Tuesday, June 4, 2019

History Of Internet Banking In Malaysia Information Technology Essay

History Of Internet Banking In Malaysia data Technology EssayIn early 2001 the bursting of the Internet bubble has created numerous assumptions that Internet supporters companies confound lost their opportunities. The Internet companies and Internet players submit been fighting for survival, and most of them have been simmer down experiencing losses. thither are motionless going discussions among practicing managers and academics in reaching a consent in their debate about this new applied science whether the Internet changes the basic way people do business or whether it is just an evolutionary process, offering simply a new distribution channel and communication medium (Moe and Fader, 2001).According to Brown (2001), the New Economy or e-commerce businesses are still at the early life stage. In spite of the collapse of dot.com stock prices in March 2001, Internet function and e-commerce continued to grow at a fast speed. According to eMarketer (2003), the US B2C e-commerce returns comparing to US$51 ace thousand million in 2001reached US$70 billion in 2002, i.e., a jump of 37%. It also forecasted that r until nowues of the e-commerce would incr reliever by 28% to US$90 billion by 2003 by 2004 would occur a nonher increase of 21% to US$109 billion and to US$133 billion, a further 22% increase, by 2005. The expected extensive growth of online purchases via the Internet willing give enormous chances to businesses in general, and Internet Banking (IB) in particular.In this cultivation the call IB and Online Banking (OB) are used interchangeably. IB/OB is different from Electronic Banking (e-banking) in that the latter is a higher aim activity that encompasses non only IB/OB, but also Mobile Banking, SMS Banking, ATM, WAP-banking and opposite electronic pay manpowert remainss that are not operated done the Internet. Our study will focus on IB, because it is considered as the most significant and most popular delivery channel for banking serve in the cyber age.Banks can benefit from much lower operating costs by offering IB operate, which require less staff and fewer physical branches. Customers will also benefit from the convenience, speed and round-the-clock availability of IB services.In order to be able to formulate better marketing strategies for increasing IB economic consumption in the future banks need to study the doers that influence customers intention to come IB so that banks. This study pay backs to examine the manneral intention of UUM students to use IB services with a focus on users perceptions of ease of use and usefulness of IB, and of security of using this new engine room to meet their banking needs. In Chapter 2, we provide a review article of the previous literature on innovation diffusion and technology toleration, based on which we propose a impersonate of customers intention to take for granted IB. We discuss the query methodology in Chapter 3.History of internet banking in MalaysiaOn Ju ne 1, 2000, the Bank Negara Malaysia let locally owned commercial banks offer Internet banking services. On June 15, 2000 the rootage bank to offer Internet banking services in Malaysia was Maybank, the largest domestic bank in terms of assets as well as network distribution which commands its own portal at www.maybank2U.com. Subsequently, internet banking services were offered by Hong Leong Bank, Southern Bank, Multi-Purpose Bank and etc. A review of the Malaysian banking sites in the Internet discovered that all domestic banks, which have been settled an anchor bank status by the BNM, have a web presence. This banking service is currently being provided to individual customers of the bank and the site boasts of the latest 128-bit encryption technology to dispel worries of security among bank customers. Internet banking service provided in the portal consists of banking enquiry functions, credit card payment, bill payment, accounts summary, and funds transfer as well as transacti on history. In the banks providing internet banking services customer support service is provided via e-mails as well as via telephone lines and it is available daily from morning to mid-night (source http//www.arraydev.com/commerce/JIBC/0103_01.htm).Problem StatementFrom reviewing related articles on the current topic, we can find evidence that although consumers have had an interest in advanced internet banking services and tended to have various financial sources or tools for property transactions they have not quickly changed their main propensity to use banking services or goods that they are already familiar with (Futurics 2001). For example, new electronic banking goods or services have not quickly substituted for traditional ones and non-online banking goods or services. Although various electronic banking services have emerged since the ATM was introduced 30 years ago, a fix of consumers still use checks as a primary source for money transactions, and banks still have a l ot of bricks and mortar branches in the market. According to the keep up of Consumer Finances in 2001, about 60% of household heads used checks as a primary source. Furthermore, the number of bank branches expanded from about 65,000 to about 73,000 from 1994 to 2003, even though the number of U.S banks fell from about 12,500 in 1994 to about 9,000 during the same period (Hirtle Metli, 2004). In spite of the emergence of a series of advanced electronic banking services, both consumers and banks still regard non-electronic banking as one of the essential sources for money transaction.However, in global terms the majority of private bankers are still not using internet-banking channel. There are multiple reasons for this. To start with, customers need to have an access to the internet in order to utilize the service. Furthermore, new online users need first to learn how to use the service (Mols et al., 1999). Second, nonusers often complain that internet banking has no social dimens ion, i.e. you are not served in the way you are in a face-to-face situation at a bank branch (Mattila et al., 2003). Third, customers have been afraid of security issues (Sathye, 1999 Hamlet and Strube, 2000 Howcroft et al., 2002).However, this study focuses in the adoption of internet banking services by customers in evidence of the students of Universiti Utara Malaysia. Our study aims to gain a deeper arrangement of the factors influencing the adoption of internet banking services by UUM students.Research questionsThe study intends to answer the imitateers questionsHow UUM students Attitude influence their heading to use IB?What relationship does the perceived rehearsefulness have with the UUM students Attitude and aim to use IB?What relationship does the comprehend Ease of exercise have with the UUM students Attitude and Intention to use IB?Is perceive sack up Security really a concern to UUM students who are using IB?Research ObjectivesThe main aim of this study to de termine the basic factors influence the usage of internet banking in UUM and to examine the factors that affect the adoption of internet banking. The specific objectives are as followTo investigate how UUM students Attitude influence their Intention to use IBTo examine the relationship of sensed Usefulness with the UUM students Attitude and Intention to use IBTo investigate the relationship of perceived Ease of Use with the UUM students Attitude and Intention to use IBTo investigate whether Perceived Web Security is a concern for the usage of internet banking.Significance of the meditateThe study will contribute in expanding the body of knowledge in the internet and technology adoption literature.It will provide academicians and interrogationers with an update on the usage and credence of internet in the banking sector.This research can contribute to an improved understanding of the factors related to users betrothal of new technology. In particularly, this study acts as an und erstanding of the Technology Acceptance mannequin (tam-o-shanter). Also, this research can stimulate the banks providing their services inside UUM Campus such as CIMB, Islamic Bank and Maybank to improve their internet banking services.In the particular perspective, this study is significant to offer useful information for bank management in creating IB marketing strategies. For marketing practitioners, the aim is to offer a holistic and in-depth overview of how customer forms, experience and exploit their satisfaction towards services that offered by the banks.This study contributes to the literature by formulating and validating TAM to predict IB adoption.CHAPTER TWOLiterature reviewAlthough in the past most of studies aim were to extent of understanding of user adoption of technology, few of these studies were conducted on IB services by extending the well-established Technology Acceptance Model (TAM). It is an appropriate time to study the user adoption of IB when the numbers o f global banking groups are rapidly offering and improving IB services on the rise (American Banker, 2002). two academics and banking executives will be interested in such a study. in particular, this study investigates the students perception on the adoption of internet banking for their private purpose. In separate words, our survey focused on UUM students purpose to use internet banking to handle their banking issues.2.1. Technology Acceptance ModelsDavis (1989) developed the Technology Acceptance Model, according to this model users adoption of calculator system depends on their behavioral intention to use, which in turn depends on attitude, consisting of two beliefs, namely Perceived Ease of Use and Perceived Usefulness. In fact, Davis developed TAM by building upon an antecedent theory, the Theory of Reasoned Action (TRA) by Fishbein and Ajzen (1975). In TRA, Fishbein and Ajzen (1975) proposed that intention is the immediate determinant of the corresponding behavior, whic h is carve up into (1) attitude toward behavior, and (2) subjective norm concerning behavior. Davis posited d in TAM that the two theoretical constructs, Perceived Usefulness and Perceived Ease of Use, are fundamental determinants of system use in an organization. These constructs also provide better government notes for predicting and explaining system use than other constructs (Davis, 1989).TAM has been widely used for predicting the acceptance and use of information systems, and recently has been applied to predict Internet adoption as well. In a recent study, Lederer et al. (2000) vary TAM to study world abundant Web (WWW) usage and found evidence to support TAM. Another study of applying TAM in the WWW context was conducted by Moon and Kim (2001). They introduced the construct facetiousness to predict Attitude. data were collected from 152 graduate students of management in Korea. Although the results of findings of test of TAM-related hypotheses showed that they were a ll supported, the results deviated from the basic belief of TAM that Perceived Usefulness is the key determinant of user acceptance of IT. The results of Moon and Kim (2001) revealed that Perceived Ease of Use has a more significant relationship with Attitude than Perceived Usefulness in the WWW context, and Perceived Playfulness (an intrinsic motivational factor) has a more positive effect on Attitude than Perceived Usefulness (an extrinsic motivational factor).2.2. Theoretical Model for IB betrothalIB is a new distribution channel for the delivery of banking services. From both academic and practical perspectives, it is interesting to understand and assess customers intention to use IB services. We have elect TAM as the baseline model for this study because it is a well-tested model concerning users acceptance of technology. We augment TAM with the construct Perceived Web Security. Specifically, we hypothesize that Intention to Use is influenced by Attitude, Perceived Usefulness, Perceived Ease of Use and Perceived Web Security. We will test the strength of the hypothesized relationships embedded in the theoretical model and the robustness of the model in predicting students intention to adopt IB in Universiti Utara Malaysia Campus.TAM has been used by various researchers to predict users intention to accept or adopt a variety of technologies and computer systems. The technologies include electronic mail, text editor, word processing systems, and graphics software (Davis, 1989 Davis et al., 1989), spreadsheets (Hendrickson et al., 1993), Database Management Systems (Szajna, 1994), voice-mail and word processors (Adams et al., 1992 Chin and Todd, 1995). We use TAM with the constructs Perceived Usefulness and Perceived Ease of Use to assess the determinants of students Attitude and Intention to Use (equivalent to the construct Behavioral Intention in TAM). While we adopt the original TAM in this study, we use Behavioral Intention as the dependent shifting an d skip the construct Actual Usage. On the theoretical front, an abundance of research studies have reported a strong and significant causal relationship between behavioral intention and usage of technology or targeted behavior (Sheppard et al., 1988 Venkatesh and Morris, 2000). It is therefore theoretically justifiable to use Behavioral Intention as a dependent variable to examine the acceptance of IB (Mathieson, 1991). Agarwal and Prasad (1999) also argued that for a survey-based research design, Behavioral Intention is more appropriate than Actual Usage as they are measured contemporaneously with beliefs and our study is survey-based research. On the practical front, it is worth noting that IB is still at an early stage of development among UUM students. The percentage of usage is not relatively high. Therefore, the choice of Behavioral Intention, rather than Actual Usage, as the dependent variable is considered both appropriate and necessary.In addition, capital of Zimbabwe et a l. (2001) argue that feeling secure in doing transactions on the Web is often cited by users as a major factor that removes their concerns about the efficient use of the Internet for making online purchases. Therefore, we include the construct Perceived Web Security as a forecaster of Attitude and Intention to Use, as in the earlier study conducted by Salisbury et al. (2001). In their study, Salisbury et al. (2001) developed a set of four items to measure Perceived Web Security using a 7-point Likert scale. The results of their study showed that the three constructs, namely Perceived Web Security, Perceived Ease of Use and Perceived Usefulness, have a positive relationship with intention to purchase online. However, we will include the construct Attitude in our theoretical model.CHAPTER THREEResearch MethodologyThere exists virtually no research examining UUM students behavioral intention to adopt IB services by extending TAM. To fill this gap, we will conduct a survey study for d ead reckoning testing using the framework of the original TAM as the foundation to determine the predictors of students Intention to use IB in UUM. To collect data, we will design a questionnaire by adapting the promoter and scales developed for TAM. We will augment TAM by adding the construct Perceived Web Security developed by Salisbury et al. (2001) and adapting their instrument and scale to measure this construct in our questionnaire.3.1. Sample SizeThis study aims to investigate the self-reported behaviors of students and their intention to use IB services for their private purposes in UUM. We will entreat respondents to return their completed questionnaires. We will collect data from UUM students who use internet banking. We will as to fill in the survey questionnaires to a sample of 250 haphazardly students selected from a total of over 25,000 students in UUM.3.2. Measurement of the ConstructsIn devising a useful measurement instrument for this study, we want to adapt an i nstrument and scales developed and validated in previous studies. We will base on TAM instrument, which has been replicated and widely used in other studies. In this study we use the adapted question items as the instrument to measure the respective constructs below, using a 7-point Likert scale for each item (with 1 = strongly disagree, 2 = disagree, 3 = slimly disagree, 4 = neutral, 5 = slightly agree, 6 = agree, and 7 = strongly agree). The constructs are defined in the followingPerceived Ease of Use (PEOU) defined by Davis (1989) as the degree to which a person believes that using a particular system would enhance his job performance.Perceived Usefulness (PU) defined by Davis (1989) as the degree to which a person believes that using a particular system would be free of effort.Perceived Web Security (PWS) defined by Salisbury et al. (2001) as the extent to which one believes that the World Wide Web is secure for transmitting sensitive information. It is also noted that the a doption of purchasing products on the World Wide Web may involve a greater degree of risk than the adoption of other IT innovations. When one purchases products online, there may be a perception of risk involved in transmitting sensitive information such as credit card numbers across the World Wide Web.Attitude (ATT) refers to an individuals positive or negative feelings (evaluative affect) about performing a particular behavior (Fishbein and Ajzen, 1975).Intention to Use (INT) refers to customers intention to use, as opposed to their factual use of, IB services.3.3. Survey QuestionnaireBased on the hypothesized model developed through a detailed review of the related literature on user acceptance of technology and new technology diffusion, we will devise a questionnaire as a measurement scale for the research. The questionnaire will be developed in English. We will try to make the questionnaire readable and ensure its accuracy and appropriateness. A factor compend will be perfo rmed on the data collected from the pilot study.CHAPTER tetradFINDINGS hit 85 research questionnaires were distributed to and collected from the respondents in the library building of Universiti Utara Malaysia. The sample period consists of 3 weeks from August 22 to September 12, 2010. Factor analysis was done by using SPSS with the data collected by distributing questionnaires.4.1. Respondents Demographic CharacteristicsThe analysis of the statistics of the demographic characteristics of the respondents is presented in evade 1. Of the 85 respondents, 47.1% were female and 52.9% male 37.6% were in the 21-25 age group, 41.2% were 26-30 in age, and 20% were 31-40 in age. As the research was done among master students, any respondent was not under the age of 20, and only one of them was over 40.Table 1Demographics of respondentsDemographic profileFrequencyPercentage (%)GenderFFemale4047.1MMale4552.9Total85100.0AgeAUnder 2000B21-253237.6C26-303541.2D31-401720.0E every cast 4011.285100 .0Rogers (1983) has found the characteristics of innovation adopters as having high levels of education, and social status as well as income. Moreover, Gefen (1997) and Teo Lim (2000) by testing the grammatical gender differences which affect the awareness of e-mail and the Internet usage, found similar results with Rogers (1983).4.2. Factor outlineUsing SPSS we conducted our exploratory factor analysis on our survey data. Table 2 presents the rotated factor matrix which is a result from independent variables Varimax rotated principal axis factor extraction. The 1.0 eigenvalue cut-off criterion was used for the independent variables factor extraction. The table points out that five factors which are the variables used for our research emerged and reports their factor loadings.For evaluation of the Cronbachs alpha we tested the data using the SPSS Exploratory Factor Analysis (EFA), where the Cronbachs alpha ranged from 0.896 to 0.914. To ensure convergent asperity and item reliab ility we evaluated each of the items individually. All factor loadings except for b7, b10 and b15 (0.478 0.424 and 0.486, respectively) were larger than 0.5, which characterize an acceptable significant level of internal validity. The factor loadings vary from 0.554 to 0.744 for Perceived Ease of Use, 0.478 to 0.686 for Perceived Usefulness, 0.424 to 0.642 for Perceived Web Security, 0.486 to 0.536 for Attitude, and 0.539 to 0.621 for Intention to Use. All 19 questionnaire items were held on to further analysis, because all factor loadings were found to be of an acceptable significant level.Table 2Reliability and factor analysis (from SPSS analysis)ReliabilityFactor loadingCronbach alphaVarianceexplained (%)Perceived Ease of Use0.91176.920B/b1-Using the Internet Banking (IB) service is easy for me0.9250.594B/b2-I find my interaction with the IB services clear and understandable0.9290.613B/b3-It is easy for me to have skillful in the use of the IB services0.9250.554B/b4-Overall, I f ind the use of the IB services easy0.9270.744Perceived Usefulness (PU)0.9147.979B/b5-Using the IB would enable me to set up my tasks more quickly0.9290.522B/b6-Using the IB would make it easier for me to carry out my tasks0.9250.603B/b7-I would find the IB useful0.9270.478B/b8-Overall, I would find using the IB to be expedient0.9260.686Perceived Web Security (PWS)0.8967.075B/b9-I would feel secure sending sensitive information across the IB0.9260.575B/b10-The IB is a secure means through which to send sensitive information0.9270.424B/b11-I would feel totally safe providing sensitive information about myself over the IB0.9240.642B/b12-Overall, the IB is a safe place to transmit sensitive information0.9250.639Attitude (ATT)0.9074.772B/b13-Using the IB is a good idea0.9270.536B/b14-I would feel that using the IB is pleasant0.9280.502B/b15-In my opinion, it would be desirable to use the IB0.9280.486B/b16-In my view, using the IB is a wise idea0.9270.508Intention to Use (IU)0.9063.254 B/b17-I would use the IB for my banking needs0.9250.621B/b18-Using the IB for handling my banking transactions is something I would do0.9260.551B/b19-I would see myself using the IB for handling my banking transactions0.9260.5394.3. Reliability testFor reliability tests, the Cronbachs alpha ranged from 0.925 to 0.929 for both Perceived Ease of Use and Perceived Usefulness, from 0.924 to 0.927 for Perceived Web Security, while it ranged from 0.927 to 0.928 for Attitude and from 0.925 to 0.926 for Intention to Use.Correlation analyses of variables show that estimation ranges from 0.620 to 0.778 with significant P for all variables as shown in Table 3. Perceived Ease of Use has a direct impact on Perceived Usefulness with 0.000 significant level. Perceived Usefulness, Perceived Ease of Use and Perceived Web Security significantly impacts on Attitude at the 0.000 level. Consequently, Attitude, Perceived Usefulness and Perceived Web Security significantly effect Intention to Use.Table 3C orrelation of variablesEstimatePPUPEOU0.683**0.000ATPU0.680**0.000ATPEOU0.620**0.000ATPWS0.778**0.000IUATT0.768**0.000IUPU0.642**0.000IUPWS0.735**0.000**. Correlation is significant at the 0.01 level (2-tailed).CHAPTER FIVECONCLUSIONS5.1 LimitationsSince our research was performed with time limitation, as with other crossectional studies, it is not without limitations. A wider study for more fully investigation of the pre-launch stage, the promotion stage and the post-launch stage of IB would surely be an important donation to the IB literature in the future.Our research only covers Web security construction. Future research might concentrate on security and privacy separately, as the latter is arousing rising concentration in the Web literature (Jarvenpaa and Todd, 1997). Moreover, the measurement instrument for Web security could be further developed to increase its validity in future studies.Our research was carried out in Universiti Utara Malaysia among international master stud ents only. It may not represent all the students of UUM, as well as other territories and people.5.2 ConclusionsThe findings of our empirical study support the theoretical model implementing TAM and the put up Perceived Web Security. From the results of our study Perceived Ease of Use and Perceived Web Security are supported as predicting variables, which have an effect on intervening variables, Perceived Usefulness and Attitude, and the dependent variable Intention to Use IB. Perceived Usefulness and Perceived Web Security as well as Perceived Ease of Use directly effect Intention to Use.Perceived Web Security effects on Intention to Use directly, rather than passing through Attitude which is the intervening variable. It is consistent with the findings of empirical studies provided earlier (Salisbury et al., 2001).ReferenceAdams, D.A., Nelson, R.R. and Todd, P.A., 1992. Perceived usefulness, ease of use, and usage of information technology a replication, MIS Quarterly, 16, 227-247. Agarwal, R., and Prasad, J., 1999. Are individual differences germane to the acceptance of new information technologies? Decision Sciences, 30, 361-391.American Banker, In brief fast growth for small-biz web banking, American Banker 167 (20) (2002).Brown R.D., E-commerce customer service success factors, Futurics 25 (2001) 18-30.Chin, W.W. and Todd, P.A., 1995. On the use, usefulness, and ease of use of structural equation modeling in MIS research a note of caution. MIS Quarterly, 19, 237-246.Davis, F. D., 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13, 319-336.Davis F.D., Bagozzi R.P. and Warshaw P.R., 1989. User acceptance of computer technology a comparison of two theoretical models. Management Science, 35, 982-1003.eMarketer, The US B2C Review, 2003, http//www.emarketer.com/estats/081699_data.html http//www.emarketer.com/products/report.php?eglobal (retrieved on 29 August 2003).Fishbein, M.A. and Ajzen, I., 19 75. Belief, Intention and Behavior An introduction to Theory and Research. Addison-Wesley, Reading, Massachusetts.Gefen, D., Karahanna, E. and Straub, D. W., 2003. self-assurance and TAM in online shopping an integrated model. MIS Quarterly, 27, 51-90.Hamlet, C. and Strube, M. (2000), Community banks go online, ABA Banking Journals 2000 White Paper/Banking on the Internet, March, pp. 61-5.Hendrickson, A.R., Massey, P.D. and Cronan, T.P., 1993. On the test-retest reliability of perceived usefulness and perceived ease of use scales. MIS Quarterly, 17, 227-230.Hirtle, Beverly J. and Christopher Metli. The Evolution of U.S. Bank Branch Networks Growth, Consolidation, and Strategy, Federal Reserve Bank of New York, Current Issues in Economic and Finance, July 2004, 10(8).Howcroft, B., Hamilton, R. and Hewer, P. (2002), Consumer attitude and the usage and adoption of home-based banking in the United Kingdom, The International Journal of Bank Marketing, Vol. 20 No. 3, pp. 111-21.Jarvenpaa , S.L. and Todd, P.A., 1997. Consumer reactions to electronic shopping on the World Wide Web. International Journal of Electronic Commerce, 1, 59-88.Lederer A.L., D.J. Maupin, M.P. Sena, Y.L. Zhuang, 2000. The technology acceptance model and the world wide web, Decision Support Systems 29, 269-282.Mathieson, K., 1991. Predicting user intention comparing the technology acceptance model with the theory of planned behavior. Information Systems Research, 2, 173-191Mattila, M., Karjaluoto, H. and Pento, T. (2003), Internet banking adoption among mature customers early majority or laggards, Journal of Services Marketing, Vol. 17 No. 5, pp. 514-26.Moe, W.W. and Fader, P.S., 2001. Uncovering patterns in cybershopping. California Management Review, 43, 106-117.Mols, N.P., Bukh, P.N.D. and Nielsen, J.F. (1999), scattering channel strategies in Danish retail banking, International Journal of Retail Distribution Management, Vol. 27 No. 1, pp. 37-47.Moon, J.W. and Kim, Y.G., 2001. Extending th e TAM for a World-Wide-Web context. Information and Management, 38, 217-230.Rogers, E.M., 1995. Diffusion of Innovations, quaternate Edition. The Free Press, New York.Salisbury, W.D., Pearson, R.A., Pearson, A.W. and Miller D.W., 2001, Perceived security and World Wide Web purchase intention. Industrial Management Data Systems, 101, 165-176.Sathye, M., 1999. Adoption of Internet Banking by Australian consumers an empirical investigation. International Journal of Bank Marketing, 17, 324-334.Sheppard, B.H., Hartwick, J., and Warshaw, P.R., 1988. The theory of reasoned action a meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 6, 144-176.Szajna, B., 1994. Software evaluation and choice predictive validation of the technology acceptance instrument. MIS Quarterly, 18, 319-324.Teo, T.S.H., Lim, V.K.G. and Lai, R.Y.C. (1999), Intrinsic and extrinsic motivation in Internet usage, Omega, International Journal of Managem ent Science, Vol. 27, pp. 25-37.Venkatesh, V. and Morris, M.G., 2000. Why dont men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24, 115-139.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.