skip to main content
10.1145/1873561.1873567acmconferencesArticle/Chapter ViewAbstractPublication PageschimitConference Proceedingsconference-collections
research-article

Towards a task oriented method for accessing network based services

Published:12 November 2010Publication History

ABSTRACT

Today's networked users are required to configure a number of different network settings on their computer in order to access specific network based services. For example, these users need to know whether to enable a Virtual Private Network (VPN) tunnel and, in some cases, also select the appropriate wireless network. As more sophisticated security models are incorporated into networks, the user's task in managing these settings will become more complex.

This paper describes a design which simplifies the task of accessing network based services using a more user oriented, less technology centric task flow.

References

  1. Gillis, T. 2010 Securing the Borderless Network: Security for the Web 2.0 World. 1st. Cisco Press, Indianapolis, IN. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Schacter, P. 2009 Making Authenticated Networks Work, Research Report, Burton Group, Midvale, UT.Google ScholarGoogle Scholar
  3. Microsoft, 2010. Windows User Experience Interaction Guidelines. http://msdn.microsoft.com/en-us/library/aa511258.aspxGoogle ScholarGoogle Scholar
  4. Kirakowski, J., and Corbett, M. 1993. SUMI: The Software Usability Measurement Inventory. British Journal of Educational Technology, 24, 210--212.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Towards a task oriented method for accessing network based services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHiMiT '10: Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
      November 2010
      61 pages
      ISBN:9781450304474
      DOI:10.1145/1873561

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 November 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate15of43submissions,35%
    • Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader