{"id":"https://openalex.org/W3037225723","doi":"https://doi.org/10.1108/ics-02-2020-0021","title":"Security behaviour of mobile financial service users","display_name":"Security behaviour of mobile financial service users","publication_year":2020,"publication_date":"2020-06-27","ids":{"openalex":"https://openalex.org/W3037225723","doi":"https://doi.org/10.1108/ics-02-2020-0021","mag":"3037225723"},"language":"en","primary_location":{"id":"doi:10.1108/ics-02-2020-0021","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2020-0021","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056338476","display_name":"Esther Dzidzah","orcid":null},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":true,"raw_author_name":"Esther Dzidzah","raw_affiliation_strings":["Department of Supply Chain and Information Systems, KNUST School of Business, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Supply Chain and Information Systems, KNUST School of Business, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067996163","display_name":"Kwame Owusu Kwateng","orcid":"https://orcid.org/0000-0003-4866-997X"},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Kwame Owusu Kwateng","raw_affiliation_strings":["Department of Supply Chain and Information Systems, KNUST School of Business, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Supply Chain and Information Systems, KNUST School of Business, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana","institution_ids":["https://openalex.org/I28046988"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024987280","display_name":"Benjamin Kofi Asante","orcid":null},"institutions":[{"id":"https://openalex.org/I28046988","display_name":"Kwame Nkrumah University of Science and Technology","ror":"https://ror.org/00cb23x68","country_code":"GH","type":"education","lineage":["https://openalex.org/I28046988"]}],"countries":["GH"],"is_corresponding":false,"raw_author_name":"Benjamin Kofi Asante","raw_affiliation_strings":["Department of Supply Chain and Information Systems, KNUST School of Business, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana"],"affiliations":[{"raw_affiliation_string":"Department of Supply Chain and Information Systems, KNUST School of Business, Kwame Nkrumah University of Science and Technology, Kumasi, Ghana","institution_ids":["https://openalex.org/I28046988"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5056338476"],"corresponding_institution_ids":["https://openalex.org/I28046988"],"apc_list":null,"apc_paid":null,"fwci":1.6014,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.87667831,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"28","issue":"5","first_page":"719","last_page":"741"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9927999973297119,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.6190714836120605},{"id":"https://openalex.org/keywords/dimension","display_name":"Dimension (graph theory)","score":0.5613082647323608},{"id":"https://openalex.org/keywords/descriptive-statistics","display_name":"Descriptive statistics","score":0.5422078967094421},{"id":"https://openalex.org/keywords/persuasion","display_name":"Persuasion","score":0.5288839340209961},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4350120425224304},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.41181686520576477},{"id":"https://openalex.org/keywords/marketing","display_name":"Marketing","score":0.3247852325439453},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.30999755859375},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2911318242549896},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.26009294390678406}],"concepts":[{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.6190714836120605},{"id":"https://openalex.org/C33676613","wikidata":"https://www.wikidata.org/wiki/Q13415176","display_name":"Dimension (graph theory)","level":2,"score":0.5613082647323608},{"id":"https://openalex.org/C39896193","wikidata":"https://www.wikidata.org/wiki/Q380344","display_name":"Descriptive statistics","level":2,"score":0.5422078967094421},{"id":"https://openalex.org/C2781310500","wikidata":"https://www.wikidata.org/wiki/Q1231428","display_name":"Persuasion","level":2,"score":0.5288839340209961},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4350120425224304},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.41181686520576477},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.3247852325439453},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.30999755859375},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2911318242549896},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.26009294390678406},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-02-2020-0021","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-02-2020-0021","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7400000095367432,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":89,"referenced_works":["https://openalex.org/W53111484","https://openalex.org/W171321760","https://openalex.org/W577135136","https://openalex.org/W618906536","https://openalex.org/W657411145","https://openalex.org/W1489771250","https://openalex.org/W1523448473","https://openalex.org/W1532999289","https://openalex.org/W1560371066","https://openalex.org/W1581366377","https://openalex.org/W1591013228","https://openalex.org/W1602011302","https://openalex.org/W1604721865","https://openalex.org/W1863383349","https://openalex.org/W1879733395","https://openalex.org/W1903961850","https://openalex.org/W1964088509","https://openalex.org/W1970174926","https://openalex.org/W1983473081","https://openalex.org/W1987321975","https://openalex.org/W1996190548","https://openalex.org/W1996588305","https://openalex.org/W1997703004","https://openalex.org/W1999522461","https://openalex.org/W2001853817","https://openalex.org/W2006212475","https://openalex.org/W2022122406","https://openalex.org/W2024306338","https://openalex.org/W2030660416","https://openalex.org/W2034105776","https://openalex.org/W2038413674","https://openalex.org/W2040517709","https://openalex.org/W2042409538","https://openalex.org/W2042543915","https://openalex.org/W2061604051","https://openalex.org/W2062025920","https://openalex.org/W2072295764","https://openalex.org/W2078690141","https://openalex.org/W2084780150","https://openalex.org/W2086048782","https://openalex.org/W2090529054","https://openalex.org/W2101179869","https://openalex.org/W2106611382","https://openalex.org/W2110505891","https://openalex.org/W2112920639","https://openalex.org/W2117278106","https://openalex.org/W2118905014","https://openalex.org/W2130209289","https://openalex.org/W2133783145","https://openalex.org/W2134049139","https://openalex.org/W2141533357","https://openalex.org/W2142418121","https://openalex.org/W2142909119","https://openalex.org/W2147294097","https://openalex.org/W2150578949","https://openalex.org/W2183019850","https://openalex.org/W2183395744","https://openalex.org/W2185612237","https://openalex.org/W2222755255","https://openalex.org/W2238124352","https://openalex.org/W2265247067","https://openalex.org/W2294160435","https://openalex.org/W2310259997","https://openalex.org/W2314666359","https://openalex.org/W2327438047","https://openalex.org/W2334095710","https://openalex.org/W2337703333","https://openalex.org/W2463181960","https://openalex.org/W2470904513","https://openalex.org/W2520633532","https://openalex.org/W2527806596","https://openalex.org/W2560068748","https://openalex.org/W2560182296","https://openalex.org/W2571810488","https://openalex.org/W2583323182","https://openalex.org/W2606323254","https://openalex.org/W2620834679","https://openalex.org/W2624073501","https://openalex.org/W2736213052","https://openalex.org/W2808265019","https://openalex.org/W2890300630","https://openalex.org/W2926999694","https://openalex.org/W2948200889","https://openalex.org/W2957484462","https://openalex.org/W2992458345","https://openalex.org/W3122086400","https://openalex.org/W4238228883","https://openalex.org/W4251147371","https://openalex.org/W4292808503"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2082477038","https://openalex.org/W2596401017","https://openalex.org/W2336762005","https://openalex.org/W2949850615","https://openalex.org/W2149414854","https://openalex.org/W4236800945","https://openalex.org/W1964702698","https://openalex.org/W2026993166"],"abstract_inverted_index":{"Purpose":[0],"The":[1],"inception":[2],"of":[3,31,33,38,53,72,89,91,121,139,152,171,180,221],"mobile":[4],"financial":[5],"services":[6],"(MFSs)":[7],"has":[8,17],"positively":[9],"provoked":[10],"economic":[11],"growth":[12],"and":[13,36,76,115,129,149],"productivity,":[14],"nonetheless,":[15],"it":[16,161],"pessimistically":[18],"caused":[19],"an":[20],"upward":[21],"surge":[22],"in":[23,99,204],"cybersecurity":[24],"threat.":[25],"Customers":[26],"are":[27,201],"progressively":[28],"becoming":[29],"conscious":[30],"some":[32,44],"the":[34,48,60,86,122,136,177,185,192],"threat":[35,78],"several":[37],"them":[39],"now":[40],"shun":[41],"away":[42],"from":[43,96],"suspicious":[45],"activities":[46],"over":[47],"internet":[49],"as":[50],"a":[51,168,218],"form":[52],"protection.":[54],"This":[55],"study":[56,210],"aims":[57],"to":[58,65,84,187,190,213],"explore":[59],"factors":[61],"that":[62,125,146,164],"influence":[63,156],"users\u2019":[64],"adopt":[66],"security":[67,87,178,199,223],"behaviour.":[68,173,224],"Design/methodology/approach":[69],"A":[70],"synthesis":[71],"theories":[73,80],"\u2013":[74,81],"Self-efficacy":[75],"technology":[77],"avoidance":[79,137,158,165,172],"was":[82,94,107,162],"used":[83],"examine":[85],"behaviour":[88,179,200],"users":[90,153,182],"MFSs.":[92],"Data":[93,105],"gathered":[95],"530":[97],"students":[98],"Ghana":[100],"using":[101,110],"convenience":[102],"sampling":[103],"technique.":[104],"analysis":[106],"carried":[108],"out":[109],"descriptive":[111],"statistics,":[112],"inferential":[113],"statistics":[114],"structural":[116],"equation":[117],"model.":[118],"Findings":[119],"Outcome":[120],"investigation":[123],"indicate":[124],"both":[126],"mastery":[127],"experience":[128,151],"verbal":[130],"persuasion":[131],"have":[132],"substantial":[133],"effect":[134],"on":[135,197],"motivation":[138,166],"MFSs":[140],"users.":[141],"It":[142],"was,":[143],"however,":[144],"found":[145],"emotional":[147],"state":[148],"vicarious":[150],"do":[154],"not":[155],"their":[157],"motivation.":[159],"Also,":[160],"established":[163],"is":[167],"positive":[169],"prognosticator":[170],"Practical":[174],"implications":[175],"Understanding":[176],"MFS":[181],"will":[183,211],"help":[184],"operators":[186],"outline":[188],"strategies":[189],"sustain":[191],"successes":[193],"achieved.":[194],"Originality/value":[195],"Studies":[196],"user":[198,222],"rare,":[202],"especially":[203],"sub":[205],"Saharan":[206],"Africa,":[207],"thus,":[208],"this":[209],"contribute":[212],"extant":[214],"literature":[215],"by":[216],"adding":[217],"new":[219],"dimension":[220]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
