Security perception of e-banking users in India: an analytical hierarchy process
-
DOIhttp://dx.doi.org/10.21511/bbs.15(1).2020.02
-
Article InfoVolume 15 2020, Issue #1, pp. 11-20
- Cited by
- 1243 Views
-
379 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
When choosing online financial transactions, security is a paramount concern of users. Three categories of banks in India, namely public, private and foreign banks, have a completely different focus on technology and capabilities. The study aims at investigating e-banking users’ perception with regard to online risk for public, private and foreign banks. Online risk perception for the abovementioned banks was assessed on three major risk parameters, i.e. security aspect, privacy aspect, and trust; using a multiple-criteria decision-making tool, called the Analytical Hierarchy Process (AHP). The outcomes indicate that security risk is paramount among various aspects of perceived risk, followed by privacy and trust concern. Moreover, public sector banks are perceived to be the safest in this aspect. Public sector banks are also considered to be benign in terms of privacy and trust. Given the general user’s perception of risk generated by all the three risk parameters taken together, public sector banks are perceived to be the most secure, followed by private and foreign banks. The findings of this study have various implications for both research and practice. Private and foreign banks in India may adopt appropriate marketing strategies to achieve a favorable perception. Various studies have been conducted earlier on these factors and their interrelationship, but limited research has been carried out to demonstrate the importance of each of these factors in relation to the other as perceived by the user. Moreover, the study quantifies factors in order of their importance.
- Keywords
-
JEL Classification (Paper profile tab)G21, G29, L81
-
References42
-
Tables11
-
Figures2
-
- Figure 1. Consumer perceptions towards information security risk for public, private and foreign banks
- Figure 2. Weighted scores of consumer perceptions towards information security risk for public, private and foreign banks
-
- Table 1. Saaty’s scale (1-9) for pairwise comparison
- Table 2. Random inconsistency indices for n = 10 (Saaty, 1980)
- Table 3. Pairwise comparison matrix of various aspects of security risk
- Table 4. Pairwise comparison matrix of various aspects of privacy
- Table 5. Pairwise comparison matrix of various aspects of security
- Table 6. Pairwise comparison matrix of various aspects of trust
- Table 7. Normalized weighted scores of various aspects of security risk
- Table 8. Normalized weighted scores of various aspects of privacy
- Table 9. Normalized weighted scores of various aspects of security
- Table 10. Normalized weighted scores of various aspects of trust
- Table 11. E-banking users’ perception for various types of banks based on weighted score of selected criteria
-
- Abdul-Hamid, Y. T. (1999). An analytical hierarchy process approach to the choice of manufacturing plant layout. Journal of Engineering Manufacture, 213(4), 397-406.
- Ackerman, M. S. (2004). Privacy in pervasive environments: next generation labeling protocols. Personal and Ubiquitous Computing, 8(6), 430-439.
- Babu, N., & Rajini, P. (2017). Comparative Study between Private Sector and Public Sector Banks in the Adoption of Technology in Banking Services – Twin Cities. Journal of Business and Management, 1, 64-69.
- Bansal, G., & Zahedi, F. M. (2014). Trust-Discount Tradeoff in Three Contexts: Frugality Moderating Privacy and Security Concerns. Journal of Computer Information Systems, 55(1), 13-29.
- Belanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in Electronic Commerce: the Role of Privacy, Security, and Site Attributes. The Journal of Strategic Information Systems, 11(3-4), 245-270.
- Bergquist, K., & Abesysekera, J. (1996). Quality function deployment (QFD) – a means for developing usable products. International Journal of Industrial Ergonomics, 18(4), 269-275.
- Bhattacherjee, A. (2002). Individual Trust in Online Firms: Scale Development and Initial Test. Journal of Management Information Systems, 19(1), 211-241.
- Calantone, R. J., Di Benedetto, C. A., & Schmidt, J. B. (1999). Using the analytical hierarchy process in new product screening. International Journal of Production and Innovation Management, 16(1), 65-76.
- Chellappa, R. K. (2008). Consumers’ Trust in Electronic Commerce Transactions: The Role of Perceived Privacy and Perceived Security (Unpublished paper). Emory University, Atlanta, GA.
- Chellappa, R. K., & Pavlou, P. A. (2000). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358-368.
- Chellappa, R. K., & Pavlou, P. A. (2001). The role of perceived privacy and perceived security in the development of trust in electronic commerce transactions (eBizLab Working Paper). Marshall School of Business, University of South California, Los Angeles, CA.
- Culnan, M., & Armstrong, P. (1999). Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization Science, 10(1), 104-115.
- Dweiri, F., & Meirer, F. A. (1996). Application of fuzzy decision-making in facility lay out planning. International Journal of Production Research, 34(11), 3201-3225.
- Gefen, D. E., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51-90.
- Gray, P. (1999). Protecting Privacy and Security of Personal Information in the Global Electronic Marketplace.
- Gupta, S., Dawar, V., & Goyal, A. (2018). Enhancing the Placement Value of Professionally Qualified Students in Marketing: An application of the Analytic Hierarchy Process. Academy of Marketing Studies Journal, 22(3).
- Gurung, A., & Raja, M. K. (2016). Online privacy and security concerns of consumers. Information and Computer Security, 24(4), 348-371.
- Juwaheer, T. D., Pudaruth, S., & Ramdin, P. (2012). Factors influencing the adoption of internet banking: a case study of commercial banks in Mauritius. World Journal of Science, Technology and Sustainable Development, 9(3), 204-234.
- Kim, D., Ferrin, D., & Rao, H. A. (2008). Trust-based Consumer Decision-making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and their Antecedents. Decision Support System, 44(2), 544-564.
- Laforet, S., & Li, X. (2005). Consumers’ attitudes towards online and mobile banking in China. International Journal of Bank Marketing, 23(5), 362-380.
- Lallmahamood, M. (2007). An Examination of Individual’s Perceived Security and Privacy of the Internet in Malaysia and the Influence of This on Their Intention to Use E-Commerce : Using An Extension of the Technology Acceptance Model. Journal of Internet Banking and Commerce, 12(3), 1-26.
- Lee, A. H. I., Kang, H.-Y., Hsu, C.-F., & Hung, H.-C. (2009). A green supplier selection model for the high-tech industry. Expert Systems with Applications, 36(4), 7917-7927.
- Lee, S. M., & Eom, H. B. (1990). Multiple-criteria decision support systems: the powerful tool for attacking complex, unstructured decisions. Systems Practice, 3(1), 51-65.
- Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet Users’ Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research, 15(4), 336-355.
- Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709-34.
- McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: a trust building model. Journal of Strategic Information Systems, 11(3-4), 297-323.
- Miyazaki, A. D., & Fernandez, A. (2000). Internet privacy and security: an examination of online retailer disclosures. Journal of Public Policy and Marketing, 19(1), 54-61.
- Miyazaki, A. D., & Fernandez, A. N. A. (2001). Consumer Perceptions of Privacy and Security Risks for Online Shopping All use subject to JSTOR Terms and Conditions AND for Online Shopping of Privacy and Security Risks. The Journal of Consumer Affairs, 35(1), 27-44.
- Nilsson, M., Adams, A., & Herd, S. (2005). Building security and trust in online banking. Proceedings Conference on Human Factors in Computing Systems (pp. 1701-1704).
- Petronio, S. (2002). Boundaries of Privacy: Dialectics of Disclosure. Albany: State University of New York Press.
- Riquelme, I. P., & Román, S. (2014). Is the influence of privacy and security on online trust the same for all type of Is the influence of privacy and security on online trust the same for all type of consumers? Electron Markets, 24, 135-149.
- Rishi, M., & Saxena, S. C. (2004). Technological innovations in the Indian banking industry: the late bloomer. Accounting, Business & Financial History, 14(3), 339-353.
- Román, S. (2007). The ethics of online retailing: a scale development and validation from the consumers’ perspective. Journal of Business Ethics, 72(2), 131-148.
- Román, S., & Cuestas, P. J. (2008). The perceptions of consumers regarding online retailers’ ethics and their relationship with consumers’ general internet expertise and word of mouth: a Preliminary analysis. Journal of Business Ethics, 83(4), 641-656.
- Saaty, T. L. (1980). The Analytic Hierarchy Process. McGraw-Hill: New York.
- Sabaei, D., Erkoyuncu, J., & Roy, R. (2015). A review of multi-criteria decision making methods for enhanced maintenance delivery. Procedia CIRP, 37, 30-35.
- Singh, T., Patnaik, A., Chauhan, R., & Chauhan, P. (2018). Selection of brake friction materials using hybrid analytical hierarchy process and vise kriterijumska optimizacija kompromisno resenje approach. Polymer Composites, 39(5), 1655-1662.
- Smith, H. J., Milberg, S. J., & Burke, S. J. (1996). Information privacy: Measuring individuals’ concerns about organizational practices. MIS Quarterly, 20(2), 167-196.
- Soni, S. (2019, May 12). Banks in India Ready for Tech-Revolution (Interview).
- Stone, E. F., Gueutal, H. G., Gardner, D. G., & McClure, S. (1983). A Field Experiment Comparing Information-Privacy Values, Beliefs, and Attitudes Across Several Types of Organizations. Journal of Applied Psychology, 68(3), 459-468.
- Vijayasarathy, L. R. (2004). Predicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model. Information and Management, 41(6), 747-762.
- Xu, H., Teo, H.-H., Tan, B. C. Y., & Agarwal, R. (2012). Effects of Individual Self-Protection, Industry Self- Regulation, and Government Regulation on Privacy Concerns: A Study of Location-Based Services. Information Systems Research, 23(4), 1342-1363.