메뉴 건너뛰기




Volumn 28, Issue 10, 2012, Pages 678-694

A Usable Security Heuristic Evaluation for the Online Health Social Networking Paradigm

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN IMPROVEMENTS; HEURISTIC EVALUATION; SECURITY AND PRIVACY; USABLE SECURITY; USERS' EXPERIENCES;

EID: 84866328564     PISSN: 10447318     EISSN: 15327590     Source Type: Journal    
DOI: 10.1080/10447318.2011.654202     Document Type: Article
Times cited : (29)

References (50)
  • 1
    • 33846914244 scopus 로고    scopus 로고
    • Web portals in primary care: An evaluation of patient readiness and willingness to pay for online services
    • Adler, K.G. 2006. Web portals in primary care: An evaluation of patient readiness and willingness to pay for online services. Journal of Medical Internet Research, 8: e26 doi:10.2196/jmir.8.4.e26
    • (2006) Journal of Medical Internet Research , vol.8
    • Adler, K.G.1
  • 6
    • 84862058194 scopus 로고    scopus 로고
    • A user-centric privacy space framework
    • In: Cranor L. F., Garfinkel S., editors Sebastopol, CA: O'Reilly Media
    • Brunk, B. 2005. "A user-centric privacy space framework". In Security and usability: Designing secure systems that people can use, Edited by: Cranor, L. F. and Garfinkel, S. 401-420. Sebastopol, CA: O'Reilly Media.
    • (2005) Security and usability: Designing secure systems that people can use , pp. 401-420
    • Brunk, B.1
  • 8
    • 34250768651 scopus 로고    scopus 로고
    • Privacy policies and privacy preferences
    • In: Cranor L. F., Garfinkel S., editors Sebastopol, CA: O'Reilly Media Inc
    • Cranor, L. F. 2005. "Privacy policies and privacy preferences". In Security and usability: Designing secure systems that people can use, Edited by: Cranor, L. F. and Garfinkel, S. 447-472. Sebastopol, CA: O'Reilly Media Inc.
    • (2005) Security and usability: Designing secure systems that people can use , pp. 447-472
    • Cranor, L.F.1
  • 9
    • 52449095787 scopus 로고    scopus 로고
    • Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness
    • Eysenbach, G. 2008. Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness. Journal of Medical Internet Research, 10: e22 doi:10.2196/jmir.1030
    • (2008) Journal of Medical Internet Research , vol.10
    • Eysenbach, G.1
  • 10
    • 59649086633 scopus 로고    scopus 로고
    • Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science
    • Flenchais, I. and Sasse, M. A. 2007. Stakeholder involvement, motivation, responsibility, communication: How to design usable security in e-Science. International Journal of Human-Computer Studies, 67: 281-296. doi:10.1016/j.ijhcs.2007.10.002
    • (2007) International Journal of Human-Computer Studies , vol.67 , pp. 281-296
    • Flenchais, I.1    Sasse, M.A.2
  • 11
    • 44649119874 scopus 로고    scopus 로고
    • Social Uses of personal health information within PatientsLikeMe, an online patient community: What can happen when patients have access to one another's data
    • Frost, J. H. and Massagli, M. P. 2008. Social Uses of personal health information within PatientsLikeMe, an online patient community: What can happen when patients have access to one another's data. Journal of Medical Internet Research, 10: e15 doi:10.2196/jmir.1053
    • (2008) Journal of Medical Internet Research , vol.10
    • Frost, J.H.1    Massagli, M.P.2
  • 12
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • Furnell, S. 2005. Why users cannot use security. Computers & Security, 24 June: 274-279. doi:10.1016/j.cose.2005.04.003
    • (2005) Computers & Security , vol.24 , pp. 274-279
    • Furnell, S.1
  • 13
    • 32444433117 scopus 로고    scopus 로고
    • The challenges of understanding and using security: A survey of end-users
    • Furnell, S. M., Jusoh, A. and Katsabas, D. 2006. The challenges of understanding and using security: A survey of end-users. Computers & Security, 25: 27-35.
    • (2006) Computers & Security , vol.25 , pp. 27-35
    • Furnell, S.M.1    Jusoh, A.2    Katsabas, D.3
  • 15
    • 84876506769 scopus 로고    scopus 로고
    • Google Health
    • Google Health. (2009). https://www.google.com/accounts/ServiceLogin?service=health&nui=1&continue=https%3A%2F%2Fhealth.google.com%2Fhealth%2Fp%2F&followup=https%3A%2F%2Fhealth.google.com%2Fhealth%2Fp%2F&rm=hide
    • (2009)
  • 19
    • 9244224631 scopus 로고    scopus 로고
    • Usability inspection by metaphors of human thinking compared to heuristic evaluation
    • Hornbaek, K. and Frokjaer, E. 2004. Usability inspection by metaphors of human thinking compared to heuristic evaluation. International Journal of Human-Computer Interaction, 17: 357-374.
    • (2004) International Journal of Human-Computer Interaction , vol.17 , pp. 357-374
    • Hornbaek, K.1    Frokjaer, E.2
  • 20
    • 84876508695 scopus 로고    scopus 로고
    • IAPP
    • IAPP. (2011). CICA releases privacy maturity model. https://www.privacyassociation.org/publications/2010_08_13_cica_releases_privacy_maturity_model/
    • (2011) CICA releases privacy maturity model
  • 21
    • 67449090286 scopus 로고    scopus 로고
    • Ergonomics of human-system interaction-Part 210
    • ISO 9241-210
    • ISO 9241-210. 2010. Ergonomics of human-system interaction-Part 210, Human-centred design for interactive systems.
    • (2010) Human-centred design for interactive systems
  • 29
    • 34547361475 scopus 로고    scopus 로고
    • Optimizing heuristic evaluation process in e-commerce: Use of the Taguchi Method
    • Ling, C. and Salvendy, G. 2007. "Optimizing heuristic evaluation process in e-commerce: Use of the Taguchi Method". In International Journal of Human-Computer Interaction Vol. 22, 271-287.
    • (2007) International Journal of Human-Computer Interaction , vol.22 , pp. 271-287
    • Ling, C.1    Salvendy, G.2
  • 31
    • 0001775576 scopus 로고
    • Heuristic evaluation
    • In: Nielsen J., Mack R. L., editors New York, NY: Wiley
    • Nielsen, J. 1994. "Heuristic evaluation". In Usability inspection methods, Edited by: Nielsen, J. and Mack, R. L. 25-62. New York, NY: Wiley.
    • (1994) Usability inspection methods , pp. 25-62
    • Nielsen, J.1
  • 33
    • 2942568434 scopus 로고    scopus 로고
    • Applying heuristics to accessibility inspections
    • Paddison, C. and Englefield, P. 2004. Applying heuristics to accessibility inspections. Interacting With Computers, 16: 507-521.
    • (2004) Interacting With Computers , vol.16 , pp. 507-521
    • Paddison, C.1    Englefield, P.2
  • 34
    • 20344378356 scopus 로고
    • Heuristic evaluation: A system checklist
    • Norwalk, CT: Xerox Corporation
    • Pierotti, D. (1995). Heuristic evaluation: A system checklist. In Usability analysis and design. Norwalk, CT: Xerox Corporation. http://www.stcsig.org/usability/topics/articles/he-checklist.html
    • (1995) Usability analysis and design
    • Pierotti, D.1
  • 35
    • 84876505027 scopus 로고    scopus 로고
    • The power and the perils of using social networking tools in the NHS
    • Purdy, R. (2008). The power and the perils of using social networking tools in the NHS. A masterclass for the NHS Faculty of Health Informatics. http://www.library.nhs.uk/SpecialistLibrarySearch/Download.aspx?resID=289920
    • (2008) A masterclass for the NHS Faculty of Health Informatics
    • Purdy, R.1
  • 40
    • 23344448136 scopus 로고    scopus 로고
    • Better discount evaluation: Illustrating how critical parameters support heuristic creation
    • Somervell, J. and McCrickard, D.S. 2005. Better discount evaluation: Illustrating how critical parameters support heuristic creation. Interacting with Computers, 17: 592-612.
    • (2005) Interacting with Computers , vol.17 , pp. 592-612
    • Somervell, J.1    McCrickard, D.S.2
  • 41
  • 44
    • 77956357772 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • In: Cranor L. F., Garfinkel S., editors Sebastopol, CA: O'Reilly Media
    • Whitten, A. and Tygar, J. D. 2005. "Why Johnny can't encrypt: A usability evaluation of PGP 5.0". In Security and usability: Designing secure systems that people can use, Edited by: Cranor, L. F. and Garfinkel, S. 669-692. Sebastopol, CA: O'Reilly Media.
    • (2005) Security and usability: Designing secure systems that people can use , pp. 669-692
    • Whitten, A.1    Tygar, J.D.2
  • 45
    • 4644322724 scopus 로고    scopus 로고
    • Understanding inspection methods: Lessons from an assessment of heuristic evaluation
    • In: Blandford A., Vanderdonckt J., editors New York, NY: Springer-Verlag
    • Woolrych, A. and Cockton, G. 2001a. "Understanding inspection methods: Lessons from an assessment of heuristic evaluation". In People & computers XV, Edited by: Blandford, A. and Vanderdonckt, J. 171-192. New York, NY: Springer-Verlag.
    • (2001) People & computers XV , pp. 171-192
    • Woolrych, A.1    Cockton, G.2
  • 46
    • 0038343292 scopus 로고    scopus 로고
    • Why and when five test users aren't enough
    • In: Vanderdonckt J., Blandford A., Derycke A., editors Toulouse, France: Cépadèus
    • Woolrych, A. and Cockton, G. 2001b. "Why and when five test users aren't enough". In Proceedings of IHM-HCI 2001 Conference, Edited by: Vanderdonckt, J., Blandford, A. and Derycke, A. Vol. 2, 105-108. Toulouse, France: Cépadèus.
    • (2001) Proceedings of IHM-HCI 2001 Conference , vol.2 , pp. 105-108
    • Woolrych, A.1    Cockton, G.2
  • 47
    • 14344258328 scopus 로고    scopus 로고
    • Sale must end: should discount methods be cleared off HCI's shelves?
    • Woolrych, A. and Cockton, G. 2002. Sale must end: should discount methods be cleared off HCI's shelves?. Interactions, 9: 13-18.
    • (2002) Interactions , vol.9 , pp. 13-18
    • Woolrych, A.1    Cockton, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.