An Empirical Study of The Indirect Effects of the Perceived Accessibility and Cyber Security of Mobile Banking Applications on User Loyalty to the Applications

  • Authors

    • Wonjin Jung
    https://doi.org/10.14419/ijet.v8i1.4.25459
  • Accessibiliy, Cyber, Security, Loyalty, Banking Application.
  • As the use of smart phones and mobile devices in our daily lives continues to increase today since they were launched in the late 1990s, so do cybercrimes. Because mobile users can use their devices anytime and anywhere and almost without any constraints, mobile devices give users much greater access to the Internet, websites, and mobile applications, and the more users link to networks, the more exposed they are to cyber security issues. Such user mobile network environments have degraded the perceived security of mobile applications. Conventionally, users of mobile banking applications are exposed to potential cybercrimes and sometimes actually experience cyber security incidents. Once users recognize the potential for cybercrimes, they may hesitate or even refuse to use these applications to process their monetary transactions. Under these circumstances, users’ perceptions of cyber security issues could limit their loyalty to their mobile banking applications; that is, users could stop using these applications before they even ever form any brand loyalty to the applications. Therefore, it can be inferred that users’ loyalty to mobile banking applications is likely to depend on the applications’ perceived cyber security. Many information systems (IS) and business researchers have addressed that accessibility and security are critical IS quality attributes. In short, ease of access to mobile banking applications could directly and indirectly affect not only users’ perceptions of cyber security and usability but also their loyalty to the applications. But a comprehensive IS and business literature review finds little research on the effects of mobile banking apps’ perceived accessibility, security, or usability on user loyalty to the apps. Therefore, The aims of this study are as follows: (1) to examine the direct and indirect effects of the perceived accessibility and cyber security of mobile banking applications on user loyalty to the apps and (2) to find the causal relationships among the perceived accessibility, cyber security, and usability of mobile banking applications and user loyalty to the applications. Structural equation modeling (SEM) was used to analyze the data collected by a survey. The results of analyses show the direct and indirect effects of accessibility of mobile banking apps on the perceived cyber security and usability of the apps as well as on user loyalty to the apps. The results emphasize the importance of perceived accessibility and security in understanding the factors that affect user loyalty to mobile banking applications. The results of this study also indicate that mobile banking applications should provide users with highly accessible but secured systems that make it possible for users to process essential transaction-related information and functions quickly as well as safely.

     

     

  • References

    1. [1] Bostrom RP, Olfman ,& Sein MK (1990), “The importance of learning style in end-user training,†MIS Quarterly 3, PP: 101-119.

      [2] Black M (1998). “More about metaphor in: Ortony A, editor. Metaphor and Thought,†Cambridge: University Press; 1988.

      [3] Chu C, & Chan BK (1998), “Evolution of web site design: implications for medical education on the Internet,†Computer in Biology and Medicine 28, Pp: 470-472.

      [4] Fornell, C, & Larcker, D.F (1981), “Evaluating Structural Equation Models with unobservable variables and measurement error,†Journal of Marketing Research, 18, pp: 39-50.

      [5]George, B. (2012), “The Problem with Survey Research, New Brunswick, NJ: Transaction, P. 15.

      [6] Hair, JF, & Black WC, Babin B.J, Anderson, RE, & Tatham R.L(2006) Multivariate data nalysis, 6th ed., Prentice-Hall International, 2006.

      [7] Jacobs, S. (1999). "Section 255 of the Telecommunications Act of 1996: Fueling the Creation of New Electronic Curbcuts".

      [8] Kassim N, & Abdullah NA (2010), “The Effect of Perceived Service Quality Dimensions on Consumer Satisfaction, Trust, and Loyalty in e-Commerce Settings,†Asia Pacific Journal of Marketing and Logistics 22, pp.351-371.

      [9] Lee FH & Wu WY (2011), “Moderating Effects of Technology Acceptance Perspective on e-Service Quality Formation,†Expert Systems with Applications 2011: 38, p.7766-7773.

      [10] McWilliam G & Dumas A (1997), “Using metaphor in new brand design,†Journal of Marketing Management 1997:13: p. 265-284.

      [11] Morley D & Parker CS (2011), “Understanding computers: today and tomorrow comprehensive,†Cengage Learning; 2011.

      [12] Moran T (1981), “An applied psychology of the use,†ACM Computing Surveys 1981:13: p. 1-12.

      [13] Moshagen M & Thielsch MT (2010), “Facets of visual aesthetics,†International Journal of Human-Computer Interaction 68,689-709.

      14] Ransbotham S & Mitra S (2009), “Choice and change: a conceptual model of paths to information security compromise,†Information Systems Research 1,121-139.

      [15] Rouse WB & Morris NM (1986), “On looking into the black box: prospects and limits in the search for mental models,†Psychological Bulletin 100, 349-363.

      [16] Schmidt KE, Liu YL, & Sridharan S (2009), “Webpage aesthetics, performance, and usability: design variables and their effects,†Ergonomics 2009,52, 641-643.

      [17] Szajna B (1996), “Empirical evaluation of the revised technology acceptance model,†Management Science 42, 85-92.

      18] Wang RY & Strong DM (1996), “Beyond accuracy: what data quality means to data consumers. Journal of Management Information Systems,†12, 5-34.

      [19] Wolfe CR (2001), “Plant a tree in cyberspace: metaphor and analogy as design elements in web-based learning environments,†Cyber Psychology and Behavior, 4,67-76.

      [20] AIRC (2008), Attack Intelligence Research Center annual threat report: “2008 overview and 2009 predictions,†Attack Intelligence Research Center, Aladdin Knowledge Systems, Belcamp, MD (accessed 2008 online at: http://www.aladdin.com/pdf/airc/AIRC-Annual- Threat-Report2008.pdf).

      [21] Anderson, E W, Fornell C, & Lehmann D R (1994), “Customer Satisfaction, Market Share, and Profitability: findings from Sweden,†Journal of Marketing, 58, 53−-66.

      [22] Asubonteng, P, McCleary, K J, & Swan, J E (1996), "SERVQUAL Revisited: a Critical Review of service quality,†The Journal of Services Marketing, 10, 62-81.

      [23] Bailey, JE & Pearson, S W (1983), "Development of a Tool for Measuring and Analyzing Computer User Satisfaction," Management Science, 29, 530–545.

      [24] Baroudi, J, & Orlikowski, W. (1988), "A short-form measure of user information Satisfaction: a psychometric evaluation and notes on use," Journal of Management Information Systems, 44–59.

      [25] Bart Y, Shankar V, Sultan F, & Urban, G (2005), "Are the drivers and role of online trust the same for all web sites and customers? a Large-scale exploratory empirical Study," Journal of Marketing, 69, 133–152.

      [26] Berinato S (2006), "The Global State of Information Security 2005," Available online at: http://www. csoonline.com/read/100105/servey.html (accessed 16 April 2006).

      [27] Boss SR, & Kirsch, LJ, "The last line of defense: motivating employees to follow corporate security guidelines," in Proceedings of the 28th International Conference on Information Systems, Montreal, December, 2007, pp. 9-12.

      [28] Bulgurcu, B., Cavusoglu, H., & Benbasat, I (2010), "Information security policy compliance: an empirical Study of rationality-based beliefs and information security awareness," MIS Quarterly, 34, 523-548.

      [29] Cavusoglu, H., Cavusoglu, H., & Raghunathan, S. (2004), "Economics of IT security management: four improvements to current security practices," Communications of the Association for Information Systems, 14, 65-75.

      [30] Cavusoglu, H., Son, JY, & Benbasat, I. (2009), "Information security control resources in organizations: A Multidimensional View and Their Key Drivers," working paper, 2009, Sauder School of Business, University of British Columbia.

      [31] Cavusoglu, H., Mishra, B., and Raghunathan, S., "A Model for Evaluating IT Security Investments," Communications of the ACM, Vol. 47, No. 7, 2004b, pp. 87-92.

      [32] Cavusoglu, H., Mishra, B., and Raghunathan, S., "The Effects of Internet Security Breach Announcements on Market Value: Capital Market Reactions for Breached Firms and Internet Security Developers." International Journal of Electronic Commerce, Vol. 9, No. 1, 2004c, pp. 69-104.

      [33] Choi, J. and Lee, H., "Facets of Simplicity for the Smartphone Interface: A Structural Model," International Journal of Human-Computer Studies, Vol. 70, 2012, pp. 129-142.

      [34] Cronin, J.J., Looking Back to See Forward in Services Marketing: Some Ideas to Consider," Managing Service Quality, Vol. 13, No. 5, 2003, pp. 332-337.

      [35] Cronin, J.J., Brady, M.K., and Hult, G.T.M, "Assessing the Effects of Quality, Value, and Custoemr Satisfaction on Consumer Behavioral Intentions in Service Environments," Journal of Retailing, Vol. 76, No. 2, 2000, pp. 193-218.

      [36] DeLone, W.H., and McLean, E.R., “Information Systems Success: The Quest for The Dependent Variable,†Information Systems Research, Vol. 3, No. 1, 1992, pp. 60-95.

      [37] DeLone, W.H., and McLean, E.R., “The DeLone and McLean Model of Information Systems Success: A Ten-Year Update,†Journal of Management Information Systems, Vol. 19, No. 4, 2003, pp. 9-30.

      [38] Doherty, N.F. and Fulford, H., "Aligning the Information Security Policy with the Strategic Information Systems Plan," Computers and Security, Vol. 25, No. 1, 2006, pp. 55-63.

      [39] Doll, W. J. and Torkzadeh, G., "The Measure of End-User Computing Satisfaction," MIS Quarterly, Vol. 12, No. 2, 1988, pp. 259–274.

      [40] Dube, L. and Maute, M., "The Antecedents of Brand Switching, Brand Loyalty and Verbal Responses to Service Failure," Advances in Services Marketing and Management, Vol. 5, 1996, pp. 127–151.

      [41] Ernst & Young, "Moving Beyond Compliance: Ernst & Young's 2008 Global Information Security Survey" (accessed 2008 at http://www.ey.com/Publication/vwLUAssets/ 2008_Global_Information_Security_Survey_english/$FILE/2008_GISS_ingles,pdf).

      [42] Flint, D.J., Blocker, C.P., and Boutin, P.J., "Customer Value Anticipation, Customer Satisfaction and Loyalty: An Empirical Examination," Industrial Marketing Management, Vol. 40, 2011, pp. 219-230.

      [43]Fornell, C. and Larcker, D.F., "Evaluating Structural Equation Models with Unobservable Variables and Measurement Error," Journal of Marketing Research, Vol. 18, 1981, pp. 39-50.

      [44] Ghosh, S., Surjadaja, H., and Antony, J., "Optimizaiton of the Determinants of E-service Operations," Business Process Management Journal, Vol. 10, No. 6, 2004, pp. 616-636.

      [45] Gilbert, L.A. and Han, H., "Understanding Mobile Data Services Adoption: Demography, Attitudes or Needs?" Technological Forecasting and Social Change, Vol. 72, 2005, pp. 327-337.

      [46] Gorden, L.A., Loeb, M.P., Lucyshyn, W., and Richardson, R., 2006 CSI/FBI Computer Crime and Security Survey. Available online at: http://www.gocsi.com (accessed 9 January 2007).

      [47] Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E., and Tatham, R.L., Multivariate Data Analysis, 6th ed., Prentice-Hall International, 2006.

      [48] Hassel, L. and Wiedenbeck, S., Human Factors and Information Security, DIMACS Workshop on Usable Privacy and Security Software, 7-8 July 2004, DIMACS Centre, CORE Buildoing, Rutgers University, Piscataway, NJ.

      [49] Ho, C.T.B. and Lin, W.C., "Measuring the Service Quality of Internet Banking: Scale Development and Validation," European Business Review, Vol. 22, No. 1, 2010, pp. 5-24.

      [50] Huang, D.L., Rau, P.L.P., and Salvendy, G., "Perception of Information Security," Behavior and Information Technology, Vol. 29, No. 3, 2010, pp. 221-232.

      [51] Jih, W.J., Wong, S.Y., and Chang, T.B., "Effects of Perceived Risks on Adoption of Internet Banking Services: An Empirical Investigation in Taiwan," International Journal of e-Business Research, Vol. 1, 2005, pp. 70-88.

      [52] Jung, W (2018), The Effects of the Perceived Accessibility and Cyber Security of Mobile Banking Applications on User Loyalty to the Applications, “International Journal of Mobile Device Engineering, 2, 7-12.

      [53] Shaughnessy, J.; Zechmeister, E.; Jeanne, Z. (2011). Research methods in psychology (9th ed.). New York, NY: McGraw Hill. pp. 161–175.

  • Downloads

  • How to Cite

    Jung, W. (2019). An Empirical Study of The Indirect Effects of the Perceived Accessibility and Cyber Security of Mobile Banking Applications on User Loyalty to the Applications. International Journal of Engineering & Technology, 8(1.4), 486-491. https://doi.org/10.14419/ijet.v8i1.4.25459