{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:27:53Z","timestamp":1774452473153,"version":"3.50.1"},"reference-count":132,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T00:00:00Z","timestamp":1593388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2020,6,29]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The inception of mobile financial services (MFSs) has positively provoked economic growth and productivity, nonetheless, it has pessimistically caused an upward surge in cybersecurity threat. Customers are progressively becoming conscious of some of the threat and several of them now shun away from some suspicious activities over the internet as a form of protection. This study aims to explore the factors that influence users\u2019 to adopt security behaviour.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>A synthesis of theories \u2013 Self-efficacy and technology threat avoidance theories \u2013 was used to examine the security behaviour of users of MFSs. Data was gathered from 530 students in Ghana using convenience sampling technique. Data analysis was carried out using descriptive statistics, inferential statistics and structural equation model.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Outcome of the investigation indicate that both mastery experience and verbal persuasion have substantial effect on the avoidance motivation of MFSs users. It was, however, found that emotional state and vicarious experience of users do not influence their avoidance motivation. Also, it was established that avoidance motivation is a positive prognosticator of avoidance behaviour.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>Understanding the security behaviour of MFS users will help the operators to outline strategies to sustain the successes achieved.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Studies on user security behaviour are rare, especially in sub Saharan Africa, thus, this study will contribute to extant literature by adding a new dimension of user security behaviour.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-02-2020-0021","type":"journal-article","created":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T07:39:11Z","timestamp":1593243551000},"page":"719-741","source":"Crossref","is-referenced-by-count":14,"title":["Security behaviour of mobile financial service users"],"prefix":"10.1108","volume":"28","author":[{"given":"Esther","family":"Dzidzah","sequence":"first","affiliation":[]},{"given":"Kwame","family":"Owusu Kwateng","sequence":"additional","affiliation":[]},{"given":"Benjamin Kofi","family":"Asante","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020110313135047200_ref001","volume-title":"Motivation for Achievement: Possibilities for Teaching and Learning","year":"1999"},{"key":"key2020110313135047200_ref002","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","article-title":"Security awareness of computer users: a phishing threat avoidance perspective","volume":"38","year":"2014","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2020110313135047200_ref003","article-title":"User acceptance of banking technology with special reference to internet banking","volume":"73","year":"2015","journal-title":"Journal of Theoretical and Applied Information Technology"},{"issue":"4","key":"key2020110313135047200_ref004","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1109\/MSP.2014.70","article-title":"Improving app privacy: nudging app developers to protect user privacy","volume":"12","year":"2014","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"key2020110313135047200_ref005","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1037\/0033-295X.84.2.191","article-title":"Self-efficacy: toward a unifying theory of behavioral change","volume":"84","year":"1977","journal-title":"Psychological Review"},{"key":"key2020110313135047200_ref006","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","year":"1986"},{"key":"key2020110313135047200_ref007","volume-title":"Self-Efficacy in Changing Societies","year":"1995"},{"key":"key2020110313135047200_ref008","volume-title":"Self-Efficacy: The Exercise of Control","year":"1997"},{"key":"key2020110313135047200_ref009","first-page":"71","article-title":"Self-efficacy","volume-title":"Encyclopedia of Human Behavior","year":"1994"},{"key":"key2020110313135047200_ref010","volume-title":"How Safe is Your Quantified Self","year":"2014"},{"key":"key2020110313135047200_ref011","unstructured":"Boysen, S.D. (2018), \u201cAnalyzing threat perceptions in the context of fitness data: refining the threat calculus in technology threat avoidance theory\u201d, Master\u2019s thesis, available at: https:\/\/digital.library.txstate.edu\/handle\/10877\/7289"},{"issue":"1","key":"key2020110313135047200_ref012","first-page":"5","article-title":"Refining the threat calculus of technology threat avoidance theory","volume":"45","year":"2019","journal-title":"Communications of the Association for Information Systems"},{"key":"key2020110313135047200_ref013","first-page":"32","article-title":"Linking threat avoidance and security adoption: a theoretical model for SMEs","volume-title":"28th Bled eConference","year":"2015"},{"issue":"2","key":"key2020110313135047200_ref014","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1002\/asi.20459","article-title":"Development of measures of online privacy concern and protection for use on the internet","volume":"58","year":"2007","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"key2020110313135047200_ref015","article-title":"Predicting IT job satisfaction: occupational congruence and the job characteristics model","volume-title":"23rd Americas Conference on Information Systems (AMCIS)","year":"2017"},{"key":"key2020110313135047200_ref016","first-page":"18","article-title":"Global mobile data traffic forecast update, 2016\u20132021","year":"2017"},{"issue":"4","key":"key2020110313135047200_ref017","article-title":"Mobile payments at the retail point of sale in the United States: prospects for adoption","volume":"9","year":"2010","journal-title":"Review of Network Economics"},{"key":"key2020110313135047200_ref018","unstructured":"Cuomo, A. and Lawsky, B. (2014), New York state department of financial services: report on cyber security in the banking sector, New York State Dep. Financ. Serv, p. 13."},{"key":"key2020110313135047200_ref019","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.cose.2014.11.002","article-title":"Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: a protection motivation theory approach","volume":"48","year":"2015","journal-title":"Computers and Security"},{"issue":"7","key":"key2020110313135047200_ref020","first-page":"23","article-title":"The centrality of awareness in the formation of user behavioral intention toward protective information technologies","volume":"8","year":"2007","journal-title":"Journal of the Association for Information Systems"},{"issue":"6","key":"key2020110313135047200_ref021","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1016\/j.cose.2009.02.001","article-title":"A survey of signature based methods for financial fraud detection","volume":"28","year":"2009","journal-title":"Computers and Security"},{"key":"key2020110313135047200_ref022","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1109\/ICTKE.2012.6408565","article-title":"A proposal to improve the security of mobile banking applications","volume-title":"2012 Tenth International Conference on ICT and Knowledge Engineering","year":"2012"},{"key":"key2020110313135047200_ref023","unstructured":"European Commission Brussels (2016), \u201cCOM (2016) 364 final\u201d, available at: https:\/\/ec.europa.eu\/transparency\/regdoc\/rep\/1\/2016\/EN\/1-2016-364-EN-F1-1.PDF"},{"issue":"2","key":"key2020110313135047200_ref024","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1108\/IntR-07-2012-0144","article-title":"Antecedents for user intention to adopt another auction site","volume":"24","year":"2014","journal-title":"Internet Research"},{"issue":"2","key":"key2020110313135047200_ref025","first-page":"8","article-title":"E-banking security issues \u2013 is there a solution in biometrics","volume":"16","year":"2011","journal-title":"Journal of Internet Banking and Commerce"},{"issue":"8","key":"key2020110313135047200_ref026","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1016\/j.cose.2012.08.004","article-title":"Power to the people? The evolving recognition of human aspects of security","volume":"31","year":"2012","journal-title":"Computers and Security"},{"issue":"4","key":"key2020110313135047200_ref027","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/S1361-3723(08)70064-2","article-title":"End-user security culture: a lesson that will never be learnt?","volume":"2008","year":"2008","journal-title":"Computer Fraud and Security"},{"issue":"5","key":"key2020110313135047200_ref028","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1016\/j.cose.2007.03.001","article-title":"Assessing the security perceptions of personal internet users","volume":"26","year":"2007","journal-title":"Computers and Security"},{"key":"key2020110313135047200_ref029","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1109\/MINES.2012.240","article-title":"Towards cloud computing: a literature review on cloud computing and its development trends","volume-title":"2012 Fourth International Conference on Multimedia Information Networking and Security","year":"2012"},{"issue":"4","key":"key2020110313135047200_ref030","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1177\/0266666915571428","article-title":"Privacy concerns and benefits in SaaS adoption by individual users: a trade-off approach","volume":"32","year":"2016","journal-title":"Information Development"},{"key":"key2020110313135047200_ref031","volume-title":"Managing the Risk of Fraud in Mobile Money","year":"2012"},{"key":"key2020110313135047200_ref032","unstructured":"GSMA (2012), \u201cMobile money for the unbanked\u201d, available at: www.gsma.com\/mobilefordevepment\/wpcontent\/uploads\/2012\/10"},{"key":"key2020110313135047200_ref033","first-page":"207","volume-title":"Multivariate Data Analysis","year":"1998"},{"key":"key2020110313135047200_ref034","volume-title":"Multivariate Data Analysis","year":"2006"},{"key":"key2020110313135047200_ref035","volume-title":"An\u00e1lise Multivariada de Dados","year":"2009"},{"issue":"2","key":"key2020110313135047200_ref036","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1108\/EBR-10-2013-0128","article-title":"Partial least squares structural equation modeling (PLS-SEM): an emerging tool in business research","volume":"26","year":"2014","journal-title":"European Business Review"},{"issue":"1","key":"key2020110313135047200_ref037","first-page":"53","article-title":"Structural equation modelling: guidelines for determining model fit","volume":"6","year":"2008","journal-title":"Electronic Journal of Business Research Methods"},{"issue":"2","key":"key2020110313135047200_ref038","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.ijhcs.2006.09.003","article-title":"Knowledge sharing behavior in virtual communities: the relationship between trust, self-efficacy, and outcome expectations","volume":"65","year":"2007","journal-title":"International Journal of Human-Computer Studies"},{"key":"key2020110313135047200_ref039","unstructured":"Hu, G., Venugopal, D. and Bhardwaj, S. (2011), Wireless intrusion prevention system and method, U.S. Patent 8,087,085."},{"key":"key2020110313135047200_ref040","first-page":"401","article-title":"Self-efficacy and individual knowledge sharing","volume-title":"2010 International conference on information management, innovation management and industrial engineering (ICIII)","year":"2010"},{"key":"key2020110313135047200_ref041","volume-title":"Developing and Evaluating a Cloud Service Relationship Theory","year":"2014"},{"issue":"6","key":"key2020110313135047200_ref042","first-page":"107","article-title":"Systematic literature review: security challenges of mobile banking and payments system","volume":"7","year":"2014","journal-title":"International Journal of u- and e-Service, Science and Technology"},{"key":"key2020110313135047200_ref043","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/STAST.2015.12","article-title":"How people help fraudsters steal their money: an analysis of 600 online banking fraud cases","volume-title":"2015 Workshop on Socio-Technical Aspects in Security and Trust","year":"2015"},{"key":"key2020110313135047200_ref044","first-page":"3","article-title":"Online banking security flaws: a study","volume":"8","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"issue":"3","key":"key2020110313135047200_ref045","first-page":"10","article-title":"Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography","volume":"7","year":"2010","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"issue":"20","key":"key2020110313135047200_ref046","article-title":"Factors affecting Jordanian consumers\u2019 adoption of mobile banking services","volume":"2","year":"2011","journal-title":"International Journal of Business and Social Science"},{"key":"key2020110313135047200_ref047","volume-title":"Principles and Practice of Structural Equation Modeling","year":"2011","edition":"3rd ed"},{"issue":"8","key":"key2020110313135047200_ref048","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.cose.2010.08.001","article-title":"Cyber security for home users: a new way of protection through awareness enforcement","volume":"29","year":"2010","journal-title":"Computers and Security"},{"issue":"4","key":"key2020110313135047200_ref049","first-page":"2","article-title":"An investigation of features and security in mobile banking strategy","volume":"22","year":"2013","journal-title":"Journal of International Technology and Information Management"},{"issue":"5\/6","key":"key2020110313135047200_ref050","first-page":"385","article-title":"Understanding factors affecting trust in and satisfaction with mobile banking in Korea: a modified DeLone and McLean\u2019s model perspective","volume":"21","year":"2009","journal-title":"Interacting with Computers"},{"issue":"1","key":"key2020110313135047200_ref051","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.jbusres.2014.05.003","article-title":"Nostalgia as travel motivation and its impact on tourists\u2019 loyalty","volume":"68","year":"2015","journal-title":"Journal of Business Research"},{"key":"key2020110313135047200_ref052","first-page":"71","article-title":"Avoidance of information technology threats: a theoretical perspective","year":"2009","journal-title":"MIS Quarterly"},{"issue":"7","key":"key2020110313135047200_ref053","doi-asserted-by":"crossref","first-page":"394","DOI":"10.17705\/1jais.00232","article-title":"Understanding security behaviors in personal computer usage: a threat avoidance perspective","volume":"11","year":"2010","journal-title":"Journal of the Association for Information Systems"},{"issue":"1","key":"key2020110313135047200_ref054","first-page":"1","article-title":"Self-efficacy in the workplace: implications for motivation and performance","volume":"14","year":"2011","journal-title":"International Journal of Management, Business, and Administration"},{"issue":"6","key":"key2020110313135047200_ref055","first-page":"472","article-title":"SMS based secure mobile banking","volume":"3","year":"2011","journal-title":"International Journal of Engineering and Technology"},{"key":"key2020110313135047200_ref056","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5171\/2012.281953","article-title":"Trust in mobile banking adoption in Malaysia: a conceptual framework","volume":"2012","year":"2012","journal-title":"Journal of Mobile Technologies, Knowledge and Society"},{"key":"key2020110313135047200_ref057","first-page":"69","article-title":"Information system risk assessment and documentation","volume-title":"Information Security: Policy, Processes, and Practices","year":"2008"},{"issue":"7","key":"key2020110313135047200_ref058","doi-asserted-by":"crossref","first-page":"9","DOI":"10.5120\/19198-0826","article-title":"Improving mobile money security with two-factor authentication","volume":"109","year":"2015","journal-title":"International Journal of Computer Applications"},{"issue":"4","key":"key2020110313135047200_ref059","doi-asserted-by":"crossref","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","article-title":"Studying users\u2019 computer security behavior: a health belief perspective","volume":"46","year":"2009","journal-title":"Decision Support Systems"},{"key":"key2020110313135047200_ref060","article-title":"Factors influencing the short message service (SMS) mobile banking adoption: a users perspective in the West Nile region in Uganda","year":"2014","journal-title":"European Journal of Business and Management"},{"key":"key2020110313135047200_ref061","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","article-title":"Analysis of personal information security behavior and awareness","volume":"56","year":"2016","journal-title":"Computers and Security"},{"key":"key2020110313135047200_ref062","unstructured":"Pew Research Center (2017), \u201cThe future of truth and misinformation online\u201d, available at: www.elon.edu\/docs\/eweb\/imagining\/surveys\/2017_survey\/Future_of_Info_Environment_Elon_University_Pew_10-18-17.pdf"},{"issue":"5","key":"key2020110313135047200_ref063","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/52.605928","article-title":"Security and privacy: promising advances","volume":"14","year":"1997","journal-title":"IEEE Software"},{"key":"key2020110313135047200_ref064","first-page":"404","article-title":"Information system security: self-efficacy and implementation effectiveness","volume-title":"AMCIS 2006 Proceedings","year":"2006"},{"issue":"4","key":"key2020110313135047200_ref065","article-title":"Analysis of customer satisfaction with reference to ATM services in Vellore district","volume":"9","year":"2012","journal-title":"International Journal of Engineering and Management Research"},{"issue":"5","key":"key2020110313135047200_ref066","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1016\/j.jcss.2012.11.002","article-title":"Security-aware optimization for ubiquitous computing systems with SEAT graph approach","volume":"79","year":"2013","journal-title":"Journal of Computer and System Sciences"},{"key":"key2020110313135047200_ref067","article-title":"A resource guide for bank executives: executive leadership of cybersecurity","volume-title":"proceedings of the Conference of State Bank Supervisors","year":"2014"},{"key":"key2020110313135047200_ref068","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","article-title":"Information security conscious care behaviour formation in organizations","volume":"53","year":"2015","journal-title":"Computers and Security"},{"key":"key2020110313135047200_ref069","first-page":"230","article-title":"Self-efficacy models","year":"1984","journal-title":"Behavioral Health: A Handbook of Health Enhancement and Disease Prevention"},{"key":"key2020110313135047200_ref070","first-page":"302","article-title":"A detail comparative study on e-banking VS traditional banking","volume":"2","year":"2016","journal-title":"International Journal of Advanced Research"},{"key":"key2020110313135047200_ref071","first-page":"3","article-title":"Self-efficacy: measurement and intervention in nursing","volume-title":"Self-Efficacy in Nursing: Research and Measurement Perspectives","year":"2002"},{"issue":"3","key":"key2020110313135047200_ref072","first-page":"67","article-title":"M-banking in metropolitan bangkok and a comparison with other countries","volume":"51","year":"2011","journal-title":"Journal of Computer Information Systems"},{"key":"key2020110313135047200_ref07a","volume-title":"Positive Psychology: The Scientific and Practical Explorations of Human Strengths","year":"2007"},{"key":"key2020110313135047200_ref073","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1016\/j.cose.2017.07.003","article-title":"Security begins at home\u2019\u201d: determinants of home computer and mobile device security behavior","volume":"70","year":"2017","journal-title":"Computers and Security"},{"key":"key2020110313135047200_ref074","article-title":"Provisional laws of acquired behavior or learning","volume-title":"Animal Intelligence","year":"1911"},{"key":"key2020110313135047200_ref075","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1007\/978-1-349-02473-5_9","article-title":"Quantifying unmeasured variables","volume-title":"Measurement in the Social Sciences","year":"1974"},{"issue":"1","key":"key2020110313135047200_ref076","doi-asserted-by":"crossref","first-page":"1","DOI":"10.25300\/MISQ\/2013\/37.1.01","article-title":"Beyond deterrence: an expanded view of employee computer abuse","volume":"37","year":"2013","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2020110313135047200_ref077","doi-asserted-by":"publisher","first-page":"117","DOI":"10.14257\/ijunesst.2015.8.1.11","article-title":"Examining mobile payment user adoption from the perspective of trust","volume":"8","year":"2015","journal-title":"International Journal of u- and e-Service, Science and Technology"},{"issue":"8","key":"key2020110313135047200_ref078","first-page":"1","article-title":"Malware avoidance motivations and behaviors: a technology threat avoidance replication","volume":"2","year":"2016","journal-title":"AIS Transactions on Replication Research"},{"issue":"3","key":"key2020110313135047200_ref079","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1108\/10662241111139282","article-title":"Construction and validation of an e-lifestyle instrument","volume":"21","year":"2011","journal-title":"Internet Research"},{"issue":"6","key":"key2020110313135047200_ref080","first-page":"50","article-title":"Mobile phone banking in Nigeria: benefits, problems and prospects","volume":"3","year":"2014","journal-title":"International Journal of Business and Commerce"},{"key":"key2020110313135047200_ref081","first-page":"1","article-title":"October. Assessing convergent and discriminant validity in the ADHD-R IV rating scale: user-written commands for average variance extracted (AVE), composite reliability (CR), and Heterotrait-Monotrait ratio of correlations (HTMT)","volume-title":"Spanish STATA Meeting","year":"2015"},{"key":"key2020110313135047200_ref082","unstructured":"Alliance for Financial Inclusion (2013), \u201cGuideline note \u2013 mobile financial services: basic terminology\u201d, available at: www.afiglobal.org\/sites\/default\/files\/publications\/mfswg_gl_1_basic_terminology_finalnewnew_pdf.pdf"},{"issue":"6","key":"key2020110313135047200_ref083","first-page":"64","article-title":"An investigative study on factors influencing the customer satisfaction with e-banking in Nigeria","volume":"2","year":"2013","journal-title":"International Journal of Academic Research in Economics and Management Sciences"},{"issue":"4","key":"key2020110313135047200_ref084","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","article-title":"Privacy in e-commerce: stated preferences vs actual behavior","volume":"48","year":"2005","journal-title":"Communications of the Acm"},{"issue":"6","key":"key2020110313135047200_ref085","doi-asserted-by":"crossref","first-page":"1199","DOI":"10.1111\/jpim.12054","article-title":"Implementing technologies for financial service innovations in base of the pyramid markets","volume":"30","year":"2013","journal-title":"Journal of Product Innovation Management"},{"issue":"3","key":"key2020110313135047200_ref086","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1214\/ss\/1042727940","article-title":"Statistical fraud detection: a review","volume":"17","year":"2002","journal-title":"Statistical Science"},{"key":"key2020110313135047200_ref087","unstructured":"CGAP (2015), \u201cNew data from CGAP sets benchmark for use of mobile financial services\u201d, available at: www.cgap.org\/news\/newdatacgap-sets-benchmark-use-mobile-financial-services (accessed 25 September 2016)."},{"issue":"3","key":"key2020110313135047200_ref088","first-page":"51","article-title":"Non-performing loan resolutions in China and Taiwan: a policy evaluation","volume":"7","year":"2002","journal-title":"International Journal of Business"},{"key":"key2020110313135047200_ref089","article-title":"Security of mobile banking: secure SMS banking","volume-title":"Data Network Architectures Group","year":"2006"},{"key":"key2020110313135047200_ref090","unstructured":"Cobert, B. Helms, B. and Parker, D. (2011), \u201cMobile money: getting to scale in emerging markets\u201d, available at: http:\/\/mckinseyonsociety.com\/downloads\/reports\/EconomicDevelopment\/Mobile-money-Getting%20to-scale-in-emerging-markets.pdf"},{"key":"key2020110313135047200_ref091","article-title":"Strategies to make mobile banking popular in India","year":"2012","journal-title":"Advances in Management"},{"key":"key2020110313135047200_ref092","volume-title":"Making Sense of Mobile Money in Urban Ghana: Personal, Business, Social and Financial Inclusion Prospects","year":"2014"},{"key":"key2020110313135047200_ref093","volume-title":"Electronic Security: risk Mitigation in Financial Transactions \u2013 Public Policy Issues","year":"2002"},{"key":"key2020110313135047200_ref094","volume-title":"Smart-Phone Attacks and Defenses","year":"2004"},{"key":"key2020110313135047200_ref095","first-page":"43","article-title":"Domestication and mobile telephony","year":"2003","journal-title":"Domesticat"},{"issue":"1","key":"key2020110313135047200_ref096","doi-asserted-by":"crossref","first-page":"30","DOI":"10.3362\/1755-1986.2011.005","article-title":"Fertile grounds for mobile money: towards a framework for analyzing enabling environments","volume":"22","year":"2011","journal-title":"Enterprise Development and Microfinance"},{"key":"key2020110313135047200_ref097","volume-title":"E-Security Risk Mitigation: A Supervisor\u2019s Perspective","year":"2003"},{"issue":"13","key":"key2020110313135047200_ref098","article-title":"Effects of strategic decision making on firms performance: a case study of Safaricom limited, Nairobi, Kenya","volume":"4","year":"2013","journal-title":"International Journal of Business and Social Science"},{"key":"key2020110313135047200_ref099","article-title":"governance policy and political economy","year":"2016"},{"issue":"9","key":"key2020110313135047200_ref0100","first-page":"1","article-title":"Potentials of mobile banking on provision of financial services in rural areas: experience from","volume":"3","year":"2013","journal-title":"Tanzania. International Journal of Marketing and Technology"},{"issue":"2","key":"key2020110313135047200_ref0101","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/j.csi.2012.07.003","article-title":"Determining the relative importance of mobile banking quality factors","volume":"35","year":"2013","journal-title":"Computer Standards and Interfaces"},{"key":"key2020110313135047200_ref0102","unstructured":"Manzano, D.L. (2012), \u201cThe cybercitizen dimension: a quantitative study using a threat avoidance perspective\u201d, Doctoral dissertation, Capella University."},{"issue":"5","key":"key2020110313135047200_ref0103","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1080\/00220388.2011.621944","article-title":"Mobile money: communication, consumption and change in the payments space","volume":"48","year":"2012","journal-title":"Journal of Development Studies"},{"key":"key2020110313135047200_ref0104","first-page":"4832","article-title":"Sweet idleness, but why? How cognitive factors and personality traits affect privacy-protective behavior","volume-title":"2016 49th HI International Conference on System Sciences (HICSS)","year":"2016"},{"key":"key2020110313135047200_ref0105","article-title":"Sweet idleness, but why? How cognitive factors and personality traits affect privacy-protective behavior","volume-title":"Paper presented at the 49th HI International Conference on System Sciences","year":"2016"},{"issue":"4","key":"key2020110313135047200_ref0106","first-page":"212","article-title":"Technological adoption in Africa-a case study on the adoption of mobile banking in Botswana compared to Kenya experience","volume":"4","year":"2012","journal-title":"Journal of Management Research"},{"key":"key2020110313135047200_ref0107","unstructured":"NCA (2015), \u201cVoice statistics\u201d, available at: www.nca.org.gh\/industry-data-2\/market-share-statistics-2\/voice-2\/ (accessed 3 November 2015)."},{"key":"key2020110313135047200_ref0108","unstructured":"McKinsey and Company (2010), \u201cGlobal financial inclusion fall 2010: achieving full financial inclusion at the intersection of social benefit and economic sustainability\u201d, p. 6, available at: http:\/\/mckinseyonsociety.com\/downloads\/reports\/EconomicDevelopment\/GFI_v13_complete.pdf (accessed 20 February 2017)."},{"issue":"2","key":"key2020110313135047200_ref0109","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1509\/jmkg.69.2.61.60759","article-title":"Choosing among alternative service delivery modes: an investigation of customer trial of self-service technologies","volume":"69","year":"2005","journal-title":"Journal of Marketing"},{"issue":"2","key":"key2020110313135047200_ref0110","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1108\/17468800910945756","article-title":"Migrants\u2019 remittances and mobile transfer in emerging markets","volume":"4","year":"2009","journal-title":"International Journal of Emerging Markets"},{"key":"key2020110313135047200_ref0111","article-title":"Securing mobile money services in Tanzania: a case of Vodacom M-Pesa","volume":"2","year":"2014","journal-title":"International Journal of Computer Science and Network Solutions"},{"key":"key2020110313135047200_ref0112","article-title":"About mobile money","author":"MTN Ghana","year":"2016"},{"key":"key2020110313135047200_ref0113","unstructured":"MTN (2015), Quarterly reports, available at: www.mtn.com\/Investors\/FinancialReporting\/Documents\/QUARTELYREPORTS\/2015\/PDF\/Quarterly_update_for_the_period_ended_30_Sep_2015.pdf (accessed 3 November 2015)."},{"key":"key2020110313135047200_ref0114","first-page":"30","article-title":"Fraud in mobile financial services","year":"2013","journal-title":"Rapport Technique, MicroSave"},{"issue":"8","key":"key2020110313135047200_ref0115","first-page":"1","article-title":"Mobile banking in Africa: taking the bank to the people","volume":"1","year":"2010","journal-title":"Africa Economic Brief"},{"key":"key2020110313135047200_ref0116","article-title":"State of the industry 2013: mobile financial services for the unbanked","volume":"3","year":"2019","journal-title":"Gates Open Res"},{"issue":"1","key":"key2020110313135047200_ref0117","doi-asserted-by":"crossref","first-page":"186","DOI":"10.5121\/ijcsit.2011.3113","article-title":"A formal classification of internet banking attacks and vulnerabilities","volume":"3","year":"2011","journal-title":"International Journal of Computer Science and Information Technology"},{"key":"key2020110313135047200_ref0118","first-page":"10","article-title":"Assessment of today\u2019s mobile banking applications from the view of customer requirements","volume-title":"37th Annual HI International Conference on System Sciences, 2004. Proceedings of the","year":"2004"},{"key":"key2020110313135047200_ref0119","first-page":"2319","article-title":"A conceptual study on banking, technology and quality management in rural India","year":"2014","journal-title":"International Journal of Management and Social Sciences Research (IJMSSR), ISSN"},{"issue":"2","key":"key2020110313135047200_ref0120","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1108\/17506201311325805","article-title":"Microfinance and mobile banking for the bottom of the pyramid","volume":"7","year":"2013","journal-title":"Journal of Enterprising Communities: People and Places in the Global Economy"},{"key":"key2020110313135047200_ref0121","first-page":"1","article-title":"CSI computer crime and security survey","volume":"1","year":"2008","journal-title":"Computer Security Institute"},{"key":"key2020110313135047200_ref0122","volume-title":"Research Methods for Business Students","year":"2009"},{"issue":"5","key":"key2020110313135047200_ref0123","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1049\/ecej:20020506","article-title":"Secure mobile commerce","volume":"14","year":"2002","journal-title":"Electronics and Communication Engineering Journal"},{"key":"key2020110313135047200_ref0124","first-page":"4","article-title":"Impact of post-election violence and mobile-money services on remittances in Kenya","volume":"8","year":"2013","journal-title":"International Journal of Business and Social Science"},{"issue":"3","key":"key2020110313135047200_ref0125","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3844\/ajebasp.2013.89.94","article-title":"Mobile banking and sustainable growth","volume":"5","year":"2013","journal-title":"American Journal of Economics and Business Administration"},{"key":"key2020110313135047200_ref0126","article-title":"Not just for PCs anymore: the rise of mobile malware","year":"2014"},{"key":"key2020110313135047200_ref0127","volume-title":"Information Security Management Handbook","year":"2007"},{"key":"key2020110313135047200_ref0128","article-title":"The mobile commerce prospects: a strategic analysis of opportunities in the banking sector","year":"2007"},{"issue":"5","key":"key2020110313135047200_ref0129","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1108\/14636691211256313","article-title":"Towards a model of adoption in mobile banking by the unbanked: a qualitative study","volume":"14","year":"2012","journal-title":"info"},{"issue":"2","key":"key2020110313135047200_ref0130","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1057\/jbr.2009.16","article-title":"Legal issues in mobile banking","volume":"11","year":"2010","journal-title":"Journal of Banking Regulation"},{"key":"key2020110313135047200_ref0131","volume-title":"The Future of Banking","year":"2000"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2020-0021\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-02-2020-0021\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:22:41Z","timestamp":1753406561000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/28\/5\/719-741\/110931"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,29]]},"references-count":132,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,6,29]]}},"alternative-id":["10.1108\/ICS-02-2020-0021"],"URL":"https:\/\/doi.org\/10.1108\/ics-02-2020-0021","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2020,6,29]]}}}