Key usability factors of service-oriented web sites for students: an empirical study
Purpose - This paper aims to report on a web usability study and to identify and prioritise key web interface usability factors (WIUFs) for web sites of 36 student-related online services categorised into three groups: personal services, purchase services and study-related web sites. Design/metho...
| Main Authors: | Nathan, Robert J., Yeow, Paul H.P., Murugesan, San |
|---|---|
| Format: | Article |
| Published: |
EMERALD GROUP PUBLISHING LIMITED
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2801/ |
Similar Items
Domain name and site hosting preferences: empirical evidence
by: O’Daniel, Thomas, et al.
Published: (2000)
by: O’Daniel, Thomas, et al.
Published: (2000)
Non-Repudiation In Web Services.
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
by: Ling, Elvis,Ing Seng, et al.
Published: (2007)
KM implementation in Malaysian telecommunication industry: An empirical analysis
by: Chong, Chin Wei, et al.
Published: (2006)
by: Chong, Chin Wei, et al.
Published: (2006)
An implementation of embedded RESTful Web services
by: Chang, C.E., et al.
Published: (2009)
by: Chang, C.E., et al.
Published: (2009)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Mobile Phone Use in a Developing Country: A Malaysian Empirical Study
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
AN EMPIRICAL INVESTIGATION OF METHODS, FOR TEACHING DESIGN PATTERNS WITHIN, OBJECT-ORIENTED FRAMEWORKS
by: HO, SIN BAN, et al.
Published: (2007)
by: HO, SIN BAN, et al.
Published: (2007)
Assessing web site usability measurement
by: Nur Sukinah, Aziz, et al.
Published: (2013)
by: Nur Sukinah, Aziz, et al.
Published: (2013)
A technology acceptance study of online banking service in Malaysia
by: Paul H. P., Yeow, et al.
Published: (2008)
by: Paul H. P., Yeow, et al.
Published: (2008)
Computation of cryptographic keys from face biometrics
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
CMT322 – Web Engineering &Technologies
(Kejuruteraan & Teknologi Web)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
CMT 322/CMM 323 – Web Engineering & Technologies (Kejuruteraan & Teknologi Web)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Migration From A Relational Database To A Document-Oriented Database Based On Document-Oriented Data Schema
by: M S, Hamouda Shady
Published: (2020)
by: M S, Hamouda Shady
Published: (2020)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Semantic web service adaptation model for a pervasive learning scenario
by: Lau, B-Y-S., et al.
Published: (2008)
by: Lau, B-Y-S., et al.
Published: (2008)
The Impact Of Entrepreneurial
Orientation And Market Orientation
On Manufacturing Small And Medium
Enterprises Satisfaction With The
Moderating Effect Of E-Commerce
Utilization In Malaysia
by: Jebna, Abdulkarim Kanaan
Published: (2016)
by: Jebna, Abdulkarim Kanaan
Published: (2016)
Stego Keys Performance on Feature Based Coding Method in Text Domain
by: Din, Roshidi, et al.
Published: (2017)
by: Din, Roshidi, et al.
Published: (2017)
New Key Exchange Protocol Based on Mandelbrot and Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
CMT 322/CMM 323 – Web Engineering & Technologies
(Kejuruteraan & Teknologi Web) - February/March 2022
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Web Personalization Using Implicit Input
by: Pan , Yih Jyh
Published: (2007)
by: Pan , Yih Jyh
Published: (2007)
CMT322/CMM323 – WEB ENGINEERING & TECHNOLOGIES [KEJURUTERAAN & TEKNOLOGI WEB] DEC. 2014 - JAN. 2015
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2015)
CMT322/CMM323 – WEB ENGINEERING & TECHNOLOGIES [KEJURUTERAAN & TEKNOLOGI WEB] DEC. 2016 - JAN. 2017
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2017)
CMT322/CMM323 – WEB ENGINEERING & TECHNOLOGIES [KEJURUTERAAN & TEKNOLOGI WEB] DEC. 2015 - JAN. 2016
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2016)
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
A New Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Design Processes For Web-Based Hypermedia Engineering.
by: Jantan, Azrul Hazri, et al.
Published: (2007)
by: Jantan, Azrul Hazri, et al.
Published: (2007)
A key distribution scheme for secure multicast over IPv6 wireless networks
by: Aye, Win, Win, et al.
Published: (2005)
by: Aye, Win, Win, et al.
Published: (2005)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Receiver-Oriented 'Pull' Model For ResettaNet Trade Documents Interchange.
by: Ting, Tin Tin, et al.
Published: (2007)
by: Ting, Tin Tin, et al.
Published: (2007)
CIT 502 - OBJECT ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CIT 502 - OBJECT ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CIT502 – OBJECT-ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
CIT502 – OBJECT-ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
Similar Items
-
Domain name and site hosting preferences: empirical evidence
by: O’Daniel, Thomas, et al.
Published: (2000) -
Non-Repudiation In Web Services.
by: Ling, Elvis,Ing Seng, et al.
Published: (2007) -
KM implementation in Malaysian telecommunication industry: An empirical analysis
by: Chong, Chin Wei, et al.
Published: (2006) -
An implementation of embedded RESTful Web services
by: Chang, C.E., et al.
Published: (2009) -
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)