18 research outputs found

    Usability Challenges in Smartphone Web Access: A Systematic Literature Review

    Get PDF
    Part 8: International Workshop on Information Engineering and ManagementInternational audienceSystematic literature reviews facilitate methodical understanding of current advances in a field. With the increasing popularity of smartphones, they have become an important means to access the web. Although the literature on this topic is growing in recent times, there has been no effort yet to systematically review it. This paper reports on a systematic literature review of primary studies from 2007 to 2012 that concern mobile web usability. We identify the usability dimensions tested and the testing procedures adopted in the literature. We anticipate that our work will not only help researchers understand the current state of usability testing of mobile web but also identify the areas where further research is needed in addressing the challenges identified

    Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs

    No full text
    Modern nuclear power plants (NPPs) use a variety of digital technologies, with new technologies such as wireless sensor networks also under active consideration. Consequently, like other critical infrastructure at increasing risk of cyber-attacks, cyber security for NPPs has become an issue of growing concern. The development of cyber-attack scenarios is therefore a crucial part of cyber security plans for NPPs. However, regulatory guidelines for NPPs only mention the necessity for cyber-attack scenarios, their application methods, and simple examples, without outlining any systematic method to actually develop comprehensive cyber-attack scenarios. This paper proposes a method for developing NPP cyber-attack scenarios that reflect the inherent characteristics and architecture of NPPs using scenario graphs, a type of attack model. Further, the process of modeling scenario graphs using the proposed method and a process for developing new attack scenarios by combining several scenario graphs are discussed. In the scenario graphs, large and complicated system structures are conceptually divided, facilitating identification of components of cyber-attacks. Attack scenarios developed using these scenario graphs can be used extensively to develop design basis threats (DBTs), risk assessments, and penetration tests. Thus, they are important for establishing cyber security plans and programs
    corecore