4.6 Review

Systematic literature review of usability capability/maturity models

Journal

COMPUTER STANDARDS & INTERFACES
Volume 55, Issue -, Pages 95-105

Publisher

ELSEVIER SCIENCE BV
DOI: 10.1016/j.csi.2017.06.001

Keywords

Capability/maturity model; Process assessment; Usability; Literature review; Human-centered-design

Funding

  1. CNPq (Conselho Nacional de Desenvolvimento Cientifico e Tecnologico) [302762/2007-8]

Ask authors/readers for more resources

A world becoming more digitally transformed and connected poses significant challenges for IT organizations, requiring increased attention to the usability of their software products and, consequently, to the systematic establishment of usability engineering (UE) processes. Typically, the establishment of software processes is guided by software process capability/maturity models (SPCMMs), such as CMMI or ISO/IEC 15504. However, it seems that these commonly adopted models do not explicitly cover usability engineering (UE) processes. Thus, a question that arises is, if there exist process capability/maturity models focusing explicitly on usability engineering? If yes, to which degree do they assist in the assessment process? To answer this, we conducted a systematic literature review on usability capability/maturity models (UCMMs). A total of 15 UCMMs were identified and analyzed, synthesizing information on their measurement framework and process reference model, usage support and how they have been developed/validated. We observed that most of the models are based on consolidated SPCMMs, such as CMMI or ISO/IEC 15504. Only few UCMMs customized for specific contexts were found. Although all UCMMs propose or reference a measurement framework, only 5 UCMMs define a proper process reference model. Most of the models also do not offer support for their usage, which may hinder their larger scale adoption in practice. Furthermore, we noted a lack of information on how most of the models have been developed and validated, which leaves their validity questionable. These results indicate the need for further research on UCMMs taking into consideration the increased importance of usability in software product quality. (C) 2017 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
Article Computer Science, Hardware & Architecture

SM2-DualRing: Efficient SM2-based ring signature schemes with logarithmic size

Mengqi Feng, Chao Lin, Wei Wu, Debiao He

Summary: Digital signature provides resistance against information tampering and identity impersonation, but lacks specific anonymity requirement for scenarios such as voting and whistle-blowing. Ring signature was introduced for achieving anonymity, but existing schemes face size limitations. In this paper, a novel construction paradigm called DualRing is proposed for logarithmic-sized ring signature. The SM2 digital signature is transformed into Type-T and integrated with DualRing technology, proving unforgeability and anonymity. Optimized and linkable schemes are proposed, and the performance in communication and computation costs are demonstrated.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Enhancing cyber security in WSN using optimized self-attention-based provisional variational auto-encoder generative adversarial network

B. Meenakshi, D. Karunkuzhali

Summary: Wireless Sensor Network (WSN) is a crucial component of the cyber physical system, consisting of fixed or moving sensors that collectively sense, gather, analyze, and transfer data of detected objects. Intrusion detection schemes in WSNs often suffer from poor identification rate, high computation overhead, and higher false alarm rate. This study proposes an innovative approach that combines advanced techniques such as self-attention, provisional learning, and generative adversarial networks to improve security and adaptability in WSNs.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Assessment of the quality of the text of safety standards with industrial semantic technologies

Jose Luis de la Vara, Hector Bahamonde, Clara Ayora

Summary: Most safety-critical systems undergo rigorous assurance processes to ensure dependability, often in compliance with standards like DO-178C for aerospace software. However, following these standards can be challenging due to issues in their text, such as imprecision and ambiguity. This study introduces an approach using RQA - Quality Studio for evaluating the text quality of safety standards, identifying common issues like passive voice and imprecise modal verbs in DO-178C.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Is it worth adopting DevOps practices in Global Software Engineering? Possible challenges and benefits

Ruben Grande, Aurora Vizcaino, Felix O. Garcia

Summary: The adoption of DevOps in global and distributed settings can bring several advantages to software companies, but it also presents challenges that need to be overcome.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Lattice based distributed threshold additive homomorphic encryption with application in federated learning

Haibo Tian, Yanchuan Wen, Fangguo Zhang, Yunfeng Shao, Bingshuai Li

Summary: In this paper, a lattice-based distributed threshold additive homomorphic encryption (DTAHE) scheme is proposed and its applications in federated learning are demonstrated. The DTAHE scheme saves communication bandwidth compared to other lattice-based DTAHE schemes. Two secure aggregation protocols are obtained when embedding the scheme into federated learning, one against semi-honest adversary and the other against active adversary using a smart contract in a ledger.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Enhanced S-boxes for the Advanced Encryption Standard with maximal periodicity and better avalanche property

Abderrahmane Nitaj, Willy Susilo, Joseph Tonien

Summary: This paper investigates a specific family of enhanced substitution boxes for the Advanced Encryption Standard. These modified S-boxes have the maximal periodicity property, with each input having the maximum orbit length of 256. The parameters for achieving this maximal periodicity property are completely determined. The new enhanced S-boxes also exhibit improved bit avalanche property.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Efficient multi-party private set intersection protocols for large participants and small sets

Lifei Wei, Jihai Liu, Lei Zhang, Qin Wang, Wuji Zhang, Xiansong Qian

Summary: Private set intersection (PSI) is widely studied for preserving privacy in collaborative data analytics. However, existing multi-party PSI (MP-PSI) protocols often face performance and scalability issues when the number of participants increases. To address this, we propose two efficient MP-PSI protocols for scenarios with a large number of participants and small set size.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

A BERT-Based Sequential POI Recommender system in Social Media

A. Noorian

Summary: This paper proposes a novel personalized sequential recommendation model, BERTSeqHybrid, which utilizes Bidirectional Encoder Representations from Transformers (BERT) to improve user-user similarity model. The model also employs asymmetric schemas and topic modeling to enhance contextual data from Points of Interest (POIs). Furthermore, a novel method for evaluating user preferences utilizing explicit demographic data is proposed to solve the cold start problem. Experimental evaluation demonstrates the superiority of the developed methodology in terms of RMSE, F-Score, MAP, and NDCG indexes on two different datasets (Yelp and Flickr).

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Intelligent and trusted metaheuristic optimization model for reliable agricultural network

Amjad Rehman, Ibrahim Abunadi, Khalid Haseeb, Tanzila Saba, Jaime Lloret

Summary: Artificial intelligence (AI) is experiencing significant growth in the areas of smart cities, agriculture, food management, and weather forecasting, primarily due to the limitations of computing power on sensing devices. The integration of AI with IoT and ubiquitous sensors has led to improvements in the agricultural sector and reduced management costs. However, optimizing resource management and data load for forwarding nodes near edge boundaries remains a challenging issue due to limited wireless technology resources.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Privacy leakage of certificateless public key authenticated searchable encryption via frequency analysis: Attacks and revises

Leixiao Cheng, Jing Qin, Fei Meng

Summary: This paper analyzes the vulnerability of existing CLPASE schemes to frequency analysis, which compromises user's search privacy. A concrete CLPASE scheme against frequency analysis is proposed, which provides higher guarantee for user's search privacy with comparable efficiency compared to previous schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

Abuse-resistant deniable encryption

Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen

Summary: Deniable encryption (DE) allows private communication even when adversaries force participants to reveal their secret keys. However, existing DE systems do not consider potential abuse by malicious users. This paper proposes an abuse-resistant DE scheme and provides formal definitions and security analysis. The proposed scheme outperforms existing work in terms of functionality and ciphertext rate.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

A lightweight delegated private set intersection cardinality protocol

Xiaoyi Yang, Yanqi Zhao, Sufang Zhou, Lianhai Wang

Summary: This paper proposes a lightweight delegated PSI-CA protocol based on multi-point oblivious pseudorandom function and collision-resistant hash function, and utilizes it to build a privacy-preserving contact tracing system. Experimental results show that our system is more practical and advantageous for densely populated areas.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

A lattice-based public key encryption scheme with delegated equality test

Kaifeng Xiao, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang

Summary: Ordinary encryption techniques cannot meet the needs of comparing, sharing, and classifying data hidden in ciphertexts in the face of growing threats to data security. The advent of the quantum computing era has brought unprecedented challenges to traditional cryptography. Fortunately, a lattice-based PKEET scheme can solve these problems by providing satisfying anti-quantum computing security and resisting OMRA attacks. This paper presents a lattice-based PKE-DET scheme that supports delegated tester function and demonstrates security under the LWE hardness assumption in the standard model. The scheme offers advantages such as high security, delegated tester authorization, and small storage space compared to existing schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

An Identity-Based Encryption with Equality Test scheme for healthcare social apps

Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang

Summary: This paper introduces public key encryption with equality test (PKEET) and identity-based encryption with equality test (IBEET) to address the problem of determining whether two ciphertexts contain the same message encrypted with different public keys, without decryption. The proposed IBEET scheme resists offline message recovery attacks (OMRA) and does not require the dual-tester setting or group mechanism. Security is demonstrated through mathematical assumptions, and experiment results show the efficiency of the scheme. From a usability perspective, the paper explains why the scheme is more suitable for healthcare social Apps compared to other OMRA-resistant schemes.

COMPUTER STANDARDS & INTERFACES (2024)

Article Computer Science, Hardware & Architecture

On Stablecoin: Ecosystem, architecture, mechanism and applicability as payment method

Dun Li, Dezhi Han, Tien-Hsiung Weng, Zibin Zheng, Hongzhi Li, Kuan-Ching Li

Summary: Stablecoins have facilitated the growth of decentralized payments and the emergence of a new generation of payment systems using cryptocurrencies and Blockchain technology. However, the existing research lacks a comprehensive overview of Stablecoins that focuses on their full context, stabilization mechanisms, and payment applicability. This paper provides a thorough summary of the definition, current state, and ecosystem of Stablecoins. It discusses the system structure, stability mechanisms, and their applicability in payment scenarios. The study identifies asset-backed Stablecoins as the most efficient and widely used, while cryptocurrency-backed Stablecoins are more balanced in relation to the original concept. Algorithm-backed Stablecoins show significant potential for development but are hesitant due to the lack of collateral or deposit reserves, making them prone to collapse. The paper concludes by presenting possible future trends for Stablecoins.

COMPUTER STANDARDS & INTERFACES (2024)