{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,27]],"date-time":"2024-08-27T10:32:28Z","timestamp":1724754748364},"reference-count":40,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T00:00:00Z","timestamp":1506902400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"University of Alcala"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2017,10,2]]},"abstract":"Nowadays, instant messaging applications (apps) are one of the most popular applications for mobile devices with millions of active users. However, mobile devices present hardware and software characteristics and limitations compared with personal computers. Hence, to address the usability issues of mobile apps, a specific methodology must be conducted. This paper shows the findings from a systematic analysis of these applications on iOS mobile platform that was conducted to identify some usability issues in mobile applications for instant messaging. The overall process includes a Keystroke-Level Modeling and a Mobile Heuristic Evaluation. In the same trend, we propose a set of guidelines for improving the usability of these apps. Based on our findings, this analysis will help in the future to create more effective mobile applications for instant messaging.<\/jats:p>","DOI":"10.1155\/2017\/1294193","type":"journal-article","created":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T17:01:22Z","timestamp":1506963682000},"page":"1-17","source":"Crossref","is-referenced-by-count":9,"title":["A Systematic Evaluation of Mobile Applications for Instant Messaging on iOS Devices"],"prefix":"10.1155","volume":"2017","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-3192-8499","authenticated-orcid":true,"given":"Sergio","family":"Caro-Alvaro","sequence":"first","affiliation":[{"name":"Computer Science Department, University of Alcala, Alcal\u00e1 de Henares, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7598-3289","authenticated-orcid":true,"given":"Eva","family":"Garcia-Lopez","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Alcala, Alcal\u00e1 de Henares, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-0298-3237","authenticated-orcid":true,"given":"Antonio","family":"Garcia-Cabot","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Alcala, Alcal\u00e1 de Henares, Spain"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0718-8774","authenticated-orcid":true,"given":"Luis","family":"de-Marcos","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Alcala, Alcal\u00e1 de Henares, Spain"}]},{"given":"Jose-Maria","family":"Gutierrez-Martinez","sequence":"additional","affiliation":[{"name":"Computer Science Department, University of Alcala, Alcal\u00e1 de Henares, Spain"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.3233\/MIS-130176"},{"key":"2","year":"2013"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2017.01.024"},{"key":"4","year":"2016"},{"key":"5","year":"2017"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1097\/OPX.0b013e3182198792"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.014"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2015.05.006"},{"key":"11","year":"2016","journal-title":"Symposium on Usable Privacy and Security (SOUPS)"},{"issue":"5","key":"12","first-page":"350","volume":"30","year":"2010","journal-title":"Technology Society"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2360674"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3689309"},{"key":"20","year":"2003"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.29"},{"issue":"1","key":"24","first-page":"359","volume":"5","year":"2009","journal-title":"Interdisciplinary Journal of E-Learning and Learning Objects"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2007.01.006"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.4018\/jmhci.2009010102"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc1803_3"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23768-3_59"},{"key":"30","first-page":"379","year":"2011","journal-title":"Information Quality in e-Health"},{"key":"33","year":"2001"},{"key":"34","first-page":"23","volume":"1","year":"2005","journal-title":"Journal of Usability studies"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1177\/2050157915583925"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1598\/RRQ.40.4.5"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1177\/1460458208099865"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2008.12.004"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/1735223.1735255"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07227-2_18"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07668-3_45"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/434326"},{"key":"50","first-page":"2225","volume":"5","year":"2013","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"issue":"3","key":"52","first-page":"117","volume":"6","year":"2011","journal-title":"Journal of usability studies"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03655-2_27"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2003.11.001"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.11.013"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2012.013012.00028"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.06.073"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2013.90"},{"key":"61","volume":"1","year":"2011"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2015.02.009"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/1294193.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/1294193.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2017\/1294193.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,15]],"date-time":"2018-07-15T19:30:57Z","timestamp":1531683057000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2017\/1294193\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,2]]},"references-count":40,"alternative-id":["1294193","1294193"],"URL":"https:\/\/doi.org\/10.1155\/2017\/1294193","relation":{},"ISSN":["1574-017X","1875-905X"],"issn-type":[{"value":"1574-017X","type":"print"},{"value":"1875-905X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,2]]}}}