Publikationen

Mit unseren Publikationen decken wir die unterschiedlichsten Forschungsbereiche ab, die sich im Feld von Mensch, Aufgabe und Technik ergeben. Neben traditionellen Themen der Wirtschaftsinformatik wie Wissensmanagement und Geschäftsprozessmanagement, finden Sie dabei auch Beiträge zu aktuellen Themen wie Blended Learning, Cloud Computing oder Smart Grids. Nutzen Sie diesen Überblick, um sich einen Eindruck über die Bandbreite und Möglichkeiten der Forschung der Wirtschaftsinformatik am Standort Essen zu verschaffen.

Art der Publikation: Beitrag in Sammelwerk

Acceptance and Use of Internet Banking: A Digital Divide Perspective

Autor(en):
Gorbacheva, Elena; Niehaves, Björn; Plattfaut, Ralf; Becker, Jörg
Titel des Sammelbands:
19th European Conference on Information Systems (ECIS)
Veröffentlichung:
2011
Schlagworte:
Digital Divide;Internet Banking;Quantitative Study;UTAUT
Zitation:
Download BibTeX

Kurzfassung

Internet banking offers major advantages for both banks and their customers. However, not all people have equal access or skills to use such services. As banks are interested in migrating customers online, they need to reveal the conditions of internet banking services acceptance and use. The main objective of this study is to understand the factors influencing internet banking adoption taking into account insights from the digital divide theory. In order to explain internet banking usage we developed a research model drawing from the Unified Theory of Acceptance and Use of Technology (UTAUT) and Digital Divide research. Moreover, a qualitative pre-study has led to the creation of a new construct: perceived security. The model was tested against comprehensive survey data (n = 503). As a result, more than 90 percent of the variance of internet banking usage was explained by the elaborated model. Results demonstrate that the strongest factor influencing the intention to adopt internet banking services is the degree to which an individual believes that it is safe to use such services. Hence, this paper contributes to existing technology acceptance literature by introducing the construct of perceived security. Other major implications for theory and practice are discussed.