International Journal of

ADVANCED AND APPLIED SCIENCES

EISSN: 2313-3724, Print ISSN: 2313-626X

Frequency: 12

line decor
  
line decor

 Volume 10, Issue 11 (November 2023), Pages: 109-116

----------------------------------------------

 Technical Note

Privacy, security, and usability of mobile video conferencing applications: A comparative study

 Author(s): 

 Najwa Samrgandi *

 Affiliation(s):

 College of Computers and Information Systems, Umm Al-Qura University, Makkah, Saudi Arabia

 Full text

  Full Text - PDF

 * Corresponding Author. 

  Corresponding author's ORCID profile: https://orcid.org/0000-0001-7860-5884

 Digital Object Identifier (DOI)

 https://doi.org/10.21833/ijaas.2023.11.014

 Abstract

Mobile learning tools have facilitated authentic learning experiences, allowing students to forge meaningful connections while acquiring real-world knowledge. Mastering the skill of using mobile video conferencing applications is crucial but often complicated for users, such as students, teachers, and employers. In this study, the mobile video conferencing applications Zoom and Webex were compared with respect to their usability, using cognitive load theory as the conceptual framework. A systematic mapping approach was applied to obtain comparative descriptive information from surveyed literature. The available literature on communications support, accessibility and usability, and privacy and security of video conferencing technology was used for the systematic mapping process. The literature review revealed that Zoom and Webex usage can lead to cognitive fatigue, so users must avoid multitasking and schedule breaks between sessions to remain focused. Furthermore, video conferencing tools need to bridge the gap between usability and security for augmented safety of personal information alongside user comfort. Overall, the findings of this study are important for reducing the complexities of mobile video conferencing applications and enhancing the mobile learning experience.

 © 2023 The Authors. Published by IASE.

 This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

 Keywords

 Videoconferencing, Usability, Security, Privacy, Cognitive loading

 Article history

 Received 12 June 2023, Received in revised form 29 October 2023, Accepted 31 October 2023

 Acknowledgment 

No Acknowledgment.

 Compliance with ethical standards

 Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

 Citation:

 Samrgandi N (2023). Privacy, security, and usability of mobile video conferencing applications: A comparative study. International Journal of Advanced and Applied Sciences, 10(11): 109-116

 Permanent Link to this page

 Figures

 Fig. 1 Fig. 2 Fig. 3 

 Tables

 Table 1 

----------------------------------------------   

 References (30)

  1. Abukari AM, Bankas EK, and Iddrisu MM (2020). A secured video conferencing system architecture using a hybrid of two homomorphic encryption schemes: A case of zoom. International Journal of Engineering Research and Technology, 9(8): 237-240.   [Google Scholar]
  2. Aiken A (2020). Zooming in on privacy concerns: Video app Zoom is surging in popularity. In our rush to stay connected, we need to make security checks and not reveal more than we think. Index on Censorship, 49(2): 24–27. https://doi.org/10.1177/0306422020935792   [Google Scholar]
  3. Al-Samarraie H (2019). A scoping review of videoconferencing systems in higher education: Learning paradigms, opportunities, and challenges. The International Review of Research in Open and Distributed Learning, 20(3). https://doi.org/10.19173/irrodl.v20i4.4037   [Google Scholar]
  4. Archibald MM, Ambagtsheer RC, Casey MG, and Lawless M (2019). Using Zoom videoconferencing for qualitative data collection: Perceptions and experiences of researchers and participants. International Journal of Qualitative Methods, 18: 160940691987459. https://doi.org/10.1177/1609406919874596   [Google Scholar]
  5. Atkinson RC and Shiffrin RM (1968). Human memory: A proposed system and its control processes. Psychology of Learning and Motivation, 2: 89-195. https://doi.org/10.1016/S0079-7421(08)60422-3   [Google Scholar]
  6. Baker EL and Murphy SA (2021). Conducting successful virtual meetings while managing COVID fatigue. Journal of Public Health Management and Practice, 27(2): 208-212. https://doi.org/10.1097/PHH.0000000000001335   [Google Scholar] PMid:33492042
  7. Brereton P, Kitchenham B, Budgen D, Turner M, and Khalil M (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software, 80(4): 571-583. https://doi.org/10.1016/j.jss.2006.07.009   [Google Scholar]
  8. Chang H, Varvello M, Hao F, and Mukherjee S (2022). A tale of three videoconferencing applications: Zoom, Webex, and Meet. IEEE/ACM Transactions on Networking, 30(5): 2343-2358. https://doi.org/10.1109/TNET.2022.3171467   [Google Scholar]
  9. Curum B and Khedo KK (2020). Cognitive load management in mobile learning systems: Principles and theories. Journal of Computers in Education, 8(1): 109-136. https://doi.org/10.1007/s40692-020-00173-6   [Google Scholar] PMCid:PMC7417113
  10. Dash S, Samadder S, Srivastava A, Meena R, and Ranjan P (2021). Review of online teaching platforms in the current period of COVID-19 pandemic. Indian Journal of Surgery, 84(S1): 12–17. https://doi.org/10.1007/s12262-021-02962-4   [Google Scholar] PMid:34177155 PMCid:PMC8211454
  11. Fauville G, Luo M, Queiroz ACM, Bailenson JN, and Hancock J (2021). Zoom exhaustion and fatigue scale. Computers in Human Behavior Reports, 4: 100119. https://doi.org/10.1016/j.chbr.2021.100119   [Google Scholar]
  12. Garcia-Lopez E, Garcia-Cabot A, Manresa-Yee C, de-Marcos L, and Pages-Arevalo C (2017). Validation of navigation guidelines for improving usability in the mobile web. Computer Standards and Interfaces, 52: 51-62. https://doi.org/10.1016/j.csi.2017.01.011   [Google Scholar]
  13. Gladović P, Deretić N, and Drašković D (2020). Video conferencing and its application in education. Journal TTTP-Traffic and Transport Theory and Practice, 5(1): 45-48. https://doi.org/10.7251/JTTTP2001045G   [Google Scholar]
  14. Gough M (2006). Video conferencing over IP: Configure, secure, and troubleshoot. Elsevier, Amsterdam, Netherlands. https://doi.org/10.1016/B978-159749063-4/50012-3   [Google Scholar]
  15. Kagan D, Alpert GF, and Fire M (2023). Zooming into video conferencing privacy. IEEE Transactions on Computational Social Systems. https://doi.org/10.1109/TCSS.2022.3231987   [Google Scholar]
  16. Karl KA, Peluchette JV, and Aghakhani N (2021). Virtual work meetings during the COVID-19 pandemic: The good, bad, and ugly. Small Group Research, 53(3): 343–365. https://doi.org/10.1177/10464964211015286   [Google Scholar] PMCid:PMC8165498
  17. Kitchenham B, Brereton O, Budgen D, Turner M, Bailey J, and Linkman S (2009). Systematic literature reviews in software engineering–A systematic literature review. Information and Software Technology, 51(1): 7-15. https://doi.org/10.1016/j.infsof.2008.09.009   [Google Scholar]
  18. Omar NH, Thomas B, Jusoh M, and Jalil S (2021). Students’ perception and preference for online learning in Sabah during COVID-19 pandemic. International Journal of Academic Research in Business and Social Sciences, 11(11): 270-292. https://doi.org/10.6007/IJARBSS/v11-i11/11262   [Google Scholar]
  19. Petersen K, Feldt R, Mujtaba S, and Mattsson M (2008). Systematic mapping studies in software engineering. In the 12th International Conference on Evaluation and Assessment in Software Engineering (EASE’08), Swinton, UK: 68-77. https://doi.org/10.14236/ewic/EASE2008.8   [Google Scholar]
  20. Ramachandran V (2021). Stanford researchers identify four causes for “Zoom fatigue” and their simple fixes. Available online at: https://news.stanford.edu/2021/02/23/four-causes-zoom-fatigue-solutions/
  21. Secara I-A (2020). Zoombombing–The end-to-end fallacy. Network Security, 2020(8): 13-17. https://doi.org/10.1016/S1353-4858(20)30094-5   [Google Scholar]
  22. Sweller J (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2): 257-285. https://doi.org/10.1207/s15516709cog1202_4   [Google Scholar]
  23. Sweller J (2019). Cognitive load theory and educational technology. Educational Technology Research and Development, 68(1): 1–16. https://doi.org/10.1007/s11423-019-09701-3   [Google Scholar]
  24. Sweller J, Ayres P, and Kalyuga S (2011). Cognitive load theory. Springer, New York, USA. https://doi.org/10.1007/978-1-4419-8126-4   [Google Scholar]
  25. Torrato J, Aguja S, and Prudente M (2021). Using web video conferencing to conduct a program as a proposed model toward teacher leadership and academic vitality in the Philippines. Education Sciences, 11(11): 658. https://doi.org/10.3390/educsci11110658   [Google Scholar]
  26. Turner M, Kitchenham B, Brereton P, Charters S, and Budgen D (2010). Does the technology acceptance model predict actual use? A systematic literature review. Information and Software Technology, 52(5): 463-479. https://doi.org/10.1016/j.infsof.2009.11.005   [Google Scholar]
  27. Weichbroth P (2020). Usability of mobile applications: A systematic literature study. IEEE Access, 8: 55563–55577. https://doi.org/10.1109/ACCESS.2020.2981892   [Google Scholar]
  28. Wiederhold BK (2020). Connecting through technology during the coronavirus disease 2019 pandemic: Avoiding “Zoom fatigue.” Cyberpsychology, Behavior, and Social Networking, 23(7): 437-438. https://doi.org/10.1089/cyber.2020.29188.bkw   [Google Scholar] PMid:32551981
  29. Wohlin C (2014). Guidelines for snowballing in systematic literature studies and a replication in software engineering. In the Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering: 1-10. https://doi.org/10.1145/2601248.2601268   [Google Scholar]
  30. Zou C, Zhao W, and Siau K (2020). COVID-19 pandemic: A usability study on platforms to support eLearning. Communications in Computer and Information Science, 1294: 333-340. https://doi.org/10.1007/978-3-030-60703-6_43   [Google Scholar]