Videos with tag comp648
Results 1-4 of 4
 
27:09
27:09
27:09

Initial Framework and Analysis for SaaS Companies Entering Foreign Markets

The problem understudy is the lack of a fundamental framework that SaaS model companies can use when entering foreign markets to evaluate the challenges and how they impact system design and user interaction. The motivation for the study comes after discovering in TMA2 that the primary research was around general regulation and integration challenges but was never quantifiable or compared to user acquisition and conversion opportunities as well as impact on system design. The proposed solution, establishes a high level framework that enables a SaaS company to evaluate entering a foreign market based on user growth projections, system design and its impact on users. The evaluation of the solution was done by having a person run through three scenarios with a different interface interaction and testing their system tolerance. The results of the research present an initial framework that contributes by showing that country specific challenges impact the end users.

Added: 653 days ago by amdivani23

Views: 594 | Comments: 0 | Not yet rated

 
20:46
20:46
20:46

Designing Internet-Based Payment Systems: Guidelines and Empirical Basis

D. Abrazhevich, P. Markopoulos, M. Rauterberg. “Designing Internet-Based Payment Systems: Guidelines and Empirical Basis”. Human-Computer Interaction, vol. 24, pp. 408-443, 2009.

Added: 710 days ago by amdivani

Views: 253 | Comments: 0 | Not yet rated

 
12:04
12:04
12:04

TMA 4 Presentation: Social Computing Privacy and Security

Computer and human interaction has evolved and reached new levels with the advent of social networks and social computing. This paper investigates challenges with social computing, particularly technical challenges around the collection and management of data, security and privacy and mobile social computing. The number of users of social computing systems has grown exponentially and managing all the data produced by all the users presents a monumental infrastructure challenge. Social computing organizations have deployed hundreds of thousands of servers to safely store and quickly retrieve data. Privacy and security manifest themselves in many different ways, a level of confidence in the organizations handling of private data is necessary to attract users. Organizations user privacy policy set the legal limits to what and organization intends and is allowed to do with a users private info. Additionally an organization needs to protect the datas confidentiality, availability and integrity from malicious hackers. Finally and organization needs to protect users from other users, mainly minor or vulnerable users from predators and bullies. Finally there is the challenge of mobile computing which introduces an extra dimension of physical space in addition to the time and content of all users data. With mobile computing users content is superimposed with time and space factors that draws a complete picture of a users activities and the organization now needs to handle that extra dimension in all its system design, data management, and privacy challenges.

Added: 1508 days ago by wchannaa

Views: 38268 | Comments: 0 | Not yet rated

 
00:00
00:00
00:00

Practices in creating videos with mobile phones

Puikkonen, A., Häkkilä, J., Ballagas, R., Mäntyjärvi, J., Practices in creating videos with mobile phones, Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services, September 15-18, 2009, Bonn, Germany  [doi>10.1145/1613858.1613862]

Added: 2313 days ago by buturab

Views: 3900 | Comments: 0 | Not yet rated