An analysis of mobile credit card usage intentions

نویسنده

  • Hanudin Amin
چکیده

Purpose – Many banks consider mobile-based technologies have improved the banking services through introduction of new banking facilities. One of the latest facilities developed in this area is the “mobile credit card.” The purpose of this study is to examine the factors that determine intention to use mobile credit card among Malaysia bank customers, as their new way in conducting payment transactions. Design/methodology/approach – The technology acceptance model (TAM) was used as the base model in order to develop the modified version of TAM to better reflect mobile credit card. In the modified model, perceived credibility and the amount of information on mobile credit card were added, in addition to perceived usefulness and perceived ease of use. Findings – Results suggest that perceived usefulness, perceived ease of use, perceived credibility and the amount of information on mobile credit cards are important determinants to predict Malaysia bank customers’ intentions to use mobile credit card. Needless to say, the paper is exploratory in nature. Research limitations/implications – This study suffers from two limitations. The discussion of these limitations is provided in the last part of this paper. Practical implications – Useful to Islamic banking institutions planning further mobile credit card services for their customers. Originality/value – Extends the understanding of TAM to newly emerging context of mobile credit.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Protecting against Credit Card Forgery with Existing Magnetic Card Readers

Existing magnetic cards adopt plain text to store confidential information, thus being vulnerable to an untrusted credit card reader or a skimming device. To tackle the problem, researchers have proposed many solutions such as integrated circuit card (IC card) and mobile wallets applications [6, 9, 12, 20, 21]; however, none of them can support existing magnetic card readers thereby facing sign...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Combination of Ensemble Data Mining Methods for Detecting Credit Card Fraud Transactions

As we know, credit cards speed up and make life easier for all citizens and bank customers. They can use it anytime and anyplace according to their personal needs, instantly and quickly and without hassle, without worrying about carrying a lot of cash and more security than having liquidity. Together, these factors make credit cards one of the most popular forms of online banking. This has led ...

متن کامل

Analysis of Spending Pattern on Credit Card Fraud Detection

Credit card is one of the convenient way of payment in online shopping. In this on line shopping, payment is made by giving information like card no, security code , expiration date of the Credit card etc . To rectify the risk factors of using the credit card, every card holder’s spending method is modeled by using HMM. By using this authenticated security check the information of transaction i...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 15  شماره 

صفحات  -

تاریخ انتشار 2007