Sciweavers

274 search results - page 5 / 55
» Security user studies: methodologies and best practices
Sort
View
IADIS
2004
13 years 8 months ago
Mastering the mystery through 'SAIQ' metrics of user experience in telecollaboration business systems
In the preparation of technology transition, the contextual and alternative definitions of the usability heuristics of multifaceted role of the best practice methodology of Teleco...
Venkatesh Mahadevan, Zenon Chaczko, Robin Braun
WWW
2010
ACM
14 years 2 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
CHI
2007
ACM
14 years 7 months ago
Password sharing: implications for security design based on social practice
Current systems for banking authentication require that customers not reveal their access codes, even to members of the family. A study of banking and security in Australia shows ...
Supriya Singh, Anuja Cabraal, Catherine Demostheno...
OOPSLA
2004
Springer
14 years 22 days ago
Empirical investigation of the impact of extreme programming practices on software projects
Extreme Programming (XP) is an agile software development methodology composed of several practices that purportedly yield high quality and high customer satisfaction. However, th...
Lucas Layman
BCSHCI
2007
13 years 8 months ago
Using formal models to design user interfaces: a case study
The use of formal models for user interface design can provide a number of benefits. It can help to ensure consistency across designs for multiple platforms, prove properties such...
Judy Bowen, Steve Reeves