The Heuristic Evaluation Methodology of the Smartphone Operating System on the User preferences and Satisfaction of the Security System
Authors: Ryang-Hee Kim, Young-Guk Kwon
Abstract: The aim of this study is to study the smartphone operating system on the user preferences and satisfactions using selected heuristic usability method. In the security operating systems, the first layer of security within a smartphone is at the level of the operating system. Beyond the usual roles of the security operating system on a smartphone, it must also establish the protocols for introducing external applications and data without introducing risk. The security operating system contains important incidents which have greatly influenced development of smartphone security and of their importance today. There has been a leaking of personal information from a major portal site by the hackers. The selected usability principles are classified systematically using paired t-test (two aged groups) selected by Duncan’s Multiple Range Test and Principle Components Analysis (PCA) using Factor Analysis. The results are as follows: 25 usability principles for the operating system on the user preferences and satisfaction of the security system are categorized into four groups. According to their correlations and we named them respectively, users' preference and awareness of smartphone security operating system were significantly statistical different between Adolescence group and Senior-age group (***p< .001).
Keywords: Heuristic Evaluation, Smartphone Security, Human-Smartphone Interaction, Security Awareness, Aging Ergonomics
Cite this paper: