He ChenInformation EthicsThe following article will first discuss several qualities that Regan believed important for the ideal moral judgment. Then, it will talk…Feb 21, 2018Feb 21, 2018
He ChenResponse to Analyzing/Visualizing InformationThe following article will talk about what is decision tree and what can decision trees do with examples. Then, it will talk about why…Feb 14, 2018Feb 14, 2018
He ChenResponse to Organizing InformationThe following article will discuss different kinds of exact and ambiguous schemes and discuss what kind of information the scheme is best…Feb 11, 2018Feb 11, 2018
He ChenProtecting InformationThis article will first discuss the difference between asymmetric encryption and symmetric encryption. Then, I will talk about why John…Feb 7, 2018Feb 7, 2018
He ChenResponse to Encoding InformationThe following article will firstly discuss three primary encoding schemes for Unicode. Then, I will compare and contrast two image encoding…Feb 5, 2018Feb 5, 2018
He ChenDesigning Secure Systems RespondsIn the OWASP’s article, writers introduced the threat modeling. The following essay will firstly talk about what are entry points, asset…Jan 31, 2018Jan 31, 2018
He ChenUI Design ResponseIn order to come up a truly user-friendly design, it is necessary to follow some principles or guidelines. Though Ben Schneiderman, Jane…Jan 24, 2018Jan 24, 2018
He ChenUX and interaction designThe following article will discuss three important terms mentioned in the Donald Norman’s book “The Design of Everyday Things”…Jan 22, 2018Jan 22, 2018
He ChenUser researchIn the first part of the following article, I will first talk about what is design ethnography, which discussed in Erika Hall’s book “Just…Jan 17, 2018Jan 17, 2018
He ChenDesign thinkingThe following article will discuss the key ingredients and the general method of design thinking, why Aravind’s approach to the eye’s care…Jan 10, 2018Jan 10, 2018