Abstract
Over the past decade, with the progress in technology, there has emerged various needs for users to get more interactive with Web applications. Commercial web services have spread the use of rich interfaces to provide users with a meaningful interaction with these applications. Nevertheless, the dynamic nature of the context of interaction imposes practitioners to extract various requirements such as user needs and choose the appropriate actions to perform them. However, in real practice, practitioners hardly combine between exploring the space problem to extract users’ goals and creating a high quality user interface. To overcome this challenge, we propose a set of measurements criteria basically integrated into specific comprehensive indicators. Our goal is to evaluate the main aspects of quality requirements (Design, security). Thus, practitioners will have a flexible support based on a high quality model to improve the extracted services and the usability of commercial Web-based application in a dynamic context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Barnes, S., Vidgen, R.: Assessing the quality of auction web sites (2011)
Garzotto, F., Mainetti, L., Paolini, P.: Hypermedia design analysis and evaluation issues. Commun. ACM 38(8) (2010)
Alexander, J., Tate, M.A.: Checklist for an informational web page (1996). http://www2.widener.edu/Wolfgram-Memorial
Liu, C., Arnett, K.: Exploring the factors associated with web site success in the context of electronic commerce. Inf. Manag. 38, 23–33 (2000)
Morville, P.: Information, architecture and usability (2012). http://www.webreview.com/1999/03_12/strategists/03_12_99_3.shtml
Signore, O.: A comprehensive model for web sites quality (2005)
Chettaoui, N., Bouhlel, M.S.: I2Evaluator: an aesthetic metric-tool for evaluating the usability of adaptive user interfaces. Egypt, 31 August 2017
Filali, T., Chettaoui, N., Bouhlel, M.S.: Towards the automatic evaluation of the quality of commercially-oriented web interfaces. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications, SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939873
Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly, Sebastopol (2015)
Atoyan, H., Duquet, J., Robert, J.: Trust in New Decision Aid Systems. ACM Press, New York (2006)
Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa, S.D.J. (eds.) Human-Computer Interaction – INTERACT 2007, vol. 4663. Springer, Heidelberg (2007)
Cranor, L.F.: Designing a Privacy Preference Specification Interface: A Case Study. Press, New York (2013)
Yurcik, W., Barlow, J., Lakkaraju, K., Haberman, M.: Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements. Press, New York (2013)
Johnston, J., Eloff, J., Labuschagne, L.: Security and human computer interfaces. Comput. Secur. 22(8), 675–684 (2013)
Dhamija, R., Dusseault, L.: The seven flaws of identity management. IEEE Secur. Priv. 1540(7993/08), 24 (2008)
Author, F.: Article title. Journal 2(5), 99–110 (2016)
Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE 2016. LNCS, vol. 9999, pp. 1–13. Springer, Heidelberg (2016)
Author, F., Author, S., Author, T.: Book title. 2nd edn. Publisher, Location (1999)
Author, F.: Contribution title. In: 9th International Proceedings on Proceedings, pp. 1–2. Publisher, Location (2010)
LNCS Homepage. http://www.springer.com/lncs. Accessed 21 Nov 2016
Triki, N., Kallel, M., Bouhlel, M.S.: Imaging and HMI: fondations and complementarities, March 2012
Ivory, M.Y., Sinha, R.R., Hearst, M.A.: Empirically validated web page design metrics. Seattle, WA, USA, March/April 2001
Beirekdar, A., Vanderdonckt, J., Noirhomme-Fraiture, M.: A framework and a language for usability automatic evaluation of web sites by static analysis of html source code. Valenciennes, France, May 2012
Abascal, J., Arrue, M., Garay, N., Tomás, J.: EvalIris – a web service for web accessibility evaluation. Budapest, Hungary, pp. 20–24, May 2003
Knapp, A., Koch, N., Zhang, G., Hassler, H.-M.: Modeling business processes in web applications with argouwe. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (eds.) «UML » 2004 — The Unified Modeling Language. Modeling Languages and Applications, UML 2004. Springer, Heidelberg (2004)
Abderrahim, Z., Hamrouni, N.: Towards optimizing the dynamic placement of tasks by multi agent systems, March 2012
Bellovin, S.M.: On the brittleness of software and the infeasibility of security metrics. IEEE Secur. Priv. 1540, 7993–7996 (2006)
Chettaoui, N., Bouhlel, M.S., Lapayre, J.C.: Development of collaborative software platform of image processing for an optical probe (2014)
Streveler, D.J., Wasserman, A.I.: Quantitative measures of the spatial properties of screen designs, pp. 1–125 (1984)
Padmanabhuni, S., Adarkar, H.: Security in service oriented architecture: issues, standards and implementation. In: Service-Oriented Software System Engineering: Challenges and Practices, Chap. 1. Idea Group Publishing, Hershey (2015)
Assila, A., Bouhlel, M.S.: A Web questionnaire generating tool to aid for interactive systems quality subjective assessment. Publication (2013)
Al-Janabi, S.: Pragmatic Miner to Risk Analysis for Intrusion Detection (PMRA-ID). In: Mohamed, A., Berry, M., Yap, B. (eds.) Soft Computing in Data Science, SCDS 2017. Communications in Computer and Information Science, vol. 788. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-7242-0_23
Ahmed Patel, B., Al-Janabi, S., Al-Shourbaji, I., Pedersen, J.: A novel methodology towards a trusted environment in mashup web applications. Comput. Secur. 49, 107–122 (2015). https://doi.org/10.1016/j.cose.2014.10.009. http://www.sciencedirect.com/science/article/pii/S0167404814001552. ISSN 0167-4048
Ahamad, S., Al-Shourbaji, I., Al-Janabi, S.: A secure NFC mobile payment protocol based on bio-metrics with formal verification. Int. J. Internet Technol. Secured Trans. 6(2), 103–132 (2016). https://doi.org/10.1504/IJITST.2016.078579. https://www.inderscienceonline.com/doi/pdf/10.1504/IJITST.2016.078579
Al-Janabi, D.S., Patel, A., Fatlawi, H., Kalajdzic, K., Al Shourbaji, I.: Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: 2014 International Congress on Technology, Communication and Knowledge (ICTCK), Mashhad, pp. 1–8. IEEE (2014). https://doi.org/10.1109/ICTCK.2014.7033495. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7033495&isnumber=7033487
Ali, E.S.H.: Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: 2013 Sixth International Conference on Developments in eSystems Engineering, Abu Dhabi, pp. 259–269. IEEE (2013). https://doi.org/10.1109/DeSE.2013.54. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7041127&isnumber=7041072
Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the middle east. J. Inf. Knowl. Manage. 15(01), 1650007 (2016). https://doi.org/10.1142/S0219649216500076. http://www.worldscientific.com/doi/abs/10.1142/S0219649216500076
Abdaoui, N., Khalifa, I.H., Faiz, S.: Sending a personalized advertisement to loyal customers in the ubiquitous environment. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939838
Khalfallah, N., Ouali, S., Kraiem, N.: A proposal for a variability management frame-work. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939852
Takrouni, M. Hasnaoui, A., Gdhaifi, M., Ezzedine, T., Hasnaoui, S.: Design and implementation of a Data Distribution Service blockset for an SAE Benchmark electric vehicle. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939871
Toujani, R., Akaichi, J.: Fuzzy sentiment classification in social network Facebook’ statuses mining. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939902
Fredj, I.B., Ouni, K.: Fuzzy k-nearest neighbors applied to phoneme recognition. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016)). https://doi.org/10.1109/SETIT.2016.7939907
Acknowledgements
This work was supported and financing by the Ministry of Higher Education and Scientific Research of Tunisia.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Filali, T., Bouhlel, M.S. (2020). A Pattern Methodology to Specify Usable Design and Security in Websites. In: Bouhlel, M., Rovetta, S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-030-21005-2_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-21005-2_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-21004-5
Online ISBN: 978-3-030-21005-2
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)