Verizon: 2022 Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/dbir/. Accessed 10 July 2022
Nielsen, J.: Usability 101: Introduction to Usability (2012). https://www.nngroup.com/articles/usability-101-introduction-to-usability/
Nielsen, J.: Usability Engineering. Morgan Kaufmann (1993)
Google Scholar
Quesenbery, W.: Using the 5Es to Understand Users - Whitney Interactive Design. WQusability - Whitney Quesenbery (n.d.). https://www.wqusability.com/articles/getting-started.html. Accessed 15 Feb 2022
ISO. Ergonomics of human-system interaction—Part 11: Usability: Definitions and concepts (2018). https://www.iso.org/obp/ui/#iso:std:iso:9241:-11:ed-2:v1:en
Abran, A., Khelifi, A., Suryn, W., Seffah, A.: Usability meanings and interpretations in ISO standards. Softw. Qual. J. 11(4), 325–338 (2003)
Article
Google Scholar
Bevan, N., Macleod, M.: Usability measurement in context. Behav. Inf. Technol. 13(1–2), 132–145 (1994)
Article
Google Scholar
Bevan, N., Kirakowskib, J., Maissela, J.: What is usability. In: Proceedings of the 4th International Conference on HCI. Citeseer (1991)
Google Scholar
Constantine, L.L., Lockwood, L.A.: Software for Use: A Practical Guide to the Models and Methods of Usage-Centered Design. Pearson Education (1999)
Google Scholar
Eason, K.D.: Information Technology and Organizational Change. CRC Press (1989)
Google Scholar
European Commission. Usability. Internal Market, Industry, Entrepreneurship and SMEs. https://ec.europa.eu/growth/sectors/tourism/business-portal/usability_en. Accessed 17 Feb 2022
Edwards, M.: Exploring Human-Computer Interaction. HP (2018). https://www.hp.com/us-en/shop/tech-takes/exploring-human-computer-interaction. Accessed 15 Feb 2022
Gould, J.D., Lewis, C.: Designing for usability: key principles and what designers think. Commun. ACM 28(3), 300–311 (1985)
Article
Google Scholar
HHS and GSA: The Research-Based Web Design & Usability Guidelines, Enlarged/Expanded edition. U.S. Government Printing Office. https://www.usability.gov/what-and-why/usability-evaluation.html. Accessed 31 Jan 2022
Holzinger, A.: Usability engineering methods for software developers. Commun. ACM 48(1), 71–74 (2005)
Article
Google Scholar
IBM. User Experience. Usability (2008). https://www-03.ibm.com/services/ca/en/mobility/offerings_userexperience_usability.html#:~:text=Usability%20is%20the%20discipline%20of,error%20tolerant%2C%20and%20subjectively%20pleasing. Accessed 15 Feb 2022
IEEE. IEEE Standard Glossary of Software Engineering Terminology (1990). https://ieeexplore.ieee.org/document/159342/definitions#definitions. Accessed 27 Feb 2022
IEEE. Usability and Accessibility (2022). https://brand-experience.ieee.org/guidelines/digital/style-guide/usability-and-accessibility/. Accessed 27 Feb 2022
Interaction Design Foundation. Usability (2022). https://www.interaction-design.org/literature/topics/usability#:~:text=Usability%20is%20a%20measure%20of,deliverable%E2%80%94to%20ensure%20maximum%20usability. Accessed 27 Feb 2022
HFES. Human Readiness Level Scale in the System Development Process (2021)
Google Scholar
ANSI. Ergonomics of Human-System Interaction - Part 11: Usability: Definitions and Concepts (2022). https://webstore.ansi.org/standards/iso/iso9241112018?_ga=2.3299568.111955288.1644355252-1926938011.1644355252. Accessed 20 Feb 2022
BSI, Ergonomics of human-system interaction - Usability: Definitions and concepts. https://shop.bsigroup.com/products/ergonomics-of-human-system-interaction-usability-definitions-and-concepts/tracked-changes. Accessed 20 Feb 2022
Jordan, P.W., Thomas, B., McClelland, I.L., Weerdmeester, B.: Usability Evaluation in Industry. CRC Press (1996)
Google Scholar
IEC. Usability (2018). https://www.electropedia.org/iev/iev.nsf/display?openform&ievref=871-01-08. Accessed 15 Feb 2022
Krug, S.: Don’t Make Me Think!: A Common Sense Approach to Web Usability. Pearson Education India (2000)
Google Scholar
Microsoft, Usability in Software Design (2019). https://docs.microsoft.com/en-us/windows/win32/appuistart/usability-in-software-design#defining-usability. Accessed 11 Feb 2022
Preece, J.: A Guide to Usability: Human Factors in Computing. Addison-Wesley Longman Publishing Co., Inc. (1993)
Google Scholar
Schumacher, R.M., Lowry, S.Z., Schumacher, R.M.: NIST guide to the processes approach for improving the usability of electronic health records. US Department of Commerce, National Institute of Standards and Technology (2010)
Google Scholar
Shackel, B.: Usability-context, framework, definition, design and evaluation. Interact. Comput. 21, 339–346 (2009)
Article
Google Scholar
Sharp, H., Rogers, Y., Preece, J.: Interaction design: beyond human-computer interaction (2019)
Google Scholar
Shneiderman, B., Plaisant, C.: Designing the User Interface: Strategies for Effective Human-Computer Interaction. Pearson Education India (2010)
Google Scholar
Usability Professionals Association (2010). What is Usability? https://www.usabilitybok.org/what-is-usability. Accessed 15 Feb 2022
Usability.gov. Glossary: Usability. https://www.usability.gov/what-and-why/glossary/u/index.html. Accessed 15 Feb 2022
Weichbroth, P.: Usability of mobile applications: a systematic literature study. IEEE Access 8, 55563–55577 (2020)
Article
Google Scholar
Davies, J.: Word Cloud Generator. https://www.jasondavies.com/wordcloud/. Accessed 25 May 2022
Caputo, D., Pfleeger, S., Sasse, M., Ammann, P., Offutt, J., Deng, L.: Barriers to usable security? Three organizational case studies. IEEE Secur. Priv. 14, 22–32 (2016)
Article
Google Scholar
Zurko, M., Simon, R.: User-centered security. In: Proceedings of the 1996 Workshop on New Security Paradigms (1996)
Google Scholar
Theofanos, M.: Is usable security an oxymoron? IEEE Comput. 53(2), 71–74 (2020)
Article
Google Scholar
Johnston, J., Eloff, J.H., Labuschagne, L.: Security and human computer interfaces. Comput. Secur. 22(8), 675–684 (2003)
Article
Google Scholar
Saltzer, J., Schroeder, M.: A proteção de informação em sistemas de computador. Proc. IEEE 63(9), 1278–1308 (1975)
Article
Google Scholar
Whitten, A., Tygar, J.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium (1999)
Google Scholar
Hof, H.-J.: User-centric IT security-how to design usable security mechanisms. arXiv preprint arXiv:1506.07167 (2015)
Nurse, J., Creese, S., Goldsmith, M., Lamberts, K.: Guidelines for usable cybersecurity: past and present. In: Third International Workshop on Cyberspace Safety and Security (CSS) (2011)
Google Scholar
Yee, K.-P.: User interaction design for secure systems. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 278–290. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36159-6_24
Chapter
Google Scholar
Mahfuth, A., Yussof, S., Baker, A., Ali, N.: A systematic literature review: Information security culture. In: 2017 International Conference on Research and Innovation in Information Systems (ICRIIS). IEEE (2017)
Google Scholar
AlHogail, A., Mirza, A.: Information security culture: a definition and a literature review. In: 2014 World Congress on Computer Applications and Information Systems (WCCAIS). IEEE (2014)
Google Scholar
Da Veiga, A., Astakhova, L., Botha, A., Herselman, M.: Defining organisational information security culture—perspectives from academia and industry. Comput. Secur. (2020)
Google Scholar
Uchendu, B., Nurse, J., Bada, M., Furnell, S.: Developing a cyber security culture: current practices and future needs. Comput. Secur. 109, 102387 (2021)
Article
Google Scholar
Bada, M.: Stakeholder Analysis: Motives, Needs, and Drivers for Cybersecurity Awareness Training in Modern Work Environments, in AwareGO (2022)
Google Scholar
Chen, Y., Ramamurthy, K., Wen, K.-W.: Impacts of comprehensive information security programs on information security culture. J. Comput. Inf. Syst. 55(3), 11–19 (2015)
Google Scholar
Furnell, S., Rajendran, A.: Understanding the influences on information security behaviour. Comput. Fraud Secur. 12–15 (2012)
Google Scholar
Padayachee, K.: Taxonomy of compliant information security behavior. Comput. Secur. 673–680 (2012)
Google Scholar
Hassan, N., Ismail, Z.: A conceptual model for investigating factors influencing information security culture in healthcare environment. Procedia-Soc. Behav. Sci. 1007–1012 (2012)
Google Scholar