Securing User eXperience: A Review for the End-Users' Software Robustness
暂无分享,去创建一个
[1] Heidi Krömker,et al. A framework to measure user experience of interactive online products , 2010, MB '10.
[2] Udo Lindemann,et al. The ExodUX Framework: Supporting Comprehensive User Experience Design , 2017, 2017 Portland International Conference on Management of Engineering and Technology (PICMET).
[3] Michael Minge,et al. Hedonic and pragmatic halo effects at early stages of User Experience , 2018, Int. J. Hum. Comput. Stud..
[4] Vanessa Zeiler,et al. Mobile User Experience , 2017 .
[5] Qing Hu,et al. Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.
[6] Gao Changyuan,et al. Research on user experience evaluation system of information platform based on web environment , 2013, Proceedings of 2013 2nd International Conference on Measurement, Information and Control.
[7] Çigdem Gencel,et al. A Framework for Software Usability and User Experience Measurement in Mobile Industry , 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement.
[8] Jens Gerken,et al. A Simplified Model of User Experience for Practical Application , 2007 .
[9] Cory R. A. Hallam,et al. Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards , 2017, Comput. Hum. Behav..
[10] Zhi Chen,et al. The research of mobile application user experience and assessment model , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.
[11] Alan Cooper,et al. The Inmates are Running the Asylum , 1999, Software-Ergonomie.
[12] Oya Demirbilek,et al. Product design, semantics and emotional response , 2003, Ergonomics.
[13] Klaus-Peter Engelbrecht,et al. A taxonomy of quality of service and Quality of Experience of multimodal human-machine interaction , 2009, 2009 International Workshop on Quality of Multimedia Experience.
[14] Mark Weiser. The computer for the 21st Century , 2002 .
[15] Virpi Roto,et al. Identifying hedonic factors in long-term user experience , 2011, DPPI.
[16] Melanie Volkamer,et al. The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions , 2017, J. Inf. Secur. Appl..
[17] Sascha Mahlke,et al. User Experience of Interaction with Technical Systems , 2008 .
[18] Leena Arhippainen,et al. Empirical Evaluation of User Experience in two Adaptive Mobile Application Prototypes , 2003 .
[19] Nigel Bevan,et al. What is the difference between the purpose of usability and user experience evaluation methods , 2009 .
[20] A. W. Roscoe,et al. Security and Usability: Analysis and Evaluation , 2010, 2010 International Conference on Availability, Reliability and Security.
[21] KokolakisSpyros. Privacy attitudes and privacy behaviour , 2017 .
[22] HallamCory,et al. Online self-disclosure , 2017 .
[23] Timo Jokela,et al. The standard of user-centered design and the standard definition of usability: analyzing ISO 13407 against ISO 9241-11 , 2003, CLIHC '03.
[24] Beena Prabhu,et al. Integrating requirements engineering and user experience design in Product life cycle Management , 2012, 2012 First International Workshop on Usability and Accessibility Focused Requirements Engineering (UsARE).
[25] Alice Gross,et al. Why do I like it?: investigating the product-specificity of user experience , 2012, NordiCHI.
[26] Mike Kuniavsky,et al. Smart Things: Ubiquitous Computing User Experience Design , 2010 .
[27] Mikael Runonen,et al. Oscillating between extremes: a framework for mapping differing views on User eXperience , 2011, DPPI.
[28] Stefanos Gritzalis,et al. Managing User Experience: Usability and Security in a New Era of Software Supremacy , 2017, HCI.
[29] Vince Bruno,et al. Exploring behavioral information security networks in an organizational context: An empirical case study , 2017, J. Inf. Secur. Appl..
[30] Mohammad Zarour,et al. User experience framework that combines aspects, dimensions, and measurement methods , 2017 .
[31] Manfred Tscheligi,et al. Values in action (ViA): combining usability, user experience and user acceptance , 2012, CHI Extended Abstracts.
[32] Sebastian Möller,et al. Psychological needs as motivators for security and privacy actions on smartphones , 2017, J. Inf. Secur. Appl..
[33] Spyros Kokolakis,et al. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..
[34] Ka-Ping Yee,et al. Aligning Security and Usability , 2004, IEEE Secur. Priv..
[35] G. Veer,et al. Affordance in interaction , 2006, ECCE '06.