This paper presents a case study of introducing usability practices to a small open source project called Carrot2 . We describe our experiences from a point of view of an active Ca...
Abstract This paper studies the current ‘identity crisis’ caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity ma...
Abstract—The differences between the fields of HumanComputer Interaction and Security (HCISec) and HumanComputer Interaction (HCI) have not been investigated very closely. Many ...
: Usability evaluation techniques such as user-observations, cognitive walkthroughs, or heuristic evaluations can be applied to evaluate the usability of multimedia interfaces of c...
In this paper, we investigate how existing theoretical contributions on usable security can serve to guide the design of a specific system. We illustrate how going through this the...