Advertisement

On Trust and Security Risk: Mobile Commerce Acceptance and Readiness in Sudan

  • Kennedy NjengaEmail author
  • Sara Salih
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 513)

Abstract

This paper looks at the mobile commerce readiness and presents an insightful look at Sudan and the rise of new opportunities for mobile technology use in the wake of emerging technology risks. Data elicited from Sudanese users of mobile applications was analysed with the objective of understanding and explaining the extent to which constructs such as trust and security risks has influenced Sudan’s readiness for mobile commerce. The work applied the Unified Theory of Acceptance and Use of Technology (UTAUT) model towards this end. A sample size of 145 Sudanese respondents working in the public sector provided useful data that was subjected to the UTAUT approach. Findings suggest that Sudanese users’ perceived technology risk and trust of m-commerce services in mobile platforms tended to inhibit the desired rate of m-commerce adoption and therefore readiness. These findings are seen to be in contrast of m-commerce readiness in Sudan’s neighbouring eastern and central African countries such as Rwanda, Kenya and Ethiopia.

Keywords

M-commerce Information security Sudan Trust Security risk Sudanese public sector 

References

  1. 1.
    Algethmi MA (2014) Mobile commerce innovation in the airline sector: an investigation of mobile services acceptance in Saudi Arabia. Doctoral dissertation, Brunel University School of Engineering and Design Ph.D. ThesisGoogle Scholar
  2. 2.
    Ashraf AR, Thongpapanl NT, Menguc B, Northey G (2016, Oct) The role of m-commerce readiness in emerging and developed markets. American Marketing AssociationGoogle Scholar
  3. 3.
    Cook T, McKay C (2015) How M-Shwari works: the story so far. Consultative group to assist the poor (CGAP) and financial sector deepening (FSD)Google Scholar
  4. 4.
    Heinze J, Thomann M, Fischer P (2017) Ladders to m-commerce resistance: a qualitative means-end approach. Comput Hum Behav 73:362–374CrossRefGoogle Scholar
  5. 5.
    Jack W, Suri T (2011) Mobile money: the economics of M-PESA (No. w16721). National Bureau of Economic ResearchGoogle Scholar
  6. 6.
    Joubert J, Van Belle J (2013) The role of trust and risk in mobile commerce adoption within South Africa. Int J Bus Humanit Technol 3(2):27–38Google Scholar
  7. 7.
    Kaspersky Lab. Global IT security risks: 2014 [Online]. Available at https://media.kaspersky.com/en/business-security/Global-IT-Risks-Report-2014-Threat-Security-Data-Breaches.pdf. Accessed 20 Feb 2018
  8. 8.
    Khattab I, Balola Y, Eldabi TA (2012) Factors influencing branchless banking for microfinance in Sudan: theoretical perspectives and future directionsGoogle Scholar
  9. 9.
    Malik M, Malik M (2015) The efficacy of United States sanctions on the Republic of Sudan. J Georgetown Univ Qatar Middle East Stud Student Assoc 2015:7.  https://doi.org/10.5339/messa.2015.7CrossRefGoogle Scholar
  10. 10.
    Mohamed EH, Ping WANG, Elhadi OA (2014, June) E-commerce in Sudan: the reality and prospects. In 2014 international conference on management science and management innovation (MSMI 2014). Atlantis PressGoogle Scholar
  11. 11.
    Mohammed AMA (2015) A comparative study for mobile payment in Sudan case study: M-PESA in Kenya. Doctoral dissertation, Sudan University of Science and TechnologyGoogle Scholar
  12. 12.
    Pallant J (2016) SPSS survival manual: a step by step guide to data analysis using IBM SPSS, 6th edn. Allen and Unwin, SydneyGoogle Scholar
  13. 13.
    Prendergast J, Brad Brooks R (2016) Modernized sanctions for Sudan: unfinished business for the Obama Administration. The Enough Project, Washington, pp 8–10Google Scholar
  14. 14.
    Vanathi B, Shanmugam K, Uthairaj VR (2016) A secure m-commerce architecture for service provider to improvize quantity and quality of the products using fingerprint authentication and gender classification. Asian J Inf Technol 15(2):232–242Google Scholar
  15. 15.
    Venkatesh V, Morris MG, Davis GB, Davis FD (2003) User acceptance of information technology: toward a unified view. MIS Q 27(3):425–478CrossRefGoogle Scholar
  16. 16.
    Venkatesh V, Thong JY, Xu X (2016) Unified theory of acceptance and use of technology: a synthesis and the road ahead. J Assoc Inf Syst 17(5):328–376Google Scholar
  17. 17.
    York J, Carlson K (2014) Sudan tech sanctions harm innovation and development: US government and corporations must act. Electronic Frontier Foundation. Retrieved 7 Aug 2017, from https://www.eff.org/deeplinks/2014/06/sudan-tech-sanctions-harm-innovation-development-us-government-and-corporations-must-act

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.University of JohannesburgJohannesburgSouth Africa

Personalised recommendations