Search results
1 – 10 of 578Shiu-Wan Hung, Min-Jhih Cheng and Yu-Jou Tung
The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this…
Abstract
Purpose
The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this gap by investigating the role of information security, loss aversion and the moderating influence of the herd effect on Inertia and behavioral intentions in the adoption of mobile payment systems.
Design/methodology/approach
A structural equation model was developed and tested with 332 valid questionnaires to examine the proposed hypotheses.
Findings
The empirical results reveal that information security plays a significant role as an enabler, while loss aversion acts as an inhibitor of mobile payment adoption. Furthermore, the study uncovers the moderating influence of the herd effect on the relationship between Inertia and behavioral intentions.
Research limitations/implications
This study was conducted in a specific region and may not be generalizable to other regions. Future studies could expand the sample size and scope to enhance the external validity of the findings.
Practical implications
This study offers practical implications for mobile payment service providers. Understanding the key enabling and inhibiting factors identified in this study can guide providers in designing and improving their services. Strengthening information security measures can help build trust among potential adopters, while offering incentives can mitigate the impact of loss aversion and encourage early adoption.
Social implications
The findings of this study have social implications as they contribute to promoting the adoption of mobile payment systems. Increased adoption can enhance financial inclusion and stimulate economic development.
Originality/value
This study provides novel insights into the enabling and inhibiting factors of mobile payment adoption and highlights the moderating role of the herd effect. By shedding light on the influence of social norms on individual behavior in the context of mobile payment adoption, this study contributes to the existing literature and advances our understanding of this phenomenon.
Details
Keywords
Puneett Bhatnagr and Anupama Rajesh
This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the…
Abstract
Purpose
This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the continuous usage intention (CUI) of Indian digital banks from Generation Y and Z perspectives.
Design/methodology/approach
This study used an online survey method to gather data from a sample of 466 digital banking users, from which usable questionnaires were obtained. The obtained data were subjected to thorough analysis using PLS-SEM to further study the research hypotheses.
Findings
The main factors that determine digital banks’ OCE are perceived enjoyment, e-service quality, information quality and e-convenience. Additionally, relevant constructs were evaluated using an importance-performance map analysis.
Research limitations/implications
This study used convenience sampling for the urban population using digital banking; therefore, the outcome may be generalised to a limited extent. It would be valuable to imitate studies in other countries to strengthen digital banking further.
Originality/value
There is a lack of research on digital banking and OCE in India; thus, this study helps rectify this issue while providing valuable insights. This study differs from others in that it examines the connections between OCE, EL, ET and the bottom line of financial institutions, using these factors as dependent variables instead of traditional measures.
Details
Keywords
Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…
Abstract
Purpose
The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.
Design/methodology/approach
The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.
Findings
The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.
Originality/value
The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.
Details
Keywords
Lee Yen Chaw, Chun Meng Tang and Muhammad Ali
As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to…
Abstract
Purpose
As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to stay competitive. This study aims to investigate the relationship between users’ needs, users’ attitude towards mobile payment apps and users’ continuance intention to use mobile payment apps.
Design/methodology/approach
Following an exploratory sequential mixed methods research design, this study first conducted three focus groups in the qualitative phase to investigate issues or concerns faced by current users of mobile payment apps. The study then conducted an online questionnaire survey in the quantitative phase to collect responses from users of mobile payment apps. Partial least squares structural equation modelling was used to analyse 110 valid responses.
Findings
Findings show that usefulness (modelled as a second-order reflective construct consisting of three first-order reflective constructs, i.e. ease of use, acceptability and responsiveness), traceability and security had a statistically significant relationship with attitude towards mobile payment apps (which in turn had a statistically significant relationship with continuance intention to use mobile payment apps). It was also found that attitude towards mobile payment mediated the relationships between usefulness, traceability and security; and continuance intention to use mobile payment apps.
Practical implications
The findings of this study can help mobile payment app service providers and developers design apps that offer the functions and features that their users need.
Originality/value
Although some recent studies have investigated the adoption of mobile payments in the Malaysian context, few of these studies examined current users’ continuance intention to use mobile payment apps.
Details
Keywords
Miguel Calvo and Marta Beltrán
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…
Abstract
Purpose
This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.
Design/methodology/approach
The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.
Findings
The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.
Originality/value
The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.
Details
Keywords
Kanokwan Pimchan and Chonlatis Darawong
This study aims to examine the influence of condominium attributes on resident satisfaction and word of mouth from the perspectives of the elderly in Thailand.
Abstract
Purpose
This study aims to examine the influence of condominium attributes on resident satisfaction and word of mouth from the perspectives of the elderly in Thailand.
Design/methodology/approach
Data were collected from 338 elderly residents through a questionnaire survey and analysed by using descriptive statistics and structural equation modelling procedures.
Findings
The results showed that the strongest predictor of resident satisfaction was design functionality, followed by social environment, safety and security and service quality. In addition, the strongest predictor of word of mouth was safety and security, followed by design functionality, proximity, service quality and social environment.
Research limitations/implications
The data were drawn at the level of the overall characteristics of elderly residents. People may be different in terms of their demographic characters such as gender, age, and user experience.
Practical implications
The study suggests that condominium developers and designers should pay attention to design functionality both physically and mentally such as suitable materials, lighting and common areas. Moreover, the developers should focus on the proximity of the nearest hospitals, safety and security measures, well-trained security personnel and social activity arrangement.
Originality/value
Elderly condominium markets are increasingly growing as a result of the ageing society in Thailand. However, very few empirical studies investigate condominium attributes that affect resident satisfaction and word of mouth provided by real estate developers. The paper aims to determine driving factors that enhance the better well-being of elderly residents.
Details
Keywords
Workicho Jateno Gadiso, Bamlaku Alamirew Alemu and Maru Shete
This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural…
Abstract
Purpose
This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural household food security in Ethiopia.
Design/methodology/approach
The study adopted descriptive and explanatory designs. It used data from the fourth wave of the Ethiopian socioeconomic survey that has 3,115 respondents. The authors constructed household food security index using variables that capture availability, access, utilization and stability dimensions of food security. The authors categorized households into relative food security groups, namely, alarming and moderately food insecure, as well as moderately and highly food secure. Beta regression model, which is widely used to analyze response variables that assume values between 0 and 1, is used to estimate the determinants of food security.
Findings
The study finds that 77.7% of rural households are food insecure. Of this, 90% are moderately food insecure. Regional variations in magnitude of food security showed that Harari, Gambella and Benshanguel Gumuz regional states are relatively better-off than other regions in Ethiopia. The study identified sex, education level, marital status, location and wealth status of households as significant determinants of food security.
Originality/value
This study sheds light on regional variations in multidimensional food security in Ethiopia. It thus challenged previous estimates of food security using uni-dimensional indicator. It highlighted the need for region-specific analysis of determinants and a follow up of tailored regional interventions.
Peer review
The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-02-2023-0139
Details
Keywords
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…
Abstract
Purpose
The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.
Design/methodology/approach
This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.
Findings
The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.
Social implications
The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.
Originality/value
This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.
Details
Keywords
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…
Abstract
Purpose
Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.
Design/methodology/approach
The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.
Findings
By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.
Originality/value
By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.
Details