The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The perception of risk is a driver for security analysts' decision making. However, security analysts may have conflicting views of a risk based on personal, system and environmental factors. This difference in perception and opinion, may impact effective decision making. In this paper, we propose a model that highlights areas contributing to the perception of risk in a socio-technical environment...
Usability is considered as one of the most important quality factors for commercial Web interfaces, along with others such as performance and security. However, most of usability evaluation methods for these Web applications do not support automatic measures. This paper addresses these issues through the presentation of an automatic evaluation model based on a systematic qualitative technique to validate...
Biometric technologies have the potential to reduce the effort involved in securing personal activities online, such as purchasing goods and services. Verifying that a user session on a website is attributable to a real human is one candidate application, especially as the existing CAPTCHA technology is burdensome and can frustrate users. Here we examine the viability of biometrics as part of the...
The Grid and Cloud User Support Environment (gUSE) enables users convenient and easy access to grid and cloud infrastructures by providing a general purpose, workflow-oriented graphical user interface to create and run workflows on various Distributed Computing Infrastructures (DCIs). Its arrangements for creating and modifying existing workflows are, however, non-intuitive and cumbersome due to the...
The widespread use of wireless communications, Internet, and mobile technology offers the opportunity of supplying new generation of decision support commonly known as Mobile Decision Support Systems (MDSS). This paper describes research towards evaluation of such systems. Our view is that the end user will benefit if provided with a better Quality of MDSS. We propose a quality model taking into account...
The purpose of this paper is to describe the complexity of an Automated Border Control (ABC) context and the factors influencing the experience passengers and border guards have when interacting with ABC systems. Automated border control is expected to make border checks quicker and more efficient as well reducing the cost. At the same time, the purpose is to enhance the level of border security....
Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by malicious automated programs (e.g., web bots) is becoming a serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism...
The importance of non-functional requirements for computer systems is increasing. Satisfying these requirements require special attention to the software architecture, once an unsuitable architecture introduces greater complexity in addition to the intrinsic complexity of the system. Some studies have shown that, despite requirements engineering and software architecture activities act on different...
Patterns are an invaluable tool for capturing and reusing Non-Functional Requirements (NFR) knowledge. Their construction, however, requires one to pay close attention to the semantics of its elements. This paper reports two important insights realized when developing a collection of Transparency patterns; they concern the semantics of the HELP contribution link and of the correlation link between...
Recently, interest in performance modeling of out-come-based regulations has grown in the regulatory community. In this context, performance modeling refers to the measuring of important business aspects in a coordinated manner and the use of these measurements for improved decision making. Goal modeling techniques have shown to be beneficial when expressing and analyzing performance models. Since...
The adversarial element is an intrinsic part of the design of secure systems, but our assumptions about attackers and threat is often limited or stereotypical. Although there has been previous work on applying User-Centered Design on Persona development to build personas for possible attackers, such work is only speculative and fails to build upon recent research. This paper presents an approach for...
Although widely used for both security and usability concerns, scenarios used in security design may not necessarily inform the design of usability, and vice-versa. One way of using scenarios to bridge security and usability involves explicitly describing how design decisions can lead to users inadvertently exploiting vulnerabilities to carry out their production tasks. We present Mis-usability Cases:...
On occasion, central governments have been considered incapable and inefficient managers to meet the expectations of its citizens. Governments have been forced to make radical changes. They also have been pressured by the rapid advancement of technology and the societal needs eager for greater efficiency and transparency in public administration. Every day, more and more e-government sites appear...
Medical information systems carry sensitive data, which necessitates security and privacy. However, there is well-known trade-off between usability and security, and security can harm care providers and patients. This paper addresses the trade-off between security and usability in medical systems, and presents a case where higher security with better usability was achieved through close cooperation...
Computer security and usability are challenging problems that are often interrelated. In harmonizing security and usability, it isn't enough to consider how human factors can be leveraged in support of security. Instead, it's important to take a user-centered perspective, and consider how best to support people in attaining their goals when they use computer systems. This article approaches this problem...
Non Functional Requirements (NFRs) are relative, so are the conflicts among them. In our previously developed catalogue of NFRs conflicts it can be observed that a number of specific pairs of NFRs are claimed to be in conflicts in some cases but they are also claimed not to be in conflict in the other cases. These relative conflicts occur because the positive or negative relationships among NFRs are...
The differences between the fields of Human-Computer Interaction and Security (HCISec) and Human-Computer Interaction (HCI) have not been investigated very closely. Many HCI methods and procedures have been adopted by HCISec researchers, however the extent to which these apply to the field of HCISec is arguable given the fine balance between improving the ease of use of a secure system and potentially...
As new security technologies are introduced in public transportation systems, their accessibility for the disabled needs to be evaluated. We analyze the usability of the passenger process in airports alongside the security risk, both from the point of view of the disabled and elderly passengers. A process-centered analytical framework has been developed. The methodology is to identify different user...
Properly dealing with nonfunctional requirements (NFRs) such as security, cost, and usability, requires a large body of knowledge. However, it is difficult for average requirements engineers to possess necessary knowledge and use it correctly. This paper presents an NFR pattern framework for capturing NFR knowledge using goal, problem, causal attribution, solution/means, and requirements patterns...
Being motivated by the need for usable Web security systems, we present in this paper new image-based CAPTCHA systems that overcome the weaknesses of commercial CAPTCHAs. We describe Tree and Shape CAPTCHAs in addition to handwritten CAPTCHAs that feature visual objects transformed according to specific principles of cognitive psychology. These transformations, in addition to other security measures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.