{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T04:35:05Z","timestamp":1775277305793,"version":"3.50.1"},"reference-count":113,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T00:00:00Z","timestamp":1744243200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>This paper expands the extended unified theory of acceptance and use of technology (UTAUT2) to include four additional constructs (security, risk, institutional trust, and technology trust), providing a more comprehensive understanding of mobile banking applications (m-banking apps) adoption. It also highlights the significant role of demographic factors in moderating the impact of these constructs, offering practical insights for promoting the use of mobile devices to access and manage banking services. Data were collected using an online survey from 315 mobile banking users and analysed using covariance-based structural equation modelling (CB-SEM). Most constructs of the baseline UTAUT2 were validated in the m-banking context, with the additional constructs confirmed to affect user intention to adopt m-banking apps, except perceived risk. The model explained 79% of the variance in behavioural intention (BI), and 54.7% in use behaviour (UB), achieving higher fit than the baseline UTAUT2. Age, gender, experience, income, and education moderated the impact of perceived security and institutional trust on BI; age, education, and experience moderated technology trust on BI; and age, gender, and experience moderated perceived security on UB. The guarantee of enhanced security, advanced privacy mechanisms, and trust should be considered paramount in future strategies aimed at promoting m-banking app adoption and use. Overall, the paper advances scientific knowledge by providing a more nuanced and comprehensive framework for understanding m-banking app adoption, validating new constructs, and offering practical recommendations for promoting m-banking usage.<\/jats:p>","DOI":"10.3390\/computers14040144","type":"journal-article","created":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T10:47:41Z","timestamp":1744282061000},"page":"144","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Towards a Better Understanding of Mobile Banking App Adoption and Use: Integrating Security, Risk, and Trust into UTAUT2"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5621-1435","authenticated-orcid":false,"given":"Richard","family":"Apau","sequence":"first","affiliation":[{"name":"Cyber Security Centre, WMG, Warwick Manufacturing Group, University of Warwick, Coventry CV4 7AL, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0389-4137","authenticated-orcid":false,"given":"Elzbieta","family":"Titis","sequence":"additional","affiliation":[{"name":"Cyber Security Centre, WMG, Warwick Manufacturing Group, University of Warwick, Coventry CV4 7AL, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1558-5115","authenticated-orcid":false,"given":"Harjinder Singh","family":"Lallie","sequence":"additional","affiliation":[{"name":"Cyber Security Centre, WMG, Warwick Manufacturing Group, University of Warwick, Coventry CV4 7AL, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.ausmj.2020.06.008","article-title":"Convenience matter in mobile banking adoption intention?","volume":"28","author":"Shankar","year":"2020","journal-title":"Australas. Mark. J."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"101011","DOI":"10.1016\/j.seps.2021.101011","article-title":"Adoption of mobile banking in rural China: Impact of information dissemination channel","volume":"83","author":"Zhu","year":"2022","journal-title":"Socio-Econ. Plan. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"102323","DOI":"10.1016\/j.jretconser.2020.102323","article-title":"Impact of online convenience on mobile banking adoption intention: A moderated mediation approach","volume":"58","author":"Jebarajakirthy","year":"2021","journal-title":"J. Retail. Consum. Serv."},{"key":"ref_4","first-page":"252","article-title":"How perceived value drives the use of mobile financial services apps","volume":"47","author":"Karjaluoto","year":"2019","journal-title":"Int. J. Inf. Manag."},{"key":"ref_5","unstructured":"Entersekt (2025, April 01). Fighting Back Against Mobile Banking and Payments Fraud in Europe. Entersekt Blog. 2022. pp. 1\u201312. Available online: https:\/\/www.entersekt.com\/resources\/blog\/tpost\/s6kn87x601-fighting-mobile-banking-and-online-payme."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1891661","DOI":"10.1080\/23311975.2021.1891661","article-title":"Understanding behavioral intention to use mobile wallets in vietnam: Extending the tam model with trust and enjoyment","volume":"8","author":"To","year":"2021","journal-title":"Cogent Bus. Manag."},{"key":"ref_7","unstructured":"Nokia (2025, April 01). Threat Intelligence Report. Nokia. 2023. pp. 1\u201312. Available online: https:\/\/www.nokia.com\/networks\/security-portfolio\/threat-intelligence-report\/."},{"key":"ref_8","unstructured":"UKFinance (2025, April 01). 2023 Half Year Fraud Report. UKFinance. 2023. pp. 1\u201312. Available online: https:\/\/www.ukfinance.org.uk\/policy-and-guidance\/reports-and-publications\/2023-half-year-fraud-report."},{"key":"ref_9","unstructured":"Irwin, K. (2025, April 01). New \u2018Snowblind\u2019 Banking Malware Targets Android Users with Linux Kernel Exploit. PCMag 2024, pp. 1\u201312. Available online: https:\/\/uk.pcmag.com\/security\/152989\/new-snowblind-banking-malware-targets-android-users-with-linux-kernel-exploit."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Alnajim, A.M., Habib, S., Islam, M., AlRawashdeh, H.S., and Wasim, M. (2023). Exploring cybersecurity education and training techniques: A comprehensive review of traditional, virtual reality, and augmented reality approaches. Symmetry, 15.","DOI":"10.3390\/sym15122175"},{"key":"ref_11","first-page":"353","article-title":"The implication of trust that influences customers\u2019 intention to use mobile banking","volume":"8","author":"Ramli","year":"2021","journal-title":"J. Asian Financ. Econ. Bus."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Kumar, S., and Yukita, A.L.K. (2021). Millennials behavioral intention in using mobile banking: Integrating perceived risk and trust into tam (a survey in jawa barat). International Conference on Business and Engineering Management (ICONBEM 2021), Atlantis Press.","DOI":"10.2991\/aebmr.k.210522.028"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Almaiah, M.A., Al-Otaibi, S., Shishakly, R., Hassan, L., Lutfi, A., Alrawad, M., Qatawneh, M., and Alghanam, O.A. (2023). Investigating the role of perceived risk, perceived security and perceived trust on smart m-banking application using sem. Sustainability, 15.","DOI":"10.3390\/su15139908"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"100065","DOI":"10.1016\/j.digbus.2023.100065","article-title":"M-banking adoption from the developing countries perspective: A mediated model","volume":"3","author":"Abdennebi","year":"2023","journal-title":"Digit. Bus."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"35","DOI":"10.2478\/fiqf-2021-0017","article-title":"Predicting mobile banking adoption: An integration of tam and tpb with trust and perceived risk","volume":"17","author":"Obaid","year":"2021","journal-title":"Financ. Internet Q."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1108\/JEIM-03-2020-0092","article-title":"An empirical examination of the moderating role of age and gender in consumer mobile banking use: A cross-national, quantitative study","volume":"34","author":"Merhi","year":"2021","journal-title":"J. Enterp. Inf. Manag."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"101151","DOI":"10.1016\/j.techsoc.2019.101151","article-title":"A cross-cultural study of the intention to use mobile banking between lebanese and british consumers: Extending utaut2 with security, privacy and trust","volume":"59","author":"Merhi","year":"2019","journal-title":"Technol. Soc."},{"key":"ref_18","first-page":"180","article-title":"The effect of awareness and perceived risk on the technology acceptance model (tam): Mobile banking in yemen","volume":"12","author":"Mutahar","year":"2018","journal-title":"Int. J. Serv. Stand."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1080\/10447318.2018.1507132","article-title":"An empirical study of the impacts of perceived security and knowledge on continuous intention to use mobile fintech payment services","volume":"35","author":"Lim","year":"2019","journal-title":"Int. J. Hum.-Comput. Interact."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Kumar, R., Singh, R., Kumar, K., Khan, S., and Corvello, V. (2023). How does perceived risk and trust affect mobile banking adoption? empirical evidence from india. Sustainability, 15.","DOI":"10.3390\/su15054053"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"5276406","DOI":"10.1155\/2023\/5276406","article-title":"Moderating role of perceived trust and perceived service quality on consumers\u2019 use behavior of alipay e-wallet system: The perspectives of technology acceptance model and theory of planned behavior","volume":"2023","author":"Tian","year":"2023","journal-title":"Hum. Behav. Emerg. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1016\/j.jbusres.2021.04.052","article-title":"A meta-analysis of the UTAUT model in the mobile banking literature: The moderating role of sample size and culture","volume":"132","author":"Jadil","year":"2021","journal-title":"J. Bus. Res."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"518","DOI":"10.1504\/IJMC.2023.131165","article-title":"Artificial intelligence-based pre-implementation interventions in users\u2019 continuance intention to use mobile banking","volume":"21","author":"Lin","year":"2023","journal-title":"Int. J. Mob. Commun."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"102554","DOI":"10.1016\/j.techsoc.2024.102554","article-title":"Exploring critical determinants influencing businesses\u2019 continuous usage of mobile payment in post-pandemic era: Based on the UTAUT2 perspective","volume":"77","author":"Tang","year":"2024","journal-title":"Technol. Soc."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Zhang, M., Hassan, H., and Migin, M.W. (2023). Exploring the consumers\u2019 purchase intention on online community group buying platform during pandemic. Sustainability, 15.","DOI":"10.3390\/su15032433"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1894356","DOI":"10.1080\/17517575.2021.1894356","article-title":"Promoting e-banking actual usage: Mix of technology acceptance model and technology-organisation-environment framework","volume":"16","author":"Kimiagari","year":"2022","journal-title":"Enterp. Inf. Syst."},{"key":"ref_27","first-page":"51","article-title":"Extracting best set of factors that affect students\u2019 adoption of smartphone for university education: Empirical evidence from utaut-2 model","volume":"1","author":"Ahmed","year":"2017","journal-title":"J. Manag. Econ. Ind. Organ."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1007\/s11423-016-9508-8","article-title":"Factors affecting the adoption of e-learning systems in qatar and USA: Extending the unified theory of acceptance and use of technology 2 (utaut2)","volume":"65","author":"Tarhini","year":"2017","journal-title":"Educ. Technol. Res. Dev."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"5265","DOI":"10.48084\/etasr.3320","article-title":"Critical factors influencing the behavioral intention of consumers towards mobile banking in malaysia","volume":"10","author":"Rehman","year":"2020","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"ref_30","first-page":"3003","article-title":"Effect of social influence on intention to use mobile wallet with the mediating effect of promotional benefits","volume":"12","author":"Prabhakaran","year":"2020","journal-title":"J. Xi\u2019An Univ. Archit. Technol."},{"key":"ref_31","unstructured":"Win, N.N., Aung, P.P., and Phyo, M.T. (2021). Factors influencing behavioral intention to use and use behavior of mobile banking in myanmar using a model based on unified acceptance theory. Hum. Behav. Dev. Soc., 22."},{"key":"ref_32","unstructured":"Tham, J., Ab Yazid, M.S., Khatibi, A.A., and Azam, S.F. (2017). Internet and data security\u2013understanding customer perception on trusting virtual banking security in malaysia. Eur. J. Soc. Sci. Stud., Available online: https:\/\/oapub.org\/soc\/index.php\/EJSSS\/article\/view\/199."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1108\/ICS-06-2017-0039","article-title":"Data security and consumer trust in fintech innovation in germany","volume":"26","author":"Stewart","year":"2018","journal-title":"Inf. Comput. Secur."},{"key":"ref_34","first-page":"39","article-title":"Cyber-crime and its effects on e-commerce technologies","volume":"5","author":"Apau","year":"2019","journal-title":"J. Inf."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1108\/MSQ-10-2012-0137","article-title":"Perceived risk, usage frequency of mobile banking services","volume":"23","author":"Chen","year":"2013","journal-title":"Manag. Serv. Qual. Int. J."},{"key":"ref_36","first-page":"146","article-title":"How does perceived security influence mobile wallet users\u2019 behavior? A SEM investigation","volume":"51","author":"Chand","year":"2025","journal-title":"Manag. Financ."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/s41599-024-02778-z","article-title":"Factors influencing continuance intention to use mobile banking: An extended expectation-confirmation model with moderating role of trust","volume":"11","author":"Nguyen","year":"2024","journal-title":"Humanit. Soc. Sci. Commun."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/j.chb.2016.09.005","article-title":"Exploring privacy paradox in information-sensitive mobile app adoption: A cross-cultural comparison","volume":"65","author":"Pentina","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"105557","DOI":"10.1016\/j.chb.2018.06.005","article-title":"Social commerce and the mobile platform: Payment and security perceptions of potential users","volume":"115","author":"Williams","year":"2021","journal-title":"Comput. Hum. Behav."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"101693","DOI":"10.1016\/j.techsoc.2021.101693","article-title":"Security factors on the intention to use mobile banking applications in the uk older generation (55+). A mixed-method study using modified utaut and mtam-with perceived cyber security, risk, and trust","volume":"67","author":"Hanif","year":"2021","journal-title":"Technol. Soc."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1108\/WJSTSD-05-2018-0040","article-title":"The role of utaut, doi, perceived technology security and game elements in internet banking adoption","volume":"15","author":"Rahi","year":"2018","journal-title":"World J. Sci. Technol. Sustain. Dev."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1057\/s41264-020-00074-w","article-title":"Understanding the intention to use mobile banking by existing online banking customers: An empirical study","volume":"25","author":"Singh","year":"2020","journal-title":"J. Financ. Serv. Mark."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1108\/IJBM-11-2016-0159","article-title":"Assessing the intentions to use internet banking: The role of perceived risk and trust as mediating factors","volume":"36","author":"Namahoot","year":"2018","journal-title":"Int. J. Bank Mark."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1080\/10496491.2020.1729312","article-title":"Determinants of mobile banking users\u2019 loyalty","volume":"26","year":"2020","journal-title":"J. Promot. Manag."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1057\/s41264-021-00095-z","article-title":"Adoption of electronic banking services in india: An extension of utaut2 model","volume":"27","author":"Chauhan","year":"2022","journal-title":"J. Financ. Serv. Mark."},{"key":"ref_46","first-page":"1","article-title":"Elderly and internet banking: An application of UTAUT2","volume":"20","year":"2015","journal-title":"J. Internet Bank. Commer."},{"key":"ref_47","first-page":"13375","article-title":"Exploring the relationship among technology acceptance, learner engagement, and critical thinking","volume":"26","author":"Wang","year":"2021","journal-title":"Educ. Inf. Technol."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"S90","DOI":"10.1177\/0972150918757883","article-title":"The moderating effect of demographic variables on mobile banking adoption: An empirical investigation","volume":"19","author":"Chawla","year":"2018","journal-title":"Glob. Bus. Rev."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1016\/j.chb.2014.03.022","article-title":"Antecedents of the adoption of the new mobile payment systems: The moderating effect of age","volume":"35","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"e12989","DOI":"10.1111\/ijcs.12989","article-title":"A digital cohort analysis of consumers\u2019 mobile banking app experience","volume":"48","author":"Sharma","year":"2024","journal-title":"Int. J. Consum. Stud."},{"key":"ref_51","unstructured":"Merhi, M. (2021). Investigating the Factors Driving Consumers\u2019 Intention to Use Mobile Banking, Springer."},{"key":"ref_52","first-page":"2024112","article-title":"A systematic review of the behavior intention on mobile banking","volume":"7","author":"Merhi","year":"2019","journal-title":"Semant. Sch."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","article-title":"User acceptance of information technology: Toward a unified view","volume":"27","author":"Venkatesh","year":"2003","journal-title":"Mis Q."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","article-title":"Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology","volume":"36","author":"Venkatesh","year":"2012","journal-title":"Mis Q."},{"key":"ref_55","unstructured":"Rogers, E. (1995). Diffusion of Innovations, The Free Press."},{"key":"ref_56","unstructured":"Fishbein, M., and Ajzen, I. (1977). Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, Addison-Wesley."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","article-title":"The theory of planned behaviour","volume":"50","author":"Ajzen","year":"1991","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"319","DOI":"10.2307\/249008","article-title":"Perceived usefulness, perceived ease of use, and user acceptance of information technology","volume":"13","author":"Davis","year":"1989","journal-title":"Mis Q."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1016\/S1071-5819(03)00111-3","article-title":"Predicting e-services adoption: A perceived risk facets perspective","volume":"59","author":"Featherman","year":"2003","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"1111","DOI":"10.1111\/j.1559-1816.1992.tb00945.x","article-title":"Extrinsic and intrinsic motivation to use computers in the workplace 1","volume":"22","author":"Davis","year":"1992","journal-title":"J. Appl. Soc. Psychol."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2307\/249443","article-title":"Personal computing: Toward a conceptual model of utilization","volume":"15","author":"Thompson","year":"1991","journal-title":"Mis Q."},{"key":"ref_62","unstructured":"Bandura, A. (1986). Social Foundations of Thought and Action, SAGE."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1287\/isre.6.2.144","article-title":"Understanding information technology usage: A test of competing models","volume":"6","author":"Taylor","year":"1995","journal-title":"Inf. Syst. Res."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"21","DOI":"10.25300\/MISQ\/2013\/37.1.02","article-title":"Bridging the qualitative-quantitative divide: Guidelines for conducting mixed methods research in information systems","volume":"37","author":"Venkatesh","year":"2013","journal-title":"Mis Q."},{"key":"ref_65","first-page":"5","article-title":"Unified theory of acceptance and use of technology: US vs. China","volume":"13","author":"Venkatesh","year":"2010","journal-title":"J. Glob. Inf. Technol. Manag."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.chb.2014.02.020","article-title":"Discovering determinants of users perception of mobile device functionality fit","volume":"35","author":"Negahban","year":"2014","journal-title":"Comput. Hum. Behav."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1016\/j.cose.2014.10.015","article-title":"Measuring user satisfaction with information security practices","volume":"48","author":"Montesdioca","year":"2015","journal-title":"Comput. Secur."},{"key":"ref_68","first-page":"99","article-title":"Factors influencing adoption of mobile banking by jordanian bank customers: Extending utaut2 with trust","volume":"37","author":"Alalwan","year":"2017","journal-title":"Int. J. Inf. Manag."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"35","DOI":"10.24102\/ijbrd.v2i1.263","article-title":"Mobile banking adoption: An examination of technology acceptance model and theory of planned behavior","volume":"2","author":"Aboelmaged","year":"2013","journal-title":"Int. J. Bus. Res. Dev."},{"key":"ref_70","first-page":"44","article-title":"New determinants of ease of use and perceived usefulness for mobile banking adoption","volume":"11","author":"Raza","year":"2017","journal-title":"Int. J. Electron. Cust. Relatsh. Manag."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1108\/02634501211231928","article-title":"Mobile banking adoption of the youth market: Perceptions and intentions","volume":"30","author":"Akturan","year":"2012","journal-title":"Mark. Intell. Plan."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1016\/j.chb.2016.03.030","article-title":"Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology","volume":"61","author":"Oliveira","year":"2016","journal-title":"Comput. Hum. Behav."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MCE.2018.2881291","article-title":"Mobile banking: Evolution and threats: Malware threats and security solutions","volume":"8","author":"Wazid","year":"2019","journal-title":"IEEE Consum. Electron. Mag."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1080\/15332861.2023.2236428","article-title":"Examining the determinants of mobile banking app continuance intention in India: An extension of the IS success model","volume":"23","author":"Saibaba","year":"2024","journal-title":"J. Internet Commer."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1108\/IJBM-09-2015-0145","article-title":"Bank adoption of mobile banking: Stakeholder perspective","volume":"35","author":"Mullan","year":"2017","journal-title":"Int. J. Bank Mark."},{"key":"ref_76","first-page":"1","article-title":"Will I virtually try and buy?\u2014exploring the adoption of virtual fitting rooms through the lens of perceived value, risk, and consumer characteristics","volume":"2025","author":"Aggarwal","year":"2025","journal-title":"Int. Rev. Retail. Distrib. Consum. Res."},{"key":"ref_77","first-page":"1","article-title":"Understanding the internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application","volume":"34","author":"Martins","year":"2014","journal-title":"Int. J. Inf. Manag."},{"key":"ref_78","unstructured":"Du, T., and Agami, A. (2017). Examining young users\u2019 security perceptions of mobile banking: A qualitative study on users\u2019 insights about mobile banking. Ume\u00e5 Sch. Bus. Econ., 1\u201330."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1080\/0965254X.2016.1148771","article-title":"Predicting internet banking adoption in india: A perceived risk perspective","volume":"25","author":"Roy","year":"2017","journal-title":"J. Strateg. Mark."},{"key":"ref_80","first-page":"1","article-title":"Factors influencing the adoption and usage of blockchain in e-commerce: A systematic literature review","volume":"2025","author":"Roopnarain","year":"2025","journal-title":"Afr. J. Sci. Technol. Innov. Dev."},{"key":"ref_81","first-page":"228","article-title":"Impact of cybercrime and trust on the use of e-commerce technologies: An application of the theory of planned behavior","volume":"13","author":"Apau","year":"2019","journal-title":"Int. J. Cyber Criminol."},{"key":"ref_82","first-page":"1","article-title":"The influence of perceived trust on understanding banks\u2019 customers behavior to accept internet banking services","volume":"11","author":"Arshah","year":"2018","journal-title":"Indian J. Sci. Technol."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"682","DOI":"10.62754\/joe.v4i1.5867","article-title":"Which UTAUT Elements Drive Mobile Banking Adoption in Indonesia, Despite Security and Trust Concerns?","volume":"4","author":"Fachrudin","year":"2025","journal-title":"J. Ecohumanism"},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Resnik, D. (2018). The Ethics of Research with Human Subjects: Protecting People, Advancing Science, Promoting Trust, Springer.","DOI":"10.1007\/978-3-319-68756-8"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1186\/s13063-021-05493-1","article-title":"An evaluation of the process of informed consent: Views from research participants and staff","volume":"22","author":"Feeney","year":"2021","journal-title":"Trials"},{"key":"ref_86","unstructured":"Brace, I. (2018). Questionnaire Design: How to Plan, Structure and Write Survey Material for Effective Market Research, Kogan Page Publishers."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0001-6918(99)00050-5","article-title":"Optimal number of response categories in rating scales: Reliability, validity, discriminating power, and respondent preferences","volume":"104","author":"Preston","year":"2000","journal-title":"Acta Psychol."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.im.2010.09.001","article-title":"An international comparison of technology adoption: Testing the utaut model","volume":"48","author":"Im","year":"2011","journal-title":"Inf. Manag."},{"key":"ref_89","first-page":"7","article-title":"Structural equation modeling and regression: Guidelines for research practice","volume":"4","author":"Gefen","year":"2000","journal-title":"Commun. Assoc. Inf. Syst."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1177\/002224378201900402","article-title":"Recent developments in structural equation modeling","volume":"19","year":"1982","journal-title":"J. Mark. Res."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"2161","DOI":"10.1108\/IMDS-10-2019-0529","article-title":"Demystifying the role of causal-predictive modeling using partial least squares structural equation modeling in information systems research","volume":"120","author":"Chin","year":"2020","journal-title":"Ind. Manag. Data Syst."},{"key":"ref_92","unstructured":"Tabachnick, B.G., Fidell, L.S., and Ullman, J.B. (2013). Using Multivariate Statistics, Pearson."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Wang, J., and Wang, X. (2019). Structural Equation Modeling: Applications Using Mplus, John Wiley & Sons.","DOI":"10.1002\/9781119422730"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1037\/0033-2909.103.3.411","article-title":"Structural equation modeling in practice: A review and recommended two-step approach","volume":"103","author":"Anderson","year":"1988","journal-title":"Psychol. Bull."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1016\/j.jbusres.2008.01.013","article-title":"Formative versus reflective measurement models: Two applications of formative measurement","volume":"61","author":"Coltman","year":"2008","journal-title":"J. Bus. Res."},{"key":"ref_96","unstructured":"Pezzullo, J.C. (2013). Biostatistics for Dummies, John Wiley & Sons."},{"key":"ref_97","unstructured":"Kline, R.B. (2023). Principles and Practice of Structural Equation Modeling, Guilford Publications."},{"key":"ref_98","unstructured":"Brown, T.A. (2015). Confirmatory Factor Analysis for Applied Research, Guilford Publications."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1177\/002224377401100409","article-title":"Estimating consumer preferences for a new durable brand in an established product class","volume":"11","author":"Ryans","year":"1974","journal-title":"J. Mark. Res."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1108\/EBR-09-2015-0094","article-title":"Identifying and treating unobserved heterogeneity with fimix-pls: Part i\u2014Method","volume":"28","author":"Hair","year":"2016","journal-title":"Eur. Bus. Rev."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1177\/0049124189017003004","article-title":"A new incremental fit index for general structural equation models","volume":"17","author":"Bollen","year":"1989","journal-title":"Sociol. Methods Res."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2307\/3250957","article-title":"An empirical investigation of the factors affecting data warehousing success","volume":"25","author":"Wixom","year":"2001","journal-title":"Mis Q."},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1177\/002224378101800104","article-title":"Evaluating structural equation models with unobservable variables and measurement error","volume":"18","author":"Fornell","year":"1981","journal-title":"J. Mark. Res."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1177\/002224379102800306","article-title":"A cross-national assessment of the reliability and validity of the CETSCALE","volume":"28","author":"Netemeyer","year":"1991","journal-title":"J. Mark. Res."},{"key":"ref_105","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1016\/S0148-2963(01)00225-9","article-title":"Using invoice price information to frame advertised offers","volume":"56","author":"Bearden","year":"2003","journal-title":"J. Bus. Res."},{"key":"ref_106","first-page":"77","article-title":"Tests of significance in factor analysis","volume":"3","author":"Bartlett","year":"1950","journal-title":"Br. J. Psychol."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.wocn.2018.09.004","article-title":"Strategies for addressing collinearity in multivariate linguistic data","volume":"71","author":"Tomaschek","year":"2018","journal-title":"J. Phon."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"59","DOI":"10.2307\/25148781","article-title":"Assimilation of enterprise systems: The effect of institutional pressures and the mediating role of top management","volume":"31","author":"Liang","year":"2007","journal-title":"Mis Q."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1287\/mnsc.1060.0597","article-title":"Common method variance in is research: A comparison of alternative approaches and a reanalysis of past research","volume":"52","author":"Malhotra","year":"2006","journal-title":"Manag. Sci."},{"key":"ref_110","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1037\/0021-9010.86.1.114","article-title":"Accounting for common method variance in cross-sectional research designs","volume":"86","author":"Lindell","year":"2001","journal-title":"J. Appl. Psychol."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1108\/IJBM-08-2016-0104","article-title":"Adoption of internet banking services in gujarat: An extension of tam with perceived security and social influence","volume":"36","author":"Patel","year":"2018","journal-title":"Int. J. Bank Mark."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/j.jretconser.2018.03.003","article-title":"Consumer adoption of mobile banking services: An empirical examination of factors according to adoption stages","volume":"43","author":"Shareef","year":"2018","journal-title":"J. Retail. Consum. Serv."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"146598","DOI":"10.1109\/ACCESS.2020.3013145","article-title":"Artificial intelligence for cybersecurity: A systematic mapping of literature","volume":"8","author":"Wiafe","year":"2020","journal-title":"IEEE Access"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/4\/144\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:12:21Z","timestamp":1760029941000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/4\/144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,10]]},"references-count":113,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["computers14040144"],"URL":"https:\/\/doi.org\/10.3390\/computers14040144","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,10]]}}}