System evaluation lifecycle: chasing windmills
Proceedings of the 2012 Information Security Curriculum Development Conference
Usable object management approaches for online social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Hi-index | 0.01 |
This introduction to the IEEE Security & Privacy special issue on usability and security provides a description of how usable security has been transformed from a desirable system property to a rich area of serious research. It explains how usability testing differs from other kinds of software testing, describes some of the key papers on which current research builds, and summarizes the four articles in the special issue.