2,747 research outputs found

    The Impact Of Technology Trust On The Acceptance Of Mobile Banking Technology Within Nigeria

    Get PDF
    With advancement in the use of information technology seen as a key factor in economic development, developed countries are increasingly reviewing traditional systems, in various sectors such as education, health, transport and finance, and identifying how they may be improved or replaced with automated systems. In this study, the authors examine the role of technology trust in the acceptance of mobile banking in Nigeria as the country attempts to transition into a cashless economy. For Nigeria, like many other countries, its economic growth is linked, at least in part, to its improvement in information technology infrastructure, as well as establishing secure, convenient and reliable payments systems. Utilising the Technology Acceptance Model, this study investigates causal relationships between technology trust and other factors influencing user’s intention to adopt technology; focusing on the impact of seven factors contributing to technology trust. Data from 1725 respondents was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust. Technology trust showed a direct significant influence on perceived ease of use and usefulness, a direct influence on intention to use as well as an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Furthermore, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. With mobile banking being a key driver of Nigeria’s cashless economy goals, this study provides quantitative knowledge regarding technology trust and adoption behaviour in Nigeria as well as significant insight on areas where policy makers and mobile banking vendors can focus strategies engineered to improve trust in mobile banking and increase user adoption of their technology

    Perceived influence of cybersecurity on the intention to use mobile banking applications

    Get PDF
    Banking institutions see the adoption and usage of mobile devices for banking namely mobile banking as an innovative financial service delivering strategy that bridges the gap between customers and banks. Mobile banking eliminates the need to visit bank branches for banking services and it eliminates the need to only perform banking services within fixed business hours. In mobile banking, mobile devices such as a cellphone, smartphone, or tablet’ are used to conduct non-financial and financial transactions such as checking account status, transferring money, making payments, or selling stocks. Mobile banking is suggested to take over the banking sector because it is economising and timesaving benefits. Despite these benefits, the adoption rate amongst consumers remains low, especially in developing countries where there is a knowledge gap in understanding why consumers do not engage in the frequent use of mobile banking applications. Apart from several factors identified in previous literature on mobile banking as influencers of limited usage and adoption of mobile banking, trust remains an important factor in the intention to adopt or use mobile banking applications. Also, because of the increasing prevalence of cyber threats in developing countries, the influence of cybersecurity is still questionable on their influences on the intention to adopt or use mobile baking applications. The increase in cyber threats and attacks has birthed the need for cybersecurity to be addressed. Given that most financial institutions see mobile banking as a strategy for their competitive advantage; it is important that they understand how best to address consumer’s fears brought about by cybersecurity threats. Literature has not covered more ground on the analysis of mobile banking applications (Uduimoh., Osho., Ismaila, & Shafi’i, 2019). The purpose of this study is to investigate the perceived influence of cybersecurity on the user’s intentions to use mobile banking applications. The study identified seven salient cybersecurity factors that influence the intention to use mobile banking applications. These cybersecurity factors were grouped into two groups, namely intrinsic factors and extrinsic factors and resulted in the development of a conceptual model. With this model, hypothesises were developed and tested statistically using quantitative data from an online selfadministered Qualtrics survey questionnaire. Data collected from 90 participants was statistically analysed in Smart PLS 3 (a quantitative data analysis software). Structural Equation Modeling (SEM) and Partial Least Squares path modelling approaches were adopted for data analysis. Hypothesis testing was performed on salient factors that influence the perception of cybersecurity on the intention to use mobile banking applications. The findings concluded that salient significant factors that influence the perception of mobile banking cybersecurity on the intention to use mobile banking applications were perceived data confidentiality and cybersecurity awareness. As a result, the study concluded that one’s perception on ability to avert cybersecurity threats and attacks, how they perceived the protection of their data from being modified by unauthorised users, how they perceive their data to be kept confidential and their knowledge of cybersecurity from legitimate sources influences their intention to use mobile banking applications. Finally, this study investigated the empirical evidence of the knowledge gap concerning the perceived influence of cybersecurity on the intention to use mobile banking applications

    The Training Deficiency in Corporate America: Training Security Professionals to Protect Sensitive Information

    Get PDF
    Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect sensitive information. The population consisted of 3 senior leaders in a large telecommunication company located in Dallas, Texas that has a large footprint of securing sensitive information. The conceptual framework on which this study was based was the security risk planning model. Semistructured interviews and document reviews helped to support the findings of this study. Using the thematic approach, 3 major themes emerged. The 3 themes included security training is required for all professionals, different approaches to training are beneficial, and using internal and external training\u27s to complement each other. The findings revealed senior leaders used different variations of training programs to train security professionals on how to protect sensitive information. The senior leaders\u27 highest priority was the ability to ensure all personnel accessing the network received the proper training. The findings may contribute to social change by enhancing area schools\u27 technology programs with evolving cyber security technology, helping kids detect and eradicate threats before any loss of sensitive information occurs

    A strategic framework for e-government security: the case in Nigeria

    Get PDF
    A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirements for the degree of Doctor of PhilosophyCountries across the globe are striving towards full-scale implementation of e-government. One of the issues arising with the efforts to this realization is the assurance of secure transactions while upholding high privacy standards. In order to engage citizens in the process, there must be transparency and confidence that the e-government systems they are using are reliable and will deliver the services with integrity, confidentiality and accountability. Different systems require different levels of security according to the services they provide to their users. This research presents an investigation into reasons why e-government security frameworks developed by researchers with the claim that it is one-size-fits-all issue may not hold true, particularly in the case of Nigeria, based on certain identified realities. The claim of a generalized framework appears very challenging because there seem to be much diversity across different governments. Countries differ in one or more of the following characteristics: political systems, legal systems, economic situation, available technological infrastructure, Internet and PC penetration, availability of skills and human resources, literacy levels, computer literacy levels, level of poverty, leadership, and ethnic diversities in terms of norms, languages, and expertise. Security measures implemented in e-government projects in some developed countries, beginning with more established e-government systems around the world, were evaluated and a strategic framework for e-government security proposed which considers both technical and non-technical factors that involve people, processes and technologies. The framework is proposed to advance the rapid adoption of practices that will guarantee e-government security. It seeks to provide a flexible, repeatable and cost-effective approach to implementing e-government security. This research examines the issues of enclosure in the implementation of e-government from the perspective of security and ultimately survivability

    Investigating the impact of technology trust on the acceptance of mobile banking technonlgy within Nigeria

    Get PDF
    This empirical study investigates the factors influencing Nigerians’ trust and adoption of mobile banking technology; using an integrative model. Research was conducted using a questionnaire developed and distributed in Nigeria. Out of 2256 returned questionnaires, 1725 were deemed to have been completed and hence usable. The data was analysed using confirmatory factor analysis and the results showed that confidentiality, integrity, authentication, access control, best business practices and non-repudiation significantly influenced technology trust with availability showing unsatisfactory values for consideration. In addition, technology trust showed a direct significant influence on perceived ease of use and usefulness. Technology trust also showed an indirect influence on intention to use through its impact on perceived usefulness and perceived ease of use. Also, perceived ease of use and perceived usefulness showed significant influence on consumer’s intention to adopt the technology. As a result of increased understanding of customer trust and adoption trends in Nigeria, these findings have important theoretical implications for researchers with interests in technology acceptance trends and the role of external factors, such as trust, in user adoption of technology. Such implications include the provision of empirical data, which highlights the role technology trust, demographic segmentations, perceived ease of use and perceived usefulness play in mobile banking adoption in Nigeria. In addition, the successful completion of this study provides justification for the use of this research’s model as a suitable framework for investigating user adoption of technology

    Cyber resilience of e-government: comparative case analysis of Estonia and South Korea

    Get PDF
    E-government has evolved throughout modern times and shaped the new norm of governance. While global society pays more attention to this next-generation platform than before, it is also true that state actors should build up a robust security strategy to protect e-government and their extended territory in cyberspace. At the same time, a high level of digitalization does not always mean their e-government framework is also strong enough to endure external threats. This thesis examines the difference in security preparedness of e-government by comparing a set of countries that have similarly well-developed online government but are lagging in the cyber defense aspect. In order to examine this, the research used cyber resilience as a conceptual framework to analyze several factors that cause differences. This concept overcomes the blind spot of the traditional cyber security approach and points out the relation with conventional hard security study. To uncover the differences in cyber security of e-government, this study picks up Estonia as a successful model and South Korea as the opposite. Based on cyber resilience, the thesis identifies external and internal factors including regional security, nature of neighbors, and internal factors triggering variance within these countries.https://www.ester.ee/record=b5439277*es

    Innovation-ICT-cybersecurity: The triad relationship and its impact on growth competitiveness

    Get PDF
    This study examines the global growth competitiveness of countries using the dynamics of growth, ICT, and innovation. It also introduces a new dynamic, cybersecurity, and argues that within a growth competitiveness framework, ICT, innovation, and cybersecurity mechanisms allow some countries to achieve higher ranks on the competitiveness ladder than others. Based on a theoretical framework that encompasses the economic growth model, the complementarity theory, and the international law theory, a model that integrates ICT, innovation, and cybersecurity, depicts the relationships amongst them and with growth competitiveness, and incorporates complementary factors with possible moderating effect is presented. The model proposed relationships are then tested using PLS-PM. The model proves to have adequate goodness-of-fit as well as predictive validity. Results support most hypotheses showing: (1) a positive relationship between ICT and innovation; (2) a positive relationship between each of innovation and ICT with growth competitiveness; (3) a mediating effect of innovation has in the ICT – growth competitiveness relationship; (4) a positive relationship between ICT and innovation on one hand and cybersecurity on the other; (5) a mediating role of cybersecurity in the ICT – growth as well as the innovation – growth relationships; and the (6) moderating effect that human capital has in the above relationships. Cyber threats, however, do not have a moderator role in these relationships. These findings are interpreted in relation to the extant body of knowledge related to ICT, innovation, and cybersecurity. Moreover, the theoretical and the practical implications are discussed and the practical significance is shown. Finally, the study limitations are listed, the recommendations are presented, and the direction for future work is discussed

    Strategies Managers Implement to Ensure Information Technology Infrastructure Services for Overseas Users

    Get PDF
    Information technology (IT) has become a critical success factor for businesses. IT leaders’ potential failures in implementing IT strategies aligned with the business objectives may negatively impact the success of organizations in the current global market. Grounded in the technology-organizational-environmental (TOE) framework, the purpose of this qualitative, pragmatic inquiry study was to explore the IT strategies used by IT managers of multinational companies in the United States to implement IT infrastructure services to businesses for overseas users in developing countries. The participants were nine IT leaders with experience or who have implemented IT strategies for organizations in the United States with businesses in developing countries. Data were collected using semistructured interviews. Through thematic analysis, six themes were identified: (a) hybrid cloud and on-premises adoption, (b) IT infrastructure redundancy or failover process, (c) development of standardized IT best practices, (d) IT infrastructure strategies by region, (e) measurement of the IT infrastructure services, and (f) external factors impact the adoption of IT infrastructure strategies. A key recommendation is for IT leaders to have cloud file services such as Microsoft 365 or One Drive, allowing employees to work from anywhere. The implications for positive social change include the potential to guide IT managers’ decisions that can lead to the long-term sustainability of businesses, thereby improving the socio-economic lifestyle of individuals in the United States and developing countries

    Assessing the cyber-security status of the metropolitan municipalities in South Africa.

    Get PDF
    Doctoral Degree. University of KwaZulu-Natal, Durban.The intention of this enquiry was to assess the status of cyber-security in the metropolitan municipalities in South Africa. The focus on this level of local government was driven by the fact that metropolitan municipalities are the economic hubs with a variety of industrial facilities and are the places with high population densities. The metropolitan municipalities have adopted information infrastructures to support the daily administrative processes and, equally important, to support the delivery of essential services such as the distribution of electricity and clean water to the local citizens and communities. Entrenched in the adoption of information infrastructures are the cyber ills which if left unattended could have devastating consequences on people and industrial facilities. Failures or interruptions to information infrastructures have cascading effects due to interconnectedness of these infrastructures. The study used the Constructivist Grounded Theory Methodology to explore the activities that are performed by the metropolitan municipalities with the intention to determine what needs to be in place to safeguard their information infrastructures from cyber ills. Cyber-security is a serious concern in all types of businesses that are largely supported by information infrastructures in pursuit of the business objectives. Information infrastructures are susceptible to cyber-security threats, which if left unattended can shut the municipality operations down with disastrous consequences. A substantive theory of integrated development cyber-security emerged from the Constructivist Grounded Theory Methodology processes of data collecting through comprehensive interviews, initial coding, focused coding, memoing, and theoretical coding. A municipal cyber-security conceptual framework was developed from the integrated development cyber-security theory constructs of integrated development cyber-security which are the core category, cyber-security governance category, cyber-security technical operations category, and human issues in cyber-security category. The conceptual framework was used to formulate the cyber-security status assessment survey questionnaire that was adopted as an instrument to assess the cyber-security status in the metropolitan municipalities. The cyber-security status assessment instrument was deployed in metropolitan municipalities, wherein data was collected and statistically analysed to test and confirm its validity. The assessment results were analysed and showed the as is posture of cyber-security, the gaps in the current implemented cyber-security controls were identified together with the risks associated with those gaps, corrective actions to address the identified deficiencies were identified and recommended/communicated to the management of relevant municipalities

    Determinants of public-private-partnership performance: the case of Pakistan

    Get PDF
    Pakistan is the sixth most populous country in the world with a population of 207.77 million and growth rate of 2.40 percent per annum (Pakistan Bureau of Statistics, 2018). Continual increases in population growth and urbanisation are applying pressure on infrastructure services demand. Currently, the country is unable to finance infrastructure projects through traditional methods. Public finance – due to budget deficit. The provisions of Fiscal Responsibility and Debt Limitation (FRDL) Act 2005 limit federal fiscal deficit to 4 percent of gross domestic product (GDP) and the current budget deficit is 4 percent of GDP. Borrowing – is unavailable because, under lending restrictions in the FRDL Act 2005 public debt is restricted to 60 percent maximum of estimated GDP. Present public debt is 59.2 percent of GDP (Ministry of Finance, 2016). Issuance of international bonds – is not available due to their high susceptibility to event-risk factors. Access to capital markets is limited to only three stock exchanges and stock issuers are unable to use savings from remote areas. There is no availability of long-term lending facilities for infrastructure projects financing. Finally, the government cannot impose new taxes or increase tax rates due to weak economic conditions and political reasons. Improvements in public infrastructure facilities have not kept pace with population growth and urbanisation. Consequently, the gap between infrastructure services demand and supply is widening. Financial constraint is the major barrier in infrastructure development alongside other problems such as a weak institutional framework, political instability and governance issues. Consequently, Pakistan ranks 115 out of 137 countries in the basic infrastructure category in Global Competitiveness Index 2017-18. Therefore, it is suspected that a large part of the population will not have access to infrastructure facilities in future, if appropriate measures are not taken now. The present infrastructure demand-supply gap needs to be addressed on priority basis. New avenues to increase infrastructure investment may be found elsewhere, beyond the scope of public resources. Accordingly, Pakistani government needs to adopt innovative approaches to deal with financial constraints for infrastructure development by avoiding future debt traps. Empirical studies suggest that public-private partnerships (PPP) may be a valuable solution to the infrastructure challenge. Therefore, it is ascertained that PPP for infrastructure development is urgently needed in Pakistan and an exploration of the factors helping or impeding their implementation is justified. However, there are a few impediments in PPP implementation in Pakistan. These includes lack of "ownership" of such projects at senior level management and a weak judicial system: there is a lack of fast track dispute-resolution mechanises. There is no PPP legislation and sector specific guidelines and standard model contracts. The financial system is weak such that long-term loans for infrastructure development are unavailable. There is limited access to the capital market. Institutional structure is ineffective, especially regarding political instability and inconsistency in policy implementation. Finally, microeconomic polices are weak. In the current literature, the majority of research focus, primarily within developed countries, has been put on PPP procurement, management and performance of PPP projects and service delivery. However, institutional capacity and the capacity of public and private sectors for implementing PPP projects has been largely ignored, with only a small number of researchers having identified the importance of institutional and public sector capacity for successful implementation of PPP projects. A comprehensive set of criteria and methodology for evaluating their capacity is missing. An extensive review of the available literature suggests that private sector capacity to implement PPP programs has not been assessed so far. Therefore, no previous analytical methodology and research technique was available to evaluate this aspect of PPP. As no studies have been carried out to determine the capacity of institutions, public and the private sector to implement PPP program in the context of Pakistan, this thesis therefore focuses on the determinants of PPP implementation. In this thesis, time series and cross-sectional primary and secondary data covering 24 years from 1991 to 2014 was used. Primary data was collected through a survey questionnaire. Secondary data was collected through official websites and financial reports of the government of Pakistan and from the World Bank database. The suitability of questionnaire was verified by using factor analysis. Cronbach's alpha was used to test reliability and consistency among questionnaire variables. Time series property of the data and unit root non-stationarity of variables within panel framework was conducted by panel unit root tests. Panel cointegration tests were performed among the variables to avoid spurious regression by utilising Persyn and Wasteland tests. The estimated model was built up within panel vector autoregression (PVAR) framework. The PVAR model was further extended to include qualitative policy variables to articulate the effects of quantitative and qualitative variables in infrastructure development of Pakistan. This model is generally known as panel vector auto regression with exogenous variables (PVAR – X). The panel regression model was estimated by ordinary least square (OLS) and generalised least square (GLS) methods. PVAR model was estimated by generalised method of moment (GMM). The post-estimation analysis was performed for checking: i) economic theory consistency and sign consistency; ii) statistical significance; iii) model adequacy; iv) goodness-of-fit tests; and v) classical testing framework was also applied (t-test, F-test, Lagrange multiplier (LM) and Wald testing approaches) for comparing growth parameter among panel and their interaction. The estimation results showed that: i) Institutions in Pakistan do not have the capacity for managing PPP program. The private sector not only lacks the capacity for participating and managing PPP projects but also are a barrier to infrastructure development; ii) The public sector has an influence on PPP undertakings for infrastructure development but the sector cannot attract private sector investment due to lack of managerial, financial and monitoring capacity. Further, the public sector does not have the capacity for mitigating project-related risks. iii) Other factors (barriers) for implementing PPP in Pakistan were also identified, which are: a) lack of good governance – administrative formalities and ambiguous rules and regulations; b) delays/deficiencies in project execution; c) public and private sectors do not have PPP related experience and qualification; and d) feasibility studies and projections for PPP projects are unrealistic. This thesis contributes to both theoretical and practical aspects of PPP implementation in Pakistan. The findings provide valuable insights on how and why PPP model may or may not work effectively in different institutional settings. These contributions extend the theoretical literature related to PPP implementation, especially in developing economies, and provides policy guidance for the government to remove barriers for implementing and encouraging PPP undertakings in Pakistan. The findings provide guidelines for PPP implementation in Pakistan and the methodology used can be extended to other developing countries and/or multi-country studies for generating useful comparisons and revealing more useful information
    corecore