Wir wollen mithelfen, dass die Welt von morgen ein kleines bisschen benutzbarer wird. Dazu legen wir auf UXcite unsere Erfahrungen aus dem Bereich User Experience dar und hoffen darauf jede Menge Gleichgesinnte zum Austausch zu finden.
This page has been created to provide organisations and individuals using the OECD Privacy Statement Generator with information about international instruments and national regulations which apply to the ...
The User Interface Design group studies new user interface techniques, focusing on two areas:
* Usable automation. Our goal is for every computer user to be able to harness the power of automation for handling repetitive, time-wasting, or error-prone tasks, without having to struggle with the complexity of programming.
* Usable security. Effective security depends on good user interfaces. A door may have the strongest lock in the world, but if authorized users can't open and close it easily, and have to leave it open in order to get their jobs done, then it has no security at all. We are studying ways to rethink computer security so that it is not only secure against attack but also usable by ordinary people.
With all the skepticism of whether it's just a social media fad and questions about how the company expects to generate revenue, Twitter has left many critics silent by continuing to grow.
This document provides an in-depth look at the process used in trying to solve real issues with the User Experience of a social bookmarking application. While it might be easy to simply take the first solution that works and assume that it’s the best solution, the first solution is very rarely the best solution. We found several solutions to several problems, and many of them worked and appeared to be decent solutions. It was only upon further investigation and doing more detailed research that we found hidden flaws in some solutions, issues with user satisfaction in other solutions, and even found some solutions that broke entirely under certain conditions.
This paper will describe the problems we faced in detail and then provide an explanation of the solutions evaluated for each problem, including the benefits and drawbacks of each solution. We will also identify the final solution chosen and why it was chosen.
Hi! If you think I add value to your network, do drop me a recommendation at http://mrtweet.net/jomiralb?gr Much appreciated! [from http://twitter.com/jomiralb/statuses/1218488446]
M. Baldonado, and T. Winograd. Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems, page 11--18. New York, NY, USA, ACM, (1997)
U. Lee, Z. Liu, and J. Cho. WWW '05: Proceedings of the 14th International World Wide Web Conference, page 391--400. New York, NY, USA, ACM Press, (2005)
S. Middleton, D. Roure, and N. Shadbolt. K-CAP '01: Proceedings of the 1st international conference on Knowledge capture, page 100--107. New York, NY, USA, ACM Press, (2001)
D. Quercia, M. Kosinski, D. Stillwell, and J. Crowcroft. Proceedings of the Third International Conference on Social Computing (SocialCom) and the Third International Conference on Privacy, Security, Risk and Trust (PASSAT), page 180--185. IEEE, (October 2011)
S. Pietschmann, M. Voigt, and K. Meissner. Proceedings of the 2009 Fourth International Conference on Internet and Web Applications and Services, page 217--222. Washington, DC, USA, IEEE Computer Society, (2009)