A framework to evaluate usable security in online social networking
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
- Authors: Yeratziotis, Alexandros
- Date: 2011
- Subjects: Online social networks -- Security measures , Computer security , Data protection
- Language: English
- Type: Thesis , Doctoral , PhD
- Identifier: vital:9807 , http://hdl.handle.net/10948/d1012933
- Description: It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
- Full Text:
- Date Issued: 2011
The impact of cultural context on web design for e-Government in South Africa
- Authors: Yeratziotis, Alexandros
- Date: 2008
- Subjects: Internet in public administration -- South Africa , Web sites -- Design , Culture
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9741 , http://hdl.handle.net/10948/2116 , Internet in public administration -- South Africa , Web sites -- Design , Culture
- Description: The role and power of ICT today, particularly the Internet, cannot be underestimated. The Internet has a great impact on the business environment, where a large majority of companies and organisations have made substantial investments in an online presence in the form of websites, as well as the IT infrastructure needed to improve business processes. In terms of websites, research has shown that it is critical to identify the target market of the site and the actual users, and to construct the site according to their specific needs and preferences. This is to a large extent the focus of the field of Human Computer Interaction. It therefore makes perfect sense that many software products and websites fail to meet the users‟ needs, as they are designed mainly by Western designers for Eastern and African users. In essence, the failure is due to the fact that the design does not accommodate the cultural behaviours, understandings and preferences of the intended users, thus making it difficult for them to use and adopt them. This has been confirmed by many researchers who have studied various culture dimensions and their relation to Web design. As mentioned, the role of the Internet in terms of its effect in the business world is becoming increasingly important. However, the Internet could prove to play an influential role in the public sector as well and could therefore be used as a critical tool by government in the form of e-Government. Many countries are adopting e-Government initiatives in an attempt to improve their relations within government itself and with their citizens and businesses. This would help them to render better service delivery and at the same time empower the citizens to also participate in the governance of the country itself. The concept for this dissertation was formulated in terms of three key ingredients: e-Government, culture dimensions and Web design. The purpose of this dissertation is to examine the way a specific culture dimension, referred to as the cultural-context dimension, which focuses on the communication process, can impact in Web design. Once this is achieved, it will be possible to determine how this can positively affect the design of the South African e-Government website so that the overall usability of the site may be improved. The improvements will be justified because the site would then match the cultural behaviours, perceptions and Web design preferences of South African users. In short, the goal of this III dissertation is to provide guidelines and recommendations that will improve the South African e-Government website (www.gov.za) by examining anthropologist Edward Hall‟s cultural-context dimension and its role in the Web design process.
- Full Text:
- Date Issued: 2008
- Authors: Yeratziotis, Alexandros
- Date: 2008
- Subjects: Internet in public administration -- South Africa , Web sites -- Design , Culture
- Language: English
- Type: Thesis , Masters , MTech
- Identifier: vital:9741 , http://hdl.handle.net/10948/2116 , Internet in public administration -- South Africa , Web sites -- Design , Culture
- Description: The role and power of ICT today, particularly the Internet, cannot be underestimated. The Internet has a great impact on the business environment, where a large majority of companies and organisations have made substantial investments in an online presence in the form of websites, as well as the IT infrastructure needed to improve business processes. In terms of websites, research has shown that it is critical to identify the target market of the site and the actual users, and to construct the site according to their specific needs and preferences. This is to a large extent the focus of the field of Human Computer Interaction. It therefore makes perfect sense that many software products and websites fail to meet the users‟ needs, as they are designed mainly by Western designers for Eastern and African users. In essence, the failure is due to the fact that the design does not accommodate the cultural behaviours, understandings and preferences of the intended users, thus making it difficult for them to use and adopt them. This has been confirmed by many researchers who have studied various culture dimensions and their relation to Web design. As mentioned, the role of the Internet in terms of its effect in the business world is becoming increasingly important. However, the Internet could prove to play an influential role in the public sector as well and could therefore be used as a critical tool by government in the form of e-Government. Many countries are adopting e-Government initiatives in an attempt to improve their relations within government itself and with their citizens and businesses. This would help them to render better service delivery and at the same time empower the citizens to also participate in the governance of the country itself. The concept for this dissertation was formulated in terms of three key ingredients: e-Government, culture dimensions and Web design. The purpose of this dissertation is to examine the way a specific culture dimension, referred to as the cultural-context dimension, which focuses on the communication process, can impact in Web design. Once this is achieved, it will be possible to determine how this can positively affect the design of the South African e-Government website so that the overall usability of the site may be improved. The improvements will be justified because the site would then match the cultural behaviours, perceptions and Web design preferences of South African users. In short, the goal of this III dissertation is to provide guidelines and recommendations that will improve the South African e-Government website (www.gov.za) by examining anthropologist Edward Hall‟s cultural-context dimension and its role in the Web design process.
- Full Text:
- Date Issued: 2008
- «
- ‹
- 1
- ›
- »