Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique
The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions...
Gespeichert in:
Veröffentlicht in: | Computers, materials & continua materials & continua, 2022, Vol.70 (3), p.5683-5705 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5705 |
---|---|
container_issue | 3 |
container_start_page | 5683 |
container_title | Computers, materials & continua |
container_volume | 70 |
creator | Attaallah, Abdulaziz Ahmad Khan, Raees |
description | The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solution-independent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites. |
doi_str_mv | 10.32604/cmc.2022.021643 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2590729626</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2590729626</sourcerecordid><originalsourceid>FETCH-LOGICAL-c313t-9f21045a1918dfa561b0015f5521d4f84901ad9eb11b455e21e0974cdddbb33f3</originalsourceid><addsrcrecordid>eNpNkE1PAjEQhhujiYjePTbxvDjTL-hRCYgJiQfAa9PtdmEJsNh2D_DrreLB08wkz8ybeQh5RBhwpkA8u70bMGBsAAyV4Fekh1KogjGmrv_1t-Quxi0AV1xDj3xOYmr2NjWHNV1FW-58sfCuC0060eUmtN16Q2c-NskeEp125_OJzjPbNXnN0aUPe7rwKdJXG32VZ7c5NF-dvyc3td1F__BX-2Q1nSzHs2L-8fY-fpkXjiNPha4ZgpAWNY6q2kqFJQDKWkqGlahHQgPaSvsSsRRSeoYe9FC4qqrKkvOa98nT5e4xtDk2JrNtu3DIkYZJDUOmFVOZggvlQhtj8LU5hvx0OBkE82vPZHvmx5652OPfeWBirQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2590729626</pqid></control><display><type>article</type><title>Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Attaallah, Abdulaziz ; Ahmad Khan, Raees</creator><creatorcontrib>Attaallah, Abdulaziz ; Ahmad Khan, Raees</creatorcontrib><description>The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solution-independent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.</description><identifier>ISSN: 1546-2226</identifier><identifier>ISSN: 1546-2218</identifier><identifier>EISSN: 1546-2226</identifier><identifier>DOI: 10.32604/cmc.2022.021643</identifier><language>eng</language><publisher>Henderson: Tech Science Press</publisher><subject>Fuzzy sets ; Linguistics ; Security ; Usability ; User experience ; Websites</subject><ispartof>Computers, materials & continua, 2022, Vol.70 (3), p.5683-5705</ispartof><rights>2022. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c313t-9f21045a1918dfa561b0015f5521d4f84901ad9eb11b455e21e0974cdddbb33f3</citedby><cites>FETCH-LOGICAL-c313t-9f21045a1918dfa561b0015f5521d4f84901ad9eb11b455e21e0974cdddbb33f3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>Attaallah, Abdulaziz</creatorcontrib><creatorcontrib>Ahmad Khan, Raees</creatorcontrib><title>Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique</title><title>Computers, materials & continua</title><description>The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solution-independent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.</description><subject>Fuzzy sets</subject><subject>Linguistics</subject><subject>Security</subject><subject>Usability</subject><subject>User experience</subject><subject>Websites</subject><issn>1546-2226</issn><issn>1546-2218</issn><issn>1546-2226</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpNkE1PAjEQhhujiYjePTbxvDjTL-hRCYgJiQfAa9PtdmEJsNh2D_DrreLB08wkz8ybeQh5RBhwpkA8u70bMGBsAAyV4Fekh1KogjGmrv_1t-Quxi0AV1xDj3xOYmr2NjWHNV1FW-58sfCuC0060eUmtN16Q2c-NskeEp125_OJzjPbNXnN0aUPe7rwKdJXG32VZ7c5NF-dvyc3td1F__BX-2Q1nSzHs2L-8fY-fpkXjiNPha4ZgpAWNY6q2kqFJQDKWkqGlahHQgPaSvsSsRRSeoYe9FC4qqrKkvOa98nT5e4xtDk2JrNtu3DIkYZJDUOmFVOZggvlQhtj8LU5hvx0OBkE82vPZHvmx5652OPfeWBirQ</recordid><startdate>2022</startdate><enddate>2022</enddate><creator>Attaallah, Abdulaziz</creator><creator>Ahmad Khan, Raees</creator><general>Tech Science Press</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SR</scope><scope>7T9</scope><scope>8BQ</scope><scope>8FD</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>CCPQU</scope><scope>COVID</scope><scope>DWQXO</scope><scope>JG9</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>2022</creationdate><title>Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique</title><author>Attaallah, Abdulaziz ; Ahmad Khan, Raees</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c313t-9f21045a1918dfa561b0015f5521d4f84901ad9eb11b455e21e0974cdddbb33f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Fuzzy sets</topic><topic>Linguistics</topic><topic>Security</topic><topic>Usability</topic><topic>User experience</topic><topic>Websites</topic><toplevel>online_resources</toplevel><creatorcontrib>Attaallah, Abdulaziz</creatorcontrib><creatorcontrib>Ahmad Khan, Raees</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Engineered Materials Abstracts</collection><collection>Linguistics and Language Behavior Abstracts (LLBA)</collection><collection>METADEX</collection><collection>Technology Research Database</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>ProQuest Central Korea</collection><collection>Materials Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Computers, materials & continua</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Attaallah, Abdulaziz</au><au>Ahmad Khan, Raees</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique</atitle><jtitle>Computers, materials & continua</jtitle><date>2022</date><risdate>2022</risdate><volume>70</volume><issue>3</issue><spage>5683</spage><epage>5705</epage><pages>5683-5705</pages><issn>1546-2226</issn><issn>1546-2218</issn><eissn>1546-2226</eissn><abstract>The apparent contradiction between usability and security has been discussed in the literature for several years. This continuous trade-off requires be acknowledging and handling whenever security solutions are introduced. However, some progressive analysts point out that present security solutions are usually very difficult for several users, and they have expressed a willingness to simplify the security product user experience. Usable security is still mostly unexplored territory in computer science. Which we are all aware with security and usability on many levels, usable security has received little operational attention. Companies have recently focused primarily on usable security. As consumers prefer to discard unsatisfactory solutions, attaining well-balanced degrees of both is a prerequisite for adequate security. Usability should be examined from the viewpoint of security to be properly assessed. The aim of this research study is to explore and discuss universally accepted and solution-independent factors influencing the perceived usable-security of institutional websites. An integrated Hesitant Fuzzy Linguistic term sets based technique was chosen as the methodology, and the experts and academicians opinion were collected. The use of predetermined selection criteria resulted in the compilation of statistical findings and were used to determine the usable-security of five different instituational websites.</abstract><cop>Henderson</cop><pub>Tech Science Press</pub><doi>10.32604/cmc.2022.021643</doi><tpages>23</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1546-2226 |
ispartof | Computers, materials & continua, 2022, Vol.70 (3), p.5683-5705 |
issn | 1546-2226 1546-2218 1546-2226 |
language | eng |
recordid | cdi_proquest_journals_2590729626 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Fuzzy sets Linguistics Security Usability User experience Websites |
title | Estimating Usable-Security Through Hesitant Fuzzy Linguistic Term Sets Based Technique |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T01%3A18%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Estimating%20Usable-Security%20Through%20Hesitant%20Fuzzy%20Linguistic%20Term%20Sets%20Based%20Technique&rft.jtitle=Computers,%20materials%20&%20continua&rft.au=Attaallah,%20Abdulaziz&rft.date=2022&rft.volume=70&rft.issue=3&rft.spage=5683&rft.epage=5705&rft.pages=5683-5705&rft.issn=1546-2226&rft.eissn=1546-2226&rft_id=info:doi/10.32604/cmc.2022.021643&rft_dat=%3Cproquest_cross%3E2590729626%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2590729626&rft_id=info:pmid/&rfr_iscdi=true |