2009
DOI: 10.1016/j.cose.2008.09.008
|View full text |Cite
|
Sign up to set email alerts
|

User perceptions of security, convenience and usability for ebanking authentication tokens

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

5
97
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 110 publications
(102 citation statements)
references
References 25 publications
5
97
0
Order By: Relevance
“…To measure the underlying determinants of trust in ITEs against the background of our multidimensional model, we used existing and tested measures [10], [20], [50], [54], [60], [68], [74], [99], [111] and generated further items based on exploratory interviews, with the respondents asked what value and risk drivers they associate with living in digital environments. All items were rated on five-point Likert scales (1=strongly disagree; 5=strongly agree) and were specifically referred to an ITE scenario and the possible usage of a mobile assistant, the key device that helps one to control and use the digital components embedded within the digital ecosystem.…”
Section: Methodsmentioning
confidence: 99%
“…To measure the underlying determinants of trust in ITEs against the background of our multidimensional model, we used existing and tested measures [10], [20], [50], [54], [60], [68], [74], [99], [111] and generated further items based on exploratory interviews, with the respondents asked what value and risk drivers they associate with living in digital environments. All items were rated on five-point Likert scales (1=strongly disagree; 5=strongly agree) and were specifically referred to an ITE scenario and the possible usage of a mobile assistant, the key device that helps one to control and use the digital components embedded within the digital ecosystem.…”
Section: Methodsmentioning
confidence: 99%
“…The experiment conducted by Weir et al used 50 e-banking customers to compare the security and usability of MFA methods when using token devices [20]. Through the research it was identified that participant felt card-activated tokens and the push button token to be usable and secure but the chip-and-PIN method to be less usable [20].…”
Section: International Journal Of Advanced Research (Ijar) 315mentioning
confidence: 99%
“…Through the research it was identified that participant felt card-activated tokens and the push button token to be usable and secure but the chip-and-PIN method to be less usable [20]. According to M. Mannanthe and P. C. Oorschot the guaranteed online transaction security applies only for the users who fulfill certain security requirements stated by the banks [21].…”
Section: International Journal Of Advanced Research (Ijar) 315mentioning
confidence: 99%
“…Other past work has also investigated user acceptance of authentication technology: Jones et al described users' general perceptions of authentication mechanisms [15] and Weir et al compared the usability of two-factor authentication for eBanking applications [28]. Both papers discuss interesting individual insights into users' decisions on authentication technology, but, in contrast to this paper, do not attempt to paint a more general picture.…”
Section: Related Workmentioning
confidence: 99%