Browse > Article
http://dx.doi.org/10.13089/JKIISC.2016.26.1.285

Study on Usable Security of Facebook  

Kim, Chung-han (Center for Information Security Technologies(CIST), Korea University)
Park, Min-su (Center for Information Security Technologies(CIST), Korea University)
Kim, Seung-joo (Center for Information Security Technologies(CIST), Korea University)
Abstract
Recently, as the widespread use of Facebook through a smartphone or tablet PC, it has increased the threat that contains the malicious code to post a social attacks and comments that use personal information that has been published of Facebook. To solve these problems, Facebook is, by providing a security function, but would like to address these threats, in setting the security function, the security function of the user's convenience is not considered a properly there is a problem that is not in use. Thus, in this paper, on the basis of the information obtained via the cogTool, on Facebook security features, the user experience by presenting a method that can be quantitatively measured by this, the user convenience It classifies about Facebook security features to decrease.
Keywords
Facebook; Usability; cogTool; Heuristic evaluation;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Jokela, Timo, et al, "The standard of user-centered design and the standard definition of usability: analyzing ISO 13407 against ISO 9241-11," Proceedings of the Latin American conference on Human-computer interaction. ACM,pp. 53-60. Aug. 2003.
2 Din, Amran, "Usable Security using GOMS: A Study to Evaluate and Compare the Usability of User Accounts on E-Government Websites," Nova Southeastern university. 2015.
3 Shin, Sooyeon, and Taekyoung Kwon, "STM-GOMS Model: A Security Model for Authentication Schemes in Mobile Smart Device Environments," Journal of the Korea Institute of Information Security and Cryptology 22(6). pp. 1243-1252. 2012.
4 Card, Stuart K. Thomas P. Moran, and Allen Newell, "The keystroke-level model for user performance time with interactive systems," Communications of the ACM vol. 23. no. 7 pp.396-410. 1980.   DOI
5 Bellamy, Rachel, et al, "Using CogTool to model programming tasks," Evaluation and Usability of Programming Languages and Tools. ACM, Oct. 2010.
6 Nielsen Jakob, "Usability engineering," Elsevier, pp. 1-362. Oct. 1994.
7 Nielsen Jakob, "Usability inspection methods," Conference companion on Human factors in computing systems. ACM, pp. 413-414. Apr. 1994.
8 Giles Hogben, "security issues and recommendations for online social networks," ENISA Position Paper No.1, pp. 1-36. Oct. 2007.
9 Bellamy, Rachel, Bonnie John, and Sandra Kogan, "Deploying CogTool: integrating quantitative usability assessment into real-world software development," Software Engineering (ICSE), 2011 33rd International Conference on. IEEE, pp. 691-700. May. 2011.
10 jordisan, "Web Applications (RIA) usabili ty heuristics," http://ucdmanager.net/heuristics/web-applications-ria-usability-heuristics.
11 Deniese Pierotti at Xerox Corporation, "Xerox 13 usability heuristics," http://ucdmanager.net/heuristics/xerox13-usability-heuristics.
12 "cogtool tutorial," https://github.com/cogtool/documentation/tree/master/enduser/tutorial.
13 Hyeob Kim, "Factors Affecting Intention to Use Security Functions in SNS," Korea Society of IT Service Journal 13(2). pp. 1-17. Jul. 2014.