Securing User eXperience: A Review for the End-Users' Software Robustness

Millions of users all over the world nowadays spend many hours daily using social networks on a range of devices (desktop, tablet, mobile), in many languages and countries, under very different systems of governance, and in wide-ranging social, religious, cultural and political environments. But the same software (System Services, Operating Systems “OSes”, Hypervisors, Applications and Utilities) is still called upon to function in contexts defined by these vast differences in terms of quality, reliability, efficiency and security. All domestic appliances, contemporary cars and almost everything powered by electricity is now equipped with at least a rudimentary interface and ready-to-run software. Electronic transactions are now routine and there is a huge need for online security and privacy. Bring your own device (BYOD) is a trend that is appearing even in SMBs (Small and Midsize Business) with aspects, policy considerations, security models and traps. The success off all the above depends on User eXperience where the user intersects with the product (software). In this paper, we analyse the different approaches taken under the concept of User eXperience (UX) in tandem with the development of contemporary software, and examine their ramifications for the level of security and privacy. We will show that UX is a different concept from usability, examine the different academic approaches and their underlying viewpoints, and show how the tasks in question relate to security. We believe that the interface between UX and security is a demanding area which requires research in multiple dimensions. The need for designing and developing contemporary software which is smart, user-friendly, adaptive, secure and capable of protecting every type of user is immense.

[1]  Heidi Krömker,et al.  A framework to measure user experience of interactive online products , 2010, MB '10.

[2]  Udo Lindemann,et al.  The ExodUX Framework: Supporting Comprehensive User Experience Design , 2017, 2017 Portland International Conference on Management of Engineering and Technology (PICMET).

[3]  Michael Minge,et al.  Hedonic and pragmatic halo effects at early stages of User Experience , 2018, Int. J. Hum. Comput. Stud..

[4]  Vanessa Zeiler,et al.  Mobile User Experience , 2017 .

[5]  Qing Hu,et al.  Does deterrence work in reducing information security policy abuse by employees? , 2011, Commun. ACM.

[6]  Gao Changyuan,et al.  Research on user experience evaluation system of information platform based on web environment , 2013, Proceedings of 2013 2nd International Conference on Measurement, Information and Control.

[7]  Çigdem Gencel,et al.  A Framework for Software Usability and User Experience Measurement in Mobile Industry , 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement.

[8]  Jens Gerken,et al.  A Simplified Model of User Experience for Practical Application , 2007 .

[9]  Cory R. A. Hallam,et al.  Online self-disclosure: The privacy paradox explained as a temporally discounted balance between concerns and rewards , 2017, Comput. Hum. Behav..

[10]  Zhi Chen,et al.  The research of mobile application user experience and assessment model , 2011, Proceedings of 2011 International Conference on Computer Science and Network Technology.

[11]  Alan Cooper,et al.  The Inmates are Running the Asylum , 1999, Software-Ergonomie.

[12]  Oya Demirbilek,et al.  Product design, semantics and emotional response , 2003, Ergonomics.

[13]  Klaus-Peter Engelbrecht,et al.  A taxonomy of quality of service and Quality of Experience of multimodal human-machine interaction , 2009, 2009 International Workshop on Quality of Multimedia Experience.

[14]  Mark Weiser The computer for the 21st Century , 2002 .

[15]  Virpi Roto,et al.  Identifying hedonic factors in long-term user experience , 2011, DPPI.

[16]  Melanie Volkamer,et al.  The simpler, the better? Presenting the COPING Android permission-granting interface for better privacy-related decisions , 2017, J. Inf. Secur. Appl..

[17]  Sascha Mahlke,et al.  User Experience of Interaction with Technical Systems , 2008 .

[18]  Leena Arhippainen,et al.  Empirical Evaluation of User Experience in two Adaptive Mobile Application Prototypes , 2003 .

[19]  Nigel Bevan,et al.  What is the difference between the purpose of usability and user experience evaluation methods , 2009 .

[20]  A. W. Roscoe,et al.  Security and Usability: Analysis and Evaluation , 2010, 2010 International Conference on Availability, Reliability and Security.

[21]  KokolakisSpyros Privacy attitudes and privacy behaviour , 2017 .

[22]  HallamCory,et al.  Online self-disclosure , 2017 .

[23]  Timo Jokela,et al.  The standard of user-centered design and the standard definition of usability: analyzing ISO 13407 against ISO 9241-11 , 2003, CLIHC '03.

[24]  Beena Prabhu,et al.  Integrating requirements engineering and user experience design in Product life cycle Management , 2012, 2012 First International Workshop on Usability and Accessibility Focused Requirements Engineering (UsARE).

[25]  Alice Gross,et al.  Why do I like it?: investigating the product-specificity of user experience , 2012, NordiCHI.

[26]  Mike Kuniavsky,et al.  Smart Things: Ubiquitous Computing User Experience Design , 2010 .

[27]  Mikael Runonen,et al.  Oscillating between extremes: a framework for mapping differing views on User eXperience , 2011, DPPI.

[28]  Stefanos Gritzalis,et al.  Managing User Experience: Usability and Security in a New Era of Software Supremacy , 2017, HCI.

[29]  Vince Bruno,et al.  Exploring behavioral information security networks in an organizational context: An empirical case study , 2017, J. Inf. Secur. Appl..

[30]  Mohammad Zarour,et al.  User experience framework that combines aspects, dimensions, and measurement methods , 2017 .

[31]  Manfred Tscheligi,et al.  Values in action (ViA): combining usability, user experience and user acceptance , 2012, CHI Extended Abstracts.

[32]  Sebastian Möller,et al.  Psychological needs as motivators for security and privacy actions on smartphones , 2017, J. Inf. Secur. Appl..

[33]  Spyros Kokolakis,et al.  Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon , 2017, Comput. Secur..

[34]  Ka-Ping Yee,et al.  Aligning Security and Usability , 2004, IEEE Secur. Priv..

[35]  G. Veer,et al.  Affordance in interaction , 2006, ECCE '06.