메뉴 건너뛰기




Volumn , Issue , 2013, Pages 47-75

Framework to enhance the mobile user experience of goal orientated interactions

Author keywords

[No Author keywords available]

Indexed keywords

COHERENT FRAMEWORKS; INITIAL DEVELOPMENT; MOBILE USER EXPERIENCES;

EID: 84944916641     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-4446-5.ch003     Document Type: Chapter
Times cited : (2)

References (162)
  • 1
    • 85025704194 scopus 로고    scopus 로고
    • Is that a PDA in your pocket, or are you just glad to see me?
    • Abowd, G. (2001). Is that a PDA in your pocket, or are you just glad to see me? ACM SIGCHI Bulletin - A supplement to interactions, 2001, 9-9. doi: http://doi.acm.org/10.1145/967240.967254
    • (2001) ACM SIGCHI Bulletin - A supplement to interactions , vol.2001 , pp. 9-9
    • Abowd, G.1
  • 2
    • 0343618728 scopus 로고    scopus 로고
    • Quality of Experience: Defining the Criteria for Effective Interaction Design
    • Alben, L. (1996). Quality of Experience: Defining the Criteria for Effective Interaction Design. Interactions 3.3, May+June, 11.
    • (1996) Interactions 3.3, May+June , vol.11
    • Alben, L.1
  • 5
    • 84944954023 scopus 로고    scopus 로고
    • Paper presented at the ITU Regional Workshop on "Universal Service Funding", Damascus: Syria
    • Audin, C., & Barba, A. (2008). Wireless and Mobile Solutions. Paper presented at the ITU Regional Workshop on "Universal Service Funding", Damascus: Syria.
    • (2008) Wireless and Mobile Solutions
    • Audin, C.1    Barba, A.2
  • 6
    • 24944510531 scopus 로고    scopus 로고
    • Mobile computing principles: Designing and developing mobile applications with UML and XML
    • New York: Cambridge University Press
    • B'Far. R. (2004). Mobile computing principles: Designing and developing mobile applications with UML and XML. New York: Cambridge University Press.
    • (2004)
    • B'Far, R.1
  • 8
    • 84944954024 scopus 로고    scopus 로고
    • Paper presented at the International Workshop on Meaningful Measures. Valid Useful Userexperience Measurement, Reykjavik, Iceland.
    • Bevan, N. (2008). Classifying and Selecting UX and Usability Measures. Paper presented at the International Workshop on Meaningful Measures. Valid Useful Userexperience Measurement, Reykjavik, Iceland.
    • (2008) Classifying and Selecting UX and Usability Measures
    • Bevan, N.1
  • 11
    • 84944954026 scopus 로고    scopus 로고
    • Paper presented at the Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Bela Bela, South Africa.
    • Botha, A., Herselman, M., & Van Greunen, D. (2010). Mobile user experience in a mlearning environment. Paper presented at the Proceedings of the 2010 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists, Bela Bela, South Africa.
    • (2010) Mobile user experience in a mlearning environment
    • Botha, A.1    Herselman, M.2    Van Greunen, D.3
  • 12
    • 84944954027 scopus 로고    scopus 로고
    • Mobile Web for Social Development Roadmap W3C Interest Group Note 16 November 2009: W3C.
    • Boyera, S. (2009). Mobile Web for Social Development Roadmap W3C Interest Group Note 16 November 2009: W3C.
    • (2009)
    • Boyera, S.1
  • 15
    • 33745280684 scopus 로고    scopus 로고
    • Creating entertainment applications for cellular phones
    • Coulton, P., Rashid, O., Edwards, R., & Thompson, R. (2005). Creating entertainment applications for cellular phones. Computers in Entertainment, 3(3), 3-3. doi: http://doi.acm. org/10.1145/1077246.1077254
    • (2005) Computers in Entertainment , vol.3 , Issue.3 , pp. 3-3
    • Coulton, P.1    Rashid, O.2    Edwards, R.3    Thompson, R.4
  • 18
    • 77149148742 scopus 로고    scopus 로고
    • Human-computer interaction: A stable discipline, a nascent science, and the growth of the long tail
    • In Press, Corrected Proof
    • Dix, A. (2010). Human-computer interaction: A stable discipline, a nascent science, and the growth of the long tail. [doi: DOI: 10.1016/j.intcom. 2009.11.007]. Interacting with Computers, In Press, Corrected Proof.
    • (2010) Interacting with Computers
    • Dix, A.1
  • 19
    • 45949100345 scopus 로고    scopus 로고
    • Research Approaches to Mobile Use in the Developing World: A Review of the Literature
    • Donner, J. (2008). Research Approaches to Mobile Use in the Developing World: A Review of the Literature. The Information Society, 24(3), 140-159. doi:10.1080/01972240802019970.
    • (2008) The Information Society , vol.24 , Issue.3 , pp. 140-159
    • Donner, J.1
  • 21
    • 44049102551 scopus 로고    scopus 로고
    • Paper presented at the Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on
    • El-Kiki, T., & Lawrence, E. (2008). Mobile User Needs: Efficient Transactions. Paper presented at the Information Technology: New Generations, 2008. ITNG 2008. Fifth International Conference on.
    • (2008) Mobile User Needs: Efficient Transactions
    • El-Kiki, T.1    Lawrence, E.2
  • 22
    • 84944954032 scopus 로고    scopus 로고
    • Paper presented at the Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques, Cambridge, MA, USA
    • Forlizzi, J., & Battarbee, K. (2004). Understanding experience in interactive systems. Paper presented at the Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques, Cambridge, MA, USA.
    • (2004) Understanding experience in interactive systems
    • Forlizzi, J.1    Battarbee, K.2
  • 23
    • 0033651424 scopus 로고    scopus 로고
    • Paper presented at the Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques, New York City, New York, United States
    • Forlizzi, J., & Ford, S. (2000). The building blocks of experience: an early framework for interaction designers. Paper presented at the Proceedings of the 3rd conference on Designing interactive systems: processes, practices, methods, and techniques, New York City, New York, United States.
    • (2000) The building blocks of experience: an early framework for interaction designers
    • Forlizzi, J.1    Ford, S.2
  • 25
    • 0242618419 scopus 로고    scopus 로고
    • The elements of user experience
    • Garrett, J. J. (2000). The elements of user experience. Retrieved from http://www.jjg.net
    • (2000)
    • Garrett, J.J.1
  • 27
    • 79955911841 scopus 로고    scopus 로고
    • A Design Science Research Methodology and its Application to Accounting Information Systems Research
    • Geerts, G. (2011). A Design Science Research Methodology and its Application to Accounting Information Systems Research. International Journal of Accounting Information Systems. doi:10.1016/j.accinf.2011.02.004.
    • (2011) International Journal of Accounting Information Systems
    • Geerts, G.1
  • 29
    • 84944954034 scopus 로고    scopus 로고
    • The Thing and I: Understanding the Relationship Between User and Product
    • Hassenzahl, M. (2005). The Thing and I: Understanding the Relationship Between User and Product (pp. 31-42).
    • (2005) , pp. 31-42
    • Hassenzahl, M.1
  • 31
    • 84944954035 scopus 로고    scopus 로고
    • Paper presented at the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2012, Denver, Colorado, USA
    • Herrington, J. (2012). Design-based research: Implementation issues in emerging scholar research. Paper presented at the World Conference on Educational Multimedia, Hypermedia and Telecommunications 2012, Denver, Colorado, USA.
    • (2012) Design-based research: Implementation issues in emerging scholar research
    • Herrington, J.1
  • 35
    • 0242652022 scopus 로고    scopus 로고
    • Design science in information systems research
    • Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS Q., 28(1), 75-105.
    • (2004) MIS Q. , vol.28 , Issue.1 , pp. 75-105
    • Hevner, A.R.1    March, S.T.2    Park, J.3    Ram, S.4
  • 37
    • 0141870788 scopus 로고    scopus 로고
    • Recognising deductive processes in qualitative research
    • Hyde, K. F. (2000). Recognising deductive processes in qualitative research. Qualitative Market Research: An International Journal, 3(2), 82-90. doi:10.1108/13522750010322089.
    • (2000) Qualitative Market Research: An International Journal , vol.3 , Issue.2 , pp. 82-90
    • Hyde, K.F.1
  • 38
    • 48749111433 scopus 로고    scopus 로고
    • Gaithersburg: Information Technology Laboratory, National Institute of Standards and Technology
    • Jansen, W., & Ayers, R. (2007). Guidelines on Cell Phone Forensics: Recommendations of the National Institute of Standards and Technology. Gaithersburg: Information Technology Laboratory, National Institute of Standards and Technology, Retrieved from http://www.google.co.za/#hl=en&ei=DQkkS8nDOeSMjAfc4sXVBw&sa=X&oi=spell&resnum=0&ct=result&cd=1&ved=0CAYQBSgA&q=basic+phones+%2B+characteristics&spell=1&fp=ff0e58b5ff63a74b
    • (2007) Guidelines on Cell Phone Forensics: Recommendations of the National Institute of Standards and Technology
    • Jansen, W.1    Ayers, R.2
  • 41
    • 84944954036 scopus 로고    scopus 로고
    • Paper presented at the International Workshop on Meaningful Measures. Valid Useful Userexperience Measurement, Reykjavik, Iceland.
    • Ketola, P., & Roto, V. (2008). Exploring User Experience Measurement Needs. Paper presented at the International Workshop on Meaningful Measures. Valid Useful Userexperience Measurement, Reykjavik, Iceland.
    • (2008) Exploring User Experience Measurement Needs
    • Ketola, P.1    Roto, V.2
  • 42
    • 26944475160 scopus 로고    scopus 로고
    • Context-Aware Configuration: A Study on Improving Cell Phone Awareness Lecture Notes in Computer Science: Modeling and Using Context
    • Springer Berlin/Heidelberg
    • Khalil, A., & Connelly, K. (2005). Context-Aware Configuration: A Study on Improving Cell Phone Awareness Lecture Notes in Computer Science: Modeling and Using Context (pp. 197-209): Springer Berlin/Heidelberg.
    • (2005) , pp. 197-209
    • Khalil, A.1    Connelly, K.2
  • 45
    • 85025611738 scopus 로고    scopus 로고
    • Paper presented at the HCL 2007: COST294-MAUSE affiliated workshop, Lancaster, UK
    • Law, E., Vermeeren, A., Hassenzahl, M., & Blythe, M. A. (2007). Towards a UX Manifesto. Paper presented at the HCL 2007: COST294-MAUSE affiliated workshop, Lancaster, UK.
    • (2007) Towards a UX Manifesto
    • Law, E.1    Vermeeren, A.2    Hassenzahl, M.3    Blythe, M.A.4
  • 46
    • 84944954038 scopus 로고    scopus 로고
    • Understanding Mobile Human- Computer Interaction (Information Systems Series (ISS)): Butterworth-Heinemann.
    • Love, S. (2005). Understanding Mobile Human- Computer Interaction (Information Systems Series (ISS)): Butterworth-Heinemann.
    • (2005)
    • Love, S.1
  • 48
    • 0029537737 scopus 로고
    • Design and Natural Science Research on Information Technology
    • March, S., & Smith, G. (1995). Design and Natural Science Research on Information Technology. Decision Support Systems, 15, 251-266. doi:10.1016/0167-9236(94)00041-2.
    • (1995) Decision Support Systems , vol.15 , pp. 251-266
    • March, S.1    Smith, G.2
  • 49
    • 55949085529 scopus 로고    scopus 로고
    • Design Science in the Information Systems Discipline: An introduction to the special issue on design science research
    • March, S., & Storey, V. (2008). Design Science in the Information Systems Discipline: An introduction to the special issue on design science research. Management Information Systems Quarterly, 32(4), 725-730.
    • (2008) Management Information Systems Quarterly , vol.32 , Issue.4 , pp. 725-730
    • March, S.1    Storey, V.2
  • 51
    • 84944954040 scopus 로고    scopus 로고
    • The Experience of Enchantment in Human Computer Interaction
    • McCarthy, J., Wright, P., Wallace, J., & Dearden, A. (2004). The Experience of Enchantment in Human Computer Interaction.
    • (2004)
    • McCarthy, J.1    Wright, P.2    Wallace, J.3    Dearden, A.4
  • 52
    • 84944954041 scopus 로고    scopus 로고
    • Laptops for a digital lifestyle: Millennial students and wireless mobile technologies Retrieved January, 2010
    • McMahon, M., & Pospisil, R. (2005). Laptops for a digital lifestyle: Millennial students and wireless mobile technologies Retrieved January, 2010, from http://www.ascilite.org.au/conferences/ brisbane05/proceedings.shtml
    • (2005)
    • McMahon, M.1    Pospisil, R.2
  • 54
    • 72049105973 scopus 로고    scopus 로고
    • January
    • Nielsen, J. (2009, January). Mobile Usability. Retrieved from http://www.useit.com/alertbox/
    • (2009) Mobile Usability
    • Nielsen, J.1
  • 57
    • 84944954042 scopus 로고    scopus 로고
    • Paper presented at the Second International Conference on Telecommunication and Electronic Commerce (ICTEC'99), Nashville, TN.
    • Oinas-Kukkonen, H. (1999). Mobile Electronic Commerce through the Web. Paper presented at the Second International Conference on Telecommunication and Electronic Commerce (ICTEC'99), Nashville, TN.
    • (1999) Mobile Electronic Commerce through the Web
    • Oinas-Kukkonen, H.1
  • 58
    • 1542487772 scopus 로고    scopus 로고
    • Balancing the vendor and consumer requirements for electronic shopping systems [10.1023/A:1019156504846]
    • Oinas-Kukkonen, H. (2000). Balancing the vendor and consumer requirements for electronic shopping systems. [10.1023/A:1019156504846]. Information Technology and Management, 1(1), 73-84.
    • (2000) Information Technology and Management , vol.1 , Issue.1 , pp. 73-84
    • Oinas-Kukkonen, H.1
  • 59
    • 1542537711 scopus 로고    scopus 로고
    • Paper presented at the International Conference on Computer Science and Technology (IASTED)
    • Oinas-Kukkonen, H., & Kurkela, V. (2003). Developing Successful Mobile Applications. Paper presented at the International Conference on Computer Science and Technology (IASTED).
    • (2003) Developing Successful Mobile Applications
    • Oinas-Kukkonen, H.1    Kurkela, V.2
  • 60
    • 0042339634 scopus 로고    scopus 로고
    • Welcome to the Wireless World: Problems Using and Understanding Mobile Telephony
    • Harper, R., & Brown, B. (Eds.), New York: Springer-Verlag
    • Palen, L., & Salzman, M. (2001). Welcome to the Wireless World: Problems Using and Understanding Mobile Telephony. In Harper, R., & Brown, B. (Eds.), The Wireless World (pp. 135-153). New York: Springer-Verlag.
    • (2001) The Wireless World , pp. 135-153
    • Palen, L.1    Salzman, M.2
  • 61
    • 84866290804 scopus 로고    scopus 로고
    • African Mobile Observatory
    • Driving Economic and Social Development through Mobile Services: GSMA & ATKEARNEY
    • Philipps, T., Lyons, P., Page, M., Viviez, L., & Molina, M. (2011). African Mobile Observatory. Driving Economic and Social Development through Mobile Services: GSMA & ATKEARNEY.
    • (2011)
    • Philipps, T.1    Lyons, P.2    Page, M.3    Viviez, L.4    Molina, M.5
  • 63
    • 84870261066 scopus 로고    scopus 로고
    • Paper presented at the Fifteenth Americas Conference on Information Systems, San Francisco, CA.
    • Pirenen, R. (2009). Research Framework of Integrative Action. Paper presented at the Fifteenth Americas Conference on Information Systems, San Francisco, CA.
    • (2009) Research Framework of Integrative Action
    • Pirenen, R.1
  • 65
    • 84944954045 scopus 로고    scopus 로고
    • WAP Usability. Déjà Vu: 1994 All Over Again: Report from a Field Study in London, Fall 2000 Retrieved November, 2009
    • Ramsay, M., & Nielsen, J. (2000). WAP Usability. Déjà Vu: 1994 All Over Again: Report from a Field Study in London, Fall 2000 Retrieved November, 2009, from http://www.nngroup.com
    • (2000)
    • Ramsay, M.1    Nielsen, J.2
  • 66
    • 85145525676 scopus 로고    scopus 로고
    • Design research from a technology perspective
    • Van den Akker, J., Gravemeijer, K., Mc Kenney, S., & Nieveen, N. (Eds.), London: Routledge
    • Reeves, T. C. (2006). Design research from a technology perspective. In Van den Akker, J., Gravemeijer, K., Mc Kenney, S., & Nieveen, N. (Eds.), Educational Design Research (pp. 52-67). London: Routledge.
    • (2006) Educational Design Research , pp. 52-67
    • Reeves, T.C.1
  • 67
    • 77954961432 scopus 로고    scopus 로고
    • Geneva, Switzerland: International Telecommunication Union
    • Report, I. T. U. (2010). Measuring the Information Society. Geneva, Switzerland: International Telecommunication Union.
    • (2010) Measuring the Information Society
    • Report, I.T.U.1
  • 68
    • 17744398943 scopus 로고    scopus 로고
    • The Ecology of Mobile Commerce: Charting a course for Success Using Value Chain Analysis
    • Mennecke, B. E., & Strader, T. J. (Eds.), Hershey, PA: IRM Press
    • Riilke, A., Iyer, A., & Chiasson, G. (2003). The Ecology of Mobile Commerce: Charting a course for Success Using Value Chain Analysis. In Mennecke, B. E., & Strader, T. J. (Eds.), Mobile commerce: Technology, theory, and applications. Hershey, PA: IRM Press. doi:10.4018/978-1-59140-044-8.ch007.
    • (2003) Mobile commerce: Technology, theory, and applications
    • Riilke, A.1    Iyer, A.2    Chiasson, G.3
  • 70
    • 85025679568 scopus 로고    scopus 로고
    • Paper presented at the HCL 2007: COST294-MAUSE affiliated workshop, Lancaster, UK
    • Roto, V. (2007). User Experience from Product Creation Perspective. Paper presented at the HCL 2007: COST294-MAUSE affiliated workshop, Lancaster, UK.
    • (2007) User Experience from Product Creation Perspective
    • Roto, V.1
  • 71
    • 84944954048 scopus 로고    scopus 로고
    • Paper presented at the Mobile HCI 2001: Third International Workshop on Human Computer Interaction with Mobile Devices., Lille, France.
    • Ruuska-Kalliokulju, S., Schneider-Hufschmidt, M., Väänänen-Vainio-Mattila, K., & Von Niman, B. (2001). Paper presented at the Mobile HCI 2001: Third International Workshop on Human Computer Interaction with Mobile Devices., Lille, France.
    • (2001)
    • Ruuska-Kalliokulju, S.1    Schneider-Hufschmidt, M.2    Väänänen-Vainio-Mattila, K.3    Von Niman, B.4
  • 72
    • 20744441195 scopus 로고    scopus 로고
    • Mobile learning with a mobile game: design and motivational effects
    • Schwabe, G., & Goth, C. (2005). Mobile learning with a mobile game: design and motivational effects. Journal of Computer Assisted Learning, 21(3), 204-216. doi:10.1111/j.1365-2729.2005.00128.x.
    • (2005) Journal of Computer Assisted Learning , vol.21 , Issue.3 , pp. 204-216
    • Schwabe, G.1    Goth, C.2
  • 73
    • 33846971666 scopus 로고    scopus 로고
    • Paper presented at the IEEE International Workshop on Wireless and Mobile Technologies in Education (WMTE'05).
    • Schwabe, G., & Goth, C. (2005). Navigating and interacting indoors with a mobile learning game. Paper presented at the IEEE International Workshop on Wireless and Mobile Technologies in Education (WMTE'05).
    • (2005) Navigating and interacting indoors with a mobile learning game
    • Schwabe, G.1    Goth, C.2
  • 74
    • 84944954050 scopus 로고    scopus 로고
    • Paper presented at the IEEE 5th International Conference on Advanced Video and Sinal Based Surveillance, Santa Fe, NM.
    • Subramanya, S. R., & Byung, K. L. (2009). Enhancing the User Experience in Mobile Phones. Paper presented at the IEEE 5th International Conference on Advanced Video and Sinal Based Surveillance, Santa Fe, NM.
    • (2009) Enhancing the User Experience in Mobile Phones
    • Subramanya, S.R.1    Byung, K.L.2
  • 76
    • 84944875972 scopus 로고    scopus 로고
    • Retrieved January, 2010
    • UPA. (2005). Usability Body of Knowledge. Retrieved January, 2010, from http://www.usabilitybok. org
    • (2005) Usability Body of Knowledge
  • 77
    • 84944954051 scopus 로고    scopus 로고
    • Paper presented at the Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, Port Elizabeth, South Africa.
    • Van Biljon, J., & Kotze, P. (2007). Modelling the factors that influence mobile phone adoption. Paper presented at the Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, Port Elizabeth, South Africa.
    • (2007) Modelling the factors that influence mobile phone adoption
    • Van Biljon, J.1    Kotze, P.2
  • 79
    • 84944871340 scopus 로고    scopus 로고
    • Funded by the European Union through the 7th Framework Programme (FP7) under grant Retrieved July 2012
    • VOICES. (2011). Voice-based Community-centric mobile Services for social development: Funded by the European Union through the 7th Framework Programme (FP7) under grant Retrieved July 2012, from http://www.mvoices.eu/
    • (2011) Voice-based Community-centric mobile Services for social development
  • 81
    • 78649844545 scopus 로고    scopus 로고
    • Towards innovative design research information systems
    • Wang, S., & Wang, H. (2010). Towards innovative design research information systems. Journal of Computer Information Systems, (Fall): 2010.
    • (2010) Journal of Computer Information Systems , Issue.FALL , pp. 2010
    • Wang, S.1    Wang, H.2
  • 83
    • 85025607158 scopus 로고    scopus 로고
    • A will experience strong Internet growth over the next 5 years
    • World Wide Worx. (2008). A will experience strong Internet growth over the next 5 years. Retrieved from http://colindaniels.co.za/2008/12/04/ sa-will-experience-strong-Internet-growth-overthe- next-5-years-says-goldstuck/
    • (2008)
  • 85
    • 85025652267 scopus 로고    scopus 로고
    • Paper presented at the Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence, Italy
    • Wright, P., & McCarthy, J. (2008). Empathy and experience in HCI. Paper presented at the Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, Florence, Italy.
    • (2008) Empathy and experience in HCI
    • Wright, P.1    McCarthy, J.2
  • 87
    • 85019457296 scopus 로고    scopus 로고
    • Security Analysis of Graphical Passwords over the Alphanumeric Passwords
    • Agarwal, G., Singh, S., & Shukla, R. S. (2010). Security Analysis of Graphical Passwords over the Alphanumeric Passwords. Technology (Elmsford, N.Y.), 1(2), 60-66.
    • (2010) Technology (Elmsford, N.Y.) , vol.1 , Issue.2 , pp. 60-66
    • Agarwal, G.1    Singh, S.2    Shukla, R.S.3
  • 88
    • 85025614322 scopus 로고    scopus 로고
    • Uni-directional Trusted Path - Transaction Confirmation on Just One Device
    • Al, F. A. (2011). Uni-directional Trusted Path - Transaction Confirmation on Just One Device.
    • (2011)
    • Al, F.A.1
  • 89
    • 85025652084 scopus 로고    scopus 로고
    • The Identity Crisis Security, Privacy and Usability Issues in Identity Management
    • Alpár, G., & Johanneke, J. H. (2011). The Identity Crisis Security, Privacy and Usability Issues in Identity Management. Management, 1-15.
    • (2011) Management , pp. 1-15
    • Alpár, G.1    Johanneke, J.H.2
  • 90
    • 85025596685 scopus 로고    scopus 로고
    • Usability and user authentication: pictorial passwords vs. Pin. Discovery.
    • Angeli, A. D., Coventry, L., Johnson, G., & Coutts, M. (2003). Usability and user authentication: pictorial passwords vs. Pin. Discovery.
    • (2003)
    • Angeli, A.D.1    Coventry, L.2    Johnson, G.3    Coutts, M.4
  • 91
    • 49749118680 scopus 로고    scopus 로고
    • Empirical Evaluation of User Experience in Two Adaptive Mobile Application Prototypes
    • PMID:12054902
    • Arhippainen, L., & Tähti, M. (2002). Empirical Evaluation of User Experience in Two Adaptive Mobile Application Prototypes. Methods (San Diego, Calif.), 27-34. PMID:12054902.
    • (2002) Methods (San Diego, Calif.) , pp. 27-34
    • Arhippainen, L.1    Tähti, M.2
  • 94
    • 84944954057 scopus 로고    scopus 로고
    • Audience Segregation in Social Network Sites
    • 216483
    • Berg, B. V. D. (2013). Audience Segregation in Social Network Sites. Collections, 216483.
    • (2013) Collections
    • Berg, B.V.D.1
  • 96
    • 84944954058 scopus 로고    scopus 로고
    • A Multi- Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation Categories and Subject Descriptors. Security.
    • Bicakci, K., & Oorschot, P. C. V. (2010). A Multi- Word Password Proposal (gridWord) and Exploring Questions about Science in Security Research and Usable Security Evaluation Categories and Subject Descriptors. Security.
    • (2010)
    • Bicakci, K.1    Oorschot, P.C.V.2
  • 98
    • 77953111892 scopus 로고    scopus 로고
    • Graphical Passwords: Learning from the First Generation
    • Biddle, R., Chiasson, S., & Oorschot, P. C. V. (2009). Graphical Passwords: Learning from the First Generation. Computer, 1-20.
    • (2009) Computer , pp. 1-20
    • Biddle, R.1    Chiasson, S.2    Oorschot, P.C.V.3
  • 101
    • 84944954059 scopus 로고    scopus 로고
    • A Microsoft Perspective on Anonymous Credentials, (June).
    • Bjones, R. (2010). A Microsoft Perspective on Anonymous Credentials, (June).
    • (2010)
    • Bjones, R.1
  • 102
    • 84865458860 scopus 로고    scopus 로고
    • Privacy 3.0:= Data Minimization + User Control + Contextual Integrity
    • Borcea-Pfitzmann, K., Pfitzmann, A., & Berg, M. (2011). Privacy 3.0:= Data Minimization + User Control + Contextual Integrity. it - Information Technology, 53(1), 34-40. doi:10.1524/itit.2011.0622
    • (2011) It - Information Technology , vol.53 , Issue.1 , pp. 34-40
    • Borcea-Pfitzmann, K.1    Pfitzmann, A.2    Berg, M.3
  • 103
    • 84944954060 scopus 로고    scopus 로고
    • Mobile User Experience in an Mlearning Environment. October.
    • Botha, Adele, Box, P. O., & Greunen, D. V. (2010). Mobile User Experience in an Mlearning Environment. October.
    • (2010)
    • Botha Adele Box, P.O.1    Greunen, D.V.2
  • 104
  • 105
    • 84944903390 scopus 로고    scopus 로고
    • Mobile User Experience for Voice Services: A Theoretical Framework
    • V. Kumas & Jokob Svensson (Eds.), New Delhi: Karlstad University
    • Botha, A., Calteaux, K., Herselman, M., Grover, A. S., & Barnard, E. (2012). Mobile User Experience for Voice Services: A Theoretical Framework. In V. Kumas & Jokob Svensson (Eds.), M4D2012 (pp. 1-10). New Delhi: Karlstad University.
    • (2012) M4D2012 , pp. 1-10
    • Botha, A.1    Calteaux, K.2    Herselman, M.3    Grover, A.S.4    Barnard, E.5
  • 106
    • 85025707834 scopus 로고    scopus 로고
    • Evaluating the usability and security of a graphical one- time PIN system
    • Brostoff, S., Inglesant, P., & Sasse, M. A. (2010). Evaluating the usability and security of a graphical one- time PIN system. Human Factors.
    • (2010) Human Factors
    • Brostoff, S.1    Inglesant, P.2    Sasse, M.A.3
  • 108
    • 70350567265 scopus 로고    scopus 로고
    • User interface design affects security: Patterns in click-based graphical passwords
    • Chiasson, S., Forget, A., & Biddle, R. (2009). User interface design affects security: Patterns in click-based graphical passwords., 387-398. doi:10.1007/s10207-009-0080-7.S.
    • (2009) , pp. 387-398
    • Chiasson, S.1    Forget, A.2    Biddle, R.3
  • 111
    • 85025632723 scopus 로고    scopus 로고
    • Identity Management: Multiple Presentations of Self in Facebook
    • Dimicco, J. M., & Millen, D. R. (2007). Identity Management: Multiple Presentations of Self in Facebook. Managing, 0-3.
    • (2007) Managing, 0-3
    • Dimicco, J.M.1    Millen, D.R.2
  • 112
    • 85025584587 scopus 로고    scopus 로고
    • Towards "Guardian Angels" and Improved Mobile User Experience
    • Falchuk, B., & Loeb, S. (2008). Towards "Guardian Angels" and Improved Mobile User Experience. Communicatio Socialis, 1-5.
    • (2008) Communicatio Socialis , pp. 1-5
    • Falchuk, B.1    Loeb, S.2
  • 113
    • 65449176884 scopus 로고    scopus 로고
    • Measuring User Experience - Complementing Qualitative and Quantitative Assessment
    • Fehnert, B. (2008). Measuring User Experience - Complementing Qualitative and Quantitative Assessment. Strategy, 383-386.
    • (2008) Strategy , pp. 383-386
    • Fehnert, B.1
  • 114
    • 34548086500 scopus 로고    scopus 로고
    • Spoof Attacks on Gait Authentication System
    • Gafurov, D., Snekkenes, E., & Bours, P. (2007). Spoof Attacks on Gait Authentication System. Performance Evaluation, 2(3), 491-502.
    • (2007) Performance Evaluation , vol.2 , Issue.3 , pp. 491-502
    • Gafurov, D.1    Snekkenes, E.2    Bours, P.3
  • 115
    • 85025586132 scopus 로고    scopus 로고
    • A New Graphical Password Scheme Resistant to Shoulder- Surfing
    • Gao, H., Ren, Z., & Chang, X. (n.d.). A New Graphical Password Scheme Resistant to Shoulder- Surfing. Methodology.
    • Methodology
    • Gao, H.1    Ren, Z.2    Chang, X.3
  • 117
    • 84969251489 scopus 로고    scopus 로고
    • A persistent data tracking mechanism for user-centric identity governance
    • Gomi, H. (2010). A persistent data tracking mechanism for user-centric identity governance. Identity in the Information Society, 3(3), 639-656. doi:10.1007/s12394-010-0069-4.
    • (2010) Identity in the Information Society , vol.3 , Issue.3 , pp. 639-656
    • Gomi, H.1
  • 118
    • 1342344817 scopus 로고    scopus 로고
    • No wires attached: Usability challenges in the connected mobile world
    • Gorlenko, L., & Merrick, R. (2003). No wires attached: Usability challenges in the connected mobile world. IBM Systems Journal, 42(4), 639-651. doi:10.1147/sj.424.0639.
    • (2003) IBM Systems Journal , vol.42 , Issue.4 , pp. 639-651
    • Gorlenko, L.1    Merrick, R.2
  • 121
    • 34547314359 scopus 로고    scopus 로고
    • Institutionalizing Mobile User Experience: Key Success Factors, Strategic Positioning, and Sustainable Organisational Implementations
    • Herrmann, T., Kg, C., & Tscheligi, M. (2006). Institutionalizing Mobile User Experience: Key Success Factors, Strategic Positioning, and Sustainable Organisational Implementations. History (Historical Association (Great Britain)), 285-286.
    • (2006) History (Historical Association (Great Britain)) , pp. 285-286
    • Herrmann, T.1    Kg, C.2    Tscheligi, M.3
  • 123
    • 85025593433 scopus 로고    scopus 로고
    • Secure Identity Management and Mobile Payments
    • Hypponen, K. (2009). Secure Identity Management and Mobile Payments. Computer.
    • (2009) Computer
    • Hypponen, K.1
  • 124
    • 78650985208 scopus 로고    scopus 로고
    • User Centric Identity Management
    • Jøsang, A., & Pope, S. (2005). User Centric Identity Management. Identity, 1-13.
    • (2005) Identity , pp. 1-13
    • Jøsang, A.1    Pope, S.2
  • 126
    • 63049128306 scopus 로고    scopus 로고
    • Designing for User Experience: What to Expect from Mobile 3D TV and Video?
    • Jumisko-pyykkö, S. (2008). Designing for User Experience: What to Expect from Mobile 3D TV and Video? System, 183-192.
    • (2008) System , pp. 183-192
    • Jumisko-pyykkö, S.1
  • 128
    • 84883209487 scopus 로고    scopus 로고
    • A Graphical Password Based System for Small Mobile Devices
    • Khan, W. Z., Aalsalem, M. Y., & Xiang, Y. (2011). A Graphical Password Based System for Small Mobile Devices. Journal of Computer Science, 8(5), 145-154.
    • (2011) Journal of Computer Science , vol.8 , Issue.5 , pp. 145-154
    • Khan, W.Z.1    Aalsalem, M.Y.2    Xiang, Y.3
  • 129
    • 85025612813 scopus 로고    scopus 로고
    • Increasing security and privacy in usercentric Identity Management: The IdM card approach
    • Marx, R., Fhom, H. S., Bayarou, K. M., & Pérez, A. (n.d.). Increasing security and privacy in usercentric Identity Management: The IdM card approach. Preservation.
    • Preservation
    • Marx, R.1    Fhom, H.S.2    Bayarou, K.M.3    Pérez, A.4
  • 131
    • 85025667646 scopus 로고    scopus 로고
    • A study on memorability and shoulder-surfing robustness of graphical password using dwt-based image blending. Graduate School of Engineering, Utsunomiya University, * 2 Faculty of Engineering, Utsunomiya University
    • Miyachi, T., Takahashi, K., Hasegawa, M., Tanaka, Y., & Kato, S. (n.d.). A study on memorability and shoulder-surfing robustness of graphical password using dwt-based image blending. Graduate School of Engineering, Utsunomiya University, * 2 Faculty of Engineering, Utsunomiya University. Names, 4-7.
    • Names , pp. 4-7
    • Miyachi, T.1    Takahashi, K.2    Hasegawa, M.3    Tanaka, Y.4    Kato, S.5
  • 132
    • 35348895703 scopus 로고    scopus 로고
    • Pictures at the ATM: Exploring the usability of multiple graphical passwords
    • PMID:19526065
    • Moncur, W. (2007). Pictures at the ATM: Exploring the usability of multiple graphical passwords. Computing. PMID:19526065.
    • (2007) Computing
    • Moncur, W.1
  • 133
    • 77957963111 scopus 로고    scopus 로고
    • TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on
    • Nauman, M., & Ali, T. (2010). TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on, 286-297.
    • (2010) , pp. 286-297
    • Nauman, M.1    Ali, T.2
  • 134
    • 84944954071 scopus 로고    scopus 로고
    • Assisted Social Identity Management Enhancing Privacy in the Social Web
    • (February)
    • Netter, M., Riesner, M., & Pernul, G. (2011). Assisted Social Identity Management Enhancing Privacy in the Social Web. Media, (February).
    • (2011) Media
    • Netter, M.1    Riesner, M.2    Pernul, G.3
  • 135
    • 85025607590 scopus 로고    scopus 로고
    • Mobile Web 2009 = Desktop Web Usability Varies by Mobile Device Category
    • Nielsen, J. (2010). Mobile Web 2009 = Desktop Web Usability Varies by Mobile Device Category. Test, 1998, 1-4.
    • (2010) Test , vol.1998 , pp. 1-4
    • Nielsen, J.1
  • 137
    • 70349186797 scopus 로고    scopus 로고
    • User Experience Evaluation - Do You Know Which Method to Use?
    • Obrist, M. (2009). User Experience Evaluation - Do You Know Which Method to Use? Evaluation, 2763-2766.
    • (2009) Evaluation , pp. 2763-2766
    • Obrist, M.1
  • 139
    • 85025647278 scopus 로고    scopus 로고
    • Purely Automated Attacks on PassPoints- Style Graphical Passwords
    • Oorschot, P. C. V., Salehi-abari, A., & Thorpe, J. (n.d.). Purely Automated Attacks on PassPoints- Style Graphical Passwords. Computer, 1-13.
    • Computer , pp. 1-13
    • Oorschot, P.C.V.1    Salehi-abari, A.2    Thorpe, J.3
  • 140
    • 78651555609 scopus 로고    scopus 로고
    • An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices
    • Paci, F., Bertino, E., Kerr, S., Squicciarini, A., & Woo, J. (2009a). An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices, 4(7), 696-706. doi:10.4304/jsw.4.7.696-706
    • (2009) , vol.4 , Issue.7 , pp. 696-706
    • Paci, F.1    Bertino, E.2    Kerr, S.3    Squicciarini, A.4    Woo, J.5
  • 141
    • 78651555609 scopus 로고    scopus 로고
    • An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices
    • Paci, F., Bertino, E., Kerr, S., Squicciarini, A., & Woo, J. (2009b). An Overview of VeryIDX - A Privacy-Preserving Digital Identity Management System for Mobile Devices, 4(7), 696-706. doi:10.4304/jsw.4.7.696-706
    • (2009) , vol.4 , Issue.7 , pp. 696-706
    • Paci, F.1    Bertino, E.2    Kerr, S.3    Squicciarini, A.4    Woo, J.5
  • 142
    • 70349497461 scopus 로고    scopus 로고
    • VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices
    • 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware
    • Paci, F., Shang, N., Steuer, K., Jr., Fernando, R., & Bertino, E. (2009). VeryIDX - A Privacy Preserving Digital Identity Management System for Mobile Devices. 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, 367-368. doi:10.1109/ MDM.2009.55
    • (2009) , pp. 367-368
    • Paci, F.1    Shang, N.2    Steuer, K.3    Fernando, R.4    Bertino, E.5
  • 143
    • 85025702657 scopus 로고    scopus 로고
    • Odour User Interface for Authentication: Possibility and Acceptance: Case Study
    • Rashed, A. (2010). Odour User Interface for Authentication: Possibility and Acceptance: Case Study. Computer, I, 19-22.
    • (2010) Computer , vol.1 , pp. 19-22
    • Rashed, A.1
  • 145
    • 85025620129 scopus 로고    scopus 로고
    • Identities in the Future Internet of Things
    • Sarma, A., & Girão, J. (n.d.). Identities in the Future Internet of Things. Management, 1-9.
    • Management , pp. 1-9
    • Sarma, A.1    Girão, J.2
  • 148
    • 84944954075 scopus 로고    scopus 로고
    • Personas: Beyond Identity Protection by Information Control A Report to the Privacy Commissioner of Canada
    • (April)
    • Skillicorn, D. B., & Hussain, M. (2009). Personas: Beyond Identity Protection by Information Control A Report to the Privacy Commissioner of Canada. Identities, (April).
    • (2009) Identities
    • Skillicorn, D.B.1    Hussain, M.2
  • 150
    • 84944954076 scopus 로고    scopus 로고
    • User Experience in Mobile Phones
    • (Abingdon)
    • Subramanya, S. R., & Yi, B. K. (n.d.). User Experience in Mobile Phones. Innovation (Abingdon).
    • Innovation
    • Subramanya, S.R.1    Yi, B.K.2
  • 153
    • 79953062308 scopus 로고    scopus 로고
    • Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
    • Ulltveit-Moe, N., Oleshchuk, V. A., & Køien, G. M. (2010). Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context. Wireless Personal Communications, 57(3), 317-338. doi:10.1007/s11277-010-0069-6.
    • (2010) Wireless Personal Communications , vol.57 , Issue.3 , pp. 317-338
    • Ulltveit-Moe, N.1    Oleshchuk, V.A.2    Køien, G.M.3
  • 156
    • 85025604038 scopus 로고    scopus 로고
    • Security Levels for Web Authentication using Mobile Phones
    • Vapen, A., & Shahmehri, N. (n.d.). Security Levels for Web Authentication using Mobile Phones. Security.
    • Security
    • Vapen, A.1    Shahmehri, N.2
  • 158
    • 85025627760 scopus 로고    scopus 로고
    • Shoulder Surfing Defence for Recallbased Graphical Passwords
    • Zakaria, N. H., Griffiths, D., Brostoff, S., & Yan, J. (2011). Shoulder Surfing Defence for Recallbased Graphical Passwords. Techniques, 1-12.
    • (2011) Techniques , pp. 1-12
    • Zakaria, N.H.1    Griffiths, D.2    Brostoff, S.3    Yan, J.4
  • 159
    • 79955995146 scopus 로고    scopus 로고
    • Shoulder Surfing attack in graphical password authentication
    • Zakaria, O. B. I. N. (2009). Shoulder Surfing attack in graphical password authentication. Journal of Computer Science, 6(2), 145-154.
    • (2009) Journal of Computer Science , vol.6 , Issue.2 , pp. 145-154
    • Zakaria, O.B.I.N.1
  • 161
    • 72749107537 scopus 로고    scopus 로고
    • Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments
    • Zhu, F., Carpenter, S., Kulkarni, A., Chidambaram, C., & Pathak, S. (n.d.). Understanding and Minimizing Identity Exposure in Ubiquitous Computing Environments, 1-10.
    • Zhu, F.1    Carpenter, S.2    Kulkarni, A.3    Chidambaram, C.4    Pathak, S.5
  • 162
    • 84944954081 scopus 로고    scopus 로고
    • Usability and Privacy in Identity Management Architectures
    • Cambridge, England
    • Zomai, M. A. (n.d.). Usability and Privacy in Identity Management Architectures. Reproduction (Cambridge, England).
    • Reproduction
    • Zomai, M.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.