Measuring User Perceived Security of Mobile Banking Applications
- URL: http://arxiv.org/abs/2201.03052v1
- Date: Sun, 9 Jan 2022 16:45:30 GMT
- Title: Measuring User Perceived Security of Mobile Banking Applications
- Authors: Richard Apaua and Harjinder Singh Lallie
- Abstract summary: This study was conducted to measure user-perceived security of M-Banking Apps.
Perceived security, institutional trust and technology trust were confirmed as factors that affect user's intention to adopt and use M-Banking Apps.
- Score: 0.8122270502556371
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Mobile banking applications have gained popularity and have significantly
revolutionised the banking industry. Despite the convenience offered by
M-Banking Apps, users are often distrustful of the security of the applications
due to an increasing trend of cyber security compromises, cyber-attacks, and
data breaches. Considering the upsurge in cyber security vulnerabilities of
M-Banking Apps and the paucity of research in this domain, this study was
conducted to empirically measure user-perceived security of M-Banking Apps. A
total of 315 responses from study participants were analysed using
covariance-based structural equation modelling (CB-SEM). The results indicated
that most constructs of the baseline Extended Unified Theory of Acceptance and
Use of Technology (UTAUT2) structure were validated. Perceived security,
institutional trust and technology trust were confirmed as factors that affect
user's intention to adopt and use M-Banking Apps. However, perceived risk was
not confirmed as a significant predictor. The current study further revealed
that in the context of M-Banking Apps, the effects of security and trust are
complex. The impact of perceived security and institutional trust on
behavioural intention was moderated by age, gender, experience, income, and
education, while perceived security on use behaviour was moderated by age,
gender, and experience. The effect of technology trust on behavioural intention
was moderated by age, education, and experience. Overall, the proposed
conceptual model achieved acceptable fit and explained 79% of the variance in
behavioural intention and 54.7% in use behaviour of M-Banking Apps, higher than
that obtained in the original UTAUT2. The guarantee of enhanced security,
advanced privacy mechanisms and trust should be considered paramount in future
strategies aimed at promoting M-Banking Apps adoption and use.
Related papers
- Advancing Embodied Agent Security: From Safety Benchmarks to Input Moderation [52.83870601473094]
Embodied agents exhibit immense potential across a multitude of domains.
Existing research predominantly concentrates on the security of general large language models.
This paper introduces a novel input moderation framework, meticulously designed to safeguard embodied agents.
arXiv Detail & Related papers (2025-04-22T08:34:35Z) - Towards Trustworthy GUI Agents: A Survey [64.6445117343499]
This survey examines the trustworthiness of GUI agents in five critical dimensions.
We identify major challenges such as vulnerability to adversarial attacks, cascading failure modes in sequential decision-making.
As GUI agents become more widespread, establishing robust safety standards and responsible development practices is essential.
arXiv Detail & Related papers (2025-03-30T13:26:00Z) - Assessing the influence of cybersecurity threats and risks on the adoption and growth of digital banking: a systematic literature review [0.0]
This study examines the influence of cybersecurity threats on digital banking security, adoption, and regulatory compliance.
It critically evaluates the most prevalent cyber threats targeting digital banking platforms, the effectiveness of modern security measures, and the role of regulatory frameworks in mitigating financial cybersecurity risks.
arXiv Detail & Related papers (2025-03-23T03:14:45Z) - 2FA: Navigating the Challenges and Solutions for Inclusive Access [55.2480439325792]
Two-Factor Authentication (2FA) has emerged as a critical solution to protect online activities.
This paper examines the intricacies of deploying 2FA in a way that is secure and accessible to all users.
An analysis was conducted to examine the implementation and availability of various 2FA methods across popular online platforms.
arXiv Detail & Related papers (2025-02-17T12:23:53Z) - Agent-SafetyBench: Evaluating the Safety of LLM Agents [72.92604341646691]
We introduce Agent-SafetyBench, a comprehensive benchmark to evaluate the safety of large language models (LLMs)
Agent-SafetyBench encompasses 349 interaction environments and 2,000 test cases, evaluating 8 categories of safety risks and covering 10 common failure modes frequently encountered in unsafe interactions.
Our evaluation of 16 popular LLM agents reveals a concerning result: none of the agents achieves a safety score above 60%.
arXiv Detail & Related papers (2024-12-19T02:35:15Z) - Factors Influencing the Usage of Mobile Banking Apps Among Malaysian Consumers [0.0]
This study will examine the influence of several factors which are security concerns, service quality, technological factors and convenience, on the usage of mobile banking apps.
The survey managed to collect data from 152 respondents who are above 18 years old and users of mobile banking apps in Malaysia.
A multinominal logistic regression model was used as a predictive model to predict the usage of mobile banking apps.
arXiv Detail & Related papers (2024-11-08T15:28:32Z) - Security Assessment of Mobile Banking Apps in West African Economic and Monetary Union [6.535157270216916]
Poorly implemented security measures during app development can expose users and financial institutions to substantial financial risks.
Our study evaluated fifty-nine WAEMU MBAs using static analysis techniques.
We identified security-related code issues that could be exploited by malicious actors.
arXiv Detail & Related papers (2024-11-06T17:43:31Z) - MobileSafetyBench: Evaluating Safety of Autonomous Agents in Mobile Device Control [20.796190000442053]
We introduce MobileSafetyBench, a benchmark designed to evaluate the safety of device-control agents.
We develop a diverse set of tasks involving interactions with various mobile applications, including messaging and banking applications.
Our experiments demonstrate that while baseline agents, based on state-of-the-art LLMs, perform well in executing helpful tasks, they show poor performance in safety tasks.
arXiv Detail & Related papers (2024-10-23T02:51:43Z) - SafetyAnalyst: Interpretable, transparent, and steerable safety moderation for AI behavior [56.10557932893919]
We present SafetyAnalyst, a novel AI safety moderation framework.
Given an AI behavior, SafetyAnalyst uses chain-of-thought reasoning to analyze its potential consequences.
It aggregates all harmful and beneficial effects into a harmfulness score using fully interpretable weight parameters.
arXiv Detail & Related papers (2024-10-22T03:38:37Z) - Dual-Technique Privacy & Security Analysis for E-Commerce Websites Through Automated and Manual Implementation [2.7039386580759666]
38.5% of the websites deployed over 50 cookies per session, many of which were categorized as unnecessary or unclear in function.
Our manual assessment uncovered critical gaps in standard security practices, including the absence of mandatory multi-factor authentication and breach notification protocols.
Based on these findings, we recommend targeted improvements to privacy policies, enhanced transparency in cookie usage, and the implementation of stronger authentication protocols.
arXiv Detail & Related papers (2024-10-19T03:25:48Z) - Criticality and Safety Margins for Reinforcement Learning [53.10194953873209]
We seek to define a criticality framework with both a quantifiable ground truth and a clear significance to users.
We introduce true criticality as the expected drop in reward when an agent deviates from its policy for n consecutive random actions.
We also introduce the concept of proxy criticality, a low-overhead metric that has a statistically monotonic relationship to true criticality.
arXiv Detail & Related papers (2024-09-26T21:00:45Z) - Practical and Robust Safety Guarantees for Advanced Counterfactual Learning to Rank [64.44255178199846]
We generalize the existing safe CLTR approach to make it applicable to state-of-the-art doubly robust CLTR.
We also propose a novel approach, proximal ranking policy optimization (PRPO), that provides safety in deployment without assumptions about user behavior.
PRPO is the first method with unconditional safety in deployment that translates to robust safety for real-world applications.
arXiv Detail & Related papers (2024-07-29T12:23:59Z) - InferAct: Inferring Safe Actions for LLM-Based Agents Through Preemptive Evaluation and Human Feedback [70.54226917774933]
This paper introduces InferAct, a novel approach to proactively detect potential errors before risky actions are executed.
InferAct acts as a human proxy, detecting unsafe actions and alerting users for intervention.
Experiments on three widely-used tasks demonstrate the effectiveness of InferAct.
arXiv Detail & Related papers (2024-07-16T15:24:44Z) - Towards Perceived Security, Perceived Privacy, and the Universal Design of E-Payment Applications [1.768591162113183]
We create a high-fidelity prototype of an e-payment application that encompassed features that we wanted to test with users.
We find that both security and privacy are important for users of e-payment applications.
Some participants perceive the strength of security and privacy based on the usability of the application.
arXiv Detail & Related papers (2024-07-07T17:15:09Z) - Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective [53.24281798458074]
Face Recognition Systems (FRS) have increasingly integrated into critical applications, including surveillance and user authentication.
Recent studies have revealed vulnerabilities in FRS to adversarial (e.g., adversarial patch attacks) and backdoor attacks (e.g., training data poisoning)
arXiv Detail & Related papers (2024-05-21T13:34:23Z) - Safety Margins for Reinforcement Learning [53.10194953873209]
We show how to leverage proxy criticality metrics to generate safety margins.
We evaluate our approach on learned policies from APE-X and A3C within an Atari environment.
arXiv Detail & Related papers (2023-07-25T16:49:54Z) - Do Software Security Practices Yield Fewer Vulnerabilities? [6.6840472845873276]
The goal of this study is to assist practitioners and researchers making informed decisions on which security practices to adopt.
Four security practices were the most important practices influencing vulnerability count.
The number of reported vulnerabilities increased rather than reduced as the aggregate security score of the packages increased.
arXiv Detail & Related papers (2022-10-20T20:04:02Z) - Super-App Behavioral Patterns in Credit Risk Models: Financial,
Statistical and Regulatory Implications [110.54266632357673]
We present the impact of alternative data that originates from an app-based marketplace, in contrast to traditional bureau data, upon credit scoring models.
Our results, validated across two countries, show that these new sources of data are particularly useful for predicting financial behavior in low-wealth and young individuals.
arXiv Detail & Related papers (2020-05-09T01:32:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.