Skip to main content

Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study

  • Conference paper
  • 808 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4658))

Abstract

In this paper, we propose methodology for improving usability of security tools based on human interface study. Today, users in general cannot use or operate presently available security tools effectively because they lack interface with high usability making them difficult to use or operate. However, if the security tools are effectively used, it is possible to find potential vulnerability information of a client computer. Therefore, we consider security scanners, and develop an interface for them with high usability based on human interface study, so that even general users can use them to find and fix vulnerability of their computers. We perform usability evaluation based on human interface study to the interface we have developed and we show that high usability has been realized from an objective viewpoint.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. comScore Networks, Inc. 694 Million People Currently Use the Internet Worldwide According to comScore Networks (2007/2/13), http://www.comscore.com/press/release.asp?id=849

  2. Information-technology Promotion Agency (IPA) Japan, Status Report on Notification of Vulnerability (in Japanese) (2007/2/26), http://www.ipa.go.jp/security/vuln/report/press.html

  3. ITmedia: Corporate Users Have Little Confidence in Security of Their System (in Japanese) (2007/2/27), http://www.atmarkit.co.jp/news/200605/02/ibm.html

  4. Information-technology Promotion Agency (IPA) Japan, Attitude Survey Toward Threat on Information Security (in Japanese) (2007/2/27), http://www.ipa.go.jp/

  5. Furnell, S.M., et al.: The Challenges of Understanding and Using Security: A Survey of End-users. Computers & Securities 25, 27–35 (2006)

    Article  Google Scholar 

  6. IBM User Experience Design Center, User Centered Design, http://www-6.ibm.com/jp/design/eou/2center/index.html

  7. Holzblatt, K., et al.: Contextual Design. Morgan Kaufmann Pub., San Francisco (1999)

    Google Scholar 

  8. Lewis, C., et al.: Task-Centered User Interface Design (2007/02/27), http://hcibib.org/tcuid/

  9. Nessus: The Nessus Project (2007/2/27), http://www.nessus.org/

  10. Nielsen, J.: Sability Testing With 5 Users (Jakob Nielsen’s Alertbox) (2007/2/27), http://www.useit.com/alertbox/20000319.html

  11. ISO 9241-11:1998: ISO - International Organization for Standardization (2007/1/30), http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=16883&ICS1=13&ICS2=180&ICS3=

  12. Nakagawa, K., et al.: The Development of Questionnaire for Evaluating Web Usability. In: Proceedings of the Human Interface Symposium 2001 (2001)

    Google Scholar 

  13. Yoshimoto, M., et al.: Development of Security Scanner with High Usability. In: Proc. AINA 2004, vol. 1, pp. 139–144 (2004)

    Google Scholar 

  14. Yoshimoto, M., et al.: Development of Security Scanner with High Portability and Usability. In: Proc. AINA 2005, vol. 2, pp. 407–410 (2005)

    Google Scholar 

  15. Yoshimoto, M., et al.: Enhancement of Usability by Adding New Interface to Existing Security Products-For the Case of Security Scanner. In: CSS 2006, pp. 67–72 (November 2006)

    Google Scholar 

  16. Nielsen, J.: Heuristics for User Interface Design (2007/2/27), http://www.useit.com/papers/heuristic/heuristic_list.html

  17. Nielsen, J., et al.: Usability Inspection Method. John Wiley and Sons, Chichester (1994)

    Google Scholar 

  18. Microsoft Corporation: Microsoft Security Bulletin MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883) (2007/02/27), http://www.microsoft.com/technet/security/bulletin/MS06-040.mspx

  19. The MITRE Corporation: CVE - Common Vulnerabilities and Exposures (2007/2/27), http://cve.mitre.org/

  20. JVN, JP Vendor Status Notes (2007/2/27), http://jvn.jp/

  21. Nielsen, J.: Usability Engineering. Morgan Kaufmann Pub., San Francisco (1994)

    Google Scholar 

  22. Tarumoto, T.: Usability Engineering, Ohmsha (October 2005) (in Japanese)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomoya Enokido Leonard Barolli Makoto Takizawa

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yoshimoto, M., Katoh, T., Bista, B.B., Takata, T. (2007). Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study. In: Enokido, T., Barolli, L., Takizawa, M. (eds) Network-Based Information Systems. NBiS 2007. Lecture Notes in Computer Science, vol 4658. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74573-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74573-0_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74572-3

  • Online ISBN: 978-3-540-74573-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics