Fig. 8From: Usability evaluation model of an application with emphasis on collaborative security: an approach from social dimensionsUsability issues related to access level 2. Source: the authorsBack to article page