Abstract
Blockchain has emerged as a revolutionary technology that has been envisioned to disrupt several industries, including financial domains with its decentralised and highly-secure design. However, since the beginning of its evolution, it has been highly criticised for the difficulties in dealing with it properly. As cryptocurrency is the most successful application of blockchain, we aim to identify the potential obstacles and usability issues, which might hinder its wide-scale adoption, of five applications (i.e., wallets) that are used to manage cryptocurrencies. Applying the analytical cognitive walk-through usability inspection method, we investigate common usability issues with desktop and mobile-based wallets. Our results reveal that both wallets lack good usability in performing the fundamental tasks which can be improved significantly. We summarise our findings and point out the aspects where the issues exists so that improving those areas can result in better user experience and adoption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Morris, D.: Bitcoin Hits a New Record High, But Stops Short of \$20,000. https://fortune.com/2017/12/17/bitcoin-record-high-short-of-20000/
Acar, Y., et al.: Comparing the usability of cryptographic APIs. In: IEEE Symposium on Security and Privacy, pp. 154–171 (2017)
Ethereum: A global, open-source platform for decentralized applications. https://www.ethereum.org/
Instantly Move Money to All Corners of the World - Ripple. https://ripple.com/
CoinCap.io - Reliable Cryptocurrency Prices and Market Capitalizations. https://coincap.io/
Chowdhury, M.J.M., et al.: A comparative analysis of distributed ledger technology platforms. IEEE Access 7, 167930–167943 (2019)
Bitcoin Core Desktop Wallet. https://bitcoincore.org/
Exodus Multicurrency Wallet. https://exodus.io/
Jaxx Liberty: Secure Blockchain Wallet, Exchange and Portfolio. https://jaxx.io/
Hardware Wallet - State-of-the-art security for crypto assets. https://www.ledger.com/
Trezor Hardware Wallet - The original & most secure bitcoin wallet. https://trezor.io/
MetaMask: A crypto wallet & gateway to blockchain apps. https://metamask.io/
Krug, S.: Don’t Make Me Think: A Common Sense Approach to Web Usability. Pearson Education India (2000)
Nielsen, J.: Usability 101: Introduction to Usability. https://www.nngroup.com/articles/usability-101-introduction-to-usability/
Bridgman, P.: Empirical Method. https://www.accessscience.com/content/empirical-method/231000/
Mahatody, T., Sagar, M., Kolski, C.: Cognitive Walkthrough for HCI evaluation: basic concepts, evolutions and variants, research issues. In: Proceedings of EAM (2007)
Kazerani, A., Rosati, D., Lesser, B.: Determining the usability of bitcoin for beginners using change tip and coinbase. In: Proceedings of the 35th ACM International Conference on the Design of Communication (2017)
Krombholz, K., Judmayer, A., Gusenbauer, M., Weippl, E.: The other side of the coin: user experiences with bitcoin security and privacy. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 555–580. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_33
Eskandari, S., Clark, J., Barrera, D., Stobert, E.: A first look at the usability of bitcoin key management. NDSS Workshop on Usable Security (USEC) (2018)
Wharton, C., Rieman, J., Lewis, C., Polson, P.: The cognitive walkthrough method: a practitioner’s guide (1994)
Nielsen, J.: How Many Test Users in a Usability Study? https://www.nngroup.com/articles/how-many-test-users
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Moniruzzaman, M., Chowdhury, F., Ferdous, M.S. (2020). Examining Usability Issues in Blockchain-Based Cryptocurrency Wallets. In: Bhuiyan, T., Rahman, M.M., Ali, M.A. (eds) Cyber Security and Computer Science. ICONCS 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 325. Springer, Cham. https://doi.org/10.1007/978-3-030-52856-0_50
Download citation
DOI: https://doi.org/10.1007/978-3-030-52856-0_50
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52855-3
Online ISBN: 978-3-030-52856-0
eBook Packages: Computer ScienceComputer Science (R0)