The video shows a prototype application of RhNav - Rhizome Navigation in action: A graphical navigation interface incorporating realtime website traffic and user behavior analysis.
Wie wurde Youtube so bekannt? Warum gibt es diesen Dienst? Wer nutzt Youtube? Und andere ähnliche Fragen und vor allem auch die Geschichte und da Hintergrundwissen zu Youtube werden übersichtlich dargestellt.
This document provides an in-depth look at the process used in trying to solve real issues with the User Experience of a social bookmarking application. While it might be easy to simply take the first solution that works and assume that it’s the best solution, the first solution is very rarely the best solution. We found several solutions to several problems, and many of them worked and appeared to be decent solutions. It was only upon further investigation and doing more detailed research that we found hidden flaws in some solutions, issues with user satisfaction in other solutions, and even found some solutions that broke entirely under certain conditions.
This paper will describe the problems we faced in detail and then provide an explanation of the solutions evaluated for each problem, including the benefits and drawbacks of each solution. We will also identify the final solution chosen and why it was chosen.
his document provides a review and analysis of guidelines and articles relating to the needs of older people with Web accessibility needs due to ageing, and compares these with the needs of people with disabilities as already addressed in WAI guidelines
Die Nielsen Nutzerstatistik weist für den Juni 1,8 Millionen deutsche Besucher von Twitter.com aus. Das entspricht Nielsen zufolge fast einer Verdoppelung seit April.
People have difficulties using computers. Some have more difficulties than others. There is a need for guidance in how to evaluate and improve the accessibility of systems for users. Since different users have considerably different accessibility needs, accessibility is a very complex issue.
ISO 9241-171 defines accessibility as the "usability of a product, service, environment or facility by people with the widest range of capabilities." While this definition can help manufacturers make their products more accessible to more people, it does not ensure that a given product is accessible to a particular individual.
A reference model is presented to act as a theoretical foundation. This Universal Access Reference Model (UARM) focuses on the accessibility of the interaction between users and systems, and provides a mechanism to share knowledge and abilities between users and systems. The UARM also suggests the role assistive technologies (ATs) can play in this interaction. The Common Accessibility Profile (CAP), which is based on the UARM, can be used to describe accessibility.
The CAP is a framework for identifying the accessibility issues of individual users with particular systems configurations. It profiles the capabilities of systems and users to communicate. The CAP can also profile environmental interference to this communication and the use of ATs to transform communication abilities. The CAP model can be extended as further general or domain specific requirements are standardized.
The CAP provides a model that can be used to structure various specifications in a manner that, in the future, will allow computational combination and comparison of profiles.
Recognizing its potential impact, the CAP is now being standardized by the User Interface subcommittee the International Organization for Standardization and the International Electrotechnical Commission.
The User Interface Design group studies new user interface techniques, focusing on two areas:
* Usable automation. Our goal is for every computer user to be able to harness the power of automation for handling repetitive, time-wasting, or error-prone tasks, without having to struggle with the complexity of programming.
* Usable security. Effective security depends on good user interfaces. A door may have the strongest lock in the world, but if authorized users can't open and close it easily, and have to leave it open in order to get their jobs done, then it has no security at all. We are studying ways to rethink computer security so that it is not only secure against attack but also usable by ordinary people.
A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel. Proceedings of the Third ACM International Conference on Web Search and Data Mining, page 251--260. New York, NY, USA, ACM, (2010)
S. Zhang, and S. Goddard. International Conference on Information Technology: Coding and Computing, 2005. ITCC 2005, 2, page 443-- 448 Vol. 2. IEEE, (April 2005)
A. Garc\'ıa Frey, G. Calvary, and S. Dupuy-Chessa. Proceedings of the 2Nd ACM SIGCHI Symposium on Engineering Interactive Computing Systems, page 41--46. New York, NY, USA, ACM, (2010)
P. Singer, F. Lemmerich, R. West, L. Zia, E. Wulczyn, M. Strohmaier, and J. Leskovec. Proceedings of the 26th International Conference on World Wide Web, page 1591--1600. Republic and Canton of Geneva, Switzerland, International World Wide Web Conferences Steering Committee, (2017)