341
views
0
recommends
+1 Recommend
1 collections
    4
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      The Trade-off between Usability and Security in the Context of eGovernment: A Mapping Study

      proceedings-article

      , ,

      Proceedings of the 30th International BCS Human Computer Interaction Conference (HCI)

      Fusion

      11 - 15 July 2016

      Usability, Security, Trade-off, eGovernment, Digital Services, Systematic Mapping, Smart Devices

      Bookmark

            Content

            Author and article information

            Contributors
            Conference
            July 2016
            July 2016
            : 1-13
            Affiliations
            [0001]Keele University School of Computing and Mathematics Staffordshire ST5 5BG
            Article
            10.14236/ewic/HCI2016.36
            373f47fc-3b55-4a5d-b5a3-5e62ffe3bd1c
            © Alshamsi et al. Published by BCS Learning and Development Ltd. Proceedings of British HCI 2016 Conference Fusion, Bournemouth, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            Proceedings of the 30th International BCS Human Computer Interaction Conference
            HCI
            30
            Bournemouth University, Poole, UK
            11 - 15 July 2016
            Electronic Workshops in Computing (eWiC)
            Fusion
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            REFERENCES

            1. [1] 2015 Usability of Online Assistance From Semiliterate Users’ Perspective Int. J. Hum. Comput. Interact 31 1 55 64

            2. [2] and 2009 Understanding a complex innovation process: identity management in Austrian e-government 10th Annu. Int. Conf. Digit. Gov. Res. (dg.o 2009) 230 239

            3. [3] 2009 Undo and erase events as indicators of usability problems Proc. 27th Int. Conf. Hum. factors Comput. Syst. - CHI ’09 659

            4. [4] 2010 User-centric mobile services: context provisioning and user profiling 11th Annu. Int. Conf. Digit. Gov. Res. (dg.o 2010) 122 130

            5. [5] 2014 A Taxonomy-Based Usability Study of an Intelligent Speed Adaptation Device Int. J. Hum. Comput. Interact 30 7 585 603

            6. [6] 2007 What happened to remote usability testing? An empirical study of three methods Proc. 25th SIGCHI Conf. Hum. Factors Comput. Syst 1405 1414

            7. [7] and 2012 Evaluating the collaborative critique method Proc. SIGCHI Conf. Hum. Factors Comput. Syst 2137 2164

            8. [8] 2009 Advancing E-Government performance in the United States through enhanced usability benchmarks. Gov. Inf. Q. 26 1 82 88

            9. [9] 2009 Security and usability research using a microworld environment Proc. 11th Int. Conf. Human-Computer Interact. with Mob. Devices Serv. - Mobile HCI ’09 1

            10. [10] 2006 Introduction to Identity-Management models Access control systems Security identity management and trust models 40 72

            11. [11] 2014 Learning mobile security. IEEE Secur 12 1 69 72

            12. [12] 2007 Designing a Trade-Off Between Usability and Security: A Metrics Based-Model Lect. Notes Comput. Sci. 4663 114 126

            13. [13] 2009 Let Your Users Do the Testing∟: A Comparison of Three Remote Asynchronous Usability Testing Methods SIGCHI Conf. Hum. Factors Comput. Syst 1619 1628

            14. [14] 2009 Teaching for Conceptual Change in Security Awareness: A Case Study in Higher Education. IEEE Secur. Priv. Mag. 7 1 68 71

            15. [15] 2011 PostDeployment Usability∟ : A Survey of Current Practices CHI Conf. Hum. Factors Comput. Syst 2243 2246

            16. [16] 2010 Understanding usability practices in complex domains SIGCHI Conf. Hum. Factors Comput. Syst 2337 2346

            17. [17] and 2014 Smart SecureGov Proc. 15th Annu. Int. Conf. Digit. Gov. Res. - dg.o ’14 91 99

            18. [18] 2013 SecureGov: Secure Data Sharing for Government Services Proc. 14th Annu. Int. Conf. Digit. Gov. Res 127 135

            19. [19] 2014 Passhint: memorable and secure authentication. Sigchi 2917 2926

            20. [20] 2006 evaluation of municipal Web sites: Development and use of an expert-focused evaluation tool. Gov. Inf. Q. 23 191 206

            21. [21] 2008 The Seven Flaws of Identity Management. IEEE Security and Privacy 6 2 24 29

            22. [22] 2008 Empirical studies of agile software development∟: A systematic review 50 833 859

            23. [23] 2010 Usable guidelines for usable websites? An analysis of five e-government heuristics. Gov. Inf.Q 27 3 254 263

            24. [24] 2006 Usability evaluation for mobile device: a comparison of laboratory and field tests Proc. MobileHCI 2006 181 186

            25. [25] 2008 You’ve Been Warned: An Empirical Study of the Effectiveness of Web Browser Phishing Warnings Proceeding twenty-sixth Annu. CHI Conf. Hum. factors Comput. Syst. - CHI ’08 1065

            26. [26] 2012 Analysis in practical usability evaluation: a survey study Proc. 2012 ACM Annu. Conf. Hum. Factors Comput. Syst 2127 2136

            27. [27] 2009 Non-Universal Usability∟? A Survey of How Usability is Understood by Chinese and Danish Users Proc. CHI 2009 41 50

            28. [28] 2011 Comparing usability of government web portals during governor change of terms Proc. 12th Annu. Int. Digit. Gov. Res. Conf. Digit. Gov. Innov. Challenging Times - dg.o ’11 327

            29. [29] 2007 A general model of performance and quality for one-stop e-Government service offerings. Gov. Inf. Q 24 2007 860 885

            30. [30] 2009 A Survey of Software Learnability: Metrics, Methodologies and Guidelines Proc. 27th Int. Conf. Hum. factors Comput. Syst 649 658

            31. [31] 2005 Security usability. IEEE Secur. Priv 3 4 56 58

            32. [32] 2014 More is Not the Answer. IEEE Security and Privacy 12 1 14 19

            33. [33] 2010 Images of Usability. Int. J. 26 6 567 600

            34. [34] 2005 Comparing usability problems and redesign proposals as input to practical systems development CHI 2005 Technol. Safety, Community Conf. Proc. - Conf. Hum. Factors Comput. Syst 391 400

            35. [35] 2008 Making use of business goals in usability evaluation Proceeding twenty-sixth Annu. CHI Conf. Hum. factors Comput. Syst. - CHI ’08 903

            36. [36] 2014 Usability and credibility of e-government websites. Gov. Inf. Q. 31 4 584 595

            37. [37] 2013 User acceptance of mobile e-government services: An empirical study. Gov. Inf. Q. 30 1 33 44

            38. [38] 2010 The true cost of unusable password policies Proc. 28th Int. Conf. Hum. factors Comput. Syst. - CHI ’10 383

            39. [39] 2008 Love and authentication Proceeding twenty-sixth Annu. CHI Conf. Hum. factors Comput. Syst. - CHI ’08 197

            40. [40] 2011 Usability Failures and Healthcare Data Hemorrhages. IEEE Secur. Priv. Mag.(March/April 35 42

            41. [41] 2005 Designing and evaluating challenge-question systems. IEEE Secur. Priv. Mag. 2 5 1158 1163

            42. [42] 2008 Usability Benchmark Study of Commercially Available Smart Phones: Cell Phone Type Platform, PDA Type Platform and PC Type Platform. Methods 265 272

            43. [43] 2007 Guidelines for performing Systematic Literature Reviews in Software Engineering. Engineering 2 1051

            44. [44] 2012 Considering Context: The Role of Mental Workload and Operator Control in Users’ Perceptions of Usability. Int.J. Hum. Comput. Interact 28 9 543 559

            45. [45] 2012 The tension between user-centred design and e-government services. Behav. Inf. Technol 31 3 261 273

            46. [46] 2006 Ripcord: Rapid Interface Prototyping for Cordless Devices Proc. MobileHCI 2006 187 190

            47. [47] 2006 A novel interactive mouse system for holistic haptic display in a human-computer interface. Int. J. Hum. Comput. Interact 20 3 247 270

            48. [48] 2011 Why Johnny Can’t Opt Out∟: A Usability Evaluation of Tools to Limit Online Behavioral Advertising Proc. SIGCHI Conf. Hum. Factors Comput. Syst 589 598

            49. [49] 2007 Combining methods to evaluate mobile usability Proc. 9th Int. Conf. Hum. Comput. Interact. with Mob. devices Serv. - MobileHCI ’07 444 447

            50. [50] 2014 Usability: Lessons Learned... and Yet to Be Learned. Int. J. Hum. Comput. Interact 30 9 663 684

            51. [51] 2007 Usability Testing: What Have We Overlooked∟? Proc. 2007 ACM Annu. Conf. Hum. Factors Comput. Syst. - CHI ’07 1415 1424

            52. [52] 2005 Is Your Web Page Accessible∟? A Comparative Study of Methods for Assessing Web Page Accessibility for the Blind. Chi 2005 41 50

            53. [53] 2007 MoBiS-Q: a tool for evaluating the success of mobile business services Proc. 9th Int. Conf. Hum. Comput. Interact. with Mob. devices Serv 238 245

            54. [54] 2013 Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders Proc. 15th Int. Conf. Human-computer Interact. with Mob. devices Serv. (MobileHCI ’13) 271 280

            55. [55] 2009 At home and with computer access: why and where people use cell phones to access the internet Proc. SIGCHI Conf. Hum. Factors Comput. Syst 1639 1642

            56. [56] 2011 Accessibility of U.S. federal government home pages: Section 508 compliance and site accessibility statements. Gov. Inf. Q. 28 3 303 309

            57. [57] 2012 e-GovQual: A multiple-item scale for assessing e-government service quality. Gov. Inf. Q. 29 1 98 109

            58. [58] 2012 What do users really care about? Proc. 2012 ACM Annu. Conf. Hum. Factors Comput. Syst. - CHI ’12 2107

            59. [59] 2006 Remote usability evaluations With disabled people Proc. SIGCHI Conf. Hum. Factors Comput. Syst. - CHI ’06 1133

            60. [61] 2010 Why measuring security is hard. IEEE Secur. Priv 8 4 46 54

            61. [61] 2000 Better Together: Report of the Saguaro Seminar on Civic Engagement in America 89 93

            62. [62] 2013 Does Size Matter? Investigating the Impact of Mobile Phone Screen Size on Users’ Perceived Usability, Effectiveness and Efficiency Proc. Int. Conf. Human-computer Interact. with Mob. devices Serv. (MobileHCI ’13) 127 136

            63. [63] 2012 Blaming noncompliance is too convenient: What really causes information breaches?. IEEE Secur. Priv 10 3 57 63

            64. [64] 2015 Heuristics for the Evaluation of Captchas on Smartphones Proc. Int. Conf. Human-Computer Interact. with Mob. Devices Serv. -Mobile HCI ’15 126 135

            65. [65] 2014 A Usability Evaluation of the Obamacare Website. Gov. Inf. Q. 31 4 669 680

            66. [66] 2008 Undercover: authentication usable in front of prying eyes Proceeding twenty-sixth Annu. SIGCHI Conf. Hum. factors Comput. Syst 183 192

            67. [67] 2015 Scaring and Bullying People into Security Won’t Work. IEEE Secur. Priv 13 3 80 83

            68. [68] 2005 A method to standardize usability metrics into a single score Proc. SIGCHI Conf. Hum. factors Comput. Syst. (CHI ’05) 401 409

            69. [69] 2014 Can long passwords be secure and usable? Proc. 32nd Annu. ACM Conf. Hum. factors Comput. Syst. -CHI ’14 2927 2936

            70. [70] 2012 Gender differences in the perception of security of mobile phones Proc. 14th Int. Conf. Human-computer Interact. with Mob. devices Serv. companion 107 112

            71. [71] 2009 Challenges, Methodologies , and Issues in the Usability Testing of Mobile Applications Challenges , Methodologies , and Issues in the Usability Testing of Mobile Applications. Int. J. Hum. Comput. Interact 18 3 November 2014 37 41

            72. [72] 2006 Getting the right design and the design right Proc. ACM CHI 2006 Conf. Hum. Factors Comput. Syst 1 1243 1252

            73. [73] 2009 User-centered E-Government in practice: A comprehensive model for measuring user satisfaction. Gov. Inf. Q. 26 3 487 497

            74. [74] 2013 Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices Proc. Mob. HCI 2013 – Secur. Priv 261 270

            75. [75] 2011 Security as if People Mattered. Secur. Privacy, IEEE 9 4 64 67

            76. [76] 2012 A Usable Security Heuristic Evaluation for the Online Health Social Networking Paradigm. Int. J. Hum. Comput. Interact 28 10 678 694

            Comments

            Comment on this article