Behavioural Insights Into Cybersecurity Practices Among Digital Banking Consumers in South Africa

Authors

  • Ntswaki Petunia Matlala University of Western Cape

DOI:

https://doi.org/10.55927/ijba.v3i4.5515

Keywords:

Digital Banking, Cybersecurity, Consumer Behaviour, South Africa

Abstract

Digital banking is linked with several cybersecurity threats, such as the risk of hackers. Against this background, this study aims to explore behavioural insights into cybersecurity practices among digital banking consumers in South Africa. The researcher gathered data from 338 South African banking consumers. A structured questionnaire was used to survey these consumers, and the obtained data were analysed using structural equation modelling (SEM). The results revealed that subjective norms, self-efficacy, and attitude significantly influence the cybersecurity intention behaviour of digital banking consumers. The implications of the study's findings need to be more readily generalisable due to the sociocultural differences across different provinces and populations. Future research should include a more diverse sample to validate these findings further.

Downloads

Download data is not yet available.

References

Ajzen, I. (1991). The Theory of Planned Behaviour. Organizational Behavior and Human Decision Processes, 50(2), 179–211.

Ajzen, I., & Fishbein, M. (1975). A Bayesian analysis of attribution processes. Psychological Bulletin, 82(2). https://doi.org/10.1037/h0076477

Alanazi, M., Freeman, M., & Tootell, H. (2022). Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior, 136. https://doi.org/10.1016/j.chb.2022.107376

Aldiabat, K., Al-Gasaymeh, A., & Rashid, A. S. K. (2019). The effect of mobile banking application on customer interaction in the Jordanian banking industry. International Journal of Interactive Mobile Technologies, 13(2). https://doi.org/10.3991/ijim.v13i02.9262

Alzoubi, H. M., Ghazal, T. M., Hasan, M. K., Alketbi, A., Kamran, R., Al-Dmour, N. A., & Islam, S. (2022). Cyber Security Threats on Digital Banking. 2022 1st International Conference on AI in Cybersecurity, ICAIC 2022. https://doi.org/10.1109/ICAIC53980.2022.9896966

Bansal, K. M. (2020). Cyber Security Issues Affecting Online Banking Transaction: A Thematic Analysis. 19(4), 7724–7740. https://doi.org/10.17051/ilkonline.2020.04.765171

Bouveret, A., Christo, S., Gaidosch, T., Haksar, V., Kopp, E., Maino, R., Patnam, M., Rochon, C., Poirson-Ward, H., Stetsenko, N., Touré, A., Tiffin, A., Wilson, C., & Wiseman, K. (2018). Cyber Risk for the Financial Sector: A Framework for Quantitative Assessment Cyber Risk for the Financial Sector.

Butler, R. (2020). A systematic literature review of the factors affecting smartphone user threat avoidance behaviour. In Information and Computer Security (Vol. 28, Issue 4, pp. 555–574). Emerald Group Holdings Ltd. https://doi.org/10.1108/ICS-01-2020-0016

Chai, J. C. Y., Malhotra, N. K., & Dash, S. (2015). The impact of relational bonding on intention and loyalty. Journal of Hospitality and Tourism Technology, 6(3). https://doi.org/10.1108/jhtt-08-2014-0035

Chin, W. (1998). The partial least squares approach to structural equation modeling. In G. A. Marcoulides(ed.), Modern methods for business research. In Handbook of Partial Least Squares.

da Veiga, A., Loock, M., & Renaud, K. (2022). Cyber4Dev-Q: Calibrating cyber awareness in the developing country context. Electronic Journal of Information Systems in Developing Countries, 88(1). https://doi.org/10.1002/isd2.12198

Das, A., & Khan, H. U. (2016). Security behaviors of smartphone users. Information and Computer Security, 24(1). https://doi.org/10.1108/ICS-04-2015-0018

Dash, G., & Paul, J. (2021). CB-SEM vs PLS-SEM methods for research in social sciences and technology forecasting. Technological Forecasting and Social Change, 173. https://doi.org/10.1016/j.techfore.2021.121092

de Kok, L. C., Oosting, D., & Spruit, M. (2020). The Influence of Knowledge and Attitude on Intention to Adopt Cybersecure Behaviour. Information & Security: An International Journal, 46(3). https://doi.org/10.11610/isij.4618

de Vaus, D. (2013). SURVEYS IN SOCIAL RESEARCH, 6th Edition. In Surveys in Social Research, 6th Edition. https://doi.org/10.4324/9780203519196

DINC, M. S., & BUDIC, S. (2016). The Impact of Personal Attitude, Subjective Norm, and Perceived Behavioural Control on Entrepreneurial Intentions of Women. Eurasian Journal of Business and Economics, 9(17), 23–35. https://doi.org/10.17015/ejbe.2016.017.02

Du Toit, R., Hadebe, P. N., & Mphatheni, M. (2018). Public Perceptions of Cybersecurity: A South African Context. Southern African Journal of Criminology, 31(3).

Farooq, A., Jeske, D., & Isoaho, J. (2019). Predicting Students’ Security Behavior Using Information-Motivation-Behavioral Skills Model.

Fincham, J. E. (2008). Response rates and responsiveness for surveys, standards, and the Journal. In American journal of pharmaceutical education (Vol. 72, Issue 2). https://doi.org/10.5688/aj720243

Fornell, C., & Larcker, D. F. (1981). Evaluating Structural Equation Models with Unobservable Variables and Measurement Error. Journal of Marketing Research, 18(1). https://doi.org/10.1177/002224378101800104

Gomes, L., Deshmukh, A., & Anute, N. (2022). Cyber Security and Internet Banking: Issues and Preventive Measures. Journal of Information Technology and Sciences, 8(2), 31–42. https://doi.org/10.46610/joits.2022.v08i02.005

Haddad, G. E., Shahab, A., & Aïmeur, E. (2018). Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online Shopping. 2018 16th Annual Conference on Privacy, Security and Trust, PST 2018. https://doi.org/10.1109/PST.2018.8514190

Hair, J. F., Anderson, R. E., Tatham, R. L., & Black, W. C. (2019). Multivariate Data Analysis, Multivariate Data Analysis. In Book (Vol. 87, Issue 4).

Harman, H. H. (1976). Modern factor analysis, 3rd rev. ed. In Modern factor analysis, 3rd rev. ed.

Henseler, J., Ringle, C. M., & Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1). https://doi.org/10.1007/s11747-014-0403-8

Hoque, A. S. M. M., Awang, Z., & Siddiqui, B. A. (2017). Technopreneurial Intention Among University Students of Business Courses In Malaysia: A Structural Equation Modeling. International Journal of Entrepreneurship and Small & Medium Enterprise (IJSME), 4(July).

Jang, J., & Kim, B. (2022). The Impact of Potential Risks on the Use of Exploitable Online Communities: The Case of South Korean Cyber-Security Communities. Sustainability (Switzerland), 14(8). https://doi.org/10.3390/su14084828

Jennings, J. E., Rahman, Z., & Dempsey, D. (2023). Challenging What We Think We Know: Theory and Evidence for Questioning Common Beliefs About the Gender Gap in Entrepreneurial Confidence. Entrepreneurship: Theory and Practice, 47(2). https://doi.org/10.1177/10422587221102108

Kangapi, T. M., & Chindenga, E. (2022). Towards a Cybersecurity Culture Framework for Mobile Banking in South Africa. 2022 IST-Africa Conference, IST-Africa 2022. https://doi.org/10.23919/IST-Africa56635.2022.9845633

Khan, B., Alghathbar, K. S., Nabi, S. I., & Khan, M. K. (2011). Effectiveness of information security awareness methods based on psychological theories. AFRICAN JOURNAL OF BUSINESS MANAGEMENT, 5(26), 10862–10868. https://doi.org/10.5897/ajbm11.067

Khrais, L. T. (2015). Highlighting the vulnerabilities of online banking system. Journal of Internet Banking and Commerce, 20(3). https://doi.org/10.4172/1204-5357.1000120

Kruger, H. A., & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers and Security, 25(4), 289–296. https://doi.org/10.1016/j.cose.2006.02.008

Limna, P., Kraiwanit, T., & Siripipattanakul, S. (2023). The Relationship between Cyber Security Awareness, Knowledge, and Behavioural Choice Protection among Mobile Banking Users in Thailand. International Journal of Computing Sciences Research, 7, 1133–1151.

McCormac, A., Calic, D., Parsons, K., Butavicius, M., Pattinson, M., & Lillie, M. (2018). The effect of resilience and job stress on information security awareness. Information and Computer Security, 26(3), 277–289. https://doi.org/10.1108/ICS-03-2018-0032

Moletsane, T., & Tsibolane, P. (2020). Mobile Information Security Awareness among Students in Higher Education : An Exploratory Study. 2020 Conference on Information Communications Technology and Society, ICTAS 2020 - Proceedings. https://doi.org/10.1109/ICTAS47918.2020.233978

Ncubukezi, T. (2022). Human Errors: A Cybersecurity Concern and the Weakest Link to Small Businesses.

Nobles, C. (2018). Botching Human Factors in Cybersecurity in Business Organizations. HOLISTICA – Journal of Business and Public Administration, 9(3), 71–88. https://doi.org/10.2478/hjbpa-2018-0024

Nohumba, I., Nohumba, I., & Nyambuya, G. (2020). Integrating offline and online platforms for seamless banking experience. Journal of Management & Administration, 1(I).

Nowrin, S., & Bawden, D. (2018). Information security behaviour of smartphone users: An empirical study on the students of university of Dhaka, Bangladesh. Information and Learning Science, 119(7–8), 444–455. https://doi.org/10.1108/ILS-04-2018-0029

Omidosu, J., & Ophoff, J. (2017). A theory-based review of information security behavior in the organization and home context. Proceedings - 2016 3rd International Conference on Advances in Computing, Communication and Engineering, ICACCE 2016. https://doi.org/10.1109/ICACCE.2016.8073752

Pankomera, R., & Van Greunen, D. (2018). Challenges, Benefits, and Adoption Dynamics of Mobile Banking at the Base of the Pyramid (BOP) in Africa: A Systematic Review. The African Journal of Information and Communication (AJIC), 21. https://doi.org/10.23962/10539/26113

Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., & Zwaans, T. (2017). The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies. Computers and Security, 66. https://doi.org/10.1016/j.cose.2017.01.004

Quiroz, J. T., Oscategui, M. A. A., & Armas-Aguirre, J. (2021). Cybersecurity Taxonomy: Research and knowledge areas. Proceedings of the 2021 IEEE 1st International Conference on Advanced Learning Technologies on Education and Research, ICALTER 2021. https://doi.org/10.1109/ICALTER54105.2021.9675075

Saunders, M. N. K., Lewis, P., & Thornhill, A. (2019). Chapter 4: Understanding research philosophy and approaches to theory development. In Research Methods for Business Studies (Issue March).

Sheth, A., Bhosale, S., & Kurupkar, F. (2021). A Research on Process of Interaction Between Business Intelligence (BI) and SMES View project. https://www.researchgate.net/publication/352477690

Shrestha, N. (2021). Factor Analysis as a Tool for Survey Analysis. American Journal of Applied Mathematics and Statistics, 9(1), 4–11. https://doi.org/10.12691/ajams-9-1-2

Sulaiman, N. S., Fauzi, M. A., Hussain, S., & Wider, W. (2022). Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information (Switzerland), 13(9). https://doi.org/10.3390/info13090413

Taber, K. S. (2018). The Use of Cronbach’s Alpha When Developing and Reporting Research Instruments in Science Education. Research in Science Education, 48(6). https://doi.org/10.1007/s11165-016-9602-2

Taylor, P. (2023, January 18). Number of smartphone users in South Africa from 2014 to 2023 (in millions). Statista. https://www.statista.com/statistics/488376/forecast-of-smartphone-users-in-south-africa/

Verkijika, S. F. (2020, November 25). Employees’ Cybersecurity Behaviour in the Mobile Context: The Role of Self-Efficacy and Psychological Ownership. 2020 2nd International Multidisciplinary Information Technology and Engineering Conference, IMITEC 2020. https://doi.org/10.1109/IMITEC50163.2020.9334097

Vijayalakshmi, P., Priyadarshini, V., & Umamaheswari, K. (2021). IMPACTS OF CYBER CRIME ON INTERNET BANKING. International Journal of Engineering Technology and Management Sciences, 5(2). https://doi.org/10.46647/ijetms.2021.v05i02.005

von Solms, B., & von Solms, R. (2018). Cybersecurity and information security – what goes where? Information and Computer Security, 26(1), 2–9. https://doi.org/10.1108/ICS-04-2017-0025

Wodo, W., Blaskiewicz, P., Stygar, D., & Kuzma, N. (2021). Evaluating the security of electronic and mobile banking. Computer Fraud and Security, 2021(10), 8–14. https://doi.org/10.1016/S1361-3723(21)00107-X

Zainuddin Hj Awang. (2012). Research Methodology and Data Analysis Second Edition. In UNIZA.Press.

Zhou, G., Gou, M., Gan, Y., & Schwarzer, R. (2020). Risk Awareness, Self-Efficacy, and Social Support Predict Secure Smartphone Usage. Frontiers in Psychology, 11. https://doi.org/10.3389/fpsyg.2020.01066

Downloads

Published

2023-09-05

How to Cite

Matlala, N. P. (2023). Behavioural Insights Into Cybersecurity Practices Among Digital Banking Consumers in South Africa. Indonesian Journal of Business Analytics, 3(4), 1425–1442. https://doi.org/10.55927/ijba.v3i4.5515

Issue

Section

Articles