1,409
Views
1
CrossRef citations to date
0
Altmetric
COMPUTER SCIENCE

Framework for examination of software quality characteristics in conflict: A security and usability exemplar

ORCID Icon, & ORCID Icon | (Reviewing editor)
Article: 1788308 | Received 03 Mar 2020, Accepted 23 Jun 2020, Published online: 03 Jul 2020

References

  • Aldaajeh, S., Asghar, T., Khan, A. A., & Ullah, M. (2012). Communing different views on quality attributes relationships’ nature. European Journal of Scientific Research, 68(1), 101–22. https://www.researchgate.net/publication/228449235_Communing_Different_Views_on_Quality_Attributes_Relationships'_Nature
  • Arteaga, J. M., Gonzalez, R. M., Martin, M. V., Vanderdonckt, J., & Rodriguez, F. A. (2009). A methodology for designing information security feedback based on user interface patterns. Advances in Engineering Software, 40(12), 1231–1241. https://doi.org/10.1016/j.advengsoft.2009.01.024
  • Botha, R. A., Furnell, S., & Clarke, N. L. (2009). From desktop to mobile: Examining the security experience. Computers & Security, 28(3–4), 130–137. https://doi.org/10.1016/j.cose.2008.11.001
  • Braz, C., Seffah, A., & M’Raihi, D. (2007). Designing a trade-off between usability and security: A metrics based model. In Proceeding of IFIP Conference on Human-Computer Interaction (pp. 114–126),  Rio de Janeiro, Brazil.
  • Caputo, D. D., Pfleeger, S. L., Sasse, M. A., Ammann, P., Offutt, J., & Deng, L. (2016). Barriers to usable security? Three organizational case studies. IEEE Security Privacy, 14(5), 22–32. https://doi.org/10.1109/MSP.2016.95
  • Choong, Y. Y., Greene, K., & Franklin, J. (2016). Usability and security considerations for public safety mobile authentication (NIST IR 8080). [Online]. https://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8080.pdf
  • Cranor, L. F., & Buchler, N. (2014). Better together: Usability and security go hand in hand. IEEE Security and Privacy, 12(6), 89–93. https://doi.org/10.1109/MSP.2014.109
  • Dabbagh, M., & Lee, S. P. (2013). A consistent approach for prioritizing system quality attributes. In Proceeding of 14th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (pp. 317–322), Honolulu, HI, USA.
  • Ergonomics of human-system interaction. (2010). International Organization for Standardization (ISO Standard 9241).
  • Feitosa, D., Ampatzoglou, A., Avgeriou, P., & Nakagawa, E. (2015). Investigating quality trade-offs in open source critical embedded systems. “In Proceeding of 11th International ACM SIGSOFT Conference on Quality of Software Architectures (pp. 113–122), Montréal QC Canada.
  • Ferreira, A., Rusu, C., & Roncagliolo, S. (2009). Usability and security patterns. In Proceeding of 2nd International Conference on Advances in Computer-Human Interaction (pp. 301–305), Cancun, Mexico.
  • Garfinkel, S., & Lipford, H. R. (2014). Usable Security, history, themes and challenges. Morgan and Claypool Publishers.
  • Haoues, M., Sellami, A., Abdallah, H. B., & Cheikhi, L. (2017). A guideline for software architecture selection based on ISO quality related characteristics. International Journal of System Assurance Engineering Management, 8(2), 886–909. https://doi.org/10.1007/s13198-016-0546-8
  • Henningsson, K., & Wohlin, C. (2002). Understanding the relations between software quality attributes – a survey approach. In Proceeding of 12th International Conference for Software Quality (pp.1–12). Canada.
  • Hevener, A. (2007). A three cycle view of design science research. Scandinavian Journal of Information Systems, 19(2), 87–92. https://aisel.aisnet.org/sjis/vol19/iss2/4
  • IBM. (2018). Cost of data breach study: Global analysis. Ponemon Institute LLC.
  • Imperva. (2010). Consumer password worst practices. Application Defense Center. [Online]. www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdf
  • Lew, P., Olsina, L., Becker, P., & Zhang, L. (2012). An integrated strategy to systematically understand and manage quality in use for web applications. Requirements Eng, 17(4), 299–330. https://doi.org/10.1007/s00766-011-0128-x
  • Lew, P., Olsina, L., & Zhang, L. (2010). Quality, quality in use, actual usability and user experience as key drivers for web application evaluation,” In Proceeding of International Conference on Web Engineering (pp. 218–232), Vienna, Austria.
  • Liu, D., Gao, X., & Wang, H. (2017). Location privacy breach: Apps are watching you in background. In Proceeding of IEEE 37th International Conference on Distributed Computing Systems (pp. 2423–2429), Atlanta, GA, USA.
  • Mehta, R., Ruiz-López, T., Chung, L., & Noguera, M. (2013). Selecting among alternatives using dependencies: An NFR approach. In Proceeding of 28th Annual ACM Symposium on Applied Computing (pp. 1292–1297), Coimbra, Portugal.
  • Minch, R. P. (2004). Privacy issues in location aware mobile devices. In Proceeding of 37th Annual Hawaii International Conference on System Sciences (pp. 1–10), Big Island, Hawaii.
  • Naqvi, B., & Seffah, A. (2019). Interdependencies, conflicts and tradeoffs between security and usability: Why and how should we engineer them?. In 2019 1st International Conference HCI-CPT held as part of the 21st HCI International Conference (pp. 314–324), Orlando, FL, USA, HCII.
  • Naqvi, B., Seffah, A., & Braz, C. 2018. Adding measures to task models for usability inspection of the cloud access control services In Proceeding of 7th International Conference on Human Centered Software Engineering (HCSE) (pp.133–145), Nice, France.
  • Neri, H. R., & Travassos, G. H. 2018. MeasureSoft-Gram: A future vision of software product quality. In Proceeding of ACM International Symposium on Empirical Software Engineering and Measurement (ESEM) (pp. 1–4), Oulu, Finland.
  • Peffers, K., Tuunanen, T., Rothenberger, M. A., & Chaterjee, S. (2007). A design science research methodology for information systems research. Journal of Management Information System, 24(3), 45–78. https://doi.org/10.2753/MIS0742-1222240302
  • Rising, L. (2000). The pattern alamanac 2000. Addison Wesley Publishing Company.
  • Rivera, B., Becker, P., & Olsina, L. (2016). Quality views and strategy patterns for evaluating and improving quality: Usability and user experience case studies. Journal of Web Engineering, 15(5&6), 433–464. https://dl.acm.org/doi/abs/10.5555/3177218.3177222
  • Sasse, M. A., Smith, M., Herley, C., Lipford, H., & Vaniea, K. (2016). Debunking security–usability tradeoff myths. IEEE Security and Privacy, 14(5), 33–39. https://doi.org/10.1109/MSP.2016.110
  • Seffah, A., & Javahery, H. (2004). Multiple user inter-faces: Cross-platform applications and context-aware interfaces. John Wiley & Sons Ltd.
  • Supakkul, S., Hill, T., Chung, L., Tun, T. T., & Leite, J. C. S. (2010). An NFR pattern approach to dealing with NFRs. In Proceeding of IEEE International Requirements Engineering Conference (RE) (pp. 179–188), Sydney, New South Wales, Australia.
  • Systems and software engineering – systems and software quality requirements and evaluation (SQuaRE) – system and software quality models. (2011). International Organization for Standardization (ISO Standard 25010).
  • Whitten, A., & Tygar, J. D. (1998). Usability of security: A case study,” School of Computing Science, Carnegie Mellon University (Technical Report CMU-CS-98-155). http://reports-archive.adm.cs.cmu.edu/anon/1998/CMU-CS-98-155.pdf
  • Wieringa, R. J. (2014). Design science methodology for information systems and software engineering. Springer.
  • Yee, K. P. (2004). Aligning security and usability. IEEE Security & Privacy, 2(5), 48–55. https://doi.org/10.1109/MSP.2004.64
  • Zhu, M. X., Luo, X. X., Chen, X. H., & Wu, D. D. (2012). A non-functional requirements tradeoff model in Trustworthy Software. Information Sciences, 191, 61–75. https://doi.org/10.1016/j.ins.2011.07.046
  • Zulzalil, H., Ghani, A. A. A., Selamat, M. H., & Mahmod, R. (2008). A case study to identify quality attributes relationships for web based applications. International Journal of Computer Science and Network Security, 8(11), 215–220. doi:10.1.1.474.4656&rep=rep1&type=pdf