verificou-se que as heurísticas de Nielsen têm limitações para encontrarem problemas de usabilidade em interfaces de dispositivos móveis. Por conta disso, propôs-se um conjunto de heurísticas para avaliação de interfaces de dispositivos móveis e se definiu um conjunto de diretrizes para o desenvolvimento dessas interfaces. A validação das heurísticas propostas indicou que elas foram mais efetivas que as de Nielsen para encontrarem problemas de usabilidade considerados pelos especialistas como catastróficos ou de baixa gravidade / From the users point of view, the interface is one the most important part of computer systems, because everything he sees, hears and feels are contained therein. This relevance motivates researchers of Human-Computer Interaction to study ways to create interfaces with design focused on usability. The usability evaluation of interfaces aims to determine whether the interfaces meet the requirements of the system so that its functionalities are carried out effectively, efficiently and satisfying the users expectations. Considering that the software development lifecycle is often long, usability evaluations of different versions of interfaces should be made during the process, in order to minimize errors and reduce production costs of the final system. Heuristic evaluation, created by Jacob Nielsen, is one of the most used usability evaluation methods, because of it low cost and ease of implementation. In this evaluation method, experts evaluate interfaces and systems dialogues based on a set of general rules, called heuristics, which enable them to identify usability problems. Although respected and widely used, Nielsens heuristics were not created having mobile devices interfaces in mind. Through this work, it was verified that Nielsens heuristics have limitations in finding usability problems in mobile devices interfaces. Because of this, we proposed a set of heuristics for evaluating interfaces for mobile devices and defined a set of guidelines for the development of these interfaces. The validation of the proposed heuristics indicated that they were more effective than Nielsens to find usability problems considered by experts as catastrophic or of low gravity
|
352 |
Agentes no gerenciamento de transações moveis / Agents in management of mobile transactiosViana, Giovanni Bogéa, 1981- 28 April 2006 (has links)
Orientador: Maria Beatriz Felgar de Toledo / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-07T04:30:16Z (GMT). No. of bitstreams: 1
Viana_GiovanniBogea_M.pdf: 694479 bytes, checksum: 8f1fc7bfaffc85403fba40175dcebd16 (MD5)
Previous issue date: 2006 / Resumo: Esta dissertação apresenta um modelo de transações para ambientes de computação móvel que leva em conta o dinamismo e interatividade nesse ambiente. Para lidar com o dinamismo, tanto aplicações como o gerenciador da transação e os objetos participantes de uma transação são executados como agentes e podem se mover a critério da aplicação. As responsabilidades de adaptação ao dinamismo do ambiente são divididas entre aplicações e o sistema de apoio. O sistema monitora o ambiente e envia notificações às aplicações sobre variações no ambiente. As aplicações decidem sobre as políticas para se adaptar às mudanças. Para lidar com a interatividade, as operações de uma transação podem ser submetidas passo-a-passo e o usuário pode adotar as estratégias mais adequadas conforme as necessidades da aplicação e as mudanças no ambiente / Abstract: This dissertation presents a transaction model for mobile computing environments that takes into account their dynamism and interactivity. To deal with dynamism, applications, transaction managers and participating objects are executed as agents which can move as commanded by the application. The responsabilities for adaptation are divided between the applications and the underlying system. The system monitors the environment and sends notifications to applications about variations in the environment. Applications decide about policies to adapt to changes. To deal with interactivity, operations of one transaction may be submitted step-by-step and the user is able to adopt the best strategies considering application requirements and changes in the environment / Mestrado / Mestre em Ciência da Computação
|
353 |
Serviços de transação abertos para ambientes dinamicos / Open transaction services for dynamic environmentsRocha, Tarcisio da 08 December 2008 (has links)
Orientador: Maria Beatriz Felgar de Toledo / Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-13T03:59:50Z (GMT). No. of bitstreams: 1
Rocha_Tarcisioda_D.pdf: 1796192 bytes, checksum: 4b25ccccc2fa363f13a02764136f5208 (MD5)
Previous issue date: 2008 / Resumo: Tecnicas de processamento de transações tem sido de grande importancia no que diz respeito a preservação da correção em diversas areas da computação. Devido a funções como, garantir a consistencia de dados, a recuperação de falhas e o controle de concorrencia,
transações são consideradas blocos de construção apropriados para a estruturação de sistemas
confiaveis. Contudo, desenvolver tecnicas de apoio a transações para ambientes dinamicos pode
ser uma tarefa complexa. O primeiro obstaculo esta no proprio dinamismo - a disponibilidade
de recursos pode variar inesperadamente. Isso pode causar dois efeitos diretos:
altas taxas de cancelamento de transações e grandes atrasos na execução das tarefas transacionais. O segundo obstaculo esta na crescente flexibilização do conceito de transação.
Isso ocorre porque os requisitos transacionais exigidos pelas aplicações atuais estão se
tornando mais variados, indo al'em das propriedades tradicionalmente definidas para uma
transação. Nesse contexto, esta tese aborda a viabilização de serviços de transações abertos,
ou seja, capazes de terem sua estrutura e comportamento configurados pelos programadores
de aplicações como um meio de atender a requisitos especificos do dominio de
suas aplicações. Como parte desse estudo foi proposto um modelo que abstrai alguns
elementos arquiteturais como jumpers, slots e demultiplexadores que podem ser usados
na especificação de pontos de configuração em serviços de transação. Esse modelo e implementado como uma camada acima de um modelo de componentes existente. Com isso,
desenvolvedores de serviços de transação passam a contar com esses elementos abertos
alem daqueles disponibilizados por abordagens tradicionais baseadas em componentes.
Para confirmar os beneficios em usabilidade, flexibilidade e extensão, esta tese apresenta
dois serviços de transação abertos que foram especificados com base no modelo
proposto. O primeiro serviço faz parte de uma plataforma de transações adaptavel para
ambientes de computação movel. O segundo serviço faz parte de um sistema que prove
adaptação dinamica de protocolos de efetivação (commit) de transações. Segundo os testes
realizados, a abordagem apresentada nesta tese trouxe a esses serviços a capacidade de
atender requisitos de aplicações de diferentes dominios. / Abstract: Transaction processing techniques are considered important solutions on preserving correctness in several fields of computing. Due their functions such as, failure recovery and concurrency control, transactions are considered appropriated building blocks for structuring reliable systems. Despite its advantages, to develop transaction systems for dynamic environments is not an easy task. The first problem is the dynamism - the resource availability can vary unexpectedly. This can cause the following side effects: high transaction abort rates and relevant delays of transaction operations. The second problem is the flexibilization of the transaction concept. The transactional requirements are becoming more diversified - they extrapolate the bounds of the traditional transactional properties. In this context, this thesis approaches the practicability of open transaction services that can be configured by the application programmers for attending specific requirements of different application domains. This thesis includes a model that abstracts some architectural elements (slots, jumpers and demultiplexers) that can be used for specifying configuration points in transaction services. To confirm its benefits on usability, flexibility and extension, this thesis presents two open transaction services that were specified based on the proposed model. The first service is part of an adaptable transaction platform for mobile computing environments. The second service is part of a system that provides dynamic adaptation of commit protocols. According the accomplished tests, the approach presented in this thesis is able to give to these services the capacity of attending the requirement of applications in different domains. / Doutorado / Sistemas Distribuidos / Doutor em Ciência da Computação
|
354 |
Framework de Aplicações Móveis com Segurança em SOA / Framework for Mobile Applications with Security in SOAFONSÊCA, Johnneth de Sene 16 February 2009 (has links)
Made available in DSpace on 2016-08-17T14:53:02Z (GMT). No. of bitstreams: 1
Johnneth de Sene Fonseca.pdf: 2018093 bytes, checksum: 11dbbd37120eed762761ac62a54985ab (MD5)
Previous issue date: 2009-02-16 / The constant evolution of technologies used in mobile devices has increased
its capabilities with respect to its storage, processing and transmission of data,
including more of one kind of technology transfer in a single device, and also access
Internet more efficiently. These factors have a greater number of applications and
services may be provided therein. With this came the need to find a model for
developing services and making them available more quickly and efficient, and
that data is transmitted more securely. One of the best options currently existing
are the SOAS (Services Oriented Architecture) a development model in great
evidence today. The aim of this dissertation is present a framework that allows
the development of SOA in the mobile environment, giving the developer all the
tools necessary for provision of services in this type of environment. A tool for
the use of security mechanism for the Framework is also proposed. / A constante evolução das tecnologias utilizadas em dispositivos móveis permitiu
o aumento das suas capacidades no que diz respeito ao seu armazenamento,
processamento e transmissão de dados, inclusive com mais de um tipo de tecnologia
de transmissão em um mesmo dispositivo, e também do acesso a internet de
forma mais eficiente. Estes fatores permitiram que um maior número de aplicações
e serviços possam ser disponibilizados neles. Com isso surgiu a necessidade de se
encontrar um modelo de desenvolvimento de serviços para os dispositivos móveis e
sua disponibilização de forma mais rápida e eficiente, além de que os dados sejam
transmitidos de forma segura. Uma das melhores opções existentes atualmente são
os SOAs (Arquitetura Orientada a Serviços), um modelo de desenvolvimento em
grande evidência atualmente. Esta dissertação visa apresentar um Framework que
permite o desenvolvimento de SOA no ambiente móvel, dando ao desenvolvedor
todas as ferramentas necessárias para provisão de serviços neste tipo de ambiente.
Também é proposta uma ferramenta para o uso de mecanismo de segurança pelo
Framework.
|
355 |
Multi-channel security protocols in personal networksHuang, Xin January 2014 (has links)
Personal computing devices are becoming more and more popular. These devices are able to collaborate with each other using wireless communication technologies, and then support many applications. Some interesting examples of these are healthcare, context-aware computing, and sports training. In any such applications, security is of vital importance. Firstly, sensitive personal data is always collected in these applications, thus confidentiality is usually required. Secondly, authenticity and integrity of data or instructions are always critical; incorrect data or instructions are not only useless, but also harmful in some cases. This thesis analyses the security requirements of personal networks, and develops a number of multi-channel security protocols. With the help of out-of-band channels, especially no-spoofing and no-blocking out-of-band channels, these protocols can bootstrap security in personal networks. In particular, three kinds of security protocols have been studied: protocols that use human-controlled channels, protocols that use visible light communications, and protocols that use intra-body communications. Interesting trade-offs have been discovered among communication, computation and security, resulting from different channel implementations and protocols.
|
356 |
The use of mobile commerce to improve the services of life insurance post sale activitiesAfrifa, Rexford January 2008 (has links)
Mobile commerce, due to its inherent characteristics of mobility and reachability in enhancing personalized services provides an excellent means for life insurers to exploit such avenue in their service offerings. The objective of this study was to determine whether mobile commerce can be used to improve the services of life insurance post-sale activities. This objective was achieved with the relevant literature and empirical study. To accomplish the objective of this treatise, a triangulated research approach was selected and a multiple-case study consisting of four cases was conducted. The four cases selected comprised of leading insurers with large market share in the life insurance market in South-Africa. The primary data were collected through questionnaire and face-to-face interviews with selected respondents. The main finding shows that the respondents had a positive view about mobile commerce and its application in their companies. This was demonstrated by 80 percent of respondents who agreed that mobile commerce was more of an opportunity rather than a challenge or even a threat for the life insurance market. The results also indicate that customer relationship management, mobile messaging services and field service automation functions were used by all the insurers; although minor discrepancies were observed due to the efficiency of each firms IT infrastructure. The Internet was found to assist in the collection of more precise data, to increase service performing abilities. Some of the major obstacles that were found to hinder the deployment of mobile commerce in the industry were security concerns, low and infrequent internet usage and performance by supporting industries. Cumbersome and inefficient legacy systems were declared as the greatest technological weakness particularly by respondents from case 1 and 2. Conversely, hardware and network infrastructure, lack of software packages, lack of technical expertise and the fear of disintermediation was rated low in hindering the deployment of mobile commerce. However, according to the findings the key benefits derived from engaging in increased mobile commerce activities include enhancing customer contact and service, more transparency and speed of claims management, increasing client retention and policy extension rates hence increasing overall company profit.
|
357 |
Adaptive interfaces for mobile preference-based searchingHill, Ryan Tebbutt January 2009 (has links)
Today's mobile computing devices provide a convenient means to search for points-of-interest (POIs) such as restaurants and accommodation. Mobile Preference-Based Search Tools (PBSTs) allow users to identify POIs such as restaurants or accommodation most suited to their needs and constraints using a mobile device. These devices however, have several design constraints including limited screen space and hardware capabilities. Adaptive User Interfaces (AUIs) have been proposed to address these issues but have not been extensively applied to mobile PBSTs such as mobile tourist guides. In addition, AUIs possess several benefits and advantages over static (traditional) interfaces, which do not take a user's preferences, skill set and experience into account. Little research, however, has been conducted into identifying the potential benefits of AUIs for mobile preference-based searching (PBS). The aim of this research was to determine the extent to which an AUI could improve the effectiveness and user satisfaction of mobile PBS. A literature study was conducted to determine the benefits and limitations of existing mobile PBSTs and determine how these could be improved. The potential benefits of AUIs for mobile PBSTs and a mobile map-based visualisation system were identified. A suitable model for incorporating an AUI into a mobile PBST was identified. The requirements for a mobile PBST were combined with the potentially adaptable objects of a Mobile Map-based Visualisation (MMV) system to provide adaptation suggestions for POInter, an existing mobile tourist guide. A field study using POInter was conducted in order to measure the extent to which participants agreed with suggestions provided for adapting the information, interaction and visualisation aspects of the system. These results were used to derive adaptation requirements for A-POInter, an adaptive version of POInter. Using a model-based design approach, an AUI was designed and implemented for A-POInter. An extensive field study was then conducted to evaluate the usability of the adaptations provided by A-POInter. The quantitative and qualitative data collected from the evaluations allowed the usability of A-POInter to be determined. The results of the field study showed that the participants were highly satisfied with the usability and the usefulness of the adaptations provided by A-POInter. Conclusions and recommendations for future work based on the results of the research were then outlined to conclude the dissertation.
|
358 |
A model to measure the maturuty of smartphone security at software consultanciesAllam, Sean January 2009 (has links)
Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integrated with key control recommendations, in providing a set of key measurable security maturity components. The subjective opinions of case study respondents are considered a key component in achieving a solution. The solution addresses the concerns of not only policy makers, but also the employees subjected to the security policies. Nurturing security awareness into organisational culture through reinforcement and employee acceptance is highlighted in this research project. Software consultancies can use this model to mitigate risks, while harnessing the potential strategic advantages of mobile computing through smartphone devices. In addition, this research project identifies the critical components of a smartphone security solution. As a result, a model is provided for software consultancies due to the intense reliance on information within these types of organisations. The model can be effectively applied to any information intensive organisation.
|
359 |
Coleta de dados pessoais e paradoxo da privacidade: um estudo entre usuários de aplicativos móveis / Personal data collection and privacy paradox: a study of mobile application usersChen Wen Hsing 04 April 2016 (has links)
Aplicativos móveis de celulares que coletam dados pessoais estão cada vez mais presentes na rotina do cidadão comum. Associado a estas aplicações, há polêmicas sobre riscos de segurança e de invasão de privacidade, que podem se tornar entraves para aceitação destes sistemas por parte dos usuários. Por outro lado, discute-se o Paradoxo da Privacidade, em que os consumidores revelam mais informações pessoais voluntariamente, apesar de declarar que reconhecem os riscos. Há pouco consenso, nas pesquisas acadêmicas, sobre os motivos deste paradoxo ou mesmo se este fenômeno realmente existe. O objetivo desta pesquisa é analisar como a coleta de informações sensíveis influencia a escolha de aplicativos móveis. A metodologia é o estudo de aplicativos disponíveis em lojas virtuais para celulares através de técnicas qualitativas e quantitativas. Os resultados indicam que os produtos mais populares da loja são aqueles que coletam mais dados pessoais. Porém, em uma análise minuciosa, observa-se que aqueles mais buscados também pertencem a empresas de boa reputação e possuem mais funcionalidades, que exigem maior acesso aos dados privativos do celular. Na survey realizada em seguida, nota-se que os consumidores reduzem o uso dos aplicativos quando consideram que o produto coleta dados excessivamente, mas a estratégia para proteger essas informações pode variar. No grupo dos usuários que usam aplicativos que coletam dados excessivamente, conclui-se que o motivo primordial para compartilhar informações pessoais são as funcionalidades. Além disso, esta pesquisa confirma que comparar os dados solicitados pelos aplicativos com a expectativa inicial do consumidor é um constructo complementar para avaliar preocupações com privacidade, ao invés de simplesmente analisar a quantidade de informações coletadas. O processo desta pesquisa também ilustrou que, dependendo do método utilizado para análise, é possível chegar a resultados opostos sobre a ocorrência ou não do paradoxo. Isso pode dar indícios sobre os motivos da falta de consenso sobre o assunto / Mobile phone applications with personal data gathering features are ubiquitous nowadays. On one hand, there are constant debates about privacy and security issues regarding such systems that inhibit user adoption. On the other hand, there are discussions about the tendency of consumers to disclose more personal information than their initial intentions. This phenomenon is also known as the Privacy Paradox. There is no agreement among researchers regarding the occurrence and the causes of this phenomenon. The aim of this research is to analyze how sensitive data collection can inhibit end user\'s application choices. It investigates products available to smartphone virtual stores with qualitative and quantitative research techniques. Data analysis indicates that top ranked products at the application store request the largest amount of sensitive data. However, this data disclosure is probably due to the fact that top ranked products belong to top rated developers and are feature-rich. The survey indicates that consumers reduce usage behavior in order to protect personal data but different protecting strategies are adopted. Users disclose their information probably because they value functionalities more than the data requested by the applications. This research also observed that user\'s expectation of the type of information that a particular application should collect is an alternative construct of measuring privacy concern, instead of examining only the permissions requested. This research process can also illustrate that the conclusions regarding the occurrence of the Privacy Paradox changes when a different analysis method is applied. Consequently, it can help to explain the lack of agreement in this research area
|
360 |
Reconhecimento de fala para navegação em aplicativos móveis para português brasileiro / Brazilian Portuguese Speech Recognition for Navigation on Mobile Device ApplicationsEdwin Miguel Triana Gomez 17 June 2011 (has links)
O objetivo do presente trabalho de pesquisa é reduzir o nível de atenção requerido para o uso do sistema Borboleta por meio de reconhecimento de fala na navegação através das funcionalidades do sistema, permitindo ao profissional dar maior atenção ao paciente. A metodologia de desenvolvimento do projeto inclui uma revisão bibliográfica para definir o estado da arte da área, uma pesquisa sobre o software disponível para reconhecimento de fala, uma coleta de dados dos comandos do sistema em português brasileiro para treinar e testar o sistema, uma etapa de projeção e desenvolvimento para definir a arquitetura de integração com o Borboleta, e uma fase de testes para medir a precisão do sistema e seus níveis de usabilidade e aceitação por parte do usuário. / The current document presents research that addresses the goal of reducing the user attention level required by Borboleta operation by providing speech recognition capabilities to augment navigation through the software functions, allowing the professional to pay more attention to the patient. The project methodology is composed of a bibliography revision to establish the state-of-the-art of the field, a review of available speech recognition software, data collection of Brazilian utterances to train and test the system, a design and development stage that defined the system architecture and integration with Borboleta and a testing process to measure the system accuracy, its usability and acceptance level.
|
Page generated in 0.0493 seconds