-
2
-
-
84871201016
-
An experimental investigation of the usability of transaction authorization in online bank security systems
-
AlZomai, M., AlFayyadh, B., Jsang, A., McCullagh, A., 2008. An experimental investigation of the usability of transaction authorization in online bank security systems. In: Proceedings of the Australasian Information Security Conference (AISC'08), pp. 65-73.
-
(2008)
Proceedings of the Australasian Information Security Conference (AISC'08)
, pp. 65-73
-
-
AlZomai, M.1
AlFayyadh, B.2
Jsang, A.3
McCullagh, A.4
-
3
-
-
0021470294
-
User-friendly password methods for computer-mediated information systems
-
Barton B.F., and Barton M.S. User-friendly password methods for computer-mediated information systems. Computers and Security 3 3 (1984) 186-195
-
(1984)
Computers and Security
, vol.3
, Issue.3
, pp. 186-195
-
-
Barton, B.F.1
Barton, M.S.2
-
4
-
-
85106759493
-
©BBC MMVII
-
accessed 27.05.07
-
©BBC MMVII. (accessed 27.05.07).
-
(2007)
-
-
-
5
-
-
77549085216
-
Multifactor authentication: A blow to identity theft? Bank
-
February/March
-
Beaumier, C., 2006. Multifactor authentication: a blow to identity theft? Bank Accounting and Finance (February/March), 33-37.
-
(2006)
Accounting and Finance
, pp. 33-37
-
-
Beaumier, C.1
-
6
-
-
34948838524
-
Zone alarm: creating usable security products for consumers
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 26)
-
Berson J. Zone alarm: creating usable security products for consumers. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 563-575 (Chapter 26)
-
(2005)
Security and Usability
, pp. 563-575
-
-
Berson, J.1
-
7
-
-
2342598277
-
Computer security impaired by legitimate users
-
Besnard D., and Arief B. Computer security impaired by legitimate users. Computers and Security 23 3 (2004) 253-264
-
(2004)
Computers and Security
, vol.23
, Issue.3
, pp. 253-264
-
-
Besnard, D.1
Arief, B.2
-
8
-
-
34547269590
-
Psychological acceptability revisited
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 1)
-
Bishop M. Psychological acceptability revisited. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 1-11 (Chapter 1)
-
(2005)
Security and Usability
, pp. 1-11
-
-
Bishop, M.1
-
10
-
-
7744227917
-
-
Brown A.S., Bracken E., Zoccoli S., and Douglas K. Applied Cognitive Psychology 18 6 (2004) 641-651
-
(2004)
Applied Cognitive Psychology
, vol.18
, Issue.6
, pp. 641-651
-
-
Brown, A.S.1
Bracken, E.2
Zoccoli, S.3
Douglas, K.4
-
11
-
-
58949085848
-
eCommerce fraud - time to act
-
Brunswick S. eCommerce fraud - time to act. Card Technology Today 21 1 (2009) 12-13
-
(2009)
Card Technology Today
, vol.21
, Issue.1
, pp. 12-13
-
-
Brunswick, S.1
-
12
-
-
3042706284
-
Adoption of Internet services in the acceding and candidate countries, lessons from the Internet banking case
-
Centeno C. Adoption of Internet services in the acceding and candidate countries, lessons from the Internet banking case. Telematics and Informatics 21 4 (2004) 293-315
-
(2004)
Telematics and Informatics
, vol.21
, Issue.4
, pp. 293-315
-
-
Centeno, C.1
-
13
-
-
0042585203
-
On the security of today's online electronic banking systems
-
Claessens J., Dem V., De Cock D., Preneel B., and Vandewalle J. On the security of today's online electronic banking systems. Computers and Security 21 3 (2002) 253-265
-
(2002)
Computers and Security
, vol.21
, Issue.3
, pp. 253-265
-
-
Claessens, J.1
Dem, V.2
De Cock, D.3
Preneel, B.4
Vandewalle, J.5
-
15
-
-
33646687062
-
-
ACM Press pp. 41-44
-
DeWitt A.J., and Kuljis J. Is usable security an oxymoron?. Interactions vol. 13 (3) (2006), ACM Press pp. 41-44
-
(2006)
Interactions
, vol.13 3
-
-
DeWitt, A.J.1
Kuljis, J.2
-
18
-
-
19944387279
-
Why users cannot use security
-
Furnell S. Why users cannot use security. Computers and Security 24 (2005) 274-279
-
(2005)
Computers and Security
, vol.24
, pp. 274-279
-
-
Furnell, S.1
-
19
-
-
39749090106
-
A comparison of website user authentication mechanisms
-
Furnell S. A comparison of website user authentication mechanisms. Computer Fraud and Security 2007 9 (2007) 5-9
-
(2007)
Computer Fraud and Security
, vol.2007
, Issue.9
, pp. 5-9
-
-
Furnell, S.1
-
20
-
-
34250729756
-
Password management strategies for online accounts
-
ACM Press, New York, NY
-
Gaw S., and Felten E.W. Password management strategies for online accounts. Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS '06) vol. 149 (2006), ACM Press, New York, NY 44-55
-
(2006)
Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS '06)
, vol.149
, pp. 44-55
-
-
Gaw, S.1
Felten, E.W.2
-
22
-
-
33646488507
-
Two-factor authentication - a look behind the headlines
-
Henry P.A. Two-factor authentication - a look behind the headlines. Network Security 2006 4 (2006) 18-19
-
(2006)
Network Security
, vol.2006
, Issue.4
, pp. 18-19
-
-
Henry, P.A.1
-
29
-
-
34547240740
-
Usability design and evaluation for privacy and security solutions
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 4)
-
Karat C.M., Brodie C., and Karat J. Usability design and evaluation for privacy and security solutions. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 47-74 (Chapter 4)
-
(2005)
Security and Usability
, pp. 47-74
-
-
Karat, C.M.1
Brodie, C.2
Karat, J.3
-
30
-
-
34547894076
-
Understanding consumer adoption of internet banking: an interpretive study in the Australian banking context
-
Lichtenstein S., and Williamson K. Understanding consumer adoption of internet banking: an interpretive study in the Australian banking context. Journal of Electronic Commerce Research 7 2 (2006) 50-66
-
(2006)
Journal of Electronic Commerce Research
, vol.7
, Issue.2
, pp. 50-66
-
-
Lichtenstein, S.1
Williamson, K.2
-
31
-
-
0001859044
-
A technique for the measurement of attitudes
-
Likert R. A technique for the measurement of attitudes. Archives of Psychology 22 140 (1932) 5-55
-
(1932)
Archives of Psychology
, vol.22
, Issue.140
, pp. 5-55
-
-
Likert, R.1
-
32
-
-
34948847234
-
Simple desktop security with chameleon
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 17)
-
Long A.C., and Moskowitz C. Simple desktop security with chameleon. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 335-356 (Chapter 17)
-
(2005)
Security and Usability
, pp. 335-356
-
-
Long, A.C.1
Moskowitz, C.2
-
33
-
-
0018543411
-
Password security: a case history
-
Morris R., and Thompson K. Password security: a case history. Communications of the ACM 22 11 (1979) 594-597
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 594-597
-
-
Morris, R.1
Thompson, K.2
-
35
-
-
57849098926
-
Users and trust: a Microsoft case study
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 29)
-
Nodder C. Users and trust: a Microsoft case study. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 589-606 (Chapter 29)
-
(2005)
Security and Usability
, pp. 589-606
-
-
Nodder, C.1
-
36
-
-
10044293457
-
Comparing passwords, tokens and biometrics for user authentication
-
O'Gorman L. Comparing passwords, tokens and biometrics for user authentication. Proceedings of the IEEE 91 12 (2003) 2021-2040
-
(2003)
Proceedings of the IEEE
, vol.91
, Issue.12
, pp. 2021-2040
-
-
O'Gorman, L.1
-
37
-
-
55649094257
-
The usability of security devices
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 12)
-
Piazzalunga U., Savaneschi P., and Coffetti P. The usability of security devices. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 221-242 (Chapter 12)
-
(2005)
Security and Usability
, pp. 221-242
-
-
Piazzalunga, U.1
Savaneschi, P.2
Coffetti, P.3
-
38
-
-
77549083414
-
-
Ranger, S., 2005. Chip and PIN heads for Cyberspace. Silicon.com Financial Services News, CNET Networks, UK. (accessed 31.01.07).
-
Ranger, S., 2005. Chip and PIN heads for Cyberspace. Silicon.com Financial Services News, CNET Networks, UK. (accessed 31.01.07).
-
-
-
-
39
-
-
25844505729
-
Securing online banking
-
Reavley N. Securing online banking. Card Technology Today 17 10 (2005) 12-13
-
(2005)
Card Technology Today
, vol.17
, Issue.10
, pp. 12-13
-
-
Reavley, N.1
-
40
-
-
35348885452
-
Evaluating authentication mechanisms
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 6)
-
Renaud K. Evaluating authentication mechanisms. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 103-128 (Chapter 6)
-
(2005)
Security and Usability
, pp. 103-128
-
-
Renaud, K.1
-
41
-
-
35348863698
-
Usable security: why do we need it? How do we get it?
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 2)
-
Sasse M.A., and Flechais I. Usable security: why do we need it? How do we get it?. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 13-30 (Chapter 2)
-
(2005)
Security and Usability
, pp. 13-30
-
-
Sasse, M.A.1
Flechais, I.2
-
42
-
-
0035387175
-
Transforming the 'Weakest Link' - a human/computer interaction approach to usable and effective security
-
Sasse M.A., Brostoff S., and Weirich D. Transforming the 'Weakest Link' - a human/computer interaction approach to usable and effective security. BT Technology Journal 19 3 (2001) 122-131
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
44
-
-
16444376120
-
Two-factor authentication: too little, too late
-
Schneier B. Two-factor authentication: too little, too late. Communications of the ACM 48 4 (2005) 136
-
(2005)
Communications of the ACM
, vol.48
, Issue.4
, pp. 136
-
-
Schneier, B.1
-
45
-
-
0035149763
-
Usability and security: an appraisal of usability issues in information security methods
-
Schultz E.E., Proctor R.W., Lien M.-C., and Savendy G. Usability and security: an appraisal of usability issues in information security methods. Computers and Security 20 7 (2001) 620-634
-
(2001)
Computers and Security
, vol.20
, Issue.7
, pp. 620-634
-
-
Schultz, E.E.1
Proctor, R.W.2
Lien, M.-C.3
Savendy, G.4
-
46
-
-
24344471085
-
The TIPPI point: towards trustworthy interfaces
-
Sinclair S., and Smith S.W. The TIPPI point: towards trustworthy interfaces. IEEE Security and Privacy July/August (2005) 68-71
-
(2005)
IEEE Security and Privacy
, Issue.July-August
, pp. 68-71
-
-
Sinclair, S.1
Smith, S.W.2
-
47
-
-
0038226921
-
Moving from the design of usable security technologies to the design of useful secure applications
-
ACM Press
-
Smetters D.K., and Grinter R.E. Moving from the design of usable security technologies to the design of useful secure applications. ACM Workshop: New Security Paradigms Workshop (2002), ACM Press 82-89
-
(2002)
ACM Workshop: New Security Paradigms Workshop
, pp. 82-89
-
-
Smetters, D.K.1
Grinter, R.E.2
-
48
-
-
35348892019
-
Design for usability
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 3)
-
Tognazzini B. Design for usability. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 31-46 (Chapter 3)
-
(2005)
Security and Usability
, pp. 31-46
-
-
Tognazzini, B.1
-
49
-
-
33748916060
-
Usability evaluation of multi-modal biometric verification systems
-
Toledano D.T., Fernandez Pozo R., Hernandez Trapote A., and Hernandez Gomez L. Usability evaluation of multi-modal biometric verification systems. Interacting with Computers 18 5 (2006) 1101-1122
-
(2006)
Interacting with Computers
, vol.18
, Issue.5
, pp. 1101-1122
-
-
Toledano, D.T.1
Fernandez Pozo, R.2
Hernandez Trapote, A.3
Hernandez Gomez, L.4
-
50
-
-
84967376684
-
-
ACM Press pp. 40-50
-
Viega J. Security - problem solved?. Queue vol. 3 (5) (2005), ACM Press pp. 40-50
-
(2005)
Queue
, vol.3 5
-
-
Viega, J.1
-
51
-
-
33646586103
-
On the role of metaphor and language in design of third party payments in eBanking: usability and quality
-
Weir C.S., Anderson J.A., and Jack M.A. On the role of metaphor and language in design of third party payments in eBanking: usability and quality. International Journal of Human-Computer Studies 64 8 (2006) 771-785
-
(2006)
International Journal of Human-Computer Studies
, vol.64
, Issue.8
, pp. 771-785
-
-
Weir, C.S.1
Anderson, J.A.2
Jack, M.A.3
-
52
-
-
33846510483
-
Functionality and usability in design for eStatements in eBanking services
-
Weir C.S., McKay I., and Jack M.A. Functionality and usability in design for eStatements in eBanking services. Interacting with Computers 19 2 (2007) 241-256
-
(2007)
Interacting with Computers
, vol.19
, Issue.2
, pp. 241-256
-
-
Weir, C.S.1
McKay, I.2
Jack, M.A.3
-
53
-
-
57849096551
-
User perceptions of security, convenience and usability for eBanking authentication tokens
-
Weir C.S., Douglas G., Carruthers M., and Jack M.A. User perceptions of security, convenience and usability for eBanking authentication tokens. Computers and Security 28 (2009) 47-62
-
(2009)
Computers and Security
, vol.28
, pp. 47-62
-
-
Weir, C.S.1
Douglas, G.2
Carruthers, M.3
Jack, M.A.4
-
55
-
-
34547294916
-
The memorability and security of passwords
-
Cranor L.F., and Garfinkel S. (Eds), O'Reilly (Chapter 7)
-
Yan J., Blackwell A., Anderson R., and Grant A. The memorability and security of passwords. In: Cranor L.F., and Garfinkel S. (Eds). Security and Usability (2005), O'Reilly 129-142 (Chapter 7)
-
(2005)
Security and Usability
, pp. 129-142
-
-
Yan, J.1
Blackwell, A.2
Anderson, R.3
Grant, A.4
-
56
-
-
0025545602
-
Cognitive passwords: the key to easy access control
-
Zviran M., and Haga W.J. Cognitive passwords: the key to easy access control. Computers and Security 9 8 (1990) 723-736
-
(1990)
Computers and Security
, vol.9
, Issue.8
, pp. 723-736
-
-
Zviran, M.1
Haga, W.J.2
|