Skip to main content
Log in

Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Cyberattacks can be considered one of the fundamental challenges that paralyze the progress of digital payment usage (DPU) progress among citizens, as consumers shun away from using digital banking services due to increased concern over information security. National Cybersecurity Commitment (NCSC) has emerged as a preventive cybersecurity mechanism for countries to tackle such cybersecurity threats. Previous studies have shown that a country's NCSC positively impacts the business and economy of the country. This study examines the effect of NCSC on digital payment usage (DPU) across nations by grounding our discussion on the institutional trust theory. As trusting belief in security measures is a culturally embedded characteristic, we also examine the moderating role of national culture through Hofstede’s cultural dimensions. We use multilevel models to analyze publicly available archives of repeated cross-sectional data covering 76 countries to test the proposed relationships. Our findings indicate that NCSC has a positive influence on DPU. Further, our results highlight that the relationship between NCSC and DPU in a country is contingent on cultural dimensions. Overall, the evidence suggests that a competent cybersecurity environment compatible with cultural values can influence the speedy diffusion of digital payments in a country. Implications of our findings for research and practice are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Notes

  1. We explain various theoretical lenses in this section and next section. We thank Reviewer#1 for this thought.

  2. We thank Reviewers #1 & #2 for this suggestion.

  3. We thank Reviewer #1 for this suggestion.

References

  • Al-Okaily, M., Lutfi, A., Alsaad, A., Taamneh, A., & Alsyouf, A. (2020). The determinants of digital payment systems’ acceptance under cultural orientation differences: The case of uncertainty avoidance. Technology in Society, 63, 101–367.

    Article  Google Scholar 

  • Arner, D. W., Barberis, J., & Buckley, R. P. (2015). The evolution of Fintech: A new post-crisis paradigm. Geo. J. Int’l l., 47, 12–71.

    Google Scholar 

  • Bacharach, M., & Gambetta, D. (2001). Trust in signs. In M. S. Cook (Ed.), Trust in society. Russell Sage Foundation.

    Google Scholar 

  • Bagchi, K., Hart, P., & Peterson, M. F. (2004). National culture and information technology product adoption. Journal of Global Information Technology Management, 7(4), 29–46.

    Article  Google Scholar 

  • Bankole, F. O., & Bankole, O. O. (2017). The effects of cultural dimension on ICT innovation: Empirical analysis of mobile phone services. Telematics and Informatics, 34(2), 490–505.

    Article  Google Scholar 

  • Baptista, G., & Oliveira, T. (2015). Understanding mobile banking: The unified theory of acceptance and use of technology combined with cultural moderators. Computers in Human Behavior, 50, 418–430.

    Article  Google Scholar 

  • Bélanger, F., & Carter, L. (2008). Trust and risk in e-government adoption. The Journal of Strategic Information Systems, 17(2), 165–176.

    Article  Google Scholar 

  • Bélanger, F., & Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Quarterly, 35, 1017–1041.

    Article  Google Scholar 

  • Bell, A., Fairbrother, M., & Jones, K. (2019). Fixed and random effects models: Making an informed choice. Quality & Quantity, 53(2), 1051–1074.

    Article  Google Scholar 

  • Bellman, S., Johnson, E. J., Kobrin, S. J., & Lohse, G. L. (2004). International differences in information privacy concerns: A global survey of consumers. The Information Society, 20(5), 313–324.

    Article  Google Scholar 

  • Berghel, H. (2000). Identity theft, social security numbers, and the web. Communications of the ACM, 43(2), 17–21.

  • Beugelsdijk, S., & Welzel, C. (2018). Dimensions and dynamics of national culture: Synthesizing Hofstede with Inglehart. Journal of Cross-Cultural Psychology, 49(10), 1469–1505.

    Article  Google Scholar 

  • Cao, X., Yu, L., Liu, Z., Gong, M., & Adeel, L. (2018). Understanding mobile payment users’ continuance intention: A trust transfer perspective. Internet Research, 28(2), 456–476. https://doi.org/10.1108/IntR-11-2016-0359

    Article  Google Scholar 

  • Cerić, A., Vukomanović, M., Ivić, I., & Kolarić, S. (2021). Trust in megaprojects: A comprehensive literature review of research trends. International Journal of Project Management, 39(4), 325–338.

    Article  Google Scholar 

  • Chandra, S., Srivastava, S. C., & Theng, Y. L. (2010). Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis. Communications of the Association for Information Systems, 27(1), 561–588.

    Google Scholar 

  • Chang, T. (2014). A Secure operational model for mobile payments. The Scientific World Journal, 2014, 14.

    Article  Google Scholar 

  • Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management 15(5/6), 358–368. https://doi.org/10.1108/09576050210447046.

  • Chien, S.-Y., Lewis, M., Sycara, K., Liu, J.-S., & Kumru, A. (2018). The effect of culture on trust in automation: Reliability and workload. ACM Transactions on Interactive Intelligent Systems, 8(4), 1–31.

    Article  Google Scholar 

  • CISCO (2017). Retrieved January, 2021 from https://www.cisco.com/c/m/en_au/products/security/offers/annual-cybersecurity-report-2017.html.  Accessed 1 April 2020.

  • Cook, K. S., Hardin, R., & Levi, M. (2005). Cooperation without trust? Russell Sage Foundation.

    Google Scholar 

  • Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Contemporary Research on Payments and Cards in the Global Fintech Revolution, 14(5), 265–284.

    Google Scholar 

  • Devos, T., Spini, D., & Schwartz, S. H. (2002). Conflicts among human values and trust in institutions. British Journal of Social Psychology, 41(4), 481–494.

    Article  Google Scholar 

  • Dinev, T., Bellotto, M., Hart, P., Russo, V., Serra, I., & Colautti, C. (2006). Privacy calculus model in e-commerce–a study of Italy and the United States. European Journal of Information Systems, 15(4), 389–402. https://doi.org/10.1057/palgrave.ejis.3000590.

  • DiPrete, T. A., & Grusky, D. B. (1990). The multilevel analysis of trends with repeated cross-sectional data. Sociological Methodology, 20, 337–368.

    Article  Google Scholar 

  • Doney, P. M., Cannon, J. P., & Mullen, M. R. (1998). Understanding the influence of national culture on the development of trust. Academy of Management Review, 23(3), 601–620.

    Article  Google Scholar 

  • Dzidzah, E., Owusu Kwateng, K., & Asante, B. K. (2020). Security behaviour of mobile financial service users. Information & Computer Security, 28(5), 719–741.

    Article  Google Scholar 

  • European Commission Brussels (2016). Retrieved January, 2021 from https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52016SC0108&rid=2. Accessed 1 April 2020.

  • Fan, J., Shao, M., Li, Y., & Huang, X. (2018). Understanding users’ attitude toward mobile payment use. Industrial Management & Data Systems, 118(3), 524. Complementary Index.

    Article  Google Scholar 

  • Gai, K., Qiu, M., Sun, X., & Zhao, H. (2016). Security and privacy issues: A survey on FinTech. In International Conference on Smart Computing and Communication (pp. 236–247). Springer.

  • Gefen, D. (2002). Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 33(3), 38–53.

    Article  Google Scholar 

  • Gefen, D., & Heart, T. H. (2006). On the need to include national culture as a central issue in e-commerce trust beliefs. Journal of Global Information Management (JGIM), 14(4), 1–30.

    Article  Google Scholar 

  • Gefen, D., & Straub, D. W. (2004). Consumer trust in B2C e-Commerce and the importance of social presence: Experiments in e-Products and e-Services. Omega, 32(6), 407–424.

    Article  Google Scholar 

  • Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27, 51–90.

    Article  Google Scholar 

  • Gefen, D., Rose, G. M., Warkentin, M., & Pavlou, P. A. (2005). Cultural diversity and trust in IT adoption: A comparison of potential e-voters in the USA and South Africa. Journal of Global Information Management (JGIM), 13(1), 54–78.

  • Gefen, D., Pavlou, P., Benbasat, I., McKnight, H., Stewart, K., & Straub, D. (2006). ICIS panel summary: Should institutional trust matter in information systems research? Communications of the Association for Information Systems, 17(1), 9.

    Google Scholar 

  • GFAI. (2019). https://www.ey.com/en_gl/ey-global-fintech-adoption-index, last accessed on April 01, 2020.

  • GFI. (2011) https://globalfindex.worldbank.org/, last accessed on 01 Apr 2020.

  • GFI. (2014) https://globalfindex.worldbank.org/, last accessed on 01 Apr 2020.

  • GFI. (2017) https://globalfindex.worldbank.org/, last accessed on 01 Apr 2020.

  • Giddens, A. (2013). The consequences of modernity. Wiley.

    Google Scholar 

  • Gurung, A., Luo, X., & Raja, M. K. (2008). An empirical investigation on customer’s privacy perceptions, trust and security awareness in E-commerce environment. Journal of Information Privacy and Security, 4(1), 42–60.

  • de Gusmão, A. P. H., Silva, M. M., Poleto, T., e Silva, L. C., & Costa, A. P. C. S. (2018). Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory. International Journal of Information Management, 43, 248–260.

  • Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. (2006). Multivariate data analysis. Uppersaddle River.

  • Halchin, L. E. (2004). Electronic government: Government capability and terrorist resource. Government Information Quarterly, 21(4), 406–419.

    Article  Google Scholar 

  • Harris, P., Rettie, R., & Cheung, C. K. (2005). Adoption and usage of m-commerce: A cross-cultural comparison of Hong Kong and the United Kingdom. Journal of Electronic Commerce Research, 6(3), 210–224.

    Google Scholar 

  • Hinde, S. (1998). Privacy and security—The drivers for growth of E-Commerce. Computers & Security, 17(6), 475–478.

    Article  Google Scholar 

  • Hofstede, G. (1980). Culture and organizations. International Studies of Management & Organization, 10(4), 15–41.

    Article  Google Scholar 

  • Hofstede, G. (2001). Culture’s consequences: Comparing values, behaviors, institutions and organizations across nations. Sage publications.

    Google Scholar 

  • Hofstede, G. (2021). National culture: Dimensions of National Culture. Retrieved January, 2021 from https://geert-hofstede.com/national-culture.html. Accessed 1 April 2020.

  • Hofstede, G., Hofstede, G., & Minkov, M. (2010). Intercultural cooperation and its importance for survival. In Cultures and organi- zations: Software of the mind. McGraw-Hill.

  • Huang, D.-L., Patrick Rau, P.-L., Salvendy, G., Gao, F., & Zhou, J. (2011). Factors affecting perception of information security and their impacts on IT adoption and security practices. International Journal of Human-Computer Studies, 69(12), 870–883.

    Article  Google Scholar 

  • Huff, L., & Kelley, L. (2003). Levels of organizational trust in individualist versus collectivist societies: A seven-nation study. Organization Science, 14(1), 81–90.

    Article  Google Scholar 

  • Inglehart, R. (1999). Trust, well-being and democracy. Democracy and trust (Vol. 88, pp. 88–120). Cambridge University Press.

    Book  Google Scholar 

  • ITU Cyber. (2011). https://www.itu.int/pub/D-STR-SECU-2015, last accessed on 01 Apr 2020.

  • ITU Cyber. (2014). https://www.itu.int/pub/D-STR-GCI.01-2017, last accessed on 01 Apr 2020.

  • ITU Cyber. (2018). https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-PDF-E.pdf, last accessed on 01 Apr 2020.

  • ITU. (2011). https://reports.weforum.org/global-information-technology-2011/. last accessed on 01 Apr 2020.

  • ITU. (2014). http://www3.weforum.org/docs/WEF_GlobalInformationTechnology_Report_2014.pdf, last accessed on 01 Apr 2020.

  • ITU. (2017). https://networkreadinessindex.org/wp-content/uploads/2020/03/The-Network-Readiness-Index-2019-New-version-March-2020.pdf, last accessed on 01 Apr 2020.

  • Kale, S. H., & Barnes, J. W. (1992). Understanding the domain of cross-national buyer-seller interactions. Journal of International Business Studies, 23(1), 101–132.

    Article  Google Scholar 

  • Kalinic, Z., Marinkovic, V., Molinillo, S., & Liébana-Cabanillas, F. (2019). A multi-analytical approach to peer-to-peer mobile payment acceptance prediction. Journal of Retailing and Consumer Services, 49, 143–153.

    Article  Google Scholar 

  • Kapoor, K. K., Dwivedi, Y. K., & Williams, M. D. (2014). Innovation adoption attributes: a review and synthesis of research findings. European Journal of Innovation Management 17(3), 327–348. https://doi.org/10.1108/EJIM-08-2012-0083.

  • Kim, D. J. (2008). Self-perception-based versus transference-based trust determinants in computer-mediated transactions: A cross-cultural comparison study. Journal of Management Information Systems, 24(4), 13–45.

    Article  Google Scholar 

  • Kim, K., & Hong, S. (2016). The data processing approach for preserving personal data in fintech-driven paradigm. International Journal of Security and Its Applications, 10(10), 341–350.

    Article  Google Scholar 

  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564.

    Article  Google Scholar 

  • Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009a). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information Systems Research, 20(2), 237–257.

    Article  Google Scholar 

  • Kim, G., Shin, B., & Lee, H. G. (2009b). Understanding dynamics between initial trust and usage intentions of mobile banking. Information System Journal, 19(3), 283–311.

    Article  Google Scholar 

  • Kim, Y., Choi, J., Park, Y. J., & Yeon, J. (2016). The adoption of mobile payment services for “Fintech.” International Journal of Applied Engineering Research, 11(2), 1058–1061.

    Google Scholar 

  • Kimani, K., Oduol, V., & Langat, K. (2019). Cyber security challenges for IoT-based smart grid networks. International Journal of Critical Infrastructure Protection, 25, 36–49.

    Article  Google Scholar 

  • Koenig-Lewis, N., Marquet, M., Palmer, A., & Zhao, A. L. (2015). Enjoyment and social influence: predicting mobile payment adoption. The Service Industries Journal, 35(10), 537–554.

  • Krishna, B., & Krishnan, S. (2020). Explaining variation in adoption of FinTech products and services among citizens: A multilevel model. In Sujeet K. Sharma, Y. K. Dwivedi, B. Metri, & N. P. Rana (Eds.), Re-imagining diffusion and adoption of information technology and systems: A continuing conversation (Vol. 617, pp. 541–552). Springer International Publishing.

    Chapter  Google Scholar 

  • Krishna, B., & Sebastian, M. P. (2021). Examining the relationship between e-government development, nation’s cyber-security commitment, business usage and economic prosperity: A cross-country analysis. Information and Computer Security. https://doi.org/10.1108/ICS-12-2020-0205

    Article  Google Scholar 

  • Krishnan, S., Teo, T. S., & Lim, V. K. (2013). Examining the relationships among e-government maturity, corruption, economic prosperity and environmental degradation: A cross-country analysis. Information & Management, 50(8), 638–649.

    Article  Google Scholar 

  • Kusano, K., & Kemmelmeier, M. (2020). Multi-level modelling of time-series cross-sectional data reveals the dynamic interaction between ecological threats and democratic development. Royal Society Open Science, 7(3), 191804.

    Article  Google Scholar 

  • Lai, F., Li, D., & Hsieh, C. T. (2012). Fighting identity theft: The coping perspective. Decision Support Systems, 52(2), 353–363.

  • Lebo, M. J., & Weber, C. (2015). An effective approach to the repeated cross-sectional design. American Journal of Political Science, 59(1), 242–258.

    Article  Google Scholar 

  • Lee, J. D., & Moray, N. (1994). Trust, self-confidence, and operators’ adaptation to automation. International Journal of Human-Computer Studies, 40(1), 153–184.

    Article  Google Scholar 

  • Lee, S.-G., Trimi, S., & Kim, C. (2013). The impact of cultural differences on technology adoption. Journal of World Business, 48(1), 20–29.

    Article  Google Scholar 

  • Lee, J. K., Cho, D., & Lim, G. G. (2018). Design and validation of the bright internet. Journal of the Association for Information Systems, 19(2), 3.

    Article  Google Scholar 

  • Lee, J. K., Chang, Y., Kwon, H. Y., & Kim, B. (2020). Reconciliation of privacy with preventive cybersecurity: The bright internet approach. Information Systems Frontiers, 22(1), 45–57.

    Article  Google Scholar 

  • Leidner, D. E., & Kayworth, T. (2006). A review of culture in information systems research: Toward a theory of information technology culture conflict. MIS Quarterly, 30, 357–399.

    Article  Google Scholar 

  • Léon, F., & Zins, A. (2020). Regional foreign banks and financial inclusion: Evidence from Africa. Economic Modelling, 84, 102–116.

    Article  Google Scholar 

  • Leung, K., & Bond, M. H. (2004). Social Axioms: A Model for Social Beliefs in Multicultural Perspective. In M. P. Zanna (Ed.), Advances in experimental social psychology (Vol. 36, pp. 119–197). Elsevier Academic Press. https://doi.org/10.1016/S0065-2601(04)36003-X

  • Leung, A. K. Y., & Cohen, D. (2011). Within-and between-culture variation: Individual differences and the cultural logics of honor, face, and dignity cultures. Journal of Personality and Social Psychology, 100(3), 507.

    Article  Google Scholar 

  • Lim, K. H., Leung, K., Sia, C. L., & Lee, M. K. (2004). Is eCommerce boundary-less? Effects of individualism–collectivism and uncertainty avoidance on Internet shopping. Journal of International Business Studies, 35(6), 545–559.

    Article  Google Scholar 

  • Liu, J., Kauffman, R. J., & Ma, D. (2015). Competition, cooperation, and regulation: Understanding the evolution of the mobile payments technology ecosystem. Electronic Commerce Research and Applications, 14(5), 372–391.

    Article  Google Scholar 

  • Liu, Z., Min, Q., & Ji, S. (2009). An empirical study on mobile banking adoption: The role of trust. In 2009 Second International Symposium on Electronic Commerce and Security (Vol. 2, pp. 7–13). IEEE.

  • Lu, Y., Yang, S., Chau, P. Y., & Cao, Y. (2011). Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Information & Management, 48(8), 393–403.

    Article  Google Scholar 

  • Luo, X., Li, H., Zhang, J., & Shim, J. P. (2010). Examining multi-dimensional trust and multi-faced risk in initial acceptance of emerging technologies: An empirical study of mobile banking services. Decision Support Systems, 49(2), 222–234.

    Article  Google Scholar 

  • Manoj, V. B. (2011). SMS based secure mobile banking. International Journal of Engineering and Technology, 3(6), 472–479.

    Google Scholar 

  • Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. Academy of Management Review, 20(3), 709–734.

    Article  Google Scholar 

  • McAllister, D. J. (1995). Affect- and cognition-based trust as foundations for interpersonal cooperation in organizations. The Academy of Management Journal, 38(1), 24–59.

    Google Scholar 

  • McKnight, D. H., & Chervany, N. L. (2001). What trust means in e-commerce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35–59.

    Article  Google Scholar 

  • McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.

    Article  Google Scholar 

  • Migliore, G., Wagner, R., Cechella, F. S., & Liébana-Cabanillas, F. (2022). Antecedents to the Adoption of Mobile Payment in China and Italy: an Integration of UTAUT2 and Innovation Resistance Theory. Information Systems Frontiers, 1–24. https://doi.org/10.1007/s10796-021-10237-2

  • Milian, E. Z., de Spinola, M. D. M., & de Carvalho, M. M. (2019). Fintechs: A literature review and research agenda. Electronic Commerce Research and Applications, 34, 100833.

    Article  Google Scholar 

  • Milliman, R. E., & Fugate, D. L. (1988). Using trust-transference as a persuasion technique: An empirical field investigation. Journal of Personal Selling & Sales Management, 8(2), 1–7.

    Google Scholar 

  • Miltgen, C. L., & Peyrat-Guillard, D. (2014). Cultural and generational influences on privacy concerns: A qualitative study in seven European countries. European Journal of Information Systems, 23(2), 103–125.

    Article  Google Scholar 

  • Mohr, H., & Walter, Z. (2019). Formation of Consumers’ Perceived Information Security: Examining the Transfer of Trust in Online Retailers. Information Systems Frontiers, 21(6), 1231–1250.

    Article  Google Scholar 

  • Mombeuil, C. (2020). An exploratory investigation of factors affecting and best predicting the renewed adoption of mobile wallets. Journal of Retailing and Consumer Services, 55, 102127.

    Article  Google Scholar 

  • Moon, W. Y., & Kim, S. D. (2017). Adaptive fraud detection framework for fintech based on machine learning. Advanced Science Letters, 23(10), 10167–10171.

    Article  Google Scholar 

  • Morosan, C., & DeFranco, A. (2016). It’s about time: Revisiting UTAUT2 to examine consumers’ intentions to use NFC mobile payments in hotels. International Journal of Hospitality Management, 53, 17–29.

    Article  Google Scholar 

  • Mtaho, A. B. (2015). Improving mobile money security with two-factor authentication. International Journal of Computer Applications, 109(7), 9–15.

    Article  Google Scholar 

  • Mukhopadhyay, A., Chatterjee, S., Bagchi, K. K., Kirs, P. J., & Shukla, G. K. (2019). Cyber risk assessment and mitigation (CRAM) framework using logit and probit models for cyber insurance. Information Systems Frontiers, 21(5), 997–1018.

    Article  Google Scholar 

  • Mukundan, N. R., & Sai, L. P. (2014). Perceived information security of internal users in Indian IT services industry. Information Technology and Management, 15(1), 1–8.

    Article  Google Scholar 

  • Offe, C. (1999). How can we trust our fellow citizens? Democracy and trust, Cambridge University Press, Cambridge, 52, 42-87.

  • Official Annual Cybercrime Report (2019). Retrieved January, 2021 from https://www.herjavecgroup.com/wp-content/uploads/2018/12/CV-HG-2019-Official-Annual-Cybercrime-Report.pdf. Accessed 1 April 2020.

  • O’hara, K. (2004). Trust: from Socrates to spin. Icon Books.

    Google Scholar 

  • Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61, 404–414.

    Article  Google Scholar 

  • Oyserman, D., Coon, H. M., & Kemmelmeier, M. (2002). Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses. Psychological Bulletin, 128(1), 3.

    Article  Google Scholar 

  • Pal, A., Herath, T., & Rao, H. R. (2021a). Why do people use mobile payment technologies and why would they continue? An examination and implications from India. Research Policy, 50(6), 104–228.

    Article  Google Scholar 

  • Pal, A., Herath, T., De, R., & Rao, H. R. (2021b). Is the convenience worth the risk? An investigation of mobile payment usage. Information Systems Frontiers, 23(4), 941–961.

    Article  Google Scholar 

  • Park, S. (2019). Why information security law has been ineffective in addressing security vulnerabilities: Evidence from California data breach notifications and relevant court and government records. International Review of Law and Economics, 58, 132–145.

    Article  Google Scholar 

  • Patil, P., Tamilmani, K., Rana, N. P., & Raghavan, V. (2020). Understanding consumer adoption of mobile payment in India: Extending Meta-UTAUT model with personal innovativeness, anxiety, trust, and grievance redressal. International Journal of Information Management, 54, 102144.

    Article  Google Scholar 

  • Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1), 667–675.

    Article  Google Scholar 

  • Pavlou, P. A., Liang, H., & Xue, Y. (2007). Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly, 31, 105–136.

    Article  Google Scholar 

  • Phonthanukitithaworn, C., Sellitto, C., & Fong, M. W. L. (2015). User intentions to adopt mobile payment services: A study of early adopters in Thailand. Journal of Internet Banking and Commerce, 20(1).

  • Putnam, R. D. (1992). Making democracy work: Civic traditions in modern Italy. Princeton University Press.

    Google Scholar 

  • Qasim, H., & Abu-Shanab, E. (2016). Drivers of mobile payment acceptance: The impact of network externalities. Information Systems Frontiers, 18(5), 1021–1034.

    Article  Google Scholar 

  • Ratnasingam, P. (2004). The role of facilitating conditions in developing trust for successful electronic marketplace participation. Journal of Internet Commerce, 3(3), 95–110.

    Article  Google Scholar 

  • Rousseau, D. M., Sitkin, S. B., Burt, R. S., & Camerer, C. (1998). Not so different after all: A cross-discipline view of trust. Academy of Management Review, 23(3), 393–404. Chicago

  • Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65–78.

  • Salahdine, F., & Kaabouch, N. (2019). Social engineering attacks: A survey. Future Internet, 11(4), 89.

    Article  Google Scholar 

  • Schwartz, S. H. (1994). Beyond individualism/collectivism: New cultural dimensions of values.

  • Semerikova, E. (2020). What hinders the usage of smartphone payments in Russia? Perception of technological and security barriers. Technological Forecasting and Social Change, 161, 120312.

    Article  Google Scholar 

  • Senyo, P., & Osabutey, E. L. C. (2020). Unearthing antecedents to financial inclusion through FinTech innovations. Technovation, 98, 102155.

    Article  Google Scholar 

  • Sha, W. (2009). Types of structural assurance and their relationships with trusting intentions in business-to-consumer e-commerce. Electronic Markets, 19(1), 43–54.

    Article  Google Scholar 

  • Shapiro, S. P. (1987). The social control of impersonal trust. American Journal of Sociology, 93(3), 623–658.

    Article  Google Scholar 

  • Sharma, S. K., & Sharma, M. (2019). Examining the role of trust and quality dimensions in the actual usage of mobile banking services: An empirical investigation. International Journal of Information Management, 44, 65–75.

    Article  Google Scholar 

  • Shi, T. (2001). Cultural values and political trust: a comparison of the People’s Republic of China and Taiwan. Comparative Politics, 33, 401–419.

    Article  Google Scholar 

  • Shin, Y. Y., Lee, J. K., & Kim, M. (2018). Preventing state-led cyberattacks using the bright internet and internet peace principles. Journal of the Association for Information Systems, 19(3), 3.

    Article  Google Scholar 

  • Shukla, S. K. (2016, January). Cyber security of cyber physical systems: Cyber threats and defense of critical infrastructures. In 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID) (pp. 30–31). IEEE.

  • Siau, K., & Shen, Z. (2003). Building customer trust in mobile commerce. Communications of the ACM, 46(4), 91–94.

    Article  Google Scholar 

  • Slade, E. L., Dwivedi, Y. K., Piercy, N. C., & Williams, M. D. (2015). Modeling consumers’ adoption intentions of remote mobile payments in the United Kingdom: Extending UTAUT with innovativeness, risk, and trust. Psychology & Marketing, 32(8), 860–873.

    Article  Google Scholar 

  • Slade, E. L., Williams, M. D., & Dwivedi, Y. K. (2013). Extending UTAUT2 to explore consumer adoption of mobile payments. In Proceedings of the Uk academy for information systems conference. Oxford.

  • Smith, M. L. (2010). Building institutional trust through e-government trustworthiness cues. Information Technology & People, 23(3), 222–246.

    Article  Google Scholar 

  • Srite, M., & Karahanna, E. (2006). The role of espoused national cultural values in technology acceptance. MIS Quarterly, 30, 679–704.

    Article  Google Scholar 

  • Srivastava, S. C., & Teo, T. S. H. (2010). E-Government, E-Business, and National Economic Performance. Communications of the Association for Information Systems, 26(1), 14.

  • Srivastava, S. C., & Teo, T. S. (2009). Citizen trust development for e-government adoption and usage: Insights from young adults in Singapore. Communications of the Association for Information Systems, 25(1), 31.

    Google Scholar 

  • Stewart, K. J. (2003). Trust transfer on the world wide web. Organization Science, 14(1), 5–17.

    Article  Google Scholar 

  • Stewart, H., & Jürjens, J. (2018). Data security and consumer trust in FinTech innovation in Germany. Information & Computer Security, 26(1), 109–128.

    Article  Google Scholar 

  • Straub, D. W. (1994). The Effect of Culture on IT Diffusion: E-Mail and FAX in Japan and the US. Information Systems Research, 5(1), 23–47.

  • Sztompka, P. (1999). Trust: A sociological theory. Cambridge University Press.

    Google Scholar 

  • Takieddine, S., & Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research and Applications, 14(5), 361–371.

    Article  Google Scholar 

  • Tam, C., & Oliveira, T. (2019). Does culture influence m-banking use and individual performance? Information & Management, 56(3), 356–363.

    Article  Google Scholar 

  • Thakur, R., & Srivastava, M. (2014). Adoption readiness, personal innovativeness, perceived risk and usage intention across customer groups for mobile payment services in India. Internet Research.

    Book  Google Scholar 

  • Traynor, P., Butler, K., Bowers, J., & Reaves, B. (2017). FinTechSec: Addressing the security challenges of digital financial services. IEEE Security & Privacy, 15(5), 85–89.

    Article  Google Scholar 

  • Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers & Security, 24(1), 10–15.

    Article  Google Scholar 

  • Tyagi, S. (2019). Cybercrime overwhelming online banking: A Project Management approach’s alternative1. PM World Journal. http://www.pmworldjournal.net. Accessed 1 April 2020.

  • Verba, S., & Almond, G. (1963). The civic culture: Political attitudes and democracy in five nations. Princeton University Press.

    Google Scholar 

  • Walsham, G. (2002). Cross-cultural software production and use: A structurational analysis. MIS Quarterly, 26, 359–380.

    Article  Google Scholar 

  • Wang, N., Shen, X. L., & Sun, Y. (2013). Transition of electronic word-of-mouth services from web to mobile context: A trust transfer perspective. Decision Support Systems, 54(3), 1394–1403.

    Article  Google Scholar 

  • Wang, Z., Zhengzhi Gordon, G. U. A. N., Hou, F., Li, B., & Zhou, W. (2019). What determines customers’ continuance intention of FinTech? Evidence from YuEbao. Industrial Management & Data Systems, 119(8), 1625–1637. https://doi.org/10.1108/IMDS-01-2019-0011

  • Warren, M. (2018). Trust and democracy. In E. M. Uslaner (Ed), The Oxford handbook of social and political trust (pp. 75-94). Oxford University Press

  • WBD. (2020). https://data.worldbank.org/indicator/NY.GDP.PCAP.CD. last accessed on 01 Apr 2020.

  • Xin, H., Techatassanasoontorn, A. A., & Tan, F. B. (2013). Exploring the influence of trust on mobile payment adoption. In Proceedings of the Pacific Asia Conference on Information Systems (PACIS). Jeju Island, Korea.

  • Yang, G., Mao, Y. (2011). A research on the model of factors influencing consumer trust in mobile business. International Conference on E-Business and E-Government (ICEE), p. 1–5, IEEE.

  • Yeh, H. (2020). Factors in the ecosystem of mobile payment affecting its use: From the customers’ perspective in Taiwan. Journal of Theoretical and Applied Electronic Commerce Research, 15(1), 0–0.

    Article  Google Scholar 

  • Yu, C. S. (2012). Factors affecting individuals to adopt mobile banking: Empirical evidence from the UTAUT model. Journal of Electronic Commerce Research, 13(2), 104.

    Google Scholar 

  • Zhang, J., Liu, H., Sayogo, D. S., Picazo-Vela, S., & Luna-Reyes, L. (2016). Strengthening institutional-based trust for sustainable consumption: Lessons for smart disclosure. Government Information Quarterly, 33(3), 552–561.

    Article  Google Scholar 

  • Zhang, L., Zhu, J., & Liu, Q. (2012). A meta-analysis of mobile commerce adoption and the moderating effect of culture. Computers in Human Behavior, 28(5), 1902–1911.

  • Zheng, X., Lee, M., & Cheung, C. M. (2017). Examining e-loyalty towards online shopping platforms: The role of coupon proneness and value consciousness. Internet Research.

    Book  Google Scholar 

  • Zhou, T., Lu, Y., & Wang, B. (2010). Integrating TTF and UTAUT to explain mobile banking user adoption. Computers in Human Behavior, 26(4), 760–767.

    Article  Google Scholar 

  • Zucker, L. G. (1986). Production of trust: Institutional sources of economic structure, 1840–1920. Research in Organizational Behavior, 8, 53–111.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Satish Krishnan.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Table 7

Table 7 Three-level model (Regional analysis)

Table 8

Table 8 National cybersecurity commitment pillars and its impact on digital payment usage

Table 9

Table 9 Cybersecurity sub-indices and their definition

Table 10

Table 10 List of countries

Table 11

Table 11 Robust analysis

Table 12

Table 12 Definitions of institutional trust (adopted from Smith (2010))

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Krishna, B., Krishnan, S. & Sebastian, M.P. Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective. Inf Syst Front 25, 1713–1741 (2023). https://doi.org/10.1007/s10796-022-10280-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-022-10280-7

Keywords

Navigation