JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Study on Usable Security of Facebook
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Study on Usable Security of Facebook
Kim, Chung-han; Park, Min-su; Kim, Seung-joo;
  PDF(new window)
 Abstract
Recently, as the widespread use of Facebook through a smartphone or tablet PC, it has increased the threat that contains the malicious code to post a social attacks and comments that use personal information that has been published of Facebook. To solve these problems, Facebook is, by providing a security function, but would like to address these threats, in setting the security function, the security function of the user`s convenience is not considered a properly there is a problem that is not in use. Thus, in this paper, on the basis of the information obtained via the cogTool, on Facebook security features, the user experience by presenting a method that can be quantitatively measured by this, the user convenience It classifies about Facebook security features to decrease.
 Keywords
Facebook;Usability;cogTool;Heuristic evaluation;
 Language
Korean
 Cited by
 References
1.
Jokela, Timo, et al, "The standard of user-centered design and the standard definition of usability: analyzing ISO 13407 against ISO 9241-11," Proceedings of the Latin American conference on Human-computer interaction. ACM,pp. 53-60. Aug. 2003.

2.
Din, Amran, "Usable Security using GOMS: A Study to Evaluate and Compare the Usability of User Accounts on E-Government Websites," Nova Southeastern university. 2015.

3.
Shin, Sooyeon, and Taekyoung Kwon, "STM-GOMS Model: A Security Model for Authentication Schemes in Mobile Smart Device Environments," Journal of the Korea Institute of Information Security and Cryptology 22(6). pp. 1243-1252. 2012.

4.
Card, Stuart K. Thomas P. Moran, and Allen Newell, "The keystroke-level model for user performance time with interactive systems," Communications of the ACM vol. 23. no. 7 pp.396-410. 1980. crossref(new window)

5.
Bellamy, Rachel, et al, "Using CogTool to model programming tasks," Evaluation and Usability of Programming Languages and Tools. ACM, Oct. 2010.

6.
Nielsen Jakob, "Usability engineering," Elsevier, pp. 1-362. Oct. 1994.

7.
Nielsen Jakob, "Usability inspection methods," Conference companion on Human factors in computing systems. ACM, pp. 413-414. Apr. 1994.

8.
Giles Hogben, "security issues and recommendations for online social networks," ENISA Position Paper No.1, pp. 1-36. Oct. 2007.

9.
Bellamy, Rachel, Bonnie John, and Sandra Kogan, "Deploying CogTool: integrating quantitative usability assessment into real-world software development," Software Engineering (ICSE), 2011 33rd International Conference on. IEEE, pp. 691-700. May. 2011.

10.
jordisan, "Web Applications (RIA) usabili ty heuristics," http://ucdmanager.net/heuristics/web-applications-ria-usability-heuristics.

11.
Deniese Pierotti at Xerox Corporation, "Xerox 13 usability heuristics," http://ucdmanager.net/heuristics/xerox13-usability-heuristics.

12.
"cogtool tutorial," https://github.com/cogtool/documentation/tree/master/enduser/tutorial.

13.
Hyeob Kim, "Factors Affecting Intention to Use Security Functions in SNS," Korea Society of IT Service Journal 13(2). pp. 1-17. Jul. 2014.