1,944
views
0
recommends
+1 Recommend
1 collections
    0
    shares

      UK Computing Summit 2025: Navigating change (surviving and beyond) - 29-30 April @ Sheffield Hallam University - Register here.

      scite_
      0
      0
      0
      0
      Smart Citations
      0
      0
      0
      0
      Citing PublicationsSupportingMentioningContrasting
      View Citations

      See how this article has been cited at scite.ai

      scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.

       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Development of Usable Security Heuristics for Fintech

      Published
      proceedings-article
      , ,
      34th British HCI Conference (HCI2021)
      Post-pandemic HCI – Living Digitally
      20th - 21st July 2021
      Usable Security, Fintech, Heuristics, Cybersecurity, Usability
      Bookmark

            Abstract

            Content

            Author and article information

            Contributors
            Conference
            July 2021
            July 2021
            : 121-132
            Affiliations
            [0001]Bournemouth University

            Poole, Dorset, UK
            Article
            10.14236/ewic/HCI2021.12
            e6050018-2d91-486c-b053-6a29f742bfb4
            © Ambore et al. Published by BCS Learning & Development Ltd. Proceedings of the BCS 34th British HCI Conference 2021, UK

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            34th British HCI Conference
            HCI2021
            34
            London, UK
            20th - 21st July 2021
            Electronic Workshops in Computing (eWiC)
            Post-pandemic HCI – Living Digitally
            History
            Product

            1477-9358 BCS Learning & Development

            Self URI (article page): https://www.scienceopen.com/hosted-document?doi=10.14236/ewic/HCI2021.12
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            Applied computer science,Computer science,Security & Cryptology,Graphics & Multimedia design,General computer science,Human-computer-interaction
            Fintech,Heuristics,Usable Security,Usability,Cybersecurity

            REFERENCES

            1. and (2010). Principal component analysis. Wiley interdisciplinary reviews: computational statistics, 2(4), pp.433-459.

            2. (2019, December). An Overview of Indonesian Fintech Application. In The First International Conference on Communication, Information Technology and Youth Study (ICITYS2019), Bayview Hotel Melaka, Melaka (Malacca), Malaysia.

            3. , , & (2017). A model for evaluating the security and usability of e-banking platforms. Computing, 99(5), 519-535.

            4. , , , and , (2018), The Global Findex Database 2017: Measuring Financial Inclusion and the Fintech Revolution. Washington, DC: World Bank. doi:10.1596/978-1-4648-1259-0. License: Creative Commons Attribution CC BY 3.0 IGO.

            5. Android, (2018). Android user interface development beginners guide, 2018. http://index-of.es/Android/Android.User.Interface.Development.Beginner.Guide.pdf. (Retrieved 22nd March 2021)

            6. Apple, (2018). Human Interface guidelines. https://developer.apple.com/ios/human-interface-guidelines/overview/themes/, (Retrieved 22nd March 2021)

            7. , , , , , & (2017). Balancing security and usability in encrypted email. IEEE Internet Computing, 21(3), 30-38.

            8. (2021). Techmonitor, Covid-19 has increased cybersecurity risk to the fintech ecosystem, https://techmonitor.ai/technology/cybersecurity/cybersecurity-risk-fintech-ecosystem (Retrieved 26th April, 2021)

            9. (1996). others,“SUS-A quick and dirty usability scale,” Usability Eval. Ind, 189, 4-7.

            10. , & (2014). Better together: Usability and Security go hand in hand. IEEE Security & Privacy, 12(6), 89-93.

            11. Enhancing Financial Innovation and Access (EFInA), (2020) FinTech Landscape and Impact Assessment Study

            12. , , , & (2018). A first look at the usability of bitcoin key management. arXiv preprint arXiv:1802.04351.

            13. , & (2017, September). Design as code: Facilitating collaboration between Usability and Security engineers using cairis. In 2017 IEEE 25th International Requirements Engineering Conference Workshops (REW) (pp. 76-82). IEEE.

            14. , , & (2009). Usability and Security patterns. In 2009 Second International Conferences on Advances in Computer-Human Interactions (pp. 301-305). IEEE.

            15. , & (2019). Heuristics and models for evaluating the usability of security measures. In Proceedings of Mensch und Computer 2019 (pp. 275-285).

            16. , , , (2017). Definition: Digital Trust. Gartner research Published: 24 May 2017 ID: G00329409.

            17. , (2021). Financial Times, Pandemic accelerates growth in cybercrime. https://www.ft.com/content/49b81b4e-367a-4be1-b7d6166230abc398?desktop=true&segmentId=d8d3e364-5197-20eb-17cf-2437841d178a#myft:notification:instant-email:content (Retrieved 29th April, 2021)

            18. , & (2016). Towards the Usability Evaluation of Security APIs. In HAISA (pp. 252-265).

            19. , & (2016). Developers are not the enemy!: The need for usable security apis. IEEE Security & Privacy, 14(5), 40-46.

            20. , , , & (2016). Applied decision making with fast-and-frugal heuristics. Journal of Applied Research in Memory and Cognition, 5(2), 215-231.

            21. , , & (2013). Usability of mobile applications: literature review and rationale for a new usability model. Journal of Interaction Science, 1(1), 1-16.

            22. (2021). Monzo, Revolut and more - the rise of UK fintechs, https://www.fintechmagazine.com/venture-capital/monzo-revolut-and-more-rise-uk-fintechs (retrieved 8th May, 2021)

            23. (2015). User-centric IT security-how to design usable security mechanisms. arXiv preprint arXiv:1506.07167.

            24. (2015). Towards enhanced usability of it security mechanisms-how to design usable it security mechanisms using the example of email encryption. arXiv preprint arXiv:1506.06987.

            25. , , , , & (2012). Evaluating a methodology to establish usability heuristics. In 2012 31st International Conference of the Chilean Computer Science Society (pp. 51-59). IEEE.

            26. , , & (2010, February). Security and usability: Analysis and evaluation. In 2010 International Conference on Availability, Reliability and Security (pp. 275-282). IEEE.

            27. , , & (2015). Usability and Security perceptions of implicit authentication: convenient, secure, sometimes annoying. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015) (pp. 225-239).

            28. , (2019), Cybersecurity and Fintech at a Crossroads, ISACA Journal / Issues / 2019 / Volume 1

            29. , , , , , ,and (2016). Usability and Security of text passwords on mobile devices. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (pp. 527-539).

            30. (1992). Finding usability problems through heuristic evaluation. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 373-380).

            31. , , & (2004). Using card sorting technique to classify requirements change. In Proceedings. 12th IEEE International Requirements Engineering Conference, 2004. (pp. 240-248). IEEE.

            32. , , , & (2011). Guidelines for usable cybersecurity: Past and present. In 2011 third international workshop on cyberspace safety and security (CSS) (pp. 21-26). IEEE.

            33. OWASP Mobile Top 10, (2016) https://owasp.org/www-project-mobile-top-10/ (Retrieved 7th May, 2021 )

            34. , , & (2014). From weakest link to security hero: Transforming staff security behavior. Journal of Homeland Security and Emergency Management, 11(4), 489-510.

            35. , & (2017). How to develop usability heuristics: A systematic literature review. Computer standards & interfaces, 53, 89-122.

            36. , , , & (2016). A set of heuristics for usable security and user authentication. In Proceedings of the XVII International Conference on Human Computer Interaction (pp. 1-8).

            37. , and (2017). Fintech as financial innovation–The possibilities and problems of implementation.

            38. , , & (2001). Transforming the ‘weakest link’—a human/computer interaction approach to usable and effective security. BT technology journal, 19(3), 122-131.

            39. , , & (2016). Development of two novel face-recognition CAPTCHAs: a security and usability study. Computers & Security, 60, 95-116.

            40. , , & (2001). QUIM: a framework for quantifying usability metrics in software quality models. In Proceedings Second Asia-Pacific Conference on Quality Software (pp. 311-318). IEEE.

            41. , (2018), Banks warn of new mobile malware, 232 banking apps in danger. https://timesofindia.indiatimes.com/business/india-business/banks-warn-of-new-mobile-malware/articleshow/62436145.cms. (Retrieved May 12, 2018).

            42. , , & (2011). Usability testing methodology: Effectiveness of heuristic evaluation in E-government website development. In 2011 Fifth Asia Modelling Symposium (pp. 68-72). IEEE.

            43. Usabilitest, (2018). https://www.usabilitest.com/. (Retrieved 31st August 2018)

            44. , , & (2011). Pairing devices for social interactions: a comparative usability evaluation. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 2315-2324).

            45. , , , & (2009). The weakest link: A psychological perspective on why users make poor security decisions. In Social and Human elements of information security: Emerging Trends and countermeasures (pp. 43-60). IGI Global.

            46. , & (2019). Why Johnny can’t develop a secure application? A usability analysis of Java Secure Socket Extension API. Computers & Security, 80, 54-73.

            47. , , & (2012). A usable security heuristic evaluation for the online health social networking paradigm. International Journal of Human-Computer Interaction, 28(10), 678-694.

            48. , & (1996). User-centered security. In Proceedings of the 1996 workshop on New security paradigms (pp. 27-33).

            Comments

            Comment on this article