The unknown user: Covert medication; my user experience
نویسندگان
چکیده
منابع مشابه
"Digital Newspaper Makes My Home Tidier" - Evaluating User Experience with User-Defined Attributes
User experience (UX) evaluation is typically based on either open evaluation or predefined measures. In our study, we tested a new UX evaluation method by combining both approaches in a collaborative evaluation. When evaluating a digital newspaper over six weeks, the users were asked to describe the reading experience in their own words on an online platform shared among the test participants. ...
متن کاملThe Cooltown User Experience
ubiquitous, user, interface, web, handheld, wireless The Cooltown project at HP Labs applies Web technology to develop systems that support the users of wireless, handheld devices interacting with their environment, anywhere they may be. The basic elements of Web technology useful for ubiquitous computing are described in several papers and on-line resources from the Cooltown project [1-5]. Her...
متن کاملCovert Channel in HTTP User-Agents
A subliminal covert channel establishes a nearly undetectable communication session within a pre-established data stream between two separate entities.This document explains how HTTP can be utilized to facilitate a covert channel over both local and wide area networks. The Hypertext Transfer Protocol (HTTP) accounts for a majority of the Internet’s daily web traffic and is permitted within almo...
متن کاملUser Experience Lifecycle Model ContinUE [ Continuous User Experience
We propose the conceptual User Experience Lifecycle Model ContinUE [continuous user experience], which illustrates sequential phases of a user experience lifecycle and the associated aspects of appraisal-forming. ContinUE extends existing models of user experience and usability by integrating a temporal perspective. Including phases of anticipation and reflection widens the frame of user experi...
متن کاملIdentifying the Unknown in User Space Memory
The research described in this thesis aims to improve the techniques used to analyse volatile memory, in particular user space memory, such that more generic techniques to identify unknown code such as malware can be produced. Current analysis techniques of user space memory are limited to a focus on the location of specific kernel objects. This focus on the identification of specific artifacts...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indian Journal of Psychiatry
سال: 2012
ISSN: 0019-5545
DOI: 10.4103/0019-5545.102433