5 resultados para Online flow theory


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Tablet computers are on the rise and are increasingly superseding stationary computers in terms of modern online shopping. This paper therefore aims on understanding how tablet and website characteristics might impact online consumer behavior. The collected data resulted from focus groups and in-depth interviews conducted with a technology affine audience. It has shown that tablets indeed may have shifted shopping behavior from utilitarian towards rather recreational attributes. Discussions also revealed high customer expectations towards visited shopping websites and prevailing deficits. Thus, harnessing the concept of experiential flow is crucial. Compelling experiences are required to increase the duration of stay and consequently the likelihood of increased purchases.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

River Flow 2010

Relevância:

30.00% 30.00%

Publicador:

Resumo:

33rd IAHR Congress: Water Engineering for a Sustainable Environment

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Living in the digital era, activities that have for centuries acted one way, have now changed and entered the online world, and online grocery shopping is one of them. It is a worldwide phenomenon and is already a significant part of people’s lifestyle in several countries however, in Portugal, it is still in expansion and improvement. Based on the Theory of Planned Behavior, this study allowed to estimate how the perceived risk and shopping orientation counterbalances the convenience offered to consumers. Furthermore, it validated how usability and access to focused promotions can help speed up this adaptation in Portugal

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.