{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T09:59:29Z","timestamp":1769075969934,"version":"3.49.0"},"reference-count":32,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>In the post 9\/11 world, homeland security has become focal issue for every country and governments are constantly improving security mechanisms to protect their citizens. Pakistan being the front line state in the war against terror is one of the heavily affected countries by terrorism. Timely information dissemination to public by security agencies can help citizens to be prepared and carry out protective measures. Information technology artifacts and the internet can be very beneficial for information dissemination purpose. In this paper the author specifically looked at Pakistani security agency websites 1to evaluate usability aspects. Initially we conducted a usability testing in lab setting, where our questions were based on Jakob Nielson\u2019s heuristics. In order to further validate our findings the authors prepared a questionnaire and got it filled out by end users. Survey results highlighted that these websites have several usability problems which need to be rectified before they could effectively be used. The findings of the study help e-government practitioners and policy makers to develop their websites according to user needs.<\/p>","DOI":"10.4018\/jep.2013070105","type":"journal-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T19:37:27Z","timestamp":1384285047000},"page":"57-69","source":"Crossref","is-referenced-by-count":8,"title":["Usability Evaluation of Pakistani Security Agencies Websites"],"prefix":"10.4018","volume":"4","author":[{"given":"Saqib","family":"Saeed","sequence":"first","affiliation":[{"name":"Department of Computer Science, Bahria University Islamabad, Islamabad, Pakistan"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Irfan Ahmed","family":"Malik","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University Islamabad, Islamabad, Pakistan"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Fazal","family":"Wahab","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bahria University Islamabad, Islamabad, Pakistan"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"2432","reference":[{"key":"jep.2013070105-0","unstructured":"G3ICT. (2013). Retrieved February 2, 2013, from http:\/\/g3ict.org\/resource_center\/country_profiles\/country_profile_-_Pakistan"},{"key":"jep.2013070105-1","unstructured":"Adam, N. R., Atluri, V., & Janeja, V. P. (2004). Agency interoperation for effective data mining in border control and homeland security applications. In Proceedings of the 2004 annual National Conference on Digital Government Research (dg.o '04). Digital Government Society of North America, Article No: 3, 2 pages."},{"key":"jep.2013070105-2","doi-asserted-by":"publisher","DOI":"10.1145\/1035575.1035578"},{"key":"jep.2013070105-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.004"},{"key":"jep.2013070105-4","doi-asserted-by":"crossref","unstructured":"Herrmann, J. W. (2013). Using operations research methods for homeland security problems. Handbook of Operations Research for Homeland Security (pp. 1-24).","DOI":"10.1007\/978-1-4614-5278-2_1"},{"key":"jep.2013070105-5","doi-asserted-by":"crossref","unstructured":"Ikebe, H., Oqawa, K., & Hatayama, Y. (2005) Network camera system using new home network architecture with flexible scalability. In Proceedings of the International Conference on Consumer Electronics (ICCE 2005) (pp. 151-152).","DOI":"10.1109\/ICCE.2005.1429762"},{"key":"jep.2013070105-6","doi-asserted-by":"crossref","unstructured":"Jain, S., & McLean, C. R. (2009) Recommended practices for homeland security modeling and simulation. In Proceedings of the Winter Simulation Conference (WSC '09) (pp. 2879-2890).","DOI":"10.1109\/WSC.2009.5429236"},{"key":"jep.2013070105-7","doi-asserted-by":"crossref","unstructured":"Kielman, J. (2006). The real-time nature and value of homeland security information. In Proceedings of the 15th ACM International Conference on Information and Knowledge Management (CIKM '06). ACM, New York, NY, USA, 3-3.","DOI":"10.1145\/1183614.1183618"},{"key":"jep.2013070105-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2011.08.048"},{"key":"jep.2013070105-9","doi-asserted-by":"crossref","unstructured":"Li, W., & Liu, Y. (2008). Personal knowledge management in e-learning era. In Z. Pan, X.iaopeng Zhang, A. Rhalibi, W. Woo, & Y. Li (Eds.), Proceedings of the 3rd International Conference on Technologies for E-Learning and Digital Entertainment (Edutainment '08) (pp. 200-205). Springer-Verlag, Berlin, Heidelberg.","DOI":"10.1007\/978-3-540-69736-7_22"},{"key":"jep.2013070105-10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.147"},{"key":"jep.2013070105-11","doi-asserted-by":"crossref","unstructured":"Popp, R., & Yen, J. (2006). Emergent information technologies and enabling policies for counter-terrorism. Wiley &, Sons\/IEEE Press.","DOI":"10.1002\/047178656X"},{"key":"jep.2013070105-12","doi-asserted-by":"crossref","unstructured":"Raghu, T. S., Ramesh, R., & Whinston, A. B. (2003) Addressing the homeland security problem: a collaborative decision-making framework. In H. Chen, D. D. Zeng, T. Madhusudan, R. Miranda, J. Schroeder, & C. Demchak (Eds.), Proceedings of the 1st NSF\/NIJ Conference on Intelligence and Security Informatics (ISI'03) (pp. 249-265). Springer-Verlag, Berlin, Heidelberg.","DOI":"10.1007\/3-540-44853-5_19"},{"key":"jep.2013070105-13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5973.2007.00518.x"},{"key":"jep.2013070105-14","doi-asserted-by":"publisher","DOI":"10.2202\/1547-7355.1414"},{"key":"jep.2013070105-15","first-page":"413","article-title":"Homeland security preparedness and information systems: Strategies for managing public policy. Hershey, PA: Information Science Reference. Nielsen, J. (1994). Heuristic evaluation.","volume":"24","author":"C. G.Reddick","year":"2009","journal-title":"Usability Inspection Methods"},{"key":"jep.2013070105-16","doi-asserted-by":"publisher","DOI":"10.2202\/1547-7355.1255"},{"key":"jep.2013070105-17","doi-asserted-by":"publisher","DOI":"10.1080\/08865655.2006.9695653"},{"key":"jep.2013070105-18","author":"J.Rubin","year":"2008","journal-title":"Handbook of usability testing: How to plan, design and conduct effective tests"},{"key":"jep.2013070105-19","doi-asserted-by":"crossref","unstructured":"Saeed, S., Pipek, V., Rohde, M., & Wulf, V. (2010). Managing nomadic knowledge: A case study of the European Social Forum. In Proc. CHI 2010 (pp. 537-546). ACM Press.","DOI":"10.1145\/1753326.1753406"},{"key":"jep.2013070105-20","doi-asserted-by":"crossref","unstructured":"Saeed, S., & Rohde, M. (2010). Computer enabled social movements? Usage of a collaborative web platform within the European social forum. In Proc. COOP 2010. Springer.","DOI":"10.1007\/978-1-84996-211-7_14"},{"key":"jep.2013070105-21","doi-asserted-by":"publisher","DOI":"10.1504\/IJKL.2008.022062"},{"key":"jep.2013070105-22","unstructured":"Saeed, S., Rohde, M., & Wulf, V. (2008). ICTs, an alternative sphere for social movements in Pakistan: A research framework. In Proc. E-Society 2008 IBIMA press."},{"key":"jep.2013070105-23","doi-asserted-by":"crossref","unstructured":"Saeed, S., Rohde, M., & Wulf, V. (2009). Technologies within transnational social activist communities: An ethnographic study of the European social forum: In Proc. C&T 2009 ACM Press (2009) (pp. 85-94).","DOI":"10.1145\/1556460.1556474"},{"key":"jep.2013070105-24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16318-0_67"},{"issue":"4-5","key":"jep.2013070105-25","first-page":"265","article-title":"Analyzing political activists\u2019 organization practices: Findings from a long term case study of the European social forum.","volume":"20","author":"S.Saeed","year":"2011","journal-title":"JCSCW"},{"key":"jep.2013070105-26","doi-asserted-by":"publisher","DOI":"10.1145\/602421.602455"},{"key":"jep.2013070105-27","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2006.00673.x"},{"key":"jep.2013070105-28","doi-asserted-by":"publisher","DOI":"10.1111\/0033-3352.00164"},{"key":"jep.2013070105-29","doi-asserted-by":"publisher","DOI":"10.1109\/MMW.2003.1237477"},{"key":"jep.2013070105-30","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2008.04.010"},{"key":"jep.2013070105-31","doi-asserted-by":"crossref","unstructured":"Yim, K., & You, I. (2011). IT issues on homeland security and defense. In A Min Tjoa, Gerald Quirchmayr, Ilsun You, and Lida Xu (Eds.), Proceedings of the IFIP WG 8.4\/8.9 International Cross Domain Conference on Availability, Reliability and Security for Business, Enterprise and Health Information Systems (ARES'11) (pp. 374-385). Springer-Verlag, Berlin, Heidelberg.","DOI":"10.1007\/978-3-642-23300-5_29"}],"container-title":["International Journal of E-Politics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=93132","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:34:12Z","timestamp":1654133652000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jep.2013070105"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jep.2013070105","relation":{},"ISSN":["1947-9131","1947-914X"],"issn-type":[{"value":"1947-9131","type":"print"},{"value":"1947-914X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}