A Model for Analysis of Social Media in Adoption of Mobile Banking

Document Type : Original Article

Authors

Department of Industrial Engineering, Information Technology Group, K. N. Toosi University of Technology, Tehran, Iran

Abstract

Banks can design more efficient methods for customer acquisition by utilizing social media platforms. By monitoring information from social media platforms, banks can analyze customers' reactions to offer by competitors and adopt appropriate strategies to increase customer satisfaction and attract new customers. Present research focuses on analyzing the role of social media in the acceptance of mobile banking at Bank Melli of Qazvin Province. This research is of a survey and applied nature. The data collection tool is a survey, and the data collection method is fieldwork. The study population includes all managers and deputies of Bank Melli of Qazvin Province in various positions. The sample size is calculated using the Cochran formula due to the limited population. In this study, the indicators were identified, and hypotheses were formulated based on these indicators. Finally, using statistical techniques, all the proposed hypotheses were proven and the impact of all indicators was confirmed. The results have confirmed the effect of social media performance on the individual recognition of mobile banking consumers.

Graphical Abstract

A Model for Analysis of Social Media in Adoption of Mobile Banking

Keywords

Main Subjects


  1. Merryta D, Tuga M. Artificial Intelligence Model as an Early Warning System for Fraudulent Transactions in Mobile Banking. ICIC Express Letters Part B: Applications. 2023;14(07):747. https://doi.org/10.24507/icicelb.14.07.747
  2. Madhuri TS, Babu ER, Uma B, Lakshmi BM. Big-data driven approaches in materials science for real-time detection and prevention of fraud. Materials Today: Proceedings. 2023;81:969-76. https://doi.org/10.1016/j.matpr.2021.04.3232214-7853
  3. Mytnyk B, Tkachyk O, Shakhovska N, Fedushko S, Syerov Y. Application of artificial intelligence for fraudulent banking operations recognition. Big Data and Cognitive Computing. 2023;7(2):93. https://doi.org/10.3390/bdcc7020093
  4. Hamidi H, Vafaei A, Monadjemi SA. Evaluation and checkpointing of fault tolerant mobile agents execution in distributed systems. Journal of Networks. 2010;5(7):800. 10.4304/jnw.5.7.800-807
  5. Seeja K, Zareapoor M. Fraudminer: A novel credit card fraud detection model based on frequent itemset mining. The Scientific World Journal. 2014;2014. http://dx.doi.org/10.1155/2014/252797
  6. Padhi B, Chakravarty S, Biswal B, editors. Anonymized credit card transaction using machine learning techniques. Advances in Intelligent Computing and Communication: Proceedings of ICAC 2019; 2020: Springer.
  7. Moradi R, Hamidi H. A New Mechanism for Detecting Shilling Attacks in Recommender Systems Based on Social Network Analysis and Gaussian Rough Neural Network with Emotional Learning. International Journal of Engineering, Transactions B: Application. 2023;36(2):321-34. https://doi.org/10.5829/ije.2023.36.02b.12
  8. Sharma D, Kang SS, editors. Hybrid model for detection of frauds in credit cards. 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N); 2022: IEEE.
  9. Zhang Y, Chen X, Li J, Wong DS, Li H, You I. Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Information Sciences. 2017;379:42-61. https://doi.org/10.1016/j.ins.2016.04.015
  10. Nilchi AN, Vafaei A, Hamidi H, editors. Evaluation of security and fault tolerance in mobile agents. 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN'08); 2008: IEEE. 10.1109/WOCN.2008.4542509
  11. Hashemi SK, Mirtaheri SL, Greco S. Fraud detection in banking data by machine learning techniques. IEEE Access. 2022;11:3034-43. 10.1109/ACCESS.2022.3232287
  12. Nkomo BK, Breetzke T, editors. A conceptual model for the use of artificial intelligence for credit card fraud detection in banks. 2020 Conference on Information Communications Technology and Society (ICTAS); 2020: IEEE. 10.1109/ICTAS47918.2020.233980
  13. Hamidi H, Mohammadi K. Modeling fault tolerant and secure mobile agent execution in distributed systems. International Journal of Intelligent Information Technologies (IJIIT). 2006;2(1):21-36. 10.4018/jiit.2006010102
  14. Aljawarneh S. Cloud security engineering concept and vision: Concept and vision. Cyber security and threats: Concepts, methodologies, tools, and applications: IGI Global; 2018. p. 93-101.
  15. Khan N, Al-Yasiri A. Cloud security threats and techniques to strengthen cloud computing adoption framework. Cyber security and threats: Concepts, methodologies, tools, and applications: IGI Global; 2018. p. 268-85.
  16. Hamidi H, Vafaei A. Evaluation of fault tolerant mobile agents in distributed systems. International Journal of Intelligent Information Technologies (IJIIT). 2009;5(1):43-60. http://doi.org/10.4018/jiit.2009010103
  17. Balagolla E, Fernando W, Rathnayake R, Wijesekera M, Senarathne A, Abeywardhana K, editors. Credit card fraud prevention using blockchain. 2021 6th international conference for Convergence in Technology (I2CT); 2021: IEEE. 10.1109/I2CT51068.2021.9418192
  18. Mohammadi K, Hamidi H, editors. Evaluation of fault-tolerant mobile agents in distributed systems. 2005 1st IEEE and IFIP International Conference in Central Asia on Internet; 2005: IEEE. 10.1109/CANET.2005.1598208
  19. Kirar JS, Kumar D, Chatterjee D, Patel PS, Yadav SN, editors. Exploratory Data Analysis for Credit Card Fraud Detection. 2021 International Conference on Computational Performance Evaluation (ComPE); 2021: IEEE. 10.1109/ComPE53109.2021.9751922
  20. Hamidi H, Vafaei A, Monadjemi A. Algorithm based fault tolerant and check pointing for high performance computing systems. Journal of applied sciences. 2009;9(22):3947-56. 10.3923/jas.2009.3947.3956
  21. Hamidi H, Rafebakhsh M. Analyzing factors influencing mobile social media marketing acceptance among customers. International Journal of Engineering, Transactions C: Aspects. 2022;35(6):1209-16. https://doi.org/10.5829/ije.2022.35.06c.13
  22. Hamidi H, Seyed Lotfali S. Analysis of role of cloud computing in providing internet banking services: Case study bank melli iran. International Journal of Engineering, Transactions B: Application. 2022;35(5):1082-8. https://doi.org/10.5829/ije.2022.35.05b.23
  23. Daliri S. Using harmony search algorithm in neural networks to improve fraud detection in banking system. Computational Intelligence and Neuroscience. 2020;2020. https://doi.org/10.1155/2020/6503459
  24. Esmail FS, Alsheref FK, Aboutabl AE. Review of Loan Fraud Detection Process in the Banking Sector Using Data Mining Techniques. International journal of electrical and computer engineering systems. 2023;14(2):229-39. https://doi.org/10.32985/ijeces.14.2.12
  25. Handa A, Dhawan Y, Semwal P. Hybrid analysis on credit card fraud detection using machine learning techniques. Handbook of Big Data Analytics and Forensics. 2022:223-38. https://doi.org/10.1007/978-3-030-74753-4_15
  26. Hamidi H. A combined fuzzy method for evaluating criteria in enterprise resource planning implementation. Intelligent systems: Concepts, methodologies, tools, and applications: IGI Global; 2018. p. 639-70.
  27. Alt R, Puschmann T. The rise of customer-oriented banking-electronic markets are paving the way for change in the financial industry. Electronic Markets. 2012;22:203-15.
  28. Patil S, Nemade V, Soni PK. Predictive modelling for credit card fraud detection using data analytics. Procedia computer science. 2018;132:385-95. https://doi.org/10.1016/j.procs.2018.05.199
  29. Hamidi H, Vafaei A, Monadjemi SA. Analysis and design of an abft and parity-checking technique in high performance computing systems. Journal of Circuits, Systems, and Computers. 2012;21(03):1250017. https://doi.org/10.1142/S021812661250017X
  30. Rambola R, Varshney P, Vishwakarma P, editors. Data mining techniques for fraud detection in banking sector. 2018 4th International Conference on Computing Communication and Automation (ICCCA); 2018: IEEE. 10.1109/CCAA.2018.8777535