{"id":"https://openalex.org/W1599657442","doi":"https://doi.org/10.1007/978-3-540-74573-0_14","title":"Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study","display_name":"Development and Evaluation of New User Interface for Security Scanner with Usability in Human Interface Study","publication_year":2007,"publication_date":"2007-08-23","ids":{"openalex":"https://openalex.org/W1599657442","doi":"https://doi.org/10.1007/978-3-540-74573-0_14","mag":"1599657442"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-74573-0_14","pdf_url":null,"source":{"id":"https://openalex.org/S4306420596","display_name":"Network-Based Information Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"book-chapter","type_crossref":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052060237","display_name":"M. Yoshimoto","orcid":null},"institutions":[{"id":"https://openalex.org/I6090238","display_name":"Iwate Prefectural University","ror":"https://ror.org/054dx8336","country_code":"JP","type":"education","lineage":["https://openalex.org/I6090238"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Michitaka Yoshimoto","raw_affiliation_strings":["Iwate Prefectural University Iwate Japan"],"affiliations":[{"raw_affiliation_string":"Iwate Prefectural University Iwate Japan","institution_ids":["https://openalex.org/I6090238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027074375","display_name":"Takashi Katoh","orcid":null},"institutions":[{"id":"https://openalex.org/I6090238","display_name":"Iwate Prefectural University","ror":"https://ror.org/054dx8336","country_code":"JP","type":"education","lineage":["https://openalex.org/I6090238"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takashi Katoh","raw_affiliation_strings":["Iwate Prefectural University Iwate Japan"],"affiliations":[{"raw_affiliation_string":"Iwate Prefectural University Iwate Japan","institution_ids":["https://openalex.org/I6090238"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111952486","display_name":"Bhed Bahadur Bista","orcid":null},"institutions":[{"id":"https://openalex.org/I6090238","display_name":"Iwate Prefectural University","ror":"https://ror.org/054dx8336","country_code":"JP","type":"education","lineage":["https://openalex.org/I6090238"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Bhed Bahadur Bista","raw_affiliation_strings":["Iwate Prefectural University Iwate Japan"],"affiliations":[{"raw_affiliation_string":"Iwate Prefectural University Iwate Japan","institution_ids":["https://openalex.org/I6090238"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103921459","display_name":"Toyoo Takata","orcid":null},"institutions":[{"id":"https://openalex.org/I6090238","display_name":"Iwate Prefectural University","ror":"https://ror.org/054dx8336","country_code":"JP","type":"education","lineage":["https://openalex.org/I6090238"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Toyoo Takata","raw_affiliation_strings":["Iwate Prefectural University Iwate Japan"],"affiliations":[{"raw_affiliation_string":"Iwate Prefectural University Iwate Japan","institution_ids":["https://openalex.org/I6090238"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.78199,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":70,"max":74},"biblio":{"volume":null,"issue":null,"first_page":"127","last_page":"136"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12720","display_name":"Multimedia Communication and Technology","score":0.8454,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12720","display_name":"Multimedia Communication and Technology","score":0.8454,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10470","display_name":"Usability and User Interface Design","score":0.8253,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13243","display_name":"Innovation in Digital Healthcare Systems","score":0.8217,"subfield":{"id":"https://openalex.org/subfields/3605","display_name":"Health Information Management"},"field":{"id":"https://openalex.org/fields/36","display_name":"Health Professions"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5780716},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.5625152},{"id":"https://openalex.org/keywords/cognitive-walkthrough","display_name":"Cognitive walkthrough","score":0.4743049}],"concepts":[{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.92477334},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.7194123},{"id":"https://openalex.org/C6353995","wikidata":"https://www.wikidata.org/wiki/Q17027910","display_name":"Human-computer interaction in information security","level":5,"score":0.70791626},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7035942},{"id":"https://openalex.org/C23456302","wikidata":"https://www.wikidata.org/wiki/Q7901668","display_name":"Usability inspection","level":4,"score":0.6185012},{"id":"https://openalex.org/C100302975","wikidata":"https://www.wikidata.org/wiki/Q1642623","display_name":"Usability engineering","level":3,"score":0.60956776},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5780716},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5625152},{"id":"https://openalex.org/C4237393","wikidata":"https://www.wikidata.org/wiki/Q1636686","display_name":"Web usability","level":3,"score":0.5130764},{"id":"https://openalex.org/C87105883","wikidata":"https://www.wikidata.org/wiki/Q1107002","display_name":"Cognitive walkthrough","level":4,"score":0.4743049},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.46516043},{"id":"https://openalex.org/C11324603","wikidata":"https://www.wikidata.org/wiki/Q2502322","display_name":"Usability lab","level":4,"score":0.43964633},{"id":"https://openalex.org/C3255780","wikidata":"https://www.wikidata.org/wiki/Q1616517","display_name":"Heuristic evaluation","level":3,"score":0.4329496},{"id":"https://openalex.org/C188688815","wikidata":"https://www.wikidata.org/wiki/Q7205541","display_name":"Pluralistic walkthrough","level":3,"score":0.42087966},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.35039425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30846035},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.21808535},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.082155555},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.07166824},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.06684211},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-74573-0_14","pdf_url":null,"source":{"id":"https://openalex.org/S4306420596","display_name":"Network-Based Information Systems","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":8,"referenced_works":["https://openalex.org/W2050618934","https://openalex.org/W2115827596","https://openalex.org/W2124260370","https://openalex.org/W2152309982","https://openalex.org/W2338664601","https://openalex.org/W2342091124","https://openalex.org/W4239720002","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W65754041","https://openalex.org/W2772000347","https://openalex.org/W2488259327","https://openalex.org/W2238167322","https://openalex.org/W2212131490","https://openalex.org/W2155602934","https://openalex.org/W2150599767","https://openalex.org/W2085749886","https://openalex.org/W2081936878","https://openalex.org/W2016022053"],"abstract_inverted_index":{"In":[0],"this":[1],"paper,":[2],"we":[3,65,111,115],"propose":[4],"methodology":[5],"for":[6,73],"improving":[7],"usability":[8,36,77,101,119],"of":[9,60,96],"security":[10,27,47,67],"tools":[11,28,48],"based":[12,78,103],"on":[13,79,104],"human":[14,80,105],"interface":[15,33,72,81,106,110],"study.":[16],"Today,":[17],"users":[18,87],"in":[19],"general":[20,86],"cannot":[21],"use":[22,41,89],"or":[23,42],"operate":[24],"presently":[25],"available":[26],"effectively":[29,50],"because":[30],"they":[31],"lack":[32],"with":[34,75],"high":[35,76,118],"making":[37],"them":[38,74,90],"difficult":[39],"to":[40,55,91,108],"operate.":[43],"However,":[44],"if":[45],"the":[46,109],"are":[49],"used,":[51],"it":[52],"is":[53],"possible":[54],"find":[56,92],"potential":[57],"vulnerability":[58,95],"information":[59],"a":[61],"client":[62],"computer.":[63],"Therefore,":[64],"consider":[66],"scanners,":[68],"and":[69,93,114],"develop":[70],"an":[71,124],"study,":[82],"so":[83],"that":[84,117],"even":[85],"can":[88],"fix":[94],"their":[97],"computers.":[98],"We":[99],"perform":[100],"evaluation":[102],"study":[107],"have":[112],"developed":[113],"show":[116],"has":[120],"been":[121],"realized":[122],"from":[123],"objective":[125],"viewpoint.":[126]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W1599657442","counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-03-16T20:29:59.820523","created_date":"2016-06-24"}