Using the health belief model to explore users' perceptions of 'being safe and secure' in the world of technology mediated financial transactions

@article{Davinson2014UsingTH,
  title={Using the health belief model to explore users' perceptions of 'being safe and secure' in the world of technology mediated financial transactions},
  author={Nicola Davinson and Elizabeth Sillence},
  journal={Int. J. Hum.-Comput. Stud.},
  year={2014},
  volume={72},
  pages={154-168}
}
Fraudulent transactions occurring via the Internet or Automatic Teller Machines (ATMs) present a considerable problem for financial institutions and consumers alike. Whilst a number of technological improvements have helped reduce the likelihood of security breaches, users themselves have an integral role to play in reducing technology mediated fraud. This paper focuses on the role of the user, specifically capturing information about their perceptions and behaviour when using technology to… CONTINUE READING
BETA
1
Twitter Mention

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

Familiarity with Internet threats: Beyond awareness

  • Computers & Security
  • 2017
VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

Perceptions of Risk in Mobile Transaction

  • 2016 IEEE Security and Privacy Workshops (SPW)
  • 2016
VIEW 2 EXCERPTS
CITES BACKGROUND & RESULTS

References

Publications referenced by this paper.
SHOWING 1-10 OF 96 REFERENCES

Fraud the Facts 2012

The UK Cards Association
  • Available at www.theukcardsassociation.org.uk/wm.../Fraud_The_Facts_2012.pdf
  • 2012
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

A taxonomy of behavior change techniques used in interventions.

  • Health psychology : official journal of the Division of Health Psychology, American Psychological Association
  • 2008
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Privacy Online: Fair Information Practices In the Electronic Marketplace

Federal Trade Commission
  • Available at http://www.ftc.gov/os/2000/05/testimonyprivacy.htm
  • 2000
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Folk Models of Home Computer Security

VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Cybercrime report

Norton
  • Retrieved October 2011 from http://us.norton.com/content/en/us/home_homeoffice/media/pdf/cybercrime_report/Nor ton_UK-HumanImpact-A4_Aug4.pdf
  • 2010
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Increased phishing and online attacks cause dip in consumer confidence

A. Litan
  • 2005
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Statistics

LINK
  • Retrieved from:
  • 2013
VIEW 2 EXCERPTS

UK bank fraud up by 11% in 2012, but how much do customers lose

S. J. Murdoch
  • 2013
VIEW 1 EXCERPT