Академический Документы
Профессиональный Документы
Культура Документы
ABSTRACT KEYWORDS
Security concerns have thwarted the widespread adoption of Mobile banking; India;
mobile banking in India. To respond to the concerns of Indian metropolitan and urban; level
banks and their customers, we present in this paper our of security; perceived risk;
exploratory attempts to understand how the levels of security perceived control
affect perceived risk and control and ultimately, adoption of
mobile banking by Indian customers. This study also examines the
moderating influence of the type of city on the relationship
between security levels and risk/control perceptions associated
with mobile banking. Using a scenario-based experiment, we
classified security-enhancing approaches into three categories and
examined their effectiveness in decreasing Indian customers’
perceived risk, increasing their perceived control, and then in turn,
facilitating mobile banking adoption. Our findings reveal the
important role of perceived risk and control in influencing
customers’ intention to adopt mobile banking. Moreover,
perceived risk and control significantly influenced mobile banking
adoption by customers in urban areas, but only perceived control
significantly influenced mobile banking adoption by metropolitan
customers. Additional analyses show that customers’ risk and
control perceptions differ according to the level of security;
however, these perceptions do not have a significant influence on
risk and control.
1. Introduction
Active adoption of information technology (IT) over the last few decades has changed the
Indian banking industry (Kannabiran & Narayan, 2005). Indian banks have been offering
mobile banking services since 2009 as a way to give their customers, especially those in
rural areas, seamless access to banking services. However, widespread implementation
of mobile banking has been difficult because of insufficient infrastructure and because
of India’s many poor citizens in rural areas and urban slums (Pick, Gollakota, & Singh,
2014 ).
CONTACT Hee-Woong Kim kimhw@yonsei.ac.kr Graduate School of Information, Yonsei University, 50, Yonsei-ro
Seodaemun-gu, Seoul 03722, Korea
James Pick is the accepting Associate Editor for this article.
© 2017 Commonwealth Secretariat
128 S. GUPTA ET AL.
Mobile banking refers to the conduct of banking activities using a mobile device
whereby customers can access their accounts to verify balances, transfer funds, pay
bills, and perform various other transactions (Birch, 1999; Gefen, Straub, & Boudreau,
2000). During the last few years, mobile banking has produced a surge in banking trans-
actions in developing countries such as India through the increased use of smartphones.1
As a result, India and China have had some of the world’s highest rates of adoption of
mobile banking (KPMG, 2015).
Nevertheless, despite this promising potential of mobile banking, the extent of adop-
tion has so far been dismal (Funk, 2009; Godoe & Hansen, 2009). Several studies have
shown that security concerns are the greatest barrier to its adoption (e.g. Bamoriya &
Singh, 2012; Chen & Barnes, 2007; Hamlet & Strube, 2000; Hernandez & Mazzon, 2007;
Howcroft, Hamilton, & Hewer, 2002; Jo Black, Lockett, Ennew, Winklhofer, & McKechnie,
2002; Mishra & Singh Bisht, 2013; Nui Polatoglu & Ekin, 2001; Sathye, 1999; Tan & Teo,
2000). However, researchers have noted that despite the knowledge gap about mobile
banking adoption that exists in countries such as India, many, if not most, of the studies
on barriers to adoption have been conducted in the context of developed countries
(Mwangi & Brown, 2015).
Indian banks have undertaken a number of measures to alleviate users’ concerns about
security. In addition, the Indian government has passed legislation covering mobile
banking practices. Despite these efforts, security concerns remain a major cause for
poor adoption of mobile banking in India. In response to these concerns there, we
present in this paper our attempts to explore how the levels of security affect perceived
risk and control and ultimately, adoption of mobile banking by Indian customers. We
apply a scenario-based experimental method to examine the role of security by sequen-
tially providing three scenarios describing different security conditions.
Because the pace of development and adoption of new technologies varies between
metropolitan and other areas, the type of city is likely to influence the extent of mobile
banking adoption. Therefore, we also examined the moderating influence of the type of
city on the relationship between the level of security and the risk/control perceptions of
adoption of mobile banking.
In the following sections, we discuss mobile banking operations in India, briefly review
the related literature, and outline the theoretical foundation of this study. We then discuss
our research methodology, evaluation results, and the implications of our findings.
In many developing countries, mobile technology has been used to address socio-
economic problems such as urban poverty (Omole, 2013; Rangaswamy & Nair, 2012).
The banking industry in India also faces changing market conditions and is leveraging
IT for competitive advantage (Kannabiran & Narayan, 2005). Banks there have been
equipped for several years with the technology to offer mobile banking services.
However, the growth of such services has been hampered by the digital divide that per-
sists within various demographic groups in India just as it does in other developing
countries (Ochara & Mawela, 2015); therefore, the Indian government and banks are tar-
geting urban populations as well as the yet untouched rural markets where Internet pen-
etration is low.
McDowell and Lee (2003) argued that simultaneous coverage of rural and urban areas
helps increase penetration and achieve universal coverage (Gao & Rafiq, 2009). Moreover,
mobile banking technology can be useful and inexpensive in rural markets because it does
not require a physical banking facility. However, low literacy levels preclude the possibility
of “rapid widespread” mobile banking adoption in rural India.
Mobile telephony in India has a huge potential with 873 million mobile connections as
of 30 June 2013; approximately 350 million of these are in rural areas. The number of sub-
scribers who access the Internet via mobile phones has grown to approximately 143
million. With a sizeable proportion of households without a bank account (41.3%), and
large numbers of these unbanked residing in villages (as of the 2011 census, only 54.4%
of rural households had access to banking services), mobile banking offers a significant
opportunity for the banking industry to leverage this mobile density.2
According to KPMG (2015), India ranks fifth in the world in terms of its rate of adoption
of mobile banking services, a rate that currently exceeds 50%. In recent years, Indian
mobile banking has reflected a growing trend (albeit in low volume). According to esti-
mates by the Reserve Bank of India (RBI), volume has increased 108.5% (USD 0.88
million in 2012–2013 vis-à-vis USD 0.43 million in 2011–2012). According to the same esti-
mates, value has increased 228.9% (USD 1 billion in 2012–2013 vis-à-vis USD 0.30 billion in
2011–2012). Most Indian banks (such as the State Bank of India, ICICI Bank, and the Indus-
trial Development Bank of India) offer mobile banking services. Customers can now trans-
fer funds to other accounts (within the same bank and to other banks) with a click on their
mobile devices. Banks currently offer this function free of charge. However, customers
must bear any data-related charges. Estimates by RBI showed a significant rise in 2013
in the value of transactions conducted over mobile phones. Almost all major banks
showed a multifold rise in transactions (ICICI Bank: USD 0.55 to USD1.7 billion; HDFC
Bank: USD 0.44 to USD 1.3 billion; Axis Bank: USD 0.19 to USD 0.98 billion; State Bank of
India: USD 0.35 to USD 0.91 billion). However, in terms of number of transactions, the
State Bank of India has emerged as the leader because it accounts for half of all mobile
transactions in the country.3
six more categories. These additional barriers are physical (whether mobile phones are
accessible), cognitive (effort is required to master the use of mobile banking), affective
(attitudes and motivation with regard to the use of systems, such as confidence, efficacy,
and trust), economic (benefits and cost), social (cultural norms), and political (relating to
power and knowledge gaps) (Bouwman, Carlsson, Molina-Castillo, & Walden, 2007).
It should be noted that among the Indian urban population, automated teller machines
(ATMs) and the Internet are easily accessible. Instead of inquiring about the use of mobile
phones for banking transactions, many urban Indians ask if such a thing is really necessary.
Although bill payments are easily made through mobile banking, the average Indian cus-
tomer still pays electric and phone bills offline. In India, the older generation is less tech-
nologically savvy than the younger generation and therefore, reluctant to learn and use
new technology, such as mobile banking. Remembering the publicity surrounding
many fraud cases, these individuals believe that it is easier to conduct transactions on
ATMs or through offline banking services. Therefore, the young metropolitan and urban
populations who are sufficiently technologically savvy are the largest target group for
adoption of mobile banking.
The general argument for using mobile banking is its ubiquity. If a customer runs out of
cash during a transaction, payment can be made through mobile banking. However, to
pay a bill using a mobile phone (and even in Internet banking), a bank account with an
Indian Financial System Code (IFSC) is required. Many potential customers do not even
know such a code exists; furthermore, even if they are knowledgeable and have such a
code, most of them are reluctant to divulge their bank account number out of fear it
will be misused.
As the data in table reveals, most of the barriers to the adoption of mobile banking are
related to difficulty of use and concerns about security. However, the investment in tech-
nological infrastructure has removed a number of technological barriers. In addition,
bankers are addressing the technical complexity problems by educating their customers
and reducing technological hassles. Nevertheless, barriers such as perceived risk and
security concerns persist. Several studies on online banking adoption (e.g. Chen &
Barnes, 2007; Hamlet & Strube, 2000; Hernandez & Mazzon, 2007; Howcroft et al., 2002;
Jo Black et al., 2002; Nui Polatoglu & Ekin, 2001; Sathye, 1999; Tan & Teo, 2000) have reiter-
ated the importance of security risks. They determined that the lack of security is a signifi-
cant obstacle to the adoption of online banking (Safeena, Date, Kammani, & Hundewale,
2012).
2003), the present research defines perceived risk as “the expectation of losses associated
with conducting banking transactions over a mobile phone.”
Any transaction conducted over a mobile phone entails various inherent risks. Chen
(2013) suggested that the perceived risk of using mobile banking is composed of financial,
performance, time, psychological, and privacy risks. As the previous discussion of concerns
demonstrated, most Indians are risk averse when it comes to mobile transactions. There is
a general fear that something may go wrong with the transaction, such as errors or mis-
takes while transferring money or the data-services getting lost in the middle of the trans-
action, and so on. This fear arises from inexperience with online transactions. A fear that a
malevolent person will obtain one’s password also prevails among Indians. A number of e-
commerce studies empirically verified the negative effects of perceived risk on behavioral
intentions to conduct transactions (Budnitz, 1998; Jarvenpaa & Leidner, 1999; Pavlou, 2003;
Pavlou & Gefen, 2004). Consistent with the prior literature, we argue that individuals will be
less likely to adopt mobile banking if they perceive that such transactions involve risks.
Hence, we hypothesize:
H1: Perceived risk negatively affects intention to adopt mobile banking.
Although perceived risk regarding a certain technology may be high, the rate of adoption
can increase if customers feel that they are in control when they use the technology
(Dinev & Hart, 2006; Wang, Lin, & Luarn, 2006; Xu, 2007). Control is considered one of
the factors that determines a privacy state (Dinev & Hart, 2004). Dinev and Hart (2006)
presented control as a condition of the right to withhold information from being
disclosed without one’s consent. The consent requirement gives users control over infor-
mation disclosure. According to Derlega and Chaikin (1977), control is possible by limiting
self-disclosure. Similarly, Stone and Stone (1990) also argued that determining how any
information disclosed will be used gives some control to the person who needs to disclose
the information. Thus, the notion of control is built in whenever one needs to disclose his
or her private information. Moreover, in mobile banking, information regarding bank
accounts, user IDs, and passwords must be disclosed over secure communication net-
works. If there is a lack of control or a perceived lack of control on the disclosure of sensi-
tive information, individuals will refuse to disclose it. Ability to control information is a
concern for both offline and online consumers. Consumers do not like it when their infor-
mation is collected without their consent (Nowak & Phelps, 1995) or when marketers sell
information about them (Nowak & Phelps 1992; Milne, 2000).
Recent studies on privacy have examined control as a construct (e.g. Dinev & Hart, 2006;
Gupta, Xu, & Zhang, 2011; Xu & Gupta, 2009). Dinev and Hart (2004) argued that people
perceive information disclosure as less privacy-intrusive when they believe they will be
able to control future use of their information (Culnan & Armstrong, 1999). Similarly, Xu
and Gupta (2009) argued that those who perceive that they have greater control over
their personal information have more confidence in the performance of the technology.
In applying the concept of control to our study, we defined it as “the perception of an
individual about the possibility of managing his/her own banking transactions through
mobile devices.” In other words, although perceived risk regarding mobile banking may
be high, the rate of adoption will increase if customers feel that they are in control
when using a mobile device (Dinev & Hart, 2006; Wang et al., 2006; Xu, 2007).
134 S. GUPTA ET AL.
Prior research has shown that in general, individuals perceive less risk when they perceive
a higher degree of control (Koller, 1988). Individuals who perceive a higher degree of
control report less perceived risk than those who think they have a lesser degree of
control (Fusilier & Hoyer, 1980). Therefore, in the context of mobile banking, we argue
that individuals perceive mobile banking as less risky when they believe that they have
control over a transaction. In other words, perception of control in a mobile banking trans-
action alleviates individuals’ perceived risk in conducting a transaction. Hence, we
hypothesize:
H3: Perceived control negatively influences perceived risk in conducting transactions over a
mobile phone.
wrong m-pin is entered more than three times, the user ID is locked. This ensures security
against unscrupulous people.
Another way to limit security breaches is to set an upper limit on the transaction amount
that can be transferred over a mobile device. Banks worldwide allow consumers to set a
maximum transaction amount that can be conducted online or through some other
method without face-to-face interaction. For example, banks have set an upper limit on
withdrawals from ATMs to ensure the safety of an account by limiting its vulnerability.
Apart from the limit set by the bank, customers can also set their own transaction limit,
which further ensures the security of transactions. The transaction limit makes consumers
feel secure in conducting transactions using their mobile phones. Thus, transaction limits
increase customers’ perceptions of control and also alleviate their perceived risk of losses
in mobile transactions.
Security can also be ensured by enacting proper legislation that protects consumers in
case transactions are erratic. In India, the Consumer Protection Act of 1986 and Information
Technology Act of 2000 cover transactions conducted over a mobile phone. The former
legislation defined the rights of consumers and is applicable to banking services as well.
The Information Technology Act 2000 requires all electronic documents to be properly auth-
enticated (using a specific technology, in place of a signature). Moreover, any other measure
taken by banks to authenticate users should be approved by law. This would provide
support for a legal redressal to consumers, in case there is a need. With such relevant legis-
lation in place, consumers can seek legal redress for their complaints. Thus, consumers per-
ceive that legislation safeguards them from potential risks in transactions. This in turn
increases their perception of control over their mobile phone transactions.
In summary, each of the above-mentioned security levels (technology controls, trans-
action limits, and legislation) can increase a consumer’s ability to control a transaction
and reduce his or her perceived risk. However, the degrees of perceived risk and
control in the above three approaches differ. The first level of security – i.e. technological
controls, such as authentication and encryption – is most secure because customers
control their authentication details. Without proper authentication and encryption, one
cannot conduct transactions over the Internet or mobile network; therefore, technological
controls are mandatory. However, they are insufficient sometimes because, despite tech-
nological controls being in place, security breaches have occurred through phishing
attacks, malicious hacking, and stolen passwords. The second level of security is defined
by augmenting this first level of security (technological controls) by establishing trans-
action limits. These limits reduce the risk to an amount specified by the customer, bank,
or governing agency. However, this method may likewise be insufficient because to a cus-
tomer, any amount of loss is still a loss. The third level of security occurs through augment-
ing the second level of security – technological controls, plus transaction limits — with
legislative action against security breaches. In case of fraud, a customer can be assured
of legal redress to recover his or her losses. Customers may differ in their perceptions of
the level of risk and control in mobile banking, but ideally, the third level will be seen
as the most secure.
H4: The security level of mobile Internet banking is negatively associated with perceived risk.
H5: The security level of mobile Internet banking is positively associated with perceived
control.
INFORMATION TECHNOLOGY FOR DEVELOPMENT 137
2.3.3. The effect of city type: comparison of metropolitan and urban customers
India is a large country with varying cultural beliefs. Although the mass media have fos-
tered a convergence of beliefs throughout the country, there are still cultural differences
among cities. Metropolitan cities are the early adopters of new ideas and services, which
later percolate to smaller cities. Moreover, people in small cities are not as technologically
savvy as those in large cities; therefore, the pace of technology adoption is slower in small
cities.
The proportion of the population that is urban is an important parameter of the degree
of national development (Skaletsky, Soremekun, & Galliers, 2014 ). The government of
India classifies Indian cities based on population (Omole, 2013). However, this basis of
classification may be inappropriate for the present study because small cities near metro-
polises are also affected by metropolitan culture.
We followed the Goverment of India’s classification of Cities based on 2011 census.5
This classification categorizes cities (urban agglomerations) into mega cities (more than
10 million population), million plus urban agglomerations (1–10 million population), and
Class I urban agglomerations (0.1–1.0 million population). We termed mega cities and
million plus cities as “metropolitan cities” and Class I urban agglomerations as “urban
cities.” Thus, Ahmedabad, Bangalore, Bhopal, Delhi, Chennai, Ahmedabad, Indore, Pune,
Nagpur, Mangalore, Lucknow, Mumbai, and Noida were classified into Metropolitan
Cities and Bhilai, Bilaspur, Raipur, Raigarh, Rajnandgaon, and Raniganj were classified
into Urban cities.
The impact of IT in these city types varies. In metropolitan cities, Internet banking has
deeper penetration and is in a growth phase, but in urban areas, it remains in a nascent
phase. In rural markets, it is still a distant goal because of the lack of information on tech-
nology infrastructure and also because of illiteracy and ignorance of the people regarding
its usefulness. Similarly, mobile banking services are no longer an innovation in metropo-
litan cities, where their diffusion has reached the early adoption stage. However, the adop-
tion of these services still remain at a relatively beginning level in urban areas.
Nevertheless, mobile banking adoption is favorably regarded in these urban markets.
Literature on the effect of demographics for a study such as ours is sparse. A few pio-
neering attempts have been made by demonstrating that the nature and extent of secur-
ity-related perceptions differ across countries or cultures (Dinev et al., 2006a, 2006b; Dinev
& Hart, 2004; Xu & Gupta, 2009). Forman, Ghose, and Goldfarb (2009) examined the effect
of type of city on the benefits of purchasing online, with books as the product. They
argued that offline distance from a store matters and that people veer from online pur-
chasing when a store opens nearby. Forman et al.’s (2009) research has important impli-
cations for our study. In the case of bookstores, people may indeed switch to offline
purchasing if a store opens nearby; however, this behavior may not be the same for
mobile banking. For online bookstores, delivery time is greater than when purchasing
offline, particularly when the store is nearby. However, with mobile banking, product deliv-
ery occurs on the mobile device, and the customer benefits from convenience of place and
time. Despite this convenience, security plays a greater role in the adoption of mobile
banking than in buying books offline. People resist mobile banking because of security
concerns. In large cities, people are more technologically savvy than people in small
cities and are quicker to adopt such services. Moreover, people in large cities have less
138 S. GUPTA ET AL.
discretionary time than residents of small cities, and the convenience of mobile banking
makes them more likely to use it.
Festinger, Schachter, and Back (1950) argued that geography is a natural basis for a
social community and that members of the community from the same geographic
region may share a community identity. According to Wiesenfeld, Raghuram, and Garud
(1999), common geography lowers perceived differences in space and time; it serves as
a major basis for feelings of similarity with other members of the group. In India,
culture varies between large and small cities; the latter have a low rate of penetration
by mobile and Internet commerce. Because customers in large cities are well aware of
the perceived benefits of using the Internet and mobile technology, they are likely to per-
ceive less risk and more control in performing their transactions.
Owing to geographical differences, the various levels of security might be perceived dif-
ferently in their effectiveness at reducing perceived risk and enhancing perceived control.
Thus, type of city serves as a control variable. In metropolitan cities, where technological
savviness and fraud are both common, the different levels of security would apparently be
important for reducing security risk and increasing perceived control. However, in urban
areas, where adoption is less frequent and fraud is less common, people might not per-
ceive transaction limits and legislation as very important to reducing their security risk
and enhancing perceived control. Hence, we hypothesize:
H6: The influence of security levels on perceived risk differs by city type.
H7: The influence of security levels on perceived control differs by city type.
3. Research methodology
The proposed approach supports the testing of causal relationships between constructs
experimentally manipulated by a given scenario and theoretical constructs with
minimal interference from extraneous variables. Accordingly, to test the proposed
research model, we conducted a scenario-based experiment combined with a survey; in
this method, respondents are answering questions based on hypothetical situations
described in each scenario profile. Scenario-based experimentation makes it easier to
operationalize manipulations and permits great control over variables that otherwise
are hard to control (Dong, Evans, & Zou, 2008; Gupta et al., 2011; Kim & Jang, 2014).
Whenever possible, we adapted constructs from measurement scales used in prior
studies to fit the context of this study. Perceived risk was measured by adapting four
items from Dinev and Hart (2006). Items for perceived control (Ajzen, 1991) were
adapted from Xu (2007). Items for intention to adopt were adapted from Dodds,
Monroe, and Grewal (1991). The survey instrument and design is shown in the appendix.
An online survey was used for data collection. For efficiency in data collection, we
adopted snowball sampling (i.e. a sampling procedure in which a researcher selects the
initial respondents, and additional respondents are then obtained from information pro-
vided by the initial respondents) as a type of convenience sampling method (Zikmund,
2003). A separate website was created online, and respondents in the metropolitan and non-
metropolitan (urban) cities of India were invited via email to respond to the survey. The
respondents were reached through the contacts of those who were collecting the data,
and these contacts were further asked to propagate the survey to their friends. Because
INFORMATION TECHNOLOGY FOR DEVELOPMENT 139
the data collectors were young students, the respondents to this survey were primarily
young.
We sought to determine how the progression of the three security levels affects custo-
mer perception and adoption intention. Therefore, we developed three experimental
scenarios about security enhancements – technological controls, transaction limits, and
legislation – that Indian banks are actually implementing. As mentioned earlier during dis-
cussion in the section on the
Role of Security Levels’, RBI requires Indian Banks to ensure appropriate security measures in
banking transactions. Such measures include, ensuring security of transaction channels (such
as using authentication and encryption technologies), taking risk mitigation measures (such as
imposing transaction limits) in case of fraud, and providing legal protection (such as through
legislation) to a fraud victim.
were loaded on the constructs that they were intended to measure. The total variance
explained by perceived risk, perceived control, and intention to adopt was 85.98%. Cron-
bach’s alpha was greater than 0.7 for all constructs. Hence, the reliability and validity of the
constructs were confirmed.
Confirmatory factor analysis was then conducted using linear structural relations
(LISREL). The constructs were first assessed for convergent and discriminant validity by
using the confirmatory factor analysis (Anderson & Gerbing, 1988). As shown in Table 3,
the standardized path loadings for all questions were statistically significant for both data-
sets. The composite reliability and Cronbach’s α for all constructs exceeded 0.7 for both
datasets. Additionally, the average variance extracted for all constructs exceeded 0.5 for
both datasets. Hence, convergent validity for the constructs was established. The measure-
ment items significantly loaded (t-value > 2.0) on the intended construct, which thus
demonstrated convergent validity.
Discriminant validity was established if the square root of the construct’s average var-
iance extracted (AVE) exceeded its correlation with any other construct (Fornell & Larcker,
1981). As shown in Table 4, the square root of AVE for each construct exceeded the cor-
relation between that construct and other constructs. Hence, discriminant validity was
established.
in their perception of risk and control in using mobile banking from customers in urban
cities. The interaction effects were also not significant, which means that H6 and H7
were not supported. In other words, the influence of security levels on perceived risk
and control did not vary with city type.
metropolitan customers, the results reveal that the degree to which they are in control of
their transactions is all that matters; urban customers’ intention to adopt mobile banking is
influenced by both risk and control. These findings are somewhat intuitive because India’s
metropolitan customers are accustomed to working with risky technologies, such as Inter-
net banking. Because of their experience with such technology, they do not mind adopt-
ing mobile banking as long as they can be assured that they have control over their
transactions. Conversely, customers in urban areas have not been exposed to risky tech-
nologies, such as Internet banking, to the extent that customers in metropolitan areas
have. Therefore, in urban areas, the perceived risks of mobile banking remain a significant
barrier to its adoption.
Means plot graphs can be used to further analyze the results of this research and derive
more productive implications from it. An examination of means (Figure 4) reveals that the
means of perceived risk are high when the respondent is unaware of any security levels; it
decreases as security levels increase. Moreover, the means of perceived risk are higher for
metropolitan residents than for residents of urban areas.
Figure 5 shows the means plot for perceived control. Perceived control is low when the
respondent is unaware of any security level; it increases as the respondent becomes aware
Figure 4. Means plot for perceived risk with level of security and type of city.
Note: Level of security (0 – none, 1 – technological controls, 2 – technological controls and transaction limits, 3 – techno-
logical controls, transaction limits, and legislation), type of city (1 – metropolitan, 2 – urban).
Figure 5. Means plot for perceived control with level of security and type of city.
Note: Level of security (0 – none, 1 – technological controls, 2 – technological controls and transaction limits, 3 – techno-
logical controls, transaction limits, and legislation), type of city (1 – metropolitan, 2 – urban).
144 S. GUPTA ET AL.
of the security levels. The influence of type of city on perceived control reveals a different
pattern. Although the difference between them is minor, respondents in urban areas felt
less in control of their transactions than respondents in metropolitan cities did.
their transactions over mobile phones. For customers in urban areas, increased awareness
will lead to adoption of mobile banking percolating downward to smaller cities and ulti-
mately to the rural areas of Indian society. However, as things stand now, people in
urban areas regard mobile banking as risky, which impedes the spread of mobile
banking to villages and rural areas.
As discussed earlier, one widely cited reason for launching mobile banking has been
financial inclusion, particularly of the rural population. Having a branch bank in a rural
area is expensive, and the prospective business volume makes it hard to justify opening
rural branches. Mobile banking is an alternative, but only after a person takes the initiative
to open a bank account to use in mobile banking. Although an average customer in a city
might not perform large number of mobile transactions, mobile banking access would be
very useful for people in rural areas who could use it to obtain bank loans, transferring
sums of money to others’ account, or even receiving money from the government
through the Direct Benefits transfer system (whereby money is transferred into a
person’s bank account). Rural areas are weak in both the awareness and the infrastructure
necessary for mobile banking.
Another area in which mobile banking would be useful is in micro financing. Rural money-
lenders charge high interest rates (sometimes even up to 40%) for small cash loans to the
rural poor. With widespread adoption of mobile banking in rural India, bankers could
easily move into this lending segment to the benefit of both banks and borrowers.
Bankers prefer mobile banking because it transfers the workload from the bank to the
customer and lets the bankers focus on other banking products. Fraud prevention and
tracking serve as additional motives for bankers to promote adoption of mobile
banking. The personal information transmitted in the course of a mobile transaction
makes tracking any fraud cases easier than is the case with online banking.
As the smartphone usage grows in India, mobile banking will penetrate from Tier I to
Tier II and Tier III cities and further into rural areas. The results of this study show that
as individuals become aware of the different levels of security, their perception of risk
decreases and their perception of control increases. The result is an increased acceptance
of mobile banking. Therefore, banks may include these features in their awareness cam-
paigns and promotional brochures.
Notes
1. http://www.business-standard.com/article/finance/mobile-banking-zooms-as-india-gets-
smarter-114081100826_1.html
2. http://www.rbi.org.in/scripts/PublicationReportDetails.aspx?UrlPage=&ID=760
3. http://timesofindia.indiatimes.com/business/india-business/SBI-has-50-share-in-mobile-
banking/articleshow/42477088.cms
4. https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8992#3
5. http://censusindia.gov.in/2011-prov-results/paper2/data_files/India2/1.%20Data%
20Highlight.pdf
6. Indication of good fits is as follows: Normed χ 2 < 3.0, RMSEA < 0.08, AGFI > 0.8, GFI > 0.9, CFI >
0.9, NNFI > 0.9, NFI > 0.9, SRMR < 0.1 (Gefen et al., 2000).
Disclosure statement
No potential conflict of interest was reported by the authors.
INFORMATION TECHNOLOGY FOR DEVELOPMENT 147
Notes on contributors
Sumeet Gupta is currently affiliated to Indian Institute of Management Raipur, India. He received PhD
(Information systems) as well as MBA from National University of Singapore, Singapore. He has
around 10 years of work experience in Industry, Teaching, and Research. He worked as a research
fellow with the Logistics Institute – Asia Pacific, Singapore, on several consultancy projects on
Supply Chain with SAP A.G., DFS Gallerias, ASEAN secretariat, and EDB Singapore. He has also
worked on Government Sponsored Consultancy and Research projects. He has also worked with
reputed firms like Larsen and Toubro Limited. He has been accredited by All India Management
Association as an Accredited Management Teacher. He has published more than 70 papers in
various reputed International journals such as the Decision Support Systems, European Journal of Oper-
ations Research, OMEGA-© – An International Journal of Marketing Science, Psychology and Marketing,
Information, and Management. He has also presented his work in various international conferences
such as ICIS, AMCIS, and AOM. He has also edited a book on Cases in supply chain and distribution
management with IGI Global, Hershey USA. His research interests include information security, elec-
tronic and mobile commerce, RFID and supply chain design, Enterprise Systems adoption and
business analytics.
Haejung Yun is an assistant professor at College of Science & Industry Convergence, Ewha Womans
University, Seoul, Korea. She received her Ph.D. degree in information systems from Graduate School
of Information, Yonsei University. She previous worked for Yonsei University as a research professor
and American University, Washington, DC, as a post-doctoral researcher. Her research interests
include IT service management, information privacy, and mobile business. She has published
papers in International Journal of Electronic Commerce, Journal of Electronic Commerce and Research,
and other international and domestic journals.
Heng Xu is a tenured associate professor of Information Sciences and Technology at the Pennsylva-
nia State University. She received Ph.D. in Information Systems from National University of Singa-
pore. She has authored over 80 research papers on information privacy, security management,
human–computer interaction, and technology innovation adoption. Her award-winning work has
been published in premier outlets across various fields, such as information systems, law, computer
science, and human–computer interaction, including MIS Quarterly, Information Systems Research,
Journal of Management Information Systems, Decision Support Systems, University of Pennsylvania
Journal of Constitutional Law, Proceedings of the International World Wide Web Conference (WWW),
Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI), Proceedings of
the ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW), and
many others. She has been a recipient of an NSF Career award (2010) and the endowed PNC Tech-
nologies Career Development Professorship (2010–2013). She leads the Privacy Assurance Lab (PAL),
an inter-disciplinary research group working on a diverse set of projects related to understanding
and assuring information privacy. She is also the associate director of the Center for Cyber-Security,
Information Privacy and Trust (LIONS Center) at Penn State. Dr Xu is currently on a temporary rotation
as a Program Director at the US National Science Foundation for Secure and Trustworthy Cyberspace
(SaTC) Program in the Directorate for Social, Behavioral, and Economic Sciences.
Hee-Woong Kim is Associate Professor in the Graduate School of Information at Yonsei University,
Seoul Korea. Before joining Yonsei University, he was a faculty member at the National University of
Singapore after spending several years as a senior IS consultant in the banking industry. He has
served on the editorial boards of the Journal of the Association for Information Systems and IEEE Trans-
actions on Engineering Management. His research work has been published in the IEEE Transactions on
Engineering Management, Information Systems Research, Journal of the Association for Information
Systems, Journal of Management Information Systems, Journal of Retailing, and MIS Quarterly.
References
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision
Processes, 50(2), 179–211.
148 S. GUPTA ET AL.
Anderson, C. L., & Agarwal, R. (2010). Practicing safe computing: A multimethod empirical examin-
ation of home computer user security behavioral intentions. MIS Quarterly, 34(3), 613–643.
Anderson, J., & Gerbing, S. (1988). Structural equation modeling in practice: A review and rec-
ommended two-step approach. Psychological Bulletin, 103(3), 411–423.
Armstrong, J. S., & Overton, T. S. (1977). Estimating nonresponse bias in mail surveys. Journal of
Marketing Research, 14(3), 396–402.
Bamoriya, D., & Singh, P. (2012). Mobile banking in India: Barriers in adoption and service preferences.
Journal of Management, 5(1), 1–7.
Bansal, G., & Zahedi, F. M. (2014). Trust-discount tradeoff in three contexts: Frugality, moderating
privacy, and security concerns. Journal of Computer Information Systems, 55(1), 13–29.
Birch, D. G. W. (1999). Mobile financial services: The Internet isn’t the only digital channel to consu-
mers. Journal of Internet Banking and Commerce, 4(1), 20–29.
Bouwman, H., Carlsson, C., Molina-Castillo, F. J., & Walden, P. (2007). Barriers and drivers in the adop-
tion of current and future mobile services in Finland. Telematics and Informatics, 24(2), 145–160.
Budnitz, M. E. (1998). Privacy protection for consumer transactions in electronic commerce: Why self-
regulation is inadequate. South Carolina Law Review, 49, 847–886.
Chen, C. (2013). Perceived risk, usage frequency of mobile banking services. Managing Service Quality:
An International Journal, 23(5), 410–436.
Chen, Y. H., & Barnes, S. (2007). Initial trust and online buyer behaviour. Industrial Management & Data
Systems, 107(1), 21–36.
Chen, Y., & Zahedi, F. M. (2016). Individual’s Internet security perceptions and behaviors:
Polycontextual contrasts between the United States and China. MIS Quarterly, 40(1), 205–222.
Clarke, R. (2001). Person location and person tracking – technologies, risks and policy implications.
Information Technology & People, 14(2), 206–231.
Culnan, M. J., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and imper-
sonal trust: An empirical investigation. Organization Science, 10(1), 104–115.
Dennis, A. R., & Valacich, J. S. (2001). Conducting experimental research in information systems.
Communications of the AIS, 7(5), 1–41.
Derlega, V., & Chaikin, A. (1977). Privacy and self-disclosure in social relationships. Journal of Social
Issues, 33(3), 102–115.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006a). Internet users’ privacy concerns
and beliefs about government surveillance. Journal of Global Information Management, 14(4), 57–
93.
Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006b). Privacy calculus model in e-
commerce – a study of Italy and the United States. European Journal of Information Systems, 15(4),
389–402.
Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents – measurement validity
and a regression model. Behavior and Information Technology, 23(6), 413–422.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions.
Information Systems Research, 17(1), 61–80.
Dodds, W. B., Monroe, K. B., & Grewal, D. (1991). Effects of price, brand, and store information on
buyers’ product evaluations. Journal of Marketing Research, 28(3), 307–319.
Dong, B., Evans, K., & Zou, S. (2008). The effects of customer participation in co-created service recov-
ery. Journal of the Academy of Marketing Science, 36(1), 123–137.
Featherman, M. S., & Pavlou, P. A. (2003). Predicting e-services adoption: A perceived risk facets per-
spective. International Journal of Human-Computer Studies, 59(4), 451–474.
Festinger, L., Schachter, S., & Back, K. W. (1950). Social pressures in informal groups: A study of human
factors in housing B2 – social pressures in informal groups: A study of human factors in housing.
New York, NY: Harper Brothers.
Forman, C., Ghose, A., & Goldfarb, A. (2009). Competition between local and electronic markets: How
the benefit of buying online depends on where you live. Management Science, 55(1), 47–57.
Fornell, C. R., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable vari-
ables and measurement error. Journal of Marketing Research, 18(1), 39–50.
INFORMATION TECHNOLOGY FOR DEVELOPMENT 149
Frolick, M. N., & Chen, L. D. (2004). Assessing M-commerce opportunities. Information Systems
Management, 21(2), 53–61.
Funk, J. L. (2009). The emerging value network in the mobile phone industry: The case of Japan and
its implications for the rest of the world. Telecommunications Policy, 33(1–2), 4–18.
Fusilier, M. R., & Hoyer, W. D. (1980). Variables affecting perceptions of invasion of privacy in a per-
sonnel selection situation. Journal of Applied Psychology, 65(5), 623–626.
Ganesan, S. (1994). Determinants of long-term orientation in buyer–seller relationships. Journal of
Marketing, 58, 1–19.
Gao, P., & Rafiq, A. (2009). The transformation of the mobile telecommunications industry in Pakistan:
A developing country perspective. Telecommunications Policy, 33(5), 309–323.
Gefen, D., Straub, D., & Boudreau, M. (2000). Structural equation modeling techniques and regression:
Guidelines for research practice. Communications of AIS, 4(7), 2–76.
Godoe, H., & Hansen, T. B. (2009). Technological regimes in m-commerce: Convergence as a barrier to
diffusion and entrepreneurship? Telecommunications Policy, 33(1/2), 19–28.
Grameen Foundation. (2013). Use of mobile financial services among poor women in rural India and the
Philippines. Retrieved December 7, 2015, from http://www.gsma.com/connectedwomen/wp-
content/uploads/2014/07/Use-of-Mobile-Financial-Services-Among-Poor-Women-in-Rural-India-
and-the-Philippines.pdf.
Grewal, D., Iyer, G. R., Krishnan, R., & Sharma, A. (2003). The Internet and the price-value-loyalty chain.
Journal of Business Research, 56(5), 391–398.
Gupta, S., Xu, H., & Zhang, X. (2011). Balancing privacy concerns in the adoption of location-based
services: An empirical analysis. International Journal of Electronic Business, 9(1/2), 118–137.
Hamlet, C., & Strube, M. (2000). Community banks go online. ABA Banking Journal’s 2000 White Paper
(March), 92(3), 61–65.
Havlena, W. J., & DeSarbo, W. S. (1991). On the measurement of perceived consumer risk. Decision
Sciences, 22(4), 927–939.
Heres, J., Mante-Meijer, E., & Pires, D. (2004). Factors influencing the adoption of broadband mobile
Internet. In E. Mante-Meijer, & L. Klamer (Eds.), ICT capabilities in action: What people do (pp. 1–248).
Brussels: Cost Action 269.
Hernandez, J. M. C., & Mazzon, J. A. (2007). Adoption of Internet banking: Proposition and implemen-
tation of an integrated methodology approach. International Journal of Bank Marketing, 25(2),
72– 88.
Howcroft, B., Hamilton, R., & Hewer, P. (2002). Consumer attitude and the usage and adoption of
home-based banking in the United Kingdom. International Journal of Bank Marketing, 20(3),
111–121.
ISO/IEC 27000. (2014). Information technology – security techniques – information security manage-
ment systems – overview and vocabulary, Retrieved May, 2016, from http://standards.iso.org/ittf/
PubliclyAvailableStandards/index.html.
Jain, Y. (2013). Mobile banking: A study on adoption and challenges in Southern Rajasthan, India.
International Journal of Innovative Research and Development, 2(4), 902–914.
Jarvenpaa, S. L., & Lang, K. R. (2005). Managing the paradoxes of mobile technology. Information
Systems Management, 22(4), 7–23.
Jarvenpaa, S. L., & Leidner, D. E. (1999). Communication and trust in global virtual teams. Organization
Science, 10(6), 791–815.
Jarvenpaa, S. L., Tractinsky, N., & Vitale, M. (2000). Consumer trust in an Internet store. Information
Technology and Management, 1(12), 45–71.
Jo Black, N., Lockett, A., Ennew, C., Winklhofer, H., & McKechnie, S. (2002). Modelling consumer choice
of distribution channels: An illustration from financial services. International Journal of Bank
Marketing, 20(4), 161–173.
Kannabiran, G., & Narayan, P. (2005). Deploying Internet banking and e-commerce – case study of a
private-sector bank in India. Information Technology for Development, 11(4), 363–379.
Kim, J. H., & Jang, S. S. (2014). A scenario-based experiment and a field study: A comparative
examination for service failure and recovery. International Journal of Hospitality Management,
41, 125–132.
150 S. GUPTA ET AL.
Kim, J. Y., Yuan, X., Kim, S. Y., & Lee, Y. J. (2014). How perceived quality works in New technology adop-
tion process:. Journal of Global Information Management, 22(2), 23–47.
Kleijnen, M., de Ruyter, K., & Wetzels, M. (2004). Consumer adoption of wireless services: Discovering
the rules while playing the game. Journal of Interactive Marketing, 18(2), 51–61.
Koller, M. (1988). Risk as a determinant of trust. Basic and Applied Social Psychology, 9(4), 265–276.
KPMG. (2015). Mobile banking 2015. Retrieved December 7, 2015, from https://www.kpmg.com/UK/
en/IssuesAndInsights/ArticlesPublications/Documents/PDF/mobile-banking-report-2015.pdf.
Luo, X., Lee, C. P., Mattila, M., & Liu, L. (2012). An exploratory study of mobile banking services resist-
ance. International Journal of Mobile Communications, 10(4), 366–385.
Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC):
The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.
Mallat, N., & Tuunainen, V. K. (2008). Exploring merchant adoption of mobile payment systems: An
empirical study. E-Service Journal, 6(2), 24–57.
Massoud, S., & Gupta, O. K. (2003). Consumer perception and attitude toward mobile communication.
International Journal of Mobile Communications, 1(4), 390–408.
Mathieson, K. (1991). Predicting user intentions: Comparing the technology acceptance model with
the theory of planned behavior. Information Systems Research, 2(3 September), 173–191.
McDowell, S., & Lee, J. (2003). India’s experiments in mobile licensing. Telecommunications Policy, 27
(5), 371–382.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for
e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.
Milne, G. R. (2000). Privacy and ethical issues in database/interactive marketing and public policy: A
research framework and overview of the special issue. Journal of Public Policy & Marketing, 19(1),
1–6.
Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why consumers read
(or Don’t read) online privacy notices. Journal of Interactive Marketing, 18(3), 15–29.
Mishra, V., & Singh Bisht, S. (2013). Mobile banking in a developing economy: A customer-centric
model for policy formulation. Telecommunications Policy, 37(6), 503–514.
Moon, Y. (2000). Intimate exchanges: Using computers to elicit self-disclosure from consumers.
Journal of Consumer Research, 26(4), 323–339.
Mwangi, B. J., & Brown, I. (2015). A decision model of Kenyan SMEs’ consumer choice behavior in
relation to registration for a mobile banking service: A contextual perspective. Information
Technology for Development, 21(2), 229–252.
Nowak, G. J., & Phelps, J. (1992). Understanding privacy concerns. An assessment of consumers’ infor-
mation‐related knowledge and beliefs. Journal of Direct Marketing, 6(4), 28–39.
Nowak, G. J., & Phelps, J. (1995). Direct marketing and the use of individual-level consumer infor-
mation: Determining how and when “privacy” matters. Journal of Direct Marketing, 9(3), 46–60.
Nui Polatoglu, V. N., & Ekin, S. (2001). An empirical investigation of the Turkish consumers’ acceptance
of Internet banking services. International Journal of Bank Marketing, 19(4), 156–165.
Ochara, N. M., & Mawela, T. (2015). Enabling social sustainability of e-participation through mobile
technology. Information Technology for Development, 21(2), 205–228.
Omole, D. W. (2013). Harnessing information and communication technologies (ICTs) to address
urban poverty: Emerging open policy lessons for the open knowledge economy. Information
Technology for Development, 19(1), 86–96.
Pagani, M. (2004). Determinants of adoption of third generation mobile multimedia services. Journal
of Interactive Marketing, 18(3), 46–59.
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the
technology acceptance model. International Journal of Electronic Commerce, 7(3), 69–103.
Pavlou, P. A., & Fygenson, M. (2006). Understanding and predicting electronic commerce adoption:
An extension of the theory of planned behavior. MIS Quarterly, 30(1), 115–143.
Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust.
Information Systems Research, 15(1), 37–59.
Peter, J. P., & Tarpey, S. L. X. (1975). A comparative analysis of three consumer decision strategies.
Journal of Consumer Research, 2(1), 29–37.
INFORMATION TECHNOLOGY FOR DEVELOPMENT 151
Pick, J. B., Gollakota, K., & Singh, M. (2014). Technology for development: Understanding influences
on use of rural telecenters in India. Information Technology for Development, 20(4), 296–323.
Porteous, D. (2007). Just how transformational is m-banking? Commissioned by Finmark. Retrieved
November 30, 2016, from http://www.finmarktrust.org.za/accessfrontier/Documents/
transformational_mbanking.
Rangaswamy, N., & Nair, S. (2012). The PC in an Indian urban slum: Enterprise and entrepreneurship in
ICT4D 2.0. Information Technology for Development, 18(2), 163–180.
Ratha, N. K., Connell, J. H., & Bolle, R. M. (2001). Enhancing security and privacy in biometrics-based
authentication systems. IBM Systems Journal, 40(3), 614–634.
Safeena, R., Date, H., Kammani, A., & Hundewale, N. (2012). Technology adoption and Indian consu-
mers: Study on mobile banking. International Journal of Computer Theory and Engineering, 4(6),
1020–1024.
Sathye, M. (1999). Adoption of Internet banking by Australian consumers: An empirical investigation.
International Journal of Bank Marketing, 17(7), 324–334.
Shaikh, A. A., & Karjaluoto, H. (2015). Mobile banking adoption: A literature review. Telematics and
Informatics, 32(1), 129–142.
Skaletsky, M., Soremekun, O., & Galliers, R. D. (2014). The changing – and unchanging – face of the
digital divide: An application of Kohonen self-organizing maps. Information Technology for
Development, 20(3), 218–250.
Stone, E. F., & Stone, D. L. (1990). Privacy in organizations: Theoretical issues, research findings, and
protection mechanisms. In K. M. Rowland & G. R. Ferris (Eds.), Research in personnel and human
resources management (Vol. 8, pp. 349–411). Greenwich, CT: JAI Press.
Sweeney, J. C., Soutar, G. N., & Johnson, L. W. (1999). The role of perceived risk in the quality–value
relationship: A study in a retail environment. Journal of Retailing, 75(1), 77–105.
Tan, M., & Teo, T. S. H. (2000). Factors influencing the adoption of Internet banking. Journal of the AIS,
1(5), 1–42.
Taylor, S., & Todd, P. T. (1995). Understanding information technology usage: A test of competing
models. Information Systems Research, 6(2), 144–176.
Vrechoupoulos, A., Constantiou, I., Sideris, I., Doukidis, G., & Mylonopoulos, N. (2003). The critical role
of consumer behaviour research in mobile commerce. International Journal of Mobile
Communications, 1(3), 329–340.
Wang, Y. S., Lin, H. H., & Luarn, P. (2006). Predicting consumer intention to use mobile service.
Information Systems Journal, 16(2), 157–179.
Wiesenfeld, B. M., Raghuram, S., & Garud, R. (1999). Communication patterns as determinants of
organizational identification in a virtual organization. Organization Science, 10(6), 777–790.
Xu, H. (2007). The effects of self-construal and perceived control on privacy concerns. Paper presented at
the Proceedings of the 28th Annual International Conference on Information Systems (ICIS 2007),
Montréal, Canada.
Xu, H., & Gupta, S. (2009). The effects of privacy concerns and personal innovativeness on potential
and experienced customers’ adoption of location-based services. Electronic Markets, 19(2), 137–
149.
Yates, J. F., & Stone, E. R. (1992). Risk appraisal. In J. F. Yates (Ed.), Risk-taking behavior (pp. 49–85).
Chichester: John Wiley & Sons.
Zikmund, W. G. (2003). Business research methods (7th ed). Thompson: South-Western.
152 S. GUPTA ET AL.
Survey instrument