提名的名单
发表于 2025-3-30 09:38:32
http://reply.papertrans.cn/43/4298/429749/429749_51.png
臭名昭著
发表于 2025-3-30 13:08:35
Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Imlated the parameters of the model quantitatively. Then we found what kinds of changes to the parameters would be effective for making security improvements. Furthermore, we used the model to show the appropriate order of promoting security measures.
chandel
发表于 2025-3-30 19:28:40
Communication of Design Decisions and Usability Issues: A Protocol Based on Personas and Nielsen’s Hnd non-use the protocol. In the final, adding to the case study comparison, we interviewed the SCRUM team who revealed that the protocol improved the understanding of recommendations and the Nielsen’s heuristics contributed to objectively communicate the main problems of interaction.
Encoding
发表于 2025-3-30 22:59:14
http://reply.papertrans.cn/43/4298/429749/429749_54.png
Goblet-Cells
发表于 2025-3-31 04:25:20
http://reply.papertrans.cn/43/4298/429749/429749_55.png
艰苦地移动
发表于 2025-3-31 08:02:28
,Zur Literatur der Gründerzeit,erstanding considering the social impact. By understanding interaction with data as a sign process, and identifying the goal of designing human-data interaction as enabling stakeholders to promote desired and to avoid undesired consequences of data use, we employ a semiotic perspective and define research challenges for the field.
优雅
发表于 2025-3-31 12:18:40
http://reply.papertrans.cn/43/4298/429749/429749_57.png
冰河期
发表于 2025-3-31 17:06:18
http://reply.papertrans.cn/43/4298/429749/429749_58.png
KIN
发表于 2025-3-31 17:34:27
http://reply.papertrans.cn/43/4298/429749/429749_59.png
逗留
发表于 2025-3-31 22:24:45
http://reply.papertrans.cn/43/4298/429749/429749_60.png