Guidelines to Design Usable Security Feedback for Identity Management Applications
|
|
|
- Thomas Pope
- 10 years ago
- Views:
Transcription
1 Guidelines to Design Usable Security Feedback for Identity Management Applications RICARDO MENDOZA-GONZÁLEZ 1 Postgraduate Studies Universidad Politecnica de Aguascalientes Calle Paseo San Gerardo 207, Fracc. San Gerardo, CP 20342, Aguascalientes Mexico 2 Systems and Computing Instituto Tecnologico de Aguascalientes Av. Adolfo Lopez Mateos 1801, Ote. Fracc. Bona Gens, Aguascalientes Mexico SANDRA JIMENEZ-GONZÁLEZ Universidad Politecnica de Aguascalientes Calle Paseo San Gerardo 207, Fracc. San Gerardo, CP 20342, Aguascalientes Mexico [email protected]; [email protected] Abstract: - In this paper we propose a set of design-guidelines oriented to mitigate the typical high-level design challenges, and usability-flaws in identity management applications (IMA s). Our approach is oriented to help developers in order to achieve usable well-designed user interfaces for IMA s. We present a set of design guidelines following and adapting a part of a previous contribution consisted of a simple methodology to specify usability in IMA s joining HCISEC criteria and interactive patterns. Then we show the effectiveness of our proposal by using an illustrative example as a proof-of-concept together with a preliminary study Key-Words: - : Identity Management Applications, Security Information Feedback, Design Patterns, Usability, Trustworthy Environment, User-centered Design 1 Introduction According to Dhamija, and Dusseault The identity management systems are complex applications oriented to facilitate the management of personal information, credentials, identifiers, and the presentation of this information to other parties by means of powerful web features. In many management schemes, an identity provider (IdP) issues identities or credentials to users, while a relying party (RP) depends on the IdP to check the user credentials before it allows users access to Web site services [1, pp. 24]. By separating the role of and IdP from the RP, identity management systems let users leverage one identifier across multiple Web services [1, 2]. Security and technology requirements demanded for these systems, and current contact with common users, involve many usability considerations. Identity management systems are responsible for the creation, use, and termination of electronic identities. However, identity management as a formal discipline is a fairly new concept. In addition, identity management represents an important area of research that deserves more study by the security usability community being some of our motivation for why we are interesting in this topic [2]. In line to the above and according to [3], it is very important to distinct between identity management systems (IMS), and identity management applications (IMA). The authors define an IMS as the infrastructure in which IMA s, as components, are coordinated. IMA s are tools for individuals to manage their socially relevant communications which can be installed, configured, and operated at the client and/or server side. Bearing in mind that the IMA could be completely managed at the user s side it is very important that interface is designed as intuitive a simple as possible. To achieve this goal it is necessary to consider usability in all the stages of the system s life cycle. Standard ISO defines usability as: Extent to which a product can be used by specified users to achieve specified goals ISBN:
2 with effectiveness, efficiency and satisfaction in a specified context of use [4]. Usability is an essential concept to design adequate feedback which represents any system-user communication form. Thus, information security feedback could be referred as any information related to the system s security conveyed to the end user through the UI (User Interface) [5]. An appropriate user feedback is very important in any secure system, but it is critical if the adequate use, and the effectiveness of certain security features, depend on it. Currently, many criteria are available to facilitate the design of a security-related user interface. One of the principal approaches is the HCISEC design criteria which were introduced by Johnston et al. [6]. These criteria are based on the traditional Nielsen s usability heuristics [7]. The concept of HCISEC modifies and adapts the concepts of the traditional HCI to focus in aspects of security and to find out how to improve security through the elements of the interface [6]. According to Johnston et al. [6] HCISEC deals with how the security features of the UI can be as friendly and intuitive as possible, because the easier a system is to use, the less likely is that the user will make a mistake or try to bypass the security feature, resulting in a more reliable system. To achieve a successful application of the HCISEC concepts, it is necessary to consider the following design criteria, which facilitate developing usable interfaces that are used in a security environment [6]. These criteria are based on Nielsen s heuristics traditionally used for heuristic evaluation (see e.g. [7]) Visibility of system status: The UI must inform the user about the internal state of the system (e.g., using messages to indicate that a security feature is active, etc.). The warning or error messages must be detailed but specific including a suggested corrective action for some security problem, and links to obtain additional information or external assistance. Aesthetic and minimalist design: Only relevant security information should be displayed. The user must not be saturated with information and options, and the UI must avoid the use of technical terms as much as possible. The security UI must be simple and easy to use, maintaining a minimalist design. Satisfaction: The security activities must be easy to realize and understand without the use of technical terms in the information showed to the user. In some cases, it is convenient to use humor situations or figures to present important security concepts to the user in an entertaining manner. Convey features: The UI needs to convey the available security features to the user clearly and appropriately; a good way to do it is by using figures or pictures. Learnability: The UI needs to be as nonthreatening and easy to learn as possible; it may be accomplished using real-world metaphors, or pictures of keys and padlocks. The meaning of these metaphors may be incorporated to the security interface indicating users how to easily use the specific security features. Trust: It is essential for the user to trust the system. This is particularly important in a security environment. The successful application of the previous criteria should typically result in a trusted environment. The concept of trust can be adapted for the HCISEC criteria of trust [6] to the belief, or willingness to believe, of a user in the security of a computer system. The degree of trust that users have in a system will determine how they use it. For example, a user that does not trust a web site will not supply their credit card details. In summary, we believe that our strategy of combining HCISEC Criteria, Design Patterns, and Usability Metrics could be incorporated along the basic development cycle in order to design adequate interfaces for IMA s. This proposal could be used even to evaluate and enhance existing interfaces. The remaining of this paper is organized as follows. In Section 2 e present a description of the problem within the framework of our research work. In Section 3 we describe our proposed guidelines including an illustrative example as a proof-ofconcept together with a preliminary usability study. Finally, in Section 4 we present our concluding remarks and provide some directions for future work. 2 Problem Formulation According to Dhamija [8], and Johnson et al. [9], a usable security information feedback could reduce possible errors caused by final users when important notifications are ignored, nevertheless the most of the designers or/and programmers do not consider the available design criteria because their application is frequently complex and the criteria are not specified enough. Perhaps, the general problem is that the majority of designers of information security applications, such as IMA s, do ISBN:
3 not use systematic approaches to integrate usability in the interfaces of the systems developed. In the same way, Braz et al. [10] demonstrated the importance of finding equilibrium between security and usability. According to [11, 12, 13] this problem frequently occurs due to the complex application of the security-tools. Other researchers (cf. [14, and 15]) point the need of design methods and rules based on strategies that make easier the application of knowledge oriented to achieve most usable and trustworthy environments. Specifically linked to IMS/IMA s, Dhamija, and Dusseault [1] detected the following seven basic flaws: Identity management is not a goal in itself: Identity management is rarely a user s primary goal. Security aspects are minor for users, userfriendly systems are more important. Users follow the path of least resistance: Systems are more likely to be adopted if they re easy to download, install, and configure. This includes the authentication process and password interfaces, which must become as easy as today s standard login to successfully compete. Cognitive scalability is as important as technical scalability: A management system must to reduce cognitive burden for users, avoiding the Password fatigue and its security repercussion. User consent could lead to maximum information disclosure: The number of trust decisions users have to make should be reduced. Don t try to achieve consent by overwhelming users with more warnings, dialogs, and indicators. Is needed both: User and system authentication: System should support mutual authentication and help users detect spoofing attacks. Possibility to be attacked must be considered during the system design process. RPs want to control the customer experience: The use of additional applications may to introduce user confusion. Web sites must to offer some control over the customer relationship, security of their accounts, and user experience. Trust must be earned: Expert security reviews and usability analyses are essential before deploying identity management systems. It is possible to create a trustworthy environment by means of well-designed systems. In this way it is possible to infer that the following aspects could represents a further challenge for HCI and Identity Management communities: The lack of specifications oriented to conceive usable, secure, and trustworthy identity management applications (IMA s). The lack of design guidelines, best practices, or strategies to design usable IMA s directed to be readily incorporated into the basic development life cycle. The lack of guidelines that provide support to different types of users (Developers, programmers, end users) throughout the entire design process. Bearing in mind previous narrow circumstances, it is necessary to provide a support for security applications based on usability principles which must be considered during the design-process of trust-systems (e.g. IMA s) to increase its proper use and interpretation by users. We think that an adequate feedback would substantially reduce possible user s errors when security notifications are misunderstood. In this way the general objective for this research rises: Establishing a non-exhaustive collection of design-guidelines oriented to help developers in order to achieve usable well-designed user interfaces for identity management applications (IMA). This objective appears to indicate several specific goals, such as: To analyze the seven flaws in identity management suggested by Dhamija, and Dusseault [1] to identify those related to usability and user-interface design. To set up a collection of guidelines based on HCISEC to reduce the identified usable-identity management gaps, suitable for easy application into the development life cycle stages To show the effectiveness of the proposed guidelines by using study cases as a proof-ofconcept. We proposed a set of design guidelines intended to facilitate the design of a usable security information feedback, easy to understand and interpret by users with different experience and backgrounds (experts, advanced, and beginners). We present a detailed explanation of our proposal in the following section. 3 Problem Solution Before proceeding we should mention the general idea of what a pattern is supposed to be, A pattern is a proven solution to a recurrent problem in a certain environment [16]. The patterns take this experience and transform it into knowledge applicable as an alternative to solve a specific issue. ISBN:
4 This knowledge could be organized in a number of ways such as classifications, collections, or sets of guidelines [16, and 17]. As mentioned before, we fundamentally considered previously realized patterns approaches presented in [5, and 18] to shape a collection of guidelines oriented to inlay usability into the design of identity management applications (IMA s), and match with the most of the usability-related flaws in IMA s identified in [1] and briefly described in section 2. The novelty of our proposal consist in joining HCISEC [6] with patterns-paradigm to mainly impact on security in IMA s and its users through a well designed usable interface, in order to encourage a trustworthy environment. Another relevant aspect of the proposal is that the set of guidelines can be used both to generate new adequate interfaces, and to assess the usability of existing applications as a, basic but very reliable, usability check-list. Additionally the knowledge offered by the design guidelines was structured to be easily composed and specified in a more formal fashion using a pattern language, e.g. [19, and 20]. It is very important to mention that as far as we know, we are the first researchers in try to enhance and evaluate usability of identity interfaces. Table 1 presents the proposed set of guidelines oriented to bolster usability in identity management applications IMA s. Table 1. Proposed set of Guidelines to Design Security Feedback for IMA s. Usability-related flaws in IMA s [1] Identity management is not a goal in itself Users follow the path of least resistance Guideline Extolled but Transparent Identity management Procurement and Commissioning Description Identity management activities must be transparent to the user, nevertheless all the benefits offered by IMA s must be conveyed to the user in a proper way by means of including UI elements oriented to facilitate the direct operation and use of the available security features. Including free-download links in browsers, and other widely popular web applications, such as social networks. In addition, the configuration options must be as simple as possible minimizing the number of options. Many times the use of pictures, figures, realworld metaphors, or even humor, contributes to facilitate the use and interpretation of systems including their configuration options. Cognitive scalability is as important as technical scalability Agility Simplicity and Incorporating simplifications such as automated form-filling, retained settings across several web sites. Additionally, all forms must be designed in a minimalist and aesthetic fashion maintaining the cognitive load as low as possible. User consent could lead to maximum information disclosure Securitydecisions Burden In the event of a serious security problem users should not be responsible for deciding. Actually the number of user decisions in any security issue must be as low as possible. It is necessary to avoid the presentation of critical security and privacy configuration options. In fact, it is very important to keep as low as possible the number of security notifications. Is needed both: User and system authentication Insight of a Trustworthy Environment Specific visual identifiers could to complement the web authentication technology. Certainly several forms of interactive feedback may to help users in web authentication. RPs want to Usage of Notify users, in a simple and friendly manner, about the use of ISBN:
5 control customer experience the Consistent Look-and-Feel external applications. If possible, use the same or very similar design for all the screens even in those of external applications. Trust must be earned Encourage a Trustworthy Environment Several authors, e.g. [1, 5, 6, 7, 8, 9 10, 11, 18] share the idea that a well-designed interface contributes to establish a trustworthy environment. The application of the entire guidelines leads to this point. 3.1 Case Study In order to analyse both the application of the previous set of guidelines (see Table 1) and their positive impact, we made a comparative evaluation between eight IMA s, and a suggested prototype was entirely endowed from the knowledge offered by the proposed guidelines (See Figure 1 at the end of the paper). The prototype was based on the user interface of Sxipper 1 (an IMA Firefox plugin). We choose Sxipper 1 due to its simple usage, and friendly look and feel. Figure 1 graphically depicts the appearance of our prototype called cridential. Figure 1 A) shows the profile-edit section that includes three principal parts: Contact (Information such as Name, Last Name, and ), Localization (Information such as Country, State, and Time), Details (Information such as Gender, and Birth Date). Figure 1 B) Present the Sharing subsection of Profile. This is the must important section of the prototype since it allow users to share his information with others (Companies, personal sites, organizational sites, among others). Additionally, in this section user could create a specific profile considering the following categories: Private, Shopping, Entertainment, General, Professional, and Other, in order to classify web sites and to provide users with an organized and easy way to share his personal information with other sites. Before updating the user profile, the application suggested to very the entered data; see Figure 1 C). Figure 1 E) shows a small screen that allows users to select (online) one of the specific profile created, depending on his preferences and web site's purpose Finally, Figure 1 D) presents an always visible icon integrated to the browser in order to inform user about the availability of the application. For this study were considered the following IMA s: 1. Mozilla Navigator (selected from [3]). 2. Cookie Cooker (selected from [3]). 3. Yodlee 7 (selected from [3]). 4. Microsoft Passport (selected from [3]). 5. ADSelfService Plus 2 (randomly selected, online available). 6. Sxipper 1 (randomly selected, on-line available). 7. Tivoli Identity Manager 3 (randomly selected, on-line available). 8. Quest One Identity Solution 4 (randomly selected, on-line available). The selected Identity Management Applications are available online in the following URL s: 1, 2, 3, 4. The comparative evaluation was conducted according to the testing methodologies presented in [21, 22, 23, 24] as follows: We invited 72 participants, consisting of women and men between the ages of 20 and 40. The vast majority of the participants had the basic digital competences [25] but they are not experts on Information Technologies or Computer Science. In order to obtain the perception of the participants about the effectiveness and usability of our proposal, we (arbitrarily) distributed the IMA s to the participants in blocks of 9 to 9 including our anonymous-prototype (It means that each application was evaluated 8 times by different participants). The applications were evaluated using a 0 to 10 scale (Being 0 the worst score, and 10 the best score) considering the following items: 1. Suitable security-decisions burden. 2. Nourishing trustworthy environment. 3. Visibility of system status. 4. Comprehensible application usage. 5. Adequate and friendly look-and-feel. 6. Agile and comfortable Navigation. Previous list was based on the HCISEC criteria [6] which are on line to the Nielsen s basic usability requirements [7]. Figure 2 graphically depicts the average scores given by the participants to each of the considered IMA s 3.2 Data Analysis After reviewing the study data, we found that the prototype used was very well received by the participants achieving good grades in important ISBN:
6 factors such as: Security decision burden, visibility of the system status, comprehension, navigation, and appearance; outperforming most of the considered Identity Management Applications (IMA s). In line with the above, the analysis performed reveled that most accepted IMA s interfaces were: The suggested prototype, Mozilla Firefox, and Sxipper (See Figure 2, at the end of the paper), thus we focus on this sub-group. We could observe that the bigger discrepancy between the three interfaces comparison occurs for Nourishing Trustworthy Environment evaluation, being Mozilla Firefox the highest evaluated. This was expected since the Mozilla Firefox security qualities are one of its strongest points. Nevertheless, the suggested prototype was able to capture a good acceptance of the participants obtaining a very close score in relation to Mozilla for this particular aspect. Although the prototype was a very similar rating to the Mozilla (considered as the best IMA in the study presented in [3]) the perception of the participants categorized the prototype as more usable and comfortable, friendly, and more understandable; these aspects appear to lead to a trustworthy environment. We also note that participants perceived the system-configuration tasks as the must unwelcome. This perception may impact the adequate usage of several IMA s which includes a number of configuration options (e.g. Tivoli Identity Manager, Quest One Identity Solution, and Microsoft Passport), producing important gaps in information security and privacy. Additionally, we could observe a similarity between participants perception and the evaluations provided by the wide study presented in [3], particularly in aspects related to: Comprehensible Application Usage, Adequate and Friendly Lookand-Feel, and Agile and Comfortable Navigation. We perceive that the participants were an inclination to do not trust in applications with inconsistent look-and-feel, even more in those applications that do not included logos or other identity-company information. 4 Conclusion This paper attempts to tackle the problems identified in [1], namely that current identity management systems suffer from a number of (mostly usabilityrelated and incentive-related) flaws, a really important problem space to address. In response to this challenge, we provide a tool for designers and developers with guidance in designing a usable interface for Identity Management Applications (IMA s). In order to provide an evaluation of the significance of the proposed approach, we performed a usability study that consisted of the comparison of a prototype IMA s interface entirely designed by using the proposed guidelines, against eight current available IMA s. In this study seventy two users expressed their view on: usability, information comprehension, trust, navigation, etc. for each IMA s interface (see sub-section 3.1). After the analysis of the collected information, was possible to infer that the proposed guidelines may to contribute to achieve a well-designed interface for IMA s. We firmly believe that a welldesigned interface represents a very feasible solution for some of the principal flaws detected in IMA s (see sub-section 3.2). Even though the number of IMA s considered seems low, Bevan [26] points out that it is possible and feasible to carry out usability analysis for one application with one user in terms of cost-benefit and case study. Moreover, one user can start testing the computer interface in early stages of webapplications development. Nevertheless, more usability testers should be used before completing the development of a fully-fledged website. Nielsen and Landauer [27] have found that few users can uncover most of the usability problems in a computer interface. These researchers have found that five users can be used to test the usability of an interface to uncover about 75% of its usability problems contributing to achieve a well-designed interface. The results of this research may be the basis for reducing the gap caused by the lack of truly systematical (or methodological) approaches aimed to enhance the design process of IMA's and its interfaces. IMA's are very important in the era of web and social networks as they come to expedite the authentication of millions of users who daily exchange confidential information between multiple applications for various. Therefore we think that it is essential to achieve well-designed IMA s, this is a very important job to do. There are several aspects to explore as future work for this research, such as to perform a wide study using standard usability questionnaires in order to compare the prototype to newer IMA s. Other important point consist of structure the proposed guidelines in a more formal fashion using a standard patterns language (e.g. [19, and 20] in order to establish a set of essential best practices oriented to design usable and secure IMA s ISBN:
7 interfaces. We think this aspect represents an important further research-challenge. References: [1] Dhamija, R., and Dusseault L. The Seven Flaws of Identity Management, IEEE Security & Privacy, /08, 2008, [2] Peterson, G. Introduction to Identity Management Risk Metrics, IEEE Security & Privacy, /06, 2006, [3] Independent Centre for Privacy Protection (In Danish), and Studio Notarile Genghin, Identity Management Systems (IMS) Identification and Comparison Study, 2003, Available at: study/icpp_sng_ims-study.pdf [4] ISO International Organization for Standardization, International ISO Standard , Ergonomic requirements for office work with visual display terminals (VDTs) - Part 11: Guidance on usability, First edition, , Switzerland. [5] Muñoz, J., Mendoza, R., Vargas Martin, M., Vanderdonckt, J. and Álvarez, F., A Methodology for Designing Information Security Feedback Based on User Interface Patterns. Advances in Engineering Software, 40, 2009, [6] Johnston, J., Eloff, J. and Labuschagne, L. Security and Human Computer Interfaces, Computers & Security, 22, 2003, [7] Nielsen, J. Ten Usability Heuristics, Nielsen & Norman Group, Mountain View, 2005, Available at stic/heuristic_list.html [8] Dhamija, R., Security Usability Studies: Risk, Roles and Ethics. Proceedings of ACM CHI 07, San Jose, April 28-May 3, [9] Johnson, M.L., and Zurko, M.E., Security User Studies and Standards: Creating Best Practices. Proceedings of ACM CHI 07, San Jose, April 28-May 3, [10] Braz, C., Seffah, A., and M Raihi, D., Designing a Trade-off between Usability and Security: A Metrics Based-Model. Proceedings of 11 th IFIP TC 13 Conf. on Human-Computer Interaction INTERACT 07, Rio de Janeiro, Brazil September Lecture Notes in Computer Science, Vol Springer, Berlin, 2007, [11] Rode, J., Johansson, C., DiGioia, P., Silva Filho, R., Nies, K., Nguyen, D. H., Ren, J., Dourish, P., and Redmiles, D., Seeing Further: Extending Visualization as a Basis for Usable Security. Proceedings of SOUPS 06, Pittsburgh, July 12 14, 2006, [12] Granollers, T., Lorés, J. and Cañas, J., Design of Interactive Systems Focused in Users (In Spanish), UOC, Barcelona, [13] Cranor, L.F. Designing a Privacy Preference Specification Interface: A Case Study, Proceedings of Workshop on Human-Computer Interaction and Security Systems, Fort Lauderdale, USA, April 5 10, [14] Cranor, L. F. and Garfinkel, S. Security and Usability: Designing Secure Systems that People Can Use, O Reilly, Sebastopol, [15] Fernandez, E. B., and Munoz-Arteaga, J., Extending a Secure Software Methodology with Usability Aspects, (Position Paper), Proceedings of SPAQu'09, Orlando, Florida, USA, October 25, [16] Gamma, E., Helm, R., Johnson, R., and Vlissides, J. M., Design Patterns: Elements of Reusable Object-Oriented Software. Addison- Wesley Professional Computing Series, [17] Schumacher, M., Fernandez, E., Hybertson, D., and Buschmann, F., Security Patterns: Integrating Security and Systems Engineering. John Wiley & Sons, USA, [18] Mendoza González, R., Muñoz-Arteaga, J., Vargas Martin, M., Álvarez-Rodriguez, F. and Santaolaya, R., A Pattern Approach based on Usability Criteria to Reduce Usability Design Flaws in Graphical User Interfaces of Identity Management Systems, Proceedings of SPattern'10/CISIS 10, Krakow, Poland, February 15 18, [19] Taibi, T. Formalising Design Patterns Composition, Proceedings Software, 153, [20] Graham, I. The Wu Pattern Language, Available at [21] Chiasson, S., Biddle, R., and van Oorschot, P. C., A SecondLook at the Usability of Click- Based Graphical Passwords, SOUPS 07 Best Paper Award, Proceedings of 11 th Symposium on Usable Privacy and Security, Pittsburgh, Pennsylvania, July 18-20, 2007, [22] Chiasson, S., van Oorschot P. C., and Biddle, R., Graphical Password Authentication Using Cued Click Points, Proceedings of 12th European Symposium On Research In Computer Security Dresden, Germany, September 24-27, Lecture Notes in Computer Science, Springer, Berlin, pp , [23] Chiasson, S., Biddle, R., and van Oorschot, P. C., A Usability Study and Critique of Two ISBN:
8 Password Managers, Proceedings of 15 th USENIX Security Symposium, July 31 - August 4, Vancouver,B.C., Canada, pp. 1-16, [24] Myllyniemi, A., Identity Management Systems: A Comparison of Current Solutions, Proceedings of the Seminar on Network Security, December 11-12, [25] VOX Norway, The Digital Citizen: An analysis of digital competence in the Norwegian population, VOX Nasjonalt Fagorgan for Kompetansepolitikk, Norwegian Ministry of Education and Research, Oslo, Norway. ISBN: , [26] Bevan, N., Cost-Justifying Usability: An Update for the Internet Age. Technical Report that includes material adapted from the chapter: Cost benefits framework and case studies, in Bias, R.G. & Mayhew, D.J. (eds) Cost- Justifying Usability: An Update for the Internet Age. Morgan Kauffman [27] J. Nielsen, and T.K. Landauer, A mathematical model of the finding of usability problems, Proceedings of ACM/IFIP INTERCHI'93, Amsterdam, The Netherlands, April 24-29, 1993, pp Figure 1. General appearance of the suggested prototype. ISBN:
9 Figure 2. Feedback of the Participants. ISBN:
A Framework for Integrating Software Usability into Software Development Process
A Framework for Integrating Software Usability into Software Development Process Hayat Dino AFRICOM Technologies, Addis Ababa, Ethiopia [email protected] Rahel Bekele School of Information Science, Addis
A Set Of Heuristics for User Experience Evaluation in E-commerce Websites
A Set Of Heuristics for User Experience Evaluation in E-commerce Websites Laia Bonastre, Toni Granollers University of Lleida Lleida, Spain [email protected], [email protected] Abstract Electronic
End-User Perception and Usability of Information Security
End-User Perception and Usability of Information Security Z.F. Zaaba 1,2, S.M. Furnell 1,3 and P.S. Dowland 1 1 Centre for Security, Communications and Network Research, University of Plymouth, Plymouth,
White Paper: Designing Resourceful Graphical User Interfaces (GUIs) for Healthcare Applications
Accelerate Development Reduce Time to Product Automate Critical Tasks White Paper: Designing Resourceful Graphical User Interfaces (GUIs) for Healthcare Applications The ASHVINS GROUP, Inc. 6161 Blue Lagoon
To measure or not to measure: Why web usability is different. from traditional usability.
To measure or not to measure: Why web usability is different from traditional usability. Charlotte Olsson Department of Informatics Umeå University, 901 87 UMEÅ, Sweden +46 90 786 6820 [email protected]
Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra
Fan Fu. Usability Testing of Cloud File Storage Systems. A Master s Paper for the M.S. in I.S. degree. April, 2013. 70 pages. Advisor: Robert Capra This paper presents the results of a usability test involving
Key Factors for Developing a Successful E-commerce Website
IBIMA Publishing Communications of the IBIMA http://www.ibimapublishing.com/journals/cibima/cibima.html Vol. 2010 (2010), Article ID 763461, 9 pages Key Factors for Developing a Successful E-commerce Website
Levels of Software Testing. Functional Testing
Levels of Software Testing There are different levels during the process of Testing. In this chapter a brief description is provided about these levels. Levels of testing include the different methodologies
The USE Project: Bridging the Gap between Usability Evaluation and Software Development
The USE Project: Bridging the Gap between Usability Evaluation and Software Development Als, B. 1, Frøkjær, E. 2, Hornbæk, K. 2, Høegh, R. 1, Jensen, J. 1, Nørgaard, M. 2, Skov, M. 2, Stage, J. 1 & Uldall-Espersen,
A methodology for secure software design
A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 [email protected] 1. Introduction A good percentage of the
MEASURING USABILITY OF ICONIC BASED GUIs OF MOBILE EMERGENCY SERVICE SOFTWARE BY USING HCI. Y.Batu Salman, Adem Karahoca
MEASURING USABILITY OF ICONIC BASED GUIs OF MOBILE EMERGENCY SERVICE SOFTWARE BY USING HCI Y.Batu Salman, Adem Karahoca Bahcesehir University, Engineering Faculty, Computer Engineering Department Bahcesehir,
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Business Process Services. White Paper. Improving Efficiency in Business Process Services through User Interface Re-engineering
Business Process Services White Paper Improving Efficiency in Business Process Services through User Interface Re-engineering About the Authors Mahesh Kshirsagar Mahesh has a vast experience of about 24
The Dentist Online Reservation System Design and Implementation Web Based Application and Database Management System Project
2012 International Conference on Education Technology and Computer (ICETC2012) IPCSIT vol.43 (2012) (2012) IACSIT Press, Singapore The Dentist Online Reservation System Design and Implementation Web Based
Security in Practice: Security-Usability Chasm
Security in Practice: Security-Usability Chasm Atul Prakash Computer Science and Engineering Division, University of Michigan, Ann Arbor, MI 48109, USA Abstract. Computer systems security area has received
A model for assessing the quality of e-commerce systems
A model for assessing the quality of e-commerce Antonia Stefani Patras University Department of Mathematics Patras, Rio, GR 26500 [email protected] Michalis Xenos Hellenic Open University School of Science
Webpage Usability Evaluation and Optimization Design: A case study
Webpage Usability Evaluation and Optimization Design: A case study Yanmin Xue, Yefei Shi School of Art and Design, Xi an University of Technology, Xi an, Shaanxi,CHINA Abstract: Webpage usability research
PATTERN-ORIENTED ARCHITECTURE FOR WEB APPLICATIONS
PATTERN-ORIENTED ARCHITECTURE FOR WEB APPLICATIONS M. Taleb, A. Seffah Human-Centred Software Engineering Group Concordia University, Montreal, Quebec, Canada Phone: +1 (514) 848 2424 ext 7165 and/or ext
APPLYING CLOUD COMPUTING TECHNOLOGY TO BIM VISUALIZATION AND MANIPULATION
APPLYING CLOUD COMPUTING TECHNOLOGY TO BIM VISUALIZATION AND MANIPULATION Tien-Hsiang Chuang 1, Bo-Cing Lee 1, and I-Chen Wu 1 * 1 Department of Civil Engineering, National Kaohsiung University of Applied
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Bad designs. Chapter 1: What is interaction design? Why is this vending machine so bad? Good design. Good and bad design.
Bad designs Chapter 1: What is interaction design? Elevator controls and labels on the bottom row all look the same, so it is easy to push a label by mistake instead of a control button People do not make
A Systematic Review of Usability Evaluation in Web Development 1
A Systematic Review of Usability Evaluation in Web Development 1 Emilio Insfran, Adrian Fernandez ISSI Group, Department of Information Systems and Computation Universidad Politécnica de Valencia Camino
Modeling the User Interface of Web Applications with UML
Modeling the User Interface of Web Applications with UML Rolf Hennicker,Nora Koch,2 Institute of Computer Science Ludwig-Maximilians-University Munich Oettingenstr. 67 80538 München, Germany {kochn,hennicke}@informatik.uni-muenchen.de
Continuous User Experience Development
Continuous User Experience Development Kati Kuusinen Tampere University of Technology Tampere, Finland Korkeakoulunkatu 1, FI-33101 Tampere [email protected] Abstract. Continuous approaches for software
How Microsoft IT India s Test Organization Enabled Efficient Business Intelligence
How Microsoft IT India s Test Organization Enabled Efficient Business Intelligence December 2013 The following content may no longer reflect Microsoft s current position or infrastructure. This content
Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
Why Johnny Can't Encrypt: A Usability Study of PGP
Why Johnny Can't Encrypt: A Usability Study of PGP Jan Sousedek Technische Universität Berlin, Germany Erasmus program Summer semester 2008 Seminar: Internet Security [email protected] Abstract Interfaces
Quantitative Analysis of Desirability in User Experience
Quantitative Analysis of Desirability in User Experience Sisira Adikari School of Information Systems and Accounting University of Canberra Canberra, Australia ACT 2617 Email: [email protected]
Screen Design : Navigation, Windows, Controls, Text,
Overview Introduction Fundamentals of GUIs Screen Design : Navigation, Windows, Controls, Text, Evaluating GUI Performance - Methods - Comparison 1 Example: Automotive HMI (CAR IT 03/2013) 64, 68, 69 2
Software Engineering Practices in Jordan
Software Engineering Practices in Jordan Nuha El-Khalili Faculty of Information Technology, University of Petra, Amman, Jordan [email protected] Dima Damen Faculty of Information Technology, University
Development of Evaluation Heuristics for Web Service User Experience
Development of Evaluation Heuristics for Web Service User Experience Kaisa Väänänen-Vainio-Mattila Tampere University of Technology Human-Centered Technology Korkeakoulunkatu 6 33720 Tampere, Finland [email protected]
Name of pattern types 1 Process control patterns 2 Logic architectural patterns 3 Organizational patterns 4 Analytic patterns 5 Design patterns 6
The Researches on Unified Pattern of Information System Deng Zhonghua,Guo Liang,Xia Yanping School of Information Management, Wuhan University Wuhan, Hubei, China 430072 Abstract: This paper discusses
Java Technology in the Design and Implementation of Web Applications
Java Technology in the Design and Implementation of Web Applications Kavindra Kumar Singh School of Computer and Systems Sciences Jaipur National University Jaipur Abstract: This paper reviews the development
Chapter 3 Chapter 3 Service-Oriented Computing and SOA Lecture Note
Chapter 3 Chapter 3 Service-Oriented Computing and SOA Lecture Note Text book of CPET 545 Service-Oriented Architecture and Enterprise Application: SOA Principles of Service Design, by Thomas Erl, ISBN
Issues in Information Systems Volume 15, Issue II, pp. 270-275, 2014
EMPIRICAL VALIDATION OF AN E-LEARNING COURSEWARE USABILITY MODEL Alex Koohang, Middle Georgia State College, USA, [email protected] Joanna Paliszkiewicz, Warsaw University of Life Sciences, Poland,
Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results
, pp.33-40 http://dx.doi.org/10.14257/ijgdc.2014.7.4.04 Single Level Drill Down Interactive Visualization Technique for Descriptive Data Mining Results Muzammil Khan, Fida Hussain and Imran Khan Department
Interface Design Rules
Interface Design Rules HCI Lecture 10 David Aspinall Informatics, University of Edinburgh 23rd October 2007 Outline Principles and Guidelines Learnability Flexibility Robustness Other Guidelines Golden
An Iterative Usability Evaluation Procedure for Interactive Online Courses
An Iterative Usability Evaluation Procedure for Interactive Online Courses by Laurie P. Dringus ABSTRACT The Internet and World Wide Web (W3) have afforded distance learners simple links to access information.
Integrating Security and Usability at Requirement Specification Process
Integrating Security and Usability at Requirement Specification Process Author: Nikhat Parveen 1, Rizwan Beg 2, M. H. Khan 3 1,2 Department of Computer Application, Integral University, Lucknow, India.
Hardware and Software Security
Today, with the big advancement of technology and the need to share data globally at all time. Security has become one of the most important topics when we talk about data sharing. This means that the
Design of a Software Tool for Mobile Application User Mental Models Collection and Visualization
Design of a Software Tool for Mobile Application User Mental Models Collection and Visualization Radek Vala, Roman Jasek, David Malanik Tomas Bata University in Zlin, Faculty of Applied Informatics, nám.
Software Engineering/Courses Description Introduction to Software Engineering Credit Hours: 3 Prerequisite: 0306211(Computer Programming 2).
0305203 0305280 0305301 0305302 Software Engineering/Courses Description Introduction to Software Engineering Prerequisite: 0306211(Computer Programming 2). This course introduces students to the problems
Learning and Academic Analytics in the Realize it System
Learning and Academic Analytics in the Realize it System Colm Howlin CCKF Limited Dublin, Ireland [email protected] Danny Lynch CCKF Limited Dublin, Ireland [email protected] Abstract: Analytics
GenericServ, a Generic Server for Web Application Development
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student [email protected] Bilal CHEBARO Assistant professor [email protected] Abstract
Online Tools for Co-design User Involvement through the Innovation Process
PAPER I Online Tools for Co-design User Involvement through the Innovation Process In: Karahasanovic, A. and Følstad, A. (Eds.). The NordiCHI 2008 Workshops: New Approaches to Requirements Elicitation
A QTI editor integrated into the netuniversité web portal using IMS LD
Giacomini Pacurar, E., Trigang, P & Alupoaie, S. (2005). A QTI editor integrated into the netuniversité web portal using IMS LD Journal of Interactive Media in Education 2005(09). [jime.open.ac.uk/2005/09].
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
Screen Design : Navigation, Windows, Controls, Text,
Overview Introduction Fundamentals of GUIs - methods - Some examples Screen : Navigation, Windows, Controls, Text, Evaluating GUI Performance 1 Fundamentals of GUI What kind of application? - Simple or
Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study
Browser Interfaces and Extended Validation SSL Certificates: An Empirical Study Robert Biddle, P.C. van Oorschot, Andrew S. Patrick, Jennifer Sobey, Tara Whalen Carleton University, Ottawa, ON, Canada
The Role of Information Technology Studies in Software Product Quality Improvement
The Role of Information Technology Studies in Software Product Quality Improvement RUDITE CEVERE, Dr.sc.comp., Professor Faculty of Information Technologies SANDRA SPROGE, Dr.sc.ing., Head of Department
Author. Ginés Dólera Tormo. Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe) Prof. Dr. Gregorio Martínez Pérez (University of Murcia)
Systems with Faculty of Computer Science ENHANCING USER CENTRIC IDENTITY MANAGEMENT SYSTEMS WITH REPUTATION MODELS IN DISTRIBUTED ENVIRONMENTS Author Advisors Dr. Félix Gómez Mármol (NEC Laboratories Europe)
Google Cloud Storage Experience Usability Study Plan
Google Cloud Storage Experience Usability Study Plan HCDE 517 Usability Testing Team 5G s (4 Gals + Google): Victoria Briscoe, Vina Chan, Sooyoung Hwang, Shu-Fan Wen ! Goals Google Cloud Storage is part
Identity Federation Broker for Service Cloud
2010 International Conference on Sciences Identity Federation Broker for Cloud He Yuan Huang 1, Bin Wang 1, Xiao Xi Liu 1, Jing Min Xu 1 1 IBM Research China {huanghey, wangbcrl, liuxx, xujingm}@cn.ibm.com
Voucher Web Metering Using Identity Management Systems
Voucher Web Metering Using Identity Management Systems Fahad Alarifi Abstract Web Metering is a method to find out content and services exposure to visitors. This paper proposes a visitor centric voucher
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical
C. Wohlin, "Is Prior Knowledge of a Programming Language Important for Software Quality?", Proceedings 1st International Symposium on Empirical Software Engineering, pp. 27-36, Nara, Japan, October 2002.
11 Tips to make the requirements definition process more effective and results more usable
1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to
RISK MANAGEMENT IN CITIZEN ORIENTED INNOVATIVE SOFTWARE DEVELOPMENT PROJECTS
RISK MANAGEMENT IN CITIZEN ORIENTED INNOVATIVE SOFTWARE DEVELOPMENT PROJECTS ABSTRACT Emanuel Herteliu 1 Mihai Liviu Despa 2 This paper tackles the subject of risk management in the specific context of
Outline. Lecture 13: Web Usability. Top Ten Web Design Mistakes. Web Usability Principles Usability Evaluations
Lecture 13: Web Usability Outline Web Usability Principles Usability Evaluations Wendy Liu CSC309F Fall 2007 1 2 What Makes Web Application Development Hard? Target audience can be difficult to define
MS Internet Explorer Vs Opera Comparative Usability Test
MS Internet Explorer Vs Opera Comparative Usability Test Farrukh Sahar (800418 P-510) [email protected] Usability from an industrial perspective DV-1301 Abstract This report presents comparative usability
User interface evaluation experiences: A brief comparison between usability and communicability testing
User interface evaluation experiences: A brief comparison between usability and communicability testing Experiências de avaliação de interface de usuário: uma breve comparação entre usabilidade e testes
Usability-Improving Mobile Application Development Patterns
Usability-Improving Mobile Application Development Patterns Bettina Biel, Volker Gruhn University of Duisburg-Essen paluno, The Ruhr Institute for Software Technology Essen, Germany [bettina.biel,volker.gruhn]@paluno.uni-due.de
Usability Heuristics for Touchscreen-based Mobile Devices
Usability Heuristics for Touchscreen-based Mobile Devices Advisor: Dr. Cristian Rusu. Pontificia Universidad Católica de Valparaíso Facultad de Ingeniería Escuela de Ingeniería Informática Isabel Brown
IMPLEMENTING HEALTHCARE DASHBOARDS FOR OPERATIONAL SUCCESS
idashboards for Healthcare IMPLEMENTING HEALTHCARE DASHBOARDS FOR OPERATIONAL SUCCESS idashboards gives me access to real-time actionable data from all areas of the hospital. Internally, the adoption rate
Web site evaluation. Conducted for. (The Client) By Information & Design. October 17th, 1998
Web site evaluation Conducted for (The Client) By Information & Design October 17th, 1998 INFORMATION & DESIGN www.infodesign.com.au phone +61 3 9521 5123 fax +61 3 9521 5124 1998 Information & Design
Usability Metric Framework for Mobile Phone Application
Usability Metric Framework for Mobile Phone Application Azham Hussain Informatics Research Institute University of Salford Greater Manchester M5 4WT United Kingdom Maria Kutar Informatics Research Institute
Usability and usefulness of ergonomics Web sites: a preliminary investigation
Peer Reviewed Article Vol.4(1) March 2002 Usability and usefulness of ergonomics Web sites: a preliminary investigation J.P. James Department of Human Kinetics and Ergonomics Rhodes University [email protected]
Usability Evaluation of Universities Websites
1 Jabar M. A., 2Usman Abbas Usman, 3Sidi F. Department of Information System, marzanah@ upm.edu.my 2 Department of Information System, [email protected] 3 Department of Computer Science, fatimah@
Evaluating OO-CASE tools: OO research meets practice
Evaluating OO-CASE tools: OO research meets practice Danny Greefhorst, Matthijs Maat, Rob Maijers {greefhorst, maat, maijers}@serc.nl Software Engineering Research Centre - SERC PO Box 424 3500 AK Utrecht
Ensuring Security in Cloud with Multi-Level IDS and Log Management System
Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,
The Usability of Electronic Stores based on the Organization of Information and Features
The Usability of Electronic Stores based on the Organization of Information and Features CHAN KAH-SING Singapore Polytechnic This paper describes an investigation on how the perceived usability of electronic
System/Data Requirements Definition Analysis and Design
EXECUTIVE SUMMARY This document provides an overview of the Systems Development Life-Cycle (SDLC) process of the U.S. House of Representatives. The SDLC process consists of seven tailored phases that help
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
User Interface Design
User Interface Design Winter term 2005/2006 Thursdays, 14-16 c.t., Raum 228 Prof. Dr. Antonio Krüger Institut für Geoinformatik Universität Münster 20. Februar 06 IfGi Universität Münster User Interface
UNIVERSIDAD POLITÉCNICA DE MADRID
UNIVERSIDAD POLITÉCNICA DE MADRID FACULTAD DE INFORMATICA MÁSTER UNIVERSITARIO EN INGENIERÍA DEL SOFTWARE EUROPEAN MASTER ON SOFTWARE ENGINEERING Development of a Model for Security and Usability Master
A Process View on Architecture-Based Software Development
A Process View on Architecture-Based Software Development Lothar Baum, Martin Becker, Lars Geyer, Georg Molter System Software Research Group University of Kaiserslautern D-67653 Kaiserslautern, Germany
Understanding Cultural Variations of E-Commerce Websites in A Global Framework
Global Journal of Finance and Management. ISSN 0975-6477 Volume 6, Number 3 (2014), pp. 275-280 Research India Publications http://www.ripublication.com Understanding Cultural Variations of E-Commerce
