• List of Articles usability

      • Open Access Article

        1 - A Study on Usability Factor on the Intention and Behavior of Technology Usage in ATAUT2 in Healthcare Environments
        zhila kazemi
        Introduction: Using information and communication technology in healthcare system helps with the improvement in services quality. Hence, using it could provide great advantages for this business. The advantages of this technology reaches its top when it is implemented a More
        Introduction: Using information and communication technology in healthcare system helps with the improvement in services quality. Hence, using it could provide great advantages for this business. The advantages of this technology reaches its top when it is implemented and used successfully. One of the main stages in realization of this goal is the success in acceptance of technology by its users. Hence, identifying the effective factors in successful acceptance of information technology is a vital necessity and acceptance is one of its main factors. Accordingly, this research studies software acceptance along with unified theory of usability and use of technology (UTAUT2) in patients’ use of medical diagnosis laboratories electronic portal in 2015. Methodology: This research is an analytic-descriptive study which was carried out in a cross-sectional form in 2014. The target statistical society included the patients who used Shiraz laboratories portals, which included 170 individuals. For sampling, stratified proportional to size was used to determine the number of samples needed from each studied center and also, purposive sampling was used to select the patients using portals and filling up questionnaires in each center. Data collection tool was a 25-item questionnaire which was adopted from Venkatesh et al. (2012) and Usability Assessment questionnaire. Ultimately, the data derived from the questionnaires was analyzed using Structural Equation Modeling (SEM), with Partial Least Squares approach and SPSS ver. 20 and Smart-PLS ver.3 software. Findings: Results from this research in Shiraz medical diagnosis laboratories, showed a significant relation between variables added value (t-value=2.88), hedonic motivation (t-value=3.88), habit (t-value=2.22) and usability structure (t-value=5.61) with the structure of intention to use and structures of usability (t-value=3.97) and intention to use (t-value=1.91) with usage behavior. Conclusion: Considering the findings in this study, the following recommendations could be proposed in order for the higher use of portals by the patients: informing patients about the advantages of using these portals, designing portals in a simple and understandable form, and increase in portals’ attractiveness could have a positive and effective impact on laboratory information system success. Manuscript profile
      • Open Access Article

        2 - A novel security usability method for e-learning platforms
        Golbarg Nasiri Negin Hajiahmadi
        Traditionally, security and usability has acted against each other. Specially, for inexpert people, usability means ignoring security and secure systems are not usable. Researchers and developers recognized that current security problems would be solved only throug More
        Traditionally, security and usability has acted against each other. Specially, for inexpert people, usability means ignoring security and secure systems are not usable. Researchers and developers recognized that current security problems would be solved only through addressing issues raised through usability and human factor. In fact, future of cyber security relies on deployment of security technologies which widely could be used by inexpert users. Interpretative Key Management (IKM) is a cryptographic key management system under category of master key which empowers users to generate the cryptographic keys within the end-user systems. This article proposes a novel method which specifically helps beginners to achieve both safety and usability of communications and network-based software by utilizing IKM. In this method processes of user authentication and encryption of transmitted and stored data will be fully automated and does not require the users to do any security configuration. The main targeted application of proposed method is to enhance security and usability of e-learning systems when the trainees do not have enough computer knowledge. Manuscript profile