You are not your developer, either: A research agenda for usable security and privacy research beyond end users
While researchers have developed many tools, techniques, and protocols for improving
software security, exploits and breaches are only becoming more frequent. Some of this gap …
software security, exploits and breaches are only becoming more frequent. Some of this gap …
Security in next generation mobile payment systems: A comprehensive survey
Cash payment is still king in several markets, accounting for more than 90% of the payments
in almost all the develo** countries. The usage of mobile phones is pretty ordinary in this …
in almost all the develo** countries. The usage of mobile phones is pretty ordinary in this …
Comparing the usability of cryptographic apis
Potentially dangerous cryptography errors are well-documented in many applications.
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Conventional wisdom suggests that many of these errors are caused by cryptographic …
Can digital technologies reshape rural microfinance? Implications for savings, credit, & insurance
Rural microfinance must contend with the triple challenges of isolation, small‐scale
transactions, and risk. These challenges result in information asymmetries and transaction …
transactions, and risk. These challenges result in information asymmetries and transaction …
Paying the price: When intimate partners use technology for financial harm
R Bellini - Proceedings of the 2023 CHI Conference on Human …, 2023 - dl.acm.org
Financial abuse—the control of a survivor's access to and use of financial resources—is
highly prevalent in intimate partner violence (IPV) cases. Based on the reports of 158 …
highly prevalent in intimate partner violence (IPV) cases. Based on the reports of 158 …
Two-factor authentication scheme for mobile money: A review of threat models and countermeasures
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …
mobile subscriptions and transactions. It has also increased the security challenges …
Developers deserve security warnings, too: On the effect of integrated security advice on cryptographic {API} misuse
Cryptographic API misuse is responsible for a large number of software vulnerabilities. In
many cases developers are overburdened by the complex set of programming choices and …
many cases developers are overburdened by the complex set of programming choices and …
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
Secure software development is a challenging task requiring consideration of many possible
threats and mitigations. This paper investigates how and why programmers, despite a …
threats and mitigations. This paper investigates how and why programmers, despite a …
Are mobile banking apps secure? what can be improved?
Mobile banking apps, as one of the most contemporary FinTechs, have been widely adopted
by banking entities to provide instant financial services. However, our recent work …
by banking entities to provide instant financial services. However, our recent work …
An empirical assessment of security risks of global android banking apps
Mobile banking apps, belonging to the most security-critical app category, render massive
and dynamic transactions susceptible to security risks. Given huge potential financial loss …
and dynamic transactions susceptible to security risks. Given huge potential financial loss …