Skip to main content

A Review of Usability and Security Evaluation Model of E- commerce Website - summary

Within this post I would like to summarize academic work:

 

A Review of Usability and Security Evaluation Model of E-commerce Website

 

The academic work focuses on problems regarding e-commerce applications evaluation models. In authors' point of view, currently developed evaluation models lack of comprehensiveness in covered aspects to evaluate success of e-commerce application. Authors identify usability as a set of traits application should possess: learnability, efficiency, memorability, error and satisfaction. Security is divided into two categories - privacy and safety. Usability and security are interrelated. Academic work highlights poor coverage of those aspects in existing evaluation models, especially inadequate security review. Autors are proposing development of comprehensive evaluation model that could link all five usability factors and also security aspects.

 

Reference:

bt Mohd, N. and Zaaba, Z., 2019. A Review of Usability and Security Evaluation Model of Ecommerce Website. Procedia Computer Science, [online] 161, pp.1199-1205. Available at: <https://www.sciencedirect.com/science/article/pii/S1877050919319441> [Accessed 5 June 2022]. 

Comments

Popular posts from this blog

Computer Ethics

The invention of computers was undeniably significant milestone for civilisation. Creation of that extensively versatile and multipurpose device was an advancement that commenced a new age - Information Age - in a history of humankind. However with new possibilities, new threats follows: cyber crime, cyber terrorism or cyber war. Computer ethics consists of rules, practices and areas that should be taken into consideration while designing, implementing and using information and communication technologies. It was a predecessor to ICT related legislation and expands current legal obligations for every individual involved.  The first of computer ethics commandments says: "Thou shalt not use a computer to harm other people".   Often ethic codes are assigned to activities that have potential to be unethical, and within computer sciences the first thought is majorly hacking. In general, hacking refers to activities leading to acquire access to systems or data without permission...