Please use this identifier to cite or link to this item:
http://hdl.handle.net/10397/105010
| DC Field | Value | Language |
|---|---|---|
| dc.contributor | School of Design | - |
| dc.creator | Zhang, J | - |
| dc.creator | Luximon, Y | - |
| dc.date.accessioned | 2024-04-03T01:45:39Z | - |
| dc.date.available | 2024-04-03T01:45:39Z | - |
| dc.identifier.issn | 1071-5819 | - |
| dc.identifier.uri | http://hdl.handle.net/10397/105010 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Academic Press | en_US |
| dc.rights | © 2021 Elsevier Ltd. All rights reserved. | en_US |
| dc.rights | © 2021. This manuscript version is made available under the CC-BY-NC-ND 4.0 license https://creativecommons.org/licenses/by-nc-nd/4.0/ | en_US |
| dc.rights | The following publication Zhang, J., & Luximon, Y. (2021). Interaction design for security based on social context. International Journal of Human-Computer Studies, 154, 102675 is available at https://doi.org/10.1016/j.ijhcs.2021.102675. | en_US |
| dc.subject | Design science research (DSR) | en_US |
| dc.subject | Human-computer interaction for security | en_US |
| dc.subject | Mobile payments | en_US |
| dc.subject | Perception of security and usability | en_US |
| dc.subject | Social context | en_US |
| dc.subject | Task-technology fit theory (TTF) | en_US |
| dc.title | Interaction design for security based on social context | en_US |
| dc.type | Journal/Magazine Article | en_US |
| dc.identifier.volume | 154 | - |
| dc.identifier.doi | 10.1016/j.ijhcs.2021.102675 | - |
| dcterms.abstract | Social context is a vital component of Human-Computer Interaction (HCI) design for security; however, there is little discussion about how to provide security functions based on the social context. This study examines the fit between security design and social contexts in mobile payment applications by investigating preferences and perceptions of security design based on the task-technology fit model and the technology acceptance model. To approach the fit of security design in different social contexts, this study followed the approach proposed by design science research and employed a full factorial design experiment. We developed two interfaces—a customizable interface without feedback information and a customizable interface with feedback information—and asked participants to modify security settings in the interfaces according to social contexts, conduct payment transactions, and report their perceptions of security and usability in four payment scenarios. The observed behaviors in relation to security settings and perceptions revealed the fit for security settings and feedback design in different social contexts. Implications were provided to allow insights for security design in mobile payment transactions according to social contexts. | - |
| dcterms.accessRights | open access | en_US |
| dcterms.bibliographicCitation | International journal of human computer studies, Oct. 2021, v. 154, 102675 | - |
| dcterms.isPartOf | International journal of human computer studies | - |
| dcterms.issued | 2021-10 | - |
| dc.identifier.scopus | 2-s2.0-85107719725 | - |
| dc.identifier.artn | 102675 | - |
| dc.description.validate | 202402 bckw | - |
| dc.description.oa | Accepted Manuscript | en_US |
| dc.identifier.FolderNumber | SD-0006 | en_US |
| dc.description.fundingSource | Others | en_US |
| dc.description.fundingText | The Hong Kong Polytechnic University | en_US |
| dc.description.pubStatus | Published | en_US |
| dc.identifier.OPUS | 55767016 | en_US |
| dc.description.oaCategory | Green (AAM) | en_US |
| Appears in Collections: | Journal/Magazine Article | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| Zhang_Interaction_Design_Security.pdf | Pre-Published version | 1.66 MB | Adobe PDF | View/Open |
Page views
77
Last Week
1
1
Last month
Citations as of Nov 30, 2025
Downloads
69
Citations as of Nov 30, 2025
SCOPUSTM
Citations
8
Citations as of Dec 19, 2025
WEB OF SCIENCETM
Citations
5
Citations as of Dec 18, 2025
Google ScholarTM
Check
Altmetric
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.



