Figure 3 - uploaded by Julien Antoine Raemy
Content may be subject to copyright.
Source publication
The International Image Interoperability Framework (IIIF), an initiative born in 2011, defines a set of common application programming interfaces (APIs) to retrieve, display, manipulate, compare, and annotate digitised and born-digital images. Upon implementation, these technical specifications have offered institutions and end users alike new poss...
Contexts in source publication
Context 1
... visualise what UX means in terms of quality components, Peter Morville (2004) has sketched out a UX Honeycomb in order to 'move beyond usability' where seven hexagons, or facets, are depicted: useful, usable, desirable, findable, accessible, credible, and valuable (cf. Figure 3). Morville's UX Honeycomb serves multiple purposes. ...
Context 2
... heat maps can be found in Appendix 9 and shows where participants clicked the most in the three different tasks carried on Mirador. The most interesting findings were that pilot test participants apparently thought that the pan and zoom controls would enable them to navigate through the digital surrogate ( Figure 36) during task 6. In addition, this feature was rarely used by target test participants even when they were asked to zoom in task 11 ( Figure 41) as opposed to LIS students who overly used it (Figure 40). ...
Similar publications
Spatial Data Infrastructures (SDI) established during the past two decades “unlocked” heterogeneous geospatial datasets. The European Union INSPIRE Directive laid down the foundation of a pan-European SDI where thousands of public sector data providers make their data, including sensor observations, available for cross-border and cross-domain reuse...
Citations
... Tasarımda bulunan uygulama basamakları gibi deneyim tasarımının da kendi basamakları bulunmaktadır. Tasarımcı Peter Morville'in tanımladığı, kullanıcı deneyimini özetleyen yedi temel prensip şu şekilde: (Raemy, 2017) • Kullanışlı ...
Doğasını anladığımız düşünülen basit şeyler bile bir tasarım sürecinden geçmektedir. Tasarım insan ve teknoloji arasında bağlayıcı bir göreve sahiptir. Her teknolojik gelişme, yeni bir hayat biçimi ve deneyim yaratır. Bubağlamda “Deneyim Tasarımı’nın Grafik Tasarımı Üzerindeki Etkisi” başlıklı çalışmada ele alınan konular deneyim tasarımının gündelik hayattaki becerileri, motivasyonları ve beklentileri hangi yönde değiştirdiği ve bu değişime grafik tasarımının nasıl uyum sağladığı şeklinde incelenmiştir. Gelecek üzerine öngörülerde bulunmak isteniyorsa yakın geçmişte başlayan dijital teknolojiye dikkatle bakılıp öncelikle değişim süreci, bunun ne şekilde gerçekleştiği ve hızının incelenmesi gerektiği vurgulanmıştır. Yenilenen grafik tasarımının teknolojiyle birlikte deneyim tasarımını etkileyeceği ve daha nitelikli hale gelmesini sağlayacağı analiz edilmiştir.
... Then, the concept of AI is related to UX in the sense that an adequate and welldesigned AI allows a software product to have an adequate usability and an adequate findability. As mentioned by Morville, usability and findability are important facets of UX [16,28]. ...
Nowadays, due to technological advancement, people are bound to use multiple digital tools and interact with them through a User Interface. For this reason, User Experience (UX) is one of the most important keys to success. UX includes the design and evaluation of an adequate Information Architecture. To design Information Architecture, the best-known technique is Card Sorting. For evaluation, there is the Tree Testing or Reverse Card Sorting technique. This technique can be applied in remote or non-remote ways. We identified three main issues: 1. The remote processes to apply Tree Testing are not standardized; 2. the tools were modeled and built after a process defined by the supplier of those tools, most of which are now discontinued. 3. In many development projects these techniques are left aside, the Information Architecture is assessed using other methods and techniques (i.e. User Testing) in later phases of the project. These result in Information Architecture errors and defects found late or not found at all. Hence, this study is focused on developing and validating a standardized remote Tree Testing process with an emphasis on automation. To meet the objectives, we conducted interviews and literature reviews to find out how Tree Testing is currently carried out and what tools are used to support the technique (AS-IS workflow). Subsequently, we proposed a process that can support the technique, considering the pain points found on the current processes, resulting in a TO-BE workflow. As a result, a proposal of this standardized process was modeled using the notation BPMN, and validated by the expert judgment of specialists in Human-Computer Interaction (HCI). Finally, it is important to mention that Tree Testing is useful, practical in its remote application, and should be applied in the early stages of software projects; a tool to support the whole process should be implemented.
... • IIIF Content Search API 1.0: gives access and interoperability mechanisms for searching within a textual annotation of an object (Appleby et al. 2016;Raemy 2017). ...
... • IIIF Authentication API 1.0: allows application of IIIF for access-restricted objects (Appleby et al. 2017;Raemy 2017). ...
Europeana, a non-profit foundation launched in 2008, aims to improve access to Europe’s digital cultural heritage through its open data platform that aggregates metadata and links to digital surrogates held by over 3700 providers. The data comes both directly from cultural heritage institutions (libraries, archives, museums) as well as through intermediary aggregators. Europeana’s current operating model leverages the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) and the Europeana Data Model (EDM) for data import through Metis, Europeana's ingestion and aggregation service.
However, OAI-PMH is an outdated technology, and is not web-centric, which presents high maintenance implications, in particular for smaller institutions. Consequently, Europeana seeks to find alternative aggregation mechanisms that could complement or supersede it over the long-term, and which could also bring further potential benefits.
In scope, this master’s thesis seeks to extend the research on earlier aggregation experiments that Europeana successfully carried out with various technologies, such as aggregation based on Linked Open Data (LOD) datasets or through the International Image Interoperability Framework (IIIF) APIs.
The literature review first focuses on metadata standards and the aggregation landscape in the cultural heritage domain, and then provides an extensive overview of Web-based technologies with respect to two essential components that enable aggregation: data transfer and synchronisation as well as data modelling and representation.
Three key results were obtained. First, the participation in the Europeana Common Culture project resulted in the documentation revision of the LOD-aggregator, a generic toolset for harvesting and transforming LOD. Second, 52 respondents completed an online survey to gauge the awareness, interest, and use of technologies other than OAI-PMH for (meta)data aggregation. Third, an assessment of potential aggregation pilots was carried out considering the 23 organisations who expressed interest in follow-up experiments on the basis of the available data and existing implementations. In the allotted time, one pilot was attempted using Sitemaps and Schema.org.
In order to encourage the adoption of new aggregation mechanisms, a list of proposed suggestions was then established. All of these recommendations were aligned with the Europeana Strategy 2020-2025 and directed towards one or several of the key roles of the aggregation workflow (data provider, aggregator, Europeana).
Even if a shift in Europena’s operating model would require extensive human and technical resources, such an effort is clearly worthwhile as solutions presented in this dissertation are well-suited for data enrichment and for allowing data to be easily updated. The transition from OAI-PMH will also be facilitated by the integration of such mechanisms within the Metis Sandbox, Europeana's new ad-hoc system where contributors will be able to test their data sources before ingestion into Metis. Ultimately, this shift is also expected to lead to a better discoverability of digital cultural heritage objects.
... In this section are (to our knowledge) the systems that have complied with IIIF in recent years. It should be noted that in July 2017, only e-codices had implemented the Image and the Presentation APIs (Raemy 2017). Since then, numerous other groups have adopted IIIF. ...
This white paper has been written as part of the Towards IIIF-Compliance Knowledge in Switzerland (TICKS) project, conducted at the Haute école de gestion de Genève (HEG-GE) between March 2018 and February 2019, which originated on the acknowledgements that the International Image Interoperability Framework (IIIF) ecosystem was not enough known and deployed in the cultural heritage field in Switzerland.
The white paper starts with the main principles of IIIF, notably indicating the different technical specifications, or application programming interfaces (APIs), produced by the IIIF community as well as the platforms of Swiss projects or institutions that have deployed IIIF. Going from general to specific, a generic IIIF step-by-step graph and six more precise use cases reflecting different needs of the GLAM (Galleries, Libraries, Archives, Museums) sector giving implementation measures have been produced.
Finally, the document contains recommendations for further action as well as some information on the possible reuse of this document for other regions of the world or for other scientific fields.
Considering the cyber-threats landscape over the past few years, the security community has repeatedly advocated the use of encryption for ensuring the privacy and integrity of the user’s data and communications. As a result, we have witnessed a growth in number and usage of secure messaging tools. End-to-end encryption has been adopted by several existing and popular messaging apps. Email service providers have made efforts to integrate encryption as a core feature rather than treating it as optional. Recently, the pandemic situation has only reinforced this belief, causing us to rethink communication on a global scale, therefore put special emphasis on the security aspect of it. Despite the advances in research on usable security, the majority of these software still violates best practices in UI design and uses ineffective design strategies to communicate and let users control the security status of a message. Prior research indicates that many users have difficulty using encryption tools correctly and confidently. They either lack an understanding of encryption or the knowledge of its features. The paper investigates usable security design guidelines and models that lead to a better user experience for message encryption software. The study includes qualitative and quantitative research methods, conducted on a group of users, to discover the different factors that affect the user experience of encryption in everyday life. In the meantime, it also uncovers issues that current users are facing. Several recommendations and practical guidelines are outlined, these can be used by practitioners to make encryption more usable and thus increase the overall user experience of the software.KeywordsInformation security and privacysecurityEmail securityEncryption
Zugang zu Informationen in digitalen Sammlungen: Fokus Archive