18 research outputs found

    ENHANCING USABILITY USING AUTOMATED SECURITY INTERFACE ADAPTATION (ASIA)

    Get PDF
    2 PUBLISHED CONFERENCE PROCEEDINGS PROVIDED IN APPENDIX E.Many users are now significantly dependent upon computer application. Whilst many aspects are now used very successfully, an area in which usability difficulties continue to be encountered is in relation to security. Thus can become particularly acute in situations where users are required to interact and make decisions, and a key context here is typically when they need to respond to security warnings. The current implementation of security warnings can often be considered as an attempt to offer a one size fits all solution. However, it can be argued that many implementations are still lacking the ability to provide meaningful and effective warnings. As such, this research focuses upon achieving a better understanding of the elements that aid end-users in comprehending the warnings, the difficulties with the current approaches, and the resulting requirements in order to improve the design and implementation of such security dialogues. In the early stage of research, a survey was undertaken to investigate perceptions of security dialogues in practice, with a specific focus upon security warnings issued within web browsers. This provided empirical evidence of end-users’ experiences, and revealed notable difficulties in terms of their understanding and interpretation of the security interactions. Building upon this, the follow-up research investigated understanding of application level security warnings in wider contexts, looking firstly at users’ interpretation of what constitutes a security warning and then at their level of comprehension when related warnings occurred. These results confirmed the need to improve the dialogues so that the end-users are able to act appropriately, and consequently promoted the design and prototype implementation of a novel architecture to improve security warnings, which has been titled Automated Security Interface Adaptation (ASIA). The ASIA approach aims to improve security warnings by tailoring the interaction more closely to individual user needs. By automatically adapting the presentation to match each user’s understanding and preferences, security warnings can be modified in ways that enable users to better comprehend them, and thus make more informed security decisions and choices. A comparison of the ASIA-adapted interfaces compared to standard versions of warnings revealed that the modified versions were better understood. As such, the ASIA approach has significant potential to assist (and thereby protect) the end-user community in their future interactions with security.UNIVERSITY SAINS MALAYSIA (USM), MINISTRY OF HIGHER EDUCATION MALAYSIA(MOHE

    Security Warning Life Cycle: Challenges and Panacea

    Get PDF
    Security warning is a very important aspect in computer security. Security warning is a form of message conveyed to inform user on the risk of allowing an application to run on the computer system. Security warning plays an important role in notify, warn and advise user about the potential result of an action beforehand. However, security warnings are often being ignored due to various reasons such as poor design of security warnings and too many technical terms used in security warnings. This research highlights insights into the discovery of problems and difficulties encountered by the users, approaches in improving security warnings and future direction of the security warning improvement process. We proposed to utilise the hybrid approach of iterative design and mental model in the effort to enhance the current implementation of security warning. Iterative design is a cyclic design process where prototyping, testing and refining are done repeatedly. A mental model is a person’s psychological representation of how they perceive and understand something. It is expected that this paper would benefit the researchers to comprehend approches and challenges to improve security warnings

    Malaycious: usable mobile food finding application

    Get PDF
    Food-finding application is an application that provides users with classified and suggestive information about the local food one particular country. Apparently, there are numbers of the food-finding applications in the Malaysia’s apps market such as Malaysia Food diary, Hungry go where, Food Spotting etc. However, lacks of classified and suggestive information are the main limitations of the current applications.In order to overcome the limitations of the existing applications, features such as augmented reality, photographic food diary, and smart budget are implemented in the proposed solution.A survey is conducted to understand end-users insights on their usage of food finding application in Malaysia.Based on the gathered evidence, Malaycious is introduced as a new food finding application that bridges the gap of known challenges.Augmented reality (AR) is implemented in the proposed system to enrich users camera feed with contextual information.Users can now benefits from the ability to the place computer generated graphics in the field of vision.Besides that, shooting food becomes one of the fastest growing hobbies for people nowadays. Therefore, the proposed application will include a new feature called Photographic Food Diary to store that pictures that users capture.Therefore, users can recall back the images and also the information of the images.In addition, Smart Budget is a feature that help users to filter the food according to the preferences that user entered.The detail discussion were provided in the relation to the development of Malaycious.Therefore, it can be suggested that Malaycious provide usable and user-friendly food-finding application

    Intelligent responsive indoor system (Iris): A potential shoplifter security alert system

    Get PDF
    Shoplifting can occur at any time and any place. From the big mall to a small shop, many security measures have been put in place as prevention tools.Apparently, there are numbers of shoplifting prevention tools in the market such as the Closedcircuit Television (CCTV), Electronic Article Surveillance (EAS) and Future Attribute Screening Technology (FAST).However, the cost issues and the ease of use always become the main concerns for the shopkeepers.Therefore CCTV was widely accepted because of the ease and affordable price.Although the CCTV is their main preference, it can be noted that CCTV operates in a static way where it can only records and monitor the incidents.This paper highlights the conventional CCTV issues and proposes the Intelligent Responsive Indoor System (IRiS) the as security crime prevention tool that uses face detection, recognition and behavior analysis to detect potential shoplifting intentions.Six small shop owners were interviewed to understand their insights on the problems and the need to further enhance the current CCTV. In addition, detailed discussions were provided in relation to the development of IRiS.Therefore, it can be suggested that IRiS provides a significant foundation and promises to be a security prevention tool to improve the conventional functions of the CCTV

    Heuristic evaluation of stock exchange mobile application in Malaysia

    Get PDF
    In recent years, heuristic evaluation has focused to improving the efficiency and effectiveness of applications. This technique is considered as the most effective tool that is used in human-computer interaction studies to test the usability of information systems. Moreover, this technique is widely adopted to analyze the usability of applications as it is inexpensive and quick.The objective of this study is to use the heuristic evaluation principals to assess the effectiveness of the stock exchange mobile application in Malaysia. Questionnaire survey method was used and data were collected by 25 participants from Kuala Lumpur Stock Exchange (KLSE). The heuristic evaluation was conducted by 25 experts to examine the usefulness of stock exchange mobile application. The results revealed that stock exchange application is an effective and useful application that has all required features. Meanwhile, findings also postulated that most of the users show agreeableness regarding the applications of principals of heuristics evaluation in this application. These heuristic principals can further used to avoid the usability gaps in this stock exchange application.This study also gives guidelines to designers for taking corrective measures during the designing of the applications for the stock exchange. Additionally, these guidelines help to provide solutions in the future that how designers may improve the user interface of these stock exchange applications that may improve the experience of users

    Implementation of an automated smart home control for detection for detecting human emotions via facial detection

    Get PDF
    With our daily busy schedules, the home is one of the main locations where we could unwind and relax.With the implementation of an effective smart home system, the relaxation time could begin as soon as the homeowners return home.The Eye 2H is an automated smart home control system that detects the homeowners emotion via facial detection.The system is capable of boosting the mood and emotion of the residents by controlling the electronic lighting and equipment in their home. By adjusting, the lighting conditions automatically could create a welcoming effect for the homeowners.Besides that, the system is also able to reduce energy usage via sensors, which would detect human presence in specific rooms. As such, the implementation of the system require a number of processes along with initial testing to ensure a smooth system operation.Based on our testing and evaluation, the proposed system is able to detect both facial and emotion in an effective manner

    Usable security: A browser’s security warnings assessment

    Get PDF
    Security warning is a form of message of alerting. It specifies the functions to notify, to warn and to advice users about the consequence or any possible menaces by allowing random applications to run on the computer system. However, the majority of computer user tends to ignore security warnings that convey excessive technical messages which are difficult for user to understand and lead to lack of motivation for decision making. A survey utilised 250 participants had been conducted to address end-user’s comprehension about the warnings based on their browser’s preference. The results revealed that most users preferred to use Google Chrome and Mozilla Firefox as compared to Safari and Internet Explorer. It can be noted that users experienced significant challenges to comprehend the signal icons and technical jargon based on the presented warnings. There is a corresponding need to design a usable security warning that able to ease end-users security decision

    Readability of websites security privacy policies: A survey on text content and readers

    Get PDF
    The aim of website's Privacy Policies is to educate consumers of a website's practices and procedures relating to their collection, usage, exchange, control, protection and the use of technology in relation to the information collection (website beacon and cookies) and transmission of user's personal information anytime he visits Internet website. This paper discusses a readability issues in privacy policies and how privacy scholars approach the issue. The paper also compares and analyzes research results on readability measurement of privacy policies and divides them into two categories according to different perspective. The perspective includes readability measurement from reader's perspective and readability measurement from privacy policies text content’s perspective. Our finding shows that website providers should give consumers better control regarding their information and give them more freedom in privacy policies. Only then will consumers become liberated from the burden of choosing between 2 unspeakable options. A legally binding document on the privacy policy can be written, that will also be clear and simple to read

    The Sentinel: A proposed potential intruder alert system based on human behaviours

    Get PDF
    Petty crimes such as robbery and burglary are common in Malaysia, especially in urban areas and major cities. There are many reports of such cases happening right in front of the victim’s premise, posing a safety concern where one can’t even be safe around his/her home.Therefore, this paper proposes a Potential Intruder Alert System based on Human Behaviors (The Sentinel) utilizing image processing techniques and sophisticated machine learning to identify suspicious human behaviors.The Sentinel will then alert the users should the system detect any suspicious movements or threats lurking outside the house
    corecore