2,336 research outputs found
Critical Success Factors for Positive User Experience in Hotel Websites: Applying Herzberg's Two Factor Theory for User Experience Modeling
This research presents the development of a critical success factor matrix
for increasing positive user experience of hotel websites based upon user
ratings. Firstly, a number of critical success factors for web usability have
been identified through the initial literature review. Secondly, hotel websites
were surveyed in terms of critical success factors identified through the
literature review. Thirdly, Herzberg's motivation theory has been applied to
the user rating and the critical success factors were categorized into two
areas. Finally, the critical success factor matrix has been developed using the
two main sets of data.Comment: Journal articl
Evaluating the End-User Experience of Private Browsing Mode
Nowadays, all major web browsers have a private browsing mode. However, the
mode's benefits and limitations are not particularly understood. Through the
use of survey studies, prior work has found that most users are either unaware
of private browsing or do not use it. Further, those who do use private
browsing generally have misconceptions about what protection it provides.
However, prior work has not investigated \emph{why} users misunderstand the
benefits and limitations of private browsing. In this work, we do so by
designing and conducting a three-part study: (1) an analytical approach
combining cognitive walkthrough and heuristic evaluation to inspect the user
interface of private mode in different browsers; (2) a qualitative,
interview-based study to explore users' mental models of private browsing and
its security goals; (3) a participatory design study to investigate why
existing browser disclosures, the in-browser explanations of private browsing
mode, do not communicate the security goals of private browsing to users.
Participants critiqued the browser disclosures of three web browsers: Brave,
Firefox, and Google Chrome, and then designed new ones. We find that the user
interface of private mode in different web browsers violates several
well-established design guidelines and heuristics. Further, most participants
had incorrect mental models of private browsing, influencing their
understanding and usage of private mode. Additionally, we find that existing
browser disclosures are not only vague, but also misleading. None of the three
studied browser disclosures communicates or explains the primary security goal
of private browsing. Drawing from the results of our user study, we extract a
set of design recommendations that we encourage browser designers to validate,
in order to design more effective and informative browser disclosures related
to private mode
Tool support for security-oriented virtual research collaborations
Collaboration is at the heart of e-Science and e-Research
more generally. Successful collaborations must address both
the needs of the end user researchers and the providers
that make resources available. Usability and security are
two fundamental requirements that are demanded by many
collaborations and both concerns must be considered from
both the researcher and resource provider perspective. In
this paper we outline tools and methods developed at the
National e-Science Centre (NeSC) that provide users with
seamless, secure access to distributed resources through
security-oriented research environments, whilst also allowing resource providers to define and enforce their own local access and usage policies through intuitive user interfaces. We describe these tools and illustrate their application in the ESRC-funded Data Management through e-Social Science (DAMES) and the JISC-funded SeeGEO projects
EVALUATION MODEL FOR SECURITY COMPONENTS: A CASE STUDY ON MALAYSIAN INTERNET BANKING
ABSTRACT. The usage of Internet Banking in Malaysia, which started
about 10 years ago, has been well accepted by consumers. Statistics from
Bank Negara Malaysia (BNM) show that every year there is an increase in
the number of registered individual Internet banking users since its inception
in Malaysia. As at the third quarter of 2010, there were approximately 9.2
million registered Internet Banking users compared to only 2.6 million in
2005. A survey of 264 CIMB Bank Berhad personnel revealed that although
there is a high degree of confidence, with respondents claiming to be aware
of requirements by the bank, further and thorough inspections suggest that
there are several areas in which desirable knowledge and understanding are
still lacking. Additionally, in order to identify the currents state of the security
features offered, we performed an analysis of six (6) Internet Banking
websites in Malaysia. Using the evaluation model proposed in this study, an
analysis of Internet banking website security elements revealed that there is
still room for improvement in areas such as helping users to execute transactions
and create awareness on their responsibilities as outlined by the banks
The Value of User-Visible Internet Cryptography
Cryptographic mechanisms are used in a wide range of applications, including
email clients, web browsers, document and asset management systems, where
typical users are not cryptography experts. A number of empirical studies have
demonstrated that explicit, user-visible cryptographic mechanisms are not
widely used by non-expert users, and as a result arguments have been made that
cryptographic mechanisms need to be better hidden or embedded in end-user
processes and tools. Other mechanisms, such as HTTPS, have cryptography
built-in and only become visible to the user when a dialogue appears due to a
(potential) problem. This paper surveys deployed and potential technologies in
use, examines the social and legal context of broad classes of users, and from
there, assesses the value and issues for those users
How to make privacy policies both GDPR-compliant and usable
It is important for organisations to ensure that their privacy policies are General Data Protection Regulation (GDPR) compliant, and this has to be done by the May 2018 deadline. However, it is also important for these policies to be designed with the needs of the human recipient in mind. We carried out an investigation to find out how best to achieve this.We commenced by synthesising the GDPR requirements into a checklist-type format. We then derived a list of usability design guidelines for privacy notifications from the research literature. We augmented the recommendations with other findings reported in the research literature, in order to confirm the guidelines. We conclude by providing a usable and GDPR-compliant privacy policy template for the benefit of policy writers
- …