Modelling E-Commerce Systems Quality with Belief Networks
|
|
- Shona Blake
- 5 years ago
- Views:
Transcription
1 VECIMS International Symposium on Virtual Environments, Human-Computer Interfaces, and Measurement Systems Lugano, Switzerland, July 2003 Modelling E-Commerce Systems Quality with Belief Networks Antonia Stefani School of Science and Technology Hellenic Open University 16 Sachtouri Str., Patra, GR26222, Greece Phone: Fax: stefani@eap.gr Michalis Xenos School of Science and Technology Hellenic Open University 16 Sachtouri Str., Patra, GR26222, Greece Phone: Fax: xenos@eap.gr Dimitris Stavrinoudis Computer Engineering and Informatics Department Patras University, Rion, GR26500, Greece Phone: Fax: stavrino@ceid.upatras.gr Abstract This paper focuses on quality aspects of e-commerce systems and proposes a method for modelling such systems based on Belief Networks. The paper discusses the theoretical background of the proposed model, as well practical issues arising from its application. The basic notation and concept of Belief Networks is briefly presented, while emphasis is placed on the model s structure and its usage. The presented model can be utilised for assessing the quality of e-commerce systems, as well as for aiding in quality assurance during the design and development phase of such systems I. INTRODUCTION E-commerce is a constantly expanding field. This fact is confirmed by the increasing number of enterprises that invest into the creation of e-commerce systems and the continuous expansion of economic and commercial transactions through the Internet. E-commerce can be defined as follows [1]: sharing business information, maintaining business relationships and conducting business transactions by the means of telecommunication networks. Depending on the type of transactions performed electronically, there are two basic categories of e-commerce systems [2]: Business to Consumer (B2C) and Business-to-Business (B2B). In E-commerce systems, interaction with the end-user is conducted through web-based applications including a human-computer interface. Since all user-system communication is realized based on such interface, it is self evident that the quality of an E-commerce system is directly related to the quality of the human-computer interface through which the end-user interacts with the web-based applications. Usually, end-users value E-commerce systems that are flexible, usable, easily adaptable to their needs and that offer a full range of applications. But how can one evaluate E-commerce systems and define the extent to which they meet end-users requirements? To this end, it is necessary to define what constitutes a high-quality E- commerce system as well as a methodology for evaluating the quality of E-commerce systems [3]. This paper proposes a model based on Bayesian Networks that can be used for assessing the quality of E-commerce systems, as well as defining specific quality requirements during the design process of E-commerce systems. Section 2 discusses quality issues that relate to E-commerce systems characteristics and that formulate the model s background. In section 3 the notation and formation of Belief Networks are described, while section 4 discusses the structure and performance of the proposed model. Section 5 presents the model s use and applicability. Finally, in section 6 conclusions and future work are discussed. II. THE MODEL S THEORETICAL BACKGROUND Most E-commerce systems seek to provide high quality services to the end-users, i.e. the clients, and to this end they include specific applications (modules) so as to meet specific end-user requirements. Examples of such requirements are searching capabilities, flexible navigation or the ability to group goods and applications like search engines, site maps and shopping carts have been developed in order to meet such requirements. Even if the type of applications that an E- commerce system integrates changes in the future, the user requirements relating to the E-commerce system will remain unchanged. It is thus reasonable to conclude that the quality and evaluation methods of E-commerce systems will always be dependant on the quality of similar applications and their ability to meet end-user requirements. Such quality factors should be taken under serious consideration during the development of E-commerce systems. Past approaches about the quality of E-commerce systems are emphasizing on usability standards using techniques like feature inspection methods and collecting data about endusers opinion by questionnaires. These methods provide an important feedback to the researcher and their results can be utilised as a useful background for future work, however, they do not contribute directly to a dynamic model. On the contrary, the importance of the proposed model lies on its dynamic character. In the proposed model the results derived from its application are utilized for the model s constant Corresponding author: Michalis Xenos is IEEE Member since /03/$
2 improvement, thus contributing to a continuous evolvement and upgrading. The proposed model is based on the ISO 9126 quality standard [4]. Specifically, it relies on the set of those quality characteristics and sub-characteristics that are directly related to quality as perceived by the end-users. These quality characteristics are: functionality, usability, reliability and efficiency. The importance of each of the above mentioned quality characteristics depends on each E-commerce system s specificities as well as the user requirements and developer priorities for the specific system. It should be mentioned that the development of the proposed model was mainly based on Business to Consumer (B2C) systems. III. BELIEF NETWORKS The proposed model is based on the notation and formation of Causal Probabilistic Networks, also called Belief Networks (BN) and Bayesian Networks [5, 6]. The mathematic model on which Bayesian Networks are based is the theorem developed by the mathematician and theologian Thomas Bayes. The BN are a special category of graphic models where nodes represent variables and the directed arrows the relations between them. Therefore, a BN is a graphic network that describes the relations of probabilities between the variables [7]. B b1 b2 A a1 a2 a3 C Fig. 1. A simple Bayesian Network The use of BN not only makes it possible to define the relation between the various nodes (variables), but also to estimate consistently the way in which the initial probabilities influence uncertain conclusions, such as the quality of an e- commerce system. In this case, BN are used for future estimation, or as also called forward prediction. Furthermore, BN can be used to speculate about the states of the initial nodes, based on a given final and some intermediate variables. This is called backward assessment. In order to define the relations between the variables, firstly the dependent probabilities that describe the relations between a child node and its parent nodes must be determined for each node. If the values of each variable are distinct, then the probabilities for each node can be described c1 c2 c3 in a Node Probability Table. This table presents the probability that a child node is assigned a certain value for each combination of possible values of the parent nodes. For example, figure 1 presents two parent nodes (nodes B and C) and one child node (node A). The probability table of node A reflects the probability P(A B,C) for all possible combinations of A, B, C. Thus, since there are two possible states for node B (b1, b2) of figure 3, three possible states for node C (c1, c2, c3) and three for node A (a1, a2, a3), then the NPT of node A will include 3*2*3=18 elements. IV. MODEL S DESCRIPTION The philosophy underlying the proposed model is the creation of a dynamic network that concentrates and exploits the knowledge gained from the analysis of data gathered during previous researches and that can also use its own results for future estimations. A graphical presentation of the network is illustrated in Figure 2. The model uses nodes to represent the quality factors, characteristics and sub-characteristics of E-commerce systems. Each node is characterized by a set of possible states called evidence and is connected to its parent nodes by directed arrows. In figure 2 the central node Quality appears in grey. This node represents the E-commerce system quality as a whole and is characterized by three possible states (evidence): good, average, and poor. The parent nodes of quality are the nodes: Functionality, Usability, Reliability and Efficiency, namely the quality factors that end-users value based on ISO These quality factors are marked with bold letters in the corresponding nodes of figure 2 and can also be characterized by three possible states: good, average, and poor. Each quality factor node is connected to the corresponding E-commerce systems quality characteristics, based on ISO 9126, which in turn are assigned three possible states as evidence: good, average, poor. Finally, each of these quality characteristics is connected to a number of child nodes comprising the quality sub-characteristics of E-commerce systems. The evidence in all nodes simply answers the question posed to the user whether a specific characteristic or sub-characteristic exists in the E-commerce system or not. This is a way to minimize subjectivity at this level as much as possible. The model has been developed using the Microsoft MSBNx Authoring and Evaluation tool version An example of the tool s user interface is shown in Figure 3. Each node of the model has a Node Probability Table that presents the discrete conditional probability distribution. This table presents the relations between this node (child node) and its parent nodes. For example, the quality subcharacteristic of Learnability is represented as a child node connected to two parent nodes, as indicated by the directed arrows. Each parent node represents the relevant e-commerce characteristics, namely: Easy help functions and Correct placement of tools. The Learnability node has three 14
3 possible states as evidence and the parent nodes have two states for evidence. The probability table for Learnability has therefore 3*2*2 = 12 elements. One of the most important factors affecting the successful application of the model is the definition of the Node Probability Table of each node. In the Node Probability Table of the quality subcharacteristic Learnability, which is presented in figure 3, the values of the probabilities vary between 0 to 1, scaling by The probabilities of the model are based on data taken from previous studies of E-commerce systems [8]. Correct Place. Tools Text Format Altern. Search Engine Timelin. Return Check out FAQ Access. Dissabil. Easy Help Function Learnability Product Cataloq. Operability Immed. Adording Understa ndability Cost Analysis Reconnect. Error Recover. Search. Engine / page Shop. cart / list Contact firm Access.T ext Info. Resour. Behavior Usability Colors Discount Offers Thank. Comper. Present. Direct Access Facilit. Freq. Users Time Behavior Broswer Indepen dance Quality User Feedback Efficiency Reliability Maturity Fault Tolerance Attractiveness Multimedia Feel of Security Multim. Present. Interope rability Functio nality Dif. Server Help Function Client Profile Site Map Suitability Multilinqualism Recover ability Undo Function Protect. Per. data Security Accuracy Alternati ve Pres. Trust Secure Payment Search Engine Shop. Cart Shop. List Compera tive Pres. Fig. 2. Graphical presentation of the proposed model 15
4 Fig. 3. Example of a Belief Network The user can insert data (evidence) for one or more nodes. This evidence can activate the conditional probabilities of other nodes and provide an estimation using bar charts. For instance, in figure 3 evidence has been inserted for the parent nodes of Learnability. The corresponding bar chart shows that there is 54% probability that the system s Learnability is good is 54%. Another advantage of the model is that it can utilize the results from its applications in order to improve the accuracy of future measurements. Namely, the results are used for the improvement of the Node Probabilities Tables thus contributing to better accuracy. V. APPLICATION OF THE MODEL The application of the model is based on the input of evidence for some nodes. If no evidence is inserted by the user, the estimations provided by the model are based on previously collected experience of the system, as this has been inserted in the Node Probability Table. New evidence affects the probabilities of the other nodes and the estimation for each node is different. This is shown clearly in the bar charts. The model can be used forwards and backwards. Forward use can be utilized to assess the overall quality of an E- commerce system. In this case, the end-user inserts in each node of the model the available evidence (measures) related to the E-commerce system. The model can then be used to provide an estimation about the system s quality and characterize it as good, average and poor also providing the corresponding probability values. It is worth mentioning that the model can provide estimations even if evidence has not been inserted in all of its nodes. Of course, more evidence inserted into the model improves the results accuracy. In a similar way it is possible to apply the model for obtaining results about only one of the quality factors or quality sub-characteristics. In this case, the estimations of the model can be utilized by E-commerce system developers to assess the importance of the quality sub-characteristics as well as the interaction level between parent nodes and child nodes. For instance, if the developer wants to assess the extent to which characteristics such as search engine, shopping cart, shopping list, alternative presentation methods and comparative presentation of the product affect the system s accuracy, as shown in Figure 4, it is possible to do so by inserting various evidences for each of these characteristics. The different probability values obtained by the application of the model can assist the developer to conclude which system characteristics affect its accuracy more, and based on such conclusions to decide about the type and the number of applications to be developed. 16
5 Fig. 4. Example of forward use of the model On the other hand, backward use of the model provides assessments regarding the intermediate nodes, when the value of the final state of quality is defined. For example, if it is known that the accuracy of an E-commerce system is good and all the other characteristics related to accuracy at the proposed model have low probability, the model would give the result that the probability of an accurate search engine must be at least 85%. This indicates the importance of this characteristic according to the user s demands. Similarly, for a good overall system quality and good system usability the model s probabilities about attractiveness would be 80% for good, 16% for average and 4% for poor. Therefore, in the backward use, inserting evidences concerning the child nodes, enables the model to provide estimations about the corresponding probability values of the parent nodes. It should be stressed that the model does not provide estimations by itself. It builds on the experience of the developer. This experience is based on three components: E- commerce systems applications (modules), end-users demands and quality characteristics. The model s estimations are based on discrete probabilities inserted into each Node Probability Table. Thus, the insertion of new evidence may change the model s estimations. The model s dynamic character is based on the creation of the Node Probability Tables. If the probabilities are based on accurate data that have been systematically collected, the estimation will be accurate. However, even in the case that the data of the Node Probability Tables are not completely accurate, the model can still provide results. It can learn (collect experience) and improve the results it provides. The initial values of the Node Probability Tables have been derived from measures and experiments conducted by the authors. After the initial application of the model and the consequent improvement of the values in the Node Probability Tables, the probability values resulting from the model s application were in agreement with relevant studies of end-users opinions that were conducted using questionnaires. VI. CONCLUSIONS AND FUTURE WORK This paper presented a model applied to assess the quality of E-commerce systems as far as the end-user is concerned. The model does not provide results by itself but is based on end-user s experience and the accuracy of the evidence inserted into it. The model can be utilized as an important tool for the provision of estimations concerning the quality of E- commerce systems under development and can therefore aid developers during the design phase. It can also be used backward for the assessment of already developed E- commerce systems in order to identify problematic or high quality applications (modules). The proposed model is abstract enough so as to provide a general framework for assessment and estimation that can be utilized even if the form of applications comprising an E-Commerce system changes over time. Regarding future work, the authors goal is to provide a model with even lower level of subjectivity. This can be achieved by analysing E-commerce systems characteristics in a way that the user cannot provide estimation but only predefined answers. Furthermore, the nodes that correspond to the E-commerce system characteristics can be further 17
6 analysed into one or two levels. This is a way to improve the model s accuracy even further. REFERENCES [1] V. Ζwass, Electronic commerce: structures and issues". International Journal of Electronic Commerce, Vol. 1, pp. 3 23, [2] H. Chan, R. Lee and T. Dillon, E-Commerce Fundamentals and Applications. John Wiley & Sons, [3] J. Burrows, Information Technology standards in a changing world: the role of the users. Computer standards & Interfaces, Vol. 20, pp , [4] ISO, Information technology - Evaluation of software - Quality characteristics and guides for their use. International Standard: ISO/IEC 9126, [5] F. Jensen, An introduction to Bayesian Networks. UCL Press, [6] S. Lauritzen and J. Spiegelhalter, Local computations with probabilities on graphical structures and their applications to expert systems. Readings in Uncertain Reasoning, San Mateo, California, pp , [7] N. Fenton, P. Krause and M. Neil, Software Measurement Uncentairnty and Causal Modelling. IEEE Software, pp , July/August [8] A. Stefani and M. Xenos, A model for assessing the quality of e- commerce systems. Proceedings of the Panhellenic Conference with International Participation in Human Computer Interaction (PC-HCI 2001), pp ,
Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems
Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems Antonia Stefani, Dimitris Stavrinoudis, Michalis Xenos School of Sciences & Technology,Hellenic Open University,3
More informationE-Commerce System Quality Assessment using a Model based on ISO 9126 and Belief Networks
E-Commerce System Quality Assessment using a Model based on ISO 9126 and Belief Networks Antonia Stefani, Michalis Xenos Hellenic Open University 16 Sachtouri st., GR-26222, Patras, Greece Phone: +30 2610367405
More informationQUALITY ATTRIBUTES OF CONSUMER-BASED M-COMMERCE SYSTEMS
QUALITY ATTRIBUTES OF CONSUMER-BASED M-COMMERCE SYSTEMS John Garofalakis 1,3, Antonia Stefani 2, Vasilios Stefanis 1,3 and Michalis Xenos 2 1 Research Academic Computer Technology Institute, 26500, Patras,
More informationHarmonization of usability measurements in ISO9126 software engineering standards
Harmonization of usability measurements in ISO9126 software engineering standards Laila Cheikhi, Alain Abran and Witold Suryn École de Technologie Supérieure, 1100 Notre-Dame Ouest, Montréal, Canada laila.cheikhi.1@ens.etsmtl.ca,
More informationNektarios Kostaras, Mixalis Xenos. Hellenic Open University, School of Sciences & Technology, Patras, Greece
Kostaras N., Xenos M., Assessing Educational Web-site Usability using Heuristic Evaluation Rules, 11th Panhellenic Conference on Informatics with international participation, Vol. B, pp. 543-550, 18-20
More informationQuality and usability: A new framework
van Veenendaal, E, and McMullan, J (eds) Achieving software product quality, Tutein Nolthenius, Netherlands, 1997 Quality and usability: A new framework Nigel Bevan Usability Services National Physical
More informationQuality Evaluation of Educational Websites Using Heuristic and Laboratory Methods
Quality Evaluation of Educational Websites Using Heuristic and Laboratory Methods Theofanis Papadopoulos, Michalis Xenos Computer Science Course, School of Sciences & Technology, Hellenic Open University
More informationStandard Glossary of Terms used in Software Testing. Version 3.2. Foundation Extension - Usability Terms
Standard Glossary of Terms used in Software Testing Version 3.2 Foundation Extension - Usability Terms International Software Testing Qualifications Board Copyright Notice This document may be copied in
More informationUsability evaluation of e-commerce on B2C websites in China
Available online at www.sciencedirect.com Procedia Engineering 15 (2011) 5299 5304 Advanced in Control Engineering and Information Science Usability evaluation of e-commerce on B2C websites in China Fangyu
More informationTesting the Usability of Visual Languages: A Web-Based Methodology
Testing the Usability of Visual Languages: A Web-Based Methodology Mauro Mosconi Marco Porta Dipartimento di Informatica e Sistemistica Università di Pavia Via Ferrata, 1 27100 Pavia Italy mauro@vision.unipv.it
More informationCOMMON ISSUES AFFECTING SECURITY USABILITY
Evaluating the usability impacts of security interface adjustments in Word 2007 M. Helala 1, S.M.Furnell 1,2 and M.Papadaki 1 1 Centre for Information Security & Network Research, University of Plymouth,
More informationA Study on Website Quality Models
International Journal of Scientific and Research Publications, Volume 4, Issue 12, December 2014 1 A Study on Website Quality Models R.Anusha Department of Information Systems Management, M.O.P Vaishnav
More informationTrust4All: a Trustworthy Middleware Platform for Component Software
Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software
More informationHow to Conduct a Heuristic Evaluation
Page 1 of 9 useit.com Papers and Essays Heuristic Evaluation How to conduct a heuristic evaluation How to Conduct a Heuristic Evaluation by Jakob Nielsen Heuristic evaluation (Nielsen and Molich, 1990;
More information3Lesson 3: Web Project Management Fundamentals Objectives
3Lesson 3: Web Project Management Fundamentals Objectives By the end of this lesson, you will be able to: 1.1.11: Determine site project implementation factors (includes stakeholder input, time frame,
More informationEnhancement of User Experience by Task Analysis:A Proposal
Enhancement of User Experience by Task Analysis:A Proposal Khadija Fyiaz msit09153033@student.uol.edu.pk Aliza Basharat mscs09161007@student.uol.edu.pk Javed Anjum Sheikh Javed.anjum@cs.uol.edu.pk Anam
More informationReport. Conceptual Framework for the DIAMONDS Project. SINTEF ICT Networked Systems and Services SINTEF A Unrestricted
SINTEF A22798- Unrestricted Report Conceptual Framework for the DIAMONDS Project Author(s) Gencer Erdogan, Yan Li, Ragnhild Kobro Runde, Fredrik Seehusen, Ketil Stølen SINTEF ICT Networked Systems and
More informationAddressing Quality Issues: Theory and Practice A Case Study on a Typical Software Project
Addressing Quality Issues: Theory and Practice A Case Study on a Typical Software Project Michalis Nik. XENOS Computer Technology Institute and Hellenic Open University Tel: +3061 361490, Fax: +3061 361410
More informationEvaluation and Design Issues of Nordic DC Metadata Creation Tool
Evaluation and Design Issues of Nordic DC Metadata Creation Tool Preben Hansen SICS Swedish Institute of computer Science Box 1264, SE-164 29 Kista, Sweden preben@sics.se Abstract This paper presents results
More informationHOMEPAGE USABILITY: MULTIPLE CASE STUDIES OF TOP 5 IPTA S HOMEPAGE IN MALAYSIA Ahmad Khairul Azizi Ahmad 1 UniversitiTeknologi MARA 1
HOMEPAGE USABILITY: MULTIPLE CASE STUDIES OF TOP 5 IPTA S HOMEPAGE IN MALAYSIA Ahmad Khairul Azizi Ahmad 1 UniversitiTeknologi MARA 1 khairulazizi@perak.uitm.edu.my Anwar Fikri Abdullah 2 UniversitiTeknologi
More informationConcepts of Usability. Usability Testing. Usability concept ISO/IS What is context? What is context? What is usability? How to measure it?
Concepts of Usability Usability Testing What is usability? How to measure it? Fang Chen ISO/IS 9241 Usability concept The extent to which a product can be used by specified users to achieve specified goals
More informationUsability evaluation of software applications with the use of Usability Logger
Usability evaluation of software applications with the use of Usability Logger Nektarios KOSTARAS a, Michalis XENOS a,1 and Christos KOUTSOGIANNIS a a School of Sciences and Technology, Hellenic Open University,
More information2/18/2009. Introducing Interactive Systems Design and Evaluation: Usability and Users First. Outlines. What is an interactive system
Introducing Interactive Systems Design and Evaluation: Usability and Users First Ahmed Seffah Human-Centered Software Engineering Group Department of Computer Science and Software Engineering Concordia
More informationEfficient Bayesian network modeling of systems
Appeared in: Reliability Engineering & System Safety, 03, : 00 3. Efficient Bayesian network modeling of systems Michelle Bensi *, Armen Der Kiureghian and Daniel Straub 3 U.S. Nuclear Regulatory Commission,
More informationARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE?
ARE LARGE-SCALE AUTONOMOUS NETWORKS UNMANAGEABLE? Motivation, Approach, and Research Agenda Rolf Stadler and Gunnar Karlsson KTH, Royal Institute of Technology 164 40 Stockholm-Kista, Sweden {stadler,gk}@imit.kth.se
More informationTable of Contents. I) Project Planning. User Analysis. III) Tasks Analysis. IV) Storyboard. V) Function Design. VI) Scenario Design.
FINAL REPORT Table of Contents I) Project Planning II) User Analysis III) Tasks Analysis IV) Storyboard V) Function Design VI) Scenario Design VII) Database VIII) Usability Questionnaire IX) System Version
More informationUsability Evaluation as a Component of the OPEN Development Framework
Usability Evaluation as a Component of the OPEN Development Framework John Eklund Access Testing Centre and The University of Sydney 112 Alexander Street, Crows Nest NSW 2065 Australia johne@testingcentre.com
More informationLOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING
LOGICAL OPERATOR USAGE IN STRUCTURAL MODELLING Ieva Zeltmate (a) (a) Riga Technical University, Faculty of Computer Science and Information Technology Department of System Theory and Design ieva.zeltmate@gmail.com
More informationHybrid Feature Selection for Modeling Intrusion Detection Systems
Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,
More informationA New Approach For Convert Multiply-Connected Trees in Bayesian networks
A New Approach For Convert Multiply-Connected Trees in Bayesian networks 1 Hussein Baloochian, Alireza khantimoory, 2 Saeed Balochian 1 Islamic Azad university branch of zanjan 2 Islamic Azad university
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 25045 First edition 2010-09-01 Systems and software engineering Systems and software Quality Requirements and Evaluation (SQuaRE) Evaluation module for recoverability Ingénierie
More informationCyber Risk Metrics Survey, Assessment, and Implementation Plan May 11, 2018
Cyber Risk Metrics Survey, Assessment, and Implementation Plan May 11, 2018 The Homeland Security Systems Engineering and Development Institute (HSSEDI ) is a trademark of the U.S. Department of Homeland
More informationApplying Human-Centered Design Process to SystemDirector Enterprise Development Methodology
Applying Human-Centered Design Process to SystemDirector Enterprise Development HIRAMATSU Takeshi, FUKUZUMI Shin ichi Abstract Human-centered design process is specified in ISO13407 international standard,
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Information security risk management
INTERNATIONAL STANDARD ISO/IEC 27005 First edition 2008-06-15 Information technology Security techniques Information security risk management Technologies de l'information Techniques de sécurité Gestion
More informationAn Integrated Measurement Model for Evaluating Usability Attributes
An Integrated Measurement Model for Evaluating Usability Attributes Lina A. Hasan Hashemite University Software Engineering Department Zarqa 13113, Jordan P.O.Box 33127, 00962-795498724 lina_hasan@itc.hu.edu.jo
More informationAv. Prof. Mello Moraes, 2231, , São Paulo, SP - Brazil
" Generalizing Variable Elimination in Bayesian Networks FABIO GAGLIARDI COZMAN Escola Politécnica, University of São Paulo Av Prof Mello Moraes, 31, 05508-900, São Paulo, SP - Brazil fgcozman@uspbr Abstract
More informationISO/IEC INTERNATIONAL STANDARD. Software engineering Product evaluation Part 3: Process for developers
INTERNATIONAL STANDARD ISO/IEC 14598-3 First edition 2000-02-01 Software engineering Product evaluation Part 3: Process for developers Ingénierie du logiciel Évaluation du produit Partie 3: Procédés pour
More informationNATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -
NATIONAL CYBER SECURITY STRATEGY - Version 2.0 - CONTENTS SUMMARY... 3 1 INTRODUCTION... 4 2 GENERAL PRINCIPLES AND OBJECTIVES... 5 3 ACTION FRAMEWORK STRATEGIC OBJECTIVES... 6 3.1 Determining the stakeholders
More informationUser-Driven Usability Assessment of Internet Maps
User-Driven Usability Assessment of Internet Maps Andrius Balciunas* * Andrius.Balciunas@gf.vu.lt. Vilnius University, Centre for cartography Vilnius, Lithuania. Abstract. This paper describes problematic
More informationForecasting Technology Insertion Concurrent with Design Refresh Planning for COTS-Based Electronic Systems
Forecasting Technology Insertion Concurrent with Design Refresh Planning for COTS-Based Electronic Systems Peter Sandborn and Pameet Singh CALCE, Dept. of Mechanical Engineering, University of Maryland
More informationData Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005
Data Mining with Oracle 10g using Clustering and Classification Algorithms Nhamo Mdzingwa September 25, 2005 Abstract Deciding on which algorithm to use, in terms of which is the most effective and accurate
More informationAn Introduction to Human Computer Interaction
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationAN RT-UML MODEL FOR BUILDING FASTER-THAN-REAL-TIME SIMULATORS
AN RT-UML MODEL FOR BUILDING FASTER-THAN-REAL-TIME SIMULATORS Dimosthenis Anagnostopoulos 1, Vassilis Dalakas 2, Georgios-Dimitrios Kapos 1, Mara Nikolaidou 2 1 Harokopio University of Athens, 70 El. Venizelou
More informationTaccumulation of the social network data has raised
International Journal of Advanced Research in Social Sciences, Environmental Studies & Technology Hard Print: 2536-6505 Online: 2536-6513 September, 2016 Vol. 2, No. 1 Review Social Network Analysis and
More informationFoundation Level Syllabus Usability Tester Sample Exam
Foundation Level Syllabus Usability Tester Sample Exam Version 2017 Provided by German Testing Board Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged.
More informationA Framework for Securing Databases from Intrusion Threats
A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:
More informationUser Centered Design (UCD)
User Centered Design (UCD) User Centered Design (UCD) introduction defining UCD usability characteristics of UCD UCD activities Introduction The primary aim of the process of design and implementation
More informationM150 -B / Unit 12. By Wawi. A good user interface design enables the user to effectively interact with the system and perform his tasks.
A good user interface design enables the user to effectively interact with the system and perform his tasks. (True) HCI: (Human-Computer Interaction) is the study of how humans interact with computers
More informationFeature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process
Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process KITTISAK KERDPRASOP and NITTAYA KERDPRASOP Data Engineering Research Unit, School of Computer Engineering, Suranaree
More informationAn Approach to Software Component Specification
Page 1 of 5 An Approach to Software Component Specification Jun Han Peninsula School of Computing and Information Technology Monash University, Melbourne, Australia Abstract. Current models for software
More informationTraffic Analysis on Business-to-Business Websites. Masterarbeit
Traffic Analysis on Business-to-Business Websites Masterarbeit zur Erlangung des akademischen Grades Master of Science (M. Sc.) im Studiengang Wirtschaftswissenschaft der Wirtschaftswissenschaftlichen
More informationMultiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku
Multiple Constraint Satisfaction by Belief Propagation: An Example Using Sudoku Todd K. Moon and Jacob H. Gunther Utah State University Abstract The popular Sudoku puzzle bears structural resemblance to
More informationEvaluating the Use of Domain-Specific Modeling in Practice
Juha Kärnä Polar Electro Professorintie 5 FI-90440 Kempele, Finland +358 8 5202 100 Juha.Karna@polar.fi Evaluating the Use of Domain-Specific Modeling in Practice Juha-Pekka Tolvanen MetaCase Ylistönmäentie
More informationA Novel Website Quality and Usability Evaluation Framework for Online Shopping Websites
Indian Journal of Science and Technology, Vol 9(36), DOI: 10.17485/ijst/2016/v9i36/93821, September 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Novel Website Quality and Usability Evaluation
More informationABSTRACT 1. INTRODUCTION
ABSTRACT A Framework for Multi-Agent Multimedia Indexing Bernard Merialdo Multimedia Communications Department Institut Eurecom BP 193, 06904 Sophia-Antipolis, France merialdo@eurecom.fr March 31st, 1995
More informationComparative Study of Software Quality Attributes in Perspective of Usability with Generalized Classification
International Journal of ISSN 0974-2107 Systems and Technologies Vol.3, No.2, pp 241-254 IJST KLEF 2010 Comparative Study of Software Quality Attributes in Perspective of Usability with Generalized Classification
More informationhttp://www.sis.se http://www.sis.se http://www.sis.se http://www.sis.se http://www.sis.se Provläsningsexemplar / Preview SVENSK STANDARD SS-ISO/IEC 14598-1 Fastställd 2003-01-31 Utgåva 1 Information technology
More informationISO TC46/SC11 Archives/records management
ISO TC46/SC11 Archives/records management GUIDANCE FOR IMPLEMENTING DOCUMENTED INFORMATION CLAUSE USING PROCESSES AND CONTROLS OF ISO 30301:2011 Management system for records EXPLANATORY PAPER NOVEMBER
More informationEnhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques
24 Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Enhancing Forecasting Performance of Naïve-Bayes Classifiers with Discretization Techniques Ruxandra PETRE
More informationCognitive Analysis of Software Interfaces
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Cognitive Analysis of Software Interfaces B.Venkata Raju, Ph.D Scholar, Reg.No.2004199506
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationGOMS Lorin Hochstein October 2002
Overview GOMS Lorin Hochstein lorin@cs.umd.edu October 2002 GOMS is a modeling technique (more specifically, a family of modeling techniques) that analyzes the user complexity of interactive systems. It
More informationOntology based Model and Procedure Creation for Topic Analysis in Chinese Language
Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Dong Han and Kilian Stoffel Information Management Institute, University of Neuchâtel Pierre-à-Mazel 7, CH-2000 Neuchâtel,
More informationISO/IEC TR TECHNICAL REPORT
TECHNICAL REPORT ISO/IEC TR 15443-3 First edition 2007-12-15 Information technology Security techniques A framework for IT security assurance Part 3: Analysis of assurance methods Technologies de l'information
More informationN2416R. Software engineering Product quality Part 3: Internal metrics ISO/IEC JTC1 /SC7 ISO/IEC JTC1/SC7. Software Engineering
ISO/IEC JTC1/SC7 Software Engineering Secretariat: CANADA (SCC) ISO/IEC JTC1 /SC7 N2416R Date: 2002-03-15 Reference number of document: ISO/IEC TR 9126-3 Committee identification: ISO/IEC JTC1 /SC 7/WG
More information4.2.2 Usability. 4 Medical software from the idea to the finished product. Figure 4.3 Verification/validation of the usability, SW = software
4.2.2 Usability Intended purpose, Market Validation Usability Usability Risk analysis and measures Specification of the overall system SW SW architecture/ of SW SW design Software design & integration
More informationDiversity Coloring for Distributed Storage in Mobile Networks
Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring
More informationThis is a preview - click here to buy the full publication GUIDE 51. Safety aspects Guidelines for their inclusion in standards. Second edition 1999
This is a preview - click here to buy the full publication GUIDE 51 Safety aspects Guidelines for their inclusion in standards Second edition 1999 ISO/IEC 1999 ISO/IEC GUIDE 51:1999(E) This is a preview
More informationISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description
INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference
More informationOverview of the course. User-Centred Design. Group. Practical issue. Writting the report. Project work. Fang Chen
Overview of the course User-Centred Design Fang Chen 6 lectures, 3 hr each. L 1: April 6, 9-12, user-centered design concept L2: April 14, 9-12, usability concept L3. user-centered requirement study L4.
More informationHyper Mesh Code analyzer
Hyper Mesh Code analyzer ABSTRACT Hyper Mesh Code Analyzer (HMCA) is a text based programming environment, designed for programmers to write their source code in a more organized and manageable fashion.
More informationOVERVIEW OF SUBJECT REQUIREMENTS
Course Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document is intended as a guide only. Enrolling students
More informationHuman Computer Interaction Lecture 14. HCI in Software Process. HCI in the software process
Human Computer Interaction Lecture 14 HCI in Software Process HCI in the software process Software engineering and the design process for interactive systems Usability engineering Iterative design and
More informationWeb Applications Usability Testing With Task Model Skeletons
Web Applications Usability Testing With Task Model Skeletons Ivo Maly, Zdenek Mikovec, Czech Technical University in Prague, Faculty of Electrical Engineering, Karlovo namesti 13, 121 35 Prague, Czech
More informationHCI in the software process
chapter 6 HCI in the software process HCI in the software process Software engineering and the process for interactive systems Usability engineering Iterative and prototyping Design rationale the software
More informationHCI in the software. chapter 6. HCI in the software process. The waterfall model. the software lifecycle
HCI in the software process chapter 6 HCI in the software process Software engineering and the process for interactive systems Usability engineering Iterative and prototyping Design rationale the software
More informationMultimedia Content Delivery in Mobile Cloud: Quality of Experience model
Multimedia Content Delivery in Mobile Cloud: Quality of Experience model Aleksandar Karadimce Danco Davcev Faculty of Computer Science and Engineering University Ss Cyril and Methodius, Skopje, R. Macedonia
More informationTHE USE OF PARTNERED USABILITY TESTING TO HELP TO IDENTIFY GAPS IN ONLINE WORK FLOW
THE USE OF PARTNERED USABILITY TESTING TO HELP TO IDENTIFY GAPS IN ONLINE WORK FLOW Dianne Davis Fishbone Interactive Gordon Tait Department of Surgery, University of Toronto Cindy Bruce-Barrett Strategic
More informationGUIDELINES ON MARITIME CYBER RISK MANAGEMENT
E 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: +44 (0)20 7735 7611 Fax: +44 (0)20 7587 3210 GUIDELINES ON MARITIME CYBER RISK MANAGEMENT MSC-FAL.1/Circ.3 5 July 2017 1 The Facilitation Committee, at its
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 9594-10 Third edition 2005-12-15 Information technology Open Systems Interconnection The Directory: Use of systems management for administration of the Directory Technologies
More informationEuropean Conference on Quality and Methodology in Official Statistics (Q2008), 8-11, July, 2008, Rome - Italy
European Conference on Quality and Methodology in Official Statistics (Q2008), 8-11, July, 2008, Rome - Italy Metadata Life Cycle Statistics Portugal Isabel Morgado Methodology and Information Systems
More informationThe Impact of Information System Risk Management on the Frequency and Intensity of Security Incidents Original Scientific Paper
The Impact of Information System Risk Management on the Frequency and Intensity of Security Incidents Original Scientific Paper Hrvoje Očevčić Addiko Bank d.d. Slavonska avenija 6, Zagreb, Croatia hrvoje.ocevcic@gmail.com
More informationTrust Services for Electronic Transactions
Trust Services for Electronic Transactions ROUMEN TRIFONOV Faculty of Computer Systems and Control Technical University of Sofia 8 st. Kliment Ohridski bul., 1000 Sofia BULGARIA r_trifonov@tu-sofia.bg
More informationISO/IEC TR TECHNICAL REPORT. Software engineering Product quality Part 4: Quality in use metrics
TECHNICAL REPORT ISO/IEC TR 9126-4 First edition 2004-04-01 Software engineering Product quality Part 4: Quality in use metrics Génie du logiciel Qualité des produits Partie 4: Qualité en métrologie d'usage
More informationIntegrating TEI and EAD
Integrating TEI and EAD Chris Turner LEADERS Project, School of Library, Archive and Information Studies, University College London Linking EAD to Electronically Developing a generic computer-based toolset
More informationHuman Computer Interaction Lecture 06 [ HCI in Software Process ] HCI in the software process
Human Computer Interaction Lecture 06 [ HCI in Software Process ] Imran Ihsan Assistant Professor www.imranihsan.com aucs.imranihsan.com HCI06 - HCI in Software Process 1 HCI in the software process Software
More informationINTEGRATION AND TESTING OF THE WEB BASED SPATIAL DECISION SUPPORT SYSTEM
Annex: 28 INTEGRATION AND TESTING OF THE WEB BASED SPATIAL DECISION SUPPORT SYSTEM Test plan report and procedures 1 SUMMARY 1 OVERALL DESCRIPTION... 3 2 TEST PLAN REPORT AND PROCEDURES... 4 2.1 INTRODUCTION...
More informationFMA901F: Machine Learning Lecture 6: Graphical Models. Cristian Sminchisescu
FMA901F: Machine Learning Lecture 6: Graphical Models Cristian Sminchisescu Graphical Models Provide a simple way to visualize the structure of a probabilistic model and can be used to design and motivate
More informationAn Approach to the Specification of Software Security Patterns
An Approach to the Specification of Software Security Patterns Spyros HALKIDIS, Alexander CHATZIGEORGIOU, George STEPHANIDES Department of Applied Informatics University of Macedonia, Thessaloniki, Greece
More informationKanban Size and its Effect on JIT Production Systems
Kanban Size and its Effect on JIT Production Systems Ing. Olga MAŘÍKOVÁ 1. INTRODUCTION Integrated planning, formation, carrying out and controlling of tangible and with them connected information flows
More informationAn Information Model for Software Quality Measurement with ISO Standards
An Information Model for Software Measurement with ISO Standards Alain Abran École de Technologie Supérieure University of Québec, 1100 Notre -Dame Ouest, Montréal, Québec H3W 1T8, Canada aabran@ele.etsmtl.ca
More informationUser Interface Design
Objective User Interface Design MIT, Walailak University by Dr.Wichian Chutimaskul Understand the principles of user interface (UI) design Understand the process of user interface design To design the
More informationA Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD)
A Consistency Check of Dependability Case (D-case) Produced from Data Flow Diagram (DFD) Nada Olayan 1 and Shuichiro Yamamoto 2 1 Graduate School of Information Sciences, Nagoya University, Nagoya, Aichi,
More informationIntroduction to and calibration of a conceptual LUTI model based on neural networks
Urban Transport 591 Introduction to and calibration of a conceptual LUTI model based on neural networks F. Tillema & M. F. A. M. van Maarseveen Centre for transport studies, Civil Engineering, University
More informationITM DEVELOPMENT (ITMD)
ITM Development (ITMD) 1 ITM DEVELOPMENT (ITMD) ITMD 361 Fundamentals of Web Development This course will cover the creation of Web pages and sites using HTML, CSS, Javascript, jquery, and graphical applications
More informationImproved Bayesian Networks for Software Project Risk Assessment Using Dynamic Discretisation
Improved Bayesian Networks for Software Project Risk Assessment Using Dynamic Discretisation Norman Fenton 1, ukasz Radli ski 2, Martin Neil 3 1,3 Queen Mary, University of London, UK norman@dcs.qmul.ac.uk
More informationQuality in Use: Achieving Stakeholder Needs for Quality
1 Quality in Use: Achieving Stakeholder Needs for Quality Nigel Bevan www.nigelbevan.com nigel@nigelbevan.com Professional Usability Services Nigel Bevan. Reproduction permitted provided the source is
More informationISO/IEC JTC1/SC7 N2228
ISO/IEC JTC1/SC7 Software Engineering Secretariat: CANADA (SCC) ISO/IEC JTC1/SC7 N2228 1999/11/19 Document Type FDIS Ballot Title FDIS 9126-1 Software Engineering - Product quality - Part 1: Quality model.
More informationMPEG-4 AUTHORING TOOL FOR THE COMPOSITION OF 3D AUDIOVISUAL SCENES
MPEG-4 AUTHORING TOOL FOR THE COMPOSITION OF 3D AUDIOVISUAL SCENES P. Daras I. Kompatsiaris T. Raptis M. G. Strintzis Informatics and Telematics Institute 1,Kyvernidou str. 546 39 Thessaloniki, GREECE
More informationADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT
ADAPTIVE AND DYNAMIC LOAD BALANCING METHODOLOGIES FOR DISTRIBUTED ENVIRONMENT PhD Summary DOCTORATE OF PHILOSOPHY IN COMPUTER SCIENCE & ENGINEERING By Sandip Kumar Goyal (09-PhD-052) Under the Supervision
More information