2012
DOI: 10.1080/10447318.2011.654202
|View full text |Cite
|
Sign up to set email alerts
|

A Usable Security Heuristic Evaluation for the Online Health Social Networking Paradigm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(38 citation statements)
references
References 18 publications
0
37
0
Order By: Relevance
“…button which displays emergency contacts and strategies. These features are simple and usable in line with a suggestion of (Yeratziotis et al, 2012).…”
Section: Figure 5: Example Usage Chartmentioning
confidence: 83%
“…button which displays emergency contacts and strategies. These features are simple and usable in line with a suggestion of (Yeratziotis et al, 2012).…”
Section: Figure 5: Example Usage Chartmentioning
confidence: 83%
“…At the beginning of the research, three general-scope questions were considered as evaluation metrics, concerning their own domain name, if they have virtual museums services and three-dimensional modeling support. However, in the scientific field of human-computer interaction, the factor of website usability was determined via specialized assessment/inspection methods [19], while the methodology of heuristic evaluation is a mainstream, easy-to-follow and inexpensive procedure [20] that guides evaluators to search shortcomings and problems [21] in technology-oriented assessment tasks. Furthermore, the usability tests were able to reveal and quantify the effectiveness, accuracy and completeness of the user experience of the design choices of a website/application, while they also examined the efficiency of the offered resources/content, towards meeting the users' needs and expectations, thus, providing a sense of the satisfaction, comfort and acceptability of use/interaction.…”
Section: Methodsmentioning
confidence: 99%
“…Although some actions cannot be reversed after a certain stage of processing, developers need to try, by all means possible, to provide support for 'undo' and 'redo' functions. This principle is one of the ten golden rules of user interface design identified by Schneiderman et al (2016) and Yeratziotis et al (2012) as necessary in usable security design.…”
Section: Revocabilitymentioning
confidence: 99%
“…There are numerous design principles that are proposed in literature to address usability and InfoSec of IS applications. Such principles range from general usability of IS (Preece, Rogers, & Sharp, 2015) to those developed for specific applications (Yeratziotis, Pottas, & Greunen, 2012). In addition, there are design principles that were proposed to make IS more secure and usable, often referred to as usable security.…”
mentioning
confidence: 99%