Measuring the aesthetic elements of screen designs
Given the critical role that screen aesthetics plays in human-computer interaction, it is important to understand what characteristics of screens influence user acceptance. The purpose of this paper is to present a set of screen characteristics that appear to be important determinants of acceptance,...
| Main Author: | Ngo, D |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2001
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2691/ http://shdl.mmu.edu.my/2691/1/1932.pdf |
Similar Items
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000)
by: Chek, David Ling Ngo, et al.
Published: (2000)
Screen design: composing with dynamic symmetry
by: Ngo, D
Published: (2001)
by: Ngo, D
Published: (2001)
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003)
by: Ngo, David Chek Ling, et al.
Published: (2003)
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000)
by: D. C. L., Ngo, et al.
Published: (2000)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
Screen design: a dynamic symmetry grid based approach
by: Ch'ng, E
Published: (2003)
by: Ch'ng, E
Published: (2003)
Cancellable biometerics featuring with tokenised random number
by: TEOH, A, et al.
Published: (2005)
by: TEOH, A, et al.
Published: (2005)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
A Menu Planning Model Using Hybrid Genetic Algorithm And Fuzzy Reasoning: A Study On Malaysian Geriatric Cancer Patients
by: Ngo , Hea Choon
Published: (2016)
by: Ngo , Hea Choon
Published: (2016)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
One-dimensional finite element discretization of crack propagation through parallel computation
by: Islam, Md. Rajibul, et al.
Published: (2010)
by: Islam, Md. Rajibul, et al.
Published: (2010)
Steady Heat Conduction Solution Using Trigonometric Bezier Finite Element Method
by: Abidin, Mohamad Naufal Zainal
Published: (2024)
by: Abidin, Mohamad Naufal Zainal
Published: (2024)
Predictors Of Flourishing Among Elderly In Penang, Malaysia: The Role Of Demographic Variables And Perma Elements
by: Liew, Wei Peng
Published: (2022)
by: Liew, Wei Peng
Published: (2022)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
The Essential Elements in a Community of Enquiry - A Study of Computer-supported Collaborative Learning in Higher Education
by: Shariman, , Tengku Putri Norishah Tengku
Published: (2005)
by: Shariman, , Tengku Putri Norishah Tengku
Published: (2005)
Criteria for measuring KM performance outcomes in organisations
by: Chong, Siong Choy, et al.
Published: (2006)
by: Chong, Siong Choy, et al.
Published: (2006)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Towards a Privacy Diagnosis Centre : Measuring k-anonymity
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
by: Mirakabad, Mohammad Reza Zare, et al.
Published: (2008)
Morphological convexity measures for terrestrial basins derived from digital elevation models
by: Lim, Sin Liang, et al.
Published: (2011)
by: Lim, Sin Liang, et al.
Published: (2011)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Preprocessing of fingerprint images captured with a digital camera
by: Hiew,, B. Y, et al.
Published: (2006)
by: Hiew,, B. Y, et al.
Published: (2006)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Design and Implementation of an XML Firewall
by: Loh, Yin-soon, et al.
Published: (2006)
by: Loh, Yin-soon, et al.
Published: (2006)
CPT212 – Design & Analysis of Algorithms
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
CIT504 – ANALYSIS, DESIGN AND MANAGEMENT OF INFORMATION SYSTEMS
CSI503 – INFORMATION SYSTEM ANALYSIS AND DESIGN - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
PalmHashing: A novel approach for dual-factor authentication
by: Tee, Connie, et al.
Published: (2004)
by: Tee, Connie, et al.
Published: (2004)
Fingerprint images segmentation using two stages coarse to fine discrimination technique
by: Ong, Teng Sian, et al.
Published: (2003)
by: Ong, Teng Sian, et al.
Published: (2003)
Automatic fingerprint center point determination by using modified directional field and morphology
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
by: Teoh, Andrew Beng Jin, et al.
Published: (2003)
Similar Items
-
Aesthetic measures for assessing graphic screens
by: Chek, David Ling Ngo, et al.
Published: (2000) -
Screen design: composing with dynamic symmetry
by: Ngo, D
Published: (2001) -
Modelling interface aesthetics
by: Ngo, David Chek Ling, et al.
Published: (2003) -
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000) -
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)