9,972 research outputs found

    A Comparative Usability Study of Two-Factor Authentication

    Full text link
    Two-factor authentication (2F) aims to enhance resilience of password-based authentication by requiring users to provide an additional authentication factor, e.g., a code generated by a security token. However, it also introduces non-negligible costs for service providers and requires users to carry out additional actions during the authentication process. In this paper, we present an exploratory comparative study of the usability of 2F technologies. First, we conduct a pre-study interview to identify popular technologies as well as contexts and motivations in which they are used. We then present the results of a quantitative study based on a survey completed by 219 Mechanical Turk users, aiming to measure the usability of three popular 2F solutions: codes generated by security tokens, one-time PINs received via email or SMS, and dedicated smartphone apps (e.g., Google Authenticator). We record contexts and motivations, and study their impact on perceived usability. We find that 2F technologies are overall perceived as usable, regardless of motivation and/or context of use. We also present an exploratory factor analysis, highlighting that three metrics -- ease-of-use, required cognitive efforts, and trustworthiness -- are enough to capture key factors affecting 2F usability.Comment: A preliminary version of this paper appears in USEC 201

    Ergonomic keyboards- a comparative posture and usability study

    Get PDF

    Why Do Developers Get Password Storage Wrong? A Qualitative Usability Study

    Full text link
    Passwords are still a mainstay of various security systems, as well as the cause of many usability issues. For end-users, many of these issues have been studied extensively, highlighting problems and informing design decisions for better policies and motivating research into alternatives. However, end-users are not the only ones who have usability problems with passwords! Developers who are tasked with writing the code by which passwords are stored must do so securely. Yet history has shown that this complex task often fails due to human error with catastrophic results. While an end-user who selects a bad password can have dire consequences, the consequences of a developer who forgets to hash and salt a password database can lead to far larger problems. In this paper we present a first qualitative usability study with 20 computer science students to discover how developers deal with password storage and to inform research into aiding developers in the creation of secure password systems

    Usability Study for YourBrandPartner.com

    Get PDF
    YourBrandPartner.com exists to provide content to those seeking specific advice and information on purchasing custom promotional items. For this investigation, I conducted a usability test with a select user group to identify user experience issues. The primary goal of this research was to conduct general usability testing through large group survey and a small in-person usability testing group. I designed surveys and tests to investigate if users experienced difficulties in finding the information they were looking for on the website. Based on the results of this study, I recommend reviewing the visual design \ of the website, increasing site speed, creating a better experience between the blog and e- commerce interactions, and creating an environment that is more accommodating of where the user is in the buying process. This full report includes expanded participant feedback, methodology behind the study, and full recommendations for improvement.Master's Applied Projec

    Software Usability:A Comparison Between Two Tree-Structured Data Transformation Languages

    Get PDF
    This paper presents the results of a software usability study, involving both subjective and objective evaluation. It compares a popular XML data transformation language (XSLT) and a general purpose rule-based tree manipulation language which addresses some of the XML and XSLT limitations. The benefits of the evaluation study are discussed

    Mana‘olana Website: A Usability Study

    Get PDF
    Caring for a child with a mental illness can be extremely time-consuming and challenging for parents, especially in Hawai‘i, where there is a shortage of mental health care providers. Parents may not feel comfortable speaking openly about their child’s mental illness, and they may not know where to find help for their child or support for themselves. Manaolana.info is a website that was designed for parents in Hawai‘i who care for children with mental illness. This website includes four main components: information about service providers for psychological evaluations, information about service providers for children with a mental health diagnosis, parental support, and informational resources. A usability study was implemented to evaluate the website’s ease of navigation and the ability of the user to readily locate information. The findings of the usability study indicated that the mana‘olana website contained pertinent and relevant information, and that it was a useful resource for the target population. The mana‘olana.info website is considered public domain and can be shared with parent support groups, school administrators and counselors, and mental health care providers throughout the state of Hawai‘i

    Web usability survey and script

    Get PDF
    This document supplies the survey and script used in the usability tests for the article "Side by side: What a comparative usability study told us about a web site redesign", which will appear in the Journal of Web Librarianship. The script and survey will not appear in the article itself.unpublishednot peer reviewe

    Web Usability Study: A Review

    Get PDF

    A usability study of elliptic curves

    Get PDF
    In the recent years, the need of information security has rapidly increased due to an enormous growth of data transmission. In this thesis, we study the uses of elliptic curves in the cryptography. We discuss the elliptic curves over finite fields, attempts to attack; discrete logarithm, Pollard’s rho algorithm, baby-step giant-step algorithm, Pohlig-Hellman algorithm, function field sieve, and number field sieve. The main cryptographic reason to use elliptic curves over finite fields is to provide arbitrarily large finite cyclic groups having a computationally difficult discrete logarithm problem

    Family Caregivers Resource: A Usability Study

    Get PDF
    Master's Project paper, TCC 25 Presentation, websiteSelf-care is the active practice of preserving or improving one’s health. Family caregivers, usually informal, non-health care professionals caring for a loved one, often overlook self-care while caregiving. Such oversight potentially leads to exhaustion, stress, burnout, and illness. The purpose of this usability study was to create a resource website to curate existing family caregiver resources relevant to caregivers and supporters of cancer patients. Serving the islands of Maui, Molokai, and Lāna`i, the resource site aimed to facilitate connection to local and online family caregiver resources, and reduce online research time for family caregivers, often overwhelmed with responsibilities. A user-centric (U/X) design approach was utilized to design a site responsive to mobile users. The objective of this usability study was to assess the resource site’s ease-of-use, the perceived value of the site, and to assess the feelings of user self-efficacy after use of the resource site. Twelve participants assessed the navigability of the site and the value of the content. Verbal feedback from participants during the study and data from post-usability surveys indicated that participants found the responsive site moderately easy to navigate, found high value in the content, and expressed high levels of confidence in understanding self-care after completion of the usability study
    corecore