Nobody downloaded yet

Integrating Security and Usability into the Requirements and Design Process - Research Paper Example

Comments (0) Cite this document
The author of this paper under the title "Integrating Security and Usability into the Requirements and Design Process" thoroughly discusses that system usability and security seem not to get along well in various software development contexts. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
Integrating Security and Usability into the Requirements and Design Process
Read TextPreview

Extract of sample "Integrating Security and Usability into the Requirements and Design Process"

Download file to see previous pages The user interface design of the touch screen register has features that enable it to attain security. First, the new system enforces access controls by requiring that every cashier supplies a matching pair of user-id and password in order to log in to the register. It is not only helpful in preventing non-legitimate access to the register, but also provides a good avenue to introduce role-based authentication. Moreover, it will be possible associating a given cashier with a certain workstation, and in certain instances, it is possible associating a cashier with a certain workgroup. Second, the registers ability to lock after four unsuccessful login attempts is a good strategy to suppress the efforts of brute force attackers and malicious insiders who will constantly use trial and error in a bid to gain unauthorized access to the system. Further, the safety of information stored therein is enhanced by the condition that only the managers can use a keycard to unlock the register following unsuccessful login attempts. Finally, unauthorized access is also prevented by the registers ability to lock if the screen does not get touched for a period of three minutes.
The system also features certain security utilities that to some extent collide with the usability. First, the restriction that only the cashier who was authenticated before the system locked will be in a position to unlock it is a feature that prevents the idea of other end-users performing malicious acts on other peoples account profile. Otherwise, new cashiers would need to restart the system. The tool also increases accountability whilst enhancing the systems intention to associate every action with a particular user (Wysocki, 2013).  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Integrating Security and Usability into the Requirements and Design Research Paper”, n.d.)
Retrieved from
(Integrating Security and Usability into the Requirements and Design Research Paper)
“Integrating Security and Usability into the Requirements and Design Research Paper”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Integrating Security and Usability into the Requirements and Design Process

E-business Models: Integrating Learning from Strategy Development Experiences and Empirical Research

...ideas for improving educational and learning processes. The overall application of the e-learning will offer an excellent support for improving educational processes (Trombly, 2000; Rappa, 2010; Burke, 2008; Bagchi & Tulskie, 2000). Task 4 4.1- Advice to OBC for good website design This section is about the specification of good website design for Oxenford Business College’s web based e-learning arrangement. I have outlined below some of the important needs and requirement of the good web design for the Oxenford Business College website of e-learning: Usability Usability is a meted of determining...
11 Pages(2750 words)Assignment

System design requirements document

...?CLINICAL SYSTEM DESIGN REQUIREMENT November 11, Part1 Stakeholders Stakeholders are the people whose work is affected by implementing the system. They include:- 1. Clinical providers- Clinical providers include Doctors, nurses and pharmacists. The doctors will be involved in providing prescription to patients after diagnosis. The prescription will also be billed by the doctor. The pharmacist dispenses the medication which makes him to be part of the system. The nurse can be involved in providing the check up services to the patients. These checks up results are the one used by the doctor as part of making decision on the patient sickness. All these information provided by the different clinical providers...
4 Pages(1000 words)Essay

Website Design. User Experience and Usability

...are the drivers of users (Clubrunner, 2013, p. 1). Others call this making the site as content-centric (Clubrunner, 2013, p. 1). Its layout must also be designed using themes and must be free from clusters (Clubrunner, 2013, p. 1). It must be also easy to download and if it’s marketing something, it must be engineered with SSL encrypted pages for financial transactions (Clubrunner, 2013, p. 1). Framing, styles, content, and patterns must be contextualized on web’s functions (Clubrunner, 2013, p. 1; Nielsen & Loranger, 2006, p. 8). Strength and weaknesses of Amazon & eBay The strength and weaknesses of and eBay are almost similar based on its internet design, usability, and...
8 Pages(2000 words)Essay

Design Process

...? Case Study, Computer sciences and Information technology Case Study, Computer sciences and Information technology A good design requires good and accurate thinking in order to create a good system. Creating designs involve making decisive choices that are user oriented. Software engineering or development is a creative field that may require the use of prototypes to inform the designer during the design process. Prototypes help inform the design process and enables designers see mistakes before the final project is delivered to the client. Interactive systems...
4 Pages(1000 words)Case Study

Integrating Design and Production

.... Since 1980's a series of new developments took place and these developments went on till the traditional models were replaced with new ones. These new models are not only complex but also highly technical because many projects are designed and planned according to these models. This report would focus attention on the required activities to successfully finish the project. However every project has basically four main phases. According to Stuckenbruck (1981) initiation involves project design and planning phases and the growth process includes both execution and process continuity. However the unimodal histogram below does not adequately represent the various integration related constraints of the project... in the...
31 Pages(7750 words)Coursework

Usability in Website and Software Design

...between tools and their users in order to improve efficiency and improve customer satisfaction. Usability shortens the time to accomplish tasks, reduce the number of mistakes made and reduces learning time. The site also lists various resources like books and other reference materials including various links pertaining to usability. Methodology. Usability evaluations can be conducted both during and after the design and through the development process. Evaluation can be divided into two broad categories: I. those that gather data from actual users and II. those that can be applied without actual users present. It is of importance that while...
4 Pages(1000 words)Research Proposal


...Evaluation of Purpose of the Website is a platform for the government web developers and designers to get guided about the aspects that should be included in a website to make it usable and accessible for the end-user. It has various other aspects of information on how to; Collect data on the basis of requirements of the user and then present it in a useful manner on the website. Development of prototypes. Perform usability tests and then deduce results regarding the level of usability of the website. Measure trends (U.S. Department of Health & Human Services, n.d.) 2. Structure and Target Audience The website is structured...
2 Pages(500 words)Essay

Security Design (110). This action can be achieved when divergent thinking and convergent thinking are coalesced with the help of spray diagrams, multiple cause diagrams, etc. Next, systems level designs and techniques must be produced. After that, the implementation scheme must be verified with the help of the techniques like software and hardware testing, validation, etc. Finally, the designing team must adhere to the most flexible “Systems Engineering policies, processes and tool sets” (Alston and Campbell, 112) that can be used and modified during security emergencies. Work Cited Alston, Ian and Simon Campbell. “A systems engineering approach for security...
1 Pages(250 words)Research Paper

Physical security requirements

...of ‘defensible space’. Challinger (2008) stipulated that crime rate with reference to buildings increased as the number of floors increased. The other concept as far as design is concerned is the Crime Prevention Through Environmental Design (CPTED). Environmental factors make crime easier or harder to happen. Situational crime prevention is also a fact under design of the building. A modification of environmental factors has to be made to reduce crime in the building. In the case of CPTED, all the workers in the building will be required to be aware of their situations and be responsible for these situations. For this purpose, taking care of design...
3 Pages(750 words)Essay


...of visitors in the park can be assessed by being asked to explain the process of limestone cave formation after watching the display. This will test whether the audience really comprehends the key steps of limestone cave formations in this national park. Also, experts in display designing can view the display and make an audit as to whether the display complies with the market demand. In this case, the display is intended to attract tourists to the said caves. It should therefore be intriguing, interesting and detailed. The perfect usability test of designing and utilizing a patio, the leads or (instructions) should be precise, brief and straightforward so that the...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Integrating Security and Usability into the Requirements and Design Process for FREE!

Contact Us