Usability improvements for touch-screen mobile flight booking application: a case study
Smart phones have introduced great easiness in our daily life by mobile applications. Nowadays, it is possible to complete tasks on-the-go, without the need of computer. One of the facilities provided is the mechanism to buy flight tickets via mobile phones. However, in the development phase, often...
| Main Authors: | Gündüz, Feyza, Pathan, Al-Sakib Khan |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/25974/ http://irep.iium.edu.my/25974/1/ACSAT12-59_CAMERA.pdf |
Similar Items
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013)
by: Gündüz, Feyza, et al.
Published: (2013)
UMP vehicle booking using mobile application
by: Nurul Fazreen, Othman
Published: (2019)
by: Nurul Fazreen, Othman
Published: (2019)
The need-to-know issues for publishing books and book chapters
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
New usability guidelines with implementation ways of mobile learning application based on mobile learning usability attributes
by: Hujainah, Fadhl, et al.
Published: (2016)
by: Hujainah, Fadhl, et al.
Published: (2016)
CASI Method for Improving the Usability of IDS
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
A detailed survey on various aspects of SQL injection in web applications: vulnerabilities, innovative attacks and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Tackling the threats of Internet worms
by: Pathan, Al-Sakib Khan
Published: (2012)
by: Pathan, Al-Sakib Khan
Published: (2012)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
An adaptive user interface model for enhancing usability and performance efficiency of diabetes mobile applications / Chew Sook Peng
by: Chew , Sook Peng
Published: (2022)
by: Chew , Sook Peng
Published: (2022)
Internet and distributed computing advancements : theoretical frameworks and practical applications
by: Abawajy, Jemal, et al.
Published: (2012)
by: Abawajy, Jemal, et al.
Published: (2012)
Measuring Website Usability Construct as Second Order Construct in Website Usability Model
by: Nur Sukinah, Aziz, et al.
Published: (2018)
by: Nur Sukinah, Aziz, et al.
Published: (2018)
Applying heuristics evaluation to improve the usability of malaysia accounting training management system
by: Zuraidah, Mat Harun, et al.
Published: (2020)
by: Zuraidah, Mat Harun, et al.
Published: (2020)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
A press touch code based secure graphical password scheme for smart devices
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
by: Al Noman Ranak, Md Sayfullah
Published: (2018)
Assessing Website Usability Attributes
by: Nur Sukinah, Aziz, et al.
Published: (2014)
by: Nur Sukinah, Aziz, et al.
Published: (2014)
Lethality of SQL injection against current and future Internet-technologies
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
by: Pathan, Al-Sakib Khan, et al.
Published: (2014)
Learning Qur’anic Arabic through interactive Web-based software: a pragmatic approach in language for specific purpose
by: Abdullah, Matin Saad, et al.
Published: (2013)
by: Abdullah, Matin Saad, et al.
Published: (2013)
A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2011)
Technological impact on disaster management information system
by: Islam, Humayun Kadir, et al.
Published: (2004)
by: Islam, Humayun Kadir, et al.
Published: (2004)
Model for the evaluation of usability of scientific workflows
by: Amelia, Abd Rahman
Published: (2019)
by: Amelia, Abd Rahman
Published: (2019)
Assessing web site usability measurement
by: Nur Sukinah, Aziz, et al.
Published: (2013)
by: Nur Sukinah, Aziz, et al.
Published: (2013)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Cryptanalysis of improved password authentication scheme with smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
A secure authentication scheme using locimetric and press touch code techniques
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
by: Noor Elya Afiqah, Che Nordin
Published: (2019)
Measuring the Role of Satisfaction in Website Usability Model
by: Nur Sukinah, Aziz, et al.
Published: (2018)
by: Nur Sukinah, Aziz, et al.
Published: (2018)
hiDoc: Doctor Appointment Booking Web Application
by: Nur Nadhirah, Yahaya
Published: (2023)
by: Nur Nadhirah, Yahaya
Published: (2023)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
Review Paper on the Importance of Usability in Agile Software
Development
by: Butt, Saad Masood, et al.
Published: (2015)
by: Butt, Saad Masood, et al.
Published: (2015)
A comprehensive usability model for evaluating smartphone apps
by: Rahmat, Hazwani, et al.
Published: (2018)
by: Rahmat, Hazwani, et al.
Published: (2018)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Using the web for critical learning of al-Qur’an’s language: an exploratory case study
by: Abdullah, Matin Saad, et al.
Published: (2012)
by: Abdullah, Matin Saad, et al.
Published: (2012)
A new data hiding technique based on irreducible polynomials
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Efficient and effective automated surveillance agents using kernel tricks
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
PMDA: A malicious peer detection algorithm for P2P systems
by: Wei, Xianglin, et al.
Published: (2011)
by: Wei, Xianglin, et al.
Published: (2011)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Assessing website usability attributes using partial least
squares
by: Nur Sukinah, Aziz, et al.
Published: (2014)
by: Nur Sukinah, Aziz, et al.
Published: (2014)
Flight Connections Multi-Leg Searching by Adopting Partial Constraint Satisfaction
by: Yusof, S.Z.M, et al.
Published: (2010)
by: Yusof, S.Z.M, et al.
Published: (2010)
Towards developing smart environment using wireless sensor and ad hoc networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Similar Items
-
On the key factors of usability in small-sized mobile touch-screen application
by: Gündüz, Feyza, et al.
Published: (2013) -
UMP vehicle booking using mobile application
by: Nurul Fazreen, Othman
Published: (2019) -
The need-to-know issues for publishing books and book chapters
by: Pathan, Al-Sakib Khan
Published: (2013) -
New usability guidelines with implementation ways of mobile learning application based on mobile learning usability attributes
by: Hujainah, Fadhl, et al.
Published: (2016) -
CASI Method for Improving the Usability of IDS
by: Mazlina, Abdul Majid, et al.
Published: (2015)