Usability and Security in User Interface Design: A Systematic Literature Review

  • Nwokedi U
  • Onyimbo B
  • et al.
N/ACitations
Citations of this article
75Readers
Mendeley users who have this article in their library.

Abstract

Systems carry sensitive data where users are involved. There is need for security concern for the modern software applications. We can term them as 'untrusted clients'. Internet usage has rapidly grown over the years and, more users are opening their information system to their clientele, it is essential to understand users' data that need protecting and to control system access as well and the rights of users of the system. Because of today's increasingly nomadic lifestyle, where they allow users to connect to information systems from anywhere with all the devices in the market, the users need to carry part of the information system out of the secure infrastructure. Insecurity in user interfaces is caused by user ignoring functionalities in the system where some are not only a threat but can harm the system e.g. leaving network services active even though the user does not need them, or when a user is having little or no information of the available security measures. This research paper aims critically address through a review of existing literature, the importance of balance or trade-off between usability and the security of the system. Systematic review method involved a physical exploration of some conference proceedings and journals to conduct the literature review. Research questions relating to usability and security were asked and the criteria for usability and security evaluations were identified. This systematic literature review is valuable in closing the gap between usability and security in software development process, where usability and security engineering needs to be considered for a better quality end-user software.

Cite

CITATION STYLE

APA

Nwokedi, U. O., Onyimbo, B. A., & Rad, B. B. (2016). Usability and Security in User Interface Design: A Systematic Literature Review. International Journal of Information Technology and Computer Science, 8(5), 72–80. https://doi.org/10.5815/ijitcs.2016.05.08

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free