Improving Usable-Security of Web based Healthcare Management System through Fuzzy AHP
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Security is an important concern in web application development that is getting massive consideration from academic and IT industry. In addition, due to big share in web based healthcare management system, usable-security is in much demand. However, identifying and choosing the accurate model for improving usable-security of web based healthcare management system is becoming more challenging for practitioners. Usable-security factors contribute a noteworthy role while integrating application security and application usability during development of healthcare management system. Every factor has its own significance while incorporating usable-security during development of healthcare management system. This is based upon user’s demand and sensitivity of patient information. Hence, practitioners want to know about the significance of each factor when they are developing a web application to satisfy the user’s request. Author of this article measured the usable-security of web based healthcare management system by using Fuzzy Analytic Hierarchy Process (Fuzzy AHP). Also, the impact of each factors of usable-security for web based healthcare management system has been given. This will help the practitioners to improve application usability of security while designing web based healthcare management system.
Authors and Affiliations
Nawaf Rasheed Alharbe
MR Brain Real Images Segmentation Based Modalities Fusion and Estimation Et Maximization Approach
With the development of acquisition image techniques, more data coming from different sources of image become available. Multi-modality image fusion seeks to combine information from different images to obtain more infer...
ABCVS: An Artificial Bee Colony for Generating Variable T-Way Test Sets
To achieve acceptable quality and performance of any software product, it is crucial to assess various software components in the application. There exist various software-testing techniques such as combinatorial testing...
Question Answering Systems: A Review on Present Developments, Challenges and Trends
Question Answering Systems (QAS) are becoming a model for the future of web search. In this paper we present a study of the latest research in this area. We collected publications from top conferences and journals on inf...
An Approach to Keep Credentials Secured in Grid Computing Environment for the Safety of Vital Computing Resources
Presently security attacks have aimed to vulnerabilities in repetitive-use authentication secrets like static passwords. The passwords are used by user in clients side are vulnerable, as the attackers can gain access to...
The Solution Structure and Error Estimation for The Generalized Linear Complementarity Problem
In this paper, we consider the generalized linear complementarity problem (GLCP). Firstly, we develop some equivalent reformulations of the problem under milder conditions, and then characterize the solution of the GLCP....