E-privacy in 2nd generation E-commerce: privacy preferences versus actual behavior
Proceedings of the 3rd ACM conference on Electronic Commerce
Users' conceptions of web security: a comparative study
CHI '02 Extended Abstracts on Human Factors in Computing Systems
Usability and biometric verification at the ATM interface
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Attitudes towards technology use in public zones: the influence of external factors on ATM use
CHI '03 Extended Abstracts on Human Factors in Computing Systems
The domino effect of password reuse
Communications of the ACM - Human-computer etiquette
Password Memorability and Security: Empirical Results
IEEE Security and Privacy
Security in the wild: user strategies for managing security as an everyday, practical problem
Personal and Ubiquitous Computing
Is spyware an Internet nuisance or public menace?
Communications of the ACM - Spyware
Privacy practices of Internet users: self-reports versus observed behavior
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Public space systems: designing for privacy?
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
Do security toolbars actually prevent phishing attacks?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Secrets and Lies
Cantina: a content-based approach to detecting phishing web sites
Proceedings of the 16th international conference on World Wide Web
A second look at the usability of click-based graphical passwords
Proceedings of the 3rd symposium on Usable privacy and security
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Proceedings of the 3rd symposium on Usable privacy and security
Studying users' computer security behavior: A health belief perspective
Decision Support Systems
Folk models of home computer security
Proceedings of the Sixth Symposium on Usable Privacy and Security
Towards understanding ATM security: a field study of real world ATM use
Proceedings of the Sixth Symposium on Usable Privacy and Security
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
It won't happen to me: Promoting secure behaviour among internet users
Computers in Human Behavior
Proceedings of the 9th ACM SIGCHI Italian Chapter International Conference on Computer-Human Interaction: Facing Complexity
Verified by visa and mastercard securecode: or, how not to design authentication
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
Stories as informal lessons about security
Proceedings of the Eighth Symposium on Usable Privacy and Security
Hi-index | 0.00 |
Fraudulent transactions occurring via the Internet or Automatic Teller Machines (ATMs) present a considerable problem for financial institutions and consumers alike. Whilst a number of technological improvements have helped reduce the likelihood of security breaches, users themselves have an integral role to play in reducing technology mediated fraud. This paper focuses on the role of the user, specifically capturing information about their perceptions and behaviour when using technology to complete financial transactions. Semi-structured interviews with twenty-nine participants were conducted to increase knowledge and understanding in this domain. The findings are guided by the components of the health belief model (HBM) which is used as a framework for exploring critical issues associated with behavioural change. Results indicate that users typically felt safe and secure whilst conducting financial transactions online and at the ATM. The users' perceived level of threat was low mainly because they thought it unlikely that they would be a victim of fraud and because of a reduced sense of responsibility for any negative outcomes. Whilst users were aware at a superficial level of what fraudulent activities take place they were less sure about behaviours designed to counteract fraud and their potential efficacy. Furthermore, security concerns among ATM users were not as high as concerns among Internet users with Internet users appearing to take more individual responsibility for their more personal technologies in more private spaces. The paper concludes with some practical implications based around the HBM suggesting user focused ways forward for encouraging secure behaviour.