Bridging Usability and Accessibility of User Authentication using Usable Accessed (UAce) for Online Payment Applications

Juliana Mohamed - Center for Diploma Studies, Universiti Tun Hussein Onn Malaysia (UTHM), KM 1, Jalan Panchor, 84600 Pagoh, Muar, Johor, Malaysia
Mohd Farhan Md Fudzee - AROMA Focus Group, Faculty of Computer Science and Information Technology (FSKTM), Universiti Tun Hussein Onn Malaysia (UTHM), 86400 Parit Raja, Batu Pahat, Johor, Malaysia
Sofia Najwa Ramli - ISR, Faculty of Computer Science and Information Technology (FSKTM), Universiti Tun Hussein Onn Malaysia (UTHM), 86400 Parit Raja, Batu Pahat, Johor, Malaysia
Mohd Norasri Ismail - AROMA Focus Group, Faculty of Computer Science and Information Technology (FSKTM), Universiti Tun Hussein Onn Malaysia (UTHM), 86400 Parit Raja, Batu Pahat, Johor, Malaysia
- Defni - Department of Information Technology, Politeknik Negeri Padang, West Sumatera, Indonesia

Citation Format:



Usability and accessibility are significant authentication aspects for online applications. Despite the fact that there are ongoing efforts to improve the interface design, some existing research only focuses on a single aspect of it. Thus, it is vital to investigate how to merge these two features into a practical and workable solution. This study presents a preliminary process for designing accessible and usable applications for online banking payment using Usable Accessed (UAce by adopting Design Science Research (DSR) as its methodology. The UAce standard considers attributes and characteristics from the user authentication. The standard establishes a development method and tool for assessing subjectively and quantitatively usable, as well as the user authentication while taking into account specific elements, qualities, and features. The DSR technique for developing highly usable and accessible interactive apps was utilized in designing this approach.


Usability; accessibility; DSR; UAce; user authentication.

Full Text:



Fuglerud, K. S., & Røssvoll, T. H. (2010). Previous and related research on usability and accessibility issues of personal identification management systems. Norwegian Computing Center, Oslo (Norway), Tech. Rep. DART/10/10.

Fuglerud, K. S., & Røssvoll, T. H. (2012). An evaluation of web-based voting usability and accessibility. Universal Access in the Information Society, 11(4), 359-373.

Andrew, S., Watson, S., Oh, T., & Tigwell, G. W. (2020, October). A Review of Literature on Accessibility and Authentication Techniques. In The 22nd International ACM SIGACCESS Conference on Computers and Accessibility (pp. 1-4).

Pedersen A. Usability of authentication in web applications. A literature review. University of Copenhagen, Tech. Rep. 2010.

Bevan, N., Carter, J., Earthy, J., Geis, T., & Harker, S. (2016, July). New ISO standards for usability, usability reports and usability measures. In International conference on human-computer interaction (pp. 268-278). Springer, Cham.

Yeratziotis, A., Greunen, D., Pottas, D.: A framework for evaluating usable security: the case of online health social networks. In: 6th International Symposium on Human Aspects of Information Security and Assurance (2012)

Acquisti, A., Adjerid, I., Balebako, R., Brandimarte, L., Cranor, L. F., Komanduri, S., ... & Wilson, S. (2017). Nudges for privacy and security: Understanding and assisting users’ choices online. ACM Computing Surveys (CSUR), 50(3), 1-41.

Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1.

Dresch, A., Lacerda, D. P., & Antunes, J. A. V. (2015). Design science research. In Design Science Research (pp. 67-102). Springer, Cham.

Venable, J., Pries-Heje, J., & Baskerville, R. (2016). FEDS: a framework for evaluation in design science research. European journal of information systems, 25(1), 77-89.

Forget, A., Chiasson, S., & Biddle, R. (2015, September). Choose your own authentication. In Proceedings of the 2015 New Security Paradigms Workshop (pp. 1-15).

Dhillon, G., Oliveira, T., Susarapu, S., & Caldeira, M. (2016). Deciding between information security and usability: Developing value-based objectives. Computers in Human Behavior, 61, 656-666.

Stanton, N. A., Salmon, P. M., Rafferty, L. A., Walker, G. H., Baber, C., & Jenkins, D. P. (2017). Human factors methods: a practical guide for engineering and design. CRC Press.

Realpe, P. C., Collazos, C. A., Hurtado, J., & Granollers, A. (2015, September). Towards an integration of usability and security for user authentication. In Proceedings of the XVI International Conference on Human Computer Interaction (pp. 1-6).

George, A. (2018). Perceptions of Internet banking users—a structural equation modelling (SEM) approach. IIMB management review, 30(4), 357-368.

Altobishi, T., Erboz, G., & Podruzsik, S. (2018). E-Banking effects on customer satisfaction: The survey on clients in Jordan Banking Sector. International Journal of Marketing Studies, 10(2), 151-161.

Muratovski, G. (2015). Research for designers: A guide to methods and practice. Sage.

Realpe-Muñoz, P., Collazos, C. A., Granollers, T., Muñoz-Arteaga, J., & Fernandez, E. B. (2017, September). Design process for usable security and authentication using a user-centered approach. In Proceedings of the XVIII International Conference on Human Computer Interaction (pp. 1-8).

Schwind, N., Magnin, M., Inoue, K., Okimoto, T., Sato, T., Minami, K., & Maruyama, H. (2016). Formalization of resilience for constraint-based dynamic systems. Journal of Reliable Intelligent Environments, 2(1), 17-35.

Naqvi, B., & Seffah, A. (2018, May). A methodology for aligning usability and security in systems and services. In 2018 3rd International Conference on Information Systems Engineering (ICISE) (pp. 61-66). IEEE.

Realpe PC, Collazos CA, Hurtado J, Granollers A. A set of heuristics for usable security and user authentication. InProceedings of the XVII International Conference on Human Computer Interaction 2016 Sep 13 (pp. 1-8).

Coulton, P., & Lindley, J. G. (2019). More-than human centred design: Considering other things. The Design Journal, 22(4), 463-481.

Morales, J., Rusu, C., Botella, F., & Quiñones, D. (2019). Programmer eXperience: A systematic literature review. IEEE Access, 7, 71079-71094.

Nielsen, J. (1994). Heuristic evaluation, w: Nielsen J., Mack RL (eds.), usability inspection methods.

Mohamed, M. A., Chakraborty, J., & Dehlinger, J. (2017). Trading off usability and security in user interface design through mental models. Behaviour & Information Technology, 36(5), 493-516.

Abu-Salma, R., Redmiles, E. M., Ur, B., & Wei, M. (2018). Exploring user mental models of end-to-end encrypted communication tools. In 8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 18).

Guo, Y., Norziha Megat, M. Z. & Nur Azaliah, A. B. (2021). Conceptual Model on Internet Banking Acceptance in China with Social Network Influence. International Journal on Informatics Visualization, 5(2), 177-186.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOIV : International Journal on Informatics Visualization
ISSN 2549-9610  (print) | 2549-9904 (online)
Organized by Department of Information Technology - Politeknik Negeri Padang, and Institute of Visual Informatics - UKM and Soft Computing and Data Mining Centre - UTHM
W :
E :,,

View JOIV Stats

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.