Usable Security Heuristics for Instant Messaging Application Development
- Authors: Van Niekerk, Craig Michael
- Date: 2022-04
- Subjects: Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58506 , vital:59655
- Description: As instant messaging (IM) applications have become more popular, the privacy and security concerns associated with their usage has become ever more relevant. As with many software programs, IM applications have a history of security vulnerabilities. Although IM application usage is globally increasing, it has been found that currently no generally recognised standards exist to aid IM application developers when developing the usability of the security features they implement. The problem is further exacerbated as research suggests that typical users have neither the requisite understanding of the available IM security features, nor the capacity to make full use of those protection features. The primary objective of this study is to create a set of usable security heuristics to assist developers of instant messaging applications to consider the usability of the security features implemented in these applications. This primary objective is further divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to determine IM security risks and their related implications on users; to identify and investigate existing security and usability heuristics, guidelines, standards and best practices for mobile application development; to map the identified security and usability heuristics, guidelines, standards and best practices to IM applications; and to develop a prototype to demonstrate the applicability of the proposed usable security heuristics to a typical IM application. First, a comprehensive literature study is used to determine and understand the information security threats relevant to IM applications, how IM applications operate, the security features implemented by IM applications and the potential impact the relevant information security threats could have on IM application users. Thereafter, a further literature review and content analysis are used to identify and investigate existing heuristics, guidelines, standards, and best practices for mobile application development. The findings from the content analysis, in combination with the previously identified threats to IM applications, are then mapped to IM applications, and a preliminary set of usable security heuristics for IM application development is established. This preliminary set of usable security heuristics undergoes multiple iterations of refinement to establish the proposed set of usable security heuristics for IM application development. Furthermore, an expert review is conducted to validate the proposed set of usable security heuristics from the perspectives of security, usability, and mobile application development. In addition, the expert review was also used to determine the efficacy, utility, and quality of the proposed usable security heuristics. To further validate the proposed heuristics, a proof-of-concept prototype is used, in addition to the expert review, to demonstrate the applicability of the proposed set of usable security heuristics to a typical IM application. Such a set of usable security heuristics would be useful for IM application developers and would result in the vi improved implementation of usable security, leading to an improvement in the security of IM applications. The proposed set of usable security heuristics therefore adds a further contribution to this research area, providing a solid foundation for future research. , Thesis (MA) -- Faculty of Engineering, the Built Environment, and Technology, 2022
- Full Text:
- Date Issued: 2022-04
- Authors: Van Niekerk, Craig Michael
- Date: 2022-04
- Subjects: Application software -- Development
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/58506 , vital:59655
- Description: As instant messaging (IM) applications have become more popular, the privacy and security concerns associated with their usage has become ever more relevant. As with many software programs, IM applications have a history of security vulnerabilities. Although IM application usage is globally increasing, it has been found that currently no generally recognised standards exist to aid IM application developers when developing the usability of the security features they implement. The problem is further exacerbated as research suggests that typical users have neither the requisite understanding of the available IM security features, nor the capacity to make full use of those protection features. The primary objective of this study is to create a set of usable security heuristics to assist developers of instant messaging applications to consider the usability of the security features implemented in these applications. This primary objective is further divided into several secondary objectives, which collectively aim to address the proposed problem. Therefore, the secondary objectives are to determine IM security risks and their related implications on users; to identify and investigate existing security and usability heuristics, guidelines, standards and best practices for mobile application development; to map the identified security and usability heuristics, guidelines, standards and best practices to IM applications; and to develop a prototype to demonstrate the applicability of the proposed usable security heuristics to a typical IM application. First, a comprehensive literature study is used to determine and understand the information security threats relevant to IM applications, how IM applications operate, the security features implemented by IM applications and the potential impact the relevant information security threats could have on IM application users. Thereafter, a further literature review and content analysis are used to identify and investigate existing heuristics, guidelines, standards, and best practices for mobile application development. The findings from the content analysis, in combination with the previously identified threats to IM applications, are then mapped to IM applications, and a preliminary set of usable security heuristics for IM application development is established. This preliminary set of usable security heuristics undergoes multiple iterations of refinement to establish the proposed set of usable security heuristics for IM application development. Furthermore, an expert review is conducted to validate the proposed set of usable security heuristics from the perspectives of security, usability, and mobile application development. In addition, the expert review was also used to determine the efficacy, utility, and quality of the proposed usable security heuristics. To further validate the proposed heuristics, a proof-of-concept prototype is used, in addition to the expert review, to demonstrate the applicability of the proposed set of usable security heuristics to a typical IM application. Such a set of usable security heuristics would be useful for IM application developers and would result in the vi improved implementation of usable security, leading to an improvement in the security of IM applications. The proposed set of usable security heuristics therefore adds a further contribution to this research area, providing a solid foundation for future research. , Thesis (MA) -- Faculty of Engineering, the Built Environment, and Technology, 2022
- Full Text:
- Date Issued: 2022-04
Interactive visualisation of electricity usage in smart environments
- Ngwenya, Moreblessing Tafadzwa
- Authors: Ngwenya, Moreblessing Tafadzwa
- Date: 2023-04
- Subjects: Smart environment -- south Africa , Application software -- Development , Intelligent buildings
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/61477 , vital:70687
- Description: Saving electricity is a trending topic due to the electricity challenges that are being faced globally. Smart environments are environments that are equipped with physical objects, which include computers, sensors, actuators, smartphones, and wearable devices interconnected together through the Internet of Things. The Internet of Things provides a network to achieve communication, and computation abilities to provide individuals with smart services anytime, and anywhere. Rapid developments in information technology have increased the number of smart appliances being used, leading to increased electricity usage. Devices and appliances in Smart Environments continue to consume electricity even when not in use, because of the standby function. The problems arise as the electricity consumption of the standby function accumulates to large amounts. Effective communication through visualisation of the electricity consumption in a Smart Environment provides a viable solution to reducing the consumption of electricity. This research aimed to design and developed a visualisation system that successfully communicates electricity consumption to the user using a variety of visualisation techniques. The Design Science Research Methodology was used to address the research questions and was used to iteratively design and develop an energy usage visualisation system. The visualisation system was created for the Smart Lab at the Nelson Mandela University's Department of Computing Sciences. A usability study was conducted to assess the usability and efficacy of the system. The system was found to be usable and effective in communicating power usage to potential customers, since the participants were able to complete the tasks in a short amount of time. The positive results show that visualisation can aid in communicating electricity usage to customers, resulting in a possible reduction in electricity consumption and improved decision-making. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2023
- Full Text:
- Date Issued: 2023-04
- Authors: Ngwenya, Moreblessing Tafadzwa
- Date: 2023-04
- Subjects: Smart environment -- south Africa , Application software -- Development , Intelligent buildings
- Language: English
- Type: Master's theses , text
- Identifier: http://hdl.handle.net/10948/61477 , vital:70687
- Description: Saving electricity is a trending topic due to the electricity challenges that are being faced globally. Smart environments are environments that are equipped with physical objects, which include computers, sensors, actuators, smartphones, and wearable devices interconnected together through the Internet of Things. The Internet of Things provides a network to achieve communication, and computation abilities to provide individuals with smart services anytime, and anywhere. Rapid developments in information technology have increased the number of smart appliances being used, leading to increased electricity usage. Devices and appliances in Smart Environments continue to consume electricity even when not in use, because of the standby function. The problems arise as the electricity consumption of the standby function accumulates to large amounts. Effective communication through visualisation of the electricity consumption in a Smart Environment provides a viable solution to reducing the consumption of electricity. This research aimed to design and developed a visualisation system that successfully communicates electricity consumption to the user using a variety of visualisation techniques. The Design Science Research Methodology was used to address the research questions and was used to iteratively design and develop an energy usage visualisation system. The visualisation system was created for the Smart Lab at the Nelson Mandela University's Department of Computing Sciences. A usability study was conducted to assess the usability and efficacy of the system. The system was found to be usable and effective in communicating power usage to potential customers, since the participants were able to complete the tasks in a short amount of time. The positive results show that visualisation can aid in communicating electricity usage to customers, resulting in a possible reduction in electricity consumption and improved decision-making. , Thesis (MSc) -- Faculty of Science, School of Computer Science, Mathematics, Physics and Statistics, 2023
- Full Text:
- Date Issued: 2023-04
- «
- ‹
- 1
- ›
- »