• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 17
  • 4
  • 3
  • 2
  • 2
  • 1
  • Tagged with
  • 35
  • 35
  • 14
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Improving the Visibility and the Accessibility of Web Services. A User-Centric Approach.

Drivas, Ioannis C. January 2017 (has links)
The World Wide Web provides a well standing environment in any kind of organizations for exposing online products and services. However, no one ensures that web products or services which provided by organizations or enterprises, would receive the proper visibility and accessibility by the internet users. The process of Search Engine Optimization examines usability in design, architecture and content that an internet-based system has, for improving its visibility and accessibility in the web. Successful SEO process in an internet-based system, which is set under the paternity of an organization, ensures higher recognition, visibility and accessibility for the web services that the system provides to internet users. The aim of this study characterized with a trinity of axes. In the first axe, an internet-based system and the web services that provides is examined in order to understand its initial situation regarding its visibility and accessibility in the web. In the second axe, the study follows a user-centric approach on how and in what way the examined system could be improved based on its users’ needs and desires. After the encapsulation of needs and desires that the users expressed as regards the usability of the system in design, architecture and content, the third axe takes place. In the third axe, the extracted needs and desires of users are implemented in the under-examined system, in order to understand if its visibility and accessibility has improved in the World Wide Web.For the completion of this trinity of axes, the Soft Systems Methodology approach is adopted. SSM is an action-oriented process of inquiry which deals with a problematic situation from the Finding Out about the situation through the Taking Action to improve it. Following an interpretative research approach, ten semi-structured interviews take place in order to capture all the participants’ perceptions and different worldviews regarding of what are the changes that they need and desire from the examined system. Moreover, in this study, the conduction of three Workshops, constitute a cornerstone for implementing systemically desirable and culturally feasible changes where all participants can live with, in order to improve system’s visibility and accessibility in the internet world. The results indicate that the adoption of participants’ needs and desires, improved the levels of usability, visibility and accessibility of the under examined internet-based system. Overall, this study firstly contributes to expand the knowledge as regards the process of improving the visibility and accessibility of internet-based systems and their web services in the internet world, based on a user-centric approach. Secondly, this study works as a practical toolbox for any kind of organization which intends to improve the visibility and accessibility of its current or potential web services in the World Wide Web.
32

Retweet Profiling - Study Dissemination of Twitter Messages

Rangnani, Soniya January 2016 (has links) (PDF)
Social media has become an important means of everyday communication. It is a mechanism for “sharing” and “resharing” of information. While social network platforms provide the means to users for resharing/reblogging (aka retweeting), it remains unclear what motivates users to share. Predicting the spread of content is quite important for several purposes such as viral marketing, popular news detection, personalized message recommendation and on-line advertisement. Social content systems store all the information produced in the interactions between users. However, to turn this data into information that allows us to extract patterns, it is important to consider the different phenomena involved in these interactions. In this work, two phenomena that influence the evolution of networks are studied for Twitter: diffusion of information and communication among users. Previous studies have shown that history of interaction among users and properties of the message are good attributes to understand the retweet behavior of users. Factors like content of message and time are less investigated. We propose a prediction model for retweet actions of users. It formulates a function which ranks the users according to how receptive they are to a particular message. The function generates a confidence score for the edges joining the initiator of the message and the followers. Two different pieces of information propagate through different users in the network. We divide the task of calculating confidence score into two parts. The first part is independent of the test tweet. It models transmission rate of the tie between the initiator and the follower. We call this as ‘Pairwise Influence Estimation’. The second part incorporates the tweet properties and user activeness as per time in the ranking function. The proposed model exploits all the dimensions of information dif-fusion process-influence, content and temporal properties. We have captured local aspects of diffusion. It has been observed that users do not read all the messages on their site. This results in shortcomings in the above models. Considering this, we first study the temporal behavior of users’ activities, which directly reflects their availability pertaining to the upcoming post. Also, as it is a continuous task of predicting retweet behavior, we design a user-centric, and temporally localized incremental classification model by considering the fact that users do not read all their tweets. We have tested the effectiveness of this model by using real data from Twitter. We demonstrate that the new proposed model is more accurate in describing the information propagation in microblog compared to the existing methods. Our model works well when we consider different classes of users depending on their activity patterns. In addition, we also investigate the parameters of the model for different classes of users. We report some interesting distinguishing patterns in retweeting behavior of users.
33

A User-Centric Tabular Multi-Column Sorting Interface For Intact Transposition Of Columnar Data

Miles, David B. L. 12 January 2006 (has links) (PDF)
Many usability features designed in software applications are not procedurally intuitive for software users. A good example of software usability involves tabular sorting in a spreadsheet. Single-column sorting, activated with a mouse click to a column header or toolbar button, often produces rearranged listings that reduce cognitive organization beyond the sorted column. Multi-column sorting, generated through menu-driven processes, provides derived organization, however, locating feature options through menu-based systems can be confusing. A means to overcome this confusion is prioritized selection of database arrays issued to columnar displays for the purpose of intact transposition of data. This is a unique process designed as a user-centric tabular multi-column sorting interface. Designed within this experimental software application is a "trickle down" logic perceived as a navigation rule. The design offers logic associated with decision choices as used to pursue a software solution. The solution in this instance is a compiled resultant of separate and distinct columnar data sorting. The design was initially implemented in a software application housing thousands of examination scores. Observations of the design concept's effectiveness in practice led to further investigation through this master's thesis. To validate the research design, research participants were introduced to an example of traditional database sort/selection with practice examples. These users were also provided sorting exercises to reinforce the discussed concepts--both experimental and traditional. Finally, a survey questionnaire allowed them to provide feedback about the different task methods for sorting as well as the experience of using these dissimilar methods. The hypothesis was not validated through the research survey. Consideration of observations of the design in a production environment for four years, however, provided impetus to suggest further research of the design concept.
34

Designprinciper och användarupplevelse inom streamingtjänster / Design principles and user experience in streaming services

Todorovic, Dragana, Aktan, Petrus, Lundberg Puglia, Gabriel January 2022 (has links)
Studien undersöker betydelsen av god användarupplevelse inom streamingtjänster. För att utforska detta område ytterligare kommer syftet med studien att fokusera på hur designprinciper kan förbättra användarupplevelsen för streamingtjänster samt vilka av dessa designprinciper som bör beaktas för att förbättra användarupplevelsen bland streamingtjänster. För att samla in data genomfördes användbarhetstester på två olika streamingtjänster, där 8 olika personer fick utföra olika uppgifter på de utvalda streamingtjänsterna. Efter att testerna slutfördes ställdes några uppföljningsfrågor för att utforska vissa uppgifter ytterligare, beroende på resultatet. Alla tester spelades in med samtycke från personen som utförde testet. Resultatet av testerna noterades och analyserades senare. Data som insamlades ledde till slutsatsen att de designprinciper som utmärkte sig mest och hade störst inverkan på testpersonernas användarupplevelse var navigationsdesign, konsistens och feedback samt synlighet. Studien vänder sig till personer som arbetar inom områden såsom användargränssnittsdesign och interaktionsdesign men även till systemvetare, UX-designers, och till och med webbdesigners. Andra användare som är intresserade av användarupplevelse och användbarhet i gränssnitt, till exempel de som arbetar inom gränssnittsutveckling eller liknande områden. Denna studie initierades med att sammanställa olika teorier om varför Netflix har en sådan fördel gentemot andra streamingtjänster och varför många föredrar Netflix framför andra streamingtjänster. Vi har använt en kvalitativ metod för att samla in vår information där vi har analyserat teorin med den empiriska data vi har fått. / The study explores the importance of user experience within streaming services. To explore this area even further the purpose of the study will focus on how design principles can improve the user experience for streaming services and which of these design principles should be considered to improve the user experience among streaming services. To gather data, usability testing on two different streaming services was conducted on 8 different people where they did different tasks on the chosen streaming services. After the tests were done some follow up questions were made to explore some tasks even further, depending on the result. All the tests were recorded with the consent of the person who did the test. The result of the tests was later noted and analyzed. The data led to the conclusion that the design principles that stood out the most and had the biggest impact on the tester’s user experience was navigation design, consistency, and feedback as well as visibility. The study is aimed at people who work in the areas that are being studied by us for example, User interface designers, system scientists, UX designers and interaction designers. Also, other users that are interested in user experience and usability in interfaces, for example those who work in interface development or similar areas. This study began by compiling various theories as to why Netflix has such an advantage over other streaming services and why many people prefer Netflix over other streaming services. We have used a qualitative method for collecting our information where we have analyzed the theory with the empirical data we have received.
35

使用者導向研究:從工作脈絡與客戶痛點中 設計雲端安全的創新 -以趨勢科技使用者洞見計畫為例 / Protecting the cloud: Use the work practice and pain points to find customer insight

劉宛婷, Liu, Wan Ting Unknown Date (has links)
電腦病毒的演化瞬息萬變,特別是近年來,駭客在有利可圖的動機驅使下,逐漸形成了專業分工的產銷供應鏈,讓病毒的演化速度和變種數量以指數型成長。攻擊事件數量不斷竄升,資訊安全市場理應增加不少機會,但多數防毒廠商經常對這樣的市場機會望洋興嘆,每年花費數億金額,動員研發團隊提出新產品、新版本、新服務,使用者卻始終興趣缺缺。供需兩方認知差異讓防毒軟體廠商面臨龐大開發費用的損失,也讓企業持續存在於不定時資安風險的恐懼之中。 資安軟體公司在產品研發前,做足使用者需求蒐集流程工作,依照使用者描述所進行開發的產品,為什麼卻不是客戶需要的?本研究以質性研究法觀察國內一家電腦防毒廠商的新產品開發過程,更以為期一年的行動研究方式參與該公司使用者洞見計畫(Customer insight program),結合跨部門團隊的智慧和力量,以雲端運算的資安機會為主題進行客戶觀察和新產品構思。 經過一年的行動研究蒐證,本研究指出使用者導向設計的迷思,並強調瞭解工作脈絡對於系統性產品創新的重要性。由於系統性產品複雜程度較高,使用處於分工較細的系統運作流程之下,往往不自覺工作特殊之處,也難以確切表達總體需求。本研究的分析方式則透過使用者工作脈絡,即以客戶的商業模式和雲端運用的特殊情境,其次定義使用者於脈絡中獨特的痛點,進而找到創新機會。 使用者雖然是創新的來源,但是本研究發現,使用者不一定能知道自己的需求,唯有瞭解他們的工作實務,瞭解使用者在特定工作情境的痛點,才能化痛點為創新的亮點。研究貢獻上,補強現行使用者研究的三大方向,分別是使用者假設的不同、產品面設計的不同與創新來源不同。實務貢獻上,本研究提供複雜度較高的系統產品廠商在使用者導向設計流程之建議,以及企業中各部門如何透過使用者創新設計思維發揮價值所在。 / The rate of rapid evolution in computer virus results in an increase of computer crime and business attack incidents. Opportunities in the information security market began to grow and expected to exceed $125 billion USD by 2015, according to a new report by Global Industry Analysts. In this situation, anti-virus company tried everything they can to launch high-technology, fancy, and more powerful product every year. But they found customer is always lack of interest in their new products. This not only makes the loss on large investment in software development for anti-virus company, and also makes enterprise customers continuously at the risk of data stolen and computer virus attacks. By asking users what they want and trying really hard to listen to them before the development, however the product still hasn』t meet the customer needs? This research is based on qualitative method and action research project to investigate an anti-virus company』s product development process and customer insight programs. The one year project was cooperated with company internal cross-functional team and focused on 『Protecting the cloud』 topic. There are three cases was selected in the final. In order to know the user』s working context in the high-complexity information security product system. The analysis structure in three cases used four steps to find out. First of all, identify the enterprise user』s business model. Secondly, observe their local knowledge in cloud computing usage. Thirdly, clarify the organization's unique pain points. The last but not the least, find the potential security opportunities for innovation. While user becomes a significant source of innovation, the study shows that users don』t necessarily know their own needs. Only to understand customer』s work practices, pain points under specific working situations, and use design thinking to make the pain points to transform into fit customer needs. The research emphasized the importance of local context in innovation theory and reinforced the inadequacy part of the lead user theory. Key words: User-centric innovation, Product innovation, Service innovation, Cloud computing, Anti-virus software, Qualitative research, Action research

Page generated in 0.048 seconds