See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
H. Abdi and L.J. Williams (2010). Principal component analysis. Wiley interdisciplinary reviews: computational statistics, 2(4), pp.433-459.
L. Abdillah (2019, December). An Overview of Indonesian Fintech Application. In The First International Conference on Communication, Information Technology and Youth Study (ICITYS2019), Bayview Hotel Melaka, Melaka (Malacca), Malaysia.
A. Alarifi, M. Alsaleh, & N. Alomar (2017). A model for evaluating the security and usability of e-banking platforms. Computing, 99(5), 519-535.
D. Asli, L. Klapper, D. Singer, S. Ansar and J Hess, (2018), The Global Findex Database 2017: Measuring Financial Inclusion and the Fintech Revolution. Washington, DC: World Bank. doi:10.1596/978-1-4648-1259-0. License: Creative Commons Attribution CC BY 3.0 IGO.
Android, (2018). Android user interface development beginners guide, 2018. http://index-of.es/Android/Android.User.Interface.Development.Beginner.Guide.pdf. (Retrieved 22nd March 2021)
Apple, (2018). Human Interface guidelines. https://developer.apple.com/ios/human-interface-guidelines/overview/themes/, (Retrieved 22nd March 2021)
W. Bai, D. Kim, M. Namara, Y. Qian, P. G. Kelley, & M. L. Mazurek (2017). Balancing security and usability in encrypted email. IEEE Internet Computing, 21(3), 30-38.
A. Borrett (2021). Techmonitor, Covid-19 has increased cybersecurity risk to the fintech ecosystem, https://techmonitor.ai/technology/cybersecurity/cybersecurity-risk-fintech-ecosystem (Retrieved 26th April, 2021)
J. Brooke (1996). others,“SUS-A quick and dirty usability scale,” Usability Eval. Ind, 189, 4-7.
L. F. Cranor, & N. Buchler (2014). Better together: Usability and Security go hand in hand. IEEE Security & Privacy, 12(6), 89-93.
Enhancing Financial Innovation and Access (EFInA), (2020) FinTech Landscape and Impact Assessment Study
S. Eskandari, J. Clark, D. Barrera, & E. Stobert (2018). A first look at the usability of bitcoin key management. arXiv preprint arXiv:1802.04351.
S. Faily, & C. Iacob (2017, September). Design as code: Facilitating collaboration between Usability and Security engineers using cairis. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) (pp. 76-82). IEEE.
A. Ferreira, C. Rusu, & S. Roncagliolo (2009). Usability and Security patterns. In 2009 Second International Conferences on Advances in Computer-Human Interactions (pp. 301-305). IEEE.
D. Feth, & S. Polst (2019). Heuristics and models for evaluating the usability of security measures. In Proceedings of Mensch und Computer 2019 (pp. 275-285).
F. Gaehtgens, A. Allan, M. Zlotogorski, F. Buytendijk (2017). Definition: Digital Trust. Gartner research Published: 24 May 2017 ID: G00329409.
M. Glenny, (2021). Financial Times, Pandemic accelerates growth in cybercrime. https://www.ft.com/content/49b81b4e-367a-4be1-b7d6166230abc398?desktop=true&segmentId=d8d3e364-5197-20eb-17cf-2437841d178a#myft:notification:instant-email:content (Retrieved 29th April, 2021)
P. L. Gorski, & L. L. Iacono (2016). Towards the Usability Evaluation of Security APIs. In HAISA (pp. 252-265).
M. Green, & M. Smith (2016). Developers are not the enemy!: The need for usable security apis. IEEE Security & Privacy, 14(5), 40-46.
S. Hafenbrädl, D. Waeger, J. N. Marewski, & G. Gigerenzer (2016). Applied decision making with fast-and-frugal heuristics. Journal of Applied Research in Memory and Cognition, 5(2), 215-231.
R. Harrison, D. Flood, & D. Duce (2013). Usability of mobile applications: literature review and rationale for a new usability model. Journal of Interaction Science, 1(1), 1-16.
M High (2021). Monzo, Revolut and more - the rise of UK fintechs, https://www.fintechmagazine.com/venture-capital/monzo-revolut-and-more-rise-uk-fintechs (retrieved 8th May, 2021)
H. J. Hof (2015). User-centric IT security-how to design usable security mechanisms. arXiv preprint arXiv:1506.07167.
H. J. Hof (2015). Towards enhanced usability of it security mechanisms-how to design usable it security mechanisms using the example of email encryption. arXiv preprint arXiv:1506.06987.
C. Jiménez, C. Rusu, S. Roncagliolo, R. Inostroza, & V. Rusu (2012). Evaluating a methodology to establish usability heuristics. In 2012 31st International Conference of the Chilean Computer Science Society (pp. 51-59). IEEE.
R. Kainda, I. Flechais, & A. W. Roscoe (2010, February). Security and usability: Analysis and evaluation. In 2010 International Conference on Availability, Reliability and Security (pp. 275-282). IEEE.
H. Khan, U. Hengartner, & D. Vogel (2015). Usability and Security perceptions of implicit authentication: convenient, secure, sometimes annoying. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015) (pp. 225-239).
V Mani, (2019), Cybersecurity and Fintech at a Crossroads, ISACA Journal / Issues / 2019 / Volume 1
W. Melicher, D. Kurilova, S. M. Segreti, P. Kalvani, R. Shay, B. Ur,and M. L. Mazurek (2016). Usability and Security of text passwords on mobile devices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 527-539).
J. Nielsen (1992). Finding usability problems through heuristic evaluation. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 373-380).
N. Nurmuliani, D. Zowghi, & S. P. Williams (2004). Using card sorting technique to classify requirements change. In Proceedings. 12th IEEE International Requirements Engineering Conference, 2004. (pp. 240-248). IEEE.
J. R. Nurse, S. Creese, M. Goldsmith, & K. Lamberts (2011). Guidelines for usable cybersecurity: Past and present. In 2011 third international workshop on cyberspace safety and security (CSS) (pp. 21-26). IEEE.
OWASP Mobile Top 10, (2016) https://owasp.org/www-project-mobile-top-10/ (Retrieved 7th May, 2021 )
S. L. Pfleeger, M. A. Sasse, & A. Furnham (2014). From weakest link to security hero: Transforming staff security behavior. Journal of Homeland Security and Emergency Management, 11(4), 489-510.
D. Quiñones, & C. Rusu (2017). How to develop usability heuristics: A systematic literature review. Computer standards & interfaces, 53, 89-122.
P. C. Realpe, C. A. Collazos, J. Hurtado, & A. Granollers (2016). A set of heuristics for usable security and user authentication. In Proceedings of the XVII International Conference on Human Computer Interaction (pp. 1-8).
S. Saksonova, and I. Kuzmina-Merlino (2017). Fintech as financial innovation–The possibilities and problems of implementation.
M. A. Sasse, S. Brostoff, & D. Weirich (2001). Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT technology journal, 19(3), 122-131.
G. Schryen, G. Wagner, & A. Schlegel (2016). Development of two novel face-recognition CAPTCHAs: a security and usability study. Computers & Security, 60, 95-116.
A. Seffah, N. Kececi, & M. Donyaee (2001). QUIM: a framework for quantifying usability metrics in software quality models. In Proceedings Second Asia-Pacific Conference on Quality Software (pp. 311-318). IEEE.
M. Shetty, (2018), Banks warn of new mobile malware, 232 banking apps in danger. https://timesofindia.indiatimes.com/business/india-business/banks-warn-of-new-mobile-malware/articleshow/62436145.cms. (Retrieved May 12, 2018).
A. Sivaji, A. Abdullah, & A. G. Downe (2011). Usability testing methodology: Effectiveness of heuristic evaluation in E-government website development. In 2011 Fifth Asia Modelling Symposium (pp. 68-72). IEEE.
Usabilitest, (2018). https://www.usabilitest.com/. (Retrieved 31st August 2018)
E. Uzun, N. Saxena, & A. Kumar (2011). Pairing devices for social interactions: a comparative usability evaluation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2315-2324).
R. West, C. Mayhorn, J. Hardee, & J. Mendel (2009). The weakest link: A psychological perspective on why users make poor security decisions. In Social and Human elements of information security: Emerging Trends and countermeasures (pp. 43-60). IGI Global.
C. Wijayarathna, & N. A. G. Arachchilage (2019). Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API. Computers & Security, 80, 54-73.
A. Yeratziotis, D. Pottas, & D. Van Greunen (2012). A usable security heuristic evaluation for the online health social networking paradigm. International Journal of Human-Computer Interaction, 28(10), 678-694.
M. E. Zurko, & R. T. Simon (1996). User-centered security. In Proceedings of the 1996 workshop on New security paradigms (pp. 27-33).