Abstract:This research paper examined the continued intention of college students to use DiDi mobile car-sharing services in China. The unified theory of acceptance and use of technology (UTAUT) was used as the theoretical framework while the data analysis was completed with SPSS. The results have demonstrated that performance expectancy, reliability, efficiency, and security and privacy were significant predictors of the continued intention to use mobile car-sharing services. Contrary to our expectations, effort expec… Show more
“…Wang et al, 2016; Zimmermann & Gerber, 2020) due to rise in an online scam to highlight the challenges connected to the present “authentication schemes,” while others proposed a framework for m-banking verification (Abo-Zahhad et al, 2014; Aithal, 2015; Alhothaily et al, 2018; Basar et al, 2019; Chen et al, 2017; Karim et al, 2020; Nagaraju & Parthiban, 2015; Soviany et al, 2016; Thomas & Goudar, 2018). Similarly, some of the included articles examined m-banking safety and secrecy in general (Cavus et al, 2021; Laukkanen, 2016; Liao et al, 2020; Malaquias & Hwang, 2016, 2019; Mensah et al, 2019; Sharma & Sharma, 2019; Tandon et al, 2018; Thakur & Srivastava, 2015; Y. Wang et al, 2016; Yang et al, 2015).…”
Expediency and suppleness were the main reasons for customers’ patronage of m-banking apps. However, data stored or transmitted in these apps are susceptible to different attacks, threats, and risks. Thus, the need for robust safety mechanisms to cope with these security and privacy challenges. The purpose of this research is to examine the different components of m-banking security that merit investigation, and the vulnerability of present authentication methods in order to propose a more robust verification technique. PRISMA preferred items reporting for Systematic Review and Meta-Analyses approach was used in this study. Six databases were utilized; IEEE-Explore, Scopus, EBSCOhost, Taylor & Francis, ScienceDirect, and Web of Science. About 1,149 articles were extracted from these databases out of which 38 articles met the review selection criteria, thus included in the review. Findings of the study highlight the efficacy of PRISMA method with regard to items reporting and identification of research gaps compared to the usual literature review. Also, the results of the study found intrusion via other apps stored on mobile devices, and device lost or theft were the main safety and privacy issues. Furthermore, the study findings discovered that the present authentication schemes used by banks are becoming weak and open to various attacks due to an increase in online fraud. Based on the review findings, an Artificial Intelligence-based user authentication and anomalies detection model was proposed which may provide direction for upcoming studies. Also, banks and other financial institutions can use the review results to improve m-banking security.
“…Wang et al, 2016; Zimmermann & Gerber, 2020) due to rise in an online scam to highlight the challenges connected to the present “authentication schemes,” while others proposed a framework for m-banking verification (Abo-Zahhad et al, 2014; Aithal, 2015; Alhothaily et al, 2018; Basar et al, 2019; Chen et al, 2017; Karim et al, 2020; Nagaraju & Parthiban, 2015; Soviany et al, 2016; Thomas & Goudar, 2018). Similarly, some of the included articles examined m-banking safety and secrecy in general (Cavus et al, 2021; Laukkanen, 2016; Liao et al, 2020; Malaquias & Hwang, 2016, 2019; Mensah et al, 2019; Sharma & Sharma, 2019; Tandon et al, 2018; Thakur & Srivastava, 2015; Y. Wang et al, 2016; Yang et al, 2015).…”
Expediency and suppleness were the main reasons for customers’ patronage of m-banking apps. However, data stored or transmitted in these apps are susceptible to different attacks, threats, and risks. Thus, the need for robust safety mechanisms to cope with these security and privacy challenges. The purpose of this research is to examine the different components of m-banking security that merit investigation, and the vulnerability of present authentication methods in order to propose a more robust verification technique. PRISMA preferred items reporting for Systematic Review and Meta-Analyses approach was used in this study. Six databases were utilized; IEEE-Explore, Scopus, EBSCOhost, Taylor & Francis, ScienceDirect, and Web of Science. About 1,149 articles were extracted from these databases out of which 38 articles met the review selection criteria, thus included in the review. Findings of the study highlight the efficacy of PRISMA method with regard to items reporting and identification of research gaps compared to the usual literature review. Also, the results of the study found intrusion via other apps stored on mobile devices, and device lost or theft were the main safety and privacy issues. Furthermore, the study findings discovered that the present authentication schemes used by banks are becoming weak and open to various attacks due to an increase in online fraud. Based on the review findings, an Artificial Intelligence-based user authentication and anomalies detection model was proposed which may provide direction for upcoming studies. Also, banks and other financial institutions can use the review results to improve m-banking security.
“…(2016); eWOM was from Awad and Ragowsky (2008); and behavioral intention was from Morosan and DeFranco (2016) and Mensah et al. (2019). All the items were rated on a 7‐point Likert scale, as is apt for explanatory research (Joshi et al., 2015; McDaniel & Gates, 2018).…”
Section: Methodsmentioning
confidence: 99%
“…The literature has widely identified performance expectancy, effort expectancy, subjective norms, and perceived risk as the main variables of the modified Unified Theory of Acceptance and Use of Technology (UTAUT) model (Mensah et al., 2019; Ooi et al., 2020; Shao et al., 2020). Notwithstanding the numerous studies that have analyzed the factors affecting consumers’ usage intention toward a technology, little is known about the antecedents of on‐demand digital platform adoption (Delgosha & Hajiheydari, 2020; Shao et al., 2020; Yapp et al., 2018).…”
On‐demand digital platforms are omnipresent in the contemporary marketplace of the digital era. The purpose of this study was to assess the factors influencing consumers’ intention to adopt on‐demand digital platforms in the context of a developing country. Based on a modified integration of the unified theory of acceptance and use of technology (UTAUT) and the social influence theory, this study contended that electronic word‐of‐mouth (eWOM) about on‐demand digital platforms shapes consumers' perceived risk and subjective norms, which, along with the other elements of UTAUT, influence their intention to use on‐demand digital platforms. A self‐administered questionnaire was developed and distributed online, yielding a total of 226 responses, which were analyzed using partial least squares structural equation modelling. The findings revealed that performance expectancy, effort expectancy, subjective norms, and perceived risk significantly affect consumers’ intention, wherein eWOM reduces perceived risk and shapes subjective norms to adopt on‐demand digital platforms. Therefore, this study contributes to the literature on consumer adoption of new‐age digital products, and in this case, on‐demand digital platforms, with implications for theory and practice in this space.
“…They highlighted that the commercial sharing domain requires a consideration of perceived product scarcity risk due to rivalry for the shared products such as shared cars. Mensah et al (2019) found that customers' security and privacy protection is an important contributing factor in the engagement with any online service provision or technology. Jing et al (2019) found that perceived risk had a negative impact on behavioral intention to use shared autonomous behavior.…”
Section: ) Individual Factorsmentioning
confidence: 99%
“…Joseph F Hair et al (2006) suggested structure equation modeling (SEM) for analyzing dependent relationships with multiple relationships of dependent and independent variables. Moreover, SEM is widely used for examining the relationships of the variables in TAM model (Barnes & Mattsson, 2017;Fleury et al, 2017;H.Kim et al, 2017;Mensah et al, 2019) .…”
This thesis aimed to examine factors influencing adoption and usage probability of car sharing in Bangkok. There were two phases of study. The first phase was examining the factors influencing the probability of using of car sharing. The latter was designed to assess customers’ attitudes toward the intention to use car sharing. Both studies employed a quantitative method of data collection and analysis. Study One assessed the likelihood of using car sharing from customers’ characteristics in three main groups: socio-economic status, travel behavior and car-sharing preferences. The data were collected through a questionnaire with the target population group. In total, there were 612 observations. Then, the data were analyzed using descriptive statistics and multiple linear regression analysis under the concept of logistic regression. Through multiple linear regression analysis, the results indicated that the respondents’ socio-economic status did not affect the probability of car-sharing adoption. However, travel behavior and car-sharing preferences affected the probability of car-sharing adoption. Study Two investigated latent attitudes influencing the users’ intention to use car sharing. This study utilized an extended technology acceptance framework with four external variables: personal innovativeness (PI), environmental concern (EC), social influence (SI) and perceived risk (PR). Similarly, the survey was conducted to collect the data from target population group. In total, 505 participants completed the questionnaire. Confirmatory factor analysis (CFA) and structural equation model (SEM) techniques were adopted for data analysis. The results did not confirm the original TAM since a relationship was not found between perceived ease of use (PEOU) and attitude toward car sharing (ATT). However, the results supported that all four external variables influenced the intention to use car sharing.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.