Keywords

1 Introduction

The emergence of web banking has been accompanied by a new type of menace for end users: cyber fraud [2, 9, 10]. According to the FFA (Financial Fraud Action), the losses caused by cyber fraud in the UK had an increase of 48 % in 2014 [20]. These events have compromised the user confidence in the web banking, causing the consumers show refusal to conducting their financial operations via online transactions, a phenomenon that is particularly evident in developing countries [5, 6].

In an effort to counter the mistrust associated with the use of web banking, the banks have focused their efforts on developing solutions that deliver high levels of security. However, this emphasis on security has resulted in an increase in the perceived complexity compromising usability [3].

Taking into consideration that several authors argue that characteristics such as quality, perceived safety and usability significantly influence user satisfaction and consequently on the intended use of a site [15, 18], then to promote the adoption of web banking solution is necessary that the increase in the perceived safety goes together with improved usability [1].

Unfortunately most of the time the relationship between security and usability is inversely proportional [9]. Moreover, there are few studies focusing on the importance of the interrelationship of these factors in the field of web banking, and existing work has focused solely on the study of the choice of authentication solutions [1, 3, 9], paying little attention to the usability of the interface as such.

It exposed a web banking must be designed and evaluated considering its ease of use and security levels, for which it is required: design guidelines and evaluation methods usability.

2 Heuristic Evaluation and Web Banking

A systematic review of the literature related to usability evaluation was performed on web services, considered as relevant in order to study the work related to the heuristic evaluation usability in e-commerce, transactional services and e-government, and others.

Relevant studies were selected through electronic search in four recognized data bases: Scopus, IEEE Xplore, Science Direct and ACM Digital Library. The keywords used in the search strategy for primary studies were: usability, e-commerce, transactional, e-banking, online, checklist, guidelines, heuristic. The results obtained were filtered based on a review of the title and the abstract; the selected studies are presented below.

2.1 Usability and Transactional Web Services

Paz et al. [14] expose the need for appropriate usability heuristics for evaluating emerging new software products. This premise is verified for transactional web services through a case study. Their work proposes the use of a set of fifteen new usability heuristics for evaluating specific transactional web services.

Meanwhile Garrido et al. [4] studied the problems experienced by users when using electronic processing services offered by their governments. A diagnosis of the state of services electronic procedure is carried out by conducting usability heuristic evaluations sixty transactional services offered by institutional pages of the Chilean government. Their results report usability problems mainly in the following points: (1) user control and freedom, (2) perceived sense of uncertainty (3) absence of user guides. They conclude that usability is an important factor in explaining the slow growth and distrust expressed by users when using a service electronic process variable.

In turn Hughes et al. [7] present a heuristic evaluation tool to assess the usability of financial analysis tools provided in institutional pages from five different countries around the globe. His proposal consists of fourteen heuristics based on the work of Wenham et al. [17].

2.2 Usability and Security

Gonzalez et al. [5] used the approach GQM (Goal Question Metric) and heuristics Johnston et al. [8] to propose a set of metrics to measure the usability and security in e-commerce applications. In addition, they propose a methodology for the design of safe and usable websites [6].

For Nurse et al. [13], usability is one of the most important aspects to consider when designing secure systems because a non-usable system results in improper application of the mechanisms and security policies. With the aim to contribute to obtaining usable and secure applications, consolidate a number of existing general “guidelines” applicable to design usable systems with emphasis on safety.

2.3 Usability and Web Banking

One of the first works on usability in web banking is reported by Wenham and Zaphiris [17], which conducted a review of existing usability evaluation methods and select the most appropriate for assessing implementation of electronic banking. The selected methods are then applied to two case studies and the effectiveness of each method is analyzed. Based on the results propose a set of twelve heuristics to use in evaluating the usability of electronic banking.

Mujinga et al. [11] emphasizes in the vulnerabilities that are exposed web banking users and the necessity to consider usability when designing a secure system. Based on the Nielsen heuristics [12] proposes a heuristic model, consisting of a set of sixteen heuristics, in order to facilitate the design and development of a safe and usable web banking.

3 Methodology

The set of heuristics was obtained using the methodology proposed by Rusu et al. [16], it can be described through six stages (Fig. 1).

Fig. 1.
figure 1

Methodology

  • Exploratory stage: a review of literature related to Internet banking, transactional web services, and security was made.

  • Descriptive stage: the most important features of the previously collected information are highlighted, emphasizing aspects related to usability and safety.

  • Correlation stage: the main features are identified that a proposal for usability heuristics for web banking should consider, based on Nielsen heuristics.

  • Explanatory stage: the set of heuristics proposals formally specified by using a standard template.

  • Validation stage: heuristic proposals are validated by performing a heuristic evaluation usability on a previously selected case study, comparing their performance with Nielsen heuristics. In addition, surveys were performed to obtain the appreciations of experts on the proposed heuristics for web banking.

  • Refinement stage: were modified some of the heuristics proposals based on feedback obtained from the previous stage.

4 The Proposed Heuristics

Following the methodology described in the previous section has been obtained the set of usability heuristics presented below:

4.1 BIH1 Confidence

Users need to feel a sense of confidence in using the system. Security measures must be visible, user friendly and accessible; you must explain to users how to use the site and the safest way to send alerts when necessary.

Example: Fig. 2 shows a section of the home page of the web banking of Banco de Crédito del Perú (https://www.viabcp.com/wps/portal/viabcpp/personas). The use of the symbol “lock” associated with section “Join your Accounts” transmits the feeling of entering a secure site.

Fig. 2.
figure 2

Example of BIH1 Confidence

4.2 BIH2 Navigability

Navigation of the site must be logically structured and should allow the user to easily move from one place to another. Information should be organized in such a way that the user can easily interact with the system when making a transaction.

4.3 BIH3 Visibility of System Status

Users should be informed of the internal state of the system and state security mechanisms.

Example: Fig. 3 shows the use of iconography to indicate that a security feature of the system is active.

Fig. 3.
figure 3

Example of BIH3 Visibility of System Status

4.4 BIH4 Transaction Status

The system must inform users within a reasonable time, about the success or failure of the transaction.

Example: Fig. 4 shows the use of a notice accompanied by iconography to indicate the status of the execution of a payment transaction.

Fig. 4.
figure 4

Example of BIH4 Transaction Status

4.5 BIH5 Familiarity

The system should employ elements, phrases and concepts familiar to the user. They must be used metaphors and dialogues of the real world. The concepts related to security should also be presented in a manner familiar to the user.

4.6 BIH6 Customizing

Users should be free to customize the system interface, including security features, according to their preferences.

Example: Fig. 5 shows the use of customizing of web banking of BBVA Continental (https://www.bbvacontinental.pe). At the top it shows that you can upload a photo.

Fig. 5.
figure 5

Example of BIH6 Customizing

4.7 BIH7 Freedom and User Control

The system must provide support for undo and redo actions. Users could choose a system function by mistake, and they would need a clearly marked exit to leave the undesired state without having to perform many steps.

When possible, it should be allowed users to revoke decisions already taken, including decisions on security measures.

4.8 BIH8 Consistency and Standards

Users should not hesitate if situations, words or different actions mean the same thing. It is very important to maintain a similar design throughout the interface. The website should be consistent not only internally, but consistent with similar sites.

4.9 BIH9 Clarity

The interface should communicate in a simple and concise manner using the language of the user, must transmit the available security features clearly and using appropriate language.

4.10 BIH10 Minimize User Memory Load

The user should not be forced to remember information from a previous state.

System instructions should be easy to remember through highly intuitive interfaces. It could include easy configuration of system security, reduce the number of security decisions that users should take.

4.11 BIH11 Flexibility and Efficiency in Use

The system must provide enough information for novice users, without providing too much information for experienced users.

While novice users may need assistance step by step, expert users should be able to quickly access functionality required by shortcuts.

Example: Fig. 6 shows the correct use of the flexibility and efficiency in use by frequent operations functionality.

Fig. 6.
figure 6

Example BIH11 Flexibility and Efficiency in Use

4.12 BIH12 Aesthetic and Minimalist Design

Dialogues should not contain information irrelevant or that is rarely used. Every extra unit of information competes with relevant information units and decreases their relative visibility. The interface should contain only relevant for the system or for information security mechanisms. It should not overwhelm the user with information, should reduce the number of settings, passwords to remember.

4.13 BIH13 Error Prevention

Even better than good error handling is a careful design which prevents the occurrence of problems. It is recommended to eliminate error-susceptible conditions or a verification of the same, asking the user for confirmation before performing an action.

Users should know the consequences of any action related to safety, irreversible actions must be clearly marked.

Example: Fig. 7 shows the use of a confirmation button, this mechanism serves to prevent the execution of a payment transaction unwanted.

Fig. 7.
figure 7

Example BIH13 Error Prevention

4.14 BIH14 Helps the User to Recognize, Diagnose and Recover from Mistakes

Error messages should be expressed in clearly language indicating precisely the problem and suggest a solution. If an error occurs should be handled properly.

It should provide users detailed error messages, do not use codes and then allow recovery through simple mechanisms. Care should be taken not to compromise the security of the site to return information about the error occurred.

Example: Fig. 8 shows the correct use of aid the user to recognize, diagnose and recover from errors. It appreciated the use of an informative message about the error produced, it is noteworthy that security is not compromised because no details if the error is in the user or password.

Fig. 8.
figure 8

Example of BIH14 Helps the user to recognize, diagnose and recover from mistakes

4.15 BIH15 Help and Documentation

Although the ideal is that a system can be used without documentation, it is necessary to provide help and documentation. This information should be easy to search, focused on the user’s task, list concrete to do and not be too long steps.

Users should be able to easily locate and view online help and documentation system should include documentation of security features. It should also provide recommendations when the user is unsure of a decision and its implications.

5 Validating the Proposal

To validate the usability heuristics, the methodology proposed by Rusu et al. [16], which is to employ two groups working on the same case study on equal terms used.

Usability problems that are identified by each of the groups to be compared using the following criteria:

  • P1 - Problems identified by both groups of evaluators

  • P2 - Problems identified only by the group using the heuristic proposals

  • P3 - Problems identified only by the group using traditional heuristics (Nielsen).

    The new usability heuristics work well when:

  • P2 includes the highest percentage of usability problems or

  • P1 + P2 include the highest percentage of usability problems

    However, if the set P3 includes the highest percentage of usability problems, you must discard the following assumptions:

  • H1 - The new heuristics failed to identify many usability problems because they are not properly specified.

  • H2 - The evaluators who used the new heuristics ignored subjectively problems.

To validate or reject each of these assumptions will be necessary to make further experiments.

5.1 Case Study

The case study selected to perform the validation of the new set of heuristics was the web banking BBVA Continental (https://www.bbvacontinental.pe/personas/).

The choice of this application as an object of study is justified the participation of BBVA Continental in Peru’s banking system, standing at year-end 2014s in loans and deposits and third in economic terms.

Each evaluator is asked to enter the web banking BBVA Continental and perform the following tasks:

  • Payment of studies at the Catholic University of Peru

  • Consultation savings account balance

  • Transfer of funds between accounts

  • Querying account credit card

5.2 Evaluation Based on Heuristic Nielsen

Then all the problems associated with each heuristics are presented. It may be observed that the highest percentage of problems (36 %) was associated with heuristics number two “Match between system and the real world” (Table 1).

Table 1. Broken heuristics - Nielsen

5.3 Evaluation Based on the New Proposal

Below is all the problems associated with each heuristics are presented. It can be observed that none of them was heuristics associated a percentage significantly higher compared to other problems. Should be noted, the heuristics did not have a counterpart in Nielsen (“BIH1-Confidence”, “BIH6- Customizing”), together obtained 12 % (Table 2).

Table 2. Broken heuristics - Proposal

5.4 Comparative Analysis

In this section the results of heuristic evaluations by the two groups are listed.

  • P1 - Problems identified by both groups of evaluators: 20 %

  • P2 - Problems identified only by the group using the heuristic proposed: 46 %

  • P3 - Problems identified only by the group using traditional heuristics (Nielsen): 34 %

To compare the detected problems using both proposals, Nielsen heuristics are mapped with the proposals as shown in Fig. 9.

Fig. 9.
figure 9

Problems detected

6 Conclusions and Future Work

The methods, techniques and tools existing for evaluating usability of software applications focus on the characteristics of generic interfaces. However, the web banking has intrinsic to their domain particularities. Therefore, having a specific assessment tool to analyze the usability of these applications is necessary.

This research can develop a theoretical proposal that can integrate security features in usability evaluation of web banking. However, it is important to note that there are certain factors that could influence the data presented in this research, such as the availability of evaluators, the degree of familiarity with the application assessed, among others.

Through the experiments conducted it was determined that the Nielsen heuristics have some limitations when applied to the domain under study, it was observed that most problems identified corresponded to the aesthetic design and the use of metaphors. In contrast, the problems encountered by the proposal concentrated around flexibility and user control. Additionally, it should be noted that the proposal allowed the detection of problems associated with security features, which were not detected by the control group.

Consequently, replication of the experiment in other implementations banking web is necessary. Including implementations made not only by banks but also by financial institutions oriented small businesses, which will allow better analysis of the performance of the proposed heuristics.