An Exploratory Study of User Perceptions of Payment Methods in UK and the US
暂无分享,去创建一个
Emiliano De Cristofaro | Kat Krol | Simon Parkin | Eugene Y. Vasserman | Muhammad Sajidur Rahman | Kat Krol | S. Parkin
[1] V. Braun,et al. Using thematic analysis in psychology , 2006 .
[2] S. Forsythe,et al. Consumer patronage and risk perceptions in Internet shopping , 2003 .
[3] Simson L. Garfinkel,et al. RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.
[4] Gianluca Stringhini,et al. Are payment card contracts unfair , 2015, FC 2016.
[5] Emiliano De Cristofaro,et al. "They brought in the horrible key ring thing!" Analysing the Usability of Two-Factor Authentication in UK Online Banking , 2015, ArXiv.
[6] Mike Bond,et al. 2010 IEEE Symposium on Security and Privacy Chip and PIN is Broken , 2022 .
[7] Rick Wash,et al. Organization Interfaces—collaborative computing General Terms , 2022 .
[8] Mike Bond,et al. Phish and Chips Traditional and New Recipes for Attacking EMV , 2006 .
[9] Mike Just,et al. On the security and usability of dual credential authentication in UK online banking , 2012, 2012 International Conference for Internet Technology and Secured Transactions.
[10] Steven J. Murdoch,et al. EMV: why payment systems fail , 2014, CACM.
[11] Steven J. Murdoch,et al. Thinking Inside the Box: System-Level Failures of Tamper Proofing , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[12] Emiliano De Cristofaro,et al. Two-Factor or not Two-Factor? A Comparative Usability Study of Two-Factor Authentication , 2013, ArXiv.
[13] H. Lacohée,et al. Trustguide — trust in ICT , 2006 .
[14] Wang Tao,et al. An empirical study of customers' perceptions of security and trust in e-payment systems , 2010, Electron. Commer. Res. Appl..
[15] Mike Bond,et al. Chip and spin , 2006 .
[16] Fumiko Hayashi. Do U.S. Consumers Really Benefit from Payment Card Rewards , 2009 .
[17] A. Kosse. The Safety of Cash and Debit Cards: A Study on the Perception and Behaviour of Dutch Consumers , 2010 .
[18] Celeste Lyn Paul,et al. A Field Study of User Behavior and Perceptions in Smartcard Authentication , 2011, INTERACT.
[19] Ross J. Anderson,et al. A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs , 2012, Financial Cryptography.