Externalization of User Model in Mobile Services
نویسندگان
چکیده
In most personalized mobile services, the user model remains invisible, and users do not have control over it. Externalization of user models can allow users to get an overview the user model that is used for personalization, and adjust the profile and personalization effects to their needs and preferences. We have evaluated the interactive user model with 42 users, which were exposed to a prototype of interactive user model of personalized news service, for determining whether the proposed externalization, scrutability and privacy privileges were acceptable to the users. The purpose of the study was to find out if it is appropriate to present a user model on the mobile device and to control the sharing of the user model with the service provider. The conclusions show that the users expressed their general approval of the proposed privileges while making useful suggestions regarding improvements to the presentation and interface to the system.
منابع مشابه
The Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملHigh Fuzzy Utility Based Frequent Patterns Mining Approach for Mobile Web Services Sequences
Nowadays high fuzzy utility based pattern mining is an emerging topic in data mining. It refers to discover all patterns having a high utility meeting a user-specified minimum high utility threshold. It comprises extracting patterns which are highly accessed in mobile web service sequences. Different from the traditional fuzzy approach, high fuzzy utility mining considers not only counts of mob...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملMobile Banking Service Quality and Customer Satisfaction (Application of SERVQUAL Model)
This research aimed at applying SERVQUAl model to examine the relationship between mobile banking services and customer satisfaction. While the previous researchers had already examined the effect of qualities services on banking customer satisfaction, no previous study was done on mobile banking. Thus, the current paper attempted to fill the gap in the literature by applying SERVQUAL model t...
متن کاملDynamically Programmable and Reconfigurable Middleware Services
The increasing software complexity and proliferation of distributed applications for cell phones demand the introduction of middleware services to assist in the development of advanced applications. However, from the user perspective, it is essential that these new phones provide a smooth error-free experience. Despite of the complexity underlying a cell phone, placing a phone call remains a si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- iJIM
دوره 8 شماره
صفحات -
تاریخ انتشار 2014