An analysis of mobile credit card usage intentions
نویسنده
چکیده
Purpose – Many banks consider mobile-based technologies have improved the banking services through introduction of new banking facilities. One of the latest facilities developed in this area is the “mobile credit card.” The purpose of this study is to examine the factors that determine intention to use mobile credit card among Malaysia bank customers, as their new way in conducting payment transactions. Design/methodology/approach – The technology acceptance model (TAM) was used as the base model in order to develop the modified version of TAM to better reflect mobile credit card. In the modified model, perceived credibility and the amount of information on mobile credit card were added, in addition to perceived usefulness and perceived ease of use. Findings – Results suggest that perceived usefulness, perceived ease of use, perceived credibility and the amount of information on mobile credit cards are important determinants to predict Malaysia bank customers’ intentions to use mobile credit card. Needless to say, the paper is exploratory in nature. Research limitations/implications – This study suffers from two limitations. The discussion of these limitations is provided in the last part of this paper. Practical implications – Useful to Islamic banking institutions planning further mobile credit card services for their customers. Originality/value – Extends the understanding of TAM to newly emerging context of mobile credit.
منابع مشابه
Protecting against Credit Card Forgery with Existing Magnetic Card Readers
Existing magnetic cards adopt plain text to store confidential information, thus being vulnerable to an untrusted credit card reader or a skimming device. To tackle the problem, researchers have proposed many solutions such as integrated circuit card (IC card) and mobile wallets applications [6, 9, 12, 20, 21]; however, none of them can support existing magnetic card readers thereby facing sign...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملCombination of Ensemble Data Mining Methods for Detecting Credit Card Fraud Transactions
As we know, credit cards speed up and make life easier for all citizens and bank customers. They can use it anytime and anyplace according to their personal needs, instantly and quickly and without hassle, without worrying about carrying a lot of cash and more security than having liquidity. Together, these factors make credit cards one of the most popular forms of online banking. This has led ...
متن کاملAnalysis of Spending Pattern on Credit Card Fraud Detection
Credit card is one of the convenient way of payment in online shopping. In this on line shopping, payment is made by giving information like card no, security code , expiration date of the Credit card etc . To rectify the risk factors of using the credit card, every card holder’s spending method is modeled by using HMM. By using this authenticated security check the information of transaction i...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Manag. Comput. Security
دوره 15 شماره
صفحات -
تاریخ انتشار 2007