Bridging Usability and Accessibility of User Authentication using Usable Accessed (UAce) for Online Payment Applications
DOI: http://dx.doi.org/10.30630/joiv.5.4.740
Abstract
Keywords
Full Text:
PDFReferences
Fuglerud, K. S., & Røssvoll, T. H. (2010). Previous and related research on usability and accessibility issues of personal identification management systems. Norwegian Computing Center, Oslo (Norway), Tech. Rep. DART/10/10.
Fuglerud, K. S., & Røssvoll, T. H. (2012). An evaluation of web-based voting usability and accessibility. Universal Access in the Information Society, 11(4), 359-373.
Andrew, S., Watson, S., Oh, T., & Tigwell, G. W. (2020, October). A Review of Literature on Accessibility and Authentication Techniques. In The 22nd International ACM SIGACCESS Conference on Computers and Accessibility (pp. 1-4).
Pedersen A. Usability of authentication in web applications. A literature review. University of Copenhagen, Tech. Rep. 2010.
Bevan, N., Carter, J., Earthy, J., Geis, T., & Harker, S. (2016, July). New ISO standards for usability, usability reports and usability measures. In International conference on human-computer interaction (pp. 268-278). Springer, Cham.
Yeratziotis, A., Greunen, D., Pottas, D.: A framework for evaluating usable security: the case of online health social networks. In: 6th International Symposium on Human Aspects of Information Security and Assurance (2012)
Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., ... & Wilson, S. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3), 1-41.
Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1.
Dresch, A., Lacerda, D. P., & Antunes, J. A. V. (2015). Design science research. In Design Science Research (pp. 67-102). Springer, Cham.
Venable, J., Pries-Heje, J., & Baskerville, R. (2016). FEDS: a framework for evaluation in design science research. European journal of information systems, 25(1), 77-89.
Forget, A., Chiasson, S., & Biddle, R. (2015, September). Choose your own authentication. In Proceedings of the 2015 New Security Paradigms Workshop (pp. 1-15).
Dhillon, G., Oliveira, T., Susarapu, S., & Caldeira, M. (2016). Deciding between information security and usability: Developing value-based objectives. Computers in Human Behavior, 61, 656-666.
Stanton, N. A., Salmon, P. M., Rafferty, L. A., Walker, G. H., Baber, C., & Jenkins, D. P. (2017). Human factors methods: a practical guide for engineering and design. CRC Press.
Realpe, P. C., Collazos, C. A., Hurtado, J., & Granollers, A. (2015, September). Towards an integration of usability and security for user authentication. In Proceedings of the XVI International Conference on Human Computer Interaction (pp. 1-6).
George, A. (2018). Perceptions of Internet banking users—a structural equation modelling (SEM) approach. IIMB management review, 30(4), 357-368.
Altobishi, T., Erboz, G., & Podruzsik, S. (2018). E-Banking effects on customer satisfaction: The survey on clients in Jordan Banking Sector. International Journal of Marketing Studies, 10(2), 151-161.
Muratovski, G. (2015). Research for designers: A guide to methods and practice. Sage.
Realpe-Muñoz, P., Collazos, C. A., Granollers, T., Muñoz-Arteaga, J., & Fernandez, E. B. (2017, September). Design process for usable security and authentication using a user-centered approach. In Proceedings of the XVIII International Conference on Human Computer Interaction (pp. 1-8).
Schwind, N., Magnin, M., Inoue, K., Okimoto, T., Sato, T., Minami, K., & Maruyama, H. (2016). Formalization of resilience for constraint-based dynamic systems. Journal of Reliable Intelligent Environments, 2(1), 17-35.
Naqvi, B., & Seffah, A. (2018, May). A methodology for aligning usability and security in systems and services. In 2018 3rd International Conference on Information Systems Engineering (ICISE) (pp. 61-66). IEEE.
Realpe PC, Collazos CA, Hurtado J, Granollers A. A set of heuristics for usable security and user authentication. InProceedings of the XVII International Conference on Human Computer Interaction 2016 Sep 13 (pp. 1-8).
Coulton, P., & Lindley, J. G. (2019). More-than human centred design: Considering other things. The Design Journal, 22(4), 463-481.
Morales, J., Rusu, C., Botella, F., & Quiñones, D. (2019). Programmer eXperience: A systematic literature review. IEEE Access, 7, 71079-71094.
Nielsen, J. (1994). Heuristic evaluation, w: Nielsen J., Mack RL (eds.), usability inspection methods.
Mohamed, M. A., Chakraborty, J., & Dehlinger, J. (2017). Trading off usability and security in user interface design through mental models. Behaviour & Information Technology, 36(5), 493-516.
Abu-Salma, R., Redmiles, E. M., Ur, B., & Wei, M. (2018). Exploring user mental models of end-to-end encrypted communication tools. In 8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 18).
Guo, Y., Norziha Megat, M. Z. & Nur Azaliah, A. B. (2021). Conceptual Model on Internet Banking Acceptance in China with Social Network Influence. International Journal on Informatics Visualization, 5(2), 177-186.