Analysis of Information Security Behavior of Mobile Banking Users
https://doi.org/10.36342/teika.v14i1.3382
Keywords:
perilaku keamanan informasi, resiko, mobile banking, kewaspadaan keamanan informasiAbstract
The use of mobile banking services has grown rapidly and revolutionized the banking sector, offering customers convenient and efficient access to banking services without time and distance limitations. However, this convenience comes with information security risks. Therefore, user information security behavior is crucial to minimize these risks and their impacts. This study aims to analyze the information security behaviors of mobile banking users in Indonesia, focusing on the factors that influence these behaviors.
This research surveyed 365 respondents who use mobile banking applications, with diverse genders, ages, education levels, and mobile banking application preferences. The study measured five dimensions of information security behavior: password management, messaging app usage, internet usage, devices usage in public, and incident reporting.
The research found that information security behaviors among mobile banking users vary significantly. These findings highlight the importance of banks integrating user behaviors into comprehensive information security strategies. This study contributes to enhancing information security practices in mobile banking by providing insights into user behaviors and demographic influences.
Downloads
References
. S. Kim, D. Shin, and J. Lee, "The Adoption of Mobile Banking in Emerging Markets: A Cross-Country Study," Journal of Global Information Management, vol. 29, no. 3, pp. 1-23, 2021.
. N. Yildirim and A. Varol, "A Research on Security Vulnerabilities in Online and Mobile Banking Systems," 2019 7th International Symposium on Digital Forensics and Security (ISDFS), 2019, doi: 10.1109/ISDFS.2019.8757495.
. S. Goel and R. Gupta, "Security Issues in Mobile Banking Applications: The Current State of Risks," International Journal of Information Management, vol. 50, pp. 456-468, 2020.
. K. Parsons, E. Young, M. Butavicious, A. McCormac, M. Pattison, dan C. Jerram, "The Influence of organisational information security culture on cybersecurity decision making," Journal of Cognitive Engineering and Decision Making, vol. 9, no. 2, pp. 117-129, 2015.
. Pricewaterhouse Coopers (PWC), "Turnaround and transformation in cybersecurity: key finding from The Global State of Information Security Survey 2016," 2015.
. M. Hakami and M. Alshaikh, "Identifying Strategies to Address Human Cybersecurity Behavior: A Review Study," International Journal of Computer Science and Network Security, vol. 22, no. 4, pp. 299-309, 2022.
. I. Al-Shanfari, W. Yassin, N. Tabook, R. Ismail and A. Ismail, "Determinants of Information Security Awareness and Behaviour Strategies in Public Sector Organizations among Employees," International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, pp. 479-490, 2022.
. V. Linkov, P. Zámečník, D. Havlíčková and C.-W. Pai, "Human Factors in the Cybersecurity of Autonomous Vehicles: Trends in Current Research," Frontiers in Psychology, vol. 10, pp. 1-7, 2019.
. G. K. Ajufo and A. Qutieshat, "An Examination of the Human Factors in Cybersecurity: Future Direction for Nigerian Banks," Indonesian Journal of Information Systems (IJIS), vol. 6, no. 1, pp. 1-16, Aug. 2023
. D. Shin and H. Kang, "Security Practices in Mobile Banking: User Awareness and Prevention Measures," Journal of Financial Services Marketing, vol. 26, no. 1, pp. 54-66, 2021.
. K. Parsons, D. Calic, M. Pattinson, M. Butavicius, A. McCormac, and T. Zwaans, "The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies," Computers & Security, vol. 66, pp. 40-51, May 2017, doi: 10.1016/j.cose.2017.01.004.
. D. Iacobucci and A. Duhachek, "Advancing Alpha: Measuring Reliability With Confidence," Journal of Consumer Psychology, vol. 13, no. 4, pp. 478-487, 2003.
. K.-c. Chang and C.-p. Wang, "Information systems resources and information security," Information Systems Frontiers, vol. 13, pp. 579-593, Apr. 2010. DOI: 10.1007/s10796-010-9232-6.
. S. Lee, D. Lee, and M. Kang, "Factors Influencing User Behavior in Mobile Banking Security: An Empirical Study," Computers & Security, vol. 114, p. 102580, 2022.
. J. Park, H. Jeong, and S. Kim, "Understanding the Influence of Security Awareness on Mobile Banking Use: A Comparative Study," Telematics and Informatics, vol. 57, p. 101508, 2021.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 TeIKa
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
The submitting author warrants that the submission is original and that she/he is the author of the submission together with the named co-authors; to the extend the submission incorporates text passages, figures, data or other material from the work of others, the submitting author has obtained any necessary permission.
Articles in this journal are published under the Creative Commons Share Alike Attribution Licence (CC-BY-SA What does this mean?). This is to get more legal certainty about what readers can do with published articles, and thus a wider dissemination and archiving, which in turn makes publishing with this journal more valuable for you, the authors.
By submitting an article the author grants to this journal the non-exclusive right to publish it. The author retains the copyright and the publishing rights for his article without any restrictions.