CFP last date
20 December 2024
Reseach Article

An Exploratory Study of Mobile App Use by Financial Institutions: Cybersecurity Perspective

by Olumide Bashiru Abiola
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 8
Year of Publication: 2023
Authors: Olumide Bashiru Abiola
10.5120/ijca2023922737

Olumide Bashiru Abiola . An Exploratory Study of Mobile App Use by Financial Institutions: Cybersecurity Perspective. International Journal of Computer Applications. 185, 8 ( May 2023), 27-31. DOI=10.5120/ijca2023922737

@article{ 10.5120/ijca2023922737,
author = { Olumide Bashiru Abiola },
title = { An Exploratory Study of Mobile App Use by Financial Institutions: Cybersecurity Perspective },
journal = { International Journal of Computer Applications },
issue_date = { May 2023 },
volume = { 185 },
number = { 8 },
month = { May },
year = { 2023 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number8/32723-2023922737/ },
doi = { 10.5120/ijca2023922737 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:28:56.040419+05:30
%A Olumide Bashiru Abiola
%T An Exploratory Study of Mobile App Use by Financial Institutions: Cybersecurity Perspective
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 8
%P 27-31
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The ability of Internet technology has changed the mode of financial transactions in recent times whereby most bank transactions are now carried out via mobile apps. The nature of the transaction has also changed the financial processes which has led to an unparalleled improvement in the support given by different banks. Nonetheless, considering the volume of digital-related transactions that take place today, particularly with mobile Internet banking systems, cybersecurity vulnerabilities, and privacy are jeopardized using a mobile app for financial transactions, resulting in bank customers’ vulnerability. The confidentiality and integrity of bank customers’ information while using mobile banking apps are negatively impacted by the effects of cybersecurity threats. Once more, the feeling of cybersecurity vulnerability interferes with users' decision-making over the use of mobile banking apps. In this study, efforts are exerted to explore existing literature on mobile app use by financial institutions and to examine how internet cybersecurity threats may impact customers’ belief in the use of mobile apps. The results of this study revealed that bank security management and guidance had a positive impact on financial institutions’ staff while using mobile apps for financial transactions. Similarly, it has been found that security management and guidance benefit staff members of financial institutions who use mobile apps for work-related objectives. As a result, it can be inferred that security management and guidance influence behavioral intent to utilize mobile apps. Furthermore, decision-makers at banks should consider these findings when determining how to construct future mobile app infrastructure.

References
  1. Ab Hamid, M.R., Sami, W. and Sidek, M.M., 2017, September. Discriminant validity assessment: Use of Fornell & Larcker criterion versus HTMT criterion. In Journal of Physics: Conference Series (Vol. 890, No. 1, p. 012163). IOP Publishing.
  2. Alam, A., 2022. Platform Utilizing Blockchain Technology for eLearning and Online Education for Open Sharing of Academic Proficiency and Progress Records. In Smart Data Intelligence: Proceedings of ICSMDI 2022 (pp. 307-320). Singapore: Springer Nature Singapore.
  3. Alkahtani, H. and Aldhyani, T.H., 2022. Artificial intelligence algorithms for malware detection in Android-operated mobile devices. Sensors, 22(6), p.2268.
  4. Al-Maroof, R.A.S. and Al-Emran, M., 2018. Students’ acceptance of google classroom: An exploratory study using PLS-SEM approach. International Journal of Emerging Technologies in Learning (Online), 13(6), p.112.
  5. Araujo, F. and Taylor, T., 2020, November. Improving cybersecurity hygiene through JIT patching. In Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 1421-1432).
  6. Barlow, M.A., Verhaal, J.C. and Angus, R.W., 2019. Optimal distinctiveness, strategic categorization, and product market entry on the Google Play app platform. Strategic Management Journal, 40(8), pp.1219-1242.
  7. Bećirović, S., 2023. Privacy and Personal Data Protection in Digital Pedagogy. In Digital Pedagogy: The Use of Digital Technologies in Contemporary Education (pp. 83-96). Singapore: Springer Nature Singapore.
  8. Benner, D., Schöbel, S.M., Janson, A. and Leimeister, J.M., 2022. How to Achieve Ethical Persuasive Design: A Review and Theoretical Propositions for Information Systems. AIS Transactions on Human-Computer Interaction, 14(4), pp.548-577.
  9. Can, U. and Alatas, B., 2019. A new direction in social network analysis: Online social network analysis problems and applications. Physica A: Statistical Mechanics and its Applications, 535, p.122372.
  10. De Cremer, P., Desmet, N., Madou, M. and De Sutter, B., 2020. Sensei: Enforcing secure coding guidelines in the integrated development environment. Software: Practice and Experience, 50(9), pp.1682-1718.
  11. Etim, O., Fidelis, O. and Archibong, E., 2022. Spiritual Accounting and Corporate Financial Reporting: A Study of Micro Finance Banks in Delta State, Nigeria. Journal of Accounting and Financial Management, 8(4), pp.173-180.
  12. Festus, A.F., Kazeem, K.O. and Ayodeji, O.B., 2020. Information and communication technology and sustainable performance of selected listed deposits money banks in Lagos State, Nigeria. Int. J. Sustain. Manag. Inf. Technol, 6(1), p.18.
  13. Florido-Benítez, L., 2022. International mobile marketing: A satisfactory concept for companies and users in times of pandemic. Benchmarking: An International Journal, 29(6), pp.1826-1856.
  14. Fonseca-Herrera, O.A., Rojas, A.E. and Florez, H., 2021. A model of an information security management system based on NTC-ISO/IEC 27001 standard. IAENG Int. J. Comput. Sci, 48(2), pp.213-222.
  15. Hanif, Y. and Lallie, H.S., 2021. Security factors on the intention to use mobile banking applications in the UK older generation (55+). A mixed-method study using modified UTAUT and MTAM-with perceived cyber security, risk, and trust. Technology in Society, 67, p.101693.
  16. Hintemann, R., 2020. Efficiency Gains are Not Enough: Data Center Energy Consumption Continues to Rise Significantly. Borderstep Inst. für Innovation und Nachhaltigkeit gGmbH.
  17. Karanfiloğlu, M, Sağlam, M. and Topsumer, F., Advertisement Perception and Generations: Comparison between X, Y, and Z Generations. İletişim Kuram ve Araştırma Dergisi, 2022(58), pp.38-56.
  18. Kolasinski, S.L., Neogi, T., Hochberg, M.C., Oatis, C., Guyatt, G., Block, J., Callahan, L., Copenhaver, C., Dodge, C., Felson, D. and Gellar, K., 2020. 2019 American College of Rheumatology/Arthritis Foundation guideline for the management of osteoarthritis of the hand, hip, and knee. Arthritis & Rheumatology, 72(2), pp.220-233.
  19. Kumatongo, B. and Muzata, K.K., 2021. Research paradigms and designs with their application in education. Journal of Lexicography and Terminology (Online ISSN 2664-0899. Print ISSN 2517-9306)., 5(1), pp.16-32.
  20. Kuttal, S.K., Bai, Y., Scott, E. and Sharma, R., 2020. Tug of Perspectives: Mobile App Users vs Developers. International Journal of Computer Science and Information Security (IJCSIS), 18(6).
  21. Lerner, A., 2021. Analyzing Holocaust archives through a quantitative lens. In The Routledge Handbook of Religion, Mass Atrocity, and Genocide (pp. 443-459). Routledge.
  22. Rogers, Y., Sharp, H. and Preece, J., 2023. Interaction design: beyond human-computer interaction. John Wiley & Sons.
  23. Sandhu, A.K. and Batth, R.S., 2021. Software reuse analytics using integrated random forest and gradient boosting machine learning algorithm. Software: Practice and Experience, 51(4), pp.735-747.
  24. Sharma, S., 2019. Data privacy and GDPR handbook. John Wiley & Sons.
  25. Stonehouse, G.H. and Konina, N.Y., 2020, February. Management challenges in the age of digital disruption. In 1st International Conference on Emerging Trends and Challenges in the Management Theory and Practice (ETCMTP 2019) (pp. 1-6). Atlantis Press.
  26. Weichbroth, P., 2020. Usability of mobile applications: a systematic literature study. IEEE Access, 8, pp.55563-55577.
  27. Yusoff, A.S.M., Peng, F.S., Abd Razak, F.Z. and Mustafa, W.A., 2020, April. Discriminant validity assessment of religious teacher acceptance: The use of HTMT criterion. In Journal of Physics: Conference Series (Vol. 1529, No. 4, p. 042045). IOP Publishing.
  28. Zewude, B. and Habtegiorgis, T., 2021. Willingness to take COVID-19 vaccine among people most at risk of exposure in Southern Ethiopia. Pragmatic and observational research, pp.37-47.
Index Terms

Computer Science
Information Sciences

Keywords

A mobile app financial institution cybersecurity.