Filters








5,608 Hits in 7.8 sec

Users can change their web search tactics: Design guidelines for categorized overviews

Bill Kules, Ben Shneiderman
2008 Information Processing & Management  
A study of 24 sophisticated users carrying out complex tasks suggests how searchers may adapt their search tactics when using categorized overviews.  ...  An understanding of the impact of categorized overviews on search tactics will be useful to web search researchers, search interface designers, information architects and web developers.  ...  Acknowledgements The authors thank Young Choi, Allison Brochu, Renee Reighart and the anonymous reviewers for their thoughtful comments.  ... 
doi:10.1016/j.ipm.2007.07.014 fatcat:piwqdoky25byhlifznxbyldzm4

Digital Atlas of Tactics to Designing Sustainable Factories

Lia Marchi, Ernesto Antonini
2022 Sustainability  
Each tactic is then described in an info-sheet, which feeds a web portal. There, the user is assisted in searching for the most suitable tactics and mutual links with other useful strategies.  ...  For a long time, the design of factories has been profit-driven only, while their detrimental effects on the environment, perceptual-aesthetic interferences with the surroundings, and social disturbances  ...  • To make it simple to the final users to search for tactics through their own mental scheme (i.e., open, flexible, and multi-facet searches).  ... 
doi:10.3390/su14074321 fatcat:7jobkhc7zjacdpnkyrq7d7wnx4

Fore‐cite: tactics for evaluating citation management tools

William Marino
2012 Reference Services Review  
While most products claim support for popular software such as Microsoft Office, look on user forums or search for documented experiences to get a general idea of their ease of use and any problems that  ...  Can an administrator change the default setting to provide for automatic and frequent syncing, lessening the risk of lost data?  ... 
doi:10.1108/00907321211228336 fatcat:y4pyxs44qba3rfmsalpm4wnnca

Architectural Tactics for Big Data Cybersecurity Analytic Systems: A Review [article]

Faheem Ullah, M. Ali Babar
2018 arXiv   pre-print
Results: Our findings are twofold: (i) identification of 12 most frequently reported quality attributes and the justification for their significance for Big Data Cybersecurity Analytic Systems; and (ii  ...  ) identification and codification of 17 architectural tactics for addressing the quality attributes that are commonly associated with Big Data Cybersecurity Analytic systems.  ...  Search terms We designed the search string (shown in Fig. 1 ) according to the guidelines provided in [14] . Our search string consisted of two partssecurity and big data processing frameworks.  ... 
arXiv:1802.03178v1 fatcat:m6yigyrqrvcpdhg7qxncdh3lsi

Evaluating the Impact of Software Security Tactics: A Design Perspective

Mamdouh Alenezi, Abhishek Kumar Pandey, Richa Verma, Mohd Faizan, Shalini Chandra, Alka Agrawal, Rajeev Kumar, Raees Ahmad Khan
2021 Computers Materials & Continua  
In order to facilitate architectural security from the web application's design phase itself, practitioners are now adopting the novel mechanism of security tactics.  ...  Design architecture is the edifice that strengthens the functionalities as well as the security of web applications.  ...  Acknowledgement: Authors are thankful to Prince Sultan University, Saudi Arabia for providing the fund to carry out the work.  ... 
doi:10.32604/cmc.2021.013579 fatcat:nk7l2rqvq5d4hdxbcoutp77dju

B2B brands on Twitter: Engaging users with a varying combination of social media content objectives, strategies, and tactics

Mari Juntunen, Elvira Ismagilova, Eeva-Liisa Oikarinen
2019 Industrial Marketing Management  
The companies use objectives, strategies and tactics that relate to creating awareness, knowledge and trust, interest, and liking in the majority of their most and least engaging tweets, and express preference  ...  The objective of this research is to increase understanding about B2B company-led user engagement on social media content.  ...  Acknowledgements We thank four anonymous reviewers for their valuable comments that helped to improve the quality of the article remarkably.  ... 
doi:10.1016/j.indmarman.2019.03.001 fatcat:pwfhymszcbgttoeotwvyzasnvm

Protocol of a randomized controlled trial of the Tobacco Tactics website for operating engineers

Sonia A Duffy, David L Ronis, Caroline Richardson, Andrea H Waltje, Lee A Ewing, Devon Noonan, Oisaeng Hong, John D Meeker
2012 BMC Public Health  
Outcome evaluation will compare those randomized to the Tobacco Tactics web-based intervention to those randomized to the 1-800-QUIT-NOW control condition on: a) 30-day and 6-month quit rates; b) cotinine  ...  Methods/Design: This will be a randomized controlled trial (N = 184).  ...  None of the above funding bodies were involved in the design, collection, analysis, interpretation of data, writing of the manuscript and in the decision to submit the manuscript for publication.  ... 
doi:10.1186/1471-2458-12-335 pmid:22569211 pmcid:PMC3355035 fatcat:5lpavbxfeve6dccma2djhyrxra

Empirical study: Socail Media Followers & their impact on risk propensity and tactical decision making in S.M.E.'s

Brian Yang
2017 Figshare  
MBA Thesis for University of Derby, completed April 2016, Marked as Distinction,Nov 2016.Followed Research Onion (Saunders, et al 2009); integrated ethics through specific consent (written/email) in questionnaires  ...  adaptive pattern may change when users communicate to others.  ...  To understand the RQ the author undertook a search for extant literature using key-words and phrases, including; 'social media'; 'popular social media'; 'social media metrics'; 'strategic and tactical  ... 
doi:10.6084/m9.figshare.4696174.v1 fatcat:qw3vrpsaizfmhmrndhb3yijyhm

Web Search Results Visualization

Kalliopi Kontiza, Antonis Bikakis
2014 Proceedings of the 4th International Conference on Web Intelligence, Mining and Semantics (WIMS14) - WIMS '14  
A set of guidelines for the design of exploratory search interfaces. An thoughtful of the impact of categorized overviews on search tactics will be useful to Web search developers.  ...  The result lists of popular web search engines represent retrieved documents with a title a brief textual summary and a URL into the conventional search result interface.  ...  A study of 24 urbane users carrying out complex tasks suggests how searchers may adapt their search tactics when using categorized overviews.  ... 
doi:10.1145/2611040.2611057 dblp:conf/wims/KontizaB14 fatcat:jz4srkypwngexflze6mlugoj5u

Dynamic Compositions: Recombining Search User Interface Features for Supporting Complex Work Tasks

Hugo C. Huurdeman
2017 Conference on Human Information Interaction and Retrieval  
Guidelines and design patterns for concrete SUIs, on the other hand, provide recommendations for feature design, but these are separated from their role in the information seeking process.  ...  During complex information seeking tasks, various search stages may occur, which imply varying support needs for users.  ...  They provide lowlevel support at the move and tactic level, for instance selecting Figure 1 : Schematic overview of a supportive framework for designing 'stage-aware' search user interfaces for complex  ... 
dblp:conf/chiir/Huurdeman17 fatcat:z5i6cu33rzfjrbe6gkt6ewddta

Can search result summaries enhance the web search efficiency and experiences of the visually impaired users?

Aboubakr Aqle, Dena Al-Tahni, Ali Jaoua
2020 Universal Access in the Information Society  
We present a novel interactive search engine interface called InteractSE to support VI users during the results exploration stage in order to improve their interactive experience and web search efficiency  ...  This study investigates the effect of providing an overview of search results to VI users.  ...  From an interface and navigation design perspective [56] , categorized overviews have a positive impact on the web search process to organize, classify, and link information for the end-users.  ... 
doi:10.1007/s10209-020-00777-w fatcat:74za4jgl4ngtfgliofrhdql6gm

Approaches for Web Spam Detection

Kanchan Hans, Laxmi Ahuja, S. K. Muttoo
2014 International Journal of Computer Applications  
Spam is a major threat to web security. The web of trust is being abused by the spammers through their ever evolving new tactics for their personal gains.  ...  Web Security being a prime challenge for search engines has motivated the researchers in academia and industry to devise new techniques for web spam detection.  ...  We presented a brief overview of various forms of spam and discussed various approaches used for web spam detection inclusive of traditional as well as emerging approaches, presenting their underlying  ... 
doi:10.5120/17655-8467 fatcat:vjlkkwa6wbeupe6afkstqeeday

MiTAP: a case study of integrated knowledge discovery tools

L. Damianos, S. Wohlever, R. Kozierok, J. Ponte
2003 36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the  
Over the course of the past year and half, MiTAP has become a useful tool for real users to solve real problems.  ...  The success of MiTAP is greatly attributed to its user-focused design that accommodates the imperfect component technologies and that allows users to interact with the system in familiar ways.  ...  Users can quickly scan the extracted sentences to get a daily overview or follow links to the specific MiTAP documents for more context.  ... 
doi:10.1109/hicss.2003.1173927 dblp:conf/hicss/DamianosWKP03 fatcat:fosjpypexvfbjgakr2qykqe62m

Defining multi-tenancy: A systematic mapping study on the academic and the industrial perspective

Jaap Kabbedijk, Cor-Paul Bezemer, Slinger Jansen, Andy Zaidman
2015 Journal of Systems and Software  
Software as a service is frequently offered in a multi-tenant style, where customers of the application and their end-users share resources such as software and hardware among all users, without necessarily  ...  The definition and topic maps provide a comprehensive overview of the domain, while the research agenda, listing four important research topics, provides a roadmap for future research efforts.  ...  All search data is analysed (Section 3) and an overview of the results can be found in Section 4.  ... 
doi:10.1016/j.jss.2014.10.034 fatcat:7x6oebtuujcy7jfh42a3opt5xu

Literature Review of Computer Tools for the Visually Impaired: a focus on Search Engines [article]

Guy Meyer, Alan Wassyng, Mark Lawford, Kourosh Sabri, Shahram Shirani
2020 arXiv   pre-print
Due to the variety of tools that are available to computer users, the paper focuses on search engines as a primary tool for browsing the web.  ...  By analyzing the attributes discussed below, the reader is equipped with a set of references for existing applications, along with practical insight and recommendations for accessible design.  ...  (2010) -WoW changes the SERP (search engine report page) so that it can be modified to form the user.  ... 
arXiv:2010.11163v1 fatcat:72s5ps5765bdbmhu3azev5e4iu
« Previous Showing results 1 — 15 out of 5,608 results