Work place: School of Computing and Technology, Asia Pacific University of Technology & Innovation (APU), Bukit Jalil, 57000, Kuala Lumpur, Malaysia
E-mail: ugobelle@gmail.com
Website:
Research Interests: Software Construction, Software Development Process, Software Engineering, Software Organization and Properties
Biography
Ugochi Oluwatosin Nwokedi received her B.Sc. Degree from Crawford University, Nigeria in 2012 and currently pursuing her M.Sc. degree in Software Engineering at Asia Pacific of Technology and Innovation under Staffordshire University franchised program. Her research interests include software security, requirement engineering, software development process modeling, software modeling, Identity management, Security policies and standards, and software project management.
By Ugochi Oluwatosin Nwokedi Beverly Amunga Onyimbo Babak Bashari Rad
DOI: https://doi.org/10.5815/ijitcs.2016.05.08, Pub. Date: 8 May 2016
Systems carry sensitive data where users are involved. There is need for security concern for the modern software applications. We can term them as 'untrusted clients'. Internet usage has rapidly grown over the years and, more users are opening their information system to their clientele, it is essential to understand users' data that need protecting and to control system access as well and the rights of users of the system. Because of today's increasingly nomadic lifestyle, where they allow users to connect to information systems from anywhere with all the devices in the market, the users need to carry part of the information system out of the secure infrastructure. Insecurity in user interfaces is caused by user ignoring functionalities in the system where some are not only a threat but can harm the system e.g. leaving network services active even though the user does not need them, or when a user is having little or no information of the available security measures. This research paper aims critically address through a review of existing literature, the importance of balance or trade-off between usability and the security of the system. Systematic review method involved a physical exploration of some conference proceedings and journals to conduct the literature review. Research questions relating to usability and security were asked and the criteria for usability and security evaluations were identified. This systematic literature review is valuable in closing the gap between usability and security in software development process, where usability and security engineering needs to be considered for a better quality end-user software.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals