-
1
-
-
33846914244
-
Web portals in primary care: An evaluation of patient readiness and willingness to pay for online services
-
Adler, K.G. 2006. Web portals in primary care: An evaluation of patient readiness and willingness to pay for online services. Journal of Medical Internet Research, 8: e26 doi:10.2196/jmir.8.4.e26
-
(2006)
Journal of Medical Internet Research
, vol.8
-
-
Adler, K.G.1
-
6
-
-
84862058194
-
A user-centric privacy space framework
-
In: Cranor L. F., Garfinkel S., editors Sebastopol, CA: O'Reilly Media
-
Brunk, B. 2005. "A user-centric privacy space framework". In Security and usability: Designing secure systems that people can use, Edited by: Cranor, L. F. and Garfinkel, S. 401-420. Sebastopol, CA: O'Reilly Media.
-
(2005)
Security and usability: Designing secure systems that people can use
, pp. 401-420
-
-
Brunk, B.1
-
8
-
-
34250768651
-
Privacy policies and privacy preferences
-
In: Cranor L. F., Garfinkel S., editors Sebastopol, CA: O'Reilly Media Inc
-
Cranor, L. F. 2005. "Privacy policies and privacy preferences". In Security and usability: Designing secure systems that people can use, Edited by: Cranor, L. F. and Garfinkel, S. 447-472. Sebastopol, CA: O'Reilly Media Inc.
-
(2005)
Security and usability: Designing secure systems that people can use
, pp. 447-472
-
-
Cranor, L.F.1
-
9
-
-
52449095787
-
Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness
-
Eysenbach, G. 2008. Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness. Journal of Medical Internet Research, 10: e22 doi:10.2196/jmir.1030
-
(2008)
Journal of Medical Internet Research
, vol.10
-
-
Eysenbach, G.1
-
10
-
-
59649086633
-
Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
-
Flenchais, I. and Sasse, M. A. 2007. Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. International Journal of Human-Computer Studies, 67: 281-296. doi:10.1016/j.ijhcs.2007.10.002
-
(2007)
International Journal of Human-Computer Studies
, vol.67
, pp. 281-296
-
-
Flenchais, I.1
Sasse, M.A.2
-
11
-
-
44649119874
-
Social Uses of personal health information within PatientsLikeMe, an online patient community: What can happen when patients have access to one another's data
-
Frost, J. H. and Massagli, M. P. 2008. Social Uses of personal health information within PatientsLikeMe, an online patient community: What can happen when patients have access to one another's data. Journal of Medical Internet Research, 10: e15 doi:10.2196/jmir.1053
-
(2008)
Journal of Medical Internet Research
, vol.10
-
-
Frost, J.H.1
Massagli, M.P.2
-
12
-
-
19944387279
-
Why users cannot use security
-
Furnell, S. 2005. Why users cannot use security. Computers & Security, 24 June: 274-279. doi:10.1016/j.cose.2005.04.003
-
(2005)
Computers & Security
, vol.24
, pp. 274-279
-
-
Furnell, S.1
-
13
-
-
32444433117
-
The challenges of understanding and using security: A survey of end-users
-
Furnell, S. M., Jusoh, A. and Katsabas, D. 2006. The challenges of understanding and using security: A survey of end-users. Computers & Security, 25: 27-35.
-
(2006)
Computers & Security
, vol.25
, pp. 27-35
-
-
Furnell, S.M.1
Jusoh, A.2
Katsabas, D.3
-
15
-
-
84876506769
-
-
Google Health
-
Google Health. (2009). https://www.google.com/accounts/ServiceLogin?service=health&nui=1&continue=https%3A%2F%2Fhealth.google.com%2Fhealth%2Fp%2F&followup=https%3A%2F%2Fhealth.google.com%2Fhealth%2Fp%2F&rm=hide
-
(2009)
-
-
-
16
-
-
36748999868
-
Early experiences with personal health records
-
Halamka, J. D., Mandl, K. D. and Tang, P. C. 2007. Early experiences with personal health records. Journal of the American Medical Informatics Association, 15: 1-7. doi:10.1197/jamia.M2562
-
(2007)
Journal of the American Medical Informatics Association
, vol.15
, pp. 1-7
-
-
Halamka, J.D.1
Mandl, K.D.2
Tang, P.C.3
-
18
-
-
77953181502
-
-
(Tech. Rep.)
-
Hertzum, M., Juul, N. C., Jorgensen, N., & Norgaard, M. (2004). Usable security and e-banking: Ease of use vis-a-vis security (Tech. Rep.). http://www.ruc.dk/~nielsj/research/papers/ebanking-tr.pdf
-
(2004)
Usable security and e-banking: Ease of use vis-a-vis security
-
-
Hertzum, M.1
Juul, N.C.2
Jorgensen, N.3
Norgaard, M.4
-
19
-
-
9244224631
-
Usability inspection by metaphors of human thinking compared to heuristic evaluation
-
Hornbaek, K. and Frokjaer, E. 2004. Usability inspection by metaphors of human thinking compared to heuristic evaluation. International Journal of Human-Computer Interaction, 17: 357-374.
-
(2004)
International Journal of Human-Computer Interaction
, vol.17
, pp. 357-374
-
-
Hornbaek, K.1
Frokjaer, E.2
-
20
-
-
84876508695
-
-
IAPP
-
IAPP. (2011). CICA releases privacy maturity model. https://www.privacyassociation.org/publications/2010_08_13_cica_releases_privacy_maturity_model/
-
(2011)
CICA releases privacy maturity model
-
-
-
21
-
-
67449090286
-
Ergonomics of human-system interaction-Part 210
-
ISO 9241-210
-
ISO 9241-210. 2010. Ergonomics of human-system interaction-Part 210, Human-centred design for interactive systems.
-
(2010)
Human-centred design for interactive systems
-
-
-
24
-
-
0347025921
-
Security and human computer interfaces
-
Johnston, J., Eloff, J. H. P. and Labuschagne, L. 2003. Security and human computer interfaces. Computers & Security, 22: 675-684.
-
(2003)
Computers & Security
, vol.22
, pp. 675-684
-
-
Johnston, J.1
Eloff, J.H.P.2
Labuschagne, L.3
-
26
-
-
78649746535
-
Heuristic evaluation
-
In: Scapin D., Law E., editors MAUSE
-
Law, E. L. 2007. "Heuristic evaluation". In R3UEMs: Review, Report and Refine International Workshop, Edited by: Scapin, D. and Law, E. 61-63. MAUSE.
-
(2007)
R3UEMs: Review, Report and Refine International Workshop
, pp. 61-63
-
-
Law, E.L.1
-
29
-
-
34547361475
-
Optimizing heuristic evaluation process in e-commerce: Use of the Taguchi Method
-
Ling, C. and Salvendy, G. 2007. "Optimizing heuristic evaluation process in e-commerce: Use of the Taguchi Method". In International Journal of Human-Computer Interaction Vol. 22, 271-287.
-
(2007)
International Journal of Human-Computer Interaction
, vol.22
, pp. 271-287
-
-
Ling, C.1
Salvendy, G.2
-
31
-
-
0001775576
-
Heuristic evaluation
-
In: Nielsen J., Mack R. L., editors New York, NY: Wiley
-
Nielsen, J. 1994. "Heuristic evaluation". In Usability inspection methods, Edited by: Nielsen, J. and Mack, R. L. 25-62. New York, NY: Wiley.
-
(1994)
Usability inspection methods
, pp. 25-62
-
-
Nielsen, J.1
-
33
-
-
2942568434
-
Applying heuristics to accessibility inspections
-
Paddison, C. and Englefield, P. 2004. Applying heuristics to accessibility inspections. Interacting With Computers, 16: 507-521.
-
(2004)
Interacting With Computers
, vol.16
, pp. 507-521
-
-
Paddison, C.1
Englefield, P.2
-
34
-
-
20344378356
-
Heuristic evaluation: A system checklist
-
Norwalk, CT: Xerox Corporation
-
Pierotti, D. (1995). Heuristic evaluation: A system checklist. In Usability analysis and design. Norwalk, CT: Xerox Corporation. http://www.stcsig.org/usability/topics/articles/he-checklist.html
-
(1995)
Usability analysis and design
-
-
Pierotti, D.1
-
35
-
-
84876505027
-
The power and the perils of using social networking tools in the NHS
-
Purdy, R. (2008). The power and the perils of using social networking tools in the NHS. A masterclass for the NHS Faculty of Health Informatics. http://www.library.nhs.uk/SpecialistLibrarySearch/Download.aspx?resID=289920
-
(2008)
A masterclass for the NHS Faculty of Health Informatics
-
-
Purdy, R.1
-
37
-
-
0033686898
-
A toolkit for strategic usability: results from workshops, panels, and surveys
-
Rosenbaum, S., Rohn, J. A. and Humburg, J. 2000. A toolkit for strategic usability: results from workshops, panels, and surveys. CHI'00 Proceedings of the SIGCHI conference on Human Factors in Computing Systems,: 337-344.
-
(2000)
CHI '00 Proceedings of the SIGCHI conference on Human Factors in Computing Systems
, pp. 337-344
-
-
Rosenbaum, S.1
Rohn, J.A.2
Humburg, J.3
-
40
-
-
23344448136
-
Better discount evaluation: Illustrating how critical parameters support heuristic creation
-
Somervell, J. and McCrickard, D.S. 2005. Better discount evaluation: Illustrating how critical parameters support heuristic creation. Interacting with Computers, 17: 592-612.
-
(2005)
Interacting with Computers
, vol.17
, pp. 592-612
-
-
Somervell, J.1
McCrickard, D.S.2
-
42
-
-
85086421095
-
A survey of user-centered design practice
-
Vredenburg, K., Mao, J., Smith, P. W. and Carey, T. 2002. "A survey of user-centered design practice". In Conference on Human Factors in Computing Systems; SIGCHI Conference on Human Factors in Computing Systems: Changing Our World Changing Ourselves 471-478.
-
(2002)
Conference on Human Factors in Computing Systems; SIGCHI Conference on Human Factors in Computing Systems: Changing Our World Changing Ourselves
, pp. 471-478
-
-
Vredenburg, K.1
Mao, J.2
Smith, P.W.3
Carey, T.4
-
44
-
-
77956357772
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
In: Cranor L. F., Garfinkel S., editors Sebastopol, CA: O'Reilly Media
-
Whitten, A. and Tygar, J. D. 2005. "Why Johnny can't encrypt: A usability evaluation of PGP 5.0". In Security and usability: Designing secure systems that people can use, Edited by: Cranor, L. F. and Garfinkel, S. 669-692. Sebastopol, CA: O'Reilly Media.
-
(2005)
Security and usability: Designing secure systems that people can use
, pp. 669-692
-
-
Whitten, A.1
Tygar, J.D.2
-
45
-
-
4644322724
-
Understanding inspection methods: Lessons from an assessment of heuristic evaluation
-
In: Blandford A., Vanderdonckt J., editors New York, NY: Springer-Verlag
-
Woolrych, A. and Cockton, G. 2001a. "Understanding inspection methods: Lessons from an assessment of heuristic evaluation". In People & computers XV, Edited by: Blandford, A. and Vanderdonckt, J. 171-192. New York, NY: Springer-Verlag.
-
(2001)
People & computers XV
, pp. 171-192
-
-
Woolrych, A.1
Cockton, G.2
-
46
-
-
0038343292
-
Why and when five test users aren't enough
-
In: Vanderdonckt J., Blandford A., Derycke A., editors Toulouse, France: Cépadèus
-
Woolrych, A. and Cockton, G. 2001b. "Why and when five test users aren't enough". In Proceedings of IHM-HCI 2001 Conference, Edited by: Vanderdonckt, J., Blandford, A. and Derycke, A. Vol. 2, 105-108. Toulouse, France: Cépadèus.
-
(2001)
Proceedings of IHM-HCI 2001 Conference
, vol.2
, pp. 105-108
-
-
Woolrych, A.1
Cockton, G.2
-
47
-
-
14344258328
-
Sale must end: should discount methods be cleared off HCI's shelves?
-
Woolrych, A. and Cockton, G. 2002. Sale must end: should discount methods be cleared off HCI's shelves?. Interactions, 9: 13-18.
-
(2002)
Interactions
, vol.9
, pp. 13-18
-
-
Woolrych, A.1
Cockton, G.2
-
50
-
-
37349067420
-
Interest in the use of computerized patient portals: role of the provider-patient relationship
-
Zickmund, S. L., Hess, R., Bryce, C. L., McTigue, K., Olshansky, E.Fitzgerald, K. 2007. Interest in the use of computerized patient portals: role of the provider-patient relationship. Journal of General Internet Medicine,: 20-26. doi:10.1007/s11606-007-0273-6
-
(2007)
Journal of General Internet Medicine
, pp. 20-26
-
-
Zickmund, S.L.1
Hess, R.2
Bryce, C.L.3
McTigue, K.4
Olshansky, E.5
Fitzgerald, K.6
|