Search results

1 – 10 of 578
Article
Publication date: 16 April 2024

Shiu-Wan Hung, Min-Jhih Cheng and Yu-Jou Tung

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this…

Abstract

Purpose

The adoption of mobile payment remains low in certain regions, highlighting the need to identify the factors that enable and inhibit its adoption. This study aims to address this gap by investigating the role of information security, loss aversion and the moderating influence of the herd effect on Inertia and behavioral intentions in the adoption of mobile payment systems.

Design/methodology/approach

A structural equation model was developed and tested with 332 valid questionnaires to examine the proposed hypotheses.

Findings

The empirical results reveal that information security plays a significant role as an enabler, while loss aversion acts as an inhibitor of mobile payment adoption. Furthermore, the study uncovers the moderating influence of the herd effect on the relationship between Inertia and behavioral intentions.

Research limitations/implications

This study was conducted in a specific region and may not be generalizable to other regions. Future studies could expand the sample size and scope to enhance the external validity of the findings.

Practical implications

This study offers practical implications for mobile payment service providers. Understanding the key enabling and inhibiting factors identified in this study can guide providers in designing and improving their services. Strengthening information security measures can help build trust among potential adopters, while offering incentives can mitigate the impact of loss aversion and encourage early adoption.

Social implications

The findings of this study have social implications as they contribute to promoting the adoption of mobile payment systems. Increased adoption can enhance financial inclusion and stimulate economic development.

Originality/value

This study provides novel insights into the enabling and inhibiting factors of mobile payment adoption and highlights the moderating role of the herd effect. By shedding light on the influence of social norms on individual behavior in the context of mobile payment adoption, this study contributes to the existing literature and advances our understanding of this phenomenon.

Details

International Journal of Bank Marketing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 16 April 2024

Puneett Bhatnagr and Anupama Rajesh

This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the…

Abstract

Purpose

This study aims to conceptualise a customer-centric model based on an online customer experience (OCE) construct, mediated by e-loyalty (EL) and e-trust (ET), to improve the continuous usage intention (CUI) of Indian digital banks from Generation Y and Z perspectives.

Design/methodology/approach

This study used an online survey method to gather data from a sample of 466 digital banking users, from which usable questionnaires were obtained. The obtained data were subjected to thorough analysis using PLS-SEM to further study the research hypotheses.

Findings

The main factors that determine digital banks’ OCE are perceived enjoyment, e-service quality, information quality and e-convenience. Additionally, relevant constructs were evaluated using an importance-performance map analysis.

Research limitations/implications

This study used convenience sampling for the urban population using digital banking; therefore, the outcome may be generalised to a limited extent. It would be valuable to imitate studies in other countries to strengthen digital banking further.

Originality/value

There is a lack of research on digital banking and OCE in India; thus, this study helps rectify this issue while providing valuable insights. This study differs from others in that it examines the connections between OCE, EL, ET and the bottom line of financial institutions, using these factors as dependent variables instead of traditional measures.

Details

Journal of Financial Reporting and Accounting, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1985-2517

Keywords

Article
Publication date: 17 April 2024

Hassan Jamil, Tanveer Zia, Tahmid Nayeem, Monica T. Whitty and Steven D'Alessandro

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However…

Abstract

Purpose

The current advancements in technologies and the internet industry provide users with many innovative digital devices for entertainment, communication and trade. However, simultaneous development and the rising sophistication of cybercrimes bring new challenges. Micro businesses use technology like how people use it at home, but face higher cyber risks during riskier transactions, with human error playing a significant role. Moreover, information security researchers have often studied individuals’ adherence to compliance behaviour in response to cyber threats. The study aims to examine the protection motivation theory (PMT)-based model to understand individuals’ tendency to adopt secure behaviours.

Design/methodology/approach

The study focuses on Australian micro businesses since they are more susceptible to cyberattacks due to the least security measures in place. Out of 877 questionnaires distributed online to Australian micro business owners through survey panel provider “Dynata,” 502 (N = 502) complete responses were included. Structural equational modelling was used to analyse the relationships among the variables.

Findings

The results indicate that all constructs of the protection motivation, except threat susceptibility, successfully predict the user protective behaviours. Also, increased cybersecurity costs negatively impact users’ safe cyber practices.

Originality/value

The study has critical implications for understanding micro business owners’ cyber security behaviours. The study contributes to the current knowledge of cyber security in micro businesses through the lens of PMT.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 16 April 2024

Lee Yen Chaw, Chun Meng Tang and Muhammad Ali

As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to…

Abstract

Purpose

As the competition to retain current and attract new mobile payment app users intensifies, meeting users’ needs has become fundamental for mobile payment app service providers to stay competitive. This study aims to investigate the relationship between users’ needs, users’ attitude towards mobile payment apps and users’ continuance intention to use mobile payment apps.

Design/methodology/approach

Following an exploratory sequential mixed methods research design, this study first conducted three focus groups in the qualitative phase to investigate issues or concerns faced by current users of mobile payment apps. The study then conducted an online questionnaire survey in the quantitative phase to collect responses from users of mobile payment apps. Partial least squares structural equation modelling was used to analyse 110 valid responses.

Findings

Findings show that usefulness (modelled as a second-order reflective construct consisting of three first-order reflective constructs, i.e. ease of use, acceptability and responsiveness), traceability and security had a statistically significant relationship with attitude towards mobile payment apps (which in turn had a statistically significant relationship with continuance intention to use mobile payment apps). It was also found that attitude towards mobile payment mediated the relationships between usefulness, traceability and security; and continuance intention to use mobile payment apps.

Practical implications

The findings of this study can help mobile payment app service providers and developers design apps that offer the functions and features that their users need.

Originality/value

Although some recent studies have investigated the adoption of mobile payments in the Malaysian context, few of these studies examined current users’ continuance intention to use mobile payment apps.

Details

Journal of Systems and Information Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1328-7265

Keywords

Content available
Article
Publication date: 5 April 2024

Richard Reed

Abstract

Details

International Journal of Housing Markets and Analysis, vol. 17 no. 3
Type: Research Article
ISSN: 1753-8270

Article
Publication date: 16 October 2023

Miguel Calvo and Marta Beltrán

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it…

Abstract

Purpose

This paper aims to propose a new method to derive custom dynamic cyber risk metrics based on the well-known Goal, Question, Metric (GQM) approach. A framework that complements it and makes it much easier to use has been proposed too. Both, the method and the framework, have been validated within two challenging application domains: continuous risk assessment within a smart farm and risk-based adaptive security to reconfigure a Web application firewall.

Design/methodology/approach

The authors have identified a problem and provided motivation. They have developed their theory and engineered a new method and a framework to complement it. They have demonstrated the proposed method and framework work, validating them in two real use cases.

Findings

The GQM method, often applied within the software quality field, is a good basis for proposing a method to define new tailored cyber risk metrics that meet the requirements of current application domains. A comprehensive framework that formalises possible goals and questions translated to potential measurements can greatly facilitate the use of this method.

Originality/value

The proposed method enables the application of the GQM approach to cyber risk measurement. The proposed framework allows new cyber risk metrics to be inferred by choosing between suggested goals and questions and measuring the relevant elements of probability and impact. The authors’ approach demonstrates to be generic and flexible enough to allow very different organisations with heterogeneous requirements to derive tailored metrics useful for their particular risk management processes.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 22 December 2022

Kanokwan Pimchan and Chonlatis Darawong

This study aims to examine the influence of condominium attributes on resident satisfaction and word of mouth from the perspectives of the elderly in Thailand.

Abstract

Purpose

This study aims to examine the influence of condominium attributes on resident satisfaction and word of mouth from the perspectives of the elderly in Thailand.

Design/methodology/approach

Data were collected from 338 elderly residents through a questionnaire survey and analysed by using descriptive statistics and structural equation modelling procedures.

Findings

The results showed that the strongest predictor of resident satisfaction was design functionality, followed by social environment, safety and security and service quality. In addition, the strongest predictor of word of mouth was safety and security, followed by design functionality, proximity, service quality and social environment.

Research limitations/implications

The data were drawn at the level of the overall characteristics of elderly residents. People may be different in terms of their demographic characters such as gender, age, and user experience.

Practical implications

The study suggests that condominium developers and designers should pay attention to design functionality both physically and mentally such as suitable materials, lighting and common areas. Moreover, the developers should focus on the proximity of the nearest hospitals, safety and security measures, well-trained security personnel and social activity arrangement.

Originality/value

Elderly condominium markets are increasingly growing as a result of the ageing society in Thailand. However, very few empirical studies investigate condominium attributes that affect resident satisfaction and word of mouth provided by real estate developers. The paper aims to determine driving factors that enhance the better well-being of elderly residents.

Details

International Journal of Housing Markets and Analysis, vol. 17 no. 3
Type: Research Article
ISSN: 1753-8270

Keywords

Article
Publication date: 13 September 2023

Workicho Jateno Gadiso, Bamlaku Alamirew Alemu and Maru Shete

This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural…

Abstract

Purpose

This study aims to measure the status of rural household food security across regions using multidimensional indicators. It also aims to identify the determinants of rural household food security in Ethiopia.

Design/methodology/approach

The study adopted descriptive and explanatory designs. It used data from the fourth wave of the Ethiopian socioeconomic survey that has 3,115 respondents. The authors constructed household food security index using variables that capture availability, access, utilization and stability dimensions of food security. The authors categorized households into relative food security groups, namely, alarming and moderately food insecure, as well as moderately and highly food secure. Beta regression model, which is widely used to analyze response variables that assume values between 0 and 1, is used to estimate the determinants of food security.

Findings

The study finds that 77.7% of rural households are food insecure. Of this, 90% are moderately food insecure. Regional variations in magnitude of food security showed that Harari, Gambella and Benshanguel Gumuz regional states are relatively better-off than other regions in Ethiopia. The study identified sex, education level, marital status, location and wealth status of households as significant determinants of food security.

Originality/value

This study sheds light on regional variations in multidimensional food security in Ethiopia. It thus challenged previous estimates of food security using uni-dimensional indicator. It highlighted the need for region-specific analysis of determinants and a follow up of tailored regional interventions.

Peer review

The peer review history for this article is available at: https://publons.com/publon/10.1108/IJSE-02-2023-0139

Details

International Journal of Social Economics, vol. 51 no. 5
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 9 November 2023

Gregory Lyon

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is…

125

Abstract

Purpose

The rapid expansion of internet usage and device connectivity has underscored the importance of understanding the public’s cyber behavior and knowledge. Despite this, there is little research that examines the public’s objective knowledge of secure information security practices. The purpose of this study is to examine how objective cyber awareness is distributed throughout society.

Design/methodology/approach

This study draws on a large national survey of adults to examine the relationship between individual factors – such as demographic attributes and socioeconomic resources – and information security awareness. The study estimates several statistical models using weighted logistic regression to model objective information security awareness.

Findings

The results indicate that socioeconomic resources such as income and education have a significant effect on individuals’ information security awareness with richer and more highly educated individuals exhibiting greater awareness of important security practices and tools. Additionally, age and gender represent consistent and clear informational gaps in society as older individuals and females are significantly less knowledgeable about an array of information security practices than younger individuals and males, respectively.

Social implications

The findings have important implications for our understanding of information security behavior and user vulnerability in an increasingly digital and connected society. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks. While digital technology will continue to permeate many aspects of daily life – from financial transactions to health services to social interactions – the findings here indicate that some users may be far more exposed and vulnerable to attack than others.

Originality/value

This study contributes to our understanding of general user information security awareness using a large survey and statistical models to generalize about the public’s information security awareness across multiple domains and stimulates future research on public knowledge of information security. The findings indicate that some users may be far more exposed and vulnerable to attack than others. Despite the growing importance of cybersecurity for all individuals in nearly all domains of daily life, there is substantial inequality in awareness about secure cyber practices and the tools and techniques used to protect one’s self from attacks.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 3 October 2023

Shao-Fang Wen and Basel Katt

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in…

Abstract

Purpose

Security assurance evaluation (SAE) is a well-established approach for assessing the effectiveness of security measures in systems. However, one aspect that is often overlooked in these evaluations is the assurance context in which they are conducted. This paper aims to explore the role of assurance context in system SAEs and proposes a conceptual model to integrate the assurance context into the evaluation process.

Design/methodology/approach

The conceptual model highlights the interrelationships between the various elements of the assurance context, including system boundaries, stakeholders, security concerns, regulatory compliance and assurance assumptions and regulatory compliance.

Findings

By introducing the proposed conceptual model, this research provides a framework for incorporating the assurance context into SAEs and offers insights into how it can influence the evaluation outcomes.

Originality/value

By delving into the concept of assurance context, this research seeks to shed light on how it influences the scope, methodologies and outcomes of assurance evaluations, ultimately enabling organizations to strengthen their system security postures and mitigate risks effectively.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 10 of 578