IDEAS home Printed from https://ideas.repec.org/a/igg/jesma0/v6y2014i2p37-66.html
   My bibliography  Save this article

User Acceptance and Mobile Payment Security

Author

Listed:
  • Florian Urmetzer

    (University of Cambridge, Cambridge, UK)

  • Isabelle Walinski

    (Thomas Cook AG, Oberursel, Germany)

Abstract

There have been multiple studies detailing mobile payment and its market potential. There is a gap in the literature when it comes to the study of acceptance factors focusing on security and trust. The researchers asked which qualities of security have an influence on the acceptance of a mobile payment service provider. Therefore this study will focus on distinguishing security in two dimensions: objective and subjective security. Objective security represents the user's perception of existing technical safety mechanisms. Subjective security is intangible, based on the user's feelings and perception towards security (trust). The Technology Acceptance Model (TAM) was the theoretical model used in the study. About three hundred responses were collected using an online questionnaire. The study showed that despite the financial crisis banks are still the preferred providers for mobile payment services, where over 80% of the respondents would like to receive the service from a bank. In contrast, only 20% would like to receive such a service from a mobile phone producer. Additionally objective security does not substantially increase subjective security; hence the user trusts the provider rather than the technology itself.

Suggested Citation

  • Florian Urmetzer & Isabelle Walinski, 2014. "User Acceptance and Mobile Payment Security," International Journal of E-Services and Mobile Applications (IJESMA), IGI Global, vol. 6(2), pages 37-66, April.
  • Handle: RePEc:igg:jesma0:v:6:y:2014:i:2:p:37-66
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijesma.2014040104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jesma0:v:6:y:2014:i:2:p:37-66. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.