19 March 2014
- 15:5115:51, 19 March 2014 diff hist +287 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →The interviews
- 15:4315:43, 19 March 2014 diff hist +62 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
16 March 2014
- 15:2115:21, 16 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →What we learned / conclusions:
- 15:1915:19, 16 March 2014 diff hist +232 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →What we learned / conclusions:
- 15:0215:02, 16 March 2014 diff hist +49 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Aims of design
12 March 2014
- 16:0116:01, 12 March 2014 diff hist +25 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →What we learned / conclusions:
- 16:0016:00, 12 March 2014 diff hist +647 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →What we learned / conclusions:
- 15:3615:36, 12 March 2014 diff hist −408 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Presentation
9 March 2014
- 14:3814:38, 9 March 2014 diff hist +804 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) No edit summary
- 14:3614:36, 9 March 2014 diff hist −803 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →What we learned from our user research:
- 14:3514:35, 9 March 2014 diff hist +38 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →What we learned from our user research:
- 14:3214:32, 9 March 2014 diff hist +105 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →How we prepared for interviews / our questions
- 14:2814:28, 9 March 2014 diff hist +207 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 14:2314:23, 9 March 2014 diff hist +4 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 14:2314:23, 9 March 2014 diff hist +304 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
6 March 2014
- 00:2500:25, 6 March 2014 diff hist +243 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Improvement of the first prototype
- 00:2200:22, 6 March 2014 diff hist −402 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Prototype 2e)
- 00:2100:21, 6 March 2014 diff hist +79 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Prototype 2d)
- 00:1900:19, 6 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2b)
- 00:1900:19, 6 March 2014 diff hist −7 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2a)
- 00:1800:18, 6 March 2014 diff hist −360 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Prototype 3
- 00:1700:17, 6 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2a)
- 00:1700:17, 6 March 2014 diff hist +9 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2a)
- 00:1700:17, 6 March 2014 diff hist −4 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2a)
- 00:1600:16, 6 March 2014 diff hist +53 N File:Pro.jpg No edit summary current
- 00:1500:15, 6 March 2014 diff hist +22 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2a)
- 00:1400:14, 6 March 2014 diff hist 0 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2c)
- 00:1400:14, 6 March 2014 diff hist +94 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2c)
- 00:1300:13, 6 March 2014 diff hist −223 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Prototype 3
- 00:1200:12, 6 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Protoype 2c)
4 March 2014
- 17:0417:04, 4 March 2014 diff hist +12 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 17:0317:03, 4 March 2014 diff hist +9 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 17:0217:02, 4 March 2014 diff hist +12 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 17:0217:02, 4 March 2014 diff hist +168 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 16:5716:57, 4 March 2014 diff hist +6 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 16:5716:57, 4 March 2014 diff hist +53 N File:Ideas.jpg No edit summary
- 16:5616:56, 4 March 2014 diff hist +21 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 16:5116:51, 4 March 2014 diff hist −209 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Collecting concrete Ideas
- 16:4716:47, 4 March 2014 diff hist 0 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
3 March 2014
- 17:5417:54, 3 March 2014 diff hist +3 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Presentation
- 17:5317:53, 3 March 2014 diff hist +11 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Presentation
- 17:5017:50, 3 March 2014 diff hist +588 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Presentation
- 17:2617:26, 3 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 17:2517:25, 3 March 2014 diff hist +9 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Collecting Ideas
- 17:2417:24, 3 March 2014 diff hist +13 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Preparation for the interviews
- 17:2317:23, 3 March 2014 diff hist −164 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Ideas
- 17:2317:23, 3 March 2014 diff hist +97 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Aims of design
- 17:1817:18, 3 March 2014 diff hist 0 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →=Testing it / Results
- 17:1817:18, 3 March 2014 diff hist −4 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:1617:16, 3 March 2014 diff hist +50 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:1517:15, 3 March 2014 diff hist +223 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 16:5316:53, 3 March 2014 diff hist +107 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 15:5515:55, 3 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 15:5515:55, 3 March 2014 diff hist −3 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 15:5415:54, 3 March 2014 diff hist 0 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 15:5315:53, 3 March 2014 diff hist +53 N File:Pro2ab.jpg No edit summary current
- 15:5315:53, 3 March 2014 diff hist −17 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 15:4515:45, 3 March 2014 diff hist −447 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 15:3215:32, 3 March 2014 diff hist +1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 15:3015:30, 3 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 15:3015:30, 3 March 2014 diff hist 0 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 15:2915:29, 3 March 2014 diff hist −320 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 15:2615:26, 3 March 2014 diff hist +4 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →How we prepared for interviews / our questions
2 March 2014
- 17:5817:58, 2 March 2014 diff hist −7 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:5717:57, 2 March 2014 diff hist −5 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Improvement
- 17:5617:56, 2 March 2014 diff hist +24 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:5517:55, 2 March 2014 diff hist +53 N File:Impro3.jpg No edit summary current
- 17:5417:54, 2 March 2014 diff hist +53 N File:Impro2.jpg No edit summary current
- 17:5317:53, 2 March 2014 diff hist +53 N File:Impro1.jpg No edit summary current
- 17:5117:51, 2 March 2014 diff hist 0 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:5017:50, 2 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:5017:50, 2 March 2014 diff hist 0 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:4917:49, 2 March 2014 diff hist +35 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:4817:48, 2 March 2014 diff hist −6 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:4817:48, 2 March 2014 diff hist +53 N File:Pro2b2.jpg No edit summary current
- 17:4717:47, 2 March 2014 diff hist +53 N File:Pro2b1.jpg No edit summary current
- 17:4617:46, 2 March 2014 diff hist +53 N File:Pro2a.jpg No edit summary current
- 17:4517:45, 2 March 2014 diff hist +53 N File:Pro1.jpg No edit summary current
- 17:4417:44, 2 March 2014 diff hist +208 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Choosing Ideas and creating prototype
- 17:4117:41, 2 March 2014 diff hist +1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 17:4117:41, 2 March 2014 diff hist +8 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 17:4117:41, 2 March 2014 diff hist −4 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 17:4017:40, 2 March 2014 diff hist +53 N File:Affinity.jpg No edit summary current
- 17:3917:39, 2 March 2014 diff hist +21 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 17:3217:32, 2 March 2014 diff hist +64 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Data Analysis
- 17:3117:31, 2 March 2014 diff hist −1 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) No edit summary
- 17:3017:30, 2 March 2014 diff hist −5,651 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) No edit summary
- 17:1917:19, 2 March 2014 diff hist +125 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) No edit summary
- 17:1417:14, 2 March 2014 diff hist +7,801 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) No edit summary
6 February 2014
- 11:1611:16, 6 February 2014 diff hist −1,053 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →What specific problem we want to solve
30 January 2014
- 15:1715:17, 30 January 2014 diff hist −135 IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) →Main Results Data Analysis
- 15:1715:17, 30 January 2014 diff hist +6,837 N IFD:Nutzerstudien WiSe1314/Sicherheit endpresentation (security) Created page with "==Aims of data gathering== We wanted to know how to improve the design and/or functions in Chat-Secure, regarding the security-problem. People should immediatly see that it's a ..."
23 January 2014
- 13:5613:56, 23 January 2014 diff hist −326 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person4 No edit summary current
- 13:2713:27, 23 January 2014 diff hist +66 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person6 →Bugs
- 13:2413:24, 23 January 2014 diff hist +76 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person6 No edit summary
- 13:2013:20, 23 January 2014 diff hist +68 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person6 →Aesthetic and minimal design
- 13:1313:13, 23 January 2014 diff hist +83 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person6 →Recognition rather than recall
- 13:1013:10, 23 January 2014 diff hist +87 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person6 →Error prevention
- 13:0413:04, 23 January 2014 diff hist +341 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person6 →Consistency and standards
- 12:5712:57, 23 January 2014 diff hist +96 IFD:Nutzerstudien WiSe1314/HeuristicAnalysisSecurity Person6 →User control and freedom