{"title":"Technical Foundations of Information Systems Security","authors":"Daniela Oliveira, Jedidiah R. Crandall","doi":"10.1201/B16768-60","DOIUrl":"https://doi.org/10.1201/B16768-60","url":null,"abstract":"","PeriodicalId":251381,"journal":{"name":"Computing Handbook, 3rd ed.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Highly Usable Web Applications","authors":"S. Abrahão, E. Insfrán, Adrian Fernandez","doi":"10.1201/B16768-42","DOIUrl":"https://doi.org/10.1201/B16768-42","url":null,"abstract":"Web page (see Figure 36.2; b-3) representing the possible navigational targets (Tasks, Reports, and Contacts). However, as the label connected as, represented by the navigational link LI96 is a source link (empty arrow), the login information is showed in the same user’s generated home page (see Figure 36.2; b-3). The following usability metrics can be applied to the Navigational Model in Figure 36.2 (a): Breadth of the inter-navigation (see Table 36.1): This metric can only be operationalized in those NADs that represent the first navigation level (i.e., inter-navigation). The calculation formula to be applied is: BiN (NAD) = Number of Output Target Links from Collections connected to Navigational targets. The thresholds 1 defined for the metric are: [BiN = 0]: critical usability problem; [1 ≤ BiN ≤ 9]: no usability problem; [10 ≤ BiN ≤ 14]: low usability problem; [15 ≤ BiN ≤ 19]: medium usability problem. Therefore, the breadth of the inter-navigation for the NAD shown in Figure 36.2 (a) is 4 since there are 4 first level navigational targets (i.e., Home, Tasks, Contacts and Reports). This signifies that no usability problem was detected. Depth of the navigation (see Table 36.1): This metric considers the number of navigation steps from the longest navigation path. Therefore, the formula to be applied is: DN (NAD) = Number of navigation steps from the longest navigation path, where “Navigation step” is when a Target Link exists between two nodes and “Longest navigation path” is the path with the greatest number of navigation steps, which begins in the first Navigational Class or Collection where navigation starts, and which ends in the last Navigational Class or Service Link, from which it is not possible to reach another previously visited","PeriodicalId":251381,"journal":{"name":"Computing Handbook, 3rd ed.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121628573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Waterfall to Agile: A Review of Approaches to Systems Analysis and Design","authors":"J. George","doi":"10.1201/B16768-33","DOIUrl":"https://doi.org/10.1201/B16768-33","url":null,"abstract":"","PeriodicalId":251381,"journal":{"name":"Computing Handbook, 3rd ed.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116097612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sourcing Information Technology Services","authors":"Mary C Lacity, L. Willcocks","doi":"10.4324/9781315619361.CH20","DOIUrl":"https://doi.org/10.4324/9781315619361.CH20","url":null,"abstract":"","PeriodicalId":251381,"journal":{"name":"Computing Handbook, 3rd ed.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123407901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Tuning Database Design for High Performance","authors":"Philippe Bonnet, D. Shasha","doi":"10.1201/B16768-12","DOIUrl":"https://doi.org/10.1201/B16768-12","url":null,"abstract":"","PeriodicalId":251381,"journal":{"name":"Computing Handbook, 3rd ed.","volume":"271 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116422732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}