Measuring User Perceived Security of Mobile Banking Applications
- URL: http://arxiv.org/abs/2201.03052v1
- Date: Sun, 9 Jan 2022 16:45:30 GMT
- Title: Measuring User Perceived Security of Mobile Banking Applications
- Authors: Richard Apaua and Harjinder Singh Lallie
- Abstract summary: This study was conducted to measure user-perceived security of M-Banking Apps.
Perceived security, institutional trust and technology trust were confirmed as factors that affect user's intention to adopt and use M-Banking Apps.
- Score: 0.8122270502556371
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Mobile banking applications have gained popularity and have significantly
revolutionised the banking industry. Despite the convenience offered by
M-Banking Apps, users are often distrustful of the security of the applications
due to an increasing trend of cyber security compromises, cyber-attacks, and
data breaches. Considering the upsurge in cyber security vulnerabilities of
M-Banking Apps and the paucity of research in this domain, this study was
conducted to empirically measure user-perceived security of M-Banking Apps. A
total of 315 responses from study participants were analysed using
covariance-based structural equation modelling (CB-SEM). The results indicated
that most constructs of the baseline Extended Unified Theory of Acceptance and
Use of Technology (UTAUT2) structure were validated. Perceived security,
institutional trust and technology trust were confirmed as factors that affect
user's intention to adopt and use M-Banking Apps. However, perceived risk was
not confirmed as a significant predictor. The current study further revealed
that in the context of M-Banking Apps, the effects of security and trust are
complex. The impact of perceived security and institutional trust on
behavioural intention was moderated by age, gender, experience, income, and
education, while perceived security on use behaviour was moderated by age,
gender, and experience. The effect of technology trust on behavioural intention
was moderated by age, education, and experience. Overall, the proposed
conceptual model achieved acceptable fit and explained 79% of the variance in
behavioural intention and 54.7% in use behaviour of M-Banking Apps, higher than
that obtained in the original UTAUT2. The guarantee of enhanced security,
advanced privacy mechanisms and trust should be considered paramount in future
strategies aimed at promoting M-Banking Apps adoption and use.
Related papers
- Towards Perceived Security, Perceived Privacy, and the Universal Design of E-Payment Applications [1.768591162113183]
We create a high-fidelity prototype of an e-payment application that encompassed features that we wanted to test with users.
We find that both security and privacy are important for users of e-payment applications.
Some participants perceive the strength of security and privacy based on the usability of the application.
arXiv Detail & Related papers (2024-07-07T17:15:09Z) - Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective [53.24281798458074]
Face Recognition Systems (FRS) have increasingly integrated into critical applications, including surveillance and user authentication.
Recent studies have revealed vulnerabilities in FRS to adversarial (e.g., adversarial patch attacks) and backdoor attacks (e.g., training data poisoning)
arXiv Detail & Related papers (2024-05-21T13:34:23Z) - Blockchain-based Zero Trust on the Edge [5.323279718522213]
This paper proposes a novel approach based on Zero Trust Architecture (ZTA) extended with blockchain to further enhance security.
The blockchain component serves as an immutable database for storing users' requests and is used to verify trustworthiness by analyzing and identifying potentially malicious user activities.
We discuss the framework, processes of the approach, and the experiments carried out on a testbed to validate its feasibility and applicability in the smart city context.
arXiv Detail & Related papers (2023-11-28T12:43:21Z) - Safety Margins for Reinforcement Learning [74.13100479426424]
We show how to leverage proxy criticality metrics to generate safety margins.
We evaluate our approach on learned policies from APE-X and A3C within an Atari environment.
arXiv Detail & Related papers (2023-07-25T16:49:54Z) - Foveate, Attribute, and Rationalize: Towards Physically Safe and
Trustworthy AI [76.28956947107372]
Covertly unsafe text is an area of particular interest, as such text may arise from everyday scenarios and are challenging to detect as harmful.
We propose FARM, a novel framework leveraging external knowledge for trustworthy rationale generation in the context of safety.
Our experiments show that FARM obtains state-of-the-art results on the SafeText dataset, showing absolute improvement in safety classification accuracy by 5.9%.
arXiv Detail & Related papers (2022-12-19T17:51:47Z) - An Empirical Study on Secure Usage of Mobile Health Apps: The Attack
Simulation Approach [0.0]
This study investigates the security awareness of mHealth app users via action-based research.
We simulated some common security attack scenarios in mHealth context and engaged a total of 105 app users to monitor their actions and analyse their behavior.
Our results indicate that whilst the minority of our participants perceived access permissions positively, the majority had negative views by indicating that such an app could violate or cost them to lose privacy.
arXiv Detail & Related papers (2022-11-14T18:10:34Z) - Do Software Security Practices Yield Fewer Vulnerabilities? [6.6840472845873276]
The goal of this study is to assist practitioners and researchers making informed decisions on which security practices to adopt.
Four security practices were the most important practices influencing vulnerability count.
The number of reported vulnerabilities increased rather than reduced as the aggregate security score of the packages increased.
arXiv Detail & Related papers (2022-10-20T20:04:02Z) - Evaluating the Safety of Deep Reinforcement Learning Models using
Semi-Formal Verification [81.32981236437395]
We present a semi-formal verification approach for decision-making tasks based on interval analysis.
Our method obtains comparable results over standard benchmarks with respect to formal verifiers.
Our approach allows to efficiently evaluate safety properties for decision-making models in practical applications.
arXiv Detail & Related papers (2020-10-19T11:18:06Z) - PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework
Based on Adversarial Learning [111.19576084222345]
This paper proposes a framework of Privacy-preserving Credit risk modeling based on Adversarial Learning (PCAL)
PCAL aims to mask the private information inside the original dataset, while maintaining the important utility information for the target prediction task performance.
Results indicate that PCAL can learn an effective, privacy-free representation from user data, providing a solid foundation towards privacy-preserving machine learning for credit risk analysis.
arXiv Detail & Related papers (2020-10-06T07:04:59Z) - SMEs' Confidentiality Concerns for Security Information Sharing [1.3452510519858993]
Small and medium-sized enterprises are considered an essential part of the EU economy, however, highly vulnerable to cyberattacks.
This paper presents the results of semi-structured interviews with seven chief information security officers of SMEs to evaluate the impact of online consent communication on motivation for information sharing.
The findings demonstrate that online consent with multiple options for indicating a suitable level of agreement improved motivation for information sharing.
arXiv Detail & Related papers (2020-07-13T10:59:40Z) - Super-App Behavioral Patterns in Credit Risk Models: Financial,
Statistical and Regulatory Implications [110.54266632357673]
We present the impact of alternative data that originates from an app-based marketplace, in contrast to traditional bureau data, upon credit scoring models.
Our results, validated across two countries, show that these new sources of data are particularly useful for predicting financial behavior in low-wealth and young individuals.
arXiv Detail & Related papers (2020-05-09T01:32:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.