Mobile Security for Dummies Designing Mobile Security Interfaces for the Non-Expert with Predictive Human Performance Modelling
نویسنده
چکیده
Predicting the effectiveness of user interfaces at the design stage has been extensively explored for the traditional computer workstation and the expert user. Various analytical tools, such as CogTools apply the Keystroke Level Model (KLM) approach to evaluate software designs for efficiency prior to development. The mobile platform presents additional input paths and resource constraints not present on the traditional workstation platform. This study examines a methodology to extend current predictive human performance modelling to the mobile platform and accurately model the experience of the novice user. Keywords— mobile; security usability; predictive human performance modeling; variable risk
منابع مشابه
Poster: Mobile Security for Dummies: Designing Mobile Security Interfaces for the Non-Expert
متن کامل
Empowering Ordinary Consumers to Securely Configure their Mobile Devices and Wireless Networks
Despite the best efforts of application designers, security configuration interfaces are hard to use. The conventional wisdom for designing consumer applications does not work for designing security applications. Using 802.11 networks as a case study, we present a set of principles for the design of configuration interfaces. The key insight is that users have a difficult time translating their ...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملThe Presentation of an Ideal Safe SMS based model in mobile Electronic commerce using Encryption hybrid algorithms AES and ECC
Mobile commerce is whatever electronic transfer or transaction via a mobile modem through a mobile net in which the true value or advance payment is done for goods, services or information. A mobile payment system should be beneficial for all related persons. For a payment system to be a Successful system, End-user, seller, exporter and operators should see a additional value in it. End-user ...
متن کاملAccess and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کامل