TY - GEN
T1 - Mobile banking and information security risks
T2 - 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015
AU - Njenga, Kennedy
AU - Ndlovu, Sifiso
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016/3/17
Y1 - 2016/3/17
N2 - South Africa's lead-users predilections to tinker and innovate mobile banking services is driven by various constructs. Advanced technologies have made mobile banking services easy to use, attractive and beneficial. While this is welcome news to many, there are concerns that when lead-users tinker with these services, information security risks are exacerbated. The aim of this article is to present an insightful understanding of the demand-side predilections of South Africa's lead-users in such contexts. We assimilate the theories of Usage Control, (UCON), the Theory of Technology Acceptance Model (TAM), and the Theory of Perceived Risk (TPP) to explain predilections over technology. We demonstrate that constructs derived from these theories can explain the general demand-side predilection to tinker with mobile banking services. A quantitative approach was used to test this. From a sample of South African banking lead-users operating in Gauteng province of South Africa, data was collected and analysed with the help of a software package. We found unexpectedly that, lead-users predilections to tinker with mobile banking services was inhibited by perceived risk. Moreover, male lead-users were more domineering in the tinkering process than female lead-users. The implication for this is discussed and explained in the main body of work.
AB - South Africa's lead-users predilections to tinker and innovate mobile banking services is driven by various constructs. Advanced technologies have made mobile banking services easy to use, attractive and beneficial. While this is welcome news to many, there are concerns that when lead-users tinker with these services, information security risks are exacerbated. The aim of this article is to present an insightful understanding of the demand-side predilections of South Africa's lead-users in such contexts. We assimilate the theories of Usage Control, (UCON), the Theory of Technology Acceptance Model (TAM), and the Theory of Perceived Risk (TPP) to explain predilections over technology. We demonstrate that constructs derived from these theories can explain the general demand-side predilection to tinker with mobile banking services. A quantitative approach was used to test this. From a sample of South African banking lead-users operating in Gauteng province of South Africa, data was collected and analysed with the help of a software package. We found unexpectedly that, lead-users predilections to tinker with mobile banking services was inhibited by perceived risk. Moreover, male lead-users were more domineering in the tinkering process than female lead-users. The implication for this is discussed and explained in the main body of work.
KW - Information Security Risk
KW - Lead-users
KW - Mobile banking
KW - Predilections
KW - Tinker
UR - http://www.scopus.com/inward/record.url?scp=84971389527&partnerID=8YFLogxK
U2 - 10.1109/InfoSec.2015.7435511
DO - 10.1109/InfoSec.2015.7435511
M3 - Conference contribution
AN - SCOPUS:84971389527
T3 - 2015 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015
SP - 86
EP - 92
BT - 2015 2nd International Conference on Information Security and Cyber Forensics, InfoSec 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 15 November 2015 through 17 November 2015
ER -