{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T17:32:48Z","timestamp":1771522368313,"version":"3.50.1"},"reference-count":82,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,9,9]],"date-time":"2021-09-09T00:00:00Z","timestamp":1631145600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100011665","name":"Deanship of Scientific Research, King Saud University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100011665","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Mobile Information Systems"],"published-print":{"date-parts":[[2021,9,9]]},"abstract":"<jats:p>Building on IS research, this study investigates m-banking continuance from an emerging market perspective. Using a mixed-methods approach, the study presents m-banking continuance phenomenon through an integrated model. Study 1 focuses on qualitative interviews of mobile banking users, whereas study 2 empirically tests the conceptual model derived from literature and the results of study 1. Study 1 reveals three additional constructs, perceived ubiquity, perceived autonomy, and perceived security concerns to the existing literature-based constructs. However, the results of study 2\u2014a survey of 390 m-banking users\u2014provide empirical evidence to support the hypotheses drawn in the proposed conceptual model. The results reveal that perceived ubiquity, perceived usefulness, satisfaction, facilitating conditions, perceived security concerns, and trust have emerged as significant direct influencers on m-banking continuance. Moreover, the study offers practical academic and managerial implications regarding m-banking.<\/jats:p>","DOI":"10.1155\/2021\/9994990","type":"journal-article","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T18:20:08Z","timestamp":1631298008000},"page":"1-17","source":"Crossref","is-referenced-by-count":18,"title":["Investigating Mobile Banking Continuance Intention: A Mixed-Methods Approach"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7763-6566","authenticated-orcid":true,"given":"Imdadullah","family":"Hidayat-ur-Rehman","sequence":"first","affiliation":[{"name":"Department of MIS, CBA, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7881-910X","authenticated-orcid":true,"given":"Arshad","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Department of Management, CBA, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0455-4671","authenticated-orcid":true,"given":"Muhammad Nauman","family":"Khan","sequence":"additional","affiliation":[{"name":"Finance Department, College of Business Administration, King Saud University, Riyadh, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9321-2640","authenticated-orcid":true,"given":"Shamsul Anuar","family":"Mokhtar","sequence":"additional","affiliation":[{"name":"UniKL MIIT, University of Kuala Lumpur, Kuala Lumpur, Malaysia"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-04-2015-0035"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106405"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.004"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1488542"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.09.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2015.09.005"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2018.05.002"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1541724"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1108\/IJBM-08-2018-0224"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102102"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-10-2018-0237"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1177\/0266666914522140"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2012.048883"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.05.003"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-013-0131-9"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2012.667710"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101360"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2019.101920"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2018.07.009"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2018.03.003"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.101312"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.10.035"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.08.009"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.015"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.03.016"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2020.101260"},{"key":"27","article-title":"Digital 2020: Saudi Arabia\u2014DataReportal\u2014Global Digital Insights","year":"2020"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.4102\/sajbm.v46i1.80"},{"key":"29","article-title":"Statista","year":"2021"},{"key":"30","article-title":"Statista","year":"2019"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM.2018010105"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.2753\/JEC1086-4415120303"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.2307\/20650278"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1108\/IJBM-12-2018-0337"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2019.01.001"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2011.11645487"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.09.013"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2018.12.007"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.2307\/30036540"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.2307\/3250921"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.03.009"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1108\/IMDS-05-2015-0195"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.01.002"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.024"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1177\/0266666915570764"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2011.00373.x"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v24i0.2695"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-018-9864-5"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.01.013"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2015.05.006"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.2307\/25148634"},{"key":"52","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.039"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1108\/JIMA-05-2019-0096"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00269.x"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645781"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(02)00020-3"},{"key":"57","article-title":"Integrating trust in electronic commerce with the technology acceptance model: model development and validation","volume":"159","author":"P. Pavlou","year":"2001","journal-title":"AMCIS 2001 Proceedings"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1504\/ijef.2015.070528"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-08-2015-0213"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0260"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.2753\/JOA0091-3367380405"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.53.6.1024"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1016\/j.intmar.2012.10.001"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2018.06.017"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9073-8"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20294"},{"key":"67","article-title":"Context, self, and action: aA motivational analysis of self-system processes across the life span","volume-title":"The Self in Ttransition: Infancy to Cchildhood","author":"J. P. Connell","year":"1990"},{"key":"68","article-title":"Understanding E-pPortfolio cContinuance iIntention among sStudents: aA sSelf-dDetermination pPerspective","author":"R. Mobarhan"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2016.1173001"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.10.005"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.014"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.25300\/misq\/2013\/37.1.02"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2017.08.026"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1108\/02652321011064917"},{"issue":"5","key":"75","doi-asserted-by":"crossref","first-page":"879","DOI":"10.1037\/0021-9010.88.5.879","article-title":"Common method biases in behavioral research: aA critical review of the literature and recommended remedies","volume":"88","author":"P. M. Podsakoff","year":"2003","journal-title":"Journal of Applied Psychology"},{"key":"76","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00302"},{"key":"77","volume-title":"A Pprimer on Ppartial Lleast Ssquares Sstructural Eequation Mmodeling (PLS-SEM)","author":"J. F. Hair","year":"2017","edition":"2nd"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"79","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2012.07.008"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2014.06.004"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1086\/227766"}],"container-title":["Mobile Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/9994990.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/9994990.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/misy\/2021\/9994990.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T18:20:18Z","timestamp":1631298018000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/misy\/2021\/9994990\/"}},"subtitle":[],"editor":[{"given":"Floriano","family":"Scioscia","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,9]]},"references-count":82,"alternative-id":["9994990","9994990"],"URL":"https:\/\/doi.org\/10.1155\/2021\/9994990","relation":{},"ISSN":["1875-905X","1574-017X"],"issn-type":[{"value":"1875-905X","type":"electronic"},{"value":"1574-017X","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9,9]]}}}