EXPLORING TECHNOLOGY DECEPTION PERCEPTIONS IN THE INDIAN BANKING SECTOR
DOI:
https://doi.org/10.61841/w00xhg96Keywords:
Information securities, new online services, perception, deception, and preventive measuresAbstract
In order to survive and expand in the financial industry, the banking climate of today is extremely competitive and constantly changing. Modern technology is a "enabling resource" that can support the development of more adaptable and flexible learning structures. Additionally beneficial is the bank's ability to swiftly adopt the market condition. The primary goal of this study was to analyze how customers perceive technological deception in banks. The findings show that the three main dimensions of customer deception perception are Information Securities Factors (IS), Preventive Measures (PM), and New Online Services (NOS). In summary, bankers ought to advise clients on safe online transactions, work with them to prevent technological fraud in banks, and emphasize that clients should protect their personal information and only use secure Wi-Fi when conducting online banking transactions.
Downloads
References
[1] Adrienne Curry and Susan penman (2004), "The relative importance of technology in enhancing customer
relationship in banking." An International Journal, Vol.14, ISS: 4, PP3.
[2] Afzaal H. seyal and Mahbular Rahim (2016), "e-service Journal, Vol.7, No.3 PP.47- 68.
[3] Allen N. Berger (2003), " The Economic effects of technology progress" Evidence from the banking
industry. Vol. 35, No:2 PP141-176.
[4] April Wright (2002), "Journal of International Marketing, Vol.10, No.2, PP83-98.
[5] Arjan Reurink (2016), "financial fraud, e-services" ISSN 0944-2073
[6] Chavda. V (2014), E-Banking System: Opportunities and Challenges - A Study, Research
[7] Hub - International Multidisciplinary Research Journal, Volume-1, Issue-5, December 2014, Pg. No.1-4.
[8] Damien Hutchinson and Matthew Warren (2003), "Security for internet banking", Logistics information
management, Vol.16, ISS: 1 PP.64 - 73.
[9] David J. Hand (2010), "Technometrics Vol.52. No.1,PP-34-38.
[10] Doiphode. R, (2014), E-Crime in Banking Sector, Asian Journal of Management Sciences 02 (03 (Special
Issue)); 2014; Pg. No.83-86.
[11] Gokhan sonmezler and Ismail Siriner (2006), "Fragility in Banking sector and Public's Role" social
responsibility, Vol.2 ISS: 3 PP. 335-343.
[12] Ioannis Koskosas (2011), Risk management Vol.13. No.1/2, PP81 - 99.
[13] Jha et al (2014), " A survey on fraud and ID theft in Cyber Crime, JCSN International Journal of computer
science and Network, Volume3, ISS3, PP112-114.
[14] Linda S.goldberg (2009), IMF Staff paper 56, 171-197, DOI10, 1057 imfsp 2008. 31
[15] Lorin M. Hitt and Frances X.Frei (2002), "Management Science, Vol: 48, No.6 PP732-748.
[16] MuthuKurman (2008), "Cyber Crime Scenario In India, Criminal Investigation Department ReviewJanuary
2008 PP 18-20.
[17] Paul M. Horvitz (1996), "Journal of money; Credit and Banking, Vol.28, No.4, PP 971-974.
[18] Philip A. Dover (2006), "Innovation in banking: The in- home computerized Banking." International
Journal of Banking Material, Vol 5 Issue 1 PP 39-54.
[19] Ram N. Acharya, Albert Kagam, Marian.G Sobal and Vinod Kodepaka (2006), "e- services Journal, Vol.4,
PP: 61-76
[20] Ravi Nath. Paul Schrick and Monica Parzinger (2001), "e- service Journal, Vol.1 PP.21-36.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.