A systematic literature review of the Design Critique method
Abstract Context: The Design Critique (DC) method is becoming more common in Human–
Computer Interaction (HCI) and User Experience (UX) studies as the need for new …
Computer Interaction (HCI) and User Experience (UX) studies as the need for new …
CrowdSurfer: Seamlessly Integrating Crowd-Feedback Tasks into Everyday Internet Surfing
Crowd feedback overcomes scalability issues of feedback collection on interactive website
designs. However, collecting feedback on crowdsourcing platforms decouples the feedback …
designs. However, collecting feedback on crowdsourcing platforms decouples the feedback …
Appmod: Helping older adults manage mobile security with online social help
The rapid adoption of Smartphone devices has caused increasing security and privacy risks
and breaches. Catching up with ever-evolving contemporary smartphone technology …
and breaches. Catching up with ever-evolving contemporary smartphone technology …
Evaluating {Users'} Perceptions about a {System's} Privacy: Differentiating Social and Institutional Aspects
System design has a crucial effect on users' privacy, but privacy-by-design processes in
organizations rarely involve end-users. To bridge this gap, we investigate how User …
organizations rarely involve end-users. To bridge this gap, we investigate how User …
A model for system developers to measure the privacy risk of data
In this paper, we propose a model that could be used by system developers to measure the
privacy risk perceived by users when they disclose data into software systems. We first …
privacy risk perceived by users when they disclose data into software systems. We first …
Preserving digital privacy in e-participation environments: Towards GDPR compliance
The application of the General Data Protection Regulation (GDPR) 2016/679/EC, the
Regulation for the protection of personal data, is a challenge and must be seen as an …
Regulation for the protection of personal data, is a challenge and must be seen as an …
A/p (rivacy) testing: Assessing applications for social and institutional privacy
The way information systems are designed has a crucial effect on users' privacy, but users
are rarely involved in Privacy-by-Design processes. To bridge this gap, we investigate how …
are rarely involved in Privacy-by-Design processes. To bridge this gap, we investigate how …
[PDF][PDF] AppMoD: Helping older adults manage mobile security with online social help.(2019)
Smartphone ownership is rapidly growing worldwide [58], quickly becoming the primary way
people interact with each other, their banks, shops, and health providers. At the same time …
people interact with each other, their banks, shops, and health providers. At the same time …
On the application of artificial intelligence and human computation to the automation of agile software task effort estimation
M Alhamed - 2022 - theses.gla.ac.uk
Software effort estimation (SEE), as part of the wider project planning and product road
mapping process, occurs throughout a software development life cycle. A variety of effort …
mapping process, occurs throughout a software development life cycle. A variety of effort …
[PDF][PDF] Embedding Privacy into Software Systems: A Privacy Engineering Methodology for Data Minimisation
A Senarath - 2019 - unsworks.unsw.edu.au
Ubiquitous software systems (online shopping, social networking apps) today collect, store
and process user data, such as users name, age, credit card number and location. If these …
and process user data, such as users name, age, credit card number and location. If these …