Beverly Amunga Onyimbo

Work place: School of Computing and Technology, Asia Pacific University of Technology & Innovation (APU), Bukit Jalil, 57000, Kuala Lumpur, Malaysia

E-mail: beverlyamunga@gmail.com

Website:

Research Interests: Human-Computer Interaction, Computer systems and computational processes, Artificial Intelligence, Computer Networks, Mathematics of Computing, Models of Computation

Biography

Beverly Amunga Onyimbo awarded Bachelor Degree from Kabarak University, Kenya in 2012. Currently, she is pursuing her M.Sc. Degree in Software Engineering at Asia Pacific of Technology and Innovation under Staffordshire University franchised program. Her research interests include User Experience and User Interface (UX & UI) Design, Human-Computer Interaction, Computer Communication Networks, Artificial Intelligence, Internet of things and Information Security.

Author Articles
Usability Evaluation Criteria for Internet of Things

By Michael Onuoha Thomas Beverly Amunga Onyimbo Rajasvaran Logeswaran

DOI: https://doi.org/10.5815/ijitcs.2016.12.02, Pub. Date: 8 Dec. 2016

The field of usability, user experience (UX) design and human-computer interaction (HCI) arose in the realm of desktop computers and applications. The current experience in computing has radically evolved into ubiquitous computing over the preceding years. Interactions these days take place on different devices: mobile phones, e-readers and smart TVs, amid numerous smart devices. The use of one service across multiple devices is, at present, common with different form factors. Academic researchers are still trying to figure out the best design techniques for new devices and experiences. The Internet of Things (IoT) is growing, with an ever wider range of daily objects acquiring connectivity, sensing ability and increased computing power. Designing for IoT raises a lot of challenges; the obvious difference being the much wider variety of device form factors. IoT is still a technically driven field, thus the usability of many of IoT products is, in some way, of the level anticipated of mature consumer products. This study focuses on proposing a usability evaluation criterion for the generic IoT architecture and essential technological components.

[...] Read more.
Usability and Security in User Interface Design: A Systematic Literature Review

By Ugochi Oluwatosin Nwokedi Beverly Amunga Onyimbo Babak Bashari Rad

DOI: https://doi.org/10.5815/ijitcs.2016.05.08, Pub. Date: 8 May 2016

Systems carry sensitive data where users are involved. There is need for security concern for the modern software applications. We can term them as 'untrusted clients'. Internet usage has rapidly grown over the years and, more users are opening their information system to their clientele, it is essential to understand users' data that need protecting and to control system access as well and the rights of users of the system. Because of today's increasingly nomadic lifestyle, where they allow users to connect to information systems from anywhere with all the devices in the market, the users need to carry part of the information system out of the secure infrastructure. Insecurity in user interfaces is caused by user ignoring functionalities in the system where some are not only a threat but can harm the system e.g. leaving network services active even though the user does not need them, or when a user is having little or no information of the available security measures. This research paper aims critically address through a review of existing literature, the importance of balance or trade-off between usability and the security of the system. Systematic review method involved a physical exploration of some conference proceedings and journals to conduct the literature review. Research questions relating to usability and security were asked and the criteria for usability and security evaluations were identified. This systematic literature review is valuable in closing the gap between usability and security in software development process, where usability and security engineering needs to be considered for a better quality end-user software.

[...] Read more.
Other Articles