Skip to main content

Abstract

Over the past decade, with the progress in technology, there has emerged various needs for users to get more interactive with Web applications. Commercial web services have spread the use of rich interfaces to provide users with a meaningful interaction with these applications. Nevertheless, the dynamic nature of the context of interaction imposes practitioners to extract various requirements such as user needs and choose the appropriate actions to perform them. However, in real practice, practitioners hardly combine between exploring the space problem to extract users’ goals and creating a high quality user interface. To overcome this challenge, we propose a set of measurements criteria basically integrated into specific comprehensive indicators. Our goal is to evaluate the main aspects of quality requirements (Design, security). Thus, practitioners will have a flexible support based on a high quality model to improve the extracted services and the usability of commercial Web-based application in a dynamic context.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 249.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barnes, S., Vidgen, R.: Assessing the quality of auction web sites (2011)

    Google Scholar 

  2. Garzotto, F., Mainetti, L., Paolini, P.: Hypermedia design analysis and evaluation issues. Commun. ACM 38(8) (2010)

    Article  Google Scholar 

  3. Alexander, J., Tate, M.A.: Checklist for an informational web page (1996). http://www2.widener.edu/Wolfgram-Memorial

  4. Liu, C., Arnett, K.: Exploring the factors associated with web site success in the context of electronic commerce. Inf. Manag. 38, 23–33 (2000)

    Article  Google Scholar 

  5. Morville, P.: Information, architecture and usability (2012). http://www.webreview.com/1999/03_12/strategists/03_12_99_3.shtml

  6. Signore, O.: A comprehensive model for web sites quality (2005)

    Google Scholar 

  7. Chettaoui, N., Bouhlel, M.S.: I2Evaluator: an aesthetic metric-tool for evaluating the usability of adaptive user interfaces. Egypt, 31 August 2017

    Google Scholar 

  8. Filali, T., Chettaoui, N., Bouhlel, M.S.: Towards the automatic evaluation of the quality of commercially-oriented web interfaces. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications, SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939873

  9. Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly, Sebastopol (2015)

    Google Scholar 

  10. Atoyan, H., Duquet, J., Robert, J.: Trust in New Decision Aid Systems. ACM Press, New York (2006)

    Book  Google Scholar 

  11. Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa, S.D.J. (eds.) Human-Computer Interaction – INTERACT 2007, vol. 4663. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Cranor, L.F.: Designing a Privacy Preference Specification Interface: A Case Study. Press, New York (2013)

    Google Scholar 

  13. Yurcik, W., Barlow, J., Lakkaraju, K., Haberman, M.: Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements. Press, New York (2013)

    Google Scholar 

  14. Johnston, J., Eloff, J., Labuschagne, L.: Security and human computer interfaces. Comput. Secur. 22(8), 675–684 (2013)

    Article  Google Scholar 

  15. Dhamija, R., Dusseault, L.: The seven flaws of identity management. IEEE Secur. Priv. 1540(7993/08), 24 (2008)

    Article  Google Scholar 

  16. Author, F.: Article title. Journal 2(5), 99–110 (2016)

    Google Scholar 

  17. Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE 2016. LNCS, vol. 9999, pp. 1–13. Springer, Heidelberg (2016)

    Google Scholar 

  18. Author, F., Author, S., Author, T.: Book title. 2nd edn. Publisher, Location (1999)

    Google Scholar 

  19. Author, F.: Contribution title. In: 9th International Proceedings on Proceedings, pp. 1–2. Publisher, Location (2010)

    Google Scholar 

  20. LNCS Homepage. http://www.springer.com/lncs. Accessed 21 Nov 2016

  21. Triki, N., Kallel, M., Bouhlel, M.S.: Imaging and HMI: fondations and complementarities, March 2012

    Google Scholar 

  22. Ivory, M.Y., Sinha, R.R., Hearst, M.A.: Empirically validated web page design metrics. Seattle, WA, USA, March/April 2001

    Google Scholar 

  23. Beirekdar, A., Vanderdonckt, J., Noirhomme-Fraiture, M.: A framework and a language for usability automatic evaluation of web sites by static analysis of html source code. Valenciennes, France, May 2012

    Google Scholar 

  24. Abascal, J., Arrue, M., Garay, N., Tomás, J.: EvalIris – a web service for web accessibility evaluation. Budapest, Hungary, pp. 20–24, May 2003

    Google Scholar 

  25. Knapp, A., Koch, N., Zhang, G., Hassler, H.-M.: Modeling business processes in web applications with argouwe. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (eds.) «UML » 2004 — The Unified Modeling Language. Modeling Languages and Applications, UML 2004. Springer, Heidelberg (2004)

    Google Scholar 

  26. Abderrahim, Z., Hamrouni, N.: Towards optimizing the dynamic placement of tasks by multi agent systems, March 2012

    Google Scholar 

  27. Bellovin, S.M.: On the brittleness of software and the infeasibility of security metrics. IEEE Secur. Priv. 1540, 7993–7996 (2006)

    Google Scholar 

  28. Chettaoui, N., Bouhlel, M.S., Lapayre, J.C.: Development of collaborative software platform of image processing for an optical probe (2014)

    Google Scholar 

  29. Streveler, D.J., Wasserman, A.I.: Quantitative measures of the spatial properties of screen designs, pp. 1–125 (1984)

    Google Scholar 

  30. Padmanabhuni, S., Adarkar, H.: Security in service oriented architecture: issues, standards and implementation. In: Service-Oriented Software System Engineering: Challenges and Practices, Chap. 1. Idea Group Publishing, Hershey (2015)

    Google Scholar 

  31. Assila, A., Bouhlel, M.S.: A Web questionnaire generating tool to aid for interactive systems quality subjective assessment. Publication (2013)

    Google Scholar 

  32. Al-Janabi, S.: Pragmatic Miner to Risk Analysis for Intrusion Detection (PMRA-ID). In: Mohamed, A., Berry, M., Yap, B. (eds.) Soft Computing in Data Science, SCDS 2017. Communications in Computer and Information Science, vol. 788. Springer, Singapore (2017). https://doi.org/10.1007/978-981-10-7242-0_23

    Chapter  Google Scholar 

  33. Ahmed Patel, B., Al-Janabi, S., Al-Shourbaji, I., Pedersen, J.: A novel methodology towards a trusted environment in mashup web applications. Comput. Secur. 49, 107–122 (2015). https://doi.org/10.1016/j.cose.2014.10.009. http://www.sciencedirect.com/science/article/pii/S0167404814001552. ISSN 0167-4048

    Article  Google Scholar 

  34. Ahamad, S., Al-Shourbaji, I., Al-Janabi, S.: A secure NFC mobile payment protocol based on bio-metrics with formal verification. Int. J. Internet Technol. Secured Trans. 6(2), 103–132 (2016). https://doi.org/10.1504/IJITST.2016.078579. https://www.inderscienceonline.com/doi/pdf/10.1504/IJITST.2016.078579

    Article  Google Scholar 

  35. Al-Janabi, D.S., Patel, A., Fatlawi, H., Kalajdzic, K., Al Shourbaji, I.: Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: 2014 International Congress on Technology, Communication and Knowledge (ICTCK), Mashhad, pp. 1–8. IEEE (2014). https://doi.org/10.1109/ICTCK.2014.7033495. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7033495&isnumber=7033487

  36. Ali, E.S.H.: Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: 2013 Sixth International Conference on Developments in eSystems Engineering, Abu Dhabi, pp. 259–269. IEEE (2013). https://doi.org/10.1109/DeSE.2013.54. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7041127&isnumber=7041072

  37. Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the middle east. J. Inf. Knowl. Manage. 15(01), 1650007 (2016). https://doi.org/10.1142/S0219649216500076. http://www.worldscientific.com/doi/abs/10.1142/S0219649216500076

    Article  Google Scholar 

  38. Abdaoui, N., Khalifa, I.H., Faiz, S.: Sending a personalized advertisement to loyal customers in the ubiquitous environment. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939838

  39. Khalfallah, N., Ouali, S., Kraiem, N.: A proposal for a variability management frame-work. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939852

  40. Takrouni, M. Hasnaoui, A., Gdhaifi, M., Ezzedine, T., Hasnaoui, S.: Design and implementation of a Data Distribution Service blockset for an SAE Benchmark electric vehicle. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939871

  41. Toujani, R., Akaichi, J.: Fuzzy sentiment classification in social network Facebook’ statuses mining. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016). https://doi.org/10.1109/SETIT.2016.7939902

  42. Fredj, I.B., Ouni, K.: Fuzzy k-nearest neighbors applied to phoneme recognition. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016)). https://doi.org/10.1109/SETIT.2016.7939907

Download references

Acknowledgements

This work was supported and financing by the Ministry of Higher Education and Scientific Research of Tunisia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taheni Filali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Filali, T., Bouhlel, M.S. (2020). A Pattern Methodology to Specify Usable Design and Security in Websites. In: Bouhlel, M., Rovetta, S. (eds) Proceedings of the 8th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT’18), Vol.1. SETIT 2018. Smart Innovation, Systems and Technologies, vol 146. Springer, Cham. https://doi.org/10.1007/978-3-030-21005-2_42

Download citation

Publish with us

Policies and ethics