首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 9 毫秒
1.
Usability tests are a part of user-centered design. Usability testing with disabled people is necessary, if they are among the potential users. Several researchers have already investigated usability methods with sighted people. However, research with blind users is insufficient, for example, due to different knowledge on the use of assistive technologies and the ability to analyze usability issues from inspection of non-visual output of assistive devices. From here, the authors aspire to extend theory and practice by investigating four usability methods involving the blind, visually impaired and sighted people. These usability methods comprise of local test, synchronous remote test, tactile paper prototyping and computer-based prototyping. In terms of effectiveness of evaluation and the experience of participants and the facilitator, local tests were compared with synchronous remote tests and tactile paper prototyping with computer-based prototyping. Through the comparison of local and synchronous remote tests, it has been found that the number of usability problems uncovered in different categories with both approaches was comparable. In terms of task completion time, there is a significant difference for blind participants, but not for the visually impaired and sighted. Most of the blind and visually impaired participants prefer the local test. As for the comparison of tactile paper prototyping and computer-based prototyping, it has been revealed that tactile paper prototyping provides a better overview of an application while the interaction with computer-based prototypes is closer to reality. Problems regarding the planning and conducting of these methods as they arise in particular with blind people were also discussed. Based on the authors’ experiences, recommendations were provided for dealing with these problems from both the technical and the organization perspectives.  相似文献   

2.
This paper presents and discusses the current state of Graphical Security Models (GrSM), in terms of four GrSM phases: (i) generation, (ii) representation, (iii) evaluation, and (iv) modification. Although many studies focused on improving the usability, efficiency, and functionality of GrSMs (e.g., by using various model types and evaluation techniques), the networked system is evolving with many hosts and frequently changing topologies (e.g., Cloud, SDN, IoT etc.). To investigate the usability of GrSMs, this survey summarizes the characteristics of past research studies in terms of their development and computational complexity analysis, and specify their applications in terms of security metrics, availability of tools and their applicable domains. We also discuss the practical issues of modeling security, differences of GrSMs and their usability for future networks that are large and dynamic.  相似文献   

3.

In recent years, smartphone devices are becoming progressively popular across a diverse range of users. However, user diversity creates challenges in smartphone application (app) development. The diversity of users is often ignored by designers and developers due to the absence of requirements. Owing to this, many smartphone users face usability issues. Despite that, no dedicated platform found that guide smartphone app designers and developers regarding human universality. The aim of this research is to explore the requirements of diverse users in smartphone apps and provide usability guidelines. The objectives of this research are achieved by following two scientific approaches. The human diversity requirements are located by conducting usability tests that investigated the requirements in the form of usability issues. The systematic literature review (SLR) process is followed in order to resolve the discovered usability issues. Both approaches resulted in a list of usability issues and guidelines. The usability tests returned 27 problems while the SLR came with a comprehensive set of universal usability guidelines that were grouped into eleven categories. The study concluded with some major outcomes. The results show evidence of critical usability problems that must be addressed during the design and development of smartphone apps. Moreover, the study also revealed that people with disabilities were three times severely affected by usability problems in such apps than people of different ages and their needs must be considered a top priority in the development of smartphone apps.

  相似文献   

4.
Considering the importance associated with e-commerce website accessibility and usability, a study on one of the most relevant Portuguese e-commerce websites has been performed using both automatic and manual assessment procedures. In an initial stage, we evaluated the chosen website with a Web accessibility and usability automatic tool called SortSite; after that, we performed a manual evaluation to verify each previously detected error and present possible solutions to overcome those faults. In a third phase, three usability specialists have been used to perform a heuristic evaluation of the chosen website. Finally, user tests with blind people were carried out in order to fully assess the compliance with accessibility and usability guidelines and standards. The results showed that the platform had a good score regarding the automatic evaluation; however, when the heuristic and manual evaluations were performed, some accessibility and usability problems were discovered. Moreover, the user test results showed bad marks regarding efficiency, effectiveness, and satisfaction by the group of participants. As a conclusion, we highlight user interaction problems and propose seven recommendations focused on enhancing accessibility and usability of not only the evaluated e-commerce website, but also of other similar ones.  相似文献   

5.
The intuitiveness of gestural devices offers great potential for more physical ways of interacting, but it is imperative that such devices comply with existing, platform-independent usability principles that have proven their effect in heterogeneous settings over the last decades. This study focuses on iPhone, one of the most widely used haptic devices and reviews the usability problems of five built-in iPhone applications documented in related sources. The study investigates whether these problems are actually reported during testing with novice users, which is their severity and whether testing reveals additional issues. Overall, the study confirmed the list of usability problems documented and stressed the importance of conforming to established usability principles.  相似文献   

6.
Despite the existing regulations and standards at national and international level, web content is still difficult to use, if not completely unusable, for visually impaired people. This paper presents the evaluation results for three municipal web sites. A combined method, based on conformance review and expert review, was employed. Overall, the results reveal a low conformance to WCAG2 and many accessibility and usability problems. The content is not properly structured, and this reduces usability even for sighted user. The analysis of the evaluation data suggests that many accessibility barriers could be avoided by adopting a user-centered approach during web design.  相似文献   

7.
8.
9.
The availability of powerful microprocessors and improvements in the performance of networks has enabled high performance computing on wide-area, distributed systems. Computational grids, by integrating diverse, geographically distributed and essentially heterogeneous resources provide the infrastructure for solving large-scale problems. However, heterogeneity, on the one hand allows for scalability, but on the other hand makes application development and deployment for such an environment extremely difficult. The field of life sciences has been an explosion in data over the past decade. The data acquired needs to be processed, interpreted and analyzed to be useful. The large resource needs of bioinformatics allied to the large number of data-parallel applications in this field and the availability of a powerful, high performance, computing grid environment lead naturally to opportunities for developing grid-enabled applications. This survey, done as part of the Life Sciences Research Group (a research group belonging to the Global Grid Forum) attempts to collate information regarding grid-enabled applications in this field. Arun Krishnan, Ph.D.: He did his undergraduate in Electrochemical Engineering in the Central Electrochemical Research Institute in India and went on to do his Ph.D. in Advanced Process Control from the University of South Carolina. He then worked in the control and high performance computing industries for about 3 years before moving to the Bioinformatics Institute in Singapore. He is currently a Young Investigator for the Distributed Computing in Biomedicine Group at BII. His research interests include parallel and distributed computing with special emphasis on grid computing and its application to the biomedical area. He is also interested in developing parallel algorithms for sequence analysis and protein structure prediction.  相似文献   

10.
11.
This article reports a unified methodology developed to evaluate the accessibility and usability of mobile computing applications, which is intended to guarantee universal access as far as possible. As a basis for the methodology, this paper presents an analysis of the accessibility guidelines, conducted to take into account the specificity of mobile systems, as well as a set of usability heuristics, specifically devised for mobile computing. Finally, it presents the results of the application of the proposed methodology to applications that have been semi-automatically developed by the MAIS Designer, a new design tool that provides applications suited to different mobile devices.  相似文献   

12.
13.
JXTA is an open-source initiative that allows to specify a set of collaboration and communication protocols which enable the creation and deployment of peer-to-peer (P2P) applications. This paper provides a survey on its current state regarding the topic of security. The study focuses on the security evaluation of standard peer operations within the JXTA network, highlighting which issues must be seriously taken into account in those applications sensitive to security.  相似文献   

14.
A survey on industrial applications of fuzzy control   总被引:4,自引:0,他引:4  
Fuzzy control has long been applied to industry with several important theoretical results and successful results. Originally introduced as model-free control design approach, model-based fuzzy control has gained widespread significance in the past decade. This paper presents a survey on recent developments of analysis and design of fuzzy control systems focused on industrial applications reported after 2000.  相似文献   

15.
Despite recent advances of electronic technologies in e-learning, a consolidated evaluation methodology for e-learning applications is not available. The evaluation of educational software must consider its usability and more in general its accessibility, as well as its didactic effectiveness. This work is a first step towards the definition of a methodology for evaluating e-learning applications. Specific usability attributes capturing the peculiar features of these applications are identified. A preliminary user study involving a group of e-students, observed during their interaction with an e-learning application in a real situation, is reported. Then, the proposal is put forward to adapt to the e-learning domain a methodology for systematic usability evaluation, called SUE. Specifically, evaluation patterns are proposed that are able to drive the evaluators in the analysis of an e-learning application.  相似文献   

16.
Many enterprises rely on a wide variety of collaborative applications in order to support their everyday activities and to share resources. The collaborative applications are typically designed from scratch if the existing applications do not meet the enterprise's evolving needs. This incurs significant costs, and inconvenience. In this paper we present a case study of six applications (Sage 200, Gold-Vision CRM system, E-Commerce System, Gold-Vision Connect System, Realex Transaction and Spindle Document Automation Tool) within an enterprise. These applications are working in isolation. Therefore, sharing of information and data among these applications is carried out manually which imposes additional burden on their users and causes performance degradation. In this paper, we address this problem by integration and optimization of these applications by applying Service-Oriented Architecture (SOA) approach. We also address the usability problems of these applications. We present comparative evaluation results that show significant improvement in ease and performance of user tasks using integrated applications.  相似文献   

17.
This study concerns how user training on newly introduced computer application programs is carried out. Questionnaire data from the computer managers of 265 Swedish companies were analysed. The results show that formal training, i.e., teacher-directed group instruction, and self-studies using instruction manuals represented nearly two-thirds of all reported training forms. For the most recently introduced program, classes (group instruction) with simultaneous computer exercises was the form of formal training that was nearly always used. When formal training was given it was compulsory in over half of the cases. However, substitutes for users attending a training course were only provided by the company in very few of these cases. The implications of these findings for effective user training are discussed.  相似文献   

18.
It has been over 16 years since Cisco's NetFlow was patented in 1996. Extensive research has been conducted since then and many applications have been developed. In this survey, we have reviewed an extensive number of studies with emphasis on network flow applications. First, we provide a brief introduction to sFlow, NetFlow and network traffic analysis. Then, we review the state of the art in the field by presenting the main perspectives and methodologies. Our analysis has revealed that network security has been an important research topic since the beginning. Advanced methodologies, such as machine learning, have been very promising. We provide a critique of the studies surveyed about datasets, perspectives, methodologies, challenges, future directions and ideas for potential integration with other Information Technology infrastructure and methods. Finally, we concluded this survey.  相似文献   

19.
20.
《IT Professional》2004,6(3):51-57
As the software market grows more competitive, companies with difficult-to-use products face higher customer support costs as they attempt to rework user interfaces to fix usability problems. It is time that software designers tried reversing the direction - get user requirements, design the user interaction with the product's features, and then code the features - to produce software from the user's perspective and logic.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号