Listing 1 - 5 of 5 |
Sort by
|
Choose an application
The study focuses on user satisfaction with websites and personalised internet applications in particular. The abundance of information on the web is increasing more and more. Therefore, the significance of websites targeting the users’ preferences, like personalised Internet applications, is rising. The aim of this study was to find out which factors determine user satisfaction with personalised internet applications. Factors like the usefulness of the information or trust towards how personal information is handled were considered. A large-scale user survey evaluating three internet applications (from the travel, e-learning and real estate domains) was conducted. Expert opinions were collected to complement the results and provide insights from users’ and experts’ points of views.
Internet users --- Consumer satisfaction --- Online information services --- Attitudes. --- Evaluation. --- Electronic information services --- On-line information services --- Online services (Information services) --- Information services --- Customer satisfaction --- Satisfaction --- Brand loyalty --- Customer loyalty --- Web users --- World Wide Web users --- Computer users --- Personal Internet use in the workplace
Choose an application
"A peer-reviewed, open access, web-based publication featuring articles on user experience design for librarians and professionals in related fields. As the importance of digital services begins to rival that of collections, library user experience is taking a more central role than ever. While new jobs are being created for User Experience librarians and some departments are being renamed "User Experience" teams, there is still no comprehensive, rigorous publication for library UX professionals to share with and learn from their colleagues. Weave is intended to fill that gap. Weave helps practitioners and theorists come together to make libraries better"-- Website's about page.
User-centered system design --- Library users --- User interfaces (Computer systems) --- Web sites --- Human-computer interaction --- Research libraries --- Academic libraries --- Library use studies --- Academic libraries. --- Human-computer interaction. --- Library use studies. --- Library users. --- Research libraries. --- User-centered system design. --- Design --- Design. --- United States. --- libraries --- usability --- user experience
Choose an application
Privacy, Right of --- Internet users --- Internet --- Computer crimes --- Civil rights --- Droit à la vie privée --- Internautes --- Crimes par ordinateur --- Droits de l'homme --- Legal status, laws, etc. --- Law and legislation --- Droit
Choose an application
In Buy It Now, Michele White examines eBay and its emphasis on community and social norms, revealing the cultural assumptions about gender, race, and sexuality that are reinforced throughout the site. She shows how instructional texts, rule systems, and advertisements ""configure the user,"" allowing eBay to indicate how the site is supposed to function while concurrently upholding and promoting particular social values, practices, and norms.
Internet --- Electronic commerce --- Internet and women. --- Online identities. --- Internet users --- Virtual identities --- Identity (Psychology) --- Women and the Internet --- Women --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Social aspects. --- Identities --- eBay (Firm) --- eBay Inc. --- ebay.com
Choose an application
The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
Computer crimes -- Prevention. --- Cyber intelligence (Computer security). --- Cyberspace -- Security measures,. --- Hackers. --- Professions -- Supply and demand. --- Computer crimes --- Cyber intelligence (Computer security) --- Cyberspace --- Professions --- Hackers --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Prevention --- Security measures, --- Supply and demand --- Prevention. --- Security measures. --- Supply and demand. --- Computer security. --- Computer hackers --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer programmers --- Computer users --- Data protection --- Security systems --- Hacking --- Space and time --- Telematics --- E-books --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security
Listing 1 - 5 of 5 |
Sort by
|