Abstract
The access and use of the websites regardless of the hardware, software, geographic location or network infrastructures available to the user, are a necessity and topics addressed in the usability and accessibility standards. In this sense, the World Wide Web Consortium (W3C) has provided the set of Web Content Accessibility Guidelines (WCAG), in order to ensure an equivalent user experience for people with disabilities, as well as cybersecurity has gained widespread attention in organizations in the attention of the dependence on ICT, and information management as an asset, managed by technologies and vital for decision making.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adi, K., Hamza, L., Pene, L.: Automatic security policy enforcement in computer systems. Comput. Syst. 73, 1456–171 (2018)
Wong, W.E., Li, X., Laplante, P.A.: Be more familiar with our enemies and pave the way forward: a review of the roles bugs played in software failures. J. Syst. Softw. 133, 68–94 (2017)
Özakıncı, R., Tarhan, A.: Early software defect prediction: a systematic map and review. J. Syst. Softw. 144, 216–239 (2018)
Norris, M., Rigby, P.: Ingeniería de Software aplicada. Noriega Editores, México (1994)
ISO: ISO 9126: Software product evaluation - Quality characteristics and guidelines for their use. ISO, Ginebra (1991)
ISO: ISO/IEC 9126 - p1: Software Engineering – Product quality. Part 1: 2001 – Parts 2 to 4. ISO, Ginebra (2001)
Bevan, N., Azuma, M.: Quality in use: incorporating human factors into the software engineering lifecycle. In: Proceedings of the Third IEEE International Software Engineering Standards Symposium and Forum ISESS 1997, pp. 169–179 (1997)
Chi, E.: Improving web usability through visualization - predictive web usage visualizations can help analysts uncover traffic patterns and usability problems. IEEE Internet Comput., 64–72 (2002)
Kaur, R., Sharma, B.: Comparative study for evaluating the usability of web based applications. In: 2018 4th International Conference on Computing Sciences (ICCS), pp. 94–97. IEEE Xplore (2019)
Perurena Cancio, L., Moráguez Bergues, M.: Usability of web sites, methods and evaluation techniques. Revista Cubana de Información en Ciencias de la Salud 24(2), 176–194 (2013)
Jaume, M., Fontanet Nadal, G.: A web accessibility improvement tool. In: 6th Iberian Conference on Information Systems and Technologies (CISTI 2011), pp. 1–5. IEEE Xplore (2011)
W3C: W3C Accessibility Guidelines (WCAG) 3.0, 8 June 2021. https://www.w3.org/TR/wcag-3.0/. Accessed 11 June 2021
Garrido, A., Firmenich, S., Rossi, G., Grigera, J., Medina-Medina, N., Harari, I.: Personalized web accessibility using client-side refactoring. IEEE Internet Comput. 17(4), 58–66 (2012)
Riaño, J., Ballesteros, J.: Web accessibility. Study web accessibility in public places of the Colombian State. In: 2015 XLI Latin American Computing Conference (CLEI) (2015)
Spingola, E., Reid, K.: Accesibilidad de las páginas web “Introducción a la ingeniería. In: 2019 IEEE Frontiers in Education Conference (FIE), pp. 1–7. IEEE Xplore (2019)
W3C: Web Content Accessibility Guidelines (WCAG) (2012). https://www.w3.org/WAI/intro/wcag.php
Isa, W.: Accessibility evaluation using Web Content Accessibility Guidelines (WCAG) 2.0. In: 2016 4th International Conference on User Science and Engineering (i-USEr), pp. 1–4. IEEE Xplore (2016)
Serrão, C., Vieira, T.: Web security in the finance sector. In: 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 255–259 (2016)
Aftergood, S.: Cybersecurity: the cold war online. Nature 547, 30–31 (2017)
Milenkoski, A., Vieira, M., Kounev, S., Kounev, A., Payne, B.D.: Evaluating computer intrusion detection systems: a survey of common. Evaluating computer intrusion detection systems: a survey of common 48, 1–41 (2015)
Chang, L.Y., Coppel, N.: Building cyber security awareness in a developing country: lessons from Myanmar. Comput. Secur. 97, 101959 (2020)
Loureiro, S.: Security misconfigurations and how to prevent them. Netw. Secur. 2021, 13–16 (2021)
Gupta Gourisetti, S., Mylrea, M., Patangia, H.: Cybersecurity vulnerability mitigation framework through empirical paradigm: enhanced prioritized gap analysis. Future Gener. Comput. Syst. 105, 410–431 (2020)
Benz, M., Chatterjee, D.: Calculated risk? A cybersecurity evaluation tool for SMEs. Bus. Horiz. 63, 531–540 (2020)
Khan, H.H., Malik, M.N.: Software standards and software failures: a review with the perspective of varying situational contexts. IEEE Access 5, 17501–17513 (2017)
ISO: ISO/IEC 15408-1:2009 Information technology—Security techniques—Evaluation criteria for IT. ISO, December 2019. https://www.iso.org/standard/50341.html. Accessed 11 June 2021
Buchalcevova, A.: Using ArchiMate to model ISO/IEC 29110 standard for very small entities. Comput. Stand. Interfaces 65, 103–121 (2019)
Castillo-Salinas, L., Sanchez-Gordon, S., Villarroel-Ramos, J., Sánchez-Gordón, M.: Evaluation of the implementation of a subset of ISO/IEC 29110 Software Implementation process in four teams of undergraduate students of Ecuador. An empirical software engineering experiment. Comput. Stand. Interfaces 70, 103430 (2020)
OWASP: OWASP (2021). https://owasp.org/. Accessed 11 June 2021
Nanisura, D., Venia, N., Sunaringtyas, S.U.: Secure code recommendation based on code review result using OWASP code review guide. In: 2020 International Workshop on Big Data and Information Security (IWBIS), pp. 153–1258. IEEE Xplore (2020)
Ashimura, K., Nakamura, O., Isshiki, M.: TV accesible basada en la arquitectura W3C MMI. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 157–158. IEEE Xplore (2014)
Monarch, I.: Understanding software engineering failure as part of the SWEBOK. In: Proceedings 14th Conference on Software Engineering Education and Training. In Search of a Software Engineering Profession, pp. 191–192. IEEE (2001)
Wu, X., Zheng, W., Chen, X., Wang, F., Mu, D.: CVE-assisted large-scale security bug report dataset construction method. J. Syst. Softw. 160, 110456 (2020)
Caturano, F., Perrone, G., Romano, S.P.: Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment. Comput. Secur. 103, 102204 (2021)
Morandini, M., Coleti, T.A., Oliveira, E., Pizzigatti Corrêa, P.L.: Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: a survey for analyzing results for development teams. Comput. Sci. Rev. 39, 100314 (2021)
Romero, C.: Adaptación de la metodología SCRUM para desarrollar sitios web accesibles. In: 2019 International Conference on Inclusive Technologies and Education (CONTIE), pp. 112–124. IEEE Xplore (2019)
W3C: Accessibility, Usability, and Inclusion, 6 May 2016. https://www.w3.org/WAI/fundamentals/accessibility-usability-inclusion/. Accessed 10 June 2021
Deepa, G., Santhi Thilagam, P.: Securing web applications from injection and logic vulnerabilities: approaches and challenges. Inf. Softw. Technol. 74, 160–180 (2016)
Catolino, G., Palomba, F., Zaidman, A., Ferrucci, F.: Not all bugs are the same: understanding, characterizing, and classifying bug types. J. Syst. Softw. 152, 165–181 (2019)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Hernández Bejarano, M., Páez Cruz, E.T., Simanca H., F.A. (2021). A Look at Usability, Accessibility and Cybersecurity Standards in Software Development. In: Guarda, T., Portela, F., Santos, M.F. (eds) Advanced Research in Technologies, Information, Innovation and Sustainability. ARTIIS 2021. Communications in Computer and Information Science, vol 1485. Springer, Cham. https://doi.org/10.1007/978-3-030-90241-4_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-90241-4_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90240-7
Online ISBN: 978-3-030-90241-4
eBook Packages: Computer ScienceComputer Science (R0)