Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105010
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorSchool of Design-
dc.creatorZhang, J-
dc.creatorLuximon, Y-
dc.date.accessioned2024-04-03T01:45:39Z-
dc.date.available2024-04-03T01:45:39Z-
dc.identifier.issn1071-5819-
dc.identifier.urihttp://hdl.handle.net/10397/105010-
dc.language.isoenen_US
dc.publisherAcademic Pressen_US
dc.rights© 2021 Elsevier Ltd. All rights reserved.en_US
dc.rights© 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.rightsThe following publication Zhang, J., & Luximon, Y. (2021). Interaction design for security based on social context. International Journal of Human-Computer Studies, 154, 102675 is available at https://doi.org/10.1016/j.ijhcs.2021.102675.en_US
dc.subjectDesign science research (DSR)en_US
dc.subjectHuman-computer interaction for securityen_US
dc.subjectMobile paymentsen_US
dc.subjectPerception of security and usabilityen_US
dc.subjectSocial contexten_US
dc.subjectTask-technology fit theory (TTF)en_US
dc.titleInteraction design for security based on social contexten_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.volume154-
dc.identifier.doi10.1016/j.ijhcs.2021.102675-
dcterms.abstractSocial context is a vital component of Human-Computer Interaction (HCI) design for security; however, there is little discussion about how to provide security functions based on the social context. This study examines the fit between security design and social contexts in mobile payment applications by investigating preferences and perceptions of security design based on the task-technology fit model and the technology acceptance model. To approach the fit of security design in different social contexts, this study followed the approach proposed by design science research and employed a full factorial design experiment. We developed two interfaces—a customizable interface without feedback information and a customizable interface with feedback information—and asked participants to modify security settings in the interfaces according to social contexts, conduct payment transactions, and report their perceptions of security and usability in four payment scenarios. The observed behaviors in relation to security settings and perceptions revealed the fit for security settings and feedback design in different social contexts. Implications were provided to allow insights for security design in mobile payment transactions according to social contexts.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationInternational journal of human computer studies, Oct. 2021, v. 154, 102675-
dcterms.isPartOfInternational journal of human computer studies-
dcterms.issued2021-10-
dc.identifier.scopus2-s2.0-85107719725-
dc.identifier.artn102675-
dc.description.validate202402 bckw-
dc.description.oaAccepted Manuscripten_US
dc.identifier.FolderNumberSD-0006en_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextThe Hong Kong Polytechnic Universityen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS55767016en_US
dc.description.oaCategoryGreen (AAM)en_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Zhang_Interaction_Design_Security.pdfPre-Published version1.66 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Final Accepted Manuscript
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

12
Citations as of Jul 7, 2024

Downloads

3
Citations as of Jul 7, 2024

SCOPUSTM   
Citations

2
Citations as of Jul 4, 2024

WEB OF SCIENCETM
Citations

2
Citations as of Jul 4, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.