2018 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) 2018
DOI: 10.1109/fuzz-ieee.2018.8491621
|View full text |Cite
|
Sign up to set email alerts
|

SaaS E-Commerce Platforms Web Accessibility Evaluation

Abstract: Web accessibility related to cloud computing is more concerned at the application level where a human interacts with an application via a user interface. Although previous research has identified web accessibility influences on website effectiveness, the evaluation of the relative importance of web accessibility on software-as-a-service (SaaS) e-commerce platform has not been empirically determined. This study evaluates the web accessibility of SaaS e-commerce platform websites. The web accessibility features … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 26 publications
0
8
0
Order By: Relevance
“…Fourth, qualitative methods would provide supplemental findings. CSR is a multi-criteria decision-making (MCDM) real-world problem, thus, a fuzzy MCDM method (such as [47]- [49]) would likely provide deeper understanding of CSR activities.…”
Section: Discussion Implicatons and Conclusionmentioning
confidence: 99%
“…Fourth, qualitative methods would provide supplemental findings. CSR is a multi-criteria decision-making (MCDM) real-world problem, thus, a fuzzy MCDM method (such as [47]- [49]) would likely provide deeper understanding of CSR activities.…”
Section: Discussion Implicatons and Conclusionmentioning
confidence: 99%
“…Pattern matching uses similar structural features ( Belkin & Croft, 1992 ; Gates, 2011 ), and ML for generating verbs, parts of idioms, or adverbs by ML techniques are applied by Curto (2010) . While POS and parse information have been used in some works for key selection ( Sohaib, Naderpour & Hussain, 2018 ), some used verbs, adjectives and prepositions ( Sohaib, Naderpour & Hussain, 2018 ) for the key. The proposed system also utilizes POS information for the selection of keys.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…The approaches based on POS information for distractor generation (key and distractor both should be of the same POS) are proposed in Coniam (2013) . Frequency (occurrences of both key and distractor should be the same) used in Sohaib, Naderpour & Hussain (2018) , domain ontology (by using web ontology language ( Antoniou & Van Harmelen, 2004 )) proposed by Papasalouros, Kanaris & Kotis (2008) , distributional hypothesis (similar words in a similar context) by Celikyilmaz & Hakkani-Tur (2011) , pattern matching (by using parse information) used by Hoshino & Nakagawa (2007) , by semantic analysis based approach like ( Aldabe & Maritxalar, 2010 ) used latent semantic analysis, ( Aldabe, Maritxalar & Mitkov, 2009 ) used verbs similarity by distributional data, ( Belkin & Croft, 1992 ) used semantic similarity between two words using Patwardhan and Pedersen’s method, Kumar, Banchs & D’Haro (2015) used word2vec tool. Deep semantic analysis and neural embedding-based approaches can be used for sophisticated distractor generation.…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Cloud computing is an on-demand, expandable, costeffective, virtualized, and all-time available model. It has been known as an effective technology in parallel computing, which offers a range of services such as virtualized resources, metered resource usage, on-demand computing resources access, dynamic and elastic scaling, and ubiquitous computing that can be released and provisioned without effort [8]. In this regard, cloud resources and services are facing significant uncertainty during provisioning.…”
Section: A Cloud Computing Characteristicsmentioning
confidence: 99%
“…In SaaS, the applications are deployed in the cloud and the cloud clients are allowed to access them through the Internet [7]. IaaS provides virtual private network hardware and software, hardware and software firewalls, storage, processing power, and network infrastructure [8]. PaaS permits clients to use predefined tools prepared by cloud providers to deploy web applications and other programming software [9].…”
Section: Introductionmentioning
confidence: 99%