2017
DOI: 10.1080/10447318.2017.1339940
|View full text |Cite
|
Sign up to set email alerts
|

A Heuristic Evaluation for Deaf Web User Experience (HE4DWUX)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
2

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(13 citation statements)
references
References 29 publications
0
9
0
2
Order By: Relevance
“…From equations (13)(14), calculating the fuzzy weights of characteristics as follows: r 1 = [(1.00, 1.00, 1.00, 1.00) ⊗ (1.00, 1.00, 3.00, 5.00)] 1/2 = [(1.0000 X 1.0000)1/2, (1.0000 X 1.0000)1/2, (1.0000 X 3.0000)1/2, (1.0000 X 5.0000)1/2] = (1.000, 1.000, 1.414, 2.236) r 2 = [(0.20, 0.33, 1.00, 1.00) ⊗ (1.00, 1.00, 1.00, 1.00)] 1/2 = [(0.2000 X 1.0000)1/2, (0.3300 X 1.0000)1/2, (1.0000 X 1.0000)1/2, (1.0000 X 5.0000)1/2] = (0.4472, 0.5745, 1.0000, 1.0000) Now, the weight of respective characteristic can be evaluated through equations (14) as follows: Authors determined the effect of usable-security in various alternatives after obtaining the final or dependent weights of usable-security characteristics. In this study, eight successive projects were taken to test the usable-security of two different software.…”
Section: Numerical Analysis and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…From equations (13)(14), calculating the fuzzy weights of characteristics as follows: r 1 = [(1.00, 1.00, 1.00, 1.00) ⊗ (1.00, 1.00, 3.00, 5.00)] 1/2 = [(1.0000 X 1.0000)1/2, (1.0000 X 1.0000)1/2, (1.0000 X 3.0000)1/2, (1.0000 X 5.0000)1/2] = (1.000, 1.000, 1.414, 2.236) r 2 = [(0.20, 0.33, 1.00, 1.00) ⊗ (1.00, 1.00, 1.00, 1.00)] 1/2 = [(0.2000 X 1.0000)1/2, (0.3300 X 1.0000)1/2, (1.0000 X 1.0000)1/2, (1.0000 X 5.0000)1/2] = (0.4472, 0.5745, 1.0000, 1.0000) Now, the weight of respective characteristic can be evaluated through equations (14) as follows: Authors determined the effect of usable-security in various alternatives after obtaining the final or dependent weights of usable-security characteristics. In this study, eight successive projects were taken to test the usable-security of two different software.…”
Section: Numerical Analysis and Resultsmentioning
confidence: 99%
“…Yeratziotis et al, in 2012, gave a novel procedure for assessing usable-security with the perspective of online social networks [14]. According to the authors, the output produced in this work is high-level heuristics for usable security of health-related online social media.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…These experts were expected to adopt their practical skills along with both theoretical knowledge and teaching experience while evaluating the gamifiedassessment. Such practical skills demanded include the form of conformance in the particular design (Yeratziotis & Zaphiris, 2018), the prompt and easy evaluation of user interface, and the lively state-condition within the play.…”
Section: Introductionmentioning
confidence: 99%
“…Besides that, improvement of the usability measurements [6], is really needed to ensure tourism applications requirements are accessible. However, this research extended from previous student work where she focused on the identification of dimension and criteria for mobile tourism applications, but not on metrics.…”
Section: Introductionmentioning
confidence: 99%