{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:09Z","timestamp":1750220589365,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3429789.3429813","type":"proceedings-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T20:52:56Z","timestamp":1606423976000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Identifying Usability Risks for Mobile Application"],"prefix":"10.1145","author":[{"given":"Hotma Antoni","family":"Hutahaean","sequence":"first","affiliation":[{"name":"Industrial Engineering Department, Bandung Institute of Technology, Bandung, Indonesia"}]},{"given":"Rajesri","family":"Govindaraju","sequence":"additional","affiliation":[{"name":"Industrial Engineering Department, Bandung Institute of Technology, Bandung, Indonesia"}]},{"given":"Iman","family":"Sudirman","sequence":"additional","affiliation":[{"name":"Industrial Engineering Department, Bandung Institute of Technology, Bandung, Indonesia"}]}],"member":"320","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","series-title":"Lecture Notes in Networks and Systems, 35--43. DOI:10.1007\/978-981-10-3932-4_4","volume-title":"Mobile Applications Usability Parameters: Taking an Insight View","author":"Goel Sakshi","unstructured":"Sakshi Goel , Renuka Nagpal , and Deepti Mehrotra , 2018. Mobile Applications Usability Parameters: Taking an Insight View . Lecture Notes in Networks and Systems, 35--43. DOI:10.1007\/978-981-10-3932-4_4 10.1007\/978-981-10-3932-4_4 Sakshi Goel, Renuka Nagpal, and Deepti Mehrotra, 2018. Mobile Applications Usability Parameters: Taking an Insight View. Lecture Notes in Networks and Systems, 35--43. DOI:10.1007\/978-981-10-3932-4_4"},{"key":"e_1_3_2_1_2_1","first-page":"64","article-title":"Analisis usability pada aplikasi berbasis web dengan mengadopsi model kepuasan pengguna (user satisfaction)","volume":"6","author":"Prayoga Sigit Hadi","year":"2010","unstructured":"Sigit Hadi Prayoga and Dana Indra Sensuse , 2010 . Analisis usability pada aplikasi berbasis web dengan mengadopsi model kepuasan pengguna (user satisfaction) , Jurnal Sistem Informasi MTI-UI 6 , 1 (2010), 64 -- 73 . DOI: 10.21609\/jsi.v6i1.278. 10.21609\/jsi.v6i1.278 Sigit Hadi Prayoga and Dana Indra Sensuse, 2010. Analisis usability pada aplikasi berbasis web dengan mengadopsi model kepuasan pengguna (user satisfaction), Jurnal Sistem Informasi MTI-UI 6, 1 (2010), 64--73. DOI: 10.21609\/jsi.v6i1.278.","journal-title":"Jurnal Sistem Informasi MTI-UI"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIMSEC.2011.6011139"},{"key":"e_1_3_2_1_4_1","first-page":"3","article-title":". Risk Factors in Software Development Phases","volume":"10","author":"Hijazi Haneen","year":"2014","unstructured":"Haneen Hijazi , Shihadeh Khaleel Alqrainy , Hasan Muaidi , and Thair jam al Khdour , 2014 . Risk Factors in Software Development Phases . European Scientific Journal 10 , 3 (Jan, 2014), 213--232. Haneen Hijazi, Shihadeh Khaleel Alqrainy, Hasan Muaidi, and Thair jamal Khdour, 2014. Risk Factors in Software Development Phases. European Scientific Journal 10, 3 (Jan, 2014), 213--232.","journal-title":"European Scientific Journal"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.02.005"},{"volume-title":"Software Engineering Risk Management","author":"Karolak Dale Walter","key":"e_1_3_2_1_6_1","unstructured":"Dale Walter Karolak . 1999. Software Engineering Risk Management , Computer Society Press . Dale Walter Karolak. 1999. Software Engineering Risk Management, Computer Society Press."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Jacob Nielsen. 1992. Finding usability problems through heuristic evaluation In Proceeding ACM 'CHI'92 (Monterey CA 3--7 May) 373--380. Jacob Nielsen. 1992. Finding usability problems through heuristic evaluation In Proceeding ACM 'CHI'92 (Monterey CA 3--7 May) 373--380.","DOI":"10.1145\/142750.142834"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MySec.2014.6986005"},{"volume-title":"Usability engineering","author":"Nielsen Jacob","key":"e_1_3_2_1_9_1","unstructured":"Jacob Nielsen . 1993. Usability engineering . Academic press , San Diego, CA . Jacob Nielsen. 1993. Usability engineering. Academic press, San Diego, CA."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc1803_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-006-7600-8"},{"key":"e_1_3_2_1_12_1","first-page":"6","article-title":"Usability dimensions for mobile applications-a review","volume":"5","author":"Baharuddin Rosnita","year":"2013","unstructured":"Rosnita Baharuddin , Dalbir Singh , and Rozilawati Razali , 2013 . Usability dimensions for mobile applications-a review . Research Journal of Applied Sciences, Engineering and Technology 5 , 6 (Feb, 2013), 2225--2231. DOI:10.19026\/rjaset.5.4776. 10.19026\/rjaset.5.4776 Rosnita Baharuddin, Dalbir Singh, and Rozilawati Razali, 2013. Usability dimensions for mobile applications-a review. Research Journal of Applied Sciences, Engineering and Technology 5, 6 (Feb, 2013), 2225--2231. DOI:10.19026\/rjaset.5.4776.","journal-title":"Research Journal of Applied Sciences, Engineering and Technology"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/2194-0827-1-1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007120.3007135"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96139-2_7"},{"key":"e_1_3_2_1_16_1","first-page":"5","article-title":"Software risk management","volume":"2","author":"Chawan P. M.","year":"2013","unstructured":"P. M. Chawan , Jijnasa Patil , and Radhika Naik , 2013 . Software risk management . International Journal of Computer Science and Mobile Computing 2 , 5 (May, 2013), 60--66. P. M. Chawan, Jijnasa Patil, and Radhika Naik, 2013. Software risk management. International Journal of Computer Science and Mobile Computing 2, 5 (May, 2013), 60--66.","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"e_1_3_2_1_17_1","first-page":"10","article-title":"Know your enemy: Software risk management","volume":"6","author":"Wieger Karl E.","year":"1998","unstructured":"Karl E. Wieger , 1998 . Know your enemy: Software risk management , Software Development 6 , 10 (Oct, 1998), 6 pages. DOI:10.1207\/s15327590ijhc1803_3. 10.1207\/s15327590ijhc1803_3 Karl E. Wieger, 1998. Know your enemy: Software risk management, Software Development 6, 10 (Oct, 1998), 6 pages. DOI:10.1207\/s15327590ijhc1803_3.","journal-title":"Software Development"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-871-0.ch013"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.1999.805130"},{"volume-title":"Integrating usability with concurrent engineering in mobile phone development","author":"Ketola Pekka","key":"e_1_3_2_1_20_1","unstructured":"Pekka Ketola . 2002. Integrating usability with concurrent engineering in mobile phone development , Academic Dissertation , Department of Computer and Information Sciences, University of Tampere, Finland. Pekka Ketola. 2002. Integrating usability with concurrent engineering in mobile phone development, Academic Dissertation, Department of Computer and Information Sciences, University of Tampere, Finland."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.965804"},{"key":"e_1_3_2_1_22_1","first-page":"5","article-title":"Agile requirement engineering practices and challenges: an empirical study","volume":"20","author":"Ramesh Balasubramaniam","year":"2010","unstructured":"Balasubramaniam Ramesh , Lan Coa , and Richard Baskerville . 2010 . Agile requirement engineering practices and challenges: an empirical study , Info Systems Journal 20 , 5 (Sept, 2010), 449--480. Balasubramaniam Ramesh, Lan Coa, and Richard Baskerville. 2010. Agile requirement engineering practices and challenges: an empirical study, Info Systems Journal 20, 5 (Sept, 2010), 449--480.","journal-title":"Info Systems Journal"},{"key":"e_1_3_2_1_23_1","first-page":"2","article-title":"Identification of usability risk in software development projects","volume":"1","author":"Sambantha Moorthy Jayaletchumi T.","year":"2014","unstructured":"Jayaletchumi T. Sambantha Moorthy , Suhaimi bin Ibrahim , and Mohd ' Maz'ri Mahrin , 2014 . Identification of usability risk in software development projects , International Journal of Software Engineering and Technology 1 , 2 (Dec, 2014) IEEE Xplore, 7--12 Jayaletchumi T. Sambantha Moorthy, Suhaimi bin Ibrahim, and Mohd 'Maz'ri Mahrin, 2014. Identification of usability risk in software development projects, International Journal of Software Engineering and Technology 1, 2 (Dec, 2014) IEEE Xplore, 7--12","journal-title":"International Journal of Software Engineering and Technology"},{"volume-title":"Software engineering (10th. ed)","author":"Sommerville Ivan","key":"e_1_3_2_1_24_1","unstructured":"Ivan Sommerville . 2016. Software engineering (10th. ed) . Addison-Wesley, Harlow , England . Ivan Sommerville. 2016. Software engineering (10th. ed). Addison-Wesley, Harlow, England."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2008.02.001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.62930"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2003.12.007"},{"key":"e_1_3_2_1_28_1","first-page":"2","article-title":"Risk identification and preemptive scheduling in software development life cycle","volume":"10","author":"Shahzad Basit","year":"2010","unstructured":"Basit Shahzad , Abdullah S. Al-Mudimigh , and Zahid Ullah , 2010 . Risk identification and preemptive scheduling in software development life cycle . Global Journal of Computer Science and Technology 10 , 2 (April, 2010), 55--63. Basit Shahzad, Abdullah S. Al-Mudimigh, and Zahid Ullah, 2010. Risk identification and preemptive scheduling in software development life cycle. Global Journal of Computer Science and Technology 10, 2 (April, 2010), 55--63.","journal-title":"Global Journal of Computer Science and Technology"}],"event":{"name":"ICONETSI: International Conference on Engineering and Information Technology for Sustainable Industry","acronym":"ICONETSI","location":"Tangerang Indonesia"},"container-title":["Proceedings of the International Conference on Engineering and Information Technology for Sustainable Industry"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429813","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3429789.3429813","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:44Z","timestamp":1750195904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3429789.3429813"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":28,"alternative-id":["10.1145\/3429789.3429813","10.1145\/3429789"],"URL":"https:\/\/doi.org\/10.1145\/3429789.3429813","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}