Related documents
Projektet hade då två delar, en del där jag tog fram frågor och utformade boken och en där jag lät människor använda boken i syfte att lära känna människor de inte kände
To examine how start-ups can integrate growth hacking meth- ods into their user retention strategy, a two-step process has been completed during which qualitative data was gathered
This study aims to examine an alternative design of personas, where user data is represented and accessible while working with a persona in a user-centered
Visitors will feel like the website is unprofessional and will not have trust towards it.[3] It would result in that users decides to leave for competitors that have a
In this project the Apples Human Interface Guidelines [4] have been used to make the iPhone and iPad application as intuitive and easy to use as possible by allowing the users to
To choose a solution offered by traditional security companies, in this paper called the firewall solution (Figure 6), is today one of the most common, Identity management market
The teacher asking relevant questions for architects makes the student able to get a deeper understanding of what it is to make an architectural ground plan
According to a previous study in this area, the computer mouse was the most preferred and performed best when tested in speed and accuracy when compared to the keyboard