K-means
This section addresses RQ3, which concerns the estimate of ML/DL model performance. Accuracy of estimation is the primary performance indicator for ML/DL models. This question focuses on the following features of estimating accuracy; performance metric, accuracy value, and dataset. As the construction of ML/DL models is dependent on the dataset, we examined the data sources of ML/DL models in the reviewed article. In addition, we found a number of datasets utilised in the experiments of associated article. This review articles employs two sets of datasets; real-word data set and synthetic dataset. The dataset utilised most frequently in the reviewed article is a real-word dataset. In addition, 154 research article employed real-world datasets, eight utilised synthetic datasets, and 19 did not specify the dataset source.
Evaluation metrics were used to calculate ML/DL model performance. Confusion matrix provides output matrix that characterises the model’s overall effectiveness. ML/DL model’s accuracy is compared using confusion matrix sensitivity and specificity, F-score, precision, receiver operating characteristic (ROC), and area under precision recall area (AUPR).
In this review, a number of different performance indicators have been used in addition to accuracy. As shown in Table C1 , we found 177 article that clearly presented the performance metrics of the proposed models. Four article did not mention the performance metrics. We discovered that 177 of reviewed article mentioned the performance indicators of their suggested models. However, four reviewed article did not mention the performance metrics. In this review, accuracy, recall, precision, and F-score were often employed as performance indicators. Accuracy is the proportion of test set records that were properly categorised transaction to fraudulent or non-fraudulent. The ration of true positives to all positives is referred to as precision. The proportion of fraudulent transactions that we correctly detected as fraudulent compared to the total number of fraudulent transactions would be the precision. Recall is percentage of all correctly classified predictions made by an algorithm. In addition, the value of F1 provides a single score that is proportionate to both recall and precision. Full two-dimensional area under the entire ROC curve is measured by AUC. One of the best indicators for analysing the effectiveness of credit card fraud detection is the ROC curve. The classification’s quality is measured by MCC. Because it covers true positive, true negatives, false positive, and false negatives, it is a balanced metric. MCC utilised in 13 reviewed article.
In addition, 30 of the 181 studies employed only a single performance metric, with the majority of these article using only accuracy (24) article, MCC (five) article, and execution time (one) article. Using single performance metric is insufficient for determining the quality of ML/DL model. However, article such as 43 and 74 utilised more than five performance indicators to represent the performance of their ML/DL model. In addition, a number of reviewed article give computational performance measurements as well as performance metrics. The length of time the model took to complete the assigned task is called execution time. To ascertain how long the model takes to detect fraud, the execution time is calculated. As a result, we guarantee that the model successfully achieves its goal. Execution time employed in Alghofaili, Albattah & Rassam (2020) , Devi, Thangavel & Anbhazhagan (2019) , Singh, Ranjan & Tiwari (2021) . The loss rate function compares actual and expected training output to speed up learning. Loss rate employed in article ( Alghofaili, Albattah & Rassam, 2020 ). Test of the effect of cost sensitive wrapping of Bayes minimal risk (BMR) applied in article ( Almhaithawi, Jafar & Aljnidi, 2020 ) as a cost-saving measure. Balanced accuracy (BCR) combines the matrices of sensitivity and specificity to produce a balanced outcome. BCR presented in article ( Layek, 2020 ). In ( Arun & Venkatachalapathy, 2020 ) Kappa assesse the predication performance of the classifier model. Few article ( Arya & Sastry, 2020 ; Bandyopadhyay et al., 2021 ; Bandyopadhyay & Dutta, 2020 ; Benchaji, Douzi & El Ouahidi, 2021 ; Rezapour, 2019 ) introduced mean square error (MSE) assessment metrics, mean absolute error (MAE), and root mean square error (RMSE). Table C1 shows the proposed ML/DL model along with performance and datasets.
To answer RQ4, we examine the trend of the reviewed article. In addition, we compare the models created over the three years to determine and evaluate which techniques recently garnered more attention. This also assist, to identify the gaps so that future research will be able to address them in their own work. First, we examined the distribution of the chosen article by the publication year. In year 2019 (47 articles), 2020 (70 articles), and 2021 (64 articles). Significant difference existed between the years 2019 and 2020, the number of published articles for credit card fraud detection increased (23 articles). However, there was no notable difference between 2020 and 2021 (six articles). Fig. 2 demonstrates this comparison.
In response to RQ1, we demonstrated that 110 distinct ML models, 34 distinct DL models, and 39 models that combine ML and DL have been utilised by researchers. RF, LR, and SVM are the most commonly employed ML approaches. ANN, AUE, and LSTM are the most utilised DL approaches. In addition, we observed increased interest in combining ML and DL models.
In our review, we count the various learning-based credit card cyber fraud detection techniques applied in the reviewed article to answer RQ2. From this review we found that the most common technique among the reviewed article is the use of supervised algorithm. Supervised algorithms applied in 74% of the reviewed article. A total of 12% of the reviewed article utilised unsupervised techniques. A total of 12% used supervised and unsupervised techniques. A total of 2% applied semi-supervised technique. A total of 1% used reinforcement technique. For the RQ3, we listed the performance metrics that each research article applied. We discovered that 24 out of 181 reviewed article utilised accuracy as their only key performance metric. We also found a number of datasets that utilised in the reviewed article. Majority of the reviewed article using real-world datasets. A total of 154 research article applied real-world data, eight article used synthetic data, and 19 did not mention the source.
In RQ4, we identified research gaps by investigating unexplored or infrequently studied algorithms. In addition, we found supervised learning as the most prevalent learning technique and SMOTE as the most prevalent oversampling technique. The majority of researchers focused on supervised techniques such as LR, RF, SVM, and NN.
Combination techniques that employ multiple algorithms are becoming increasingly prevalent in the detection of cyber fraud. Detecting cyber fraud in credit card increasingly involves the use of DL. DL techniques utilised 34 times in the reviewed article, whereas 39 of the reviewed article applied a combination of DL and ML techniques for credit card cyber fraud detection. DL is advantageous for fraud detection since it solves the difficulty of recognising unexpected and sophisticated fraud patterns. Moreover, as the number of fraud cases to be recognised is relatively limited, DL may be effective. DL have garnered the most attention and had the most success in combating cyberthreats recently. Due to its ability to minimise overfitting and discover underlying fraud tendencies. Moreover, the capacity to handle massive datasets.
For supervised learning algorithms to predict future credit card transaction, each observation must have a label. Given that there is no classification for these observations, this could be a problem when trying to identify fraudulent transactions. Additionally, since fraudsters constantly alter their behaviour, it is challenging to develop a supervised learning model for a given transaction. The normal class is often the only one that unsupervised algorithms need labels for, and they can predict future observations based on deviations from the normal data. Future research should give more attention to unsupervised and semi supervised techniques, which can yield new insights. In addition, paying more attention to DL techniques such as CNN, RNN, and LSTM, we recommend that further research may be conducted on ML techniques, especially semi-supervised and unsupervised techniques in order to improve ML model performance. In addition, performing additional research on DL techniques is needed. As a result of the unavailability of a balanced dataset and the shortage of datasets, financial institutions are encouraged to make the essential dataset available, so that research outputs will be more effective and qualitative.
To detect cyber fraud in credit card, supervised, unsupervised, and semi-supervised ML/DL techniques applied in the reviewed article. Figure 4 displays that 74% of the reviewed article utilised supervised techniques. As a result, it is the most common technique used in the reviewed article. In addition, according to the reviewed article, classification and regression techniques been always of interest. On the other hand, 12% of selected articles applied unsupervised techniques, 12% of selected articles applied both supervised and unsupervised techniques, while 2% articles applied semi supervised techniques, and 1% articles applied reinforcement learning. A growing trend in this field is the use of ensemble techniques that capitalise on the benefits of several classification methods. The use of ensemble methods increased in 2020 and 2021 comparing with 2019. The other interesting finding is that DL approaches have attracted considerable interest during 2019 to 2021. The number of research articles that used DL techniques as single technique or combined with other ML techniques in 2019 is 15 articles, in 2020, 30 articles, and in 2021, 28 articles. It appears that the popularity of DL algorithms has increased.
The countries that published research on utilising ML/DL techniques to detect credit card cyber fraud is growing over time. In 2021, Ghana, Romania, Taiwan, and Vietnam are among the new countries that made an effort in detecting cyber fraud. India is the pioneer when it comes to the publication of ML/DL studies. Figure 5 depicts the number of article published by country and year (2019, 2020, and 2021).
The most effective way for determining the approaches that are most appropriate for this research problem is to categorise the ML/DL algorithms used in detecting cyber fraud in credit card. Additionally, it is beneficial to determine why particular tactics were chosen. Supervised algorithms have always been of interest, as 74% of the reviewed articles have been used supervised algorithms, with the most commonly used being RF then LR then SVM. Unsupervised learning algorithms also applied in 12% articles with the most commonly used being Isolation forest. However, it is interesting that only 12% of the 181 reviewed studies utilised unsupervised learning techniques. Semi-supervised approach employed in 2% of the reviewed articles. It appears that semi-supervised and unsupervised learning techniques may be researched further. According to reviewed articles ( Choubey & Gautam, 2020 ; More et al., 2021 ; Muaz, Jayabalan & Thiruchelvam, 2020 ; Shirgave et al., 2019 ), unsupervised or semi-supervised learning techniques such as one-SVM, isolation forest, and K-means clustering should be utilised more in credit card fraud detection.
In the three years, DL techniques have been examined increasingly frequently. Utilising DL to get greater accuracy and efficient performance. By applying DL techniques, new fraudulent patterns can be recognised and system can respond flexibly to complex data patterns. Thus, for efficient credit card fraud detection, researchers are encouraged to conduct additional study on DL techniques. Several studies such as ( Benchaji, Douzi & El Ouahidi, 2021 ; Jonnalagadda, Gupta & Sen, 2019 ; Kalid et al., 2020 ) suggested further study of DL techniques for detection in credit card. Moreover, as each ML/DL technique has its own limitations, it is necessary to consider combining the ML and DL algorithms for promising detection results. Several article such as ( Agarwal, 2021 ; Dang et al., 2021 ; Gamini et al., 2021 ; Kalid et al., 2020 ; Singh & Jain, 2019 ) suggested combinations of DL methods and traditional ML methods to cyber fraud detection from an unbalanced data and enhance the accuracy.
Several reviewed article cited the lack of the dataset as the limitation of their work. According to Meenu et al. (2020) , the research outcomes will be more effective and of higher quality if the financial institutions make the crucial data set of various fraudulent actions available. As a result, one of the key problems in many studies is the lack of data. Limitations on the availability of the data could be overcome if there is a vital data set of diverse fraudulent activities across nations. Maniraj et al. (2019) noted that when dataset size increase, algorithm precision also increases. It appears that adding additional data will undoubtedly increase the model’s ability to detect fraud and decrease the number of false positives. The banks themselves must formally support this. The study ( Seera et al., 2021 ) proposed conducting further evaluation of their generated model with real data from diverse regions.
Additionally, the datasets are significantly skewed, which is a problem. Numerous studies attempted to develop a model that could perform properly with data that is highly skewed. Several articles ( Balne, Singh & Yada, 2020 ; Ojugo & Nwankwo, 2021 ; Shekar & Ramakrisha, 2021 ; Voican, 2021 ; Vengatesan et al., 2020 ), unbalanced data was applied, and balancing the dataset using sampling techniques such as oversampling or undersampling is left as future work. Several articles ( Ahirwar, Sharma & Bano, 2020 ; Almhaithawi, Jafar & Aljnidi, 2020 ; Manlangit, Azam & Shanmugam, 2019 ) applied oversampling techniques.
Undersampling techniques have been applied in several article ( Amusan et al., 2021 ; Ata & Hazim, 2020 ; Muaz, Jayabalan & Thiruchelvam, 2020 ; Rezapour, 2019 ; Zhang, Bhandari & Black, 2020 ). In Amusan et al. (2021) , a random undersampling technique was used, and the study recommended that other balancing data techniques be explored. One reviewed article ( Ata & Hazim, 2020 ) applied an undersampling technique. However, the study recommends adopting the suggested model by using massive dataset instead of using sampling technique. In addition, some articles such as Trisanto et al. (2021) and Singh, Ranjan & Tiwari (2021) applied undersampling techniques and oversampling techniques.
Oversampling technique such as SMOTE, ADASYN, DBSMOTE, and SMOTEEN have been used. Undersampling techniques such as random undersampling (RUS) has been applied. In light of this, future studies should consider applying alternative oversampling techniques, such as borderline-SMOTE and borderline oversampling with SVM, as well as undersampling techniques. In addition to fraud location, an algorithm to determine the timing of the fraud is required ( Alghofaili, Albattah & Rassam, 2020 ; Chen & Lai, 2021 ). In addition, an algorithm can be developed to predict fraudulent transactions in a real-time and deploying the service on various cloud platforms to make it easily accessible and reliable ( Ingole et al., 2021 ).
Our review is restricted to journal article published in 2019, 2020, and 2021 that apply ML/DL techniques. By using our methodology in the early stages, we eliminated several irrelevant article. This assured that the selected article met the requirements for our review. Even though we searched the most prominent digital libraries for the article, there may be more digital libraries having relevant research article that were not included for this study. The snowballing method used to include relevant article that excluded during automatic searching in order to address this limitation. In addition, as it is probable that while looking for the keywords, we would have missed some synonyms. Hence, we also analysed the search terms and keywords for recognised collection of research works. We restricted our search to only English-language articles. This creates a language bias, as there may be article in this field of study written in other languages.
This review studied cyber fraud detection in credit card using ML/DL techniques. We examined ML/DL models from the perspectives of ML/DL technique type, ML/DL performance estimation, and the learning-based fraud detection. The study focused on relevant studies that were published in 2019, 2020, and 2021. In order to address the four research questions posed in this study, we reviewed 181 research article. In our review, we have provided a detailed analysis of ML/DL techniques and their function in credit card cyber fraud detection and also offered recommendations for selecting the most suitable techniques for detecting cyber fraud. The study also includes the trends of research, gaps, future direction, and limitations in detecting cyber fraud in credit cards. We believe that this comprehensive review enables researchers and banking industry to develop innovation systems for cyber fraud detection.
On the basis of this analysis, we suggest that more research may be conducted on semi-supervised learning and unsupervised learning techniques. Based on our review, we recommend that DL techniques might be further researched for credit card cyber fraud detection. Researchers are encouraged to conduct further research on integrating the ML/DL algorithms for effective detection outcomes. In addition, researchers are advised to use both oversampling and undersampling techniques because the datasets are extremely skewed. Furthermore, we recommend researchers to mention dataset sources and performance metrics employed to present the outcomes. Banks are also encouraged to make available dataset of different fraudulent activities across nation for further research.
The authors received no funding for this work.
The authors declare that they have no competing interests.
Eyad Abdel Latif Marazqah Btoush conceived and designed the experiments, performed the experiments, analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.
Xujuan Zhou conceived and designed the experiments, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.
Raj Gururajan conceived and designed the experiments, performed the experiments, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.
Ka Ching Chan conceived and designed the experiments, analyzed the data, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.
Rohan Genrich conceived and designed the experiments, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.
Prema Sankaran conceived and designed the experiments, prepared figures and/or tables, authored or reviewed drafts of the article, and approved the final draft.
A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
Asian Journal of Economics and Banking
ISSN : 2615-9821
Article publication date: 24 August 2020
Issue publication date: 18 December 2020
The purpose of this study is to develop a theoretical model for consumer behavioral intention by integrating the technology acceptance model (TAM) and the theory of perceived risk, which is tested on the intended use of credit cards in Vietnam.
The data were collected from 485 bank customers through a nationwide online survey. An exploratory and confirmatory factor analyzes were performed to validate the factor structure of the measurement items while structural equation modeling was used to validate the proposed model and testing the hypotheses.
The results of structural equation modeling reveal that perceived risk, perceived usefulness, social influence and perceived ease of use were significant determinants of consumer intention to use a credit card. Of them, only perceived risk discouraged the intended use of a credit card, which was synthesized from psychological, financial, performance, privacy, time, social and security risk.
This study measured the first-order risk dimensions based on the payment function of the credit card only; these measurements missed potential losses relevant to credit function of credit cards.
This study can be beneficial to banks enacting policies to attract more consumers and to help decide how to allocate resources to retain and expand their customer base.
The study adds value to the literature on consumer behavior by confirming the impact of second-order perceived risk on the intended use of credit cards, which most previous studies have not demonstrated. The research also provides an empirical evidence to the academic research platform on e-banking services in Vietnam, especially related to the credit card industry.
Trinh, H.N. , Tran, H.H. and Vuong, D.H.Q. (2020), "Determinants of consumers’ intention to use credit card: a perspective of multifaceted perceived risk", Asian Journal of Economics and Banking , Vol. 4 No. 3, pp. 105-120. https://doi.org/10.1108/AJEB-06-2020-0018
Emerald Publishing Limited
Copyright © 2020, Hoang Nam Trinh, Hong Ha Tran and Duc Hoang Quan Vuong.
Published in Asian Journal of Economics and Banking . Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode
Credit cards, a combination of payment card and personal consumption credit, are widely used in around the world. Starting with a relationship between vendors and consumers, as well as a need to buy first and pay later, Franklin National Bank in New York, the USA, issued first-ever credit cards to market in 1951. Year after year, the rapid development of consumer demand for credit cards exceeded the bank’s responsibility and management capacity. Consequently, many international credit card organizations have been established and operated independently around the world with six famous brands including American Express, Diners Club, Japan credit bureau, Visa, MasterCard and Chinese union pay. Banks join these institutions and are licensed to issue and acquire credit cards. To expand the credit card market segment, banks are constantly issuing cards to new customers and encouraging existing customers using them in daily spending. Based on practical requirements, many researchers are interested in consumer intended and actual use of credit cards.
Studies of consumer behavior on credit cards have mainly focused on the decisive role of individual demographic characteristics, credit card attributes and personal perception about credit cards. Some authors proved that differences in demographics such as age, gender, occupation and financial status lead to differences in his intention to use credit cards (Dewri et al. , 2016 ; Foscht et al. , 2010 ; Porto and Xiao, 2019 ). Others have confirmed that consumers decide to use credit cards because of their advantages compared to other payment methods such as cash, e-money or debit card (Chahal et al. , 2014 ; Ooi and Tan, 2016 ; Qureshi et al. , 2018 ). Assuming consumers are always rational in their behavior (Fishbein and Ajzen, 1975 ), some authors believed that a person decides using credit cards because of their ability to finance his daily expenses effectively (Porto and Xiao, 2019 ; Tan et al. , 2014 ; Trinh and Vuong, 2017 ). Moreover, some empirical studies have highlighted that social groups such as family, friends and colleagues have a significant influence on consumer intended use of credit cards (Ali et al. , 2017 ; Amin, 2013 ; Tan et al. , 2014 ; Varaprasad et al. , 2013 ).
Reasonable consumers are not only interested in the benefits of using a credit card but also they care about their potential losses (Fishbein and Ajzen, 1975 ; Mitchell, 1999 ). Many authors agreed that perceived risk is a major barrier to the intended use of e-services (Roy et al. , 2017 ; Yang et al. , 2015 ). Similarly, perceived risk has been considered as a deciding factor for the intention to use credit cards (Nguyen and Cassidy, 2018 ; Tan et al. , 2014 ; Tseng, 2016 ; Varaprasad et al. , 2013 ). However, their outcomes were inconsistent; perceived risk had significantly negative impact (Nguyen and Cassidy, 2018 ), significantly positive influence (Varaprasad et al. , 2013 ) or insignificant effect on consumer intended use of credit cards (Tan et al. , 2014 ; Tseng, 2016 ).
As the credit card market becomes more competitive, a better understanding of consumer behavior becomes imperative for banks. However, unlike previous research studies, this study focuses on the impact of perceived risk on the intended use of credit cards. To achieve this goal, the study begins with a brief review of consumer behavior. As a result, a theoretical model and testable hypotheses are developed, followed by the methodology and data collected. The findings are described and discussed before making some conclusions, as well as future research directions.
2.1 literature review.
Several research frameworks have been developed over the years to explain consumer intended and actual behavior. Prominent among them, theory of perceived risk (TPR) (Bauer, 1960 ) focuses on how consumers are concerned about the potential losses that influence on their intention in a specific purchase situation. However, consumers are not only risk averse but also rational; they intent to do something when they find this behavior useful, easy to do or they are encouraged by influencers, which are inherited from theory of reasoned actions (Fishbein and Ajzen, 1975 ), technology acceptance model (TAM) (Davis et al. , 1989 ), theory of planning behavior (TPB) (Ajzen, 1991 ) or unified theory of acceptance and use of technology (UTAUT) (Venkatesh et al. , 2003 ). These theories are applied independently or together in many studies on consumer intended use of e-services (Alalwan et al. , 2017 ; Liu et al. , 2019 ; Pelaez et al. , 2019 ; Tam and Oliveira, 2017 ).
Credit card is a technology product, used on electronic devices with two basic functions, namely, payment and credit (Foscht et al. , 2010 ). Credit cardholder can buy first, pay later based on the bank’s commitment (Amin, 2013 ). Accordingly, the issuing bank will pay the biller on behalf of the cardholder, who is responsible for returning full and timely (Foscht et al. , 2010 ). In modern commerce, credit cards are becoming increasingly important and popular all over the world (Porto and Xiao, 2019 ). Studies on credit cards are conducted and published in prestigious scientific journals, in which perceived risk from TPR, perceived usefulness from TAM/UTAUT, perceived ease of use from TAM/TPB/UTAUT and social influence from TPB/UTAUT are frequently used to predict consumer intended use of credit cards. These concepts are briefly described as followed:
Perceived usefulness was proposed as the degree to which a person believes that using a particular system would enhance his/her performance (Davis et al. , 1989 ; Venkatesh et al. , 2003 ). Credit cards are appreciated for non-cash payments and personal consumer credit (Chahal et al. , 2014 ). Consumers prefer credit cards due to uncertainty when carrying cash (Khare et al. , 2012 ) or special discounts from famous brands (Dali et al. , 2015 ). They use credit cards as a source of revolving credit with long grace period (Chahal et al. , 2014 ; Khare et al. , 2012 ). They can even withdraw cash by credit cards as required (Chahal et al. , 2014 ). As a result, consumer appreciate the performance of credit card usage, so they are more likely to use it in their daily expenses (Amin, 2013 ; Nguyen and Cassidy, 2018 ; Ooi and Tan, 2016 ; Trinh and Vuong, 2017 ; Varaprasad et al. , 2013 ).
Ajzen (1991) and Davis et al. (1989) considered perceived ease of use as the degree to which a person believes that using a particular system would be easy. Ajzen (1991) assumed that this perception is determined by a total set of accessible control beliefs. Qureshi et al. (2018) stated consumers are easy to register a credit card with a quick and simple procedure. Chahal et al. (2014) and Dali et al. (2015) posited credit card’s non-stop usability in numerous electronic devices. Moreover, the credit card payment process is so simple that cardholders do not need much effort to learn and use it regularly (Khare et al. , 2012 ). Consequently, many studies have confirmed that consumers appreciate credit cards and tend to use them for daily (Ali et al. , 2017 ; Amin, 2013 ; Nguyen and Cassidy, 2018 ; Porto and Xiao, 2019 ; Trinh and Vuong, 2017 ; Tseng, 2016 ).
Social influence referred to a degree to which a consumer perceives that important people believe that he/she should or should not perform a particular behavior (Ajzen, 1991 ; Venkatesh et al. , 2003 ). Consumers are irresistible to observe and evaluate credit card features, they feel uncomfortable when their friends, colleagues always use and talk about them (Qureshi et al. , 2018 ). Amin, 2013 argued that consumers tend to acquire and imitate the financial attitudes behaviors of family members. Moreover, media, which is designed specifically to reach a large audience or viewers has contributed to raising consumer awareness about credit cards (Ali et al. , 2017 ). Empirical evidence suggested that social groups’ perspective may enhance one’s intended use of credit cards (Ali et al. , 2017 ; Amin, 2013 ; Nguyen and Cassidy, 2018 ; Trinh and Vuong, 2017 ; Varaprasad et al. , 2013 ). However, Leong et al. (2013) suggested that social influence only effects indirectly on the intended use of credit cards through perceived usefulness and perceived ease of use.
Perceived risk, in consumer behavior perspective, refers primarily to consumer subjective expectations for incident losses (Bauer, 1960 ; Featherman and Pavlou, 2003 ). Consumers are granted a credit line to pay their bills, and they must spend a lot of time, money and effort to use it safely and effectively (Chahal et al. , 2014 ; Yang et al. , 2015 ). However, their payments are not always successful because of operational breakdowns or system malfunctions (Varaprasad et al. , 2013 ). Meanwhile, the losses of personal privacy and system security are serious and consumers may be accounted until the authorities clarify the responsibilities of stakeholders (Tan et al. , 2014 ; Tseng, 2016 ). As a result, consumers are less like to use credit cards when they are deeply concerned about their uncertainty (Nguyen and Cassidy, 2018 ). However, some studies found that user’s credit card adoption is not from how they perceives the losses caused by its use (Tan et al. , 2014 ; Tseng, 2016 ). Varaprasad et al. (2013) argued that the bank’s efforts make consumers choose credit cards even if they are afraid of un-expectations caused by this type of payment instrument. Despite some differences, most of these studies have shared a one-dimensional approach to perceived risk on credit cards. This approach refers perceived risk as a common perception, defined by several observed variables, and therefore, does not reflect consumer valuation of different types of potential losses relevant to credit card use.
Based on the above review about consumer behavior and prior studies on the intention to use credit cards, the study proposes a theoretical model of the intended behavior by integrating some prominent adoption theories. The model suggests perceived risk, usefulness, ease of use and social influence as exploratory factors to predict consumer intended use of credit cards. These constructs and their hypotheses are described below:
Perceived usefulness affects positively the intention to use credit cards.
Consumers are rational, who are not only interested in benefits but also in losses whenever they make decision, especially for those behaviors, which they cannot see or touch, just feel only how they work. These concerns are mentioned as the risk perceptions, which were first proposed in TPR (Bauer, 1960 ). Nowadays, this concept becomes more seriously in the context of e-services, where data are transferred between connected e-devices. Such e-transactions are invisible to consumers, who may be faced to unexpected outcomes and this may prevent them to perform behaviors. Some literature reviews about perceived risk are conducted in technology adoption, including e-shopping (Pelaez et al. , 2019 ), e-payment (Patil et al. , 2018 ) and e-banking (Mutahar et al. , 2018 ). Among many approaches of using perceived risk in studies on consumer intended use of technology, (Featherman and Pavlou, 2003 ; Hanafizadeh and Khedmatgozar, 2012 ) summarized perceived risk is situation specific and is considered as a second-order factor, which is commonly formed by performance, financial, social, time, psychological, security, privacy factors ( Table 1 ). This approach has been used in many empirical studies (Martins et al. , 2014 ; Mutahar et al. , 2018 ; Tandon et al. , 2016 ; Yang et al. , 2015 ). As such, this study hypothesizes that:
Perceived risk is a second-order construct of seven first-order risks, including financial, performance, psychological, social, time, security and privacy risk.
Financial, performance, psychological, social, time, security and privacy risk perception have positively related to perceived risk.
Perceived risk affects negatively perceived usefulness on credit cards.
Perceived risk affects negatively the intention to use credit cards.
Perceived ease of use affects positively perceived usefulness on credit cards.
Perceived ease of use affects positively the intention to use a credit card.
Social influence affects positively perceived usefulness on credit card.
Social influence affects positively intended use of credit card.
Based upon above discussions, a theoretical model is developed to predict consumer intended use of credit cards with four explanatory factors, including perceived usefulness, perceived risk, perceived ease of use and social influence, where perceived risk is a second-order construct related to seven first-order risk dimensions, including financial, performance, social, psychological, time, security and privacy risk ( Figure 1 ).
The empirical data for this study are obtained through an online survey, which were based on our review of prior studies relevant to the proposed theoretical model. Some expressions were customized to fit the context of credit cards. The research was anchored on a five-point Likert-type scale measurement varying from “1 (strongly disagree)” to “5 (strongly agree).” A pre-test was also performed with five banking experts with a background on credit cards to ensure that the questionnaire has no semantic problems. Some modifications of content and structure were amended based on the provided feedback. The instruments were then further pilot-tested with 15 consumers, who have experienced in using credit cards for paying bills. Insignificant changes were made to the wordings resulted from the tests. A final questionnaire focuses on 11 first-order constructs corresponding to the proposed model with 46 questions asked ( Table 2 ).
The survey was conducted by using 724 respondents selected through convenient sampling of Vietnamese bank customers, who are potential customers encouraged by the bank to register and use credit cards. Only 485 responses were valid and usable, yielding a valid response rate of 67% among volunteered participants. With 46 observed variables, the required sample size is from 138 to 230 (Cattell, 1978 ). The data from 485 respondents are, therefore, compatible. Based on collected data, both exploratory factor analysis and confirmatory factor analysis (CFA) are conducted to select and arrange the significant variables to particular factors (Byrne, 2010 ; Hair et al. , 2014 ). Finally, structural equation modeling is used for building the model of determinants of the intention to use credit cards (Anderson and Gerbing, 1991 ; Byrne, 2010 ).
4.1 profile of respondents and intention to use credit cards.
The data presented in Table 3 provides the demographic details on a gender, marital status, occupation, age and highest level of academic qualification of the respondents. These controlled variables are considered in this study based on prior studies relevant to consumers’ intended use of credit cards. Prior studies supposed that the differences in these demographic characteristics may lead to the differences in the intention to use credit cards (Dewri et al. , 2016 ; Porto and Xiao, 2019 ; Qureshi et al. , 2018 ).
Of our samples, majority of the respondents are male (51.3%), married (61.4%) compared to female (48.7%) and single (38.6%). Survey participants are mostly young adulthood with 73% of them below the age of 45. The results also show that 20.5% of respondents have college education; 44.7% of them are graduated and 34.8% remaining are post-graduated. Regarding the respondents’ occupation, their largest proportion belongs to public services (30.5%), followed by trading services (26.4%), financial services (25.4%) and industries (15.1%). However, the one-way ANOVA tests in comparing means of intention to use credit card insist that there is no significant difference between independent groups divided by these demographic variables, which is inconsistent to prior studies (Dewri et al. , 2016 ; Porto and Xiao, 2019 ; Qureshi et al. , 2018 ).
Applying exploratory factor analysis on data collected from survey questionnaires, 10 factors are extracted from 39 observed variables, except PU4, FIR1, SOR1, which are eliminated from the analysis because its loading factors are less than 0.5 (Hair et al. , 2014 ). These extracted factors are suitable to the proposal model ( Table 4 ). The Kaiser-Meyer-Olkin measure coefficient is 0.847 with a statistical significance of 0.000, indicates that the exploratory factor analysis (EFA) of the independent components is appropriate. A total extracted variance of variables is 62.944%, greater than 50% as required by (Anderson and Gerbing, 1991 ). Observed variables in intention to use credit cards (IU) have high loading coefficients (≥0.82) and its data variation is well-explained (≥78%). Therefore, the measurements are acceptable for CFA ( Byrne, 2010 ).
A CFA is applied for 11 first-order factors with 43 observed variables to examine the model-data fit. Empirical results are shown as follows: χ 2 /df = 2.301, comparative fix index (CFI) = 0.915, Tukey and Lewis index (TLI) = 0.904 and root mean square eror approximation (RMSEA) = 0.052 ( p = 0.000), so the measurement model is compatible with the data (McDonald and Ho, 2002 ). Next, the validity of convergence is achievable because all factor loadings are greater than 0.5 ( Table 4 ) and significant t -statistics (Anderson and Gerbing, 1991 ). Moreover, the average variance extracted (AVE) values ( Table 4 ) are between 0.519 and 0.788, which are greater than both 0.5 and squares of their correlation coefficients ( Table 5 ), respectively, then each construct is a distinct construct and discriminant validity is acceptable (Fornell and Larcker, 1981 ). Therefore, CFA results confirm that 43 observed variables are extracted into 11 first-order constructs, as well as the measurements are model-data fit, discriminant validity, uni-dimensionality, convergence validity and internal consistency reliability.
Due to the existing of second-order factor in the proposed model, the next CFA is needed to estimate the relative of seven first-order risk dimensions, including financial, performance, psychological, social, time, security and privacy risk, with the second-order reflective perceived risk on the measurement model. The results are shown as follows: χ 2 /df = 2.343, CFI = 0.91, TLI = 0.904 and RMSEA = 0.053 ( p = 0.000), so the model fit the data very well (McDonald and Ho, 2002 ). Thus, hypothesis H2 is supported.
A structural equation model (SEM) is conducted to test the proposed model with 3 independent constructs (social influence, perceived ease of use and perceived risk) and 2 dependent constructs (perceived usefulness and intention to use credit cards), which are measured by 43 observed variables as mentioned in above factor analyzes. Figure 2 shows the whole SEM for the proposed model. All indicators (χ 2 /df = 2.340, CFI = 0.910, TLI = 0.904 and RMSEA = 0.053) show that the proposed model is appropriate for data collected from the market (McDonald and Ho, 2002 ). The result of SEM is described in Table 6 . Whereby, perceived usefulness, perceived risk, social influence and perceived ease of use accounted 50.1% of the variance in intention to use credit cards with coefficients of 0.320, −0.539, 0.141 and 0.089, respectively. Moreover, perceived risk, social influence and perceived ease of use are determinants of perceived usefulness on credit cards. Finally, perceived risk on credit cards is a multi-dimensional construct, which is synthesized from psychological, financial, performance, privacy, time, social and security risk in decreased contribution, respectively. Therefore, all hypotheses are accepted.
The purpose of this study was to examine the effect of perceived risk on the intended use of credit cards. By integrating popular technology adoption theories, the study assessed the relationships among three exogenous variables (perceived risk, perceived ease of use and social influence) and two endogenous variables (perceived usefulness and behavioral intention). Table 6 and Figure 2 present the results of hypothesis testing for the research model including the path coefficients and their significant values.
First, perceived risk was considered as consumer’s subjective expectations for incident losses relevant to credit card use, which was compared with previous research studies (Nguyen and Cassidy, 2018 ; Tan et al. , 2014 ; Tseng, 2016 ; Varaprasad et al. , 2013 ). The CFA results indicated that perceived risk was a second-order reflective construct related with seven first-order risk dimensions, including financial, performance, psychological, social, time, security and privacy risk. With this finding, the study became very different from prior studies, where perceived risk was conceptualized as one-dimensional construct (Nguyen and Cassidy, 2018 ; Tan et al. , 2014 ; Varaprasad et al. , 2013 ) or two one-dimensional constructs (Tseng, 2016 ). The SEM analysis illustrated that psychological risk (PSR) dimension had the strongest related with the perceived risk, followed by financial risk (FIR), performance risk (PER), privacy risk (PRR), time risk (TIR), social risk (SOR) and security risk (SER).
Subsequently, perceived risk was found to have a negative effect on the intended use with the largest level of impact ( β = −0.539), which was almost equal to the total of impact level from three remaining factors in the model. This finding had contributed to the TPR (Bauer, 1960 ) by insisting the negative impact of perceived risk in behavioral research on credit cards, which Tan et al. (2014) , Tseng (2016) and Varaprasad et al. (2013) could not. Furthermore, this result was better than those of previous studies (Nguyen and Cassidy, 2018 ) with its impact level of −0.18. The results insisted the significant relationship between perceived risk and perceived usefulness, which Nguyen and Cassidy (2018) , Tan et al. (2014) and Varaprasad et al. (2013) did not mention or Tseng (2016) failed to prove. These findings made the present study different from previous works.
Finally, the SEM analysis confirmed the relationships among perceived usefulness, perceived ease of use, social influence and behavioral intention. The findings showed that perceived ease of use and social influence have positive impact on both perceived usefulness ( β EOU = 0.428, β SI = 0.218) and the intended use ( β EOU = 0.089, β SI = 0.141). In turn, perceived usefulness also affected on the intention to use. Thus, this study demonstrated all hypotheses related to perceived usefulness, perceived ease of use, social influence. These findings were consistent with prior studies (Leong et al. , 2013 ; Nguyen and Cassidy, 2018 ; Tan et al. , 2014 ).
This study is a pioneering effort in context of credit card adoption by proposing a theoretical model to determine factors affecting consumer intention to use credit cards, including perceived risk from TPR (Bauer, 1960 ), perceived usefulness, perceived ease of use and social influence from TRA, TAM, TPB and UTAUT. Based on collected data from 485 bank customers, this study reveals that perceived risk is a reflective second-order factor related to seven first-order risk dimensions – psychological, financial, performance, privacy, time, social and security risk. The results show that the intended use of credit cards is affected by perceived risk, followed by perceived usefulness, social influence and perceived ease of use in decreased ranking. All these factors encourage consumer to use credit cards, except perceived risk. Moreover, perceived risk, perceived ease of use and social influence are antecedents of perceived usefulness on credit cards.
This study has both theoretical and practical contributions. The first theoretical contribution of this work was to conceptualize perceived risk as a reflective second-order construct, that was modeled and decomposed into the seven first-order risk dimensions, including psychological, financial, performance, privacy, time, social and security risk. Second, the research contributed to the literature on consumer behavior by confirming the impact of perceived risk on the intended use of credit cards, which most previous studies have not demonstrated. Finally, the research findings provided an empirical evidence as theoretical contribution to the academic research platform on e-banking services in Vietnam, especially related to the credit card industry.
This study can be beneficial to banks enacting policies to attract more consumers and to help decide how to allocate resources to retain and expand their customer base. Based on factors influencing consumer intended use of credit cards, banks may encourage them to own and use credit cards for paying goods and services. As the findings imply, banks should focus their resources on overcoming the risk aspects, which can help motivating potential consumers. Banks should advertise that credit card is not a risky service by providing positive reviews at point of sales or in mass media. The publicity of loss protection policies and service-level agreements may reduce potential losses of performance or finance. Additional effective risk preventing policies may include money back guarantees, so that consumers feel more comfortable and safe with the system. Other whence, the positive impact of perceived usefulness, perceived ease of use and social influence on credit card acceptance can be exploited by banks in framing or refining the transactional procedures or relevant services. In the constantly changing business world, banks and related stakeholders should add more useful features and services to credit cards and they should simplify the procedures in making payment via credit cards. Therefore, they will be ready to accept the offers made by credit card issuers and encourage others to use credit cards.
Although this study provided substantive explanations for perceived risk and its effect on consumer intention to use credit cards, it still has several limitations. First, the first-order risk dimensions were measured based on the payment function of the credit card only; these measurements missed potential losses relevant to credit function of credit cards. Second, the present study focused on perceived risk and other factors as the antecedents of the intention to use credit cards while these relationships might be moderated by age, gender, experience, etc. Finally, the empirical data are collected randomly from only Vietnamese bank customers; this limited data may mislead to the accuracy and explain the ability of the proposed theoretical model. Thereby, future studies may perform a multi-national survey on both payment and credit functions of credit cards, as well as integrating reasonable moderators into the proposed model to address these shortcomings.
Proposed theoretical model
Proposed research model and the result of SEM
Multi-dimensional perceived risk
Dimension of perceived risk | Definition |
---|---|
FIR | Potential financial losses due to purchasing a subscription to a poorly performing e-service or potential internet-based fraud |
PER | Potential performance problems, malfunctioning, transaction processing errors, reliability and/or security problems, and therefore, not performing as expected |
SOR | Potential losses to their perceived status in their social group as a result of using an e-service |
PSR | Potential losses to their self-esteem, peace of mind or self-perception (ego) due to worrying, feeling frustrated, foolish or stressful as a result of using an e-service |
TIR | Potential losses to convenience, time and effort caused by wasting time researching, purchasing, setting up, switching to and learning how to use the e-service |
SER | Potential losses involving transmitting sensitive data through e-services that breach technological data protection |
PRR | Potential losses to the privacy and confidentiality of their personally identifying information and that e-service usage exposes them to potential identity theft |
;
Constructs | No. of items | Sources |
---|---|---|
Perceived usefulness (PU) | 7 | |
FIR | 4 | |
PER | 4 | (2015) |
SOR | 4 | (2015) |
PSR | 3 | (2015) |
TIR | 3 | (2015) |
SER | 4 | |
PRR | 4 | |
Perceived ease of use (EOU) | 5 | |
Social influence (SI) | 4 | |
Intention to use credit card (IU) | 4 |
Descriptive statistics and mean comparative analysis
Variable | Freq. | (%) | Mean |
---|---|---|---|
Female | 236 | 48.7 | 3.72 |
Male | 249 | 51.3 | 3.62 |
Under 35 | 207 | 42.7 | 3.73 |
From 35 to 45 | 147 | 30.3 | 3.71 |
Above 45 | 131 | 27.0 | 3.68 |
Under 500 | 89 | 18.4 | 3.70 |
500–900 | 208 | 42.9 | 3.66 |
900–1,600 | 131 | 27.0 | 3.61 |
1,600–3,200 | 46 | 9.4 | 3.74 |
Above 3,200 | 11 | 2.3 | 4.18 |
Single | 187 | 38.6 | 3.65 |
Married | 298 | 61.4 | 3.68 |
College and lower | 99 | 20.5 | 3.65 |
Graduated | 217 | 44.7 | 3.71 |
Higher graduated | 169 | 34.8 | 3.70 |
Industries | 73 | 15.1 | 3.62 |
Trading services | 128 | 26.4 | 3.66 |
Financial services | 123 | 25.4 | 3.76 |
Public services | 148 | 30.5 | 3.68 |
Other | 13 | 2.6 | 3.31 |
Factor analysis
Loading coefficients | |||
---|---|---|---|
Construct | EFA | CFA | Correlated item-total |
PU1. Purchase without carrying cash | 0.719 | 0.771 | 0.680 |
PU2. Buy first and repay later | 0.844 | 0.784 | 0.714 |
PU3. Pay the bill | 0.593 | 0.637 | 0.590 |
PU4. Cash withdraw at ATM | |||
PU5. Installment purchase | 0.774 | 0.766 | 0.722 |
PU6. Free of interest for up to 45 days | 0.656 | 0.675 | 0.608 |
PU7. Revolving credit | 0.635 | 0.674 | 0.618 |
EOU1. Simple registration | 0.699 | 0.684 | 0.650 |
EOU2. Use credit card easily | 0.854 | 0.839 | 0.775 |
EOU3. Learn to use easily | 0.927 | 0.913 | 0.810 |
EOU4. Ease to use | 0.825 | 0.827 | 0.739 |
EOU5. Use everywhere and every time | 0.549 | 0.581 | 0.555 |
SI1. Family | 0.736 | 0.724 | 0.659 |
SI2. Friends | 0.762 | 0.791 | 0.708 |
SI3. Colleagues | 0.794 | 0.791 | 0.717 |
SI4. Multi-media | 0.759 | 0.772 | 0.691 |
SER1. Credit card may be copied or counterfeited | 0.860 | 0.844 | 0.794 |
SER2. Payment via website is unsecured | 0.865 | 0.856 | 0.811 |
SER3. Payment on ATM/POS is unsecured | 0.826 | 0.847 | 0.799 |
SER4. Payment systems may be attacked or hacked | 0.848 | 0.856 | 0.811 |
PRR1. Personal information is collected | 0.883 | 0.884 | 0.836 |
PRR2. Personal information is shared in internet | 0.903 | 0.88 | 0.837 |
PRR3. Personal information is used illegally | 0.852 | 0.842 | 0.806 |
PRR4. Personal information is hijacked | 0.879 | 0.887 | 0.844 |
PER1. Unusable due to technical errors | 0.645 | 0.727 | 0.621 |
PER2. Insatiable my spending needs | 0.826 | 0.757 | 0.668 |
PER3. Do not help me control spending | 0.717 | 0.701 | 0.624 |
PER4. Not well-performed as advertised | 0.664 | 0.707 | 0.617 |
FIR1. It will cost me money to use credit card | |||
FIR2. Lose by my typing mistakes | 0.668 | 0.7 | 0.614 |
FIR3. Lose by others’ unlawful activity | 0.820 | 0.799 | 0.702 |
FIR4. There is no compensation for lost money | 0.786 | 0.806 | 0.679 |
TIR1. It takes time to learn how to use | 0.848 | 0.844 | 0.730 |
TIR2. It takes time to perform transactions | 0.771 | 0.725 | 0.645 |
TIR3. It takes time to solve problems | 0.737 | 0.795 | 0.677 |
SOR1. My relatives discourage me | |||
SOR2. I am judged negatively by others | 0.831 | 0.833 | 0.754 |
SOR3. I look foolish to others | 0.881 | 0.879 | 0.790 |
SOR4. No direct support from service providers | 0.794 | 0.803 | 0.741 |
PSR1. I feel anxious | 0.715 | 0.694 | 0.575 |
PSR2. I feel frustrated | 0.737 | 0.881 | 0.666 |
PSR3. I feel depressed | 0.626 | 0.564 | 0.493 |
IU1. I am desire to use | 0.867 | 0.877 | 0.829 |
IU2. I plan to use | 0.930 | 0.927 | 0.884 |
IU3. I use it as soon as possible | 0.922 | 0.913 | 0.879 |
IU4. I will use it usually in the future | 0.825 | 0.831 | 0.797 |
Correlation coefficients matrix
TIR | PU | PRI | SEC | EOU | SOR | IU | FIR | SI | PER | PSR | |
---|---|---|---|---|---|---|---|---|---|---|---|
TIR | 0.786 | ||||||||||
PU | −0.040 | 0.719 | |||||||||
PRI | 0.341 | 0.007 | 0.873 | ||||||||
SEC | 0.192 | −0.084 | 0.224 | 0.853 | |||||||
EOU | −0.054 | 0.479 | 0.115 | −0.041 | 0.777 | ||||||
SOR | 0.273 | −0.157 | 0.066 | 0.131 | −0.173 | 0.839 | |||||
IU | −0.262 | 0.478 | −0.294 | −0.199 | 0.295 | −0.351 | 0.888 | ||||
FIR | 0.334 | −0.056 | 0.409 | 0.132 | 0.049 | 0.188 | −0.345 | 0.774 | |||
SI | −0.059 | 0.350 | −0.148 | −0.163 | 0.324 | −0.135 | 0.348 | −0.054 | 0.770 | ||
PER | 0.282 | −0.154 | 0.382 | 0.300 | 0.003 | 0.158 | −0.406 | 0.320 | −0.148 | 0.723 | |
PSR | 0.428 | −0.100 | 0.402 | 0.271 | −0.085 | 0.344 | −0.396 | 0.461 | −0.110 | 0.427 | 0.725 |
Results of the structural equation model
Hypothesis | Relationship | Estimate | S.E. | CR | . | Result |
---|---|---|---|---|---|---|
PU → IU | 0.320 | 0.048 | 6.359 | *** | Accepted | |
FIR ← PR | 0.609 | Accepted | ||||
PER ← PR | 0.590 | 0.126 | 7.360 | *** | Accepted | |
PSR ← PR | 0.707 | 0.145 | 7.414 | *** | Accepted | |
SOR ← PR | 0.392 | 0.141 | 7.698 | *** | Accepted | |
TIR ← PR | 0.553 | 0.112 | 5.979 | *** | Accepted | |
SER ← PR | 0.340 | 0.125 | 5.478 | *** | Accepted | |
PRR ← PR | 0.569 | 0.152 | 7.838 | *** | Accepted | |
PR → PU | −0.103 | 0.071 | −1.951 | 0.051 | Accepted | |
PR → IU | −0.539 | 0.087 | −7.934 | *** | Accepted | |
EOU → PU | 0.428 | 0.047 | 8.080 | *** | Accepted | |
EOU → IU | 0.089 | 0.038 | 1.987 | 0.047 | Accepted | |
SI → PU | 0.218 | 0.047 | 4.434 | *** | Accepted | |
SI → IU | 0.141 | 0.038 | 3.327 | *** | Accepted |
Ajzen , I. ( 1991 ), “ The theory of planned behavior ”, Organizational Behavior and Human Decision Processes , Vol. 50 No. 2 , pp. 179 - 211 .
Alalwan , A. , Dwivedi , Y. and Rana , N. ( 2017 ), “ Factors influencing adoption of mobile banking by Jordanian bank customers: extending UTAUT2 with trust ”, International Journal of Information Management , Vol. 37 No. 3 , pp. 99 - 110 , doi: 10.1016/j.ijinfomgt.2017.01.002 .
Ali , M. , Raza , S. and Puah , C. ( 2017 ), “ Factors affecting to select Islamic credit cards in Pakistan: the TRA model ”, Journal of Islamic Marketing , Vol. 8 No. 3 , pp. 330 - 344 , doi: 10.1108/JIMA-06-2015-0043 .
Amin , H. ( 2013 ), “ Factors influencing Malaysian bank customers to choose Islamic credit cards: empirical evidence from the TRA model ”, Journal of Islamic Marketing , Vol. 4 No. 3 , pp. 245 - 263 , doi: 10.1108/JIMA-02-2012-0013 .
Anderson , J.C. and Gerbing , D.W. ( 1991 ), “ Predicting the performance of measures in a confirmatory factor analysis with a pretest assessment of their substantive validities ”, Journal of Applied Psychology , Vol. 76 No. 5 , pp. 732 - 740 .
Bauer , R.A. ( 1960 ), Consumer Behavior as Risk Taking, Dynamic Marketing for a Changing World , American Marketing Association , Chicago .
Byrne , B.M. ( 2010 ), Structural Equation Modeling with Amos: Basic Concepts, Applications and Programming , 2th ed . Taylor and Francis Group , New Jersey .
Cao , Q. and Niu , X. ( 2019 ), “ Integrating context-awareness and UTAUT to explain Alipay user adoption ”, International Journal of Industrial Ergonomics , Vol. 69 , pp. 9 - 13 , doi: 10.1016/j.ergon.2018.09.004 .
Cattell , R.B. ( 1978 ), “ Matched determiners vs factor invariance: a reply to Korth ”, Multivariate Behavioral Research , Vol. 13 No. 4 , pp. 431 - 448 .
Chahal , H. , Sahi , G. and Rani , A. ( 2014 ), “ Moderating role of perceived risk in credit card usage and experience link ”, Journal of Indian Business Research , Vol. 6 No. 4 , pp. 286 - 308 , doi: 10.1108/JIBR-06-2014-0034 .
Chhonker , M. , Verma , D. and Kar , A. ( 2017 ), “ Review of technology adoption frameworks in mobile commerce ”, Procedia Computer Science , Vol. 122 , pp. 888 - 895 .
Dali , N. , Yousafzai , S. and Hamid , H. ( 2015 ), “ Credit cards preferences of Islamic and conventional credit card ”, Journal of Islamic Marketing , Vol. 6 No. 1 , pp. 72 - 94 , doi: 10.1108/JIMA-05-2013-0039 .
Davis , F.D. , Bagozzi , R.P. and Warshaw , P.R. ( 1989 ), “ User acceptance of computer technology: a comparison of two theoretical models ”, Management Science , Vol. 35 No. 8 , pp. 982 - 1003 .
Dewri , L. , Islam , R. and Saha , N. ( 2016 ), “ Behavioral analysis of credit card users in a developing country: a case of Bangladesh ”, International Journal of Business and Management , Vol. 11 No. 4 , p. 299 , doi: 10.5539/ijbm.v11n4p299 .
Featherman , M.S. and Pavlou , P.A. ( 2003 ), “ Predicting e-services adoption: a perceived risk facets perspective ”, International Journal of Human-Computer Studies , Vol. 59 No. 4 , pp. 451 - 474 , doi: 10.1016/S1071-5819(03)00111-3 .
Fishbein , M. and Ajzen , I. ( 1975 ), Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research , Addison-Wesley , Reading .
Fornell , C. and Larcker , D.F. ( 1981 ), “ Evaluating structural equation models with unobservable variables and measurement error ”, Journal of Marketing Research , Vol. 18 No. 1 , pp. 39 - 50 .
Foscht , T. , Maloles , C. , Swoboda , B. and Chia , S. ( 2010 ), “ Debit and credit card usage and satisfaction: who uses which and why – evidence from Austria ”, International Journal of Bank Marketing , Vol. 28 No. 2 , pp. 150 - 165 , doi: 10.1108/02652321011018332 .
Hair , J. , Black , W. , Babin , B. Anderson , R. and Tatham , R. ( 2014 ), Multivariate Data Analysis , 7th ed . Pearson Education , Hoboken, NJ .
Hanafizadeh , P. and Khedmatgozar , H. ( 2012 ), “ The mediating role of the dimensions of the perceived risk in the effect of customers’ awareness on the adoption of internet banking in Iran ”, Electronic Commerce Research , Vol. 12 No. 2 , pp. 151 - 175 , doi: 10.1007/s10660-012-9090-z .
Khare , A. , Khare , A. and Singh , S. ( 2012 ), “ Factors affecting credit card use in India ”, Asia Pacific Journal of Marketing and Logistics , Vol. 24 No. 2 , pp. 236 - 256 , doi: 10.1108/13555851211218048 .
Leong , L. , Hew , T. , Tan , G. and Ooi , K. ( 2013 ), “ Predicting the determinants of the NFC-enabled mobile credit card acceptance: a neural networks approach ”, Expert Systems with Applications , Vol. 40 No. 14 , pp. 5604 - 5620 , doi: 10.1016/j.eswa.2013.04.018 .
Liébana , F. , Luna , I. and Montoro , F. ( 2017 ), “ Intention to use new mobile payment systems: a comparative analysis of SMS and NFC payments ”, Economic Research-Ekonomska Istrazivanja , Vol. 30 , pp. 892 - 910 , doi: 10.1080/1331677X.2017.1305784 .
Liu , Z. , Ben , S. and Zhang , R. ( 2019 ), “ Factors affecting consumers’ mobile payment behavior: a meta-analysis ”, Electronic Commerce Research , Vol. 19 No. 3 , pp. 575 - 601 , doi: 10.1007/s10660-019-09349-4 .
McDonald , R.P. and Ho , M.R. ( 2002 ), “ Principles and practice in reporting structural equation analyses ”, Psychological Methods , Vol. 7 No. 1 , pp. 64 - 82 , doi: 10.1037/1082-989X.7.1.64 .
Malaquias , R. and Hwang , Y. ( 2019 ), “ Mobile banking use: a comparative study with Brazilian and US participants ”, International Journal of Information Management , Vol. 44 , pp. 132 - 140 , doi: 10.1016/j.ijinfomgt.2018.10.004 .
Martins , C. , Oliveira , T. and Popovič , A. ( 2014 ), “ Understanding the internet banking adoption: a unified theory of acceptance and use of technology and perceived risk application ”, International Journal of Information Management , Vol. 34 No. 1 , pp. 1 - 13 , doi: 10.1016/j.ijinfomgt.2013.06.002 .
Mitchell , V.W. ( 1999 ), “ Consumer perceived risk conceptualizations and models ”, European Journal of Marketing , Vol. 33 Nos 1/2 , pp. 163 - 195 .
Mutahar , A. , Daud , N. , Ramayah , T. , Isaac , O. and Aldholay , A. ( 2018 ), “ The effect of awareness and perceived risk on the technology acceptance model (TAM): mobile banking in Yemen ”, International Journal of Services and Standards , Vol. 12 No. 2 , pp. 180 - 204 , doi: 10.1504/IJSS.2018.091840 .
Nguyen , O.D.Y. and Cassidy , J.F. ( 2018 ), “ Consumer intention and credit card adoption in Vietnam ”, Asia Pacific Journal of Marketing and Logistics , Vol. 30 No. 4 , pp. 779 - 796 , doi: 10.1108/APJML-01-2017-0010 .
Ooi , K. and Tan , G. ( 2016 ), “ Mobile technology acceptance model: an investigation using mobile users to explore smartphone credit card ”, Expert Systems with Applications , Vol. 59 , pp. 33 - 46 , doi: 10.1016/j.eswa.2016.04.015 .
Patil , P. , Rana , N. , Dwivedi , Y. and Hamour , H. ( 2018 ), “ The role of trust and risk in mobile payments adoption: a meta-analytic review ”, Pacific Asia Conference on Information Systems .
Pelaez , A. , Chen , C. , Chen , Y.X. and Pelaez , A. ( 2019 ), “ Effects of perceived risk on intention to purchase: a meta-analysis ”, Journal of Computer Information Systems , Vol. 59 No. 1 , pp. 73 - 84 , doi: 10.1080/08874417.2017.1300514 .
Porto , N. and Xiao , J. ( 2019 ), “ Credit card adoption and usage in China: urban-rural comparisons ”, The Singapore Economic Review , Vol. 64 No. 01 , pp. 41 - 56 , doi: 10.1142/S021759081743010X .
Qureshi , J. , Baqai , S. and Qureshi , M. ( 2018 ), “ Consumers’ attitude towards usage of debit and credit cards: evidences from the digital economy of Pakistan ”, International Journal of Economics and Financial Issues , Vol. 8 , pp. 220 - 228 .
Roy , S. , Balaji , M. , Kesharwani , A. and Sekhon , H. ( 2017 ), “ Predicting internet banking adoption in India: a perceived risk perspective ”, Journal of Strategic Marketing , Vol. 25 Nos 5/6 , pp. 418 - 438 , doi: 10.1080/0965254X.2016.1148771 .
Sripalawat , J. , Thongmak , M. and Ngramyarn , A. ( 2011 ), “ M-banking in metropolitan Bangkok and a comparison with other countries ”, Journal of Computer Information Systems , Vol. 51 , pp. 67 - 76 , doi: 10.1080/08874417.2011.11645487 .
Tam , C. and Oliveira , T. ( 2017 ), “ Literature review of mobile banking and individual performance ”, International Journal of Bank Marketing , Vol. 35 No. 7 , pp. 1044 - 1067 , doi: 10.1108/ijbm-09-2015-0143 .
Tan , G. , Ooi , K. , Chong , S. and Hew , T. ( 2014 ), “ NFC mobile credit card: the next frontier of mobile payment? ”, Telematics and Informatics , Vol. 31 No. 2 , pp. 292 - 307 , doi: 10.1016/j.tele.2013.06.002 .
Tandon , U. , Kiran , R. and Sah , A. ( 2016 ), “ Understanding online shopping adoption in India: unified theory of acceptance and use of technology 2 (UTAUT2) with perceived risk application ”, Service Science , Vol. 8 No. 4 , pp. 420 - 437 , doi: 10.1287/serv.2016.0154 .
Trinh , H.N. and Vuong , D.H.Q. ( 2017 ), “ Developing credit card market from Vietnamese consumers’ perspective ”, Journal of Science Ho Chi Minh City Open University , Vol. 21 No. 1 , pp. 61 - 75 .
Tseng , S. ( 2016 ), “ Bringing enjoy shopping by using credit cards: the antecedents of internal beliefs ”, Journal of Economics and Economic Education Research , Vol. 17 , p. 16 .
Varaprasad , G. , Chandran , K. , Sridharan , R. and Unnithan , A. ( 2013 ), “ An empirical investigation on credit card adoption in India ”, International Journal of Service Science, Management, Engineering, and Technology , Vol. 4 , pp. 13 - 29 , doi: 10.4018/jssmet.2013010102 .
Venkatesh , V. , Morris , M. , Davis , G. and Davis , F. ( 2003 ), “ User acceptance of information technology: toward a unified view ”, MIS Quarterly: Management Information Systems , Vol. 27 , pp. 425 - 478 , doi: 10.2307/30036540 .
Yang , Y. , Liu , Y. , Li , H. and Yu , B. ( 2015 ), “ Understanding perceived risks in mobile payment acceptance ”, Industrial Management and Data Systems , Vol. 115 No. 2 , pp. 253 - 269 , doi: 10.1108/IMDS-08-2014-0243 .
Zhang , Y. , Weng , Q. and Zhu , N. ( 2018 ), “ The relationships between electronic banking adoption and its antecedents: a meta-analytic study of the role of national culture ”, International Journal of Information Management , Vol. 40 , pp. 76 - 87 , doi: 10.1016/j.ijinfomgt.2018.01.015 .
Related articles, all feedback is valuable.
Please share your general feedback
Contact Customer Support
Join the community, edit social preview.
Remove a code repository from this paper, mark the official implementation from paper authors, add a new evaluation result row.
TASK | DATASET | MODEL | METRIC NAME | METRIC VALUE | GLOBAL RANK | REMOVE |
---|
Add a method, remove a method, edit datasets, data analysis on credit card debt: rate of consumption and impact on individuals and the us economy.
15 Jul 2024 · Mayowa Akinwande , Alexander Lopez , Tobi Yusuf , Austine Unuriode , Babatunde Yusuf , Toyyibat Yussuph , Stanley Okoro · Edit social preview
This paper provides a comprehensive examination of the evolution of credit cards in the United States, tracing their historical development, causes, consequences, and impact on both individuals and the economy. It delves into the transformation of credit cards from specialized merchant cards to ubiquitous financial tools, driven by legal changes like the Marquette decision. Credit card debt has emerged as a significant financial challenge for many Americans due to economic factors, consumerism, high healthcare costs, and financial illiteracy. The consequences of this debt on individuals are extensive, affecting their financial well-being, credit scores, savings, and even their physical and mental health. On a larger scale, credit cards stimulate consumer spending, drive e-commerce growth, and generate revenue for financial institutions, but they can also contribute to economic instability if not managed responsibly. The paper emphasizes various strategies to prevent and manage credit card debt, including financial education, budgeting, responsible credit card uses, and professional counselling. Empirical studies support the relationship between credit card debt and factors such as financial literacy and consumer behavior. Regression analysis reveals that personal consumption and GDP positively impacts credit card debt indicating that responsible management is essential. The paper offers comprehensive recommendations for addressing credit card debt challenges and maximizing the benefits of credit card usage, encompassing financial education, policy reforms, and public awareness campaigns. These recommendations aim to transform credit cards into tools that empower individuals financially and contribute to economic stability, rather than sources of financial stress.
Datasets edit.
COMMENTS
The paper further explores the intricacies of data management within the credit card indu stry, underscoring the i mporta nce of high-quality, stand ardized data for accurate modeling.
Abstract. Credit card frauds are easy and friendly targets. E-commerce and many other online sites have increased the online payment modes, increasing the risk for online frauds. Increase in fraud rates, researchers started using different machine learning methods to detect and analyse frauds in online transactions.
Abstract. Credit cards have often been blamed for consumer overspending and for the growth in household debt. Indeed, laboratory studies of purchase behavior have shown that credit cards can ...
The work in Al-Hashedi and Magalingam (2021) covers research papers on financial fraud in general from 2009 to 2019 inclusive. It mainly discusses works based on data mining techniques and classifies the literature based on range of factors, including publication year, publisher, method used, and research area (credit fraud, cryptocurrency ...
card statistics 2021) the number of people using credit cards around the world was 2.8 billion in 2019, in addition 70% of those users own a single card at least. Reports of Credit card fraud in the US rose by 44.7% from 271,927 in 2019 to 393,207 reports in 2020. There are two kinds of credit card fraud, the first one is by having a credit
1.3 "A Research Paper on Credit Card Fraud Detection" The proposed model involves pre-processing the credit card transaction data and then apply- ing various
The recent advances of e-commerce and e-payment systems have sparked an increase in financial fraud cases such as credit card fraud. It is therefore crucial to implement mechanisms that can detect the credit card fraud. Features of credit card frauds play important role when machine learning is used for credit card fraud detection, and they must be chosen properly. This paper proposes a ...
As credit card becomes the most popular payment mode particularly in the online sector, the fraudulent activities using credit card payment technologies are rapidly increasing as a result. For this end, it is obligatory for financial institutions to continuously improve their fraud detection systems to reduce huge losses. The purpose of this paper is to develop a novel system for credit card ...
The model was trained on a real credit card dataset and the customer behavioural scores are analysed using classical measures such as accuracy, Area Under the Curve, Brier score, Kolmogorov-Smirnov test, and H-measure. ... Therefore, the research of this paper is motivated by the necessity of automatically scoring the customer's behaviour ...
When the research is based on big data analytics, there will be a huge volume of data which can be implemented in Apache Hadoop, Spark, etc. Tensorflow, H2O, Pytorch, Keras, etc. are the libraries imported in the application of deep learning. ... Artikis, A., et al.: A prototype for credit card fraud management: industry paper. In: Proceedings ...
Research in the area of consumer credit card abundance of literature in the business, psychology, and public policy fields. 1960s, the work revolved around descriptive characteristics and evolved as scholars probed deeper by investigating ... Since the first paper on consumer credit cards was published in 1969, researchers have attempted to ...
Many researchers have investigated the consumer's attitude towards using credit cards. However, how the different attributes contribute to credit card usage attitude is not evident. Thus, the main theoretical contribution of this study is to examine the importance and performance of a set of variables that explain the attitude towards using credit cards. It provides essential inputs to ...
1 Introduction. In this paper, we report results from the fi rst field experiment to examine the impact of. credit cards on spending, a quest ion of great interest for economics, law and public ...
This research paper seeks to review and evaluate various aspects of credit and debit fraud detection. The paper examines various techniques used to detect fraudulent credit card transactions and finally proposes a better technique for credit card fraud. ... There has been various research done by using Credit card data in a privacy-preserving ...
The review investigates the present status of research on detecting cyber fraud in credit card and addresses our research questions. The methodology begins with a description of the data sources, the search strategy, the inclusion and exclusion criteria, as well as the quantity of research article selected from the different databases. ...
According to the U.S. Credit Card Statistics in 2021, 70.2% of consumers have at least one credit card, and 14% have at least ten. Moreover, the number of credit card accounts increased by 2.5% year-over-year, implying that credit cards have become a primary and vital payment method in modern societies.
Credit card fraud detection is presently the most frequently occurring problem in the present world. This is due to the rise in both online transactions and e-commerce platforms. Credit card fraud generally happens when the card was stolen for any of the unauthorized purposes or even when the fraudster uses the credit card information for his use. In the present world, we are facing a lot of ...
Consumers prefer credit cards due to uncertainty when carrying cash (Khare et al., 2012) or special discounts from famous brands (Dali et al., 2015). They use credit cards as a source of revolving credit with long grace period (Chahal et al., 2014; Khare et al., 2012). They can even withdraw cash by credit cards as required (Chahal et al., 2014).
Figure 1 shows how the average U.S. consumer's credit card limit and debt varied significantly from 2000-2014. From 2000-2008, the average credit card limit increased by approximately 40 percent, from around $10,000 to a peak of $14,000. During 2009, overall limits collapsed rapidly before recovering slightly in 2012.
Credit cards are central to the financial lives of over 175 million American consumers. Over the last few years and through 2019, the credit card market, the largest U.S. consumer lending market measured by number of users, continued to grow in almost all measures until suddenly reversing course in March 2020.
Credit card debt has emerged as a significant financial challenge for many Americans due to economic factors, consumerism, high healthcare costs, and financial illiteracy. The consequences of this debt on individuals are extensive, affecting their financial well-being, credit scores, savings, and even their physical and mental health.
1. Introduction. 'Buy now, pay later' (BNPL) is an unregulated FinTech credit product enabling consumers to defer payments interest-free into one or more (often four or fewer) instalments. With £2.7bn in UK BNPL lending during 2020, the UK BNPL market is larger by volume of lending than the UK payday loan market at its peak.
This paper will explore the potential connections between credit card usage and financial well-being in India, drawing on available research and data. We will look at factors such as debt levels, savings rates, and financial literacy in relation to credit card usage, and examine the ways in which cultural and societal factors may shape the ...
Objective: This paper aims at sectoral analysis of the credit card industry in India by considering top three credit card issuers i.e., HDFC bank, SBI Cards, and ICICI Bank. Methodology: In order ...