How to cite this paper
Karim, N., Abdulraheem, W., Kanaker, H., Alzobi, F., Shukur, Z., Qtaish, O & Abuhamdeh, M. (2024). Using interface preferences as evidence of user identity: A feasibility study.International Journal of Data and Network Science, 8(1), 537-548.
Refrences
Abdel Karim, N., & Shukur, Z. (2016). Proposed features of an online examination interface design and its optimal values. Computers in Human Behavior, 64, 414–422.
Abdel Karim, Nader, Shukur, Z. (2015). Review of User Authentication Methods in Online Examination. Asian Journal of Information Technology, 14(5), 166–175.
Akhtar, N., & Haq, F. U. (2011). Real time online banking fraud detection using location information. Communications in Computer and Information Science, 250 CCIS, 770–772.
Al-Sa’Di, A., & Al-Samarraie, H. (2022). A Delphi Evaluation of User Interface Design Guidelines: The Case of Arabic. Advances in Human-Computer Interaction, 2022.
America, bank of. (2016). features of online banking. https://www.bankofamerica.com/onlinebanking/education/features-of-online-banking.go
Aranyi, G., & van Schaik, P. (2015). Modeling user experience with news websites. Journal of the Association for Infor-mation Science and Technology, 66(12), 2471–2493.
Banerjee, J., Majumdar, D., Pal, M. S., & Majumdar, D. (2011). Readability, Subjective Preference and Mental Workload Studies on Young Indian Adults for Selection of Optimum Font Type and Size during Onscreen Reading. Al Ameen Journal of Medical Sciences, 4(2), 131–143.
Bernard, M., Liao, C. H., & Mills, M. (2001). The Effects of FontType and Size on the Legibility and Reading Time of online Text by older Adults. CHI’01 Extended Abstracts on Human Factors in Computing Systems, 175–176.
Bhana, B., & Flowerday, S. (2020). Passphrase and keystroke dynamics authentication: Usable security. Computers and Security, 96.
Bonnardel, N., Piolat, A., & Le Bigot, L. (2011). The impact of colour on Website appeal and users’ cognitive processes. Displays, 32(2), 69–80.
Cabrera-Sánchez, J. P., Ramos-De-luna, I., Carvajal-Trujillo, E., & Villarejo-Ramos, Á. F. (2020). Online recommenda-tion systems: Factors influencing use in E-commerce. Sustainability (Switzerland), 12(21).
Chen, L. H., & Liu, Y. C. (2017). Affordance and Intuitive Interface Design for Elder Users with Dementia. Procedia CIRP, 60.
Chung, S. (2023). Interface-Driven Customer Experience: Redefining User Interface (UI) Design for Automotive Info-tainment System. IEEE Consumer Electronics Magazine, 12(1).
CIMBBank. (2017). cimbclick. www.cimbclicks.com.my
Cranor, L. F., & Garfinkel, S. (2005). Security and Usablity: Designing secure systems that people can use. In Theory in practice. O’Reilly Media, Inc.
Crawford, D. W., Godbey, G., & Crouter, A. C. (1986). The Stability of Leisure Preferences. Journal of Leisure Research, 18(2), 96–115.
Du, J., Liu, Z., & Geng, Z. (2022). Design and Development of Garment Fabric Database Management System. Journal of Donghua University (English Edition), 39(4).
Evers, V., & Day, D. (1997). The role of culture in interface acceptance. Proceedings Human Computer Interaction, Inter-act’97, 1993, 260–267.
Eze, M. (2014). Internet Banking User Interface Design: A Comparative Trend Analysis of Nigeria Perspective. Interna-tional Journal of Computer Science and Telecommunications , 5.
Facebook. (2017). face book preferences. www.facebook.com
Feng, T., Liu, Z., Kwon, K. A., Shi, W., Carbunar, B., Jiang, Y., & Nguyen, N. (2012). Continuous mobile authentication using touchscreen gestures. 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012, 451–456.
Ferrucci, F., Jorio, M., Marci, S., Bezenchek, A., Diella, G., Nulli, C., Miranda, F., & Castelli-Gattinara, G. (2021). A web-based application for complex health care populations: user-centered design approach. JMIR Human Factors, 8(1).
Hammood, W. A., Arshah, R. A., Mohamad Asmara, S., & Hammood, O. A. (2021). User Authentication Model based on Mobile Phone IMEI Number: A Proposed Method Application for Online Banking System. Proceedings - 2021 Inter-national Conference on Software Engineering and Computer Systems and 4th International Conference on Computa-tional Science and Information Management, ICSECS-ICOCSIM 2021, 411–416.
Hassan, M. A., & Shukur, Z. (2022). Device identity-based user authentication on electronic payment system for secure e-wallet apps. Electronics (Switzerland), 11(1).
Helander, M. (2014). Handbook of human-computer interaction. Elsevier.
Hublikar, S., Pattanashetty, V. B., Mane, V., Pillai, P. S., Lakkannavar, M., & Shet, N. S. V. (2023). Biometric-Based Au-thentication in Online Banking. Lecture Notes in Networks and Systems, 400, 249–259.
Islam, S. H., Das, A. K., & Khan, M. K. (2016). Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor. Security and Communication Networks, 9(16), 3229–3238.
Jakobsson, M., & Siadati, H. (2012). Improved visual preference authentication. Proceedings - 2nd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2012, Co-Located with 25th IEEE Computer Security Foundations Symposium, CSF 2012, 27–34.
Jancok, V., & Ries, M. (2022). Security Aspects of Behavioral Biometrics for Strong User Authentication. ACM Interna-tional Conference Proceeding Series, 57–63.
Juneja, K. (2017). An XML transformed method to improve effectiveness of graphical password authentication. Journal of King Saud University - Computer and Information Sciences.
Kang, J., Nyang, D., & Lee, K. (2014). Two-factor face authentication using matrix permutation transformation and a user password. Information Sciences, 269, 1–20.
Karim, N. A., & Ali, A. H. (2021). E-learning virtual meeting applications: A comparative study from a cybersecurity per-spective. Indonesian Journal of Electrical Engineering and Computer Science, 24(2), 1121–1129.
Karim, N. A., Kanaker, H., Almasadeh, S., & Zarqou, J. (2021). A Robust User Authentication Technique in Online Exam-ination. International Journal of Computing, 20(4), 535–542.
Karim, N. A., & Shukur, Z. (2016a). Using preferences as user identification in the online examination. International Journal on Advanced Science, Engineering and Information Technology, 6(6).
Karim, N. A., & Shukur, Z. (2016b). Using Preferences as User Identification in the Online Examination. International Journal on Advanced Science, Engineering and Information Technology, 6(6).
Karim, N. A., Shukur, Z., & AL-banna, A. E. M. (2020). UIPA: User authentication method based on user interface prefer-ences for account recovery process. Journal of Information Security and Applications, 52.
Karim, N. A., Shukur, Z., & Ghazal, M. (2016). Proposed features of online examination interface design. Asian Journal of Information Technology, 15(16).
Karsvall, A. (2002). Personality preferences in graphical interface design. Proceedings of the Second Nordic Conference on Human-Computer Interaction. ACM, 217–218.
Kheshaifaty, N., & Gutub, A. (2021). Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication. Journal of Engineering Research.
Kruzikova, A., Knapova, L., Smahel, D., Dedkova, L., & Matyas, V. (2022). Usable and secure? User perception of four authentication methods for mobile banking. Computers and Security, 115.
Kuder, G. F. (1939). The Stability of Preference Items. The Journal of Social Psychology, 10(1), 41–50.
Lazem, S., Giglitto, D., Nkwo, M. S., Mthoko, H., Upani, J., & Peters, A. (2022). Challenges and Paradoxes in Decolonis-ing HCI: A Critical Discussion. Computer Supported Cooperative Work: CSCW: An International Journal, 31(2).
Ling, J., & van Schaik, P. (2007). The influence of line spacing and text alignment on visual search of web pages. Displays, 28(2), 60–67.
Loitsch, C., Weber, G., Kaklanis, N., Votis, K., & Tzovaras, D. (2017). A knowledge-based approach to user interface ad-aptation from preferences and for special needs. User Modeling and User-Adapted Interaction, 27(3–5), 445–491.
Lu, Y., & Rastrick, K. (2014). Impacts of Website Design on the Adoption Intention of Mobile Commerce: Gender as a Moderator. In New Zealand Journal of Applied Business Research (Vol. 12, Issue 2).
Luo, G., Li, W., & Peng, Y. (2020). Overview of Intelligent Online Banking System Based on HERCULES Architecture. IEEE Access, 8.
Massa, D., & Spano, L. D. (2016). FaceMashup: An end-user development tool for social network data. Future Internet, 8(2).
McDaniel, G., & International Business Machines Corporation. (1994). IBM Dictionary of Computing. 758.
Miraz, M. H., Ali, M., & Excell, P. S. (2021). Adaptive user interfaces and universal usability through plasticity of user interface design. In Computer Science Review (Vol. 40).
Moepi, G. L., & Mathonsi, T. E. (2021). Multi-Factor Authentication Method for Online Banking Services in South Africa. International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021.
Moon, J., Choi, Y., Jung, J., & Won, D. (2015). An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards. PLOS ONE, 10(12), e0145263.
Nedjah, N., Wyant, R. S., Mourelle, L. M., & Gupta, B. B. (2017). Efficient fingerprint matching on smart cards for high security and privacy in smart systems. Information Sciences.
Newell, A. F., Gregor, P., Morgan, M., Pullin, G., & Macaulay, C. (2011). User-Sensitive Inclusive Design. Universal Ac-cess in the Information Society, 10(3), 235–243.
Nunes, F., Silva, P. A., Cevada, J., Correia Barros, A., & Teixeira, L. (2016). User interface design guidelines for smartphone applications for people with Parkinson’s disease. Universal Access in the Information Society, 15(4), 659–679.
Panda, S., & Roy, S. T. (2022). Reflections on emerging HCI–AI research. In AI and Society.
Papathanasaki, M., Maglaras, L., & Ayres, N. (2022). Modern Authentication Methods: A Comprehensive Survey. AI, Computer Science and Robotics Technology, 2022.
Pu, P., Chen, L., & Hu, R. (2012). Evaluating recommender systems from the user’s perspective: survey of the state of the art. User Modeling and User-Adapted Interaction, 22(4–5), 317–355.
Rangraz Jeddi, F., Nabovati, E., Bigham, R., & Khajouei, R. (2020). Usability evaluation of a comprehensive national health information system: relationship of quality components to users’ characteristics. International Journal of Medi-cal Informatics, 133.
Rello, L., Kanvinde, G., & Baeza-Yates, R. (2012). Layout guidelines for web text and a web service to improve accessi-bility for dyslexics. Proceedings of the International Cross-Disciplinary Conference on Web Accessibility - W4A ’12, 1.
Rello, L., Pielot, M., Marcos, M., & Carlini, R. (2013). Size matters (spacing not): 18 points for a dyslexic-friendly Wik-ipedia. Proceedings of the 10th International Cross-Disciplinary Conference on Web Accessibility.
Salameh, A., Elias, nur fazidah, & Karim, nader abdel. (2016). Proposed Model for Measuring Acceptance of Online Ads. Journal of Engineering and Applied Sciences.
Sarsam, S. M., & Al-Samarraie, H. (2018). Towards incorporating personality into the design of an interface: a method for facilitating users’ interaction with the display. User Modeling and User-Adapted Interaction, 28(1).
Shakil, K. A., Zareen, F. J., Alam, M., & Jabin, S. (2017). BAMHealthCloud: A biometric authentication and data man-agement system for healthcare data in cloud. Journal of King Saud University - Computer and Information Sciences.
Shay, R., Cranor, L. F., Komanduri, S., Durity, A. L., Huh, P. (Seyoung), Mazurek, M. L., Segreti, S. M., Ur, B., Bauer, L., & Christin, N. (2014). Can long passwords be secure and usable? Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems - CHI ’14, 2927–2936.
Sherman, P. (2016). Usability Success Stories. In Usability Success Stories. Routledge.
Stavova, V., Matyas, V., & Just, M. (2016). Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. In Information Security Theory and Practice (pp. 35–50). Springer International Publishing.
Tao, D., Fu, P., Wang, Y., Zhang, T., & Qu, X. (2022). Key characteristics in designing massive open online courses (MOOCs) for user acceptance: an application of the extended technology acceptance model. Interactive Learning En-vironments, 30(5).
Tong, Y., Cui, B., & Chen, Y. (2018). Research on UI visual design of intangible cultural heritage digital museum based on user experience. 13th International Conference on Computer Science and Education, ICCSE 2018.
Ubam, E., Hipiny, I., & Ujir, H. (2021). User Interface/User Experience (UI/UX) Analysis Design of Mobile Banking App for Senior Citizens: A Case Study in Sarawak, Malaysia. Proceedings of the International Conference on Electrical Engineering and Informatics.
Vinbæk, E. O., Pettersen, F. M. B., Carlsen, J. E., Fremstad, K., Edvinsen, N., & Sandnes, F. E. (2019). On Online Banking Authentication for All: A Comparison of BankID Login Efficiency Using Smartphones Versus Code Generators. Lec-ture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bio-informatics), 11572 LNCS.
Walia, N., Srite, M., & Huddleston, W. (2016). Eyeing the web interface: the influence of price, product, and personal in-volvement. Electronic Commerce Research, 16(3), 297–333.
Young, K. L., & Rudin-Brown, C. M. (2018). Designing Automotive Technology for Cross-Cultural Acceptance. Driver Acceptance of New Technology, 317–332.
Yu, N., & Kong, J. (2016). User experience with web browsing on small screens: Experimental investigations of mobile-page interface design and homepage design for news websites. Information Sciences, 330, 427–443.
Zhang, Y., Wang, X., Zhao, Z., & Li, H. (2018). Secure display for FIDO transaction confirmation. CODASPY 2018 - Pro-ceedings of the 8th ACM Conference on Data and Application Security and Privacy, 2018-January, 155–157.
Abdel Karim, Nader, Shukur, Z. (2015). Review of User Authentication Methods in Online Examination. Asian Journal of Information Technology, 14(5), 166–175.
Akhtar, N., & Haq, F. U. (2011). Real time online banking fraud detection using location information. Communications in Computer and Information Science, 250 CCIS, 770–772.
Al-Sa’Di, A., & Al-Samarraie, H. (2022). A Delphi Evaluation of User Interface Design Guidelines: The Case of Arabic. Advances in Human-Computer Interaction, 2022.
America, bank of. (2016). features of online banking. https://www.bankofamerica.com/onlinebanking/education/features-of-online-banking.go
Aranyi, G., & van Schaik, P. (2015). Modeling user experience with news websites. Journal of the Association for Infor-mation Science and Technology, 66(12), 2471–2493.
Banerjee, J., Majumdar, D., Pal, M. S., & Majumdar, D. (2011). Readability, Subjective Preference and Mental Workload Studies on Young Indian Adults for Selection of Optimum Font Type and Size during Onscreen Reading. Al Ameen Journal of Medical Sciences, 4(2), 131–143.
Bernard, M., Liao, C. H., & Mills, M. (2001). The Effects of FontType and Size on the Legibility and Reading Time of online Text by older Adults. CHI’01 Extended Abstracts on Human Factors in Computing Systems, 175–176.
Bhana, B., & Flowerday, S. (2020). Passphrase and keystroke dynamics authentication: Usable security. Computers and Security, 96.
Bonnardel, N., Piolat, A., & Le Bigot, L. (2011). The impact of colour on Website appeal and users’ cognitive processes. Displays, 32(2), 69–80.
Cabrera-Sánchez, J. P., Ramos-De-luna, I., Carvajal-Trujillo, E., & Villarejo-Ramos, Á. F. (2020). Online recommenda-tion systems: Factors influencing use in E-commerce. Sustainability (Switzerland), 12(21).
Chen, L. H., & Liu, Y. C. (2017). Affordance and Intuitive Interface Design for Elder Users with Dementia. Procedia CIRP, 60.
Chung, S. (2023). Interface-Driven Customer Experience: Redefining User Interface (UI) Design for Automotive Info-tainment System. IEEE Consumer Electronics Magazine, 12(1).
CIMBBank. (2017). cimbclick. www.cimbclicks.com.my
Cranor, L. F., & Garfinkel, S. (2005). Security and Usablity: Designing secure systems that people can use. In Theory in practice. O’Reilly Media, Inc.
Crawford, D. W., Godbey, G., & Crouter, A. C. (1986). The Stability of Leisure Preferences. Journal of Leisure Research, 18(2), 96–115.
Du, J., Liu, Z., & Geng, Z. (2022). Design and Development of Garment Fabric Database Management System. Journal of Donghua University (English Edition), 39(4).
Evers, V., & Day, D. (1997). The role of culture in interface acceptance. Proceedings Human Computer Interaction, Inter-act’97, 1993, 260–267.
Eze, M. (2014). Internet Banking User Interface Design: A Comparative Trend Analysis of Nigeria Perspective. Interna-tional Journal of Computer Science and Telecommunications , 5.
Facebook. (2017). face book preferences. www.facebook.com
Feng, T., Liu, Z., Kwon, K. A., Shi, W., Carbunar, B., Jiang, Y., & Nguyen, N. (2012). Continuous mobile authentication using touchscreen gestures. 2012 IEEE International Conference on Technologies for Homeland Security, HST 2012, 451–456.
Ferrucci, F., Jorio, M., Marci, S., Bezenchek, A., Diella, G., Nulli, C., Miranda, F., & Castelli-Gattinara, G. (2021). A web-based application for complex health care populations: user-centered design approach. JMIR Human Factors, 8(1).
Hammood, W. A., Arshah, R. A., Mohamad Asmara, S., & Hammood, O. A. (2021). User Authentication Model based on Mobile Phone IMEI Number: A Proposed Method Application for Online Banking System. Proceedings - 2021 Inter-national Conference on Software Engineering and Computer Systems and 4th International Conference on Computa-tional Science and Information Management, ICSECS-ICOCSIM 2021, 411–416.
Hassan, M. A., & Shukur, Z. (2022). Device identity-based user authentication on electronic payment system for secure e-wallet apps. Electronics (Switzerland), 11(1).
Helander, M. (2014). Handbook of human-computer interaction. Elsevier.
Hublikar, S., Pattanashetty, V. B., Mane, V., Pillai, P. S., Lakkannavar, M., & Shet, N. S. V. (2023). Biometric-Based Au-thentication in Online Banking. Lecture Notes in Networks and Systems, 400, 249–259.
Islam, S. H., Das, A. K., & Khan, M. K. (2016). Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor. Security and Communication Networks, 9(16), 3229–3238.
Jakobsson, M., & Siadati, H. (2012). Improved visual preference authentication. Proceedings - 2nd Workshop on Socio-Technical Aspects in Security and Trust, STAST 2012, Co-Located with 25th IEEE Computer Security Foundations Symposium, CSF 2012, 27–34.
Jancok, V., & Ries, M. (2022). Security Aspects of Behavioral Biometrics for Strong User Authentication. ACM Interna-tional Conference Proceeding Series, 57–63.
Juneja, K. (2017). An XML transformed method to improve effectiveness of graphical password authentication. Journal of King Saud University - Computer and Information Sciences.
Kang, J., Nyang, D., & Lee, K. (2014). Two-factor face authentication using matrix permutation transformation and a user password. Information Sciences, 269, 1–20.
Karim, N. A., & Ali, A. H. (2021). E-learning virtual meeting applications: A comparative study from a cybersecurity per-spective. Indonesian Journal of Electrical Engineering and Computer Science, 24(2), 1121–1129.
Karim, N. A., Kanaker, H., Almasadeh, S., & Zarqou, J. (2021). A Robust User Authentication Technique in Online Exam-ination. International Journal of Computing, 20(4), 535–542.
Karim, N. A., & Shukur, Z. (2016a). Using preferences as user identification in the online examination. International Journal on Advanced Science, Engineering and Information Technology, 6(6).
Karim, N. A., & Shukur, Z. (2016b). Using Preferences as User Identification in the Online Examination. International Journal on Advanced Science, Engineering and Information Technology, 6(6).
Karim, N. A., Shukur, Z., & AL-banna, A. E. M. (2020). UIPA: User authentication method based on user interface prefer-ences for account recovery process. Journal of Information Security and Applications, 52.
Karim, N. A., Shukur, Z., & Ghazal, M. (2016). Proposed features of online examination interface design. Asian Journal of Information Technology, 15(16).
Karsvall, A. (2002). Personality preferences in graphical interface design. Proceedings of the Second Nordic Conference on Human-Computer Interaction. ACM, 217–218.
Kheshaifaty, N., & Gutub, A. (2021). Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication. Journal of Engineering Research.
Kruzikova, A., Knapova, L., Smahel, D., Dedkova, L., & Matyas, V. (2022). Usable and secure? User perception of four authentication methods for mobile banking. Computers and Security, 115.
Kuder, G. F. (1939). The Stability of Preference Items. The Journal of Social Psychology, 10(1), 41–50.
Lazem, S., Giglitto, D., Nkwo, M. S., Mthoko, H., Upani, J., & Peters, A. (2022). Challenges and Paradoxes in Decolonis-ing HCI: A Critical Discussion. Computer Supported Cooperative Work: CSCW: An International Journal, 31(2).
Ling, J., & van Schaik, P. (2007). The influence of line spacing and text alignment on visual search of web pages. Displays, 28(2), 60–67.
Loitsch, C., Weber, G., Kaklanis, N., Votis, K., & Tzovaras, D. (2017). A knowledge-based approach to user interface ad-aptation from preferences and for special needs. User Modeling and User-Adapted Interaction, 27(3–5), 445–491.
Lu, Y., & Rastrick, K. (2014). Impacts of Website Design on the Adoption Intention of Mobile Commerce: Gender as a Moderator. In New Zealand Journal of Applied Business Research (Vol. 12, Issue 2).
Luo, G., Li, W., & Peng, Y. (2020). Overview of Intelligent Online Banking System Based on HERCULES Architecture. IEEE Access, 8.
Massa, D., & Spano, L. D. (2016). FaceMashup: An end-user development tool for social network data. Future Internet, 8(2).
McDaniel, G., & International Business Machines Corporation. (1994). IBM Dictionary of Computing. 758.
Miraz, M. H., Ali, M., & Excell, P. S. (2021). Adaptive user interfaces and universal usability through plasticity of user interface design. In Computer Science Review (Vol. 40).
Moepi, G. L., & Mathonsi, T. E. (2021). Multi-Factor Authentication Method for Online Banking Services in South Africa. International Conference on Electrical, Computer, and Energy Technologies, ICECET 2021.
Moon, J., Choi, Y., Jung, J., & Won, D. (2015). An Improvement of Robust Biometrics-Based Authentication and Key Agreement Scheme for Multi-Server Environments Using Smart Cards. PLOS ONE, 10(12), e0145263.
Nedjah, N., Wyant, R. S., Mourelle, L. M., & Gupta, B. B. (2017). Efficient fingerprint matching on smart cards for high security and privacy in smart systems. Information Sciences.
Newell, A. F., Gregor, P., Morgan, M., Pullin, G., & Macaulay, C. (2011). User-Sensitive Inclusive Design. Universal Ac-cess in the Information Society, 10(3), 235–243.
Nunes, F., Silva, P. A., Cevada, J., Correia Barros, A., & Teixeira, L. (2016). User interface design guidelines for smartphone applications for people with Parkinson’s disease. Universal Access in the Information Society, 15(4), 659–679.
Panda, S., & Roy, S. T. (2022). Reflections on emerging HCI–AI research. In AI and Society.
Papathanasaki, M., Maglaras, L., & Ayres, N. (2022). Modern Authentication Methods: A Comprehensive Survey. AI, Computer Science and Robotics Technology, 2022.
Pu, P., Chen, L., & Hu, R. (2012). Evaluating recommender systems from the user’s perspective: survey of the state of the art. User Modeling and User-Adapted Interaction, 22(4–5), 317–355.
Rangraz Jeddi, F., Nabovati, E., Bigham, R., & Khajouei, R. (2020). Usability evaluation of a comprehensive national health information system: relationship of quality components to users’ characteristics. International Journal of Medi-cal Informatics, 133.
Rello, L., Kanvinde, G., & Baeza-Yates, R. (2012). Layout guidelines for web text and a web service to improve accessi-bility for dyslexics. Proceedings of the International Cross-Disciplinary Conference on Web Accessibility - W4A ’12, 1.
Rello, L., Pielot, M., Marcos, M., & Carlini, R. (2013). Size matters (spacing not): 18 points for a dyslexic-friendly Wik-ipedia. Proceedings of the 10th International Cross-Disciplinary Conference on Web Accessibility.
Salameh, A., Elias, nur fazidah, & Karim, nader abdel. (2016). Proposed Model for Measuring Acceptance of Online Ads. Journal of Engineering and Applied Sciences.
Sarsam, S. M., & Al-Samarraie, H. (2018). Towards incorporating personality into the design of an interface: a method for facilitating users’ interaction with the display. User Modeling and User-Adapted Interaction, 28(1).
Shakil, K. A., Zareen, F. J., Alam, M., & Jabin, S. (2017). BAMHealthCloud: A biometric authentication and data man-agement system for healthcare data in cloud. Journal of King Saud University - Computer and Information Sciences.
Shay, R., Cranor, L. F., Komanduri, S., Durity, A. L., Huh, P. (Seyoung), Mazurek, M. L., Segreti, S. M., Ur, B., Bauer, L., & Christin, N. (2014). Can long passwords be secure and usable? Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems - CHI ’14, 2927–2936.
Sherman, P. (2016). Usability Success Stories. In Usability Success Stories. Routledge.
Stavova, V., Matyas, V., & Just, M. (2016). Codes v. People: A Comparative Usability Study of Two Password Recovery Mechanisms. In Information Security Theory and Practice (pp. 35–50). Springer International Publishing.
Tao, D., Fu, P., Wang, Y., Zhang, T., & Qu, X. (2022). Key characteristics in designing massive open online courses (MOOCs) for user acceptance: an application of the extended technology acceptance model. Interactive Learning En-vironments, 30(5).
Tong, Y., Cui, B., & Chen, Y. (2018). Research on UI visual design of intangible cultural heritage digital museum based on user experience. 13th International Conference on Computer Science and Education, ICCSE 2018.
Ubam, E., Hipiny, I., & Ujir, H. (2021). User Interface/User Experience (UI/UX) Analysis Design of Mobile Banking App for Senior Citizens: A Case Study in Sarawak, Malaysia. Proceedings of the International Conference on Electrical Engineering and Informatics.
Vinbæk, E. O., Pettersen, F. M. B., Carlsen, J. E., Fremstad, K., Edvinsen, N., & Sandnes, F. E. (2019). On Online Banking Authentication for All: A Comparison of BankID Login Efficiency Using Smartphones Versus Code Generators. Lec-ture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bio-informatics), 11572 LNCS.
Walia, N., Srite, M., & Huddleston, W. (2016). Eyeing the web interface: the influence of price, product, and personal in-volvement. Electronic Commerce Research, 16(3), 297–333.
Young, K. L., & Rudin-Brown, C. M. (2018). Designing Automotive Technology for Cross-Cultural Acceptance. Driver Acceptance of New Technology, 317–332.
Yu, N., & Kong, J. (2016). User experience with web browsing on small screens: Experimental investigations of mobile-page interface design and homepage design for news websites. Information Sciences, 330, 427–443.
Zhang, Y., Wang, X., Zhao, Z., & Li, H. (2018). Secure display for FIDO transaction confirmation. CODASPY 2018 - Pro-ceedings of the 8th ACM Conference on Data and Application Security and Privacy, 2018-January, 155–157.