Enhancing the public value of mobile fintech services through cybersecurity awareness antecedents: A novel framework in Jordan
-
DOIhttp://dx.doi.org/10.21511/imfi.21(1).2024.32
-
Article InfoVolume 21 2024, Issue #1, pp. 417-430
- Cited by
- 446 Views
-
62 Downloads
This work is licensed under a
Creative Commons Attribution 4.0 International License
The study aimed to link cybersecurity awareness and its antecedents to discover the level of public value of using mobile financial services from the perspective of ‘citizens in the government context in Jordan. The quantitative approach was customized to serve the purposes of this study. A convenience sampling method was used based on 550 e-survey Jordanians from whom data were collected. A total of 449 responses were used in the analysis process. A structural equation model was specified to evaluate the developed research model. The results revealed that all hypotheses are accepted at less than P<0.001, cybersecurity awareness and predictions of financial services systems play a significant role in determining the use of financial services systems and generating the value of using financial services. Moreover, combining cybersecurity awareness with public value theory is an important approach to measure the performance of government institutions, especially in the financial services industry. Therefore, these results can be used to develop financial services and meet Jordanians’ requirements. Therefore, providing well-understood dimensions that influence the value of microfinance service use among Jordanians is a necessary process that probably ensures long-term sustainability of microfinance services. Finally, future efforts can explore the benefits and challenges of adopting digital transformation technologies in the public sector and financial services. Furthermore, the term government resilience is likely provided new insights to enhance public administration performance based on technology trends. Digital transformation, integrating government flexibility with the existing research model may influence the overall value of Mobile Fintech Services in Jordan.
- Keywords
-
JEL Classification (Paper profile tab)G23, O33, L86, M15
-
References64
-
Tables3
-
Figures2
-
- Figure 1. The developed model of the current research
- Figure 2. The retrieved graphic of the model hypotheses results (SEM)
-
- Table 1. Composite reliability and convergent validity of constructs’ study
- Table 2. Discriminant validity assessment
- Table 3. Results of the study hypotheses
-
- Al-Okaily, M., Al Natour, A. R., Shishan, F., Al-Dmour, A., Alghazzawi, R., & Alsharairi, M. (2021). Sustainable FinTech innovation orientation: a moderated model. Sustainability, 13(24), 13591.
- Aldawood, H., & Skinner, G. (2018). Educating and raising awareness on cyber security social engineering: A literature review. 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), 62-68.
- Alford, J., & O’flynn, J. (2009). Making sense of public value: Concepts, critiques and emergent meanings. International Journal of Public Administration, 32(3-4), 171-191.
- Alghizzawi, M., Attar, R. W., Alhanatleh, H., Alnawafleh, H., Tahat, K., & Tahat, D. N. (2023). Digital Ads via Smart Phones and Purchase Intent. 2023 Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS), 1-7.
- Alhanatleh, H., Khaddam, A., & Abousweilem, F. (2022). Mobile government public value model for assessing the public institution’s services: evidence through the context of Jordan. International Journal of Data and Network Science, 6(4), 1295-1308.
- Alhanatleh, H., Alghizzawi, M., Alhawamdeh, Z., Alkhlaifat, B., Alabaddi, Z., & Al-Kasasbeh, O. (2024 b). Public value of using fintech services’ mobile applications: Citizens’ perspective in a Jordan setting. Uncertain Supply Chain Management, 12(2), 1317-1330.
- Aljeaid, D., Alzhrani, A., Alrougi, M., & Almalki, O. (2020). Assessment of End-User Susceptibility to Cybersecurity Threats in Saudi Arabia by Simulating Phishing Attacks. Information, 11(12), 547.
- Al_Kasasbeh, O., Khasawneh, O., & Alzghoul, A. (2023). The Real Effects of Fintech on the Global Financial System. International Journal of Professional Business Review, 8(3), e01725-e01725.
- Alnaser, A. S., Theep, K. A., & Alhanatleh, H. (2022). Do e-government services affect Jordanian customer loyalty? Marketing i Menedžment Innovacij, 2, 17-30.
- Alnaser, F., Rahi, S., Alghizzawi, M., & Ngah, A. H. (2023). Does Artificial Intelligence (Ai) Boost Digital Baking User Satisfaction? Integration of Expectation Confirmation Model and Antecedents of Artificial Intelligence Enabled Digital Banking. Integration of Expectation Confirmation Model and Antecedents of Artificial Intelligence Enabled Digital Banking.
- Alodat, A. Y., Salleh, Z., Hashim, H. A., & Sulong, F. (2022). Corporate governance and firm performance: Empirical evidence from Jordan. Journal of Financial Reporting and Accounting, 20(5), 866-896.
- Alqahtani, M. A. (2022). Factors affecting cybersecurity awareness among university students. Applied Sciences, 12(5), 2589.
- Ansell, C., & Torfing, J. (2021). Co-creation: The new kid on the block in public governance. Policy & Politics, 49(2), 211-230.
- Awang, P. (2018). Pendekatan Mudah SEM (Structural Equation Modeling). MPWS Rich Resources.
- Bannister, F., & Connolly, R. (2014). ICT, public values and transformative government: A framework and programme for research. Government Information Quarterly, 31(1), 119-128.
- Calderwood, F., & Popova, I. (2019). Smartphone cyber security awareness in developing countries: A case of Thailand. International Conference on Emerging Technologies for Developing Countries. Emerging Technologies for Developing Countries, 79-86.
- Carlin, B., Olafsson, A., & Pagel, M. (2017). FinTech Adoption Across Generations: Financial Fitness in the Information.
- Chang, L. Y. C., & Coppel, N. (2020). Building cyber security awareness in a developing country: lessons from Myanmar. Computers & Security, 97, 101959.
- Creevey, D., Coughlan, J., & O’Connor, C. (2022). Social media and luxury: A systematic literature review. International Journal of Management Reviews, 24(1), 99-129.
- de Bruijn, H., & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1-7.
- Dhar, V., & Stein, R. M. (2017). FinTech platforms and strategy. Communications of the ACM, 60(10), 32-35.
- Dijkstra, T. K., & Henseler, J. (2015). Consistent partial least squares path modeling. MIS Quarterly, 39(2), 297-316.
- Donalds, C., & Osei-Bryson, K.-M. (2020). Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents. International Journal of Information Management, 51, 102056.
- Ediagbonya, V., & Tioluwani, C. (2023). The role of fintech in driving financial inclusion in developing and emerging markets: issues, challenges and prospects. Technological Sustainability, 2(1), 100-119.
- Ergen, A., Ünal, A. N., & Saygili, M. S. (2021). Is it possible to change the cyber security behaviours of employees? Barriers and promoters. Academic Journal of Interdisciplinary Studies, 10(4), 210.
- Hadnagy, C. (2010). Social engineering: The art of human hacking. John Wiley & Sons.
- Hair, J. F., Money, A. H., Samouel, P., & Page, M. (2007). Research methods for business. Education + Training.
- Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2-24.
- Halim, S. B. K., Osman, S. B., Al Kaabi, M. M., Alghizzawi, M., & Alrayssi, J. A. A. (2023). The Role of Governance, Leadership in Public Sector Organizations: A Case Study in the UAE. In Digitalisation: Opportunities and Challenges for Business (Vol. 2, pp. 301-313). Springer.
- Hermida, R. (2015). The problem of allowing correlated errors in structural equation modeling: concerns and considerations. Computational Methods in Social Sciences, 3(1), 5-17.
- Ifinedo, P. (2012). Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. Computers & Security, 31(1), 83-95.
- Jiao, Y., Jo, M.-S., & Sarigöllü, E. (2017). Social value and content value in social media: Two paths to psychological well-being. Journal of Organizational Computing and Electronic Commerce, 27(1), 3-24.
- Kelly, G., Mulgan, G., & Muers, S. (2002). Creating public value. London: Cabinet Office.
- Kernaghan, K. (2013). Changing channels: Managing channel integration and migration in public organizations. Canadian Public Administration, 56(1), 121-141.
- Khuong, N. V., Phuong, N. T. T., Liem, N. T., Thuy, C. T. M., & Son, T. H. (2022). Factors Affecting the Intention to Use Financial Technology among Vietnamese Youth: Research in the Time of COVID-19 and Beyond. Economies, 10(3), 57.
- Knight-McCord, J., Cleary, D., Grant, N., Herron, A., Lacey, T., Livingston, T., & Emanuel, R. (2016). What social media sites do college students use most. Journal of Undergraduate Ethnic Minority Psychology, 2(21), 21-26.
- Kovačević, A., Putnik, N., & Tošković, O. (2020). Factors related to cyber security behavior. IEEE Access, 8, 125140-125148.
- Lenhart, A., Madden, M., Macgill, A. R., & Smith, A. W. (2007). Teens and social media: The use of social media gains a greater foothold in teen life as they embrace the conversational nature of interactive online media. Washington, DC: Pew Internet & American Life Project.
- Limna, P., Kraiwanit, T., Siripipattanakul, S., Limna, P., Kraiwanit, T., & Siripipattanakul, S. (2023). The relationship between cyber security knowledge, awareness and behavioural choice protection among mobile banking users in Thailand. International Journal of Computing Sciences Research, 7, 1133-1151.
- Mai, P. T., & Tick, A. (2021). Cyber Security Awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam. Acta Polytechnica Hungarica, 18(8), 67-89.
- McLean, G. (2018). Examining the determinants and outcomes of mobile app engagement - A longitudinal perspective. Computers in Human Behavior, 84, 392-403.
- Mohammed, M., & Bamasoud, D. M. (2022). The Impact of Enhancing Awareness of Cybersecurity on Universities Students: A Survey Paper. J. Theor. Appl. Inf. Technol, 100.
- Moore, M. H., & Moore, M. H. (1995). Creating public value: Strategic management in government. Harvard University Press.
- Mou, J., Shin, D.-H., & Cohen, J. (2017). Understanding trust and perceived usefulness in the consumer acceptance of an e-service: A longitudinal investigation. Behaviour & Information Technology, 36(2), 125-139.
- Omar, K., Scheepers, H., & Stockdale, R. (2011). How mature is Victorian local e-government: an overall view.
- Perera, S., Sandhu, S. K., & Soosay, C. (2017). Investigating the impact of agility and resilience on sustainable supply chains. Academy of Management Proceedings, 2017(1), 12682.
- Pósa, T., & Grossklags, J. (2022). Work experience as a factor in cyber-security risk awareness: A survey study with university students. Journal of Cybersecurity and Privacy, 2(3), 490-515.
- Rahi, S., Alghizzawi, M., Ahmad, S., Munawar Khan, M., & Ngah, A. H. (2021). Does employee readiness to change impact organization change implementation? Empirical evidence from emerging economy. International Journal of Ethics and Systems, ahead-of-p(ahead-of-print).
- Rahi, S., Alghizzawi, M., & Ngah, A. H. (2022). Factors influence user’s intention to continue use of e-banking during COVID-19 pandemic: the nexus between self-determination and expectation confirmation model. EuroMed Journal of Business, ahead-of-print(ahead-of-print).
- Raza, I., & Awang, Z. (2021). Knowledge-sharing practices in higher educational institutes of Islamabad, Pakistan: an empirical study based on theory of planned behavior. Journal of Applied Research in Higher Education, 13(2), 466-484.
- Reddick, C. G., & Zheng, Y. (2017). Determinants of citizens’ mobile apps future use in Chinese local governments: An analysis of survey data. Transforming Government: People, Process and Policy, 11(2), 213-235.
- Sarstedt, M., Ringle, C. M., & Hair, J. F. (2020). Handbook of Market Research. In Handbook of Market Research (Issue September).
- Schryen, G. (2013). Revisiting IS business value research: what we already know, what we still need to know, and how we can get there. European Journal of Information Systems, 22(2), 139-169.
- Scott, M., DeLone, W., & Golden, W. (2016). Measuring eGovernment success: a public value approach. European Journal of Information Systems, 25, 187-208.
- Shaikh, I. M., Qureshi, M. A., Noordin, K., Shaikh, J. M., Khan, A., & Shahbaz, M. S. (2020). Acceptance of Islamic financial technology (FinTech) banking services by Malaysian users: an extension of technology acceptance model. Foresight, 22(3), 367-383.
- Simonet, J., & Teufel, S. (2019). The influence of organizational, social and personal factors on cybersecurity awareness and behavior of home computer users. IFIP International Conference on ICT Systems Security and Privacy Protection. ICT Systems Security and Privacy Protection, 194-208.
- Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to information security policies: An exploratory field study. Information & Management, 51(2), 217-224.
- Sitthipon, T., Limna, P., Jaipong, P., Siripipattanakul, S., & Auttawechasakoon, P. (2022). Gamification predicting customers’ repurchase intention via e-commerce platforms through mediating effect of customer satisfaction in Thailand. Review of Advanced Multidisciplinary Sciences, Engineering & Innovation, 1(1), 1-14.
- Stoker, G. (2006). Public value management: A new narrative for networked governance? The American Review of Public Administration, 36(1), 41-57.
- Twizeyimana, J. D., & Andersson, A. (2019). The public value of E-Government–A literature review. Government Information Quarterly, 36(2), 167-178.
- Ulven, J. B., & Wangen, G. (2021). A Systematic Review of Cybersecurity Risks in Higher Education. Future Internet, 13(2), 39.
- Wash, R., Rader, E., Berman, R., & Wellmer, Z. (2016). Understanding password choices: How frequently entered passwords are re-used across websites. Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 175-188.
- Yang, J., Wang, K., Luo, F., & Wen, F. (2023). AC Network-Constrained Peer-to-Peer Electricity Market Model in Low-voltage Power Distribution Networks. International Journal of Electrical Power & Energy Systems, 154, 109428.
- Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97.