[HTML][HTML] A review of gaps between usability and security/privacy
M Alshamari - International Journal of Communications, Network and …, 2016 - scirp.org
Different domains of computing systems require higher level of focus towards specific quality
factors like privacy, integrity, flexibility, usability etc. Moreover, certain quality factors help in …
factors like privacy, integrity, flexibility, usability etc. Moreover, certain quality factors help in …
A methodology for aligning usability and security in systems and services
Conflict between usability and security is a widely recognized research problem in industry
and academia. Failure to design systems, which are simultaneously usable and secure, may …
and academia. Failure to design systems, which are simultaneously usable and secure, may …
UCD–CE Integration: A Hybrid Approach to Reinforcing User Involvement in Systems Requirements Elicitation and Analysis Tasks
Requirements elicitation and analysis tasks in user-centered design (UCD) are pivotal for
assessing digital systems' quality and costs. However, these tasks often face challenges due …
assessing digital systems' quality and costs. However, these tasks often face challenges due …
Incorporating the human facet of security in develo** systems and services
Purpose The purpose of this paper is to present an integrative framework for handling the
security and usability conflicts during the system development lifecycle. The framework has …
security and usability conflicts during the system development lifecycle. The framework has …
Design process for usable security and authentication using a user-centered approach
Computer security is one of the most important current tasks in digital applications. However,
from the best of our knowledge, there is little research for designing effective interfaces in the …
from the best of our knowledge, there is little research for designing effective interfaces in the …
Towards an integration of usability and security for user authentication
Computer security is one of the more important tasks currently in the digital world. However,
to the best of our knowledge, there is little research for designing effective interfaces in the …
to the best of our knowledge, there is little research for designing effective interfaces in the …
Usable security by design: a pattern approach
Security and usability are often in conflict. There is a recognition that security cannot be
achieved in real sense unless it incorporates the human factor (usability elements). Despite …
achieved in real sense unless it incorporates the human factor (usability elements). Despite …
Users involvement in the electronic health information systems development process in Uganda: what is missing in relation to requirements gathering and analysis
User involvement in the electronic health information systems (eHIS) development process
is crucial for gathering and analysing requirements that accurately reflect user needs. This is …
is crucial for gathering and analysing requirements that accurately reflect user needs. This is …
The UX of things: exploring UX principles to inform security and privacy design in the smart home
G Chalhoub - 2022 - ora.ox.ac.uk
Smart homes are under attack. Threats can harm both the security of these homes and the
privacy of their inhabitants. As a result, in addition to delivering pleasant and aesthetic …
privacy of their inhabitants. As a result, in addition to delivering pleasant and aesthetic …
Interactive Minutes Generation System Based on Hierarchical Discussion Structure
H Miura, Y Takegawa, A Terai… - 2018 IEEE/WIC/ACM …, 2018 - ieeexplore.ieee.org
This research leads to the development of a system that generates minutes by using
repeated questions and answers between a user and the system. The aim of the research is …
repeated questions and answers between a user and the system. The aim of the research is …