2010
DOI: 10.1080/1097198x.2010.10856519
|View full text |Cite
|
Sign up to set email alerts
|

An Online Banking Security Framework and a Cross-Cultural Comparison

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0
6

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 15 publications
0
6
0
6
Order By: Relevance
“…Many ICT products or services have become necessities of everyday life. The effectiveness and efficiency of ICT deployment and use are influenced by national (Al-Ghatani, 2003;Erumban & de Jong, 2006;Straub, 1994;Taras, Steel, & Kirkman, 2011, 2012 and organizational cultures (Cao & Everard, 2008;Lim, Yeow, & Yuen, 2010;Schiller & Cui, 2010). National cultures even play significant roles in the development of national information infrastructure (Apfelthaler, Muller, & Rehder, 2002;Dimitratos, Petrou, Plakoyiannaki, & Johnson, 2011;Garfield & Watson, 1998;Ralston, Hallinger, Egri, & Naothinsuhk, 2005).…”
Section: Introductionmentioning
confidence: 98%
“…Many ICT products or services have become necessities of everyday life. The effectiveness and efficiency of ICT deployment and use are influenced by national (Al-Ghatani, 2003;Erumban & de Jong, 2006;Straub, 1994;Taras, Steel, & Kirkman, 2011, 2012 and organizational cultures (Cao & Everard, 2008;Lim, Yeow, & Yuen, 2010;Schiller & Cui, 2010). National cultures even play significant roles in the development of national information infrastructure (Apfelthaler, Muller, & Rehder, 2002;Dimitratos, Petrou, Plakoyiannaki, & Johnson, 2011;Garfield & Watson, 1998;Ralston, Hallinger, Egri, & Naothinsuhk, 2005).…”
Section: Introductionmentioning
confidence: 98%
“…Prior cross-cultural work in security has focused on comparisons between two countries (often the US vs. another country). Topics covered include enterprise security [61], Internet buying behavior [62], online banking security [63], [64], privacy beliefs [51], and, in one case, general mental models [65]. A smaller set of papers has examined aspects of security across larger number of countries [50], [66]- [69].…”
Section: Related Workmentioning
confidence: 99%
“…Entretanto, apesar da conveniência e comodidade proporcionadas pelo Internet Banking, muitas pessoas têm receio de utilizar esse canal para realizar suas transações bancárias e a sua adoção está abaixo das expectativas (Dumicic;Casni & Palic, 2015;Aboobucker & Bao, 2018). Para que os usuários adotem o Internet Banking, é necessário haver confiança, mas o fato de envolver dados pessoais e de não haver um contato físico faz com que muitos usuários evitem a sua adoção (Lim, Yeow & Yuen, 2010;Aboobucker & Bao, 2018).…”
unclassified
“…No caso do Internet Banking, Munõz-Leiva et al (2010), apontam que a divulgação de informações sobre a conformidade do banco com as leis e comentários de outros clientes disponíveis no site do banco podem aumentar a confiança dos clientes, especialmente quando acompanhadas de informações sobre medidas de segurança e garantias de devolução. Lim et al (2010), também ressaltam que a fim de mostrar que possuem um canal de Internet Banking seguro, os bancos devem se preocupar com as informações sobre segurança que eles divulgam nos seus sites. Os autores desenvolveram um framework com 25 itens relacionados à segurança do Internet Banking que deveriam ser evidenciados pelos bancos.…”
unclassified
See 1 more Smart Citation