scholarly journals The Effect of Security Risk on the Usage of Mobile Banking Apps in Jordan

Keyword(s):  

In electronic banking channels, mobile banking signifies a great innovation. Nonetheless, because of few reasons, customers are not quite sure about its usage. Numerous studies conducted regarding mobile banking adoption in different countries; however, fewer studies have been directed in Malaysia. In this study, we contributed to the research on e-banking adoption, specifically acceptance of mobile banking in Malaysia, and we enhanced our comprehension of customer’s attitude towards advanced technology system usage. Like so, it is essential to grasp the aspects impacting the intention to approve mobile banking channel in Malaysia. For the purpose, we suggested a new conceptual model by extending the Technology Acceptance Model (TAM) with new variables that are privacy risk and security risk, which also filled the research gap. The study core objective was to examine the aspects affecting individual’s attitude and behavioural intention to use mobile banking services in Malaysia. SEM technique was used through Smart-PLS3 for the analysis of data with a sample frame of 384 based on Krejcie and Morgan. The result revealed a significant and positive relationship between perceived ease of use, usefulness and attitude towards using mobile banking while a negative and significant relationship between privacy risk, security risk and attitude towards using mobile banking in Malaysia.


2017 ◽  
Vol 24 (2) ◽  
pp. 670-695 ◽  
Author(s):  
Fatih ECER

Mobile banking (M-banking) which integrates software, hardware, and human is a new platform for banks. Determining the performance of M-banking services helps bank practitioners identify better policy to improve their positions. The aim of this study is to develop an integrated model for evaluating M-banking services by two methods, namely the Fuzzy Analytic Hierarchy Process (FAHP) with an extent analysis approach and ARAS (Additive Ratio ASsessment). In this study, the priority weights obtained through the FAHP are combined with the ARAS method to as­sess and rank the M-banking services. Moreover, in order to verify the applicability of this proposed model, a case study in Turkey is offered. The findings indicate that facilitating conditions play the most determining role in the adoption of the M-banking, followed by self-efficacy, privacy risk, and security risk. Consequently, the proposed model helps to overcome difficulties in M-banking service evaluation process and increases the efficiency of the M-banking service activities. Besides, the case study validates that the proposed model is an effective and efficient decision making tool for the evaluation of M-banking services under fuzzy environments.


2020 ◽  
pp. 51-74
Author(s):  
I. A. Bashmakov

The article presents the key results of scenario projections that underpinned the Strategy for long-term low carbon economic development of the Russian Federation to 2050, including analysis of potential Russia’s GHG emission mitigation commitments to 2050 and assessment of relevant costs, benefits, and implications for Russia’s GDP. Low carbon transformation of the Russian economy is presented as a potential driver for economic growth that offers trillions-of-dollars-worth market niches for low carbon products by mid-21st century. Transition to low carbon economic growth is irreversible. Lagging behind in this technological race entails a security risk and technological backwardness hazards.


Author(s):  
Sultan Y. As-Sultan ◽  
◽  
Ibrahim Ahmed Al-Baltah ◽  
Fua’ad Hassan Abdulrazzak ◽  
◽  
...  

Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


Sign in / Sign up

Export Citation Format

Share Document