메뉴 건너뛰기




Volumn 22, Issue 3, 2010, Pages 153-164

Usable security: User preferences for authentication methods in eBanking and the effects of experience

Author keywords

Authentication; Empirical evaluation; Experience; Internet banking; Usability engineering; Usable security

Indexed keywords

KNOWLEDGE BASED SYSTEMS; USABILITY ENGINEERING; USER EXPERIENCE;

EID: 77549083913     PISSN: 09535438     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.intcom.2009.10.001     Document Type: Article
Times cited : (91)

References (57)
  • 3
    • 0021470294 scopus 로고
    • User-friendly password methods for computer-mediated information systems
    • Barton B.F., and Barton M.S. User-friendly password methods for computer-mediated information systems. Computers and Security 3 3 (1984) 186-195
    • (1984) Computers and Security , vol.3 , Issue.3 , pp. 186-195
    • Barton, B.F.1    Barton, M.S.2
  • 4
    • 85106759493 scopus 로고    scopus 로고
    • ©BBC MMVII
    • accessed 27.05.07
    • ©BBC MMVII. (accessed 27.05.07).
    • (2007)
  • 5
    • 77549085216 scopus 로고    scopus 로고
    • Multifactor authentication: A blow to identity theft? Bank
    • February/March
    • Beaumier, C., 2006. Multifactor authentication: a blow to identity theft? Bank Accounting and Finance (February/March), 33-37.
    • (2006) Accounting and Finance , pp. 33-37
    • Beaumier, C.1
  • 6
    • 34948838524 scopus 로고    scopus 로고
    • Zone alarm: creating usable security products for consumers
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 26)
    • Berson J. Zone alarm: creating usable security products for consumers. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 563-575 (Chapter 26)
    • (2005) Security and Usability , pp. 563-575
    • Berson, J.1
  • 7
    • 2342598277 scopus 로고    scopus 로고
    • Computer security impaired by legitimate users
    • Besnard D., and Arief B. Computer security impaired by legitimate users. Computers and Security 23 3 (2004) 253-264
    • (2004) Computers and Security , vol.23 , Issue.3 , pp. 253-264
    • Besnard, D.1    Arief, B.2
  • 8
    • 34547269590 scopus 로고    scopus 로고
    • Psychological acceptability revisited
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 1)
    • Bishop M. Psychological acceptability revisited. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 1-11 (Chapter 1)
    • (2005) Security and Usability , pp. 1-11
    • Bishop, M.1
  • 11
    • 58949085848 scopus 로고    scopus 로고
    • eCommerce fraud - time to act
    • Brunswick S. eCommerce fraud - time to act. Card Technology Today 21 1 (2009) 12-13
    • (2009) Card Technology Today , vol.21 , Issue.1 , pp. 12-13
    • Brunswick, S.1
  • 12
    • 3042706284 scopus 로고    scopus 로고
    • Adoption of Internet services in the acceding and candidate countries, lessons from the Internet banking case
    • Centeno C. Adoption of Internet services in the acceding and candidate countries, lessons from the Internet banking case. Telematics and Informatics 21 4 (2004) 293-315
    • (2004) Telematics and Informatics , vol.21 , Issue.4 , pp. 293-315
    • Centeno, C.1
  • 15
    • 33646687062 scopus 로고    scopus 로고
    • ACM Press pp. 41-44
    • DeWitt A.J., and Kuljis J. Is usable security an oxymoron?. Interactions vol. 13 (3) (2006), ACM Press pp. 41-44
    • (2006) Interactions , vol.13 3
    • DeWitt, A.J.1    Kuljis, J.2
  • 16
  • 18
    • 19944387279 scopus 로고    scopus 로고
    • Why users cannot use security
    • Furnell S. Why users cannot use security. Computers and Security 24 (2005) 274-279
    • (2005) Computers and Security , vol.24 , pp. 274-279
    • Furnell, S.1
  • 19
    • 39749090106 scopus 로고    scopus 로고
    • A comparison of website user authentication mechanisms
    • Furnell S. A comparison of website user authentication mechanisms. Computer Fraud and Security 2007 9 (2007) 5-9
    • (2007) Computer Fraud and Security , vol.2007 , Issue.9 , pp. 5-9
    • Furnell, S.1
  • 22
    • 33646488507 scopus 로고    scopus 로고
    • Two-factor authentication - a look behind the headlines
    • Henry P.A. Two-factor authentication - a look behind the headlines. Network Security 2006 4 (2006) 18-19
    • (2006) Network Security , vol.2006 , Issue.4 , pp. 18-19
    • Henry, P.A.1
  • 29
    • 34547240740 scopus 로고    scopus 로고
    • Usability design and evaluation for privacy and security solutions
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 4)
    • Karat C.M., Brodie C., and Karat J. Usability design and evaluation for privacy and security solutions. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 47-74 (Chapter 4)
    • (2005) Security and Usability , pp. 47-74
    • Karat, C.M.1    Brodie, C.2    Karat, J.3
  • 30
    • 34547894076 scopus 로고    scopus 로고
    • Understanding consumer adoption of internet banking: an interpretive study in the Australian banking context
    • Lichtenstein S., and Williamson K. Understanding consumer adoption of internet banking: an interpretive study in the Australian banking context. Journal of Electronic Commerce Research 7 2 (2006) 50-66
    • (2006) Journal of Electronic Commerce Research , vol.7 , Issue.2 , pp. 50-66
    • Lichtenstein, S.1    Williamson, K.2
  • 31
    • 0001859044 scopus 로고
    • A technique for the measurement of attitudes
    • Likert R. A technique for the measurement of attitudes. Archives of Psychology 22 140 (1932) 5-55
    • (1932) Archives of Psychology , vol.22 , Issue.140 , pp. 5-55
    • Likert, R.1
  • 32
    • 34948847234 scopus 로고    scopus 로고
    • Simple desktop security with chameleon
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 17)
    • Long A.C., and Moskowitz C. Simple desktop security with chameleon. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 335-356 (Chapter 17)
    • (2005) Security and Usability , pp. 335-356
    • Long, A.C.1    Moskowitz, C.2
  • 33
    • 0018543411 scopus 로고
    • Password security: a case history
    • Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 594-597
    • Morris, R.1    Thompson, K.2
  • 35
    • 57849098926 scopus 로고    scopus 로고
    • Users and trust: a Microsoft case study
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 29)
    • Nodder C. Users and trust: a Microsoft case study. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 589-606 (Chapter 29)
    • (2005) Security and Usability , pp. 589-606
    • Nodder, C.1
  • 36
    • 10044293457 scopus 로고    scopus 로고
    • Comparing passwords, tokens and biometrics for user authentication
    • O'Gorman L. Comparing passwords, tokens and biometrics for user authentication. Proceedings of the IEEE 91 12 (2003) 2021-2040
    • (2003) Proceedings of the IEEE , vol.91 , Issue.12 , pp. 2021-2040
    • O'Gorman, L.1
  • 37
    • 55649094257 scopus 로고    scopus 로고
    • The usability of security devices
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 12)
    • Piazzalunga U., Savaneschi P., and Coffetti P. The usability of security devices. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 221-242 (Chapter 12)
    • (2005) Security and Usability , pp. 221-242
    • Piazzalunga, U.1    Savaneschi, P.2    Coffetti, P.3
  • 38
    • 77549083414 scopus 로고    scopus 로고
    • Ranger, S., 2005. Chip and PIN heads for Cyberspace. Silicon.com Financial Services News, CNET Networks, UK. (accessed 31.01.07).
    • Ranger, S., 2005. Chip and PIN heads for Cyberspace. Silicon.com Financial Services News, CNET Networks, UK. (accessed 31.01.07).
  • 39
    • 25844505729 scopus 로고    scopus 로고
    • Securing online banking
    • Reavley N. Securing online banking. Card Technology Today 17 10 (2005) 12-13
    • (2005) Card Technology Today , vol.17 , Issue.10 , pp. 12-13
    • Reavley, N.1
  • 40
    • 35348885452 scopus 로고    scopus 로고
    • Evaluating authentication mechanisms
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 6)
    • Renaud K. Evaluating authentication mechanisms. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 103-128 (Chapter 6)
    • (2005) Security and Usability , pp. 103-128
    • Renaud, K.1
  • 41
    • 35348863698 scopus 로고    scopus 로고
    • Usable security: why do we need it? How do we get it?
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 2)
    • Sasse M.A., and Flechais I. Usable security: why do we need it? How do we get it?. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 13-30 (Chapter 2)
    • (2005) Security and Usability , pp. 13-30
    • Sasse, M.A.1    Flechais, I.2
  • 42
    • 0035387175 scopus 로고    scopus 로고
    • Transforming the 'Weakest Link' - a human/computer interaction approach to usable and effective security
    • Sasse M.A., Brostoff S., and Weirich D. Transforming the 'Weakest Link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19 3 (2001) 122-131
    • (2001) BT Technology Journal , vol.19 , Issue.3 , pp. 122-131
    • Sasse, M.A.1    Brostoff, S.2    Weirich, D.3
  • 44
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: too little, too late
    • Schneier B. Two-factor authentication: too little, too late. Communications of the ACM 48 4 (2005) 136
    • (2005) Communications of the ACM , vol.48 , Issue.4 , pp. 136
    • Schneier, B.1
  • 45
    • 0035149763 scopus 로고    scopus 로고
    • Usability and security: an appraisal of usability issues in information security methods
    • Schultz E.E., Proctor R.W., Lien M.-C., and Savendy G. Usability and security: an appraisal of usability issues in information security methods. Computers and Security 20 7 (2001) 620-634
    • (2001) Computers and Security , vol.20 , Issue.7 , pp. 620-634
    • Schultz, E.E.1    Proctor, R.W.2    Lien, M.-C.3    Savendy, G.4
  • 46
    • 24344471085 scopus 로고    scopus 로고
    • The TIPPI point: towards trustworthy interfaces
    • Sinclair S., and Smith S.W. The TIPPI point: towards trustworthy interfaces. IEEE Security and Privacy July/August (2005) 68-71
    • (2005) IEEE Security and Privacy , Issue.July-August , pp. 68-71
    • Sinclair, S.1    Smith, S.W.2
  • 47
    • 0038226921 scopus 로고    scopus 로고
    • Moving from the design of usable security technologies to the design of useful secure applications
    • ACM Press
    • Smetters D.K., and Grinter R.E. Moving from the design of usable security technologies to the design of useful secure applications. ACM Workshop: New Security Paradigms Workshop (2002), ACM Press 82-89
    • (2002) ACM Workshop: New Security Paradigms Workshop , pp. 82-89
    • Smetters, D.K.1    Grinter, R.E.2
  • 48
    • 35348892019 scopus 로고    scopus 로고
    • Design for usability
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 3)
    • Tognazzini B. Design for usability. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 31-46 (Chapter 3)
    • (2005) Security and Usability , pp. 31-46
    • Tognazzini, B.1
  • 50
    • 84967376684 scopus 로고    scopus 로고
    • ACM Press pp. 40-50
    • Viega J. Security - problem solved?. Queue vol. 3 (5) (2005), ACM Press pp. 40-50
    • (2005) Queue , vol.3 5
    • Viega, J.1
  • 51
    • 33646586103 scopus 로고    scopus 로고
    • On the role of metaphor and language in design of third party payments in eBanking: usability and quality
    • Weir C.S., Anderson J.A., and Jack M.A. On the role of metaphor and language in design of third party payments in eBanking: usability and quality. International Journal of Human-Computer Studies 64 8 (2006) 771-785
    • (2006) International Journal of Human-Computer Studies , vol.64 , Issue.8 , pp. 771-785
    • Weir, C.S.1    Anderson, J.A.2    Jack, M.A.3
  • 52
    • 33846510483 scopus 로고    scopus 로고
    • Functionality and usability in design for eStatements in eBanking services
    • Weir C.S., McKay I., and Jack M.A. Functionality and usability in design for eStatements in eBanking services. Interacting with Computers 19 2 (2007) 241-256
    • (2007) Interacting with Computers , vol.19 , Issue.2 , pp. 241-256
    • Weir, C.S.1    McKay, I.2    Jack, M.A.3
  • 53
    • 57849096551 scopus 로고    scopus 로고
    • User perceptions of security, convenience and usability for eBanking authentication tokens
    • Weir C.S., Douglas G., Carruthers M., and Jack M.A. User perceptions of security, convenience and usability for eBanking authentication tokens. Computers and Security 28 (2009) 47-62
    • (2009) Computers and Security , vol.28 , pp. 47-62
    • Weir, C.S.1    Douglas, G.2    Carruthers, M.3    Jack, M.A.4
  • 54
    • 0242708745 scopus 로고    scopus 로고
    • Pretty good persuasion: a first step towards effective password security in the real world
    • ACM Press, New York
    • Weirich D., and Sasse M.A. Pretty good persuasion: a first step towards effective password security in the real world. Proceedings of the 2001 Workshop on New Security Paradigms (NSPW '01) (2001), ACM Press, New York 137-143
    • (2001) Proceedings of the 2001 Workshop on New Security Paradigms (NSPW '01) , pp. 137-143
    • Weirich, D.1    Sasse, M.A.2
  • 55
    • 34547294916 scopus 로고    scopus 로고
    • The memorability and security of passwords
    • Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 7)
    • Yan J., Blackwell A., Anderson R., and Grant A. The memorability and security of passwords. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 129-142 (Chapter 7)
    • (2005) Security and Usability , pp. 129-142
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 56
    • 0025545602 scopus 로고
    • Cognitive passwords: the key to easy access control
    • Zviran M., and Haga W.J. Cognitive passwords: the key to easy access control. Computers and Security 9 8 (1990) 723-736
    • (1990) Computers and Security , vol.9 , Issue.8 , pp. 723-736
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.