ABSTRACT

This chapter discusses the most representative usability inspection methods currently used in the human–computer interaction landscape. As a matter of fact, it was very beneficial in researching usable security related to a broader spectrum of security mechanisms; firstly, because of the referred to lack of user authentication guidelines, and to understand what these security mechanisms are, how they work, and verify if any of these guidelines could be used and adapted for user authentication. Engineering models for human performance allow some aspects of user interface design to be evaluated analytically for usability by making usability predictions based on an analysis of the user’s task in conjunction with principles and parameters of human performance. Advances in technology have been significantly increasing the demands on the cognitive skills of workers, whereas the human system has remained moderately stable. The analyst can express in a Goals, Operators, Methods, Selections rules model how the user can accomplish these goals with the system being designed.