You are not your developer, either: A research agenda for usable security and privacy research beyond end users

Y Acar, S Fahl, ML Mazurek - 2016 IEEE Cybersecurity …, 2016 - ieeexplore.ieee.org
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …

Security in next generation mobile payment systems: A comprehensive survey

W Ahmed, A Rasool, AR Javed, N Kumar… - IEEE …, 2021 - ieeexplore.ieee.org
Cash payment is still king in several markets, accounting for more than 90% of the payments
in almost all the develo** countries. The usage of mobile phones is pretty ordinary in this …

Comparing the usability of cryptographic apis

Y Acar, M Backes, S Fahl, S Garfinkel… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …

Can digital technologies reshape rural microfinance? Implications for savings, credit, & insurance

E Benami, MR Carter - Applied Economic Perspectives and …, 2021 - Wiley Online Library
Rural microfinance must contend with the triple challenges of isolation, small‐scale
transactions, and risk. These challenges result in information asymmetries and transaction …

Paying the price: When intimate partners use technology for financial harm

R Bellini - Proceedings of the 2023 CHI Conference on Human …, 2023 - dl.acm.org
Financial abuse—the control of a survivor's access to and use of financial resources—is
highly prevalent in intimate partner violence (IPV) cases. Based on the reports of 158 …

Two-factor authentication scheme for mobile money: A review of threat models and countermeasures

G Ali, M Ally Dida, A Elikana Sam - Future Internet, 2020 - mdpi.com
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …

Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse

PL Gorski, LL Iacono, D Wermke, C Stransky… - … Symposium on Usable …, 2018 - usenix.org
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In
many cases developers are overburdened by the complex set of programming choices and …

Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it

D Votipka, KR Fulton, J Parker, M Hou… - 29th USENIX Security …, 2020 - usenix.org
Secure software development is a challenging task requiring consideration of many possible
threats and mitigations. This paper investigates how and why programmers, despite a …

Are mobile banking apps secure? what can be improved?

S Chen, T Su, L Fan, G Meng, M Xue, Y Liu… - Proceedings of the 2018 …, 2018 - dl.acm.org
Mobile banking apps, as one of the most contemporary FinTechs, have been widely adopted
by banking entities to provide instant financial services. However, our recent work …

An empirical assessment of security risks of global android banking apps

S Chen, L Fan, G Meng, T Su, M Xue, Y Xue… - Proceedings of the …, 2020 - dl.acm.org
Mobile banking apps, belonging to the most security-critical app category, render massive
and dynamic transactions susceptible to security risks. Given huge potential financial loss …