Development of a Model for Security and Usability

Zapata Aspiazu, Laura (2013). Development of a Model for Security and Usability. Thesis (Master thesis), Facultad de Informática (UPM).


Title: Development of a Model for Security and Usability
  • Zapata Aspiazu, Laura
  • Moreno, Ana Maria
Item Type: Thesis (Master thesis)
Date: 15 July 2013
Freetext Keywords: Usability, Security, Authentication, Authorization, User Efficiency, Login Time, Access Time, Systematic Mapping, Usability Model.
Faculty: Facultad de Informática (UPM)
Department: Lenguajes y Sistemas Informáticos e Ingeniería del Software
Creative Commons Licenses: Recognition - Non commercial

Full text

PDF (Development of a Model for Security and Usability) - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (1MB) | Preview


This research addressed the development of a consolidated model designed especially to cover the security and usability attributes of a software product. As a starting point, we built a new usability model on the basis of well-known quality standards and models. We then used an existing security model to analyse the relationship between these two approaches. This analysis consisted of a systematic mapping study of the relationship between security and usability as global quality factors. We identified five relationship types: inverse, direct, relative, one-way inverse, and no relationship. Most authors agree that there is an inverse relationship between security and usability. However, this is not a unanimous finding, and this study unveils a number of open questions, like application domain dependency and the need to explore lower-level relationships between attribute subcharacteristics. In order to clarify the questions raised during the research, we conducted a second systematic mapping to further analyse the finer-grained structure of these factors, such as authentication as a subset of security and user efficiency as a subset of usability. The most relevant finding is that efficiency does not depend on the security level during the authentication process. There are other subfactors that require analysis. Accordingly, this research is the first part of a larger project to develop a full-blown consolidated model for security and usability.

More information

Item ID: 23251
DC Identifier:
OAI Identifier:
Deposited by: Laura Zapata Aspiazu
Deposited on: 27 Mar 2014 09:31
Last Modified: 04 Sep 2020 14:52
  • Logo InvestigaM (UPM)
  • Logo GEOUP4
  • Logo Open Access
  • Open Access
  • Logo Sherpa/Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Logo Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Logo de Recolecta
  • Logo del Observatorio I+D+i UPM
  • Logo de OpenCourseWare UPM