518,393 research outputs found

    An Investigation on The Intention to Adopt Mobile Banking on Security Perspective in Bangladesh

    Get PDF
    This research examines the information security of adopting mobile banking and suggests maximizing information security in mobile banking in different ways. Security issues pose a threat to mobile banking adoption and diffusion. Therefore, reliable security measures and improved trust improvement are suggested to address information security in adopting mobile banking for financial services. A questionnaire survey is conducted with users of mobile banking technology. Random sampling is adopted in the study. 650 questionnaires were sent to respondents, and 303 responses were recorded. A confirmatory factor analysis with varimax rotation was conducted following correlation and multiple regression analysis to test the hypothesis of the study. The research finds that (1) perceived security and trust affect mobile banking self-efficacy and performance (SEP) of adopting mobile banking for financial services; (2) Reliable security measure and perceive trust improvement positively influence (SEP) of adopting mobile banking for financial services. This study shows the significance of user perceptions of security by inspecting the content of the security rules of mobile banking for clients’ levels. It includes the adoption of technology in financial services. Therefore, the study links the technology acceptance model (TAM) with the literature on perceived security and trust of adopting mobile banking for financial services. The research has applied to the banking industry to develop and expand its banking market by developing reliable security measures and improving the perceived trust of customers to conduct banking transactions using mobile banking technology

    The Role of Information Technology Governance on Enhancing Cybersecurity and its Reflection on Investor Confidence

    Get PDF
    Purpose: The aim of this study is to investigate the relationship between information technology governance and cyber security, and how this relationship affects investor confidence.   Theoretical framework: The study drawing upon theories and concepts from information technology, risk management, and finance to provide a comprehensive understanding of the relationship between IT governance, cyber security, and investor confidence.   Design/methodology/approach: The statistical software Smart-PLS was utilized to perform an analysis and extract relevant findings from the data collected from the sample group, which comprised 153 individuals. The results obtained through this process were integral to the successful implementation of the research in practice.   Findings: The study found that investor confidence is impacted by cyber security, but neither investor confidence nor cyber security are significantly impacted by information technology governance.   Research, Practical & Social implications: The study highlights the crucial role of information technology governance dimensions in financial reports of businesses that operate in the IT industry, particularly telecommunications firms and private banks. By including such information in their financial statements, these organizations can effectively enhance investor confidence in their operations.   Originality/value: The study's originality and value lie in its critique of the inadequate transparency and lack of interest in information technology governance in the financial reports of banks, telecommunications companies, and other sectors listed on the financial market. The findings underscore the significance of including such information in financial statements to boost investor confidence in these organizations

    The Economic Ramifications of Strategic IT Security Information Sharing in the Financial Services Industry

    Get PDF
    We investigate the economic ramifications of strategic IT security information sharing among firms in the financial services industry. An IT security information sharing system can potentially minimize security breaches. However, although the Presidential Decision Directive/NSC-63 encouraged the establishment of such a system in the form of industry based information sharing and analysis centers (ISACs), it is injudicious to assume that firms will be willing to naively share their security information with their strategic competitors. We argue that without a proper mechanism some firms will try to put in minimum effort, potentially reducing the system’s reliability, and aim to answer the following research question: “What will it take for a financial services firm to willingly share its strategic information technology security information with its competitors through an ISAC?” We use the theory of mechanism design in economics to develop an adverse selection model to address the question

    Penerapan Teknologi Blockchain dalam Akuntansi Syariah

    Get PDF
    AbstractThis research aims to examine the application of blockchain technology, the benefits, advantages, challenges, and disadvantages of this technology. The method used is descriptive qualitative using literature study. The data in this study used secondary data obtained from various sources such as journals, books, reports and other documents. This research shows that the application of blockchain technology in the Islamic accounting industry provides benefits such as high data security and transparency of financial information for business people and potential investors.Keywords: Implementation, Blockchain Technology, Sharia Accountin

    Effect of Knowledge, Safety, Convenience and Reliance on Such Behavior Use of Financial Systems Technology (Fintech)

    Get PDF
    The impact of the rapid development of technology and the Internet has not only penetrated the trade industry, but Also on the Indonesian financial industry. This was marked by the presence of financial technology (fintech). Financial transactions through fintech include payments, investments, money lending, transfers, financial plans and comparison of financial products. Digital financial services or financial technology (fintech) are Carried out on a legal umbrella. This follows after the issuance of the Financial Services Authority Regulations (POJK) Number 77 / POJK.01 / 2016, concerning Information Technology Based Lending and Borrowing Services. This study aims to Determine the Effect of Knowledge, Security, Convenience and Trust in the Behavior of the Use of Financial Technology (Fintech) Systems, especially Based Loan Online Users. by using multiple linear regression. This research was conducted in Jakarta-Indonesia area using survey methods. This study Obtained 150 respondents who used the onlinebased loans such as Friends' Money, Smart Credit and others. Researchers used SPSS.20 software to test research data. The results of the analysis for this models show that the Knowledge, Security, Ease, and Trust of the Online Based Loan user community have a positive and significant effect on the System of the Financial Technology (Fintech) Keywords: Finacial Technology (Fintech) System, Online-Based Loan System, Knowledge, Security, Ease, Trus

    Effect of Knowledge, Safety, Convenience and Reliance on Such Behavior Use of Financial Systems Technology (Fintech)

    Get PDF
    The impact of the rapid development of technology and the Internet has not only penetrated the trade industry, but Also on the Indonesian financial industry. This was marked by the presence of financial technology (fintech). Financial transactions through fintech include payments, investments, money lending, transfers, financial plans and comparison of financial products. Digital financial services or financial technology (fintech) are Carried out on a legal umbrella. This follows after the issuance of the Financial Services Authority Regulations (POJK) Number 77 / POJK.01 / 2016, concerning Information Technology Based Lending and Borrowing Services. This study aims to Determine the Effect of Knowledge, Security, Convenience and Trust in the Behavior of the Use of Financial Technology (Fintech) Systems, especially Based Loan Online Users. by using multiple linear regression. This research was conducted in Jakarta-Indonesia area using survey methods. This study Obtained 150 respondents who used the onlinebased loans such as Friends' Money, Smart Credit and others. Researchers used SPSS.20 software to test research data. The results of the analysis for this models show that the Knowledge, Security, Ease, and Trust of the Online Based Loan user community have a positive and significant effect on the System of the Financial Technology (Fintech). Keywords: Finacial Technology (Fintech) System, Online-Based Loan System, Knowledge, Security, Ease, Trus

    What determines FinTech success? — A taxonomy-based analysis of FinTech success factors

    Get PDF
    Value creation in the financial services sector has been fundamentally transformed by digitally born financial technology (FinTech) companies. FinTech companies synthesize information systems with financial services. Given its disruptive power, the FinTech phenomenon has received great attention in academic research, practice, and media. Still, limited systematic research provides a structure and holistic view of FinTechs’ success. Aiming to enhance understanding of the factors enabling FinTech success, we classify success factors across extant scientific literature on distinct FinTech business model archetypes. Our analysis reveals that the “cost–benefit dynamic of the innovation,” “technology adoption,” “security, privacy, and transparency,” “user trust,” “user-perceived quality,” and “industry rivalry” are crucial factors for FinTech success and can be seen as “grand challenges” for the FinTech ecosystem. In addition, we validate and discuss our findings with real-world examples from the FinTech industry and two interviews with stakeholders from the FinTech ecosystem. Our study contributes to the knowledge of FinTechs by providing a classification system of success factors for practitioners and researchers

    Potential Risks of Cloud Computing in Financial Institutions in Tanzania: Perspectives from CRDB Bank Plc

    Get PDF
    The adoption of cloud computing introduces a range of potential risks that financial institutions must navigate with prudence. Cloud service providers are entrusted with valuable customer information, and any compromise could have severe consequences, including financial losses and reputational damage. The main objective of this research was to assess the potential risks of cloud computing in financial institutions in Tanzania. This is done in the context of CRDB bank. The research employed a mixed methods approach, incorporating both quantitative and qualitative data collection methods. The data was acquired through questionnaires, specifically targeting the employee population of CRB bank. The data underwent quantitative analysis. The research sampled population is 201 respondents from ICT, legal and procurement departments at the financial institution. Cloud computing poses hazards that financial organizations must carefully manage. Security of sensitive financial data comes first. Any compromise of cloud service providers' client data could result in financial losses and reputational damage. Data privacy risks occur as legislative contexts change. Cross-border cloud services can challenge data sovereignty and local legislation. Another crucial factor is operational continuity. Financial institutions depend on uninterrupted service, putting them exposed to cloud service provider outages and technical issues. Maintaining financial services and client satisfaction are crucial. The regulatory compliance challenge is unique. Cloud computing requires vigilance in local and international legal systems. To retain financial ecosystem confidence, financial institutions must ensure their cloud-based solutions meet industry standards and laws. The study stressed the importance of a holistic strategy to cloud computing in financial institutions like CRDB Bank PLC. Cloud technology has many benefits, but stakeholders must be cautious and implement risk management and mitigation strategies. The conclusions of this study can help CRDB Bank PLC and other Tanzanian financial institutions make educated cloud technology implementation decisions. These decisions must prioritize financial system security, privacy, and resilience. The results also highlight the need for financial industry-regulatory cooperation to keep the regulatory framework up to date with technology.&nbsp

    Similitary atau Originality Effect of Knowledge, Safety, Convenience and Reliance

    Get PDF
    The impact of the rapid development of technology and the Internet has not only penetrated the trade industry, but Also on the Indonesian financial industry. This was marked by the presence of financial technology (fintech). Financial transactions through fintech include payments, investments, money lending, transfers, financial plans and comparison of financial products. Digital financial services or financial technology (fintech) are Carried out on a legal umbrella. This follows after the issuance of the Financial Services Authority Regulations (POJK) Number 77 / POJK.01 / 2016, concerning Information Technology Based Lending and Borrowing Services. This study aims to Determine the Effect of Knowledge, Security, Convenience and Trust in the Behavior of the Use of Financial Technology (Fintech) Systems, especially Based Loan Online Users. by using multiple linear regression. This research was conducted in Jakarta-Indonesia area using survey methods. This study Obtained 150 respondents who used the online-based loans such as Friends' Money, Smart Credit and others. Researchers used SPSS.20 software to test research data. The results of the analysis for this models show that the Knowledge, Security, Ease, and Trust of the Online Based Loan user community have a positive and significant effect on the System of the Financial Technology (Fintech)

    Investigating The Security Policies Of Computerized Accounting Information Systems In The Banking Industry Of An Emerging Economy: The Case Of Egypt

    Get PDF
    Information has become one of the most valuable corporate assets, which should be protected with care and concern because business survival and success are heavily dependent upon the confidentiality, integrity and continued availability of critical information. The reliance on information and rapidly changing technology forces many organizations to implement comprehensive information security programs to protect their information systems. However, the success of implementing such security programs relies largely on employees’ awareness and compliance. The failure to secure information or to make it available when required to those who need it would lead to financial and non-financial losses. The objective of this paper is to explore the main characteristics of security policies of the computerised accounting information systems (CAIS) in the Egyptian Banking Industry (EBI), and to investigate the differences among bank types regarding the existence, implementation, clarity, comprehensiveness, publicity, awareness, management attitudes, and participation in designing, developing and evaluating their banks’ CAIS security policies. The research statistics revealed that the vast majority the surveyed banks has formal written, clear, comprehensive, reasonable and well-published CAIS security policies. Moreover, the majority of respondents believed that there was adequate awareness of CAIS security issues among their banks’ managers and employees and that managers had positive attitudes and paid great attention to security issues. Further, the majority of respondents also claimed that they participated in designing, developing and evaluating their banking CAIS security policies and controls
    • …
    corecore