508
Views
9
CrossRef citations to date
0
Altmetric
Original Articles

Internet Banking Adoption: Comparing Developed and Developing Countries

, , &
Pages 52-61 | Received 13 Jul 2009, Accepted 09 Feb 2010, Published online: 11 Dec 2015

References

  • Ahn, J.H., and Kim, M.S., “Comparison of Trust Sources of an Online Market-Maker in the E-Marketplace: Buyer's and Seller's Perspective,” Journal of Computer Information Systems (47:1), 2006, 84–94.
  • Angie, N.K., and Chow, W.S., “A Study of Trust in E-Shopping Before and After First-Hand Experience Is Gained,” Journal of Computer Information Systems (46:4), 2006, 125–130.
  • Australian Bankers' Association Inc, “Banking Facts and Figures,” available at: www.bankers.asn.au/default.aspx?ArticleID=1069#1 (accessed 12 October 2008).
  • Bank Negara Malaysia, “Usage of Internet Banking,” available at: www.bnm.gov.my/files/publication/fsps/en/2007/zcp07_table_A.34.pdf (accessed 20 October 2008).
  • Belsley, D.A., Kuh, E., and Welsch, R.E., Regression Diagnostics: Identifying Influential Data and Sources of Colinearity, New York: John Wiley and Sons, 1980.
  • Bhattacherjee, A., “Understanding Information Systems Continuance: An Expectation-Confirmation Model,” MIS Quarterly (25:3), 2001, 351–363.
  • Bhattacherjee, A., Perols, J., and Sanford, C., “Information Technology Continuance: A Theoretic Extension and Empirical Test,” Journal of Computer Information Systems (49:1), 2008, 17–26.
  • Burěik, V., Kohun, F.G., and Skovira, R.J., “Analyzing the Effect of Culture on Curricular Content: A Research Conception,” Issues in Informing Science and Information Technology (4:1), 2007, 381–393.
  • CheckFree Consumer Insights, “Consumer Banking and Bill Payment Survey,” available at: www.checkfreecorp.com/cda/corp/L4.jsp?layoutId=52326&contentId=52327 (accessed 20 October 2008).
  • Compeau, D.R., and Higgins, C.A., “Computer Self-Efficacy: Development of a Measure and Initial Test,” MIS Quarterly (19:2), June 1995, 189–211.
  • Dauda, Y., and Santhapparaj, A.S., “The Impact of E-Commerce Security, and National Environment on Consumer Adoption of Internet Banking in Malaysia and Singapore,” Journal of Internet Banking and Commerce (12:2), August 2007.
  • Dillon, A., and Morris, M.G., “User Acceptance of Information Technology: Theories and Models,” Annual Review of Information Science and Technology (31:1), 1996, 3–32.
  • Dinev, T., Goo, J., Hu, Q., and Nam, K., “User Behaviour toward Protective Information Technologies: The Role of National Cultural Differences,” Information Systems Journal (19:4), 2009, 391–412.
  • Eisenhauer, M. P., The Privacy Book: A Global Survey of Privacy and Security Enforcement Actions with Recommendations for Reducing Risks, Australia: Privacy and Information Management Services, 2009.
  • Eriksson, K., Kerem, K., and Nilsson, D., “Customer Acceptance of Internet banking in Estonia,” International Journal of Bank Marketing (23:2), 2005, 200–216.
  • Federal Financial Institutions Examination Council, “Authentication Guidance,” available at: www.ffiec.gov/pdf/authentication_guidance.pdf (accessed 30 October 2008).
  • Gerrard, P., and Cunningham, J.B., “The Diffusion of Internet Banking among Singapore Consumers,” The International Journal of Bank Marketing (21:1), 2003, 16–28.
  • Goles, T., Lee, S.J., Rao, S.V., and Waren, J., “Trust Violations in Electronic Commerce: Customer Concerns and Reactions,” Journal of Computer Information Systems (49:4), 2009, 1–9.
  • Guerrero, M.M., Egea, J.M.O., and Gonzalez, M.V.R., “Profiling the Adoption of Online Banking Services in the European Union,” Journal of Internet Business (1:2), 2005, 1–29.
  • Hamid, M.R.A., Amin, H., Lada, S., and Ahmad, N., “A Comparative Analysis of Internet Banking in Malaysia and Thailand,” Journal of Internet Business (1:4), 2007, 1–19.
  • Hofstede, G., Culture's Consequences: Comparing Values, Behaviors, Institutions, and Organizations across Nations, Thousand Oaks, CA: SAGE Publications, 2001.
  • Jih, W.J., “Effects of Electronic Commerce Implementation in Taiwan,” Journal of Computer Information Systems (42:3), 2002, 68–76.
  • Khalifa, M., and Shen, K.N., “Drivers for Transactional B2c M-Commerce Adoption: Extended Theory of Planned Behavior,” Journal of Computer Information Systems (48:3), 2008, 111–117.
  • Liao, Z., and Cheung, M.T., “Internet-Based E-Banking and Consumer Attitudes: An Empirical Study,” Information & Management (39:4), 2003, 283–305.
  • Lichtenstein, S., and Williamson, K., “Understanding Consumer Adoption of Internet Banking: An Interpretive Study in the Australian Banking Context,” Journal of Electronic Commerce Research (7:2), 2006, 50–66.
  • Malhorta, N., Marketing Research: An Applied Orientation, Sydney: Prentice-Hall, 1999.
  • Michael, F., and Uzoka, E., “Organisational Influences on E-Commerce Adoption In A Developing Country Context Using UTAUT,” International Journal of Business Information Systems (3:3), 2008, 300–316.
  • Nanda, A., and Burleson, D.K., Oracle Privacy Security Auditing: Includes Federal Law Compliance with HIPAA, Sarbanes-Oxley & the Gramm-Leach-Bliley Act GLB, U.S.: Rampant Techpress, 2003.
  • Nunnally, J., Psychometric Theory, New York: McGraw Hill, 1978.
  • Pikkarainen, T., Pikkarainen, K., Karjaluoto, H., and Pahnila, S., “Consumer Acceptance of Online Banking: An Extension of the Technology Acceptance Model,” Internet Research (14:3), 2004, 224–235.
  • Polatoglu, V.N., and Ekin, S., “An Empirical Investigation of the Turkish Consumers' Acceptance of Internet Banking Services,” International Journal of Bank Marketing (19:4), 2001, 156–165.
  • Samudram, M., Services Trade in developing Asia: A Case Study of the Banking and Insurance Sector in Malaysia, Asia-Pacific Research and Training Network on Trade Working Paper Series, July 2007, 40.
  • Sathye, M., “Adoption of Internet Banking by Australian Consumers: An Empirical Investigation,” International Journal of Bank Marketing (17:7), 1999, 324–334.
  • Sun, H., “An Integrative Analysis of TAM: Toward a Deeper Understanding of Technology Acceptance Model,” Proceedings of the 9th American Conference on Information Systems, Tampa, HL, 2002.
  • Sun, H. and Zhang, P., “A Methodological Analysis of User Technology Acceptance,” In Proceeding of the 37th Hawaii International Conference of System Science, Big Island, HI, 2004.
  • Talukder, M., and Yeow, P.H.P., “A Comparative Study of Virtual Communities in Bangladesh and the USA,” Journal of Computer Information Systems (47:4), 2007, 82–90.
  • Trompenaars, F., “Resolving International Conflict: Culture and Business Strategy,” London Business School (7:3), 1996, 51–68.
  • Venkatesh, V., Morris, M.G., Davis, G.B., and Davis, F.D., “User Acceptance of Information Technology: toward A Unified View,” MIS Quarterly (27:3), 2003, 425–478.
  • Yang, M.H., Chandlrees, N., Lin, B., and Chao, H.Y., “The Effect of Perceived Ethical Performance of Shopping Websites on Consumer Trust,” Journal of Computer Information Systems (50:1), 2009, 15–24.
  • Yang, H.D., Moon, Y.J., and Chris, R., “Social Influence on Knowledge Worker's Adoption of Innovative Information Technology,” Journal of Computer Information Systems (50:1), 2009, 25–36.
  • Yeow, P.H.P. and Yuen, Y.Y., “A Technology Acceptance Study of Online Banking Service in Malaysia,” WEBIST 2008 — International Conference on Web Information Systems and Technologies, Funchal, Madeira, Portugal: 4-7 May 2008.
  • Yeow, P. H.P., Yuen, Y.Y., Tong, D.Y.K., and Lim, N., “User Acceptance of Online Banking Service in Australia,” Communications of the IBIMA (1:22), June 2008.
  • Yuen, Y.Y., and Yeow, P.H.P., User Acceptance of Internet Banking Service in Malaysia, Lecture Notes in Business Information Processing, 18, Springer, U.S. (Part of book), 2009, 307–308.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.