Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
Autore | Shakarian Paulo |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
Descrizione fisica | 1 online resource (256 p.) |
Disciplina | 355.4 |
Altri autori (Persone) |
ShakarianJana
RuefAndrew |
Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-407926-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
Record Nr. | UNISA-996426339703316 |
Shakarian Paulo | ||
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
Autore | Shakarian Paulo |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
Descrizione fisica | 1 online resource (256 p.) |
Disciplina | 355.4 |
Altri autori (Persone) |
ShakarianJana
RuefAndrew |
Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
Soggetto genere / forma | Electronic books. |
ISBN | 0-12-407926-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
Record Nr. | UNINA-9910459153503321 |
Shakarian Paulo | ||
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
Autore | Shakarian Paulo |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
Descrizione fisica | 1 online resource (xvii, 318 pages) : illustrations (some color), map |
Disciplina | 355.4 |
Collana | Gale eBooks |
Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
Soggetto non controllato | information assurance - attribution |
ISBN | 0-12-407926-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
Record Nr. | UNINA-9910792484503321 |
Shakarian Paulo | ||
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia |
Autore | Shakarian Paulo |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 |
Descrizione fisica | 1 online resource (xvii, 318 pages) : illustrations (some color), map |
Disciplina | 355.4 |
Collana | Gale eBooks |
Soggetto topico |
Information warfare
Cyberterrorism Cyberspace - Security measures Computer crimes Data protection |
Soggetto non controllato | information assurance - attribution |
ISBN | 0-12-407926-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology Arab Spring |
Record Nr. | UNINA-9910822035903321 |
Shakarian Paulo | ||
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The persona lifecycle [[electronic resource] ] : keeping people in mind throughout product design / / John Pruitt, Tamara Adlin |
Autore | Pruitt John |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier, : Morgan Kaufmann Publishers, an imprint of Elsevier, c2006 |
Descrizione fisica | 1 online resource (741 p.) |
Disciplina | 658.5/03 |
Altri autori (Persone) | AdlinTamara |
Collana | Interactive Technologies |
Soggetto topico |
Product management
New products Research, Industrial |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-64148-7
9786610641482 0-08-045573-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; ENTHUSIASTIC ENDORSEMENTS FROM BOTH FOUNDERS OF THE NIELSEN NORMAN GROUP!; THE MORGAN KAUFMANN SERIES IN INTERACTIVE TECHNOLOGIES; Title page; Copyright; front matter; DEDICATION; CONTENTS; ACKNOWLEDGMENTS; FOREWORD; body; 1 THE NEXT FRONTIER FOR USER-CENTERED DESIGN; YOU ARE ALREADY A PROFESSIONAL IMAGINER; THIS BOOK IS ABOUT BUILDING PRODUCTS FOR PEOPLE; WHY DO WE NEED PERSONAS?; PERSONAS HELP MAKE USER-CENTERED DESIGN POSSIBLE; USER REPRESENTATIONS ARE NOT NEW AND WE CAN LEARN A LOT FROM THE PAST; THE NEXT FRONTIER FOR PERSONAS
SOUNDS GREAT! LET'S USE PERSONAS! ...IT'S EASIER SAID THAN DONETHIS BOOK IS DESIGNED TO FILL IN THE GAPS; SUMMARY; 2 OVERVIEW OF THE PERSONA LIFECYCLE; THE PHASES OF THE PERSONA LIFECYCLE; THE PERSONA LIFECYCLE IS DESIGNED TO ENHANCE, NOT REPLACE,YOUR EXISTING PROCESSES; PUTTING IT ALL TOGETHER:THE PERSONA LIFECYCLE IN ACTION; SUMMARY; 3 PERSONA FAMILY PLANNING; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW IF YOU'RE NOT USING PERSONAS?; WHAT IS FAMILY PLANNING FOR PERSONAS?; BUILDING A CORE TEAM; RESEARCHING YOUR OWN ORGANIZATION (ORGANIZATIONAL INTROSPECTION) CREATE AN ACTION PLANDECIDE WHEN AND HOW TO INVOLVE CONSULTANTS; IDENTIFY DATA SOURCES AND COLLECT DATA; PLAN AND EXECUTE YOUR OWN Y USER RESEARCH; CONDUCT FIELD STUDIES TO GATHER QUALITATIVE DATA; COLLECT DATA THROUGH SECONDARY SOURCES; TRACK AND MANAGE DATA SOURCES AS YOU COLLECT THEM; SUMMARY; 4 PERSONA CONCEPTION AND GESTATION; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS CONCEPTION AND GESTATION FOR PERSONAS?; PERSONA CONCEPTION: STEPS 1, 2, AND 3; PERSONA GESTATION:STEPS 4, 5, AND 6; HOW TO KNOW YOU ARE READY FOR BIRTH AND MATURATION; SUMMARY 5 PERSONA BIRTH AND MATURATIONSETTING THE SCENE-WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS BIRTH AND MATURATION FOR PERSONAS?; STEP 1: PREPARE FOR BIRTH AND BEYOND; STEP 2: BIRTH; STEP 3: MATURATION; PERSONA ARTIFACTS (THE WHAT AND HOW OF COMMUNICATING YOUR PERSONAS); IF YOU ARE A CONSULTANT; SUMMARY; 6 PERSONA ADULTHOOD; SETTING THE SCENE-WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS ADULTHOOD FOR PERSONAS?; PLAN, DESIGN, EVALUATE, RELEASE: HOW TO USE PERSONAS DURING THE STAGES OF PRODUCT DEVELOPMENT; STAGE 1: USE PERSONAS TO PLAN YOUR PRODUCT STAGE 2: USE PERSONAS TO EXPLORE DESIGN SOLUTIONSSTAGE 3: USE PERSONAS TO EVALUATE YOUR SOLUTIONS; STAGE 4: USE PERSONAS TO SUPPORT THE RELEASE OF YOUR PRODUCT; TRANSITIONING INTO LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT; SUMMARY; 7 PERSONA LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT FOR PERSONAS?; LIFETIME ACHIEVEMENT: MEASURE THE RETURN ON INVESTMENT (ROI) OF YOUR PERSONA EFFORT; REUSE AND RETIREMENT: DECIDE HOW TO MANAGE THE TRANSITION TO THE NEXT PROJECT; SUMMARY 8 USERS, ROLES, AND PERSONAS |
Record Nr. | UNINA-9910458083903321 |
Pruitt John | ||
Amsterdam ; ; Boston, : Elsevier, : Morgan Kaufmann Publishers, an imprint of Elsevier, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The persona lifecycle [[electronic resource] ] : keeping people in mind throughout product design / / John Pruitt, Tamara Adlin |
Autore | Pruitt John |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier, : Morgan Kaufmann Publishers, an imprint of Elsevier, c2006 |
Descrizione fisica | 1 online resource (741 p.) |
Disciplina | 658.5/03 |
Altri autori (Persone) | AdlinTamara |
Collana | Interactive Technologies |
Soggetto topico |
Product management
New products Research, Industrial |
ISBN |
1-280-64148-7
9786610641482 0-08-045573-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; ENTHUSIASTIC ENDORSEMENTS FROM BOTH FOUNDERS OF THE NIELSEN NORMAN GROUP!; THE MORGAN KAUFMANN SERIES IN INTERACTIVE TECHNOLOGIES; Title page; Copyright; front matter; DEDICATION; CONTENTS; ACKNOWLEDGMENTS; FOREWORD; body; 1 THE NEXT FRONTIER FOR USER-CENTERED DESIGN; YOU ARE ALREADY A PROFESSIONAL IMAGINER; THIS BOOK IS ABOUT BUILDING PRODUCTS FOR PEOPLE; WHY DO WE NEED PERSONAS?; PERSONAS HELP MAKE USER-CENTERED DESIGN POSSIBLE; USER REPRESENTATIONS ARE NOT NEW AND WE CAN LEARN A LOT FROM THE PAST; THE NEXT FRONTIER FOR PERSONAS
SOUNDS GREAT! LET'S USE PERSONAS! ...IT'S EASIER SAID THAN DONETHIS BOOK IS DESIGNED TO FILL IN THE GAPS; SUMMARY; 2 OVERVIEW OF THE PERSONA LIFECYCLE; THE PHASES OF THE PERSONA LIFECYCLE; THE PERSONA LIFECYCLE IS DESIGNED TO ENHANCE, NOT REPLACE,YOUR EXISTING PROCESSES; PUTTING IT ALL TOGETHER:THE PERSONA LIFECYCLE IN ACTION; SUMMARY; 3 PERSONA FAMILY PLANNING; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW IF YOU'RE NOT USING PERSONAS?; WHAT IS FAMILY PLANNING FOR PERSONAS?; BUILDING A CORE TEAM; RESEARCHING YOUR OWN ORGANIZATION (ORGANIZATIONAL INTROSPECTION) CREATE AN ACTION PLANDECIDE WHEN AND HOW TO INVOLVE CONSULTANTS; IDENTIFY DATA SOURCES AND COLLECT DATA; PLAN AND EXECUTE YOUR OWN Y USER RESEARCH; CONDUCT FIELD STUDIES TO GATHER QUALITATIVE DATA; COLLECT DATA THROUGH SECONDARY SOURCES; TRACK AND MANAGE DATA SOURCES AS YOU COLLECT THEM; SUMMARY; 4 PERSONA CONCEPTION AND GESTATION; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS CONCEPTION AND GESTATION FOR PERSONAS?; PERSONA CONCEPTION: STEPS 1, 2, AND 3; PERSONA GESTATION:STEPS 4, 5, AND 6; HOW TO KNOW YOU ARE READY FOR BIRTH AND MATURATION; SUMMARY 5 PERSONA BIRTH AND MATURATIONSETTING THE SCENE-WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS BIRTH AND MATURATION FOR PERSONAS?; STEP 1: PREPARE FOR BIRTH AND BEYOND; STEP 2: BIRTH; STEP 3: MATURATION; PERSONA ARTIFACTS (THE WHAT AND HOW OF COMMUNICATING YOUR PERSONAS); IF YOU ARE A CONSULTANT; SUMMARY; 6 PERSONA ADULTHOOD; SETTING THE SCENE-WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS ADULTHOOD FOR PERSONAS?; PLAN, DESIGN, EVALUATE, RELEASE: HOW TO USE PERSONAS DURING THE STAGES OF PRODUCT DEVELOPMENT; STAGE 1: USE PERSONAS TO PLAN YOUR PRODUCT STAGE 2: USE PERSONAS TO EXPLORE DESIGN SOLUTIONSSTAGE 3: USE PERSONAS TO EVALUATE YOUR SOLUTIONS; STAGE 4: USE PERSONAS TO SUPPORT THE RELEASE OF YOUR PRODUCT; TRANSITIONING INTO LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT; SUMMARY; 7 PERSONA LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT FOR PERSONAS?; LIFETIME ACHIEVEMENT: MEASURE THE RETURN ON INVESTMENT (ROI) OF YOUR PERSONA EFFORT; REUSE AND RETIREMENT: DECIDE HOW TO MANAGE THE TRANSITION TO THE NEXT PROJECT; SUMMARY 8 USERS, ROLES, AND PERSONAS |
Record Nr. | UNINA-9910784569303321 |
Pruitt John | ||
Amsterdam ; ; Boston, : Elsevier, : Morgan Kaufmann Publishers, an imprint of Elsevier, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The persona lifecycle : keeping people in mind throughout product design / / John Pruitt, Tamara Adlin |
Autore | Pruitt John |
Edizione | [1st edition] |
Pubbl/distr/stampa | Amsterdam ; ; Boston, : Elsevier, : Morgan Kaufmann Publishers, an imprint of Elsevier, c2006 |
Descrizione fisica | 1 online resource (741 p.) |
Disciplina | 658.5/03 |
Altri autori (Persone) | AdlinTamara |
Collana | Interactive Technologies |
Soggetto topico |
Product management
New products Research, Industrial |
ISBN |
9786610641482
9781280641480 1280641487 9780080455730 0080455735 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Front cover; ENTHUSIASTIC ENDORSEMENTS FROM BOTH FOUNDERS OF THE NIELSEN NORMAN GROUP!; THE MORGAN KAUFMANN SERIES IN INTERACTIVE TECHNOLOGIES; Title page; Copyright; front matter; DEDICATION; CONTENTS; ACKNOWLEDGMENTS; FOREWORD; body; 1 THE NEXT FRONTIER FOR USER-CENTERED DESIGN; YOU ARE ALREADY A PROFESSIONAL IMAGINER; THIS BOOK IS ABOUT BUILDING PRODUCTS FOR PEOPLE; WHY DO WE NEED PERSONAS?; PERSONAS HELP MAKE USER-CENTERED DESIGN POSSIBLE; USER REPRESENTATIONS ARE NOT NEW AND WE CAN LEARN A LOT FROM THE PAST; THE NEXT FRONTIER FOR PERSONAS
SOUNDS GREAT! LET'S USE PERSONAS! ...IT'S EASIER SAID THAN DONETHIS BOOK IS DESIGNED TO FILL IN THE GAPS; SUMMARY; 2 OVERVIEW OF THE PERSONA LIFECYCLE; THE PHASES OF THE PERSONA LIFECYCLE; THE PERSONA LIFECYCLE IS DESIGNED TO ENHANCE, NOT REPLACE,YOUR EXISTING PROCESSES; PUTTING IT ALL TOGETHER:THE PERSONA LIFECYCLE IN ACTION; SUMMARY; 3 PERSONA FAMILY PLANNING; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW IF YOU'RE NOT USING PERSONAS?; WHAT IS FAMILY PLANNING FOR PERSONAS?; BUILDING A CORE TEAM; RESEARCHING YOUR OWN ORGANIZATION (ORGANIZATIONAL INTROSPECTION) CREATE AN ACTION PLANDECIDE WHEN AND HOW TO INVOLVE CONSULTANTS; IDENTIFY DATA SOURCES AND COLLECT DATA; PLAN AND EXECUTE YOUR OWN Y USER RESEARCH; CONDUCT FIELD STUDIES TO GATHER QUALITATIVE DATA; COLLECT DATA THROUGH SECONDARY SOURCES; TRACK AND MANAGE DATA SOURCES AS YOU COLLECT THEM; SUMMARY; 4 PERSONA CONCEPTION AND GESTATION; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS CONCEPTION AND GESTATION FOR PERSONAS?; PERSONA CONCEPTION: STEPS 1, 2, AND 3; PERSONA GESTATION:STEPS 4, 5, AND 6; HOW TO KNOW YOU ARE READY FOR BIRTH AND MATURATION; SUMMARY 5 PERSONA BIRTH AND MATURATIONSETTING THE SCENE-WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS BIRTH AND MATURATION FOR PERSONAS?; STEP 1: PREPARE FOR BIRTH AND BEYOND; STEP 2: BIRTH; STEP 3: MATURATION; PERSONA ARTIFACTS (THE WHAT AND HOW OF COMMUNICATING YOUR PERSONAS); IF YOU ARE A CONSULTANT; SUMMARY; 6 PERSONA ADULTHOOD; SETTING THE SCENE-WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS ADULTHOOD FOR PERSONAS?; PLAN, DESIGN, EVALUATE, RELEASE: HOW TO USE PERSONAS DURING THE STAGES OF PRODUCT DEVELOPMENT; STAGE 1: USE PERSONAS TO PLAN YOUR PRODUCT STAGE 2: USE PERSONAS TO EXPLORE DESIGN SOLUTIONSSTAGE 3: USE PERSONAS TO EVALUATE YOUR SOLUTIONS; STAGE 4: USE PERSONAS TO SUPPORT THE RELEASE OF YOUR PRODUCT; TRANSITIONING INTO LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT; SUMMARY; 7 PERSONA LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT; SETTING THE SCENE: WHAT'S GOING ON IN YOUR ORGANIZATION NOW?; WHAT IS LIFETIME ACHIEVEMENT, REUSE, AND RETIREMENT FOR PERSONAS?; LIFETIME ACHIEVEMENT: MEASURE THE RETURN ON INVESTMENT (ROI) OF YOUR PERSONA EFFORT; REUSE AND RETIREMENT: DECIDE HOW TO MANAGE THE TRANSITION TO THE NEXT PROJECT; SUMMARY 8 USERS, ROLES, AND PERSONAS |
Record Nr. | UNINA-9910827385503321 |
Pruitt John | ||
Amsterdam ; ; Boston, : Elsevier, : Morgan Kaufmann Publishers, an imprint of Elsevier, c2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Research methods in human-computer interaction / / Jonathan Lazar, Jinjuan Heidi Feng, Harry Hochheiser |
Autore | Lazar Jonathan |
Edizione | [Second edition] |
Pubbl/distr/stampa | Cambridge, Massachusetts : , : Morgan Kaufmann Publishers, an imprint of Elsevier, , [2017] |
Descrizione fisica | 1 online resource (xxv, 534 pages) : illustrations (some color) |
Disciplina | 004.019 |
Collana | Gale eBooks |
Soggetto topico | Human-computer interaction - Research |
ISBN | 0-12-809343-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | ch. 1. Introduction to HCI research -- ch. 2. Experimental research -- ch. 3. Experimental design -- ch. 4. Statistical analysis -- ch. 5. Surveys -- ch. 6. Diaries -- ch. 7. Case studies -- ch. 8. Interviews and focus groups -- ch. 9. Ethnography -- ch. 10. Usability testing -- ch. 11. Analyzing qualitative data -- ch. 12. Automated data collection methods -- ch. 13. Measuring the human -- ch. 14. Online and ubiquitous HCI research -- ch. 15. Working with human subjects -- ch. 16. Working with research participants with disabilities. |
Record Nr. | UNINA-9910297378003321 |
Lazar Jonathan | ||
Cambridge, Massachusetts : , : Morgan Kaufmann Publishers, an imprint of Elsevier, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|