-
1
-
-
57849118507
-
-
Available from: (accessed 22.07.08)
-
APACS. Remote card authentication. Available from: (2008). http://www.apacs.org.uk/payments_industry/new_technology2.html (accessed 22.07.08)
-
(2008)
Remote card authentication
-
-
APACS1
-
2
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard D., and Arief B. Computer security impaired by legitimate users. Computers and Security 23 3 (2004) 253-264
-
(2004)
Computers and Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
3
-
-
34547269590
-
Psychological acceptability revisited
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 1]
-
Bishop M. Psychological acceptability revisited. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 1-11 [chapter 1]
-
(2005)
Security and usability
, pp. 1-11
-
-
Bishop, M.1
-
4
-
-
0036680961
-
Diffusion of e-commerce: an analysis of the adoption of four e-commerce activities
-
Eastin M. Diffusion of e-commerce: an analysis of the adoption of four e-commerce activities. Telematics and Informatics 19 3 (2002) 251-267
-
(2002)
Telematics and Informatics
, vol.19
, Issue.3
, pp. 251-267
-
-
Eastin, M.1
-
6
-
-
19944387279
-
Why users cannot use security
-
Furnell S. Why users cannot use security. Computers and Security 24 (2005) 274-279
-
(2005)
Computers and Security
, vol.24
, pp. 274-279
-
-
Furnell, S.1
-
7
-
-
33646488507
-
Two-factor authentication - a look behind the headlines
-
Henry P.A. Two-factor authentication - a look behind the headlines. Network Security 2006 4 (2006) 18-19
-
(2006)
Network Security
, vol.2006
, Issue.4
, pp. 18-19
-
-
Henry, P.A.1
-
9
-
-
28044434200
-
Current practice in measuring usability: challenges to usability studies and research
-
Hornbæk K. Current practice in measuring usability: challenges to usability studies and research. International Journal of Human-Computer Studies 64 2 (2006) 79-102
-
(2006)
International Journal of Human-Computer Studies
, vol.64
, Issue.2
, pp. 79-102
-
-
Hornbæk, K.1
-
10
-
-
35348895123
-
-
Hornbæk K, Law EL. Meta-analysis of correlations among usability measures, CHI 2007; 2007. pp. 617-626.
-
Hornbæk K, Law EL. Meta-analysis of correlations among usability measures, CHI 2007; 2007. pp. 617-626.
-
-
-
-
11
-
-
57849161156
-
-
International Organization for Standardization, ISO 9241-11. Ergonomic requirements for office work with visual display terminals (VDTs) part II: guidance on usability; 1998.
-
International Organization for Standardization, ISO 9241-11. Ergonomic requirements for office work with visual display terminals (VDTs) part II: guidance on usability; 1998.
-
-
-
-
15
-
-
34547240740
-
Usability design and evaluation for privacy and security solutions
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 4]
-
Karat C.M., Brodie C., and Karat J. Usability design and evaluation for privacy and security solutions. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 47-74 [chapter 4]
-
(2005)
Security and usability
, pp. 47-74
-
-
Karat, C.M.1
Brodie, C.2
Karat, J.3
-
17
-
-
39049096251
-
The price of love
-
Knight W. The price of love. Infosecurity 5 1 (2008) 30-33
-
(2008)
Infosecurity
, vol.5
, Issue.1
, pp. 30-33
-
-
Knight, W.1
-
18
-
-
0001581203
-
Research methods in human computer interaction
-
Helander M. (Ed), NorthHolland, Amsterdam
-
Landauer T.K. Research methods in human computer interaction. In: Helander M. (Ed). Handbook of human computer interaction (1988), NorthHolland, Amsterdam 905-928
-
(1988)
Handbook of human computer interaction
, pp. 905-928
-
-
Landauer, T.K.1
-
19
-
-
0018543411
-
Password security: a case history
-
Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
20
-
-
57849093282
-
-
Nielsen, J. Usability Engineering. Academic Press; 1993.
-
Nielsen, J. Usability Engineering. Academic Press; 1993.
-
-
-
-
21
-
-
84869147734
-
Building security and trust in online banking
-
ACM Press, New York, NY pp. 1701-04
-
Nilsson M., Adams A., and Herd S. Building security and trust in online banking. Extended abstracts on human factors in computing systems (CHI '05) (2005), ACM Press, New York, NY pp. 1701-04
-
(2005)
Extended abstracts on human factors in computing systems (CHI '05)
-
-
Nilsson, M.1
Adams, A.2
Herd, S.3
-
22
-
-
57849098926
-
Users and trust: a microsoft case study
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 29]
-
Nodder C. Users and trust: a microsoft case study. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 589-606 [chapter 29]
-
(2005)
Security and usability
, pp. 589-606
-
-
Nodder, C.1
-
24
-
-
10044293457
-
Comparing passwords, tokens and biometrics for user authentication
-
O'Gorman L. Comparing passwords, tokens and biometrics for user authentication. Proceedings of the IEEE 91 12 (2003) 2021-2040
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
25
-
-
55649094257
-
The usability of security devices
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 12]
-
Piazzalunga U., Savaneschi P., and Coffetti P. The usability of security devices. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 221-242 [chapter 12]
-
(2005)
Security and usability
, pp. 221-242
-
-
Piazzalunga, U.1
Savaneschi, P.2
Coffetti, P.3
-
26
-
-
0003486469
-
-
Addison-Wesley, Wokingham, UK:
-
Preece J., Rogers Y., Sharp H., Benyon D., Holland S., and Carey T. Human-computer interaction (1994), Addison-Wesley, Wokingham, UK:
-
(1994)
Human-computer interaction
-
-
Preece, J.1
Rogers, Y.2
Sharp, H.3
Benyon, D.4
Holland, S.5
Carey, T.6
-
27
-
-
57849106097
-
-
Available from: (accessed 31.01.07)
-
Ranger S. Chip and PIN heads for cyberspace, silicon.com financial services news, CNET networks, UK. Available from: (2005). http://www.silicon.com/financialservices/0,3800010322, 39152706,00.htm (accessed 31.01.07)
-
(2005)
Chip and PIN heads for cyberspace, silicon.com financial services news, CNET networks, UK
-
-
Ranger, S.1
-
28
-
-
25844505729
-
Securing online banking
-
Reavley N. Securing online banking. Card Technology Today 17 10 (2005) 12-13
-
(2005)
Card Technology Today
, vol.17
, Issue.10
, pp. 12-13
-
-
Reavley, N.1
-
29
-
-
35348885452
-
Evaluating authentication mechanisms
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 6]
-
Renaud K. Evaluating authentication mechanisms. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 103-128 [chapter 6]
-
(2005)
Security and usability
, pp. 103-128
-
-
Renaud, K.1
-
30
-
-
84950634257
-
-
Root RW, Draper S. Questionnaires as a software evaluation tool, CHI 83; 1983. pp. 83-7.
-
Root RW, Draper S. Questionnaires as a software evaluation tool, CHI 83; 1983. pp. 83-7.
-
-
-
-
31
-
-
35348863698
-
Usable security: why do we need it? how do we get it?
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 2]
-
Sasse M.A., and Flechais I. Usable security: why do we need it? how do we get it?. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 13-30 [chapter 2]
-
(2005)
Security and usability
, pp. 13-30
-
-
Sasse, M.A.1
Flechais, I.2
-
32
-
-
16444376120
-
Two-factor authentication: too little, too late
-
Schneier B. Two-factor authentication: too little, too late. Communications of the ACM 48 4 (2005) 136
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
, pp. 136
-
-
Schneier, B.1
-
33
-
-
0035149763
-
Usability and security: an appraisal of usability issues in information security methods
-
Schultz E.E., Proctor R.W., Lien M.-C., and Savendy G. Usability and security: an appraisal of usability issues in information security methods. Computers and Security 20 7 (2001) 620-634
-
(2001)
Computers and Security
, vol.20
, Issue.7
, pp. 620-634
-
-
Schultz, E.E.1
Proctor, R.W.2
Lien, M.-C.3
Savendy, G.4
-
36
-
-
0037394683
-
E-banking and customer preference in malaysia: an empirical investigation
-
Sohail M.S., and Shanmugham B. E-banking and customer preference in malaysia: an empirical investigation. Information Sciences 150 (2003) 207-217
-
(2003)
Information Sciences
, vol.150
, pp. 207-217
-
-
Sohail, M.S.1
Shanmugham, B.2
-
37
-
-
0141990195
-
The effects of information system user expectations on their performance and perceptions
-
Szajna B., and Scamell R.W. The effects of information system user expectations on their performance and perceptions. MIS Quarterly 17 4 (1993) 493-516
-
(1993)
MIS Quarterly
, vol.17
, Issue.4
, pp. 493-516
-
-
Szajna, B.1
Scamell, R.W.2
-
39
-
-
35348892019
-
Design for usability
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 3]
-
Tognazzini B. Design for usability. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 31-46 [chapter 3]
-
(2005)
Security and usability
, pp. 31-46
-
-
Tognazzini, B.1
-
40
-
-
33646586103
-
On the role of metaphor and language in design of third party payments in eBanking: usability and quality
-
Weir C.S., Anderson J.A., and Jack M.A. On the role of metaphor and language in design of third party payments in eBanking: usability and quality. International Journal of Human-Computer Studies 64 8 (2006) 771-785
-
(2006)
International Journal of Human-Computer Studies
, vol.64
, Issue.8
, pp. 771-785
-
-
Weir, C.S.1
Anderson, J.A.2
Jack, M.A.3
-
41
-
-
33846510483
-
Functionality and usability in design for eStatements in eBanking services
-
Weir C.S., McKay I., and Jack M.A. Functionality and usability in design for eStatements in eBanking services. Interacting with Computers 19 2 (2007) 241-256
-
(2007)
Interacting with Computers
, vol.19
, Issue.2
, pp. 241-256
-
-
Weir, C.S.1
McKay, I.2
Jack, M.A.3
-
42
-
-
34547294916
-
The memorability and security of passwords
-
Cranor, and Garfinkel (Eds), O'Reilly [chapter 7]
-
Yan J., Blackwell A., Anderson R., and Grant A. The memorability and security of passwords. In: Cranor, and Garfinkel (Eds). Security and usability (2005), O'Reilly 129-142 [chapter 7]
-
(2005)
Security and usability
, pp. 129-142
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
|