Advertisement

Towards Usable and Secure Natural Language Processing Systems

  • Yasser M. Hausawi
  • Liam M. Mayron
Part of the Communications in Computer and Information Science book series (CCIS, volume 373)

Abstract

Natural Language Processing (NLP) systems must be both secure and usable, but this remains an elusive objective. This work considers the relationship between usability and security in NLP systems. Development and lifecycle practices are discussed with the goal of a more integrated, comprehensive process for NLP system development.

Keywords

Natural Language Processing Security Usability Artificial Intelligence Human-Computer Interaction 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Costabile, M.F., et al.: Usability in the software life cycle. Handbook of Software Engineering and Knowledge Engineering 1, 179–192 (2001)CrossRefMathSciNetGoogle Scholar
  2. 2.
    Cranor, L., Garfinkel, S.: Security and usability: designing secure systems that people can use. O’Reilly Media, Incorporated (2005)Google Scholar
  3. 3.
    Ferre, X.: Integration of usability techniques into the software development process. In: International Conference on Software Engineering (Bridging the Gaps between Software Engineering and Human-Computer Interaction), pp. 28–35 (2003)Google Scholar
  4. 4.
    Fléchais, I.: Designing Secure and Usable Systems. Ph.D. thesis, Citeseer (2005)Google Scholar
  5. 5.
    Howard, M., Lipner, S.: The security development lifecycle. Microsoft Press (2009)Google Scholar
  6. 6.
    ISO, W.: 9241-11, Ergonomic requirements for office work with visual display terminals (vdts). The international organization for standardization (1998)Google Scholar
  7. 7.
    Kainda, R., Flechais, I., Roscoe, A.: Security and usability: Analysis and evaluation. In: International Conference on Availability, Reliability, and Security, ARES 2010, pp. 275–282. IEEE (2010)Google Scholar
  8. 8.
    Pfleeger, C.P., Pfleeger, S.L.: Security in computing. Prentice Hall PTR (2006)Google Scholar
  9. 9.
    Preece, J., Rogers, Y., Sharp, H., Benyon, D., Holland, S., Carey, T.: Human-Computer Interaction. Addison - Wesley (1994)Google Scholar
  10. 10.
    Shneiderman, B., Plaisant, C.: Designing the user interface: Strategies for effective human-computer interaction. Pearson Education (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Yasser M. Hausawi
    • 1
  • Liam M. Mayron
    • 1
  1. 1.Department of Computer SciencesFlorida Institute of TechnologyMelbourneUSA

Personalised recommendations