提名的名单 发表于 2025-3-30 09:38:32

http://reply.papertrans.cn/43/4298/429749/429749_51.png

臭名昭著 发表于 2025-3-30 13:08:35

Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Imlated the parameters of the model quantitatively. Then we found what kinds of changes to the parameters would be effective for making security improvements. Furthermore, we used the model to show the appropriate order of promoting security measures.

chandel 发表于 2025-3-30 19:28:40

Communication of Design Decisions and Usability Issues: A Protocol Based on Personas and Nielsen’s Hnd non-use the protocol. In the final, adding to the case study comparison, we interviewed the SCRUM team who revealed that the protocol improved the understanding of recommendations and the Nielsen’s heuristics contributed to objectively communicate the main problems of interaction.

Encoding 发表于 2025-3-30 22:59:14

http://reply.papertrans.cn/43/4298/429749/429749_54.png

Goblet-Cells 发表于 2025-3-31 04:25:20

http://reply.papertrans.cn/43/4298/429749/429749_55.png

艰苦地移动 发表于 2025-3-31 08:02:28

,Zur Literatur der Gründerzeit,erstanding considering the social impact. By understanding interaction with data as a sign process, and identifying the goal of designing human-data interaction as enabling stakeholders to promote desired and to avoid undesired consequences of data use, we employ a semiotic perspective and define research challenges for the field.

优雅 发表于 2025-3-31 12:18:40

http://reply.papertrans.cn/43/4298/429749/429749_57.png

冰河期 发表于 2025-3-31 17:06:18

http://reply.papertrans.cn/43/4298/429749/429749_58.png

KIN 发表于 2025-3-31 17:34:27

http://reply.papertrans.cn/43/4298/429749/429749_59.png

逗留 发表于 2025-3-31 22:24:45

http://reply.papertrans.cn/43/4298/429749/429749_60.png
页: 1 2 3 4 5 [6] 7
查看完整版本: Titlebook: Human-Computer Interaction: Design and Evaluation; 17th International C Masaaki Kurosu Conference proceedings 2015 Springer International P