Perceived Security Trust Indicator in Adoption of Internet Banking in Developing Country An Empirical Study
Perceived Security Trust Indicator in Adoption of Internet Banking in Developing Country An Empirical Study
Perceived Security Trust Indicator in Adoption of Internet Banking in Developing Country An Empirical Study
Perceived Security as
Trust Indicator in Adoption
of Internet Banking in a
Developing Country:
An Empirical Study
Mamta Sareen, University of Delhi, Delhi, India
ABSTRACT
Internet Banking is becoming an important channel for banks to deliver banking services to their custom-
ers. In view of the potential benefits of Internet banking, banks are making heavy investments in building
infrastructures, to offer to their customer’s facilities for transacting with the bank online. While the Internet
technology holds the potential to fundamentally change banks and the banking industry, it is still haunted by
low rate of adoption by bank customers due to perceived risks in transacting in the virtual environment of
Internet. This study makes a modest attempt to find the various factors/components of security that influences
the user’s security perception which in turn acts like a trust indicator towards adoption of Internet banking
and proposes a research model for the same. This paper presents the empirical validation of the research
model proposed through a survey of 107 internet banking users.
INTRODUCTION
Continued and advanced innovations in Internet technologies have made sophisticated applications
economically feasible. However, because of the low rate of adoption among the users, many of
such applications are unable to justify the investment made to build the required infrastructure
for such technological applications. Banking, being an information intensive activity, has been
quick in adopting Information Technology (IT) and especially Internet in almost all its opera-
tions. Banks use Internet as the delivery channel to conduct its various banking activities such
as transferring funds, paying bills, viewing current and savings account balances, etc. (Haque
et al, 2009) and this activity is termed as Internet banking or online banking. Internet Bank-
DOI: 10.4018/IJSITA.2015070103
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
36 International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015
ing is becoming an important channel for banks to deliver banking services to their customers
(Christopher et al, 2006). The proponents of Internet banking believe that it offers convenience
to customers and enhanced efficiency to bankers. From the perspective of the customer, the
customer is not bound by operational timings, there are reduced geographical barriers, the
speed of execution of transaction is high and the payment and other services can be obtained at
a minuscule cost (IAMAI’s, 2006). From the perspective of a bank, Internet banking helps in
reducing not only the cost of servicing the customers (Mittal et al., 2004; Berger, 2003) but also
has greatly contributed in reducing the cost per transaction (Orr, 1999). In view of the potential
benefits of Internet banking, banks are making heavy investments in building infrastructures,
to offer to their customer’s facilities for transacting with the bank online. While the Internet
technology holds the potential to fundamentally change banks and the banking industry, it is
still haunted by low rate of adoption by bank customers due to perceived risks in transacting in
the virtual environment of Internet.
Despite the benefits of internet banking, the use of an electronic medium makes it difficult
for banks to acquire consumer trust (Meuter, Ostrom, Roundtree & Bitner, 2000). Lack of trust
in the faceless, virtual environment of Internet banking, (Floh & Triebllmaier, 2006), makes it all
the more important to understand the determinants of trust affecting its adoption. Another factor
commonly cited as an impediment in the adoption of Internet banking is the user’s perception
of security. Analyzing the various factors that help in developing a user’s perception regarding
security its subsequent impact on trust provides a pathway to study the role of security in trust
development. Although there is a plethora of research on both these factors, there is little mate-
rial that focuses them together in a comprehensive manner, and particularly, in online banking
(McCole, 2002). This study makes a modest attempt in this direction and tries to find the various
factors/components of security that influences the user’s security perception which in turn acts
like a trust indicator towards adoption of Internet banking.
• Identifying the trust inducing security components that have the potential to impact the
perceptions regarding security and there by influencing the Internet banking adoption.
• Examining the applicability of Technology Acceptance Model (TAM) in Internet banking
adoption.
• Developing a model that explains the customers’ perceptions towards Internet banking.
Based on the existing literature, the author formulated various constructs for the proposed
model to be empirically validated. These constructs include adoption, trusting beliefs, disposition
to trust and bank’s perceived security and its associated components like integrity and reliability,
authentication and authorization, privacy and confidentiality, security practices, structural as-
surances, security related service quality and security related benevolent policies are described
in the following sections.
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015 37
Perceived Security
Internet banking security is one of the important future challenges for banks to mitigate the fear
and risks perceived by customers who use the Web for financial transactions (Cunningham,
2003). Operationalization of perceived security is based on Ratnasingham’s (1998) definition of
e-commerce security, as protection from the threats and risks of transactional integrity, authenti-
cation, and authorization. Perception of security is described as a subjective belief of a user that
their communication with the systems is protected from all potential threats (Ally & Toleman,
2005). Operationalization of perceived privacy is based on the dimensions of awareness of
information collection, information usage, access, and enforcement (Chellappa, 2003). A major
concern about virtual security is one common reason why consumers are unwilling to use Internet
banking services (Madu, 2002). Most customers are not comfortable with the infrastructure of
Web security systems (Black, Lockett, Winkhofer, and Ennew, 2001). Liao and Wong (2007)
argue that perceived security has a positive effect on customers‟ relationships with e-banking.
Furthermore, Sathye (1999), Liao and Cheung (2002) show that the more secure that consum-
ers perceive Internet banking to be, the more likely the consumers are to use Internet banking.
Internet banking is often cited as risky decision because technology-enabled services exhibit
pervasive technological breakdown, unfamiliar and ambiguous stimuli. In addition, security
violation can lead to various problems such as destruction of operating systems, disruption of
information access, or intrusion of the customer’s accounts (Min and Galle, 1999). In Liao &
Cheung (2002)’s study, perceived security was rated to be of high importance by users of online
banking systems. Based on the literature review, this study has indentified certain security related
components that have the potential to influence the user’s perception regarding security of the
Internet banking site. These include integrity and reliability, authentication and authorization,
privacy and confidentiality, security practices, and structural assurances.
During and after exchange of information, the content should remain unchanged and should be
tamper free. This covers both accidental and intentional damage to information data (Grandison
& Sloman, 2000). Ally & Toleman (2005), state integrity ensures that messages that are not
created, modified, interception or deleted by unauthorized people. The information required by
users should be accessible when required by them. This ensures that the system is reliable (Mai-
jala, 2004) and authorized personnel can access the services of an application within a desired
time frame (Knorr & Röhrig, 2000). The author would primarily test the following hypotheses:
H1a: Integrity and reliability positively affects a user’s perception of security with respect to
adoption of Internet banking.
Traditionally authentication deals with verification of parties who are communicating to guar-
antee that they are who they claim to be (Maijala, 2004; Suh & Han, 2003). Claessens et al.
(2002), stated that authentication includes both authentication with respect to entity and data
authentication. Entity authentication includes the verification of the entities or people involved
in a transaction, whereas data authentication is ensuring the data is valid at a particular point in
time. Authorization mainly aims at ensuring that the user accessing information has the right to
view/manipulate this information (Maijala, 2004). This also includes ensuring that users of e-
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
38 International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015
commerce applications have the permission to send requests and communicate with the system.
The author would primarily test the following hypotheses:
H1b: Authentication and authorization positively affects a user’s perception of security with
respect to adoption of Internet banking.
Confidentiality is the assurance that the communication between the user/customer and the service
provider would not accessible to any other third party (Suh & Han, 2003). It also means to prevent
any unauthorized access of information (Knorr & Röhrig, 2000). Hence, confidentiality not only
includes confidentiality of information that is passed over the network during communication but
the confidentiality of information that is stored at different locations (Maijala, 2004). Privacy,
though considered by some researchers a separate issue from that of security (Mukherjee & Nath,
2003), has been included by many as part of the security objectives (Nilsson et al., 2005; Patton,
2004). From a customer’s perspective, security and privacy may not be discrete concepts, and
in most circumstances, security would imply privacy (Suh & Han, 2003). Privacy is defined as
the need to guarantee that the customer information is not accessible to unauthorized users and
is not misused. The author would primarily test the following hypotheses:
H1c: Privacy and confidentiality positively affects a user’s perception of security with respect
to adoption of Internet banking.
Security Practices
Kesh et al. (2002) explain security cannot be defined only as technological measures. There
are several mechanisms that are non-technical in nature such as policies, strategies, practices
followed and so on. All these measures are solutions to countering the threats to the security of
the applications and services. The security practices followed act as antecedents of a subjective
belief of a user that their communication with the systems is protected from all potential threats
(Ally & Toleman, 2005). This can either give the customers confidence to interact with their
bank accounts and transact online or can inhibit them from doing so (Ally & Toleman, 2005;
Suh & Han, 2003). The author would primarily test the following hypotheses:
H1d: Security practices followed by a bank positively affects a user’s perception of security
with respect to adoption of Internet banking.
Structural Assurances
Structural assurance implies that one believes that structures like guarantees, legal recourse,
promises, regulations, or other procedures are in their right place to promote success (Shapiro
1987, Zucker 1986). Say, one whose structural assurances regarding the Internet environment
are high with respect to legal and technological Internet protections like data encryptions then
the probability of safeguarding one from loss of privacy, identity, or money also increases.
McKnight and Chervany (2000) suggested that structural assurance is related to customers’
trusting beliefs, as they are more likely to develop trust if they believe that the environment is
safe and secure. Structural assurance leads the customer to believe that it is not in the best inter-
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015 39
est of the businesses to defect (Doney & Cannon, 1997), based on the assumption that the trust
violations will damage reputations and reputation matters a lot to the businesses (Rousseau et
al., 1998). “Structural assurance is information that can be used to give a web services provider
or requestor the confidence that measures exist that can provide safeguards and reduce the risk
when something goes wrong” (Coetzee & Eloff, 2005 p.501). In their empirical study on Internet
banking Sareen M.(2013) highlighted the relevance of the structures created by the bank that aim
at increasing the trusting beliefs of the Internet banking customer. The author would primarily
test the following hypotheses:
H1e: Associated structural assurances positively affect a user’s perception of security with respect
to adoption of Internet banking.
Perceived Usefulness
Perceived usefulness (PU) is defined as the extent to which a person believes that using a par-
ticular system will enhance his or her performance (Davis, 1989). The rationale for using the PU
as an antecedent to adoption is based on Theory of Reasoned Action (TRA). Various research
scholars have cited PU as an important antecedent for adoption of electronic banking (Guriting
and Ndubisi, 2006; Eriksson et al., 2005; Laforet and Li, 2005). In the context of Internet bank-
ing, perceived usefulness often refers to saving of time, cost effectiveness, convenience, free
from errors, easily accessible, efficiency, effective management of finances, etc.
Perceived ease of use (PEOU) refers to the extent to which a person believes that using a par-
ticular system is effortless or requires less effort (Davis et al., 1989; Gefen and Straub, 2000). In
the context of Internet banking, PEOU also would include error free interaction with the site and
execution of transaction (Lee, 2009; Chau et al., 2002; Hernandez and Mazzon, 2007; Guriting and
Ndubisi, 2006; Eriksson, 2005; Wang et al., 2003). Drawing inference from literature, the author
feels that in the context of internet banking, perceived ease of use might refer to appeal of the
site, easy navigation, simple to use, easily accessible, high functionality and easy to understand.
Disposition to Trust
Disposition to trust is the extent to which a person displays a tendency to be willing to depend on
others across a broad spectrum of situations (McKnight et al., 2002; Mayer et al., 1995). It also
signifies the inclination to trust other people (Ferres et al., 2004). It also defined as the personal-
ity traits that are formed through an individual’s experience (Tan & Sutherland, 2004). A person
who has high propensity to trust others trustworthy relationship trustor and trustee (McKnight
et al., 2002). Tan and Sutherland (2004) stated that online trust is likely to be influenced by the
user’s disposition to trust. In the online banking context, it works similarly. If a person feels that
others are generally reliable and can be easily trusted then such people will also believe that the
online bank can act in his/her best interest, keeps promise and honest and would adopt it easily.
Sareen, M (2013) indicated that the trusting beliefs have much greater role in level of adoption
of Internet banking than even the PU and PEOU. In the virtual environment, a person who has
the tendency to believe that others are generally reliable and easy to trust will also believe that
the Internet banking system will behave in his/her best interest, keeping promises and remaining
honest. The author would primarily test the following hypotheses:
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
40 International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015
H2a: Disposition to trust positively influences the user’s perception of security with respect to
adoption of Internet banking.
Internet banking quality can be specified as container of service quality and the benevolence
provided to its users. The service quality is the perceptions about the overall assessments of the
perceived performance of the service provider (Montoya-Weiss et al., 2003). It revolves around
customers comparing their expectations about the service with their perception of the way the
banks provide their e-service (Parasuraman et al., 1988). Hewer and Howcroft (1999) argued that
customers’ expectations and preferences are often enough to determine the transition from one type
of service delivery system to another. Also, strong attitude affects behavior when customers are
influenced by service quality (Baldinger and Rubinson, 1996). Yang et al. (2004) identified five
online service quality dimensions (responsiveness, reliability, access, competence, and security)
and their relationships with the customer satisfaction. Wolfinbarger and Gilly (2002) observed
that customer satisfaction often related to reliability and fulfillment. Liu and Arnett (2000) identi-
fied five critical dimensions of online service quality in relations to customer satisfaction in the
website. Among these, the quality of information that is relevant, accurate, timely, customised
and complete are given priority for the customer satisfaction in the online service. Antovski, Lj.
et al. (2001) related high availability as delivery of continuous E-banking services to customers
as one of the key drivers for adoption of internet banking by the customers. Yibin, MU (2003)
also stated that the improvement of the infrastructure related to electronic transactions, reporting
services, payment systems and telecommunications infrastructure help in developing trusting
intention towards internet banking. Internet banking quality also include perceived benevolence
which is based on items that refer to whether or not the bank demonstrates empathy and reception
towards customers’ concerns and its interest in the customers well-being (Gefen, 2002; McKnight
et al., 1998). The author would primarily test the following hypotheses:
H2b: Internet Banking Quality positively influences the user’s perception of security with respect
to adoption of Internet banking.
Trusting Beliefs
This refers to the truster’s belief that the trustee, in this context, the bank, has attributes that
benefits the truster. Though many types exist in the literature (e.g., Butler 1991), yet there are
three trusting beliefs that are most often utilized (Bhattacherjee 2002, Gefen 1997, Mayer et
al. 1995): competence (ability of the trustee to do what the truster wants), benevolence (trustee
caring and motivation to act in the truster’s interests), and integrity (trustee honesty and prom-
ise keeping). Accordingly, the respondents were asked to indicate their agreement score on the
statements regarding their perceptions/beliefs relating to the bank’s perceived security and its
associated components like integrity and reliability, authentication and authorization, privacy
and confidentiality, security practices, structural assurances, security related service quality and
security related benevolent policies adopted for the users. Later, an aggregate value indicating
general belief with regard to the bank was then arrived at. The author would primarily test the
following hypotheses:
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015 41
H3c: Internet Banking Quality positively influences the user’s trusting beliefs.
Adoption
Adoption is the acceptance and continued use of a product, service or idea (Rogers 1983). TAM
(Davis et al., 1989) model suggests that customer adoption behavior is determined by the in-
tention to use a particular system, which in turn is determined by the perceived usefulness and
perceived ease of use of the system. Adoption of internet banking not only helps in reducing
costs and improving competitiveness but also helps bank’s ability to retain the existing customer
base and to attract new customers (Sareen M. 2012; Guriting and Ndubisi, 2006; Gerrard and
Cunningham, 2003; Rotchanakitmnuai and Speece, 2003; Akinci et al., 2004). Since all of the
respondents in the survey were users of Internet banking, however, it was found that the level
of its adoption varied. The levels ranged from users adopting Internet banking for just balance
enquiry as low level to users using it for electronic fund transferring and/or trading as high level.
The author would primarily test the following hypotheses:
H4a: Users’ trusting belief positively influences the adoption of Internet banking.
H4b: Perceived Security positively influences the adoption of Internet banking.
H4c: Perceived ease of use positively influences the adoption of Internet banking.
H4d: Perceived usefulness has a positive influence on adoption of Internet banking.
H4e: Disposition to trust positively affect the level of adoption of Internet banking
SAMPLE SELECTION
For the purpose of study, a survey of Internet banking users of leading banks of India was conducted.
Convenient sampling was used to select the respondents belonging to different age groups and of
different educational background. A structured questionnaire was given to these respondents in
advance either personally or through e-mail so that they have understood the questions before they
were approached for responses. The questionnaire and items were modified based on the feedback
from a pilot study group. The questionnaire consisted of closed questions. The answers for the
question set were represented by the Likert scale, allowing the respondents to select the level of
impact the objectives referred to had on their adoption to internet banking. This enabled scoring
the replies and quantification of the research findings. The respondents belonging to different
cities like Delhi, Gurgaon, Noida, Mumbai, Pune, Chennai, Hyderabad, Bangalore, Chandigarh,
Dehra Dun, etc. constituted the sample. In total 107 completed responses were received. The
main aim behind the survey was to get the perceptions of the user regarding the service quality
offered by the bank and various components of security like integrity, confidentiality, privacy,
authorization and structural assurances. However, the scope of the present paper is limited to
only to two constructs namely integrity and reliability and privacy and confidentiality. The aim
of the paper is to explore their relationship with the demographic profile. This would give us a
glimpse on the general perception of the users of internet banking and their expectations from
the services provided by the banks.
The descriptive statistics of the respondents’ demographic characteristics were analyzed
and presented in Table 1. As can be observed, the sample was fairly diversified in respect of
the attributes identified. The number of the male respondents (56%) and female respondents
(44%) are comparable which can account to an impartial feedback from both perspectives. The
age group of the respondents ranged from 20 years to more than 40 years. As is clear from the
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
42 International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015
table, there is comparable distribution of sample in all the age groups. People falling under the
age group of 25-35 years are most technology savvy and hence almost half of the respondents
fell in this category. About one third of the sample constituted of people between 35-40 years.
These constituted the working class and hence Internet banking users either by choice or by force.
In regard to the occupation, care was taken to involve respondents from all walks of pro-
fession like private sector employees, government sector employees, bank employees, business
professionals, etc. Another group as ‘non-earning group’ was also included that mainly comprised
of students and home makers who were Internet banking users. About 40% of the respondents
were government employees, 35% were private sector employees and 17% were self-employed
professionals. This amounted to an almost unbiased sampling.
RELIABILITY
In order to check the reliability of the scales, Cronbach’s Alpha test was carried out. Cronbach’s
alpha is dependent on the correlation between the items, and a higher degree of correlations is
represented by a higher value of alpha. Thus, this provides an indication of the internal reliability
of the measurement items under consideration.
As can be seen from the Table, the composite reliability score for each of the constructs was
found to be above .70 and hence all items were retained in the study.
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015 43
Yi = β 0 + β1 X i ,1 + β 2 X i ,2 + .................. + β j X i , j + ei (1)
(R2 / j)
F= (2)
(1 − R 2 ) / (n − j − 1)
2
where R is the coefficient of determination and is described as the proportion of variance
“accounted for”, “explained”, or “described” by regression. Further, whether a particular variable
contributes significantly to the regression equation can be tested through t − test as follows. For
any specific variable X i , j , we can test the null hypothesis Ho: β j = 0 by computing the
statistic as:
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
44 International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015
β j
t= (3)
Sβ j
2
The fitting of the model (4) is tested through R , which came out to be .689. Thus about
68.9% of the variance of PS can be explained by independent predictors. The fitted model is
found to be statistically significant, as p < .001 . The author also applied t - test to find the
independent contribution of each predictor in estimating the mean for each case to assess the
overall effect of perceived security. Further, F value is 41.085 (p<0.000) which is highly sig-
nificant (See Table 3). Thus, H1a, H1b, H1c, H1d, H1e, H1f, and H1g were supported by the
results.
All the five factors namely structural assurances, authentication and authorization, privacy
and confidentiality, integrity and reliability, and security practices in the order of importance,
were found to be significant contributors to perceived security. Thus, the hypothesis H1a, H1b,
H1c, H1d, and H1e are supported.
The results indicate that customers perceive security by the associated structural assur-
ances. Banks can build these structural assurances in the form of demonstrating the security
policy, privacy policy and online dispute resolution policies. Presence of seals from Trusted
third parties like Verisign also helps in building higher perceptions regarding security. This was
followed by the measures taken by the banking site to ensure authentication and authorization of
the bank accounts. Users are apprehensive that any unauthorized user might get access to their
information and may cause them harm either financially or through information leak. Since,
the Internet banking users are technology savvy and hence they are aware of various structural
assurances adopted by any Internet banking site to ensure security and reliability of transmis-
sion of information. Hence, this component was also indicated to be a good contributor in their
perception of security.
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015 45
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
46 International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015
2
The fitting of the model (5) is tested through R , which came out to be .694. Thus about
69.4% of the variance of PS can be explained by independent predictors. The fitted model is
found to be statistically significant, as p < .001 . The author also applied t - test to find the
independent contribution of each predictor in estimating the mean for each case to assess the
overall effect of level of adoption. As can be seen from Table 5, the results were found to be
statistically significant (F = 31.978). This would imply failure to reject our hypothesis H4a, H4b,
H4c and H4d.
The results presented above validate the proposed model. They also point out fairly signifi-
cant role of trusting beliefs on the level of adoption of Internet banking. This would imply that
the trusting environment presented by the bank has the potential to impact the adoption of the
system. Further, a user’s disposition to trust also is found to significantly affect his/her level of
usage. This is followed by the perceptions regarding the security of the site. Most of the users
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015 47
are found to be technology savvy and hence perceived usefulness scored more than perceived
ease of use.
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
48 International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015
the trusting beliefs of the users which in turn determine the level of adoption as reflected in the
type of services that a user may avail of out of the portfolio of Internet banking services offered.
REFERENCES
Ally, M., & Toleman, M. (2005). A framework for assessing payment security mechanisms and security
information on e-commerce web sites. Proceedings of the 9th Pacific Asia Conference on Information
Systems (PACIS), Bangkok, Thailand.
Bélanger, F., Hiller, J., & Smith, W. J. (2002). Trustworthiness in electronic commerce: The role of privacy,
security, and site attributes. The Journal of Strategic Information Systems, 2(3-4), 245–270. doi:10.1016/
S0963-8687(02)00018-5
Chellappa, R. (2003). Consumers’ trust in electronic commerce transactions (Working Paper, ebizlab).
Retrieved from www.bus.emory.edu/ram/papers/sec-priv.pdf
Delgado, J., Hernando, I., & Nieto, M. J. (2007). Do European Primarily Internet Banks Show Scale
and Experience Efficiencies? European Financial Management, 13(4), 643–671. doi:10.1111/j.1468-
036X.2007.00377.x
DeYoung, R. (2001a). The Financial Performance of Pure Play Internet Banks. Economic Perspectives,
25(1), 60–75.
DeYoung, R. (2001b, November). The Financial Progress of Pure-Play Internet Banks (Paper No 7). BIS
Papers.
DeYoung, R. (2001c, September). Learning-by-Doing, Scale Efficiencies, and Financial Performance at
Internet-Only Banks (Working Paper 2001-06). Federal Reserve Bank of Chicago.
DeYoung, R. (2005). The Performance of Internet-based Business Models: Evidence from the Banking
Industry. The Journal of Business, 78(3), 893–947. doi:10.1086/429648
DeYoung, R., Lang, W. W., & Nolle, D. E. (2006). How the Internet Affects Output and Performance at
Community Banks. Journal of Banking & Finance.
DeYoung, R., & Rice, T. (2003). Noninterest Income and Financial Performance at U.S. Commercial
Banks. Emerging Issues Series, Supervision and Regulation Department, Federal Reserve Bank of Chicago.
DiDio, L. (1998). Beta Testers Endorse E-checks. Computerworld, 32, 57.
Doney, P., & Cannon, J. (1997). An examination of the nature of trust in buyer-seller relationships. Journal
of Marketing, 61(2), 35–51. doi:10.2307/1251829
Egland, K., Furst, K., Nolle, D., & Robertson, D. (1998). Banking over the Internet. Office of the Comptrol-
ler of the Currency, Quarterly Journal, 17(4), 24–30.
Grabner-Kräuter, S., & Faullant, R. (2008). „Consumer acceptance of internet banking: The influence of
internet trust,‟. International Journal of Bank Marketing, 26(7), 483–504. doi:10.1108/02652320810913855
Grandison, T., & Sloman, M. (2000). A survey of trust in Internet Applications. IEEE Communications
Surveys and Tutorials, 3(4), 2–30. doi:10.1109/COMST.2000.5340804
Haque, A. et al.. (2009). Electronic Transaction of Internet Banking and its Perception of Malaysian online
Customers. African Journal of Business Management, 3(6), 248–259.
Hasan, I., Maccario, A., & Zazzara, C. (2002). Do Internet Activities Add Value? The Italian Bank Experi-
ence (Working Paper). Berkley Research Center, New York University.
Hassan, M. K., & Bashir, A. H. M. (2003, December 16-18). Determinants of Islamic Banking Profitability.
Paper presented at the Economic Research Forum (ERF) 10th Annual Conference, Marrakesh-Morocco.
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
International Journal of Strategic Information Technology and Applications, 6(3), 35-49, July-September 2015 49
Hernandez, J. M. C., & Mazzon, J. A. (2007). Adoption of internet banking: Proposition and implemen-
tation of an integrated methodology approach. International Journal of Bank Marketing, 25(2), 72–88.
doi:10.1108/02652320710728410
Hernando, I., & Nieto, M. J. (2005). Is the Internet Delivery Channel Changing Banks. Performance? The
Case of Spanish Banks. Banco de Espana [Unpublished Manuscript].
Hickman, M. (1999). Internet Banking: Transaction to Active Selling. Bank Systems and Technology, 36, 3–14.
Kim, K., & Prabhakar, B. (2000). Initial Trust, Perceived Risk, and the Adoption of Internet Banking.
Proceeding ICIS ‘00: Proceedings of the twenty first international conference on Information systems
(pp. 537-543).
Knorr, K., & Röhrig, S. (2000). Security of electronic business applications: structure and quantification.
Paper presented at the proceedings of the First International Conference on Electronic Commerce and
Web Technologies. doi:10.1007/3-540-44463-7_3
Laforet, S., & Li, X. (2005). Consumers’ attitudes towards online and mobile banking in China. International
Journal of Bank Marketing, 23(5), 362–380. doi:10.1108/02652320510629250
Maijala, V. (2004). Outlook of the information security in e-business. Retrieved from http://www.tml.tkk.
fi/Publications/Thesis/maijala.pdf
Mukherjee, A., & Nath, P. (2007). Role of electronic trust in online retailing–a reexamination of commitment-
trust theory. European Journal of Marketing, 41(9/10), 1173–1202. doi:10.1108/03090560710773390
Sareen, M. (2012). Relationship between types of trust and level of adoption of Internet banking. Problems
and Perspectives in Management, 10(1), 82–92.
Sareen M. (2013). Factors influencing the level of adoption of Internet banking: An integration of TAM
and Web Trust Model. Asian Journal Of Management Research - Online Open Access publishing platform
for Management Research, 4(1), 130-146.
Schneier, B. (2005). Two-factor authentication. Too little, too late. Communications of the ACM, 48(4),
136. doi:10.1145/1053291.1053327
Suh, B., & Han, I. (2002). Effects of trust on customer acceptance of Internet banking. Electronic Commerce
Research and Applications, 1(3-4), 247–263. doi:10.1016/S1567-4223(02)00017-0
Yousafzai, S., Pallister, J., & Foxall, G. (2003). A proposed model of e-trust for electronic banking. Tech-
novation, 23(11), 847–860. doi:10.1016/S0166-4972(03)00130-5
Yousafzai, S., Pallister, J. G., & Foxall, G. R. (2005). Strategies for building and communicating trust in
electronic banking: A field experiment. Psychology and Marketing, 22(2), 181–201. doi:10.1002/mar.20054
Yousafzai, S., Pallister, J. G., & Foxall, G. R. (2009). Multidimensional role of trust in Internet banking
adoption. Service Industries Journal, 29(5), 591–605. doi:10.1080/02642060902719958
Copyright © 2015, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.