메뉴 건너뛰기




Volumn 28, Issue 1-2, 2009, Pages 47-62

User perceptions of security, convenience and usability for ebanking authentication tokens

Author keywords

Authentication; Empirical study; Evaluation; Internet Banking; Security; Usability engineering

Indexed keywords

ACCESS CONTROL; ELECTRONIC COMMERCE; INTERNET; USABILITY ENGINEERING; WORLD WIDE WEB;

EID: 57849096551     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2008.09.008     Document Type: Article
Times cited : (105)

References (43)
  • 1
    • 57849118507 scopus 로고    scopus 로고
    • Available from: (accessed 22.07.08)
    • APACS. Remote card authentication. Available from: (2008). http://www.apacs.org.uk/payments_industry/new_technology2.html (accessed 22.07.08)
    • (2008) Remote card authentication
    • APACS1
  • 2
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard D., and Arief B. Computer security impaired by legitimate users. Computers and Security 23 3 (2004) 253-264
    • (2004) Computers and Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 3
    • 34547269590 scopus 로고    scopus 로고
    • Psychological acceptability revisited
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 1]
    • Bishop M. Psychological acceptability revisited. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 1-11 [chapter 1]
    • (2005) Security and usability , pp. 1-11
    • Bishop, M.1
  • 4
    • 0036680961 scopus 로고    scopus 로고
    • Diffusion of e-commerce: an analysis of the adoption of four e-commerce activities
    • Eastin M. Diffusion of e-commerce: an analysis of the adoption of four e-commerce activities. Telematics and Informatics 19 3 (2002) 251-267
    • (2002) Telematics and Informatics , vol.19 , Issue.3 , pp. 251-267
    • Eastin, M.1
  • 6
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • Furnell S. Why users cannot use security. Computers and Security 24 (2005) 274-279
    • (2005) Computers and Security , vol.24 , pp. 274-279
    • Furnell, S.1
  • 7
    • 33646488507 scopus 로고    scopus 로고
    • Two-factor authentication - a look behind the headlines
    • Henry P.A. Two-factor authentication - a look behind the headlines. Network Security 2006 4 (2006) 18-19
    • (2006) Network Security , vol.2006 , Issue.4 , pp. 18-19
    • Henry, P.A.1
  • 9
    • 28044434200 scopus 로고    scopus 로고
    • Current practice in measuring usability: challenges to usability studies and research
    • Hornbæk K. Current practice in measuring usability: challenges to usability studies and research. International Journal of Human-Computer Studies 64 2 (2006) 79-102
    • (2006) International Journal of Human-Computer Studies , vol.64 , Issue.2 , pp. 79-102
    • Hornbæk, K.1
  • 10
    • 35348895123 scopus 로고    scopus 로고
    • Hornbæk K, Law EL. Meta-analysis of correlations among usability measures, CHI 2007; 2007. pp. 617-626.
    • Hornbæk K, Law EL. Meta-analysis of correlations among usability measures, CHI 2007; 2007. pp. 617-626.
  • 11
    • 57849161156 scopus 로고    scopus 로고
    • International Organization for Standardization, ISO 9241-11. Ergonomic requirements for office work with visual display terminals (VDTs) part II: guidance on usability; 1998.
    • International Organization for Standardization, ISO 9241-11. Ergonomic requirements for office work with visual display terminals (VDTs) part II: guidance on usability; 1998.
  • 15
    • 34547240740 scopus 로고    scopus 로고
    • Usability design and evaluation for privacy and security solutions
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 4]
    • Karat C.M., Brodie C., and Karat J. Usability design and evaluation for privacy and security solutions. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 47-74 [chapter 4]
    • (2005) Security and usability , pp. 47-74
    • Karat, C.M.1    Brodie, C.2    Karat, J.3
  • 17
    • 39049096251 scopus 로고    scopus 로고
    • The price of love
    • Knight W. The price of love. Infosecurity 5 1 (2008) 30-33
    • (2008) Infosecurity , vol.5 , Issue.1 , pp. 30-33
    • Knight, W.1
  • 18
    • 0001581203 scopus 로고
    • Research methods in human computer interaction
    • Helander M. (Ed), NorthHolland, Amsterdam
    • Landauer T.K. Research methods in human computer interaction. In: Helander M. (Ed). Handbook of human computer interaction (1988), NorthHolland, Amsterdam 905-928
    • (1988) Handbook of human computer interaction , pp. 905-928
    • Landauer, T.K.1
  • 19
    • 0018543411 scopus 로고
    • Password security: a case history
    • Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 20
    • 57849093282 scopus 로고    scopus 로고
    • Nielsen, J. Usability Engineering. Academic Press; 1993.
    • Nielsen, J. Usability Engineering. Academic Press; 1993.
  • 22
    • 57849098926 scopus 로고    scopus 로고
    • Users and trust: a microsoft case study
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 29]
    • Nodder C. Users and trust: a microsoft case study. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 589-606 [chapter 29]
    • (2005) Security and usability , pp. 589-606
    • Nodder, C.1
  • 24
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens and biometrics for user authentication
    • O'Gorman L. Comparing passwords, tokens and biometrics for user authentication. Proceedings of the IEEE 91 12 (2003) 2021-2040
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 25
    • 55649094257 scopus 로고    scopus 로고
    • The usability of security devices
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 12]
    • Piazzalunga U., Savaneschi P., and Coffetti P. The usability of security devices. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 221-242 [chapter 12]
    • (2005) Security and usability , pp. 221-242
    • Piazzalunga, U.1    Savaneschi, P.2    Coffetti, P.3
  • 28
    • 25844505729 scopus 로고    scopus 로고
    • Securing online banking
    • Reavley N. Securing online banking. Card Technology Today 17 10 (2005) 12-13
    • (2005) Card Technology Today , vol.17 , Issue.10 , pp. 12-13
    • Reavley, N.1
  • 29
    • 35348885452 scopus 로고    scopus 로고
    • Evaluating authentication mechanisms
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 6]
    • Renaud K. Evaluating authentication mechanisms. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 103-128 [chapter 6]
    • (2005) Security and usability , pp. 103-128
    • Renaud, K.1
  • 30
    • 84950634257 scopus 로고    scopus 로고
    • Root RW, Draper S. Questionnaires as a software evaluation tool, CHI 83; 1983. pp. 83-7.
    • Root RW, Draper S. Questionnaires as a software evaluation tool, CHI 83; 1983. pp. 83-7.
  • 31
    • 35348863698 scopus 로고    scopus 로고
    • Usable security: why do we need it? how do we get it?
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 2]
    • Sasse M.A., and Flechais I. Usable security: why do we need it? how do we get it?. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 13-30 [chapter 2]
    • (2005) Security and usability , pp. 13-30
    • Sasse, M.A.1    Flechais, I.2
  • 32
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: too little, too late
    • Schneier B. Two-factor authentication: too little, too late. Communications of the ACM 48 4 (2005) 136
    • (2005) Communications of the ACM , vol.48 , Issue.4 , pp. 136
    • Schneier, B.1
  • 33
    • 0035149763 scopus 로고    scopus 로고
    • Usability and security: an appraisal of usability issues in information security methods
    • Schultz E.E., Proctor R.W., Lien M.-C., and Savendy G. Usability and security: an appraisal of usability issues in information security methods. Computers and Security 20 7 (2001) 620-634
    • (2001) Computers and Security , vol.20 , Issue.7 , pp. 620-634
    • Schultz, E.E.1    Proctor, R.W.2    Lien, M.-C.3    Savendy, G.4
  • 34
    • 24344471085 scopus 로고    scopus 로고
    • The TIPPI point: towards trustworthy interfaces
    • Sinclair S., and Smith S.W. The TIPPI point: towards trustworthy interfaces. IEEE Security and Privacy (2005) 68-71
    • (2005) IEEE Security and Privacy , pp. 68-71
    • Sinclair, S.1    Smith, S.W.2
  • 36
    • 0037394683 scopus 로고    scopus 로고
    • E-banking and customer preference in malaysia: an empirical investigation
    • Sohail M.S., and Shanmugham B. E-banking and customer preference in malaysia: an empirical investigation. Information Sciences 150 (2003) 207-217
    • (2003) Information Sciences , vol.150 , pp. 207-217
    • Sohail, M.S.1    Shanmugham, B.2
  • 37
    • 0141990195 scopus 로고
    • The effects of information system user expectations on their performance and perceptions
    • Szajna B., and Scamell R.W. The effects of information system user expectations on their performance and perceptions. MIS Quarterly 17 4 (1993) 493-516
    • (1993) MIS Quarterly , vol.17 , Issue.4 , pp. 493-516
    • Szajna, B.1    Scamell, R.W.2
  • 39
    • 35348892019 scopus 로고    scopus 로고
    • Design for usability
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 3]
    • Tognazzini B. Design for usability. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 31-46 [chapter 3]
    • (2005) Security and usability , pp. 31-46
    • Tognazzini, B.1
  • 40
    • 33646586103 scopus 로고    scopus 로고
    • On the role of metaphor and language in design of third party payments in eBanking: usability and quality
    • Weir C.S., Anderson J.A., and Jack M.A. On the role of metaphor and language in design of third party payments in eBanking: usability and quality. International Journal of Human-Computer Studies 64 8 (2006) 771-785
    • (2006) International Journal of Human-Computer Studies , vol.64 , Issue.8 , pp. 771-785
    • Weir, C.S.1    Anderson, J.A.2    Jack, M.A.3
  • 41
    • 33846510483 scopus 로고    scopus 로고
    • Functionality and usability in design for eStatements in eBanking services
    • Weir C.S., McKay I., and Jack M.A. Functionality and usability in design for eStatements in eBanking services. Interacting with Computers 19 2 (2007) 241-256
    • (2007) Interacting with Computers , vol.19 , Issue.2 , pp. 241-256
    • Weir, C.S.1    McKay, I.2    Jack, M.A.3
  • 42
    • 34547294916 scopus 로고    scopus 로고
    • The memorability and security of passwords
    • Cranor, and Garfinkel (Eds), O'Reilly [chapter 7]
    • Yan J., Blackwell A., Anderson R., and Grant A. The memorability and security of passwords. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 129-142 [chapter 7]
    • (2005) Security and usability , pp. 129-142
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.