Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Click the image to see the wireframes. (There are "click-throughs" on the screens to give you a simulated user experience; the instructions on the right-hand side indicate where most of the links are.)

Image RemovedImage Added

Setting Policies and Terms

...

Click the image to see the wireframes.

Image RemovedImage Added

Access Analytics

...

Click the image to see the wireframes.

Image RemovedImage Added

UMA Trusted Claims

...

The study explores visualization techniques to enhance privacy control user experiece for UMA protocol, applied to Newcastle University's SmartAM project. The goal is to mitigate risks of lost of privacy and the exploitation of online personal data caused from user difficulty to maintain data control, correlate web resources and assign privileges for specific scope in the data sharing process. The approach (see the following presentations) introduces the Connection and Control bridge concepts and visualization tools for this purpose.

NCL_UMA_SmartAMUX_Study_part1.pdf UMA/SmartAM UX Study (Part 1) (SmartAM UX study introduction, requirements,  privacy control concepts)NCL_UMA_SmartAMUX_Study_part2.pdf 

UMA/SmartAM UX Study (Part 2) (UMA Connection concept/UX)

NCL_UMA_SmartAMUX_Study_part3.pdf UMA/SmartAM UX Study (Part 3) (Control bridge concept/UX)