Search Results for 'Usability-Testing'

Usability-Testing published presentations and documents on DocSlides.

INFO3315 Week 4
INFO3315 Week 4
by alida-meadow
Personas, Tasks. Guidelines, Heuristic Evaluation...
Wanderlust Pilot Field Study
Wanderlust Pilot Field Study
by lois-ondreau
Presented by Brandon Bond. Collaborative explorat...
Naturally Rehearsing Passwords
Naturally Rehearsing Passwords
by cheryl-pisano
Jeremiah Blocki. ASIACRYPT 2013. Manuel Blum. Anu...
Phase 1 of the Website Usability Study conducted by
Phase 1 of the Website Usability Study conducted by
by calandra-battersby
Helena College Library for FY13.. Results compile...
Bootstrapping Mobile PINs Using Passwords
Bootstrapping Mobile PINs Using Passwords
by lindy-dunigan
Markus Jakobsson. Debin Liu. Information Risk Man...
Serangan Lapis Aplikasi dan Keamanan Lapis Aplikasi
Serangan Lapis Aplikasi dan Keamanan Lapis Aplikasi
by calandra-battersby
Rivaldy Arif Pratama. Lita Harpaning Pertiwi. Els...
The usability of Graduate Destination Surveys for the analy
The usability of Graduate Destination Surveys for the analy
by yoshiko-marsland
outcomes. Nicola Branson. Southern Africa Labour ...
Telekinesis for Product Managers
Telekinesis for Product Managers
by lois-ondreau
Andrey . Stoliarov. Superpowers to…. Handle sta...
Spring 2011
Spring 2011
by debby-jeon
6.813/6.831 User Interface Design and Implementat...
Upsorn
Upsorn
by trish-goza
Praphamontripong. CS 4501-006. Design and Impleme...
Methodology Overview
Methodology Overview
by sherrill-nordquist
basics in user studies. Lecture . /slide deck pro...
Investigating the Usability of Leap Motion Controller: Gest
Investigating the Usability of Leap Motion Controller: Gest
by debby-jeon
Supervisors: . Tanja. . Mitrovic. and Moffat M...
Interface evaluation
Interface evaluation
by jane-oiler
An application of evaluative methods. Today’s t...
Code Inspections and Heuristic Evaluation
Code Inspections and Heuristic Evaluation
by alida-meadow
Objectives. Today. The inspection process. Practi...
Heuristic Evaluation
Heuristic Evaluation
by alexa-scheidler
May 4, 2016. Outline. Heuristic Evaluation Overvi...
Universal Design for Learning & Accessible Learning Exp
Universal Design for Learning & Accessible Learning Exp
by mitsue-stanley
Gabrielle King, Phillip J. Deaton. Outline. The M...
Data Analysis of
Data Analysis of
by celsa-spraggs
EnchantedLearning.com vs. Invent.org. Eric Lewine...
Global Detection of
Global Detection of
by briana-ranney
Complex Copying Relationships . Between Sources. ...
The Abyss Usability Test
The Abyss Usability Test
by tawny-fly
SMU Main . C. ampus 12/8/14. Playtest. 26 Testers...
Web Design
Web Design
by alida-meadow
Basic Elements. What is Web Design. Design is the...
Proxy Usability
Proxy Usability
by olivia-moreira
Mid-. A. tlantic . F. all Conference. 10/8/2015. ...
Exam 2 Review
Exam 2 Review
by mitsue-stanley
Software Engineering. CS . 561. Outline. Requirem...
1 User experience
1 User experience
by natalia-silvester
User interfaces. Jaana Holvikivi. Metropolia. 2. ...
Usability Study
Usability Study
by kittie-lecroy
There were two parts to this usability study.. Pa...
Usability of Security Critical Protocols Under Adversarial
Usability of Security Critical Protocols Under Adversarial
by jane-oiler
Tyler Kaczmarek . PhD . Advancement to . Candidac...
Exploring Patient Data in Context to Support Clinical Resea
Exploring Patient Data in Context to Support Clinical Resea
by pasty-toler
Research . Data Explorer. Adam Wilcox, PhD, . Chu...
WHY JOHNNY CANT ENCRYPT  CHAPTER THIRTY FOUR Why Johnny Cant Encrypt A Usability
WHY JOHNNY CANT ENCRYPT CHAPTER THIRTY FOUR Why Johnny Cant Encrypt A Usability
by kittie-lecroy
0 ALMA WHITTEN AND J D TYGAR SER ERRORS CAUSE OR C...
Why Johnny Still Cant Encrypt Evaluating the Usability of Email Encryption Softw
Why Johnny Still Cant Encrypt Evaluating the Usability of Email Encryption Softw
by sherrill-nordquist
edu Levi Broderick Electrical and Computer Enginee...
Why Johnny Cant Encrypt A Usability Evaluation of PGP
Why Johnny Cant Encrypt A Usability Evaluation of PGP
by jane-oiler
0 Alma Whitten School of Computer Science Carnegie...
I Think Therefore I Am Usability and Security of Authe
I Think Therefore I Am Usability and Security of Authe
by cheryl-pisano
berkeleyedu hamiltonnguyenberkeleyedu charleswangb...
Information scenariosclaims about current practice
Information scenariosclaims about current practice
by cheryl-pisano
1 analysis ofstakeholders,field studies Usability ...
Middle-East Journal of Scientific Research 8 (3): 566-574, 2011ISSN 19
Middle-East Journal of Scientific Research 8 (3): 566-574, 2011ISSN 19
by yoshiko-marsland
Shopping values Usability-oriented Enjoy-orie...
“Retrospective vs. concurrent think-aloud protocols: usab
“Retrospective vs. concurrent think-aloud protocols: usab
by tawny-fly
Presented by:. Aram. . Saponjyan & . Elie Bo...
Week 5 – 2015
Week 5 – 2015
by stefany-barnette
HCI – COMP3315. Judy Kay. CHAI:. Computer . H....
Evaluating Usability
Evaluating Usability
by sherrill-nordquist
Data & Analysis. Types of Data. And how to re...
Metrics and Computer Games
Metrics and Computer Games
by conchita-marotz
Edel Sherratt. The rise and rise of computer game...
Web Accessibility: Pitfalls, Gotchas and Solutions
Web Accessibility: Pitfalls, Gotchas and Solutions
by mitsue-stanley
Mark . Hale (moderator), University of Iowa. Matt...
Improving the Usability of a Wearable Input Device SCURRYByung Seok So
Improving the Usability of a Wearable Input Device SCURRYByung Seok So
by olivia-moreira
Accelerometer sensing module Signal processing mod...
Website Redesign on a Shoestring Budget
Website Redesign on a Shoestring Budget
by marina-yarberry
Midwest Chapter Medical Library Association. &...