{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T23:15:46Z","timestamp":1774307746600,"version":"3.50.1"},"reference-count":29,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T00:00:00Z","timestamp":1733184000000},"content-version":"vor","delay-in-days":337,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Intelligent Systems"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>The expanding importance of technology, particularly mobile banking, in the financial industry, is examined in this literature review, as well as the crucial role that cybersecurity knowledge plays in protecting online transactions. Users now have the flexibility to conduct payments whenever and wherever they wish thanks to the advent of mobile banking. Further consumer behavior study is necessary due to difficulties with its acceptability. Given the hazards involved in online and mobile banking, cybersecurity is revealed as a critical component. Users\u2019 actions might lead to financial losses since they represent security concerns. The evaluation places a strong emphasis on the necessity of increasing user cybersecurity knowledge and comprehension. Wireless banking is still in its early phases and needs more study on consumer acceptability and behavior despite the greater accessibility of technology. Furthermore, the research study emphasizes the socio\u2010technical difficulties governments encounter in tackling cybersecurity and emphasizes how urgently better readiness is needed in the face of cyberwarfare threats. It investigated how user behavior in mobile banking in particular geographic areas, such as Thailand, relates to cyberspace knowledge and consciousness. The assessment emphasizes the value of technology in banking, the difficulties associated with cybersecurity, and the demand for increased customer knowledge and comprehension to ensure safe digital transactions. To conduct this research activity, standardized questionnaires are used. The technique employed to get this data was convenience sampling. The statistics collection size stood at 500 and was gathered from males as well as females of all ages, belonging to diverse revenue groups, and numerous professional backgrounds. The survey finds that even while these services are becoming widespread in the UAE, customers\u2019 awareness and understanding of cyber security are still insufficient. Users frequently underrate the security dangers involved with online transactions, which might create openings. Additionally, the study underlines the necessity of more effective training programs and efforts to raise mobile banking consumers\u2019 knowledge of cybersecurity issues. It also emphasizes how crucial it is to build cybersecurity precautions into the structure and functioning of services for mobile banking. The purpose of this study was to examine the demographic characteristics of consumers and companies (online transactions) that use mobile banking apps to get special advantages. It was shown that people\u2019s satisfaction with mobile banking applications was influenced by a number of criteria, including age, employment, income, marital status, and educational attainment. Younger consumers, such as students and recent graduates, are seen to be happy than customers of various ages and vocations, and males are thought to be happier than women.<\/jats:p>","DOI":"10.1155\/int\/9949510","type":"journal-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T14:21:33Z","timestamp":1733235693000},"source":"Crossref","is-referenced-by-count":5,"title":["The Effect of User Behavior in Online Banking on Cybersecurity Knowledge"],"prefix":"10.1155","volume":"2024","author":[{"given":"Hamza","family":"Alrababah","sequence":"first","affiliation":[]},{"given":"Hena","family":"Iqbal","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9789-5231","authenticated-orcid":false,"given":"Muhammad Adnan","family":"Khan","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2024,12,3]]},"reference":[{"key":"e_1_2_13_1_2","first-page":"516","article-title":"Mobile Banking in India\u2013Issues & Challenges","volume":"3","author":"Devadevan V.","year":"2013","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"e_1_2_13_2_2","first-page":"195","article-title":"Evaluation of Internet Transaction Fraud in Thailand","volume":"20","author":"Kraiwanit T.","year":"2021","journal-title":"Indian Journal of Economics and Business"},{"key":"e_1_2_13_3_2","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v13i02.9262"},{"key":"e_1_2_13_4_2","doi-asserted-by":"publisher","DOI":"10.21512\/ijobex.v1i1.7156"},{"key":"e_1_2_13_5_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-74575-2_6","article-title":"Classification of Cyber Security Threats on Mobile Devices and Applications. Artificial Intelligence and Blockchain for Future Cybersecurity Applications","volume":"107","author":"Almaiah M. A.","year":"2021","journal-title":"Artificial Intelligence and Blockchain for Future Cybersecurity Applications"},{"key":"e_1_2_13_6_2","doi-asserted-by":"publisher","DOI":"10.20533\/ijisr.2042.4639.2016.0076"},{"key":"e_1_2_13_7_2","doi-asserted-by":"crossref","unstructured":"AlghazoJ. M. KazmiZ. andLatifG. Cyber Security Analysis of Internet Banking in Emerging Countries: User and Bank Perspectives 2017 4th IEEE International Conference on Engineering Technologies and Applied Sciences November 2017 Salmabad Bahrain IEEE 1\u20136.","DOI":"10.1109\/ICETAS.2017.8277910"},{"key":"e_1_2_13_8_2","doi-asserted-by":"publisher","DOI":"10.1108\/ijbm-09-2015-0143"},{"key":"e_1_2_13_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.08.017"},{"key":"e_1_2_13_10_2","doi-asserted-by":"publisher","DOI":"10.1108\/ijbm-09-2015-0145"},{"key":"e_1_2_13_11_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2014.05.003"},{"key":"e_1_2_13_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.02.007"},{"key":"e_1_2_13_13_2","unstructured":"BadaM. SasseA. M. andNurseJ. R. Cyber Security Awareness Campaigns: Why Do They Fail to Change Behaviour? 2019 https:\/\/arxiv.org\/abs\/1901.02672."},{"key":"e_1_2_13_14_2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-22351-9_13","article-title":"Gamification Techniques for Raising Cyber Security Awareness","author":"Scholefield S.","year":"2019","journal-title":"HCI for Cybersecurity, Privacy and Trust: First International Conference"},{"key":"e_1_2_13_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ajsl.2021.10.002"},{"key":"e_1_2_13_16_2","first-page":"163","article-title":"Internet Banking Security: Human-Centered Issues in the Context of Thailand","volume":"20","author":"Ingkathawornwong P.","year":"2020","journal-title":"Humanities, Arts and Social Sciences Studies"},{"key":"e_1_2_13_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2007.906851"},{"key":"e_1_2_13_18_2","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.14.1.5.12810"},{"key":"e_1_2_13_19_2","doi-asserted-by":"publisher","DOI":"10.2753\/mis0742-1222230106"},{"key":"e_1_2_13_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.12.015"},{"key":"e_1_2_13_21_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2006.12.002"},{"key":"e_1_2_13_22_2","doi-asserted-by":"publisher","DOI":"10.1108\/ijbm-09-2015-0144"},{"key":"e_1_2_13_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.05.074"},{"key":"e_1_2_13_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2016.01.013"},{"key":"e_1_2_13_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2015.03.008"},{"key":"e_1_2_13_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sjme.2016.12.001"},{"key":"e_1_2_13_27_2","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1712269"},{"key":"e_1_2_13_28_2","unstructured":"DlaminiZ.andModiseM. Cyber Security Awareness Initiatives in South Africa: A Synergy Approach International Conference on Cyber Warfare and Security June 2012 Kuala Lumpur Malaysia Academic Conferences International Limited 98\u2013107."},{"key":"e_1_2_13_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.11.342"}],"container-title":["International Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/int\/9949510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T14:21:40Z","timestamp":1733235700000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/int\/9949510"}},"subtitle":[],"editor":[{"given":"Vasudevan","family":"Rajamohan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1155\/int\/9949510"],"URL":"https:\/\/doi.org\/10.1155\/int\/9949510","archive":["Portico"],"relation":{},"ISSN":["0884-8173","1098-111X"],"issn-type":[{"value":"0884-8173","type":"print"},{"value":"1098-111X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,1]]},"article-number":"9949510"}}