Advertisement

A Pattern Methodology to Specify Usable Design and Security in Websites

  • Taheni FilaliEmail author
  • Med Salim Bouhlel
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 146)

Abstract

Over the past decade, with the progress in technology, there has emerged various needs for users to get more interactive with Web applications. Commercial web services have spread the use of rich interfaces to provide users with a meaningful interaction with these applications. Nevertheless, the dynamic nature of the context of interaction imposes practitioners to extract various requirements such as user needs and choose the appropriate actions to perform them. However, in real practice, practitioners hardly combine between exploring the space problem to extract users’ goals and creating a high quality user interface. To overcome this challenge, we propose a set of measurements criteria basically integrated into specific comprehensive indicators. Our goal is to evaluate the main aspects of quality requirements (Design, security). Thus, practitioners will have a flexible support based on a high quality model to improve the extracted services and the usability of commercial Web-based application in a dynamic context.

Keywords

Context engine Web interfaces Quality model Assessment platform 

Notes

Acknowledgements

This work was supported and financing by the Ministry of Higher Education and Scientific Research of Tunisia.

References

  1. 1.
    Barnes, S., Vidgen, R.: Assessing the quality of auction web sites (2011)Google Scholar
  2. 2.
    Garzotto, F., Mainetti, L., Paolini, P.: Hypermedia design analysis and evaluation issues. Commun. ACM 38(8) (2010)CrossRefGoogle Scholar
  3. 3.
    Alexander, J., Tate, M.A.: Checklist for an informational web page (1996). http://www2.widener.edu/Wolfgram-Memorial
  4. 4.
    Liu, C., Arnett, K.: Exploring the factors associated with web site success in the context of electronic commerce. Inf. Manag. 38, 23–33 (2000)CrossRefGoogle Scholar
  5. 5.
    Morville, P.: Information, architecture and usability (2012). http://www.webreview.com/1999/03_12/strategists/03_12_99_3.shtml
  6. 6.
    Signore, O.: A comprehensive model for web sites quality (2005)Google Scholar
  7. 7.
    Chettaoui, N., Bouhlel, M.S.: I2Evaluator: an aesthetic metric-tool for evaluating the usability of adaptive user interfaces. Egypt, 31 August 2017Google Scholar
  8. 8.
    Filali, T., Chettaoui, N., Bouhlel, M.S.: Towards the automatic evaluation of the quality of commercially-oriented web interfaces. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications, SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016).  https://doi.org/10.1109/SETIT.2016.7939873
  9. 9.
    Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People Can Use. O’Reilly, Sebastopol (2015)Google Scholar
  10. 10.
    Atoyan, H., Duquet, J., Robert, J.: Trust in New Decision Aid Systems. ACM Press, New York (2006)CrossRefGoogle Scholar
  11. 11.
    Braz, C., Seffah, A., M’Raihi, D.: Designing a trade-off between usability and security: a metrics based-model. In: Baranauskas, C., Palanque, P., Abascal, J., Barbosa, S.D.J. (eds.) Human-Computer Interaction – INTERACT 2007, vol. 4663. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  12. 12.
    Cranor, L.F.: Designing a Privacy Preference Specification Interface: A Case Study. Press, New York (2013)Google Scholar
  13. 13.
    Yurcik, W., Barlow, J., Lakkaraju, K., Haberman, M.: Two Visual Computer Network Security Monitoring Tools Incorporating Operator Interface Requirements. Press, New York (2013)Google Scholar
  14. 14.
    Johnston, J., Eloff, J., Labuschagne, L.: Security and human computer interfaces. Comput. Secur. 22(8), 675–684 (2013)CrossRefGoogle Scholar
  15. 15.
    Dhamija, R., Dusseault, L.: The seven flaws of identity management. IEEE Secur. Priv. 1540(7993/08), 24 (2008)CrossRefGoogle Scholar
  16. 16.
    Author, F.: Article title. Journal 2(5), 99–110 (2016)Google Scholar
  17. 17.
    Author, F., Author, S.: Title of a proceedings paper. In: Editor, F., Editor, S. (eds.) CONFERENCE 2016. LNCS, vol. 9999, pp. 1–13. Springer, Heidelberg (2016)Google Scholar
  18. 18.
    Author, F., Author, S., Author, T.: Book title. 2nd edn. Publisher, Location (1999)Google Scholar
  19. 19.
    Author, F.: Contribution title. In: 9th International Proceedings on Proceedings, pp. 1–2. Publisher, Location (2010)Google Scholar
  20. 20.
    LNCS Homepage. http://www.springer.com/lncs. Accessed 21 Nov 2016
  21. 21.
    Triki, N., Kallel, M., Bouhlel, M.S.: Imaging and HMI: fondations and complementarities, March 2012Google Scholar
  22. 22.
    Ivory, M.Y., Sinha, R.R., Hearst, M.A.: Empirically validated web page design metrics. Seattle, WA, USA, March/April 2001Google Scholar
  23. 23.
    Beirekdar, A., Vanderdonckt, J., Noirhomme-Fraiture, M.: A framework and a language for usability automatic evaluation of web sites by static analysis of html source code. Valenciennes, France, May 2012Google Scholar
  24. 24.
    Abascal, J., Arrue, M., Garay, N., Tomás, J.: EvalIris – a web service for web accessibility evaluation. Budapest, Hungary, pp. 20–24, May 2003Google Scholar
  25. 25.
    Knapp, A., Koch, N., Zhang, G., Hassler, H.-M.: Modeling business processes in web applications with argouwe. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, S.J. (eds.) «UML » 2004 — The Unified Modeling Language. Modeling Languages and Applications, UML 2004. Springer, Heidelberg (2004)Google Scholar
  26. 26.
    Abderrahim, Z., Hamrouni, N.: Towards optimizing the dynamic placement of tasks by multi agent systems, March 2012Google Scholar
  27. 27.
    Bellovin, S.M.: On the brittleness of software and the infeasibility of security metrics. IEEE Secur. Priv. 1540, 7993–7996 (2006)Google Scholar
  28. 28.
    Chettaoui, N., Bouhlel, M.S., Lapayre, J.C.: Development of collaborative software platform of image processing for an optical probe (2014)Google Scholar
  29. 29.
    Streveler, D.J., Wasserman, A.I.: Quantitative measures of the spatial properties of screen designs, pp. 1–125 (1984)Google Scholar
  30. 30.
    Padmanabhuni, S., Adarkar, H.: Security in service oriented architecture: issues, standards and implementation. In: Service-Oriented Software System Engineering: Challenges and Practices, Chap. 1. Idea Group Publishing, Hershey (2015)Google Scholar
  31. 31.
    Assila, A., Bouhlel, M.S.: A Web questionnaire generating tool to aid for interactive systems quality subjective assessment. Publication (2013)Google Scholar
  32. 32.
    Al-Janabi, S.: Pragmatic Miner to Risk Analysis for Intrusion Detection (PMRA-ID). In: Mohamed, A., Berry, M., Yap, B. (eds.) Soft Computing in Data Science, SCDS 2017. Communications in Computer and Information Science, vol. 788. Springer, Singapore (2017).  https://doi.org/10.1007/978-981-10-7242-0_23CrossRefGoogle Scholar
  33. 33.
    Ahmed Patel, B., Al-Janabi, S., Al-Shourbaji, I., Pedersen, J.: A novel methodology towards a trusted environment in mashup web applications. Comput. Secur. 49, 107–122 (2015).  https://doi.org/10.1016/j.cose.2014.10.009. http://www.sciencedirect.com/science/article/pii/S0167404814001552. ISSN 0167-4048CrossRefGoogle Scholar
  34. 34.
    Ahamad, S., Al-Shourbaji, I., Al-Janabi, S.: A secure NFC mobile payment protocol based on bio-metrics with formal verification. Int. J. Internet Technol. Secured Trans. 6(2), 103–132 (2016).  https://doi.org/10.1504/IJITST.2016.078579. https://www.inderscienceonline.com/doi/pdf/10.1504/IJITST.2016.078579CrossRefGoogle Scholar
  35. 35.
    Al-Janabi, D.S., Patel, A., Fatlawi, H., Kalajdzic, K., Al Shourbaji, I.: Empirical rapid and accurate prediction model for data mining tasks in cloud computing environments. In: 2014 International Congress on Technology, Communication and Knowledge (ICTCK), Mashhad, pp. 1–8. IEEE (2014).  https://doi.org/10.1109/ICTCK.2014.7033495. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7033495&isnumber=7033487
  36. 36.
    Ali, E.S.H.: Novel approach for generating the key of stream cipher system using random forest data mining algorithm. In: 2013 Sixth International Conference on Developments in eSystems Engineering, Abu Dhabi, pp. 259–269. IEEE (2013).  https://doi.org/10.1109/DeSE.2013.54. http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7041127&isnumber=7041072
  37. 37.
    Al-Janabi, S., Al-Shourbaji, I.: A study of cyber security awareness in educational environment in the middle east. J. Inf. Knowl. Manage. 15(01), 1650007 (2016).  https://doi.org/10.1142/S0219649216500076. http://www.worldscientific.com/doi/abs/10.1142/S0219649216500076CrossRefGoogle Scholar
  38. 38.
    Abdaoui, N., Khalifa, I.H., Faiz, S.: Sending a personalized advertisement to loyal customers in the ubiquitous environment. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016).  https://doi.org/10.1109/SETIT.2016.7939838
  39. 39.
    Khalfallah, N., Ouali, S., Kraiem, N.: A proposal for a variability management frame-work. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016).  https://doi.org/10.1109/SETIT.2016.7939852
  40. 40.
    Takrouni, M. Hasnaoui, A., Gdhaifi, M., Ezzedine, T., Hasnaoui, S.: Design and implementation of a Data Distribution Service blockset for an SAE Benchmark electric vehicle. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016).  https://doi.org/10.1109/SETIT.2016.7939871
  41. 41.
    Toujani, R., Akaichi, J.: Fuzzy sentiment classification in social network Facebook’ statuses mining. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016).  https://doi.org/10.1109/SETIT.2016.7939902
  42. 42.
    Fredj, I.B., Ouni, K.: Fuzzy k-nearest neighbors applied to phoneme recognition. In: The 7th International Conferences: Sciences of Electronics, Technologies of Information and Telecommunications SETIT 2016, Hammamat-Tunisia, ser. IEEE Conferences (2016)).  https://doi.org/10.1109/SETIT.2016.7939907

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Research Lab SETITUniversity of SfaxSfaxTunisia

Personalised recommendations