Skip to main content
Log in

Banking behavior in security and multi-channel environment

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

The purpose of this paper is to study the differences of factors affecting banking behavior in multi-channel environment. This paper adopted multi-group structural equation modeling to compare the differences of causalities between internet and mobile banking. The result of causality in this paper generally supports the theory of technology acceptance model and the paths across the two groups are different. Certain relations in multi-channel are the same, for example the behavioral intention of internet banking and mobile banking usage are determined by perceived usefulness, trust and perceived ease of use sequentially. Alternatively, several differences exist in the external variables of beliefs. Internet banking regards self-efficiency and perceived ease of use more important. Mobile banking considers situational normality and trust more important.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Seddon, P.B.: A respecification and extension of the DeLone and McLean model of IS success. Inf. Syst. Res. 8(3), 240–253 (1997)

    Article  Google Scholar 

  2. Venkatesh, V., Ramesh, V.: Web and wireless site usability: understanding differences and modeling use. Mis Q. 181–206 (2006)

  3. Oh, S.-Y., Ghose, S., Jang, H.-J., Chung, K.: Recent trends in mobile communication systems. J. Comput. Virol. Hacking Tech. 10(2), 67–70 (2014)

    Article  Google Scholar 

  4. Lai, V.S., Li, H.: Technology acceptance model for internet banking: an invariance analysis. Inf. Manage. 42(2), 373–386 (2005)

    Article  Google Scholar 

  5. Lee, M.-C.: Factors influencing the adoption of internet banking: an integration of TAM and TPB with perceived risk and perceived benefit. Electron. Commerce Res. Appl. 8(3), 130–141 (2009)

    Article  Google Scholar 

  6. Cheng, T., Lam, D.Y., Yeung, A.C.: Adoption of internet banking: an empirical study in Hong Kong. Decis. Support Syst. 42(3), 1558–1572 (2006)

    Article  Google Scholar 

  7. Suh, B., Han, I.: Effect of trust on customer acceptance of internet banking. Electron. Commerce Res. Appl. 1(3), 247–263 (2003)

    Google Scholar 

  8. Suoranta, M., Mattila, M.: Mobile banking and consumer behaviour: new insights into the diffusion pattern. J. Financial Serv. Mark. 8(4), 354–366 (2004)

    Article  Google Scholar 

  9. Laforet, S., Li, X.: Consumers’ attitudes towards online and mobile banking in China. Int. J. Bank Mark. 23(5), 362–380 (2005)

    Article  Google Scholar 

  10. Kim, G., Shin, B., Lee, H.G.: Understanding dynamics between initial trust and usage intentions of mobile banking. Inf. Syst. J. 19(3), 283–311 (2009)

    Article  Google Scholar 

  11. Cho, N.-J., Park, K.-H., Lim, H.-K.: Analysis influencial factors for media selection in banking transaction context. J. Digital Convergence 6(3), 75–84 (2008)

    Google Scholar 

  12. Kim, M.-C., No, K.-S., Kim, H.-C.: An empirical sutdy on system evaluation and recommendation factors of internet banking. J. Digital Convergence 2(2), 77–87 (2004)

    Google Scholar 

  13. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: a comparison of two theoretical models. Manage. Sci. 35(8), 982–1003 (1989)

    Article  Google Scholar 

  14. Mathieson, K.: Predicting user intentions: comparing the technology acceptance model with the theory of planned behavior. Inf. Syst. Res. 2(3), 173–191 (1991)

    Article  Google Scholar 

  15. Han, H.-S., Lee, J.-K.: A study on the impact of quality factors on the easy of use and usefulness of mobile games. J. Digital Convergence 4(2), 87–96 (2006)

    MathSciNet  Google Scholar 

  16. Han, H.-S., Park, K.-H., Cho, J.-W.: The determinants of usefulness and intention in mobile game service. J. Digital Convergence 4(2), 41–49 (2006)

    Google Scholar 

  17. Venkatesh, V., Davis, F.D.: A model of the antecedents of perceived ease of use: development and test. Decis. Sci. 27(3), 451–481 (1996)

    Article  Google Scholar 

  18. Kim, D.H., Park, K.H., Choi, G.W., Min, K.J.: A study on the factors that affect the adoption of smart water grid. J. Comput. Virol. Hacking Tech. 10(2), 119–128 (2014)

    Article  Google Scholar 

  19. Compeau, D.R., Higgins, C.A.: Computer self-efficacy: development of a measure and initial test. MIS Q. 189–211 (1995)

  20. Compeau, D., Higgins, C.A., Huff, S.: Social cognitive theory and individual reactions to computing technology: a longitudinal study. MIS Q. 145–158 (1999)

  21. Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 319–340 (1989)

  22. Agarwal, R., Karahanna, E.: Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage. MIS Q. 665–694 (2000)

  23. Ong, C.-S., Lai, J.-Y., Wang, Y.-S.: Factors affecting engineers’ acceptance of asynchronous e-learning systems in high-tech companies. Inf. Manage. 41(6), 795–804 (2004)

    Article  Google Scholar 

  24. Vijayasarathy, L.R.: Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model. Inf. Manage. 41(6), 747–762 (2004)

    Article  Google Scholar 

  25. Bergeron, F., Rivard, S., De Serre, L.: Investigating the support role of the information center. MIS Q. 247–260 (1990)

  26. Igbaria, M., Guimaraes, T., Davis, G.B.: Testing the determinants of microcomputer usage via a structural equation model. J. Manage. Inf. Syst. 87–114 (1995)

  27. Venkatesh, V.: Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf. Syst. Res. 11(4), 342–365 (2000)

    Article  Google Scholar 

  28. Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 425–478 (2003)

  29. Gefen, D., Straub, D.W.: Gender differences in the perception and use of e-mail: an extension to the technology acceptance model. MIS Q. 389–400 (1997)

  30. Hsu, M.-H., Chiu, C.-M.: Internet self-efficacy and electronic service acceptance. Decis. Support Syst. 38(3), 369–381 (2004)

    Article  Google Scholar 

  31. Hsu, C.-L., Lu, H.-P.: Why do people play on-line games? an extended TAM with social influences and flow experience. Inf. Manage. 41(7), 853–868 (2004)

    Article  Google Scholar 

  32. Taylor, S., Todd, P.A.: Understanding information technology usage: a test of competing models. Inf. Syst. Res. 6(2), 144–176 (1995)

    Article  Google Scholar 

  33. Schepers, J., Wetzels, M.: A meta-analysis of the technology acceptance model: investigating subjective norm and moderation effects. Inf. Manage. 44(1), 90–103 (2007)

    Article  Google Scholar 

  34. Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46(2), 186–204 (2000)

    Article  Google Scholar 

  35. Lin, J.C.-C., Lu, H.: Towards an understanding of the behavioural intention to use a web site. Int. J. Inf. Manag. 20(3), 197–208 (2000)

    Article  Google Scholar 

  36. Sathye, M.: Adoption of internet banking by Australian consumers: an empirical investigation. Int. J. Bank Mark. 17(7), 324–334 (1999)

    Article  Google Scholar 

  37. Pikkarainen, T., Pikkarainen, K., Karjaluoto, H., Pahnila, S.: Consumer acceptance of online banking: an extension of the technology acceptance model. Internet Res. 14(3), 224–235 (2004)

    Article  Google Scholar 

  38. Grazioli, S., Jarvenpaa, S.L.: Perils of internet fraud: an empirical investigation of deception and trust with experienced Internet consumers. Syst. Man Cybern. Part A Syst. Hum. IEEE Trans. 30(4), 395–410 (2000)

    Article  Google Scholar 

  39. Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: an integrated model. MIS Q. 27(1), 51–90 (2003)

    Google Scholar 

  40. Gefen, D.: E-commerce: the role of familiarity and trust. Omega 28(6), 725–737 (2000)

    Article  Google Scholar 

  41. Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commerce 7(3), 101–134 (2003)

    Google Scholar 

  42. Cao, Y., Miao, Q., Liu, J., Gao, L.: Abstracting minimal security-relevant behaviors for malware analysis. J. Comput. Virol. Hacking Tech. 9(4), 193–204 (2013)

    Article  Google Scholar 

  43. Choi, M.-K., Han, K.-S.: A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments. J. Comput. Virol. Hacking Tech. 10(2), 145–156 (2014)

    Article  MathSciNet  Google Scholar 

  44. Jarvenpaa, S.L., Tractinsky, N., Saarinen, L.: Consumer trust in an internet store: a cross-cultural validation. J. Comput. Mediat. Commun. 5(2) 0-0 (1999)

  45. Gefen, D.: TAM or just plain habit. Adv. Topics End User Comput. 3(3), 1 (2004)

    Article  Google Scholar 

  46. Koufaris, M., Hampton-Sosa, W.: The development of initial trust in an online company by new customers. Inf. Manag. 41(3), 377–397 (2004)

    Article  Google Scholar 

  47. Zucker, L.G.: Production of trust: Institutional sources of economic structure. Res. Organ. Behav. 1840–1920 (1986)

  48. McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial trust formation in new organizational relationships. Acad. Manag. Rev. 23(3), 473–490 (1998)

    Google Scholar 

  49. Baier, A.: Trust and antitrust. Ethics 231–260 (1986)

  50. Lewis, J.D., Weigert, A.: Trust as a social reality. Soc. Forces 63(4), 967–985 (1985)

    Article  Google Scholar 

  51. Shapiro, S.P.: The social control of impersonal trust. Am. J. Sociol. 623–658 (1987)

  52. Kim, K.K., Prabhakar, B.: Initial trust and the adoption of B2C e-commerce: the case of internet banking. ACM Sigmis Database 35(2), 50–64 (2004)

    Article  Google Scholar 

  53. Mullen, M.R.: Diagnosing measurement equivalence in cross-national research. J. Int. Bus. Stud. 573–596 (1995)

  54. Myers, M.B., Calantone, R.J., Page Jr, T.J., Taylor, C.R.: An application of multiple-group causal models in assessing cross-cultural measurement equivalence. J. Int. Mark. 8(4), 108–121 (2000)

    Article  Google Scholar 

  55. Craig, C.S., Douglas, S.P.: International marketing research. Wiley, Chichester (2005)

    Google Scholar 

  56. Steenkamp, J.-B.E., Van Trijp, H.: The use of LISREL in validating marketing constructs. Int. J. Res. Mark. 8(4), 283–299 (1991)

    Article  Google Scholar 

  57. Wang, W., Benbasat, I.: Trust in and adoption of online recommendation agents. J. Assoc. Inf. Syst. 6(3), 4 (2005)

    Google Scholar 

  58. Venkatesh, V., Morris, M.G.: Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Q. 115–139 (2000)

  59. Gu, J.-C., Lee, S.-C., Suh, Y.-H.: Determinants of behavioral intention to mobile banking. Expert Syst. Appl. 36(9), 11605–11616 (2009)

    Article  Google Scholar 

  60. Hoffman, D.L., Novak, T.P., Peralta, M.: Building consumer trust online. CACM 42(4), 80–85 (1999)

    Article  Google Scholar 

  61. Gefen, D., Straub, D.W.: Managing user trust in B2C e-services. E-service J. 2(2), 7–24 (2003)

    Article  Google Scholar 

  62. Liu, C., Marchewka, J.T., Lu, J., Yu, C.-S.: Beyond concern: a privacy-trust-behavioral intention model of electronic commerce. Inf. Manag. 42(1), 127–142 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kwang Hyuk Im.

Additional information

Special Issue: Convergence Security Systems.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, SC., Im, K.H. Banking behavior in security and multi-channel environment. J Comput Virol Hack Tech 11, 157–164 (2015). https://doi.org/10.1007/s11416-014-0235-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-014-0235-6

Keywords

Navigation