Article

Understanding users' protective behavior and its suppressor effect on the perceived risk in M-wallet/banking use: An Indian urban-rural comparison

Authors:
To read the full-text of this research, you can request a copy directly from the author.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

... These include privacy concerns, representing the potential loss of control over personal information when provided to ChatGPT through prompts or integration into work tools (Fan et al., 2022;Rohden & Espartel, 2024). Because of these risks in the technology adoption/use literature (Acquisti & Grossklags, 2005;Chauhan, 2024;Rohden & Espartel, 2024;Wu et al., 2024;Xu et al., 2022) and the description in Figure 1, we can initially identify two types of risk: perceived privacy concern and perceived privacy risk ( Figure 2). ...
... The second concern relates to privacy risks, including perceived vulnerability and severity. For GenAI chatbots, perceived risk refers to consumers' worries about losing their private information due to uncertainties associated with using technology (Chauhan, 2024;Dinev & Hart, 2006). Any negative consequences for the user are considered losses, encompassing monetary loss (for organizations), privacy invasion, identity theft, and credential theft (Chauhan, 2024;Dinev & Hart, 2006). ...
... For GenAI chatbots, perceived risk refers to consumers' worries about losing their private information due to uncertainties associated with using technology (Chauhan, 2024;Dinev & Hart, 2006). Any negative consequences for the user are considered losses, encompassing monetary loss (for organizations), privacy invasion, identity theft, and credential theft (Chauhan, 2024;Dinev & Hart, 2006). ...
Article
Full-text available
Despite the risks associated with generative AI (GenAI) chatbots, people increasingly use these technologies, which may seem contradictory. This study identified and explored factors and risks related to trust, perceived values, satisfaction, and sustainable use of GenAI chatbots. Relying on IS theories to build a stimulus-organism-response model, the authors tested a model using PLS-SEM with data from 393 ChatGPT users. The results show that user competence and autonomy dramatically increase a user's trust in ChatGPT, and trust improves hedonic value (HV), utilitarian value (UV), value-in-use, perceived task-technology fit (TTF), information accuracy, knowledge acquisition, perceived informativeness, and user satisfaction. In addition to trust, user satisfaction depends on HV, UV, and TTF. The sustainability use of ChatGPT depends on HV and satisfaction. However, perceived privacy concerns, perceived privacy risks, and privacy awareness do not affect consumer trust. There is a complete mediation between trust and sustainability, as well as HV and sustainability.
... Evidence suggests that the digital technologies have enormous potential to help attain sustainability through their pillars, i.e., economic, social, and environmental [10], [26], [Rodrigues et al. [67]], [83]. In this vein, the digital finance has been increasingly viewed as one of the significant catalysts of sustainable growth and development [17], [85]. Evidence has also shown that, in organization for economic cooperation and development countries, digital finance has led to a considerable reduction in pollution rate and greenhouse gas (GHG) emissions [28]. ...
... Although several researchers have scrutinized the adoption of digital payments by the customers in the context of developing economies [17], [18], [19]. No research till date has focused on assessing the customer's intentions to adopt digital-only banks based on their perceptions toward the existing digital payments' systems. ...
... The researchers have tested and established various suitable models and theories concerning technology adoption in multiple contexts [23], [29], [69], [79], [80]. By using a plethora of competing theoretical frameworks, researchers progressively attempt to understand how the customer's preferences for digital payment services are shaped [11], [17], [64]. In seeking improved insights into the factors affecting digital system adoption, the studies have applied, integrated, and extended these models [81]. ...
Article
The neo-banking and BaaS (Banking as a Service) model implementation by financial service organizations and FinTech firms require wide-ranging acceptance of digital payment systems. Given the development of digital-only (neo) banking at nascent stages, especially in developing economies, there is a need to understand their potential adoption by the customers. This study investigates antecedents to customer's intention to adopt digital-only banks based on their adoption experience with existing digital payment platforms. From a novel perspective on digital-only banking, this research advances the extant literature on digital financial services by synergistically combining unified theory of acceptance and use of technology theory and the factors namely attitude, trust, risk, security and green concern. The structural equation model based on a cross-sectional sample found that the behavioural intention to adopt digital-only banks is significantly influenced by effort expectancy, hedonic motivation, performance expectancy, social influence, in addition to attitude, trust, perceived risk, perceived security and green concern. This study adds to the growing theoretic debate in the field by stressing the significance of examining given contextual factors in addition to previously established theories for studying purely digital services. The managers can draw upon the findings for leading the way to wide-ranging implementation of BaaS
... As the digital payment environment is complex and different service providers may use different technologies, users may feel confused and are likely to worry about the risks caused by operational errors. Privacy breaches are often regarded as an important risk for consumers when they use online transaction payment methods (Chauhan, 2024;Park et al., 2019;Sahi et al., 2022). The negative effects of perceived riskiness on digital payment have been validated in many studies (Azman Ong et al., 2023;Lie´bana-Cabanillas et al., 2024;Oliveira et al., 2016;Shin, 2010;Yang et al., 2012;Slade et al., 2015). ...
... Then why do the residents who don't feel safe still use digital payment? According to Chauhan (2024), protective behaviors can weaken the negative impact of perceived risk on the use of digital payments. In China, one protective measure is the vigorous promotion of cybersecurity education and publicity through websites, TV programs, and even the village notice board, focusing on how to handle risks when they arise. ...
Article
Full-text available
In recent years, the essential roles of digital payment have gradually emerged. However, current research on digital payment adoption models rarely incorporates the outcomes of digital payment, and it also gives less consideration to rural residents. Considering these two issues as a research gap, this article establishes a unified digital payment use and credit availability model by extending the UTAUT2 framework in two aspects and applying it to China’s rural residents. The first extension is to add credit availability as an outcome variable of digital payment use. The second is to add two factors important to farmers, perceived riskiness and innovativeness, as constructs. Structural equation modeling is employed to analyze data collected from nearly 500 Chinese rural residents. The results show that almost 90% of rural residents have used digital payment. However, only a low proportion use it for many purposes or frequently. Rural residents’ digital payment use can increase credit availability. Performance expectancy, effort expectancy, social influence, price value, and innovativeness significantly and positively affect digital payment intention and behavior, thereby indirectly improving credit availability. However, the perceived risk does not influence digital payment adoption, possibly due to effective protective behaviors. In addition to the indirect effect, the results show that innovativeness also has a direct impact on credit availability. JEL Classification: M15, G21.
... In current study, online survey was administered in India by targeting the m-wallet users who are more than 18 years and utilise at least one m-wallet app. The representative sample was taken from India as m-wallet usage in India surpassed developed countries like U.K. and USA to emerge as world's largest digital payment nation (Kapoor et al. 2024b;Chauhan 2024). Moreover, India has good internet penetration, a growing trend of digitalisation, increasing online retail growth, government initiatives promoting a cashless economy and investments in fin-tech start-ups driving demand for m-wallet. ...
Article
Full-text available
How mobile wallet service experience (MWSX) form brand loyalty? Are there symmetric or asymmetric connections between MWSX dimensions and brand loyalty? Are there any factors that intervene in the linkage between MWSX and brand loyalty? To answer these questions, present study explored dimensions of MWSX and proposed a novel serially mediated framework to comprehend asymmetric and symmetric relationship among MWSX dimensions and brand loyalty. The research adopted Stimulus-Organism-Response (S–O–R) theory as its theoretical foundation, highlighting its distinctive approach. Utilising structural equation modeling (SEM) and fuzzy sets qualitative comparative analysis (fsQCA), the current study disclosed three major findings. First, except for efficiency and aesthetics, results revealed a significant positive impact of MWSX dimensions (reliability, security & privacy and customer service) on brand loyalty. Second, association between MWSX dimensions (reliability, security & privacy and customer service) and brand loyalty was found to be serially mediated by two mediators namely brand image and brand love. Third, fsQCA uncovered asymmetric, synergistic and nonlinear effects of MWSX dimensions on brand loyalty that SEM failed to reveal. It revealed six sufficient conditions for determining low and high brand loyalty. Predictive validity has been also tested to determine accuracy of fsQCA results. The research's findings illuminate m-wallet landscape, empowering service providers to elevate user engagement and enhance their competitive presence.
Article
Purpose – Recognizing the transformative impact of financial technology (Fintech) and mobile wallets (m-wallets) on modern financial practices, this study aims to explore the complex dynamics of m-wallet adoption in Bangladesh, focusing on user perceptions and financial autonomy. By integrating self-determination theory (SDT) and diffusion of innovation (DOI) theory, the authors propose a model incorporating constructs such as perceived security (PS), perceived trust (PT), compatibility, ease of use (EOU), perceived financial autonomy (PFA), perceived financial competence (PFC), relative advantage (RA) and intention-to-use (IU). Design/methodology/approach – This study used a survey-based methodology to gather data from m-wallets users in Bangladesh. In this survey, 445 individuals participated; 393 of those were deemed legitimate and were chosen for study. Partial least squares-structural equation modeling was used in the investigation. This method made sure that the relationships between the proposed model’s constructs were thoroughly examined. Findings – The research findings confirm that PFC significantly impacts the IU m-wallets and PFA. PFA also positively influences the IU. PS impacts the IU and PT, which further affects the IU. EOU influences RA and the IU. The study highlights the importance of PFC, PS, PT and EOU in driving the adoption of m-wallets. Originality/value – This study integrates SDT and DOI theory to explore m-wallet adoption. It highlights financial competence and autonomy as key factors, offering insights and practical strategies for Fintech stakeholders in emerging markets to enhance adoption through financial literacy, security measures and user-friendly designs.
Article
While offering novel user experiences, the Metaverse introduces complex cybersecurity challenges due to the sophisticated interaction of augmented reality (AR), virtual reality (VR), and web technologies. Addressing the barriers to cybersecurity behavior is essential to protect users against risks such as identity theft and loss of digital assets. Therefore, this research aims to investigate these barriers by developing a theoretical model that draws factors from the Technology Threat Avoidance Theory (TTAT) and considers variables such as privacy concerns, perceived risks, and response costs. The data were collected from 395 Metaverse users and were analyzed using the Partial Least Squares-Structural Equation Modeling (PLS-SEM) and fuzzy-set Qualitative Comparative Analysis (fsQCA). The PLS-SEM findings showed that perceived threats, privacy concerns, and response costs have a significant negative impact on cybersecurity behavior, while perceived risks have an insignificant negative influence. The fsQCA results revealed that there is not a single pathway leading to robust cybersecurity behavior. Instead, eight configurations that include the presence and absence of certain conditions can lead to this desirable outcome. The findings not only advance the academic conversation on Metaverse security but also offer actionable strategies for stakeholders to reinforce user protection in this dynamic virtual environment.
Article
Full-text available
The popularity of the Internet leads to frequent information security events, and emotional differences under different information security events lead to behavioural differences. In order to study the influence of social media emotions on information behaviour under different event types, this study selected emotion-related behavioural data of microblog users based on two types of information security events. The results show that negative emotions negatively affect information adoption behaviour and positively affect information interaction behaviour. Positive emotions are the opposite; Low arousal positively affects information interaction behaviour. High arousal positively affects information adoption behaviour. Hacking events positively moderated the relationship between negative emotion and information interaction behaviour, low arousal emotion and information adoption behaviour. Data disclosure negatively moderates the relationship between positive emotion and information adoption behaviour, low arousal emotion and information interaction behaviour, and positively moderates the relationship between positive emotion and information interaction behaviour. It provides the basis for enterprises to “take appropriate medicine” in the face of different information security events, and has certain reference value.
Article
Full-text available
The present study attempts to explore influential factors and how those factors contribute to consumers’ intention to adopt telematics-based automobile insurance through the lens of a unified theory of acceptance and use of technology (UTAUT2). The present research constitutes a two-part mixed-methods research effort, with the first part focusing on qualitative exploration (thematic analysis) and the second on quantitative investigation (structural equation modeling). Using thematic analysis, the study explored the essential variables in telematics insurance. Subsequently, the findings obtained from the theme analysis were integrated into the questionnaire survey in order to assess the degree of association among the variables. A total of 361 usable responses were collected from the Indian users of telematics-based insurance. The findings of the qualitative study explored the influential variables in the context of telematics-based insurance. Six variables are of UTAUT2 theory, and four variables, perceived privacy risk (PPR), perceived social benefit (PSB), perceived trust (PT), and perceived loss of driving autonomy (PLDA), found as novel in the context of telematics-based insurance. The findings of the quantitative study showed the validity of UTAUT2 theory in the current context. All the variables (except facilitating condition) variables influencing consumers' adoption intention.
Article
Full-text available
Cybersecurity procedures and policies are prevalent countermeasures for protecting organizations from cybercrimes and security incidents. Without considering human behaviors, implementing these countermeasures will remain useless. Cybersecurity behavior has gained much attention in recent years. However, a systematic review that provides extensive insights into cybersecurity behavior through different technologies and services and covers various directions in large-scale research remains lacking. Therefore, this study retrieved and analyzed 2210 articles published on cybersecurity behavior. The retrieved articles were then thoroughly examined to meet the inclusion and exclusion criteria, in which 39 studies published between 2012 and 2021 were ultimately picked for further in-depth analysis. The main findings showed that the protection motivation theory (PMT) dominated the list of theories and models examining cybersecurity behavior. Cybersecurity behavior and intention behavior counted for the highest purpose for most studies, with fewer studies focusing on cybersecurity awareness and compliance behavior. Most examined studies were conducted in individualistic contexts with limited exposure to collectivistic societies. A total of 56% of the analyzed studies focused on the organizational level, indicating that the individual level is still in its infancy stage. To address the research gaps in cybersecurity behavior at the individual level, this review proposes a number of research agendas that can be considered in future research. This review is believed to improve our understanding by revealing the full potential of cybersecurity behavior and opening the door for further research opportunities.
Article
Full-text available
The main goal of this paper is to determine the underlying factors that drive the adoption of the Bizum mobile peer-to-peer payment system by users. It is empirically proven that factors included in the extended Unified Theory of Acceptance and Use of Technology (UTAUT2) model are precursors of the mobile payment adoption. The proposed model modifies the set of constructs by adding trust, security, and perceived risk. The sample consist of 334 Bizum platform users who are mainly young people between 18 and 22 years old. Obtained data was analyzed by a Structural Equation Modeling (SEM) through Confirmatory Factor Analysis (CFA). The results show that the strongest predictor for adopting to use Bizum mobile payment platform is habit, with 75 % of acceptance of young online banking users. But habit and social influence factors show 82.5 % of intention of use among young users. In contrary, performance expectancy, effort expectancy, facilitating conditions, price-value, hedonic motivation, trust, security, and perceived risk do not influence the intention to use this platform. Banks, financial entities, as well as banking platform developers, can benefit from the results of this study by understanding the factors that influence users to use these platforms and consequently successfully implement them.
Article
Full-text available
The Fintech mobile payment platform is expanding rapidly; this expansion, in turn, creates numerous risks. There is an urgent need to better understand these risks and to spur more secure payment behavior. This research aims to develop knowledge graphs of the mobile payment platform based on deep learning for risk analysis and policy inferences. We identify entities from collected policy documents, extract the relationships among the entities, and draw a risk knowledge graph on mobile payments. The use of unsupervised semi-automatic knowledge acquisition, we argue, can reduce the risk of mobile payment caused by a lack of knowledge. A significant benefit of this method is that risk knowledge can be acquired without supervision. Unlike other models, the absence of manual labeling allows for the relation extraction of triples to be unsupervised, while the previous triplet extraction was supervised. Compared with other unsupervised models, the precision of our model is improved, and the recall is the same as that of previous unsupervised shutdown extraction. Unsupervised relationship extraction can extract text relationships quickly and on a large scale, saving human resources for labeling. This method offers a potential solution to a fundamental problem; the content and quantity of policy documents exceed organizations’ and individuals’ ability to understand them. Our approach suggests the viability of developing a national policy risk knowledge graph to help mobile payment platforms understand national policies and reduce platforms’ operational risks while allowing users to quickly learn the risks of mobile payments and minimize the impact of those risks.
Article
Full-text available
Peer-to-peer (P2P) payments are experiencing strong growth due to the notable interest in mobile payments and the effect of the COVID-19 pandemic on individuals’ behaviours. This research analyses the success factors in customers’ adoption of Bizum, a prototypical P2P mobile payment system already used by almost half of the Spanish population. Using data from real Bizum users and structural equation modelling, it was confirmed that: (1) customers’ attitudes and perceptions of control over the mobile app increased use and WOM intentions; (2) the subjective norm (i.e., social approval) is not important for the adoption of this P2P service; (3) the direct effect of perceived risk on behavioural intentions is not significant and that perceived risk is moderated by perceived security, such that its negative effects are significant when users perceive lower levels of security; (4) age and gender do not significantly influence adoption, which suggests that the service might be used by a wide spectrum. Finally, from a practical viewpoint, this research contributes to the understanding of the success factors underlying P2P platforms, which can help managers better develop their market penetration strategies in a highly competitive sector.
Article
Full-text available
The purpose of this paper is to examine the effectiveness of social media on the different stages of consumers' cognitive stages through the Hierarchy of Effects (HOE) model for mobile banking adoption among consumers. A two-stage analytical approach with Structural Equation Modeling (SEM) and Neural Network (NN) analysis to bring out social media's distinctive and confirmatory influence on mobile banking consumers. Data from 482 respondents in the age group of 18 years to 30 years (the young consumers) from India was analyzed for social media influence on different cognitive stages of mobile banking acceptance. Results show the increasing tendency of social media influence with increasing cognitive level. Among the four cognitive stages (Attention, Interest, Desire, and Action-AIDA model) of m-banking adoption, Action and Interest stages are the most influenced stages by the social media, followed by Desire and Attention. This research provides a two-stage analytical approach by combining "SEM and NN" to assess the impact of the integration of AIDA constructs. We develop an original integrated model which outlines the phenomenon of the diffusion of information from social media on different cognitive stages of young mobile banking consumers.
Article
Full-text available
In order to test the key factors affecting users' continuance intention of mobile banking Apps, this study combined the Technology acceptance model (TAM) with the perceptual sinteraction model, and further added human-system interaction and perceived privacy security that was not explored in these models before. Data were collected from 349 users who had experience with mobile banking to test the model and were analyzed with a structural equation model. The present study showed that various interactive characteristics of mobile banking (human-human interaction, human-information interaction, human-system interaction) had significant positive impacts on users' perceptions of using mobile banking (perceived usefulness, perceived ease of use, perceived privacy security). Users' perceptions of using mobile banking had significantly positive impacts on users' satisfaction with mobile banking, and user satisfaction had a significant impact on users' continuance intention. Users’ income level had a significantly negative impact on their continuance intention. In order to further enhance users’ continuance intention for mobile banking, designers and managers of mobile banking are suggested to pay special attention to the interactive characteristics of mobile banking and the impact on users' perceptions of mobile banking, so as to improve customer satisfaction and continuous intention.
Article
Full-text available
The unequal distribution of educational opportunities between urban and rural areas is still a significant challenge in China. As a result, students from urban areas can benefit from highly qualified teachers and enjoy state-of-the-art facilities in contrast with their rural counterparts. Consequently, students from urban areas are more likely to join higher education institutes in comparison with their rural counterparts. In such a scenario, a cloud-based virtual learning environment (C-VLE) is of great importance to provide quality education in rural areas. This study aims to predict C-VLE usage’s impact on academic performance and gender differences in rural China. The respondents belonged to rural areas and experienced varying levels of such difficulties. This study extended the task-technology fit theory with the channel expansion theory. The study revealed that task-technology fit, individual-technology fit, perceived media richness, omnipresence, and interactivity positively influence C-VLE usage that leads elevating academic performance. As a result, the students from rural areas have a better competitive position than their urban counterparts. Surprisingly, gender did not play any moderating role. The study provides significant theoretical and practical implications for scholars, educational authorities, and policymakers.
Article
Full-text available
Indian banks have paid sufficient attention to recent innovations in banking services delivery such as e-banking, mobile banking, mobile payment, e-wallet, and e-money services, still the acceptance of these services among consumers is sluggish. Therefore, the present study aims to identify the intention of consumers to adopt various e-banking services. The study adopted the UTAUT2 model (Unified Theory of Acceptance and Use of Technology) and extended it with constructs such as consumer innovativeness, perceived risk, and security information availability. The extended research model was tested using a questionnaire-based response collected from 721 consumers. CB-SEM (Covariance-based structural equation modeling) was used to examine the hypotheses. An empirical examination of the model helped explain the impact of the UTAUT2 model's constructs in predicting adoption intention toward e-banking services. The study also revealed the importance and impact of newly incorporated variables in explaining consumers' adoption intention toward e-banking services. The study has provided some useful insight into the factors influencing consumers' intention to adopt e-banking services to shed new light.
Article
Full-text available
Protection motivation theory (PMT) is one of the most commonly used theories to examine information security behaviors. Our systematic review of the application of PMT in information systems (IS) security and the comparison with its application for decades in psychology identified five categories of important issues that have not yet been examined in IS security research. Discussing these issues in terms of why they are relevant and important for IS security, and to what extent IS research has not considered them, offers new research opportunities associated with the study of PMT and IS security threats. We suggest how future studies can approach each of the open issues to provide a new road map for quantitative and qualitative IS scholars.
Article
Full-text available
Background and aims Diabetes mellitus is a global health problem causing premature death and economic burden. The study aimed to investigate an application of the protection motivation theory (PMT) model to explain the intention of healthy eating behaviors and physical activity among healthy Thais. Methods This study was a part of a large case control focused only on the control group without noncommunicable diseases. Nine hundred ninety-seven subjects were drawn from eleven provinces of Thailand. A self-administered questionnaire was constructed based on the PMT model to gather information on predictive factors on eating behaviors and physical activity. Path analysis was used to determine whether the empirical data fit the PMT structure as well as to assess the strength of association among PMT constructed factors predicting behavioral intention. Results The findings demonstrated that empirical data of eating behaviors (CMIN χ2 p-value = 0.462; CMIN/df = 0.901; NFI = 0.997; CFI = 1; RMSEA <0.001) and physical activity (CMIN χ2 p-value = 0.053; CMIN/df = 2.187; NFI = 0.987; CFI = 0.993; RMSEA = 0.035) fit the PMT. The strongest predictive factor of behavioral intention on eating behaviors was response efficacy (β = 0.146), while self-efficacy was found to be the strongest factor for physical activity (β = 0.11). Knowledge had the only indirect effect on behavior intention through perceived susceptibility and perceived severity. Conclusion In conclusion, information on susceptibility and severity should be incorporated in intervention strategies to enhance response efficacy and self-efficacy to prevent diabetes.
Article
Full-text available
The utilization of social media tools is an integral part of rural youth lives today. Over some time utilization of social media has been changed the attention of rural youth. The development of rural youths on social media has reached at a different level, without social media, every individual of rural youth cannot think about the direction of their respective growth and futures. The research studies on the utilization of social media conducted across the world by different authors and review extensively for drawing constructive inference for future study and reference. The development of rural youth on social media is now leading to addiction. The major sources and several studies reported that it is widely accepted the overutilization of social media has a profound negative influence on the rural youths. This study highlights the main purposes of utilizing social media by rural youth and to attempt have been made to find out the time spent on surfing the various social networking sites. This study focuses on the major and the positive and negative effects of utilizing social media on the life of rural youths.
Article
Full-text available
This is a four-year follow-up study on the relationship between the cognitive and emotional components of subjective well-being (SWB) and job performance. We hypothesized a positive relationship between these variables and job performance. The sample consisted of 170 managers of a Spanish company in the Information Technology and Communication (ITC) industry. The cognitive component of SWB was assessed with the Satisfaction with Life (SWL) scale and the emotional component with the SPANE scale. Two independent ratings, one from the direct supervisor and another from the HR manager, served as evaluations of job performance during four years in a row. Results showed that the two components of SWB predicted job performance over the four years. Additionally, when the two components are entered in a regression equation the validity increases over time as a consequence of a suppressor effect on the cognitive component of SWB. Finally, we discuss the implications for the theory and the practice of SWB at work.
Article
Organizations need to consider different managerial approaches to motivate security compliance behavior as more employees work outside of the office. This study examines two approaches for motivating security compliance behaviors in a changing work environment. We examine protection motivation and stewardship-based strategic approaches to determine their effectiveness towards influencing information security behaviors. Independently, each approach has received demonstrable evidence of contributing to organizational behaviors. However, as the nature of work changes (e.g., hoteling, traveling, working from home), it also changes the security risk landscape for organizations, rendering the effectiveness of previous security controls debatable. This study contends there is value to management in integrating both protection motivation and stewardship approaches in this context. A research model is developed that integrates both approaches; protection motivation and stewardship concepts. We find that constructs consistent with protection motivation theory are more likely to explain decreases in security policy violations than stewardship theory. Further, by combining protection motivation and stewardship perspectives, this study's results supplement our understanding of security policy violations in a changing work environment. We show that the two together account for 51 percent of the variance, and thus both have value. Our findings suggest that a PMT-based strategy is a stronger approach for influencing compliance behavior. Therefore, it is important for organizations to continue focusing their efforts on threat communications as well as enhancing employees’ abilities to respond. However, we also show that organizations should build a sense of belonging with their employees such that their employees become stewards of the organization's resources.
Article
This paper examines how personal investment influence the use of multi-factor authentication (MFA) for securing online accounts. We draw from the Protection Motivation Theory (PMT) that accounts for intrapersonal factors that increase one’s understanding of their threat and coping mechanisms and, subsequently, their motivation to protect such investments. We integrate size of investment – the amount of time, effort, and other personal resources that an individual has put into their online account. Based on PMT’s framework, we develop a research model that examines the influence of investment size as an information source that initiates and builds threat and coping appraisals. The model is tested with a survey of 263 responses, and the result shows that investment size influences threat and coping appraisals, which in turn increases MFA protection motivation and use. These results highlight the importance of eliciting individuals’ personal investments in order to improve their protective security behaviors.
Article
This review synthesizes the prior literature on digital financial transactions (DFTs), identifies the factors that influence the adoption of DFTs, and sheds light on the research gaps in this area. This review focuses on the empirical studies published from 2009 to 2020. We identify fifteen factors that motivate the adoption of DFTs as well as five inhibitors to adoption. The literature lists perceived usefulness, perceived ease of use, compatibility, trust, security, effort expectancy, performance expectancy, and facilitating conditions as the most significant factors affecting the adoption of DFTs. In the study, cost of use, perceived danger, complexity, unwillingness to change, and privacy concerns are identified as major challenges to DFT adoption. Additionally, the paper outlines various research gaps in this field of research, particularly from the standpoint of methodology. The present work has significance for policymakers and managers in formulating policies and strategies to encourage the adoption of DFTs. As per the results, a research agenda for the future has been established.
Article
Despite the proven capabilities of smartphone-based health care apps their adoption in developing nations is still not encouraging. The present research attempts to understand the users' motivations and barriers to adopting and using healthcare apps through the lens of Behavioral Reasoning Theory (BRT). The present research uses a mixed-method approach conducted in the two-phase: Phase 1- qualitative study (thematic analysis) and phase 2- quantitative analysis (structural equation modeling). The thematic analysis helps identify the motivators- “reason for” and barriers- “reason against” among users while using healthcare apps. Further, the output of the thematic analysis was incorporated into the questionnaire survey to get a comprehensive understanding. A total of 311 usable responses were collected through the survey for testing the hypothesized relationships. The findings suggested personal value (openness to change) and social value were associated with “reason for” and “reason against,” which further influences users' attitudes and intentions towards using healthcare apps. The findings also confirm domain-specific innovativeness moderating effect on the association between reason against & intention and attitude and intention towards using healthcare apps. The findings provide insights to policymakers and marketers that will help to increase the adoption intention of healthcare apps among users.
Article
This paper examines two aspects of the digitalization of finance in India, which has been surprisingly robust and fast growing. Much of this success is due to the government's introduction of a biometric identity known as Aadhaar. Because financial transactions require definitive proof of identity of the transacting parties, Aadhaar provides this proof without any document via biometric verification, thus greatly facilitating electronic transactions. The paper also documents the impact of digital financialization by showing examples of entrepreneurship, both directly in the fintech space through the creation of new web-based services as well as the rise of new businesses that make use of the fintech infrastructure that has been created.
Article
Unprecedented and aggressive data access and transmission practices employed by vendors and mobile app developers have aggravated mobile app users’ privacy invasion and privacy concerns. Mobile apps increasingly collect data about users’ behaviour, personal preferences, location, and other personally-identifying information. Often, these data are collected without users’ permission, are unnecessary for the mobile app’s functionality, and are used for unauthorised purposes. We propose a comprehensive but parsimonious research model by drawing upon the protection motivation theory, the theory of planned behaviour, and personality traits literature. The study empirically examines the factors that influence mobile app users’ privacy concerns and how these concerns drive users’ intention and behaviour to use mobile apps. The findings indicate that the threat appraisal has a strong effect on users’ privacy concerns and the personality trait of neuroticism has a substantial effect on perceived vulnerability and perceived severity. Results also indicate that privacy protection behaviours are influenced by users’ coping appraisal and intention to protect their privacy. Our work contributes to the privacy protection behaviour and mobile app privacy literature. We discuss the implications of the results for researchers and practitioners.
Article
The notion of visibility of knowledge is important to gain insights into an evolving knowledge-sharing practice through social media use. This article offers a conceptual definition of and an instrument to measure the visibility of knowledge in online communities facilitated by social media. Following a review of the relevant literature and interviews with experts and knowledge workers, we produced a preliminary conceptual definition of visibility of knowledge in social media. Then, using four different datasets, we assessed the content validity of the items representing visibility of knowledge (n=218), pre-tested the scale (n=235), assessed the scale validity (n=333), cross-validated the scale (n=228), and established its nomological validity. This study contributes to the literature by providing a comprehensive conceptualization of an instrument for visibility of knowledge that can be used to understand the evolving knowledge-sharing process and its consequences on individual and organizational outcomes.
Article
Purpose This paper aims to develop an integrated framework for a deeper understanding of employee sustainable behaviors in the workplace by using theories, such as behavioral reasoning theory, planned-behavior theory, goal-directed behavior theory, norm activation theory and belief-value-norm theory. Design/methodology/approach A quantitative approach is used in the present research. This study used data from 343 employees who are from the hospitality and tourism industry to investigate the formation of employees’ sustainable behaviors. Findings The research framework assumes that the reasons for sustainable behavior and the reasons against sustainable behavior predict global motives, which comprise attitude, subjective norm and behavioral control, and moral norm mediates the relationship between global motives, positive and negative anticipated emotions and behavioral intention. The hypothesized theoretical model had a sufficient degree of total variance with the behavioral intention and generally verified the hypothesized relationships, which served as a basis for modeling employee sustainable behavior in the workplace. Originality/value This study integrated a framework that contributes to employee sustainable behavior in the tourism and hospitality industry by identifying the effects of motivational process, moral process and emotional process to perform sustainable behavior.
Article
Purpose Today, the Internet has become an attractive source for obtaining health information. Since women play an important role in maintaining the health of the family and community and since they are active seekers of health information through the Internet, it is essential to examine their online health information seeking behavior. Therefore, the main purpose of this article is to identify the factors affecting the online health information seeking intention and behavior of women. Design/methodology/approach The theoretical framework of this quantitative study was based on the theory of planned behavior. A total of five hypothesized relationships were formulated to develop a conceptual model. The study approach was quantitative. Using simple random sampling, 400 women referred to specialized and sub-specialized clinics of Hamadan University of Medical Sciences, Iran participated in the study and responded to the survey. Descriptive and inferential data analysis was performed using SPSS 21 and Smart PLS 3 software. Findings The results showed that the intention to find health information online is a function of psychological variables. These variables include attitude, subjective norms and perceived behavioral control. Findings showed that attitude is the most important factor affecting online health information seeking intention. It was also found that online health information seeking intention has a positive and significant effect on women's information seeking behavior. Originality/value This study is the first attempt to use an important and universally accepted theory to identify the factors affecting the online health information seeking behavior of women referring to specialized and sub-specialized clinics and provides important practical concepts for health officials and managers to improve and develop online health information seeking behavior.
Article
Purpose The purpose of this paper is to identify and examine the important factors that could affect consumers' behavioural intention and use behaviour towards mobile payment services during COVID-19. Design/methodology/approach The proposed model extends meta-Unified Theory of Acceptance and Use of Technology (meta-UTAUT) model with perceived severity and self-efficacy factors affecting consumers' behavioural intention and use behaviour towards mobile payment services. A convenient sampling technique has been utilized to gather data from a self-administered questionnaire. The data collection was restricted to the online mode to avoid any physical contact considering the COVID-19 situation. Findings The findings revealed that performance expectancy, effort expectancy and perceived severity have a significant positive impact on consumers' attitude; facilitating conditions has a significant positive impact on effort expectancy; self-efficacy has a significant positive impact on effort expectancy; attitude has a significant positive impact on behavioural intention; and behavioural intention has a significant positive impact on use behaviour. Social influence did not confirm any significant relationship. Research limitations/implications The current research study has utilized a non-probability convenient sampling technique to gather data through a self-administered questionnaire. The data collection was restricted to the online mode to avoid any physical contact considering the COVID-19 situation. The respondents were adopters of mobile payment services. The scope of the study is the COVID-19 context or related chronic diseases context where major preventive mechanisms such as social distancing and avoidance of physical contacts are vital. Originality/value This study has extended the meta-UTAUT model with the COVID-19 context-specific constructs and relationships. The undertaken work has strengthened the explanability of the model. The inclusion of context relevant variables such as perceived severity and self-efficacy and their association with the existing meta-UTAUT framework have enriched the context of the study. The current study offers a holistic understanding of significant factors influencing Indian consumers’ adoption of mobile payment services in the COVID-19 context.
Article
Extant research seldom focuses on maladaptive security coping behaviors. Applying the extended parallel process model, this study has developed a research model to reveal the processes underlying users’ adaptive and maladaptive security coping behaviors. The model is empirically examined along with alternative models. Results show that perceived coping efficacy is the most influencing factor promoting adaptive coping behaviors and deterring maladaptive coping behaviors. Fear plays a mediating role in the threat appraisal process and leads to adaptive and maladaptive coping behaviors. Trust in the Internet as the contextual factor influences the threat and coping appraisal processes and adaptive coping behaviors.
Article
Location based mobile applications (LBMA) are developing rapidly with the increasing adoption of smartphones. These applications advantage userś location to provide products or services based on information obtained from their smart devices. However, implementation and execution of these services may raise userś privacy concerns related to sensitive information being handled. In this context, this paper examines the factors that motivate users and lead them to protect their privacy while using LBMA. It also considers potential benefits they could encounter and thus enable their privacy trade. The model proposed is based on Protection Motivation Theory (PMT) and tested through a variance-based Structural Equations Modelling approach. Data were obtained through an online survey with 820 participants. Findings reveal that perceived severity, perceived vulnerability and self-efficacy exert a positive effect on the intention of privacy protection, which in turn is found to be positively related to the behavior of protecting privacy.
Article
This study demonstrates the salience of explicit and implicit attitudes in the context of digital piracy and identifies their antecedents and consequences. Data were obtained by means of the Implicit Association Test and a survey. Explicit attitude has a positive effect on behavioral intentions which influence digital piracy engagement, whereas implicit attitude has a positive direct impact on digital piracy engagement. Idealism has a negative effect on explicit attitude but a positive impact on implicit attitude. Relativism has a positive effect on explicit and implicit attitudes. People's selfish characteristics manifest themselves in delinquent digital piracy actions through implicit cognitive processes.
Article
The convenience and accessibility of mobile banking applications has resulted in this becoming the preferred method of banking in the UK. Although popular amongst a younger generation, uptake is significantly lower among the older generation of those aged 55+, with some attributing this to cyber security and privacy concerns. This study proposes a model that can be used to measure the influence of cyber security factors on intention to use mobile banking applications, in the UK 55+. The unified theory of acceptance and use of technology (UTAUT) model was modified to include perceived cyber security risk, perceived cyber security trust, and perceived overall cyber security. Unlike similar studies which have been solely quantitative, this research brings further insight using a mixed-methods approach which harnesses both qualitative and quantitative data. The research model was tested using partial-least-squares structural equation modelling on coded questionnaire data, collected from 191 participants. Qualitative data was analysed through a thematic analysis. Both sets of data were analysed using a final convergent mixed-method. The results show that performance expectancy followed by perceived cyber security risk are the main determinants of intention to use mobile banking applications in the UK 55+.
Article
Social media influencer marketing has recently received significant attention. Many studies have explored the parasocial relationship (PSR) formation between influencers and followers. PSR has not often been weighted against other widely used relationship marketing constructs, despite the multitude of PSR studies. This study developed a research model based on the theory of persuasion, which was constructed to investigate the relative weight of the PSR. The study considered three personal attributes (attitude homophily, physical attractiveness, and social attractiveness) and three characterizations (trustworthiness, perceived expertise, and PSR) as antecedents of purchase intention. Data were collected through a survey of respondents who bought products/services after watching YouTube advertisements made by influencers. The study found that PSR had a significantly positive impact on purchase intentions relative to other characterizations and that PSR was significantly related to the three personal attributes. In addition, PSR formation was significantly influenced by consumers’ perceived influencer types. The survey showed that social media influencer marketing strategies need to be fine-tuned based on personal attributes, characterizations, and influencer types. This paper discusses the theoretical and practical implications of these findings.
Article
The frequent occurrence of security incidents in ride-sharing is a challenge for the survival of IT-enabled ride-sharing platforms. Passengers’ protective behavior is an effective means to alleviate this issue, with benefits to both the passengers and the platforms. This study explores the mechanisms of passengers’ protective behavior in the ride-sharing context by combining protection motivation theory (PMT) and usage situation theory. We test our hypotheses using data (n = 346) collected from a field survey based on a real scenario. The findings reveal that PMT and usage situation theory work well to explain passengers’ protective behavior during ride-sharing. This study explains the motivation behind passengers’ protective behavior in the ride-sharing context, extends the contents of PMT by exploring its antecedents, and extends the contents of usage situation theory by introducing a new dimension. Our findings can help ride-sharing platforms take appropriate strategies to improve passengers’ protective behavior.
Article
Medical mobile payment (MMP) applications (apps) enable medical consumers to pay medical bills via their smartphones at any time and from anywhere in a more convenient and cost-effective manner. However, since previous studies have only focused on the influence of general consumer aspects, they are insufficient to fully explain users’ MMP behaviors. This study develops a push-pull-mooring (PPM) framework to interpret medical consumers’ switching behavior. A field survey was executed in Taiwan to collect data from medical consumers. The results of 1020 valid questionnaires revealed that low satisfaction, perceived risk, social influence, relative advantage, compatibility, trialability, and image have positive influences on switching intention; on the other hand, sunk costs, inertia, and switching costs negatively influence consumers’ switching intention. The results provide useful insights that not only help service providers choose an appropriate promotion strategy but also enable smartphone manufacturers, bankers, and medical institution managers to develop and appropriate their future marketing and administrative strategies.
Article
Digitalization, personalization and globalization shape how companies contact and communicate with their consumers who have different needs and wants. In these highly competitive heterogeneous markets, it becomes crucial to reach consumers in an easy, low-cost and more targeted manner. Social media advertising is one of the effective ways of attracting potential customers, retaining attention of current customers and exploiting them through persuasive content. Despite its plentiful and obvious advantages, the variation among consumers’ responses to social media advertising remains as a major challenge. Hence, this study aims to identify different consumer segments based on the social media advertising features, discover differences in their individual traits, and examine variation among those segments in terms of the factors that predict their purchase intentions. By utilizing cluster analysis, consumers are segmented according to their perceptions regarding social media advertising features: perceived relevance, performance expectancy, hedonic motivation, informativeness, and interactiveness. It is revealed that consumers are grouped under three segments, namely: “susceptible”, “dispassionate”, and “impervious”. It is found that there are statistically significant differences among these segments in terms of being easily persuaded, impulse buying tendency, self-confidence, and social network proneness in which consumers in “susceptible” segment are more easily persuaded, have high level of self-confidence, have more impulse buying tendency, and are more prone to social networks when compared to other groups. It is also discovered that there are differences among these segments in terms of the factors that determine their purchase intentions for the products presented in social media advertising. The purchase intention of consumers in “susceptible” segment for products exhibited in social media advertising, is determined by perceived relevance, ease of being persuaded, self-confidence and social network proneness. On the other hand, the purchase intention of consumers in the “dispassionate” segment is shaped by informativeness, ease of being persuaded, and social network proneness. Finally, the purchase intention of consumers in “impervious” segment is influenced by hedonic motivation, perceived relevance, impulse buying tendency, and ease of being persuaded. Nevertheless, when the whole sample is considered, it is observed that consumers’ purchase intentions for the products and services presented in social media advertising are influenced by the following factors: perceived relevance, performance expectancy, informativeness, impulse buying tendency, ease of being persuaded, and social network proneness. Understanding differences across segments can help companies design, manage and convey their social media advertising campaigns to their target audience in a convincing, timely, effective, and efficient way, which in turn, let them gain competitive advantage in highly volatile and dynamic markets.
Article
Social media has become an essential source of information during the coronavirus disease 2019 (COVID-19) pandemic. This study aims to understand social media’s effect on the general public’s fear, degree of adopting precautionary behaviors, and compliance with health authorities’ regulations during the pandemic. A cross-sectional online survey was conducted in Jordan during the early period of COVID-19 pandemic. 827 individuals completed the questionnaire. Factors that had a significant association with increased fear included female gender (OR 2.6, 95% CI: 1.8–3.7), married status (OR 1.9, 95% CI: 1.2–3.4), following medical pages on social media (OR 1.6, 95% CI: 1.04, 2.42), and sharing of COVID-19 information on social media (OR 3.6, 95% CI: 1.8–7.1). The variables that were significantly associated with higher levels of precautionary behaviors were knowledge score (OR 1.2, 95% CI: 1.07–1.3), feeling of fear (OR 2.6, 95% CI: 1.71–3.), and following medical pages on social media (OR 2.8, 95% CI: 1.8–4.24). Regarding compliance with health officials’ regulations, social media as a source of information and sharing information were significantly associated with lower odds of compliance with the Ministry of Health’s regulations (OR 0.27, 95% CI: 0.13–0.5 and OR 0.46, 95% CI: 0.25–0.8, respectively). Social media is an essential platform for risk communication during pandemics. It plays a positive role in spreading knowledge and promotes certain preventive behaviors among the public. However, it may spread fear and encourage disruptive behaviors, which might be propagated by sharing the pandemic’s news.
Article
Mining product adoption intentions from social media could provide insights for many business practices, such as social media marketing. Existing methods mainly focus on text information but overlook other types of data. In light of the Integrated Behavioral Model (IBM), in this study, we argue that it is valuable to consider users’ social connections in addition to postings for identifying product adoption intentions. Based on this rationale, we propose a novel multiview deep learning framework to identify product adoption intentions. Extensive experiments show our proposed approach is effective, and demonstrate the benefit of incorporating social network information for intention identification.
Article
Social media has become an important marketing media to attract and retain consumers. This article focuses on the movie industry and aims to investigate how different channels and events in social media marketing achieve box office success through different consumers’ responses. In reference to elaboration likelihood model (ELM), we propose our research model and test hypotheses using the data of 304 movies with the information of box office, attributes, and associated social media posts. The results show that: (1) official microblog activity increases the purchase intent through changing audience's attitude while third-party mention increases purchase intent through catching audience's attention and promoting positive attitude, and there is an interaction effect between official microblog and third-party media; (2) social media marketing events related to contents introduction promote purchase intent through central route while those related to surrounding information promote purchase intent through peripheral route; and (3) movie attributes interact with marketing intensity in affecting purchase intent. Under the same marketing intensity, the marketing effect of domestic sequel movies released on popular holidays is better. Our findings provide both theoretical and practical implications.
Article
Delivery of products in online orders by drones has begun to be tested by major retailers. How about consumers? Are they ready for this? Due to the emergence of Covid-19 and its easy transmission from person to person, considering the risks in the streets, a lot of people have started to place their orders online. However, the interaction between the courier and the consumer during the order delivery has become a problem over time. Reducing people's anxiousness in such pandemic situations brings uncertainty about the delivery of the orders. The object of the research is to create a drone delivery system, which is an alternative delivery system that will be solution to these problems and is also used in a limited way around the world. With this study, whose theoretical background is based on the diffusion of innovations theory, technology acceptance model and protection motivation theory, it is aimed to test the relationship between consumer's perceptions, attitudes and behavioral intentions towards drone delivery of online orders. In this research, questionnaire method has been used for data collection and measurement. Moreover, the Structural Equation Modeling approach has been used for data analysis and validation of models. According to the results of this study, significant relationships have been identified between the consumers' perception of benefit and risk, and attitudes and behavioral intentions towards drone delivery of online orders during pandemics.
Article
The governmental responses to the COVID-19 pandemic include concerns for both public health and formal social control. Government leaders asked the public to help mitigate the spread of the virus by adopting various protective behaviors. Our purpose was to evaluate and explain defiance of COVID-19 mitigation strategies, drawing from the expanded model of deterrence and protection motivation theory. A national sample of 600 American adults were surveyed about perceptions of, and behaviors during, the early part of the COVID-19 pandemic, including defiance of COVID-19 mitigation strategies. Perceived severity of the disease, certainty about dying from it, and how much control one has over getting it each predicted fear of COVID-19. Defiance of COVID-19 mitigation guidelines appear to be a combination of rational choice considerations and emotions. Government and health officials should consider how the public evaluates messages about taking protective actions to maximize compliance.
Article
In this study, by considering household, societal, and institutional contextual factors, we attempt to theorize the relationship between gender and digital divide with the help of social learning theory (SLT) and the literature on computer self-efficacy (CSE). Then, using a large-scale national representative sample data from India, we empirically evaluate these relationships. Our empirical analysis corroborates anecdotal evidence that gender-based digital divide exists and is severe. Caste, household size, marriage, and presence of digitally literate women in the family are found to be influencers of women’s CSE, which, in turn, impact gender-level digital divide.
Article
Mobile payment technology continues to spread across the globe, but its diffusion has not been uniform. Its low usage in developing economies is of particular concern to policymakers since this technology has the potential to enable financial inclusion. In this study, in order to develop policy interventions for greater usage, we comparatively analyze factors impacting actual usage and future use intention. India, with its uneven trajectory of mobile payments, gives us an appropriate field to investigate citizens’ usage behaviour. Considering users’ perceptions of both positive and negative attributes of the technology, we develop research models under the umbrella of the valence framework. We utilize technology affordances and constraints theory (TACT) to refine the research models through an understanding of various innovative uses. To test the valence-TACT models, we collect survey responses of 551 citizens across four Indian cities. The results from the models show how certain factors, such as convenience, reflection, and security, have different impacts on actual usage and future use intention, respectively. These findings have implications for critical issues like security, risk, and digital literacy, and can help in the design of policy recommendations for enhancing the use of mobile payments, thereby impacting financial inclusion for all. The valence-TACT model provides a theoretical contribution to mobile payment and innovation literature and also offers several policy insights.
Article
Purpose The present study aims to probe into the determinants of mobile wallet adoption by millennials with the assistance of extended technology acceptance model. Design/methodology/approach The data was collected from the students studying professional courses in leading private universities in the north region of India. Keeping in view of the objective and hypotheses, the Partial Least Square Structural Equation Modeling (PLS -SEM) technique was used to test the proposed model. Findings The tested model brings into notice the imperative observation, which clearly outlines that there are all significant relationships, which can be observed herein. To explicitly state: perceived ease of use (PEOU) has a significant positive relationship with the perceived usefulness followed by PEOU also shares a significant positive relationship with the behavioral intention, and lastly trust as a variable under study establishes a significant positive relationship with actual use (AU). Research limitations/implications Implications for the banking industry are to ensure the safety and privacy (financial information) confidential. Originality/value The present study contributes to the literature of mobile wallet in the developing nations.
Article
This study aims to know what are the factors determining the adoption of M-Banking app among customers in Cameroon. In other words, what are the factors that influence users in their decisions to adopt and use a system or technology such as the MBanking app, and indirectly, what is the impact of this use on both the customers and financial inclusion? The research model developed relying on a combination of Technology Acceptance Model (TAM ), Unified Theory of Acceptance and Use of Technology ( UTAUT2 ), Information System Success Model ( ISSM ), and Protection Motivation Theory ( PMT ) and other constructs; it was then tested with a sample of 223 users of the “ SARA” M-Banking app of the financial institution called “ Afriland First Bank” . Findings revealed that: (1) utilitarian expectation, hedonic motivation, and status gain, habit, and perceived privacy concern have a significant influence on the intention to adopt M-Banking apps; and (2) the exploitative/explorative use of this technology has an impact on user’s loyalty and satisfaction but also contributes strongly to fostering financial inclusion in Cameroon. Also, the Multi-group analysis was performed on the sample using 2 gender-based groups (males, n=121; females, n=102).
Article
There is a significant divide in financial accessibility between urban and rural areas in China. This gap can in part be mitigated by diffusion of existing technology innovations including mobile banking. A binary probit model was used to estimate the impact of three information dissemination channels and the availability of financial services on the adoption of mobile banking by rural residents in six provinces of China. Results indicate mass and interpersonal communication channels have a greater impact than those organizational. Residents with a local banking facility and those using a state-owned bank, females, and those younger and more educated, proficient with mobile devices, working other than in agriculture, and living farther from the nearest road have a higher probability of adoption. Adoption is inversely related to level of regional financial development. To develop mobile banking in rural areas, this paper suggests making use of more diversified communication channels to promote mobile banking, better tailoring mobile banking for rural users, and targeting promotion. Policy should be considered that helps mitigate constraints on the availability of financial infrastructure and financial products in the rural financial environment.
Article
The coronavirus disease 2019 (COVID-19) pandemic is a major threat to global health. Relevant studies have shown that ambient temperature may influence the spread of novel coronavirus. However, the effect of ambient temperature on COVID-19 remains controversial. Human mobility is also closely related to the pandemic of COVID-19, which could be affected by temperature at the same time. The purpose of this study is to explore the underlying mechanism of the association of temperature with COVID-19 transmission rate by linking human mobility. The effective reproductive number, meteorological conditions and human mobility data in 47 countries are collected. Panel data models with fixed effects are used to analyze the association of ambient temperature with COVID-19 transmission rate, and the mediation by human mobility. Our results show that there is a negative relationship between temperature and COVID-19 transmission rate. We also observe that temperature is positively associated with human mobility and human mobility is positively related to COVID-19 transmission rate. Thus, the suppression effect (also known as the inconsistent mediation effect) of human mobility is confirmed, which remains robust when different lag structures are used. These findings provide evidence that temperature can influence the spread of COVID-19 by affecting human mobility. Therefore, although temperature is negatively related to COVID-19 transmission rate, governments and the public should pay more attention to control measures since people are more likely to go out when temperature rising. Our results could partially explain the reason why COVID-19 is not prevented by warm weather in some countries.
Article
Employees’ non-compliance with organizational information security policy (ISP) when using informational resources has become the main reason for continuous security incidents. Drawing upon technology threat avoidance theory (TTAT) and social exchange theory (SET), our study investigates the influence of supervisor-subordinate guanxi (SSG) and organizational commitment in the information security management. Our hypotheses were tested using survey data from 235 Chinese government employees. Results not only confirm the direct effect of SSG on government employees’ ISP compliance but also suggest that SSG indirectly influences compliance behavior via the mediation of organizational commitment. Organizational commitment weakens the negative influence of perceived costs on compliance behavior and also weakens the positive effect of self-efficacy on employees’ ISP compliance. For low-commitment employees, the negative influence of perceived costs on compliance behavior is more significant than that of those with strong organizational commitment, and self-efficacy exerts a stronger effect on ISP compliance for low-commitment employees than it does for high-commitment employees. This study contributes to current literature on information systems (IS) by confirming the critical roles of SSG and organizational commitment in motivating employees’ compliance behavior.
Article
The purpose of this study is to investigate the behavioral intention to adopt internet banking (IB) by individuals under the influence of user espoused cultural values in Fiji. A conceptual framework is developed by extending the Unified Theory of Acceptance and Use of Technology (UTAUT) model, incorporating customer satisfaction and perceived risk constructs and cultural moderators of individualism and uncertainty avoidance. This research adopts a quantitative approach and collects data from 530 respondents. The proposed model is tested using structural equation modelling. The empirical results obtained suggest that IB adoption is positively influenced by the levels of performance expectancy, effort expectancy, social influence and facilitating conditions while perceived risk negatively influences IB usage intention. IB intention was found to positively impact usage behavior which ultimately impacts customer satisfaction. This study also reveals that uncertainty avoidance dampens the influence of performance expectancy and facilitating conditions on IB adoption intention. The study highlights the importance of individual’s cultural values in promoting IB adoption. It contributes to the literature by extending and testing a comprehensive research model to better understand IB behavior.
Article
Urban–rural divide becomes an obstacle to the development of e-government in China. This research devotes to promoting the adoption of e-government in China. It investigates the attitudes of urban residents versus rural residents toward e-government use in Chongqing, one of most important municipalities of China which is fraught with a serious urban–rural divide. A research model is created to assess the differences between urban and rural residents according to previous literatures and theories. A Structural Equation Model approach is employed to examine the research model. The survey data were collected from 596 urban residents and 477 rural residents in Chongqing. The results reveal that there are differences between urban and rural groups. Many enabling factors and inhibiting factors in previous studies, such as perceived behavioural control and resistance to change, can positively influence rural residents’ intentions to use but fail to exert great effects on urban residents’ motivations. Thus, it is necessary for government agencies in China to take actions based on those significant enabling factors and inhibiting factors to promote e-government acceptance. In addition, it is also necessary to conduct deeper research on e-government acceptance of urban residents in China.
Article
This study integrates protection motivation theory and theory of reasoned action to investigate knowledge withholding in cyberspace, which is a highly prevalent counterproductive knowledge behavior but has received limited attention. The research model was tested with 386 valid online survey responses among Chinese Internet users. The results indicate that both threat appraisal (perceived severity, perceived susceptibility) and coping appraisal (response efficacy, self-efficacy) are positively associated with the attitude toward knowledge withholding, and that the attitude toward knowledge withholding and subjective norms about knowledge withholding are positively related to knowledge withholding intentions. In addition, the results also show that attitude toward knowledge withholding significantly mediates the relationships of threat appraisal and coping appraisal with knowledge withholding intentions. We believe that the findings of this study not only provide a new theoretical perspective on understanding knowledge withholding behavior but also offer valuable insights for reducing knowledge withholding behavior in cyberspace. Limitations and future research directions are also discussed.
Article
Purpose Mobile health service (MHS) can provide users with convenient health services and information to reduce their medical costs from aging or other health issues. Previous studies confirm the underdevelopment of the Chinese MHS. The purpose of this paper is to analyze the factors that affect the intention to use MHS. Design/methodology/approach This paper develops a research model that integrates personal health differences with theory of planned behavior (TPB) and protection motivation theory (PMT). This model is empirically tested using data from 494 valid questionnaires. Structural equation modeling is used to test the hypotheses. Findings Perceived vulnerability to disease, perceived severity of disease, response efficacy and self-efficacy positively affect attitude, thereby exerting a positive influence on the behavioral intention to use MHS. Subjective norms also influence users’ behavioral intention. Personal health status and personal health value have quasi-moderating effects on the relationship between attitude and behavioral intention. Originality/value This paper presents an early attempt to conceptualize and validate a research model of MHS acceptance by integrating TPB and PMT in a complementary manner. The integrated model provides a holistic view of people’s intention to use MHS by considering health threat beliefs, individual role (i.e. attitude and self-efficacy) and social influences (i.e. subjective norms). Furthermore, this research highlights the role of two individual health characteristics (i.e. personal health status and personal health value) in MHS adoption. These new findings are beneficial toward an in-depth understanding of technology adoption in the MHS context.