Abstract
Cyberattacks can be considered one of the fundamental challenges that paralyze the progress of digital payment usage (DPU) progress among citizens, as consumers shun away from using digital banking services due to increased concern over information security. National Cybersecurity Commitment (NCSC) has emerged as a preventive cybersecurity mechanism for countries to tackle such cybersecurity threats. Previous studies have shown that a country's NCSC positively impacts the business and economy of the country. This study examines the effect of NCSC on digital payment usage (DPU) across nations by grounding our discussion on the institutional trust theory. As trusting belief in security measures is a culturally embedded characteristic, we also examine the moderating role of national culture through Hofstede’s cultural dimensions. We use multilevel models to analyze publicly available archives of repeated cross-sectional data covering 76 countries to test the proposed relationships. Our findings indicate that NCSC has a positive influence on DPU. Further, our results highlight that the relationship between NCSC and DPU in a country is contingent on cultural dimensions. Overall, the evidence suggests that a competent cybersecurity environment compatible with cultural values can influence the speedy diffusion of digital payments in a country. Implications of our findings for research and practice are also discussed.





Notes
We explain various theoretical lenses in this section and next section. We thank Reviewer#1 for this thought.
We thank Reviewers #1 & #2 for this suggestion.
We thank Reviewer #1 for this suggestion.
References
Al-Okaily, M., Lutfi, A., Alsaad, A., Taamneh, A., & Alsyouf, A. (2020). The determinants of digital payment systems’ acceptance under cultural orientation differences: The case of uncertainty avoidance. Technology in Society, 63, 101–367.
Arner, D. W., Barberis, J., & Buckley, R. P. (2015). The evolution of Fintech: A new post-crisis paradigm. Geo. J. Int’l l., 47, 12–71.
Bacharach, M., & Gambetta, D. (2001). Trust in signs. In M. S. Cook (Ed.), Trust in society. Russell Sage Foundation.
Bagchi, K., Hart, P., & Peterson, M. F. (2004). National culture and information technology product adoption. Journal of Global Information Technology Management, 7(4), 29–46.
Bankole, F. O., & Bankole, O. O. (2017). The effects of cultural dimension on ICT innovation: Empirical analysis of mobile phone services. Telematics and Informatics, 34(2), 490–505.
Baptista, G., & Oliveira, T. (2015). Understanding mobile banking: The unified theory of acceptance and use of technology combined with cultural moderators. Computers in Human Behavior, 50, 418–430.
Bélanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. The Journal of Strategic Information Systems, 17(2), 165–176.
Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1041.
Bell, A., Fairbrother, M., & Jones, K. (2019). Fixed and random effects models: Making an informed choice. Quality & Quantity, 53(2), 1051–1074.
Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324.
Berghel, H. (2000). Identity theft, social security numbers, and the web. Communications of the ACM, 43(2), 17–21.
Beugelsdijk, S., & Welzel, C. (2018). Dimensions and dynamics of national culture: Synthesizing Hofstede with Inglehart. Journal of Cross-Cultural Psychology, 49(10), 1469–1505.
Cao, X., Yu, L., Liu, Z., Gong, M., & Adeel, L. (2018). Understanding mobile payment users’ continuance intention: A trust transfer perspective. Internet Research, 28(2), 456–476. https://doi.org/10.1108/IntR-11-2016-0359
Cerić, A., Vukomanović, M., Ivić, I., & Kolarić, S. (2021). Trust in megaprojects: A comprehensive literature review of research trends. International Journal of Project Management, 39(4), 325–338.
Chandra, S., Srivastava, S. C., & Theng, Y. L. (2010). Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis. Communications of the Association for Information Systems, 27(1), 561–588.
Chang, T. (2014). A Secure operational model for mobile payments. The Scientific World Journal, 2014, 14.
Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management 15(5/6), 358–368. https://doi.org/10.1108/09576050210447046.
Chien, S.-Y., Lewis, M., Sycara, K., Liu, J.-S., & Kumru, A. (2018). The effect of culture on trust in automation: Reliability and workload. ACM Transactions on Interactive Intelligent Systems, 8(4), 1–31.
CISCO (2017). Retrieved January, 2021 from https://www.cisco.com/c/m/en_au/products/security/offers/annual-cybersecurity-report-2017.html. Accessed 1 April 2020.
Cook, K. S., Hardin, R., & Levi, M. (2005). Cooperation without trust? Russell Sage Foundation.
Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Contemporary Research on Payments and Cards in the Global Fintech Revolution, 14(5), 265–284.
Devos, T., Spini, D., & Schwartz, S. H. (2002). Conflicts among human values and trust in institutions. British Journal of Social Psychology, 41(4), 481–494.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402. https://doi.org/10.1057/palgrave.ejis.3000590.
DiPrete, T. A., & Grusky, D. B. (1990). The multilevel analysis of trends with repeated cross-sectional data. Sociological Methodology, 20, 337–368.
Doney, P. M., Cannon, J. P., & Mullen, M. R. (1998). Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601–620.
Dzidzah, E., Owusu Kwateng, K., & Asante, B. K. (2020). Security behaviour of mobile financial service users. Information & Computer Security, 28(5), 719–741.
European Commission Brussels (2016). Retrieved January, 2021 from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52016SC0108&rid=2. Accessed 1 April 2020.
Fan, J., Shao, M., Li, Y., & Huang, X. (2018). Understanding users’ attitude toward mobile payment use. Industrial Management & Data Systems, 118(3), 524. Complementary Index.
Gai, K., Qiu, M., Sun, X., & Zhao, H. (2016). Security and privacy issues: A survey on FinTech. In International Conference on Smart Computing and Communication (pp. 236–247). Springer.
Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 33(3), 38–53.
Gefen, D., & Heart, T. H. (2006). On the need to include national culture as a central issue in e-commerce trust beliefs. Journal of Global Information Management (JGIM), 14(4), 1–30.
Gefen, D., & Straub, D. W. (2004). Consumer trust in B2C e-Commerce and the importance of social presence: Experiments in e-Products and e-Services. Omega, 32(6), 407–424.
Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27, 51–90.
Gefen, D., Rose, G. M., Warkentin, M., & Pavlou, P. A. (2005). Cultural diversity and trust in IT adoption: A comparison of potential e-voters in the USA and South Africa. Journal of Global Information Management (JGIM), 13(1), 54–78.
Gefen, D., Pavlou, P., Benbasat, I., McKnight, H., Stewart, K., & Straub, D. (2006). ICIS panel summary: Should institutional trust matter in information systems research? Communications of the Association for Information Systems, 17(1), 9.
GFAI. (2019). https://www.ey.com/en_gl/ey-global-fintech-adoption-index, last accessed on April 01, 2020.
GFI. (2011) https://globalfindex.worldbank.org/, last accessed on 01 Apr 2020.
GFI. (2014) https://globalfindex.worldbank.org/, last accessed on 01 Apr 2020.
GFI. (2017) https://globalfindex.worldbank.org/, last accessed on 01 Apr 2020.
Giddens, A. (2013). The consequences of modernity. Wiley.
Gurung, A., Luo, X., & Raja, M. K. (2008). An empirical investigation on customer’s privacy perceptions, trust and security awareness in E-commerce environment. Journal of Information Privacy and Security, 4(1), 42–60.
de Gusmão, A. P. H., Silva, M. M., Poleto, T., e Silva, L. C., & Costa, A. P. C. S. (2018). Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information Management, 43, 248–260.
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. (2006). Multivariate data analysis. Uppersaddle River.
Halchin, L. E. (2004). Electronic government: Government capability and terrorist resource. Government Information Quarterly, 21(4), 406–419.
Harris, P., Rettie, R., & Cheung, C. K. (2005). Adoption and usage of m-commerce: A cross-cultural comparison of Hong Kong and the United Kingdom. Journal of Electronic Commerce Research, 6(3), 210–224.
Hinde, S. (1998). Privacy and security—The drivers for growth of E-Commerce. Computers & Security, 17(6), 475–478.
Hofstede, G. (1980). Culture and organizations. International Studies of Management & Organization, 10(4), 15–41.
Hofstede, G. (2001). Culture’s consequences: Comparing values, behaviors, institutions and organizations across nations. Sage publications.
Hofstede, G. (2021). National culture: Dimensions of National Culture. Retrieved January, 2021 from https://geert-hofstede.com/national-culture.html. Accessed 1 April 2020.
Hofstede, G., Hofstede, G., & Minkov, M. (2010). Intercultural cooperation and its importance for survival. In Cultures and organi- zations: Software of the mind. McGraw-Hill.
Huang, D.-L., Patrick Rau, P.-L., Salvendy, G., Gao, F., & Zhou, J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computer Studies, 69(12), 870–883.
Huff, L., & Kelley, L. (2003). Levels of organizational trust in individualist versus collectivist societies: A seven-nation study. Organization Science, 14(1), 81–90.
Inglehart, R. (1999). Trust, well-being and democracy. Democracy and trust (Vol. 88, pp. 88–120). Cambridge University Press.
ITU Cyber. (2011). https://www.itu.int/pub/D-STR-SECU-2015, last accessed on 01 Apr 2020.
ITU Cyber. (2014). https://www.itu.int/pub/D-STR-GCI.01-2017, last accessed on 01 Apr 2020.
ITU Cyber. (2018). https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf, last accessed on 01 Apr 2020.
ITU. (2011). https://reports.weforum.org/global-information-technology-2011/. last accessed on 01 Apr 2020.
ITU. (2014). http://www3.weforum.org/docs/WEF_GlobalInformationTechnology_Report_2014.pdf, last accessed on 01 Apr 2020.
ITU. (2017). https://networkreadinessindex.org/wp-content/uploads/2020/03/The-Network-Readiness-Index-2019-New-version-March-2020.pdf, last accessed on 01 Apr 2020.
Kale, S. H., & Barnes, J. W. (1992). Understanding the domain of cross-national buyer-seller interactions. Journal of International Business Studies, 23(1), 101–132.
Kalinic, Z., Marinkovic, V., Molinillo, S., & Liébana-Cabanillas, F. (2019). A multi-analytical approach to peer-to-peer mobile payment acceptance prediction. Journal of Retailing and Consumer Services, 49, 143–153.
Kapoor, K. K., Dwivedi, Y. K., & Williams, M. D. (2014). Innovation adoption attributes: a review and synthesis of research findings. European Journal of Innovation Management 17(3), 327–348. https://doi.org/10.1108/EJIM-08-2012-0083.
Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13–45.
Kim, K., & Hong, S. (2016). The data processing approach for preserving personal data in fintech-driven paradigm. International Journal of Security and Its Applications, 10(10), 341–350.
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009a). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information Systems Research, 20(2), 237–257.
Kim, G., Shin, B., & Lee, H. G. (2009b). Understanding dynamics between initial trust and usage intentions of mobile banking. Information System Journal, 19(3), 283–311.
Kim, Y., Choi, J., Park, Y. J., & Yeon, J. (2016). The adoption of mobile payment services for “Fintech.” International Journal of Applied Engineering Research, 11(2), 1058–1061.
Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49.
Koenig-Lewis, N., Marquet, M., Palmer, A., & Zhao, A. L. (2015). Enjoyment and social influence: predicting mobile payment adoption. The Service Industries Journal, 35(10), 537–554.
Krishna, B., & Krishnan, S. (2020). Explaining variation in adoption of FinTech products and services among citizens: A multilevel model. In Sujeet K. Sharma, Y. K. Dwivedi, B. Metri, & N. P. Rana (Eds.), Re-imagining diffusion and adoption of information technology and systems: A continuing conversation (Vol. 617, pp. 541–552). Springer International Publishing.
Krishna, B., & Sebastian, M. P. (2021). Examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: A cross-country analysis. Information and Computer Security. https://doi.org/10.1108/ICS-12-2020-0205
Krishnan, S., Teo, T. S., & Lim, V. K. (2013). Examining the relationships among e-government maturity, corruption, economic prosperity and environmental degradation: A cross-country analysis. Information & Management, 50(8), 638–649.
Kusano, K., & Kemmelmeier, M. (2020). Multi-level modelling of time-series cross-sectional data reveals the dynamic interaction between ecological threats and democratic development. Royal Society Open Science, 7(3), 191804.
Lai, F., Li, D., & Hsieh, C. T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353–363.
Lebo, M. J., & Weber, C. (2015). An effective approach to the repeated cross-sectional design. American Journal of Political Science, 59(1), 242–258.
Lee, J. D., & Moray, N. (1994). Trust, self-confidence, and operators’ adaptation to automation. International Journal of Human-Computer Studies, 40(1), 153–184.
Lee, S.-G., Trimi, S., & Kim, C. (2013). The impact of cultural differences on technology adoption. Journal of World Business, 48(1), 20–29.
Lee, J. K., Cho, D., & Lim, G. G. (2018). Design and validation of the bright internet. Journal of the Association for Information Systems, 19(2), 3.
Lee, J. K., Chang, Y., Kwon, H. Y., & Kim, B. (2020). Reconciliation of privacy with preventive cybersecurity: The bright internet approach. Information Systems Frontiers, 22(1), 45–57.
Leidner, D. E., & Kayworth, T. (2006). A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30, 357–399.
Léon, F., & Zins, A. (2020). Regional foreign banks and financial inclusion: Evidence from Africa. Economic Modelling, 84, 102–116.
Leung, K., & Bond, M. H. (2004). Social Axioms: A Model for Social Beliefs in Multicultural Perspective. In M. P. Zanna (Ed.), Advances in experimental social psychology (Vol. 36, pp. 119–197). Elsevier Academic Press. https://doi.org/10.1016/S0065-2601(04)36003-X
Leung, A. K. Y., & Cohen, D. (2011). Within-and between-culture variation: Individual differences and the cultural logics of honor, face, and dignity cultures. Journal of Personality and Social Psychology, 100(3), 507.
Lim, K. H., Leung, K., Sia, C. L., & Lee, M. K. (2004). Is eCommerce boundary-less? Effects of individualism–collectivism and uncertainty avoidance on Internet shopping. Journal of International Business Studies, 35(6), 545–559.
Liu, J., Kauffman, R. J., & Ma, D. (2015). Competition, cooperation, and regulation: Understanding the evolution of the mobile payments technology ecosystem. Electronic Commerce Research and Applications, 14(5), 372–391.
Liu, Z., Min, Q., & Ji, S. (2009). An empirical study on mobile banking adoption: The role of trust. In 2009 Second International Symposium on Electronic Commerce and Security (Vol. 2, pp. 7–13). IEEE.
Lu, Y., Yang, S., Chau, P. Y., & Cao, Y. (2011). Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Information & Management, 48(8), 393–403.
Luo, X., Li, H., Zhang, J., & Shim, J. P. (2010). Examining multi-dimensional trust and multi-faced risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decision Support Systems, 49(2), 222–234.
Manoj, V. B. (2011). SMS based secure mobile banking. International Journal of Engineering and Technology, 3(6), 472–479.
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.
McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. The Academy of Management Journal, 38(1), 24–59.
McKnight, D. H., & Chervany, N. L. (2001). What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35–59.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.
Migliore, G., Wagner, R., Cechella, F. S., & Liébana-Cabanillas, F. (2022). Antecedents to the Adoption of Mobile Payment in China and Italy: an Integration of UTAUT2 and Innovation Resistance Theory. Information Systems Frontiers, 1–24. https://doi.org/10.1007/s10796-021-10237-2
Milian, E. Z., de Spinola, M. D. M., & de Carvalho, M. M. (2019). Fintechs: A literature review and research agenda. Electronic Commerce Research and Applications, 34, 100833.
Milliman, R. E., & Fugate, D. L. (1988). Using trust-transference as a persuasion technique: An empirical field investigation. Journal of Personal Selling & Sales Management, 8(2), 1–7.
Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.
Mohr, H., & Walter, Z. (2019). Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online Retailers. Information Systems Frontiers, 21(6), 1231–1250.
Mombeuil, C. (2020). An exploratory investigation of factors affecting and best predicting the renewed adoption of mobile wallets. Journal of Retailing and Consumer Services, 55, 102127.
Moon, W. Y., & Kim, S. D. (2017). Adaptive fraud detection framework for fintech based on machine learning. Advanced Science Letters, 23(10), 10167–10171.
Morosan, C., & DeFranco, A. (2016). It’s about time: Revisiting UTAUT2 to examine consumers’ intentions to use NFC mobile payments in hotels. International Journal of Hospitality Management, 53, 17–29.
Mtaho, A. B. (2015). Improving mobile money security with two-factor authentication. International Journal of Computer Applications, 109(7), 9–15.
Mukhopadhyay, A., Chatterjee, S., Bagchi, K. K., Kirs, P. J., & Shukla, G. K. (2019). Cyber risk assessment and mitigation (CRAM) framework using logit and probit models for cyber insurance. Information Systems Frontiers, 21(5), 997–1018.
Mukundan, N. R., & Sai, L. P. (2014). Perceived information security of internal users in Indian IT services industry. Information Technology and Management, 15(1), 1–8.
Offe, C. (1999). How can we trust our fellow citizens? Democracy and trust, Cambridge University Press, Cambridge, 52, 42-87.
Official Annual Cybercrime Report (2019). Retrieved January, 2021 from https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf. Accessed 1 April 2020.
O’hara, K. (2004). Trust: from Socrates to spin. Icon Books.
Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61, 404–414.
Oyserman, D., Coon, H. M., & Kemmelmeier, M. (2002). Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, 128(1), 3.
Pal, A., Herath, T., & Rao, H. R. (2021a). Why do people use mobile payment technologies and why would they continue? An examination and implications from India. Research Policy, 50(6), 104–228.
Pal, A., Herath, T., De, R., & Rao, H. R. (2021b). Is the convenience worth the risk? An investigation of mobile payment usage. Information Systems Frontiers, 23(4), 941–961.
Park, S. (2019). Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records. International Review of Law and Economics, 58, 132–145.
Patil, P., Tamilmani, K., Rana, N. P., & Raghavan, V. (2020). Understanding consumer adoption of mobile payment in India: Extending Meta-UTAUT model with personal innovativeness, anxiety, trust, and grievance redressal. International Journal of Information Management, 54, 102144.
Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 667–675.
Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136.
Phonthanukitithaworn, C., Sellitto, C., & Fong, M. W. L. (2015). User intentions to adopt mobile payment services: A study of early adopters in Thailand. Journal of Internet Banking and Commerce, 20(1).
Putnam, R. D. (1992). Making democracy work: Civic traditions in modern Italy. Princeton University Press.
Qasim, H., & Abu-Shanab, E. (2016). Drivers of mobile payment acceptance: The impact of network externalities. Information Systems Frontiers, 18(5), 1021–1034.
Ratnasingam, P. (2004). The role of facilitating conditions in developing trust for successful electronic marketplace participation. Journal of Internet Commerce, 3(3), 95–110.
Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404. Chicago
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65–78.
Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89.
Schwartz, S. H. (1994). Beyond individualism/collectivism: New cultural dimensions of values.
Semerikova, E. (2020). What hinders the usage of smartphone payments in Russia? Perception of technological and security barriers. Technological Forecasting and Social Change, 161, 120312.
Senyo, P., & Osabutey, E. L. C. (2020). Unearthing antecedents to financial inclusion through FinTech innovations. Technovation, 98, 102155.
Sha, W. (2009). Types of structural assurance and their relationships with trusting intentions in business-to-consumer e-commerce. Electronic Markets, 19(1), 43–54.
Shapiro, S. P. (1987). The social control of impersonal trust. American Journal of Sociology, 93(3), 623–658.
Sharma, S. K., & Sharma, M. (2019). Examining the role of trust and quality dimensions in the actual usage of mobile banking services: An empirical investigation. International Journal of Information Management, 44, 65–75.
Shi, T. (2001). Cultural values and political trust: a comparison of the People’s Republic of China and Taiwan. Comparative Politics, 33, 401–419.
Shin, Y. Y., Lee, J. K., & Kim, M. (2018). Preventing state-led cyberattacks using the bright internet and internet peace principles. Journal of the Association for Information Systems, 19(3), 3.
Shukla, S. K. (2016, January). Cyber security of cyber physical systems: Cyber threats and defense of critical infrastructures. In 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID) (pp. 30–31). IEEE.
Siau, K., & Shen, Z. (2003). Building customer trust in mobile commerce. Communications of the ACM, 46(4), 91–94.
Slade, E. L., Dwivedi, Y. K., Piercy, N. C., & Williams, M. D. (2015). Modeling consumers’ adoption intentions of remote mobile payments in the United Kingdom: Extending UTAUT with innovativeness, risk, and trust. Psychology & Marketing, 32(8), 860–873.
Slade, E. L., Williams, M. D., & Dwivedi, Y. K. (2013). Extending UTAUT2 to explore consumer adoption of mobile payments. In Proceedings of the Uk academy for information systems conference. Oxford.
Smith, M. L. (2010). Building institutional trust through e-government trustworthiness cues. Information Technology & People, 23(3), 222–246.
Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. MIS Quarterly, 30, 679–704.
Srivastava, S. C., & Teo, T. S. H. (2010). E-Government, E-Business, and National Economic Performance. Communications of the Association for Information Systems, 26(1), 14.
Srivastava, S. C., & Teo, T. S. (2009). Citizen trust development for e-government adoption and usage: Insights from young adults in Singapore. Communications of the Association for Information Systems, 25(1), 31.
Stewart, K. J. (2003). Trust transfer on the world wide web. Organization Science, 14(1), 5–17.
Stewart, H., & Jürjens, J. (2018). Data security and consumer trust in FinTech innovation in Germany. Information & Computer Security, 26(1), 109–128.
Straub, D. W. (1994). The Effect of Culture on IT Diffusion: E-Mail and FAX in Japan and the US. Information Systems Research, 5(1), 23–47.
Sztompka, P. (1999). Trust: A sociological theory. Cambridge University Press.
Takieddine, S., & Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research and Applications, 14(5), 361–371.
Tam, C., & Oliveira, T. (2019). Does culture influence m-banking use and individual performance? Information & Management, 56(3), 356–363.
Thakur, R., & Srivastava, M. (2014). Adoption readiness, personal innovativeness, perceived risk and usage intention across customer groups for mobile payment services in India. Internet Research.
Traynor, P., Butler, K., Bowers, J., & Reaves, B. (2017). FinTechSec: Addressing the security challenges of digital financial services. IEEE Security & Privacy, 15(5), 85–89.
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers & Security, 24(1), 10–15.
Tyagi, S. (2019). Cybercrime overwhelming online banking: A Project Management approach’s alternative1. PM World Journal. http://www.pmworldjournal.net. Accessed 1 April 2020.
Verba, S., & Almond, G. (1963). The civic culture: Political attitudes and democracy in five nations. Princeton University Press.
Walsham, G. (2002). Cross-cultural software production and use: A structurational analysis. MIS Quarterly, 26, 359–380.
Wang, N., Shen, X. L., & Sun, Y. (2013). Transition of electronic word-of-mouth services from web to mobile context: A trust transfer perspective. Decision Support Systems, 54(3), 1394–1403.
Wang, Z., Zhengzhi Gordon, G. U. A. N., Hou, F., Li, B., & Zhou, W. (2019). What determines customers’ continuance intention of FinTech? Evidence from YuEbao. Industrial Management & Data Systems, 119(8), 1625–1637. https://doi.org/10.1108/IMDS-01-2019-0011
Warren, M. (2018). Trust and democracy. In E. M. Uslaner (Ed), The Oxford handbook of social and political trust (pp. 75-94). Oxford University Press
WBD. (2020). https://data.worldbank.org/indicator/NY.GDP.PCAP.CD. last accessed on 01 Apr 2020.
Xin, H., Techatassanasoontorn, A. A., & Tan, F. B. (2013). Exploring the influence of trust on mobile payment adoption. In Proceedings of the Pacific Asia Conference on Information Systems (PACIS). Jeju Island, Korea.
Yang, G., Mao, Y. (2011). A research on the model of factors influencing consumer trust in mobile business. International Conference on E-Business and E-Government (ICEE), p. 1–5, IEEE.
Yeh, H. (2020). Factors in the ecosystem of mobile payment affecting its use: From the customers’ perspective in Taiwan. Journal of Theoretical and Applied Electronic Commerce Research, 15(1), 0–0.
Yu, C. S. (2012). Factors affecting individuals to adopt mobile banking: Empirical evidence from the UTAUT model. Journal of Electronic Commerce Research, 13(2), 104.
Zhang, J., Liu, H., Sayogo, D. S., Picazo-Vela, S., & Luna-Reyes, L. (2016). Strengthening institutional-based trust for sustainable consumption: Lessons for smart disclosure. Government Information Quarterly, 33(3), 552–561.
Zhang, L., Zhu, J., & Liu, Q. (2012). A meta-analysis of mobile commerce adoption and the moderating effect of culture. Computers in Human Behavior, 28(5), 1902–1911.
Zheng, X., Lee, M., & Cheung, C. M. (2017). Examining e-loyalty towards online shopping platforms: The role of coupon proneness and value consciousness. Internet Research.
Zhou, T., Lu, Y., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior, 26(4), 760–767.
Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, 1840–1920. Research in Organizational Behavior, 8, 53–111.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Table 7
Table 8
Table 9
Table 10
Table 11
Table 12
Rights and permissions
About this article
Cite this article
Krishna, B., Krishnan, S. & Sebastian, M.P. Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective. Inf Syst Front 25, 1713–1741 (2023). https://doi.org/10.1007/s10796-022-10280-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-022-10280-7