The article explores the process of creating interfaces for security systems in apartment buildings using the persona method and user classification through the random forest method. The persona method allows for segmenting users based on demographic, psychographic, and behavioral characteristics, providing deeper insight into the needs of different groups and enabling the creation of personalized interfaces for effective interaction with the system. The random forest method is used to select key criteria that influence user classification and optimize the system according to their needs. The article emphasizes the importance of data analysis in improving the convenience and efficiency of security systems, and suggests approaches to integrating these methods into the design process.
- Kirmani, S., Gupta, B., Vansover, H., Arellano, J. G., & Zhu, Z. (2019). Designing with personas. Journal of User Experience, 15(1), 23–46.
- Pinhanez, C. (2017). Design methods for personified interfaces. Proceedings of the International Conference on Computer-Human Interaction Research and Applications (CHIRA 2017), 27–38 https://doi.org/10.5220/0006487500270038
- Pérez-Montoro, M., & Codina, L. (2017). Designing user experience. In M. Pérez-Montoro & L. Codina (Eds.), Navigation design and SEO for content-intensive websites (pp. 65–84). Chandos Publishing.
- Toet, A. (2005). Integrated design of intelligent surveillance systems and their user interface. Proceedings of the 2005 International Conference on Artificial Intelligence, ICAI’05, 1, 17–23.
- Wang, M. (2019). Accessible access control: A visualization system for access control policy management. Open Access Dissertation, Michigan Technological University, 2019. https://www.mtu.edu/computing/ graduate/dissertations/pdfs/accessible-access-control-a-visualization-system-for-access.pdf
- Vaniea, K., Ni, Q., Cranor, L. F., & Bertino, E. (2008). Access control policy analysis and visualization tools for security professionals. Proceedings of Workshop on Usable IT Security Management (USM ‘08). Workshop on Usable IT Security Management, Pittsburgh, PA, United States, 23/07/08. https://api.semanticscholar.org/ CorpusID:7811249
- Dey, P., Sinha, B. R., Amin, M., & Badkoobehi, H. (2019). Best practices for improving user interface design. International Journal of Software Engineering & Applications, 10, 71–83. https://doi.org/10.5121/ ijsea.2019.10505
- Nguyen, T.-D., Vanderdonckt, J., & Seffah, A. (2016). Generative patterns for designing multiple user interfaces. 2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft), Austin, TX, USA, 151–160. https://doi.org/10.1145/2897073.2897084
- Stoll, J., Mccolgin, D., Gregory, M., Crow, V., & Edwards, W. (2008). Adapting personas for use in security visualization design. VizSEC 2007: Proceedings of the Workshop on Visualization for Computer Security, Berlin: Springer Berlin Heidelberg, 39–52,https://doi.org/10.1007/978-3-540-78243-8_3
- LeRouge, C., Ma, J., Sneha, S., & Tolle, K. (2013). User profiles and personas in the design and development of consumer health technologies. International Journal of Medical Informatics, 82(11), e251-e268. https://doi.org/10.1016/j.ijmedinf.2011.03.006
- Marsden, N., & Probster, M. (2019). Personas and identity: Looking at multiple identities to inform the construction of personas. CHI ‘19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, May 4–9, 2019, Glasgow, Scotland, UK, Paper No.: 335, 1–14, https://doi.org/10.1145/3290605.3300565
- Basiuk, T. M., Lytvyn, V. V., Zakhariia, L. M., & Kunanets, N. E. (2019). Machine Learning: Textbook. Lviv: Publishing House “Novyi Svit – 2000”