{"title":"Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain","authors":"Neyire Deniz Sarier","doi":"10.1016/j.csi.2024.103916","DOIUrl":"10.1016/j.csi.2024.103916","url":null,"abstract":"<div><p>In García-Rodríguez et al. 2024, two generic constructions for biometric-based non-transferable Attribute Based Credentials (biometric ABC) are presented, which offer different trade-offs between efficiency and trust assumptions. In this paper, we focus on the second scheme denoted as BioABC-ZK that tries to remove the strong (and unrealistic) trust assumption on the Reader R, and we show that BioABC-ZK has a security flaw for a colluding R and Verifier V. Besides, BioABC-ZK lacks GDPR-compliance, which requires secure processing of biometrics, for instance in form of Fuzzy Extractors, as opposed to (<span><math><mi>i</mi></math></span>) storing the reference biometric template <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>B</mi><mi>i</mi><mi>o</mi></mrow></msub></math></span> in the user’s mobile phone and (<span><math><mrow><mi>i</mi><mi>i</mi></mrow></math></span>) processing of biometrics using an external untrusted R, whose foreign manufacturers are unlikely to adjust their products according to GDPR.</p><p>The contributions of this paper are threefold. First, we review efficient biometric ABC schemes to identify the privacy-by-design criteria for them. In view of these principles, we propose a new architecture for <em>biometric ABC</em> of Sarier 2021 by adapting the recently introduced <em>core/helper setting</em>. Briefly, a user in our modified setting is composed of a constrained core device (a SIM card) inside a helper device (a smart phone with dual SIM and face recognition feature), which – as opposed to García-Rodríguez et al. 2024 – does not need to store <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>B</mi><mi>i</mi><mi>o</mi></mrow></msub></math></span>. This way, the new design provides <em>Identity Privacy</em> without the need for an external R and/or a dedicated hardware per user such as a biometric smart card reader or a tamper proof smart card as in current hardware-bound credential systems. Besides, the new system maintains minimal hardware requirements on the SIM card – only responsible for storing ABC and helper data –, which results in easy adoption and usability without loosing efficiency, if deep face fuzzy vault and our modified ABC scheme are employed together. As a result, a total overhead of 500 ms to a showing of a comparable non-biometric ABC is obtained instead of the 2.1 s in García-Rodríguez et al. 2024 apart from the removal of computationally expensive pairings. Finally, as different from García-Rodríguez et al. 2024, auditing is achieved via Blockchain instead of proving in zero-knowledge the actual biometric matching by the user to reveal malicious behavior of R and V.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103916"},"PeriodicalIF":4.1,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141979792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Juanjo Pérez-Sánchez , Saima Rafi , Juan Manuel Carrillo de Gea , Joaquín Nicolás Ros , José Luis Fernández Alemán
{"title":"A theory on human factors in DevOps adoption","authors":"Juanjo Pérez-Sánchez , Saima Rafi , Juan Manuel Carrillo de Gea , Joaquín Nicolás Ros , José Luis Fernández Alemán","doi":"10.1016/j.csi.2024.103907","DOIUrl":"10.1016/j.csi.2024.103907","url":null,"abstract":"<div><h3>Context:</h3><p>DevOps is a software engineering paradigm that enables faster deliveries and higher quality products. However, DevOps adoption is a complex process that is still insufficiently supported by research. In addition, human factors are the main difficulty for a successful DevOps adoption, although very few studies address this topic.</p></div><div><h3>Objective:</h3><p>This paper addresses two research gaps identified in literature, namely: (1) the characterization of DevOps from the perspective of human factors, i.e. the description of DevOps’ human characteristics to better define it, and (2) the identification and analysis of human factors’ effect in the adoption of DevOps.</p></div><div><h3>Method:</h3><p>We employed a hybrid methodology that included a Systematic Mapping Study followed by the application of a clustering technique. A questionnaire for DevOps practitioners (<span><math><mrow><mi>n</mi><mo>=</mo><mn>15</mn></mrow></math></span>) was employed as an evaluation method.</p></div><div><h3>Results:</h3><p>A total of 59 human factors related to DevOps were identified, described, and synthesized. The results were used to build a theory on DevOps human factors.</p></div><div><h3>Conclusion:</h3><p>The main contribution of this paper is a theory proposal regarding human factors in DevOps adoption. The evaluation results show that almost every human factor identified in the mapping study was found relevant in DevOps adoption. The results of the study represent an extension of DevOps characterization and a first approximation to human factors in DevOps adoption.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103907"},"PeriodicalIF":4.1,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S092054892400076X/pdfft?md5=8a197a8035fc3bc559533baac7028e12&pid=1-s2.0-S092054892400076X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping","authors":"Álvaro Domingo Reguero , Silverio Martínez-Fernández , Roberto Verdecchia","doi":"10.1016/j.csi.2024.103906","DOIUrl":"10.1016/j.csi.2024.103906","url":null,"abstract":"<div><h3>Background:</h3><p>In the last years, neural networks have been massively adopted by industry and research in a wide variety of contexts. Neural network milestones are generally reached by scaling up computation, completely disregarding the carbon footprint required for the associated computations. This trend has become unsustainable given the ever-growing use of deep learning, and could cause irreversible damage to the environment of our planet if it is not addressed soon.</p></div><div><h3>Objective:</h3><p>In this study, we aim to analyze not only the effects of different energy saving methods for neural networks but also the effects of the moment of intervention, and what makes certain moments optimal.</p></div><div><h3>Method:</h3><p>We developed a novel dataset by training convolutional neural networks in 12 different computer vision datasets and applying runtime decisions regarding layer freezing, model quantization and early stopping at different epochs in each run. We then fit an auto-regressive prediction model on the data collected capable to predict the accuracy and energy consumption achieved on future epochs for different methods. The predictions on accuracy and energy are used to estimate the optimal training path.</p></div><div><h3>Results:</h3><p>Following the predictions of the model can save 56.5% of energy consumed while also increasing validation accuracy by 2.38% by avoiding overfitting.The prediction model developed can predict the validation accuracy with a 8.4% of error, the energy consumed with a 14.3% of error and the trade-off between both with a 8.9% of error.</p></div><div><h3>Conclusions:</h3><p>This prediction model could potentially be used by the training algorithm to decide which methods apply to the model and at what moment in order to maximize the accuracy-energy trade-off.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103906"},"PeriodicalIF":4.1,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000758/pdfft?md5=9fe0b023bddfc875c825b0c53e63af06&pid=1-s2.0-S0920548924000758-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manal Kharbouch , Aurora Vizcaino , José Alberto García-Berná , Félix García , Ambrosio Toval , Oscar Pedreira , Ali Idri , José Luis Fernández-Alemán
{"title":"Uncharted dimensions, gaps, and future trends of serious games in software engineering","authors":"Manal Kharbouch , Aurora Vizcaino , José Alberto García-Berná , Félix García , Ambrosio Toval , Oscar Pedreira , Ali Idri , José Luis Fernández-Alemán","doi":"10.1016/j.csi.2024.103915","DOIUrl":"10.1016/j.csi.2024.103915","url":null,"abstract":"<div><h3>Objective</h3><p>Serious Games (SG) are a rising trend in Software Engineering (SE) education, for this reason, and since this topic is still immature and further research was encouraged, it is important to investigate how SGs are integrated into SE education. In this line, this study explores the landscape of SGs in SE) education, focusing on their categorization according to their addressed SWEBOK areas and Bloom's levels, extracted their key elements, mechanics and dynamics, exploring in depth their most portrayed player profiles, finding what makes them successful SGs in this field, and last addressing their resulting challenges in the realm of SE education.</p></div><div><h3>Methodology</h3><p>A systematic search was conducted across prominent databases: Science Direct, IEEE Xplore, ACM, Scopus, and Wiley. Initially, 125 papers met our initial inclusion criteria, from which 46 remained after rigorous full-text review. Utilizing snowball sampling, we added 28 additional studies, resulting in a total of 74 selected papers for comprehensive analysis.</p></div><div><h3>Results</h3><p>Among the selected papers, which spanned from the early 2000s to May 2021, a notable increase in publications on SGs in SE was observed, particularly since 2010. The majority of these studies focused on validation research (60 %), followed by solution proposals (17.56 %) and evaluation research (13.51 %). Publication channels predominantly included conferences (79.73 %), underscoring the emerging nature of SGs in SE research, with a smaller proportion appearing in journal articles (20.27 %). Specific focus areas within SE, such as Software Engineering Management (33.78 %) and SE Professional Practice (13.51 %), received significant attention, while others, like SE Models and Methods, showed minimal representation. Furthermore, SGs were found to effectively target higher-order cognitive skills based on Bloom's Taxonomy, with notable implementations of game dynamics such as Teams and Realism to enhance learning experiences. Despite these advancements, there remains a predominant focus on player profiles like Achievers (48.64 %) and Players (47.30 %), suggesting potential gaps in addressing a broader spectrum of learner types within SGs designed for SE education.</p></div><div><h3>Conclusion</h3><p>This study underscores the evolving role of SGs in SE education, emphasizing the need for diverse approaches to enhance engagement and educational outcomes. Future research should focus on optimizing SG potential across educational and industrial settings by expanding publication visibility, integrating artificial intelligence (AI), and conducting comprehensive evaluations of SGs tailored to SE contexts.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103915"},"PeriodicalIF":4.1,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000849/pdfft?md5=aabc12b8df17cadc4147fd2af50e915d&pid=1-s2.0-S0920548924000849-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142122606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Renat Faizrakhmanov , Mohammad Reza Bahrami , Alexey Platunov
{"title":"Prototype, method, and experiment for evaluating usability of smart home user interfaces","authors":"Renat Faizrakhmanov , Mohammad Reza Bahrami , Alexey Platunov","doi":"10.1016/j.csi.2024.103903","DOIUrl":"10.1016/j.csi.2024.103903","url":null,"abstract":"<div><p>Despite the widespread adoption of smart devices and home automation systems, users still face usability challenges. Additionally, evaluating the usability of smart home systems is not straightforward. Our paper focuses on building a Smart Home Prototype, selecting, and evaluating software User Interfaces (UI). We have chosen the smart home heating system as the basis, but the principles are applicable to other applications. To discuss smart home UIs, it is necessary to understand the components, implementation scenarios, configuration, and operation of smart home systems. Therefore, we devote considerable attention to these topics in the paper. Our smart home system utilizes a Raspberry Pi computer, temperature sensors, servo drives, an Android-based smartphone, and other necessary hardware. We installed and configured open-source software and third-party services on the experimental setup. We provided a brief description of each selected software. We used the Home Assistant operating system, its mobile application, voice assistant Alice, and Telegram chatbot. In our study, we described a methodology for evaluating user interfaces in smart homes and conducted an experiment to assess their usability. The experiment results indicated which interface was more user-friendly and identified the drawbacks of each. In conclusion, we discuss UI features that can improve usability and available options for building a smart home based on capabilities.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103903"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141991092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the construction and mapping model of knowledge organization system driven by standards","authors":"Jingshu Yuan, Kexin Zhai, Hongxin Li, Man Yuan","doi":"10.1016/j.csi.2024.103905","DOIUrl":"10.1016/j.csi.2024.103905","url":null,"abstract":"<div><p>With the rapid development of artificial intelligence and enterprise digital transformation, the standardization organization, storage and management of semantic knowledge in computers have become the current research focus. As the core theory of knowledge system construction, knowledge organization (KO) provides theoretical support for the study of semantic knowledge organization and representation, among which knowledge organization system (KOS) is the important tool of semantic organization. At present, many scholars have carried out research from different perspectives of KOS based on theory, which provides the direction for the sustainable development of KOS. However, most of these studies focus on some aspects of KOS, which are in a \"scattered\" state, lacking systematic analysis of the basic principles of KOS construction and semantic organization based on theories and international standards. Therefore, this paper firstly constructs KOS theoretical models in the conceptual world and computer world respectively through a comprehensive study of multi-disciplinary basic theories such as semantics, logic, system theory, and international standards such as ISO 1087:2019, ISO 25964:2013, and ISO 11179:2023, and traces the iterative construction, organization and mapping process from \"concept\" in the conceptual world to \"metadata\" knowledge and semantics in the computer world. The semantic organization based on metadata is realized in computer. Secondly, on this basis, in order to realize ontology representation of domain knowledge, the ontology construction method based on MDR metadata is proposed. Finally, taking the semantic organization and ontology construction of Epicentre model in petroleum field as an example, the feasibility of the ideas and methods proposed in this paper is verified. The model and method proposed in this paper is independent of the specific type of KOS, so it is innovative and universal. The methodology is also applicable to other fields of conceptual system modeling, metadata standard construction, and data model modeling.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103905"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lattice-based strong designated verifier signature with non-delegatability","authors":"Yanhua Zhang , Willy Susilo , Fuchun Guo","doi":"10.1016/j.csi.2024.103904","DOIUrl":"10.1016/j.csi.2024.103904","url":null,"abstract":"<div><p>Strong designated verifier signature (SDVS) is a special type of digital signatures which provides authentication of a message without providing non-repudiation property. More specifically, SDVS can enable that it is impossible for any entity, other than the designated verifier, to recognize the validity of a given signature. Although there have been several proposals of lattice-based SDVS schemes since the first non-quantum resistant scheme proposed by Jakobsson et al. at EUROCRYPT 1996, all the existing lattice-based ones cannot achieve a security notion called non-delegatablity (ND), which was an essential property introduced by Lipmaa et al. at ICALP 2005 when considering an SDVS in scenarios where the responsibility of the signer is important and the signing rights cannot be delegated to another entity. Therefore, in this work, we provide the first lattice-based SDVS scheme that offers non-delegatablity (i.e., neither the signer nor the designated verifier can delegate the signing rights to other entities without the revealment of their corresponding private keys), and thus, resolve a prominent open problem posed by previous works. Moreover, we achieve this non-trivial feat in a relatively simple manner. Starting with Lyubashevsky’s lattice signatures without trapdoors at EUROCRYPT 2012 - which is arguably the first practical alternative method in general lattices for designing digital signatures not adopting the “hash-and-sign” methodology, we introduce simple-but-insightful tweaks allowing to upgrade it directly into an SDVS with non-delegatablity. The scheme satisfies the strong security requirements of Lipmaa et al.’s model and is proven secure in the random oracle model under the short integer solution (SIS) and the learning with errors (LWE) assumptions.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103904"},"PeriodicalIF":4.1,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A consent-aware electronic medical records sharing method based on blockchain","authors":"Xiao Qu , Zhexuan Yang , Zeng Chen , Guozi Sun","doi":"10.1016/j.csi.2024.103902","DOIUrl":"10.1016/j.csi.2024.103902","url":null,"abstract":"<div><p>Electronic medical records (EMRs) sharing has become a vital component of the modern health care system, which involves patients, The Medical Institution with Medical Records (MI-MR), and The Medical Institution Requiring Medical Records (MI-RMR) within this ecosystem. Currently, a substantial amount of research focuses on the security, authenticity, and privacy of the shared information. However, there is a shortage of attention on design and research that adequately reflect personal rights and interests of patients. We propose a consent-aware EMR sharing method leveraging blockchain technology, which not only preserves patients’ right to be informed, but also fulfills the fundamental needs for security and privacy in EMR sharing. Furthermore, it ensures transparency and decentralization in the sharing process and incorporates on-chain verification mechanisms against malicious alteration of blockchain data. To enhance system scalability, a secure off-chain storage mechanism has been implemented. Our experimental findings underscore the practicality of our smart contract on Ethereum, along with its economic benefits, evaluated using tests conducted on a Ganache-based Ethereum blockchain network and a Remix-based Ethereum blockchain network. The performance and advantages of the proposed architecture have been corroborated through a prototype implementation using Ethereum.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103902"},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Encrypted data inner product KNN secure query based on BALL-PB tree","authors":"Huijie Liu, Jinsheng Xing","doi":"10.1016/j.csi.2024.103901","DOIUrl":"10.1016/j.csi.2024.103901","url":null,"abstract":"<div><p>With the increased data volume, data query service outsourcing to cloud servers is widely used. However, enabling authorized users to access confidential data is critical when conducting queries on untrusted cloud servers. To this end, an inner-product k-nearest neighbor (KNN) query scheme with access control (IPKNN_AC) is proposed under privacy protection. Firstly, this scheme utilizes the designed Ball-PB tree structure to partition the dataset into multiple subsets. Considering the efficiency and confidentiality of inner-product queries on the tree, the scheme represents the internal nodes and leaf nodes accordingly and defines a secure inner-product calculation protocol, EncInp. Secondly, relying on EncInp, a query algorithm is employed to perform similarity inner-product queries on the encrypted tree representation. Finally, the scheme is shown to be secure through security proofs of homomorphic encryption. Experimental evaluation results on medical datasets demonstrate the effectiveness of the scheme.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103901"},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000709/pdfft?md5=c8c4923f65a97b115b4f3323d577d702&pid=1-s2.0-S0920548924000709-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marc Gonzalez Capdevila , Karine Aparecida Pistili Rodrigues , Tales Augusto Sartório Furlan , Toni Granollers
{"title":"Quantifying heuristic evaluation","authors":"Marc Gonzalez Capdevila , Karine Aparecida Pistili Rodrigues , Tales Augusto Sartório Furlan , Toni Granollers","doi":"10.1016/j.csi.2024.103891","DOIUrl":"10.1016/j.csi.2024.103891","url":null,"abstract":"<div><p>Since Nielsen presented his work on heuristic evaluation in the 90s, it has been seen how this inspection method has been used recurrently not only in academia but also in the industry. The benefits of their application have been studied widely and multiple heuristics for multiple purposes have been designed. Despite it, quantifying their qualitative nature has been challenging. This research presents a novel approach to provide a framework for quantifying an heuristic evaluation based on the calculus of what we called Usability Percentage. We have used an initial study that started in 2018 with 7 different evaluators and we presented a new methodology to calculate the aforementioned percentage and also provide multiple information that might be added into a final report. We have used the platform RUXAILAB that allows us to create heuristic evaluations to prepare and execute the test. Our findings are that by comparing both studies the new methodology presents a narrowed data distribution through the different evaluators and allows us to identify in a more precise and concise way which heuristics might fail in an evaluation test.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103891"},"PeriodicalIF":4.1,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}