Consumer Preference A Study of Mobile Digital Wallet
Consumer Preference A Study of Mobile Digital Wallet
By
Doctor of Science
December 2018
By
Approved:
Mobile digital wallet has been revolving around the world. However, factors are
influencing the adoption and use of mobile wallet. The purpose of the qualitative
phenomenological study was to examine the perceptions of the use of mobile wallet among the
Participants of this study included 17 individuals who have embraced and utilized a
mobile wallet for different transactions. Their perceptions about the security mechanism and
motivation for adoption allows for a deeper understanding of their experiences during and after
the adoption. Most available researches have been mainly focussing on users’ initial adoption
and the usage of mobile payment, whereas postadoption usage has not been fully investigated,
Amazon Mechanical Turks (MTurks) was used to recruit the participants while Skype®
technology was used to conduct the online interviews. The unified theory of acceptance and use
of technology (UTAUT) model was used to describe the perception of the users and NVivo 12 ®
software was used to analyse the transcribed data from the open-ended interviews. The findings
identified the factors that influence the adoption and continuance use of mobile wallet.
The six themes emerged from the analysis are Consumers’ Mindset, Motivations for
Adoption, Challenges in Mobile Wallet Enrollment, Physical and Mobile Wallet Comparison,
The findings from this study may benefit consumers, device manufacturers, and mobile wallet
application, vendors. Future research is recommended to replicate the study using a quantitative
methodology, however, in a different setting with a larger sample of older adults as participants.
DEDICATION
I dedicate this dissertation to the Highest God for giving me the gift of life, crowned me
with unmerited favor. Also, to my children Einstein, Lovette and Winnie for their perseverance
I want to express my appreciation to the people who are instrumentals for the completion
of this research work. My dissertation Chair - Dr. William H. Butler, who provided guidance and
support in making this research work a worthwhile. His unrelenting advice and guidance have
made this research a success. Dr. Ray Letteer and Dr. Emily Darraj for accepting to serve in my
committee and for their helpful feedback and valuable instruction during the conduct of this
research. My gratitude also goes to Dr. Michael Fain, Director of Doctoral learning who never
got tired of my frequent requests and inquiries. It is a wonderful experience meeting and
knowing you.
I wish to thank all the management and academic staff of Capitol Technology University
for establishing unparalleled pedagogy for the academic program that always provides first class
results. It is my joy to be identified and associated with this quality from this great citadel of
academic excellence.
I want to thank my family for enduring the hard times of not getting the required attention
when needed. I say thank you to Einstein, Lovette, and Winnie for growing so quickly to be
independent whenever I’m out of the country for the pursuit of this program. This
(Mrs.) Omosalewa Adetutu Oyewole, MBChB (Ogun), FWACP, FESPE, for her tranquility and;
for giving me wonderful and understanding kids, also to my friends are special
acknowledgements, Mr. & Mrs. Ayodele Okpoye for their unrelenting support at all times. Mr.
Emmanuel Bolajoko and Mrs. Joyce Daniel in Baltimore Maryland for being receptive during
Contents
CONSUMER PREFERENCE: A STUDY OF MOBILE DIGITAL WALLET iii
ABSTRACT v
DEDICATION vi
ACKNOWLEDGMENT vii
CHAPTER 1: INTRODUCTION 1
Problem Statement 6
Nature of Study 10
Research Questions 13
Definition of Terms 16
Assumptions 18
Scope 19
Limitations 19
Delimitations 19
Summary 20
Historical Overview 23
Current Findings 25
Analysis 27
Alternative Viewpoints 34
Mobile Wallet 38
Summary 45
Validity 56
Data Analysis 57
Summary 59
CHAPTER 4: RESULTS 61
Pilot Study 61
Interviews 63
Researcher 63
Participants 64
Participants’ Characteristics 67
Participants’ Responses 70
Summary 114
Discussion 116
Summary 127
REFERENCES 129
APPENDIX A: RESEARCH METHODOLOGY MAP 148
Table 6. Participants statement and Theme for Consumers’ Mindsets (RQ1a) 101
Table 7. Participants statement and Theme for Motivations for Adoption (RQ1b) 103
Table 8. Participants statement and Theme for Mobile Wallet Enrollment (RQ1c) 104
Table 9.Participants statement and Theme for Physical and Mobile Wallet Comparison (RQ1d)
......................................................................................................................................... 105
Table 10. Participants statement and Theme for Consumers’ Security Perceptions (RQ1e)108
Table 11. Participants statement and Theme for Consumers’ Security Perceptions (RQ1e)109
Table 12. Participants statement and Theme for Consumers’ Security Perceptions (RQ1e)110
Table 13. Participants statement and Theme for Consumers’ Perceptions of Mobile Wallet
Table 14. Participants statement and Theme for Consumers’ Perceptions of Mobile
Table 15. Participants statement and Theme for Consumers’ Perceptions of Mobile
............................................................................................................................................. 3
Card payments, both in-store and online are increasingly pervasive due to technology
advancement and global communication, albeit with business opportunities, new threats for
financial services are on the rise due to modern technologies (Simic, 2005, Al-Furiah & Al-
Braheem, 2009). Electronic payment systems, including credit-debit systems, have become a
standard for most transactions based on their characteristics of trust, reliability, security, ease of
use, and flexibility; however, security remains a challenge and leaves consumers vulnerable to
concern, which modern technologies, including mobile devices, seek to enhance (Harris,
Brookshire, & Chin, 2016, Rathore, 2016). New technologies are evolving to present alternative
payment methods which aim to reduce the opportunity for (Washington, 2016) and possibly
increase the ease of payment (George, Lennard & Scribbins, 2013). Many techniques and
innovations have been suggested to address the growing security concerns; however, each has its
own pushbacks (Zojaji, Atani, & Monadjemi, 2016). Mobile devices with contactless
technologies are among the innovations with goals to deliver ease of use and enhance security
during financial transactions for goods and services (Oliveira, Thomas, Baptista & Campos,
2016). Digital wallets, as a subset of mobile payments, allow an individual to handle multiple
conducting a payment process through mobile devices. Xin et al. (2015) claimed consumers
could be vulnerable to attack in the payment ecosystem which could affect the willingness to
adopt the payment technology. The factors affecting this willingness formed the bases for
consumers’ trust in mobile payment adoption. Xin et al (2015) examined consumers’ uncertainty
about mobile technology, service providers, and vendors; it would not be credible to assume a
priori that only the factors mentioned above can affect the adoption of the mobile wallet.
adopting new technology including a mobile wallet. The study analyzed the influence of
consumers’ perceived risk; the study further demonstrated that security and privacy have
significant impacts on the adoption of the mobile wallet. Yang, Liu, Li & Yu (2015) argued that
intangibility are the factors influencing consumers’ adoption of the mobile wallet. Perception
appears multiple times in the previous studies; however, there are a number of factors that affect
a consumer’s intention of adopting the mobile wallet. This study focuses on an individual’s
perceived usefulness of the mobile digital wallet from cybersecurity point of view.
Chapter 1 of this study contains the background of the problem of adopting mobile digital
wallet as an alternative payment method. The discussion also covers the statement of the purpose
and the significance of the study, which highlights how the research results will benefit
consumers, providers, original equipment manufacturers, application developers and the eco-
system. This chapter presents the conceptual framework guiding the design of the
phenomenology theory, the scope of the study, assumptions and limitations. Throughout the
course of this study, focus will be on the design method and methodology to ensure a substantive
result.
The broad use of mobile devices is feeding consumers’ appetite for innovation beyond
which have led to the increase in adoption of the devices for mobile commerce. Figure 1, below
payments: Market drivers, applications, and inhibitors by M. Sherman, 2014, Proceedings of the
1st International Conference on Mobile Software Engineering and Systems, p.72. Copyright.
The figure 1 above showed the progressive adoption of mobile commerce using mobile
devices; 2011 experienced $14 Billion dollars sales in retail which is about 7% of retail
ecommerce. Subsequently, in 2012, 2013, 2014, 2015 and 2016, the growth has been steady with
11%, 15%, 18%, 21% and 24% respectively. According to Sherman (2014) the projection in the
graph is an indication of continues adoption of the mobile device as an underlying technology for
mobile commerce.
Mobile commerce is a set of commercial activities that take place through mobile
devices. Hillman, Neustaedter, Oduor, and Pang (2014) referred to mobile commerce as an
activity to which the mobile payment service belongs. Given the statistics of mobile payment
usage, Sherman (2014) reported that the growth could reach or exceed $1.3 trillion as of 2017.
Furthermore, the approximately 38% increase in the worldwide gross domestic product (GDP)
from 2010 to 2020 is a strong indicator of an increase in mobile payments (Sherman, 2014).
The emergence of new mobile payment takes the payment methodology a step further by
developing the mobile digital wallet that allows consumers to store multiple credit cards and
make purchases by authenticating and swiping the mobile device across the payment sensor
(French, & Reuters, 2012). The mobile wallet technology is increasing as a popular payment
method (Rose, 2012;Toma, 2012), and there are expectations of further growth according to the
study conducted in Japan and South Korea (Shufelt, 2013). Zhou (2013) confirmed that many
organizations are venturing to mobile payment to promote their goods and services. In addition,
Trichur (2014) argued executives of major banks in Canada are expecting to adopt the mobile
The new payment device is expected to grow with technological innovations of the
wireless network and mobile devices (Swilley, 2010). However, due to the high volume of users’
data, an appreciable amount of money is being lost because of security breaches in mobile
devices and applications (Stiakakis, Georgiadis, & Andronoudi, 2016). The security breaches
continue to increase due to users’ lack of awareness and education about mobile payment
Davis (2016) argued mobile devices increase productivity, efficiency, and customer
services; however, there are hindrances characterized by lack of privacy protection and user’s
anonymity that affect the acceptance of the mobile payment from the consumers’ perspectives
Techatassanasoontorn & Tan (2015), to understand the trust facilitation in the mobile payment
adoption, argued that consumers’ confidence is developed through five dimensions including
characteristics derived from mobile service providers, mobile payment vendor, mobile
technology, culture and trust disposition. While identifying the antecedent of trust, the study
focused on the initial trust of mobile payment that can influence the consumer to adopt the new
technology.
specifically mobile wallet, showed negative attitudes toward the adoption of the device (Swilley,
2010). Swilley (2010) suggested in her study that consumers decided not to acknowledge the
usefulness of the mobile wallet based on their perceived risk of losing the stored data including
credit card and other information stored in a single device. Swilley further argued that perceived
security and privacy presented concerns in adopting the mobile digital wallet.
Two years later Toma (2012) recommended that a mobile payment must be easy to use,
interoperable and with other payment platforms and anonymous to influence consumers’
attitudes. He suggested the ease of use and interoperability would establish customers’ trust to
adopt the digital payment method. Toma further suggested an improvement in security and
privacy would positively influence the consumers’ trust. Toma analyzed the result of the study
In contrast, Harper (2014) argued 75% of respondents in his study of mobile contactless
technology’s impact on businesses are willing to adopt mobile payment. The study examined the
customers’ perception of the security in mobile payment technology. Harper also argued some
consumers entertain fears based on what they read or heard in the news media about breaches of
personal and financial data. This study was generally based on perceived usefulness and
perceived ease of use. The review of Chapter 2 will further identify the gap in the literature to
understand the security usefulness experienced by the users after adopting the mobile wallet as
Problem Statement
The general problem is the scale of payment card fraud is creating fear and loss of
confidence in card payment systems (Murdoch, & Anderson, 2014, March; Zojaji, Atani, &
Monadjemi, 2016). The traditional payment cards compromise has great economic impacts on
consumers and there is a need for a more secured payment method (Stiakakis, Georgiadis, &
reduce the attack opportunities and possibly increase the ease of payment (George, Lennard &
Scribbins, 2013).
through various enablers including near field commuincation (NFC), quick response code,
mobile wallet, short message services (SMS) transactions, and wristband pay introduced by
Barclaycard in the UK (De Kerviler, Demoulin, & Zidda, 2016; Zhou, 2015). These referenced
alternative payment methods seek to either improve “ease of use” and/or offer enhancement in
the security mechanism of mobile payment devices(Harris, Brookshire, & Chin, 2016; Rathore,
The benefits of new technology, however, introduced new methods of fraud and theft that
could hinder the adoption of mobile payments (Kellermann, 2002). According to Kang, Mun, &
Johnson (2015), 79% of mobile device users in the U.S. utilized the retail specific applications to
check prices, reviews, product discounts and carry out transactions. Several studies have
investigated consumers’ perception before adopting the mobile wallet in which case, such
perceptions may not be a priori for understanding the experience from a cybersecurity
standpoint.
The specific problem, however, is users are unaware of the security capability used in
mobile digital wallet as an alternitve payment method to credit cards (Mathiowetz, 2014; Zhou,
2015). De Kerviler, Demoulin, & Zidda (2016) argued that the adoption rate for mobile
payments seem to be much lower relative to the other functions performed with mobile device.
Similarly, Zhou (2015) argued that mobile payment rate adoption is 38.9% compared to 87.1%
for mobile instant messages. Zhou (2015) and other several researchers suggested that an
“individual’s perceived usefulness” (p. 56), or insecurity including financial risk, may influence
adoption of the mobile payment system (Swilley, 2010; Yang, Liu, Li & Yu, 2015).
New Zealand, it was argued that the level of trust in mobile payment influences a potential
consumer’s decision to adopt the payment method. The previously noted studies utilized
participants with no experience with mobile payment in China and New Zealand (Xin,
Techatassanasoontorn, & Tan, 2015; Yang, Liu, Li & Yu, 2015). Xin et al. and Yang et al.
(2015) focused attention on consumers’ perception before the adoption of the mobile wallet;
however, such perceptions may be too narrow to understand the breath of the reason customers
will adopt, or continue to adopt, the mobile digital wallet. During the literature review in this
study, only few studies were identified to examine consumer experience from cybersecurity
stand points after the adoption of the mobile wallet with a focus on the geographical area of
Toronto in Canada. In addition, French (2012) confirmed the reduction in the use of traditional
physical wallet in place of a digital wallet in Toronto is still many years away. Considering the
slow adoption rate, there is a need to further investigate the reason customers will continuously
adopt mobile wallet with consideration of security capabilities in the mobile digital wallet.
The qualitative research method employed for this study will be based on the human-
focused approach required to understand and interpret people's experiences and their worlds
(Given, 2016; Merriem & Tisdell, 2015). The study will explore qualitative phenomenology to
understand users’ security experiences of the mobile digital wallet. The researcher will collect
data from interviews with Toronto retail shoppers through open-ended interviews, observations,
and documentations (Creswell, 2012; Merriem & Tisdell, 2015; Salkind, 2012). The researcher
will focus on the participants’ experiences and establish meaning from the experiences (Merriem
& Tisdell, 2015). The general target population for this study is the mobile digital wallet users
among the Toronto retail shoppers who used a mobile wallet for transactions in Toronto, Canada.
perception of the end users of mobile digital wallet. The survey method is proposed to
understand users’ lived experiences with the mobile digital wallet after adoption. The qualitative
constructivist approach gave meaning to the participants’ beliefs and values (Creswell, 2012;
Schein, 2014).
The constructivism will help to study the context utilizing open-ended online interviews
in identifying and understanding consumers’ secured experience about the mobile digital wallet
(Given, 2016). The constructivist design of phenomenology will be explored with a systematic
digital wallet security and consequently to help generate meaning to the collected data (Creswell,
2012; Merriem & Tisdell, 2015). The independent variables are the cybersecurity experiences of
the Toronto shoppers using the mobile digital wallet while the dependent variable is the adoption
rate of mobile digital wallet. The target population for this phenomenology study is the
population that previous literatures have not considered before now -- the users of a mobile
digital wallet who have experienced the payment method in Toronto, Canada.
This study will attempt to present users’ cybersecurity experiences after the adoption of
the mobile digital wallet as an alternative payment for shopping. The significance of this
research is to understand the security factors that can influence consumers’ attitudes toward the
use of mobile digital wallet (Swilley, 2010). According to Murdoch and Anderson (2014), the
implementation of the mobile wallet may be flawed even if the security protocol is strongly
designed; and users may be dishonest or develop doubts about the integrity of the components of
the mobile wallet. Previous research demonstrated that individuals’ general evaluation had a
connection between the risk and benefits of using a product, which could lead to doubts about
the integrity of the mobile wallet (de Kerviler, Demoulin, & Zidda, 2016). The substantive result
from this qualitative study is an extension to understanding the consumers’ trust in mobile
The intent of the study is to provide useful information to consumers regarding the
adoption and secure enrollment in the mobile wallet. The study is also designed to contribute
information to consumers to enhance technologies for the usability and security of the mobile
wallet. In addition, the study is intended to identify whether the use of the mobile wallet is
productive for customers and identifies the outcome measures for saving time during payment
transactions (Oliveira, Thomas, Baptista, & Campos, 2016). Further, the significance of the
prescribed study seeks to provide useful information to the device manufacturers (Xin,
Techatassanasoontorn & Tan, 2015) to improve mobile device security architecture (Murdoch, &
Anderson, 2014).
through the interview questions. The intent of the interview questions is to measure the
perceptions and understand participants’ lived experience of security capability in the mobile
digital wallet. Previous research focused on perception before the adoption of the new
technology (Swilley, 2010; Xin, Techatassanasoontorn & Tan, 2015; Yang, Liu, Li & Yu,
2015), and this study focuses on the lived experience after the adoption. Finally, this study is
designed to contribute to the existing literature of users’ perception and preferences about the
mobile digital wallet in Korea and the U.S. (Shin, Lee & Odom, 2014).
Nature of Study
This study will utilize phenomenological study to understand the customers’ perception
of mobile payment. Qualitative researchers seek to understand the interpretation people give to
their experiences and the meaning they attribute to such experiences (Merriem & Tisdell, 2015).
and human experiences as applicable to mobile payment under study (Merriem & Tisdell, 2015).
identifying the appropriate data collection method to substantiate the claim made on made on
participants’ experience and interpretation for the study. Merriem & Tisdell (2015) identified the
interview as primary means for data collection. However, the researcher will isolate his
viewpoints and assumptions to avoid biases during the study (Merriem & Tisdell, 2015). For this
study, the researcher will select online interview using Skype as means for data collection form
the participants. Thus, document, interview, and audiovisual data are forms of artifacts for
qualitative study (Creswell, 2013). The researcher will organize the collected artifacts themes for
further analysis to present the essence of the phenomenon of mobile payment (Merriem &
Tisdell, 2015).
This study will use a phenomenological study to understand the customers’ perception of
mobile payment. Qualitative researchers seek to understand the interpretation people give to their
experiences and the meaning they attribute to such experiences (Merriem & Tisdell, 2015).
and human experiences as applicable to mobile payment under study (Merriem & Tisdell, 2015).
identifying the appropriate data collection method to substantiate the claim made on made on
participants’ experience and interpretation for the study. Merriem & Tisdell (2015) identified the
interview as primary means for data collection. However, the researcher will isolate his
viewpoints and assumptions to avoid biases during the study (Merriem & Tisdell, 2015). For this
study, the researcher selected online interview using Skype as means for data collection form the
participants. Thus, document, interview, and audiovisual data are forms of artifacts for
qualitative study (Creswell, 2013). The researcher will organize the collected artifacts themes for
further analysis to present the essence of the phenomenon of mobile payment (Merriem &
Tisdell, 2015).
The nature of the prescribed study is to address the research questions that will be
explored utilizing a qualitative research design (Merriem & Tisdell, 2015). There are different
qualitative research designs including historical, descriptive, ethnography, case study,
phenomenological, and grounded theory (Given, 2016). The major commonality of these designs
is the focus on generating meaning and understanding from data collections (Merriem & Tisdell,
2015). This study includes a collection and analysis of qualitative data from the participants to
address the research question: What are the lived experiences of consumers after the adoption of
understand consumers’ lived cybersecurity experience of the mobile digital wallet by collecting
and analyzing the data obtained from participants (Merriem & Tisdell, 2015). The analyses
with the phenomenon, while the phenomenological reduction will redirect the research to the
participants experiences (Creswell, 2012; Merriem & Tisdell, 2015; Salkind, 2012). The adopted
method will help to define the essence of consumers’ lived experiences and the basic structures
Salkind, 2012). Further, the method will help compare data segments using the horizontalization
method to gain a full understanding of the participants’ experiences (Creswell, 2012, Merriem &
Tisdell, 2015).
Researchers hold four philosophical worldviews that explain and guide their steps during
the research work. The posts positivist worldview holds the ideas of causes and effects by
developing the hypotheses and validating the hypotheses using the experimental and non-
experimental designs (Creswell, 2012, 2014). The transformative worldviews, on the other hand,
focus on social context issues such as racism (Creswell, 2014). This design focuses on
transformative worldviews including narrative, phenomenological, grounded theory,
ethnography, and case study (Salkind, 2012). Pragmatic worldviews explore qualitative and
quantitative approaches (Creswell, 2012). The researchers holding the pragmatic view utilized
the convergent, explanatory and exploratory sequential design to collect data from participants
(Creswell, 2014).
However, for the purpose of the prescribed study, constructivist worldviews are
appropriate to gain an understanding of the participants’ experiences with the mobile digital
wallet. Despite the stated differences in philosophical worldviews, the similarities in worldviews
digital wallet through interviews, stories, observations, documents and reports (Merriem &
Tisdell, 2015). Chapter 3 will discuss in more detail the design appropriateness for this study.
Research Questions
The broad research question: What are the lived experiences of consumers after the
adoption of the mobile digital wallet? This research question seeks to guide the study in
2015). The main research question attempts to provide a conceptual basis for the study by
utilizing guided sub-questions (Adeyeye, 2015; Cathro, 2015). In addition, the broad questions
will help the researcher explore the common phenomenon regarding the mobile digital wallet
(Creswell, 2013).
The following sub-questions will guide the study to answer the central research question
RQ1a: What are the thoughts of consumer when they know about mobile wallet?
These research questions will be further tailored with other sub-questions to address the
main research question. The study will utilize synchronous skype online interviews with
unstructured questionnaires for the participants (Merriem & Tisdell, 2015). The study data will
focus on the cybersecurity experience of using the mobile digital wallet. The participants’
responses to the questions will help provide answers to the six stated questions.
The first question will address the factors that influenced the participants’ adoption of the
mobile digital wallet. The subsequent questions will address what areas of the digital wallet are
useful and how the participants feel about their data. Chapter 3 will discuss in detail how the
Previous studies examined the factors influencing customers’ initial decision to adopt
mobile wallet (Xin,Techatassanasoontorn & Tan, 2015; Yang, Liu, Li & Yu , 2015). According
to the study conducted by Xin et al., 62.1% of participants in Asia, Europe, and Maori, indicated
their experiences with mobile banking. However, the studies left a gap in consumers’
cybersecurity experience about the mobile digital wallet in Toronto, Canada. The developed
research questions will help to understand the consumers’ experience after the adoption of the
mobile wallet, and this study will draw upon the conceptual framework of Unified Theory of
Acceptance and Use of Technology (UTAUT) (Venkatesh, Thong, & Xu, 2016; Venkatesh,
intention and behaviors of end users of new technology. The UTAUT is considered a robust
model (Taiwo & Downe, 2013) by combining models: Theory of Reasoned Action (TRA)
proposed by Davis in 1989, provides a framework for researcher to understand what influences
an individual to make a decision based on the intention to engage in such behavior (Lorenzo-
Blanco, Schwartz, Unger, Zamboanga, Des Rosiers, Baezconde-Garbanati, & Pattarroyo, 2016).
Barnes (2014) confirmed that TRA was used to obtain an in-depth understanding of consumers’
behaviors, attitudes, and intentions toward the adoption of electronic commerce technology.
In 1985, Icek Ajzen developed the Theory of Planned Behavior (TPB) to improve the
TRA by using perceived behavioral control to predict intentions and behaviors of consumers
(Sommestad, Karlzén, & Hallberg, 2015). The technology Acceptance Model (TAM) helps
researchers to understand the effect of consumers’ attitude and beliefs on consumers’ acceptance
or rejection of technology (Pires, 2015). According to Amaro (2015), John Keller’s Model of
Motivational design (MM) helps to identify the most effective method of sustaining attention,
process. In addition, the combined TAM and TPB (C-TAM-TPB) proposed by Taylor and Todd
in 1995 was used to determine the behavior by the attitude towards such behavior (Safeena,
individual’s belief that the use of technology can enhance their performance (Jawahar, &
Harindran, 2013). Also, Rogers (2003) introduced the Innovation Diffusion Theory (IDT) to
determine the degree to which an individual perceives innovation as being better than a previous
technology (Jawahar, & Harindran, 2013). Bandura (1986) proposed the Social Cognitive Theory
(SCT) to determine the consequences of personal behaviors’ to be measured by the individual
expectancy, effort expectancy, social influence, and facilitating conditions. The first three
constructs directly influence the users’ behavioral intentions, while this behavioral intention
combined with the facilitating conditions directly influence the user’s behavior of adopting the
mobile digital wallet (Adeyeye, 2015; Venkatesh, Thong & Xu, 2016; Venkatesh et al., 2003).
As applied to this phenomenology study, it is an expectation that UTAUT constructs with the
key moderators -- gender, age, experience, and voluntariness of use -- will help to explore the
perceptions and experiences of mobile digital wallet users effectively regarding their data
security (Taiwo & Downe, 2013; Venkatesh et al., 2003, Venkatesh, Thong & Xu, 2016).
Definition of Terms
including financial data with access to information as at when needed (Rose, 2012; Shin & Lee,
2014).
Mobile network operators: Service providers that connect payment devices to payment
access of a bank through a merchants authentication and authorization platform (Hamdi, 2011).
Mobile Payment: The use of mobile devices in making payment for services and goods
utilizing different payments including credit cards, micropayments and digital coins (Isaac &
Mobile Payment Application: A pre-installed software on NFC enabled devices that will
allow users to link credit cards with the mobile devices for payment (Rose, 2012).
Merchants: Stores that receive any form of payment for goods and services (Harper,
2014).
which individuals believe that technology can improve the outcome of their job
Motivational Model (MM): The perception that a user will like to performed an activity
for being perceived as yield a valuable outcome (Venkatesh, Morris, Davis, & Davis, 2003).
Near Field Communication (NFC): A wireless technology that allows responsive and
smartness exchange of small data with another similar technology within a short range of
Point Of Sale: An interface technology that initiates a payment transaction for the
his ability to carry out a task (Jahangir & Begun, 2008; May, 2013).
Technology Acceptance Model (TAM): A theory to explain how an individual accepts the
and negative behavior towards acceptance of technology (Venkatesh, Morris, Davis, &
Davis,2003).
developed to assess the possibility of successful adoption of new technology and the underlying
Assumptions are the necessary beliefs required to conduct a specific research even when
they are not yet validated (Simon & Goes, 2013). In this phenomenology study, the data will be
and documents. It is an expectation to get the rich, thick description data that can provide
accurate interpretation (Corbin & Strauss, 2015; Merriem & Tisdell, 2015). Another assumption
is that interpretation of reality from the interview can produce a substantive result as a
foundation for future research (May, 2013; Merriem & Tisdell, 2015). This prescribed study
the participants would trust declarations of anonymity to provide honest responses to the
questions. Furthermore, there is an assumption that participants will honestly respond to the
The scope defines the boundaries of research, and it also specifies the operating
parameters of the studies (Simon & Goes, 2013). For the scope of this study, the researcher will
identify participants’ cybersecurity experience of using mobile payment. Thus, the scope of this
study stated the boundary with demarcation however with some obvious limitations that can
threaten the conduct of the study (Kothari, 2004). Limitations are considered as potential
weaknesses in the designs and methodology that can influence the outcome of research (Simon
& Goes, 2013). Given the above, the delimitations are the controls which the researchers can use
to guide against changes in the coverage of the study and limit the boundaries of research (Simon
& Goes, 2013). Researchers can use delimitations to control the limitations introduced during the
study.
Scope
The scope defines the boundaries of research, and it also specifies the operating
parameters of the studies (Simon & Goes, 2013). Thus, the scope of this study will be to identify
the cybersecurity experiences of users who have adopted and made transaction payments using
the mobile digital wallet. Participants are expected to have installed and enrolled in the mobile
digital payment and made transactions payment using the digital wallet. The objective of this
study is to interview only the mobile digital wallet users who satisfy the above criteria in the
Limitations
Limitations are considered as the constraints that are out of the researchers controls and
could influnce the outcome of the study (Simon and Goes, 2013). Though, in this qualitative
phenomenology study, the researcher cannot be certain of the adequacy of sample size as this is a
potential weakness as confirmed by Creswell (2012) because of the small number of participants,
this may not represent the real population. Generalizability is another limitation in this
qualitative study because of the variables in the environmental data settings including the
targeted population located in Toronto, Canada. Participant interviews can also introduce
limitations because the anonymity protection can make the responses repudiated without
validation. In addition to the above limitations, refusal to participate in the interview by the
potential participants selected after passing the qualifying test can affect the outcome of the study
Delimitations
The delimitations are the attributes that manifested from the limitations in the boundary
of a study characterized by the omission or addition made when the researchers are developing
the study plan (Simon and Goes, 2013). To control the limitation of anonymity and
confidentiality, the researcher will utilize a third-party Amazon mechanical Turk to recruit
participants and conduct the online interview for anonymity of response. Additionally, the
informed consent will inform the potential participants about their confidentiality and anonymity
protections. The researcher will utilize only the participants with experiences of the mobile
To address the delimitation that may be introduced by the weakness of the sample size,
the researcher will follow the theoretical saturation during the data-gathering phase (Creswell &
Poth, 2017; Creswell, 2012). For guidance, Creswell (2014) suggested an approximate sample
size between three and ten for the phenomenology study (p.239). However, for this prescribed
generalizability is not always guaranteed in a qualitative study; the rich, detailed description will
help in transferring the result of the study to another setting outside the targeted population
Summary
This chapter presented the general problem of the mobile digital wallet receiving a slow
adoption rate (Zhou, 2015) due to the individual’s perceived usefulness and or insecurity (Yang,
Liu, Li & Yu, 2015). The general problem lead to the specific problem of limited studies on how
the experienced users perceived the security capability of mobile digital wallet after adoption.
This chapter also presented the research question to understand the consumers’ cybersecurity
experience of the mobile digital wallet. The introductory chapter also established the purpose
statement of this study. To understand the users’ cybersecurity experience, the chapter
introduced the qualitative phenomenology with text-based online interviews for data collection
utilizing Skype. The chapter described the UTAUT as a conceptual framework to understand the
users’ experience.
Chapter 2 will present detailed literature review relevant to this study. The literature
review chapter will highlight the genesis of the problem statement from previous research. The
research literature will explore multiple sources for both forward and backward searches.
Furthermore, the historical review to understand the contributing factors and current findings
will be discussed. The chapter will also present the research methods and design that will be
used in this study. The chapter will also discuss population, sampling and data collection
The research focused on the general topic of consumer preference, with a focus on the
mobile digital wallet. Furthermore, the research addressed the specific problem of not knowing
the consumers’ lived experiences and perception towards the adoption of a mobile digital wallet.
This chapter discusses the theories in the literature on the digital wallet that represent the
foundation for this study. In addition, this literature review examines the gaps existing in the
previous studies of identifying the consumers’ perception of the mobile digital wallet.
Furthermore, this literature review discusses the need to bridge the identified gaps and
The literature study started with the search for the general topics and continued down to
the specific problem statement. The objective was to identify and describe the experience of
consumers during and after the adoption of a mobile digital wallet. Appendix B summarizes the
The described study will use the Amazon Mechanical Turk (MTurk) to recruit the
participants for the online survey, taken from the population of mobile digital wallet users in
Toronto, Canada. The literature review also examines the populations in previous studies on the
questions about the users’ experiences or perceptions during the use of the mobile digital wallet
as a payment method.
The research literature for this study started with germane literature from multiple
databases, including the Association for Computing Machinery (ACM) digital library, IEEE
Computer Society, ProQuest dissertation database from the Virtual library of Capitol Technology
University, Google™ Scholar, and ProQuest dissertations & Theses (PQDT) Open. Further
journals. The resources were queried with relevant search terms and phrases, including
mobile wallet, digital wallet security, mobile payment, mobile wallet security, consumers’
These studies did not directly address the same purpose; however, they are relevant to the
current study. Advanced search modes were also used to search by keyword, author, date, and
title to streamline the queries towards specification (Levy & Ellis, 2006). In addition, backward
searches were used to review references stated in the articles that had originated from previous
search queries. Similarly, the forward searches helped to identify more articles that contain
references to the articles originated from the keyword search (Levy & Ellis, 2006). Furthermore,
the literature research in this study was not based on the chronology of studies; rather, it was
based on the concept of effective and high-quality reviews (Webster & Watson, 2002).
Historical Overview
The literature review for this review included the factors contributing to consumers’
attitudes towards the adoption of mobile payment (Aydin & Burnaz, 2016), while the purpose of
the current review was to understand the cybersecurity perception of the end users of mobile
digital wallets. The review covers key topics that are relevant to the consumers’ perception of the
The literature review started with the focus on mobile payment methods and later
developed progressively to the mobile digital wallet. The concept of mobile payment is a
growing method of payment that makes use of mobile devices (Fan, Li, Jiang, Xiao, & Yang,
2017; Sherman, 2014; Swilley, 2010), with some valued advantages like convenience and ease of
use (Augsburg & Hedman, 2014; Fan, Li, Jiang, Xiao, & Yang, 2017). The review also examines
the reported research on why the mobile wallet is adopted as an alternative payment method
(Almuairfi, Veeraraghavan, Chilamkurti, & Park, 2014; Rose, 2012; Toma, 2012). The reason
for the adoption is the compromise in card payment (Murdoch & Anderson, 2014; Zojaji, Atani,
& Monadjemi, 2016). Based on the reported benefits of mobile payment, the literature reviewed
was extended to the level of adoption of the mobile payment (Blumenstock, Callen, Ghani, &
Reviewing the factors affecting the adoption of the mobile wallet, the literature review
extended to the topics of the value added by services offered in mobile payment (Augsburg &
Hedman, 2014). The value of compatible and convenient added services in the digital mobile
wallet has a positive impact on the intention to adopt mobile payment methods. Subsequent
searches in the literature on this adoption showed that ease of use and perceived usefulness are
factors influencing the user’s intention to adopt new technology (Augsburg & Hedman, 2014;
In addition to the literature on adoption factors, the user interface also plays a
significant role in the adoption of mobile payment (De, Dey, Mankar, & Mukherjea, 2015).
The adoption rates are influenced by different factors in different geographical locations. Even
though the adoption of mobile devices is widespread across multiple countries, however,
mobile payment has not been adopted at the same rate as mobile devices have (Hampshire,
The review examines various perceptions from the consumer’s standpoint. The
perceived ease of use and usefulness have a significant influence on the user’s trust (Yan &
Yang, 2014), a literature review in the United States and Korea showed users’ perceptions,
including the sensation of security, cost, convenience, and ease of use (Patel, 2016; Shin &
Lee, 2014). Similarly, a reported review by Oliveira, Thomas, Baptista, & Campos (2016)
identified the main determinants to adopt mobile payment in Portugal, Europe, i.e.,
influence. Several studies have identified the perceived security risk, ease of use, and privacy
as common barriers towards the users’ adoption of mobile payment (Aydin & Burnaz, 2016;
Harris, Brookshire, & Chin, 2016; Huh et al., 2017; Rathore, 2016; Sherman, 2014; Yan &
Current Findings
The discussion below provides a detailed review of selected studies with a focus on the
perceived security, ease of use, trust, and privacy in a mobile wallet environment. Aydin and
Burnaz (2016) examined the factors contributing to consumer attitude development towards the
use of mobile payment solutions. The survey method was used to collect data from two different
groups of participants: users and non-users of mobile payment systems (Aydin & Burnaz, 2016).
Findings showed that ease of use and usefulness are more important than security concerns from
the consumers’ perspectives (Aydin & Burnaz, 2016). The authors concluded that there were
significant differences in the constructs used to measure the perceptions between users and non-
In the review by Harris, Brookshire, and Chin (2016), the problem was that no previous
studies had investigated the installation of mobile applications. The purpose of the review as
stated by Harris et al. was to explore the factors influencing consumers of mobile devices before
installing a mobile application. A quantitative method was utilized; an online survey was used to
measure users’ perceptions of downloading mobile applications (Harris et al., 2016). The authors
claimed that significant antecedents of perceived security and familiarity were retained to create
a new research model. The results showed that consumers with perceived security have greater
trust. Harris et al. concluded that the new research model showed that familiarity is more
Rathore (2016) stated in his review that finding a lost physical wallet is extremely hard
and the purpose of the research was to understand the various factors that can affect a user’s
decision to adopt a digital wallet. Rathore used a quantitative method to conduct the research;
online structured questionnaires were sent to the participants for data collection. Results of the
review showed that the major concerns to the users are security and safety of their funds
(Rathore, 2016). The author concluded with the claim that users are adopting digital wallets at an
In the review by Huh et al. (2017), the authors claimed there are problems of security
concerns and misconceptions about tap-and-pay solutions. The purpose of their review was to
investigate why people use or do not use mobile tap-and-pay (Huh et al., 2017). In-person
interviews using developed questionnaires and online surveys using Amazon MTurk were used
to conduct the quantitative research (Huh et al., 2017). The authors claimed that usability is the
top reason for using tap-and-pay among the users, while the top reason for non-users is the
security misconception that storing credit card information on the mobile device is less secure
than the physical wallet. Finally, Huh et al. concluded that the people who are more
knowledgeable about the security protections in the tap-and-pay solutions are more likely to
Research methods are the methods the researchers propose for their studies to collect,
analyse and interpret their data (Creswell,2014). However, before the collection of research data,
the researcher could adopt a reasecrh design to direct a study. Research designs are approaches
In the studies by Aydin and Burnaz, (2016), Harris et al. (2016), Rathore (2016), and Huh
et al. (2017), different research methods and designs were explored to address the objectives of
individual studies. Aydin and Burnaz (2016) examined the factors influencing the payment
consumers towards the adoption of the mobile wallet. Aydin and Burnaz (2016) also utilized
non- experimental descriptive designs to address the research problem of mobile payment
adoption, and the authors developed hypotheses to test the relationship between various
constructs. Similarly, in the review by Huh et al. (2017), the non-experimental descriptive design
was utilized to address the lack of strategies for improving adoption rates of mobile payment
solutions. Huh et al. (2017) developed questionnaires and hypotheses to address the research
problem.
While Aydin and Burnaz (2016) and Huh et al. (2017) focused on the adoption of the
mobile wallet, the review by Harris, Brookshire, and Chin (2016) tried to investigate factors
influencing mobile device users to install mobile applications. Harris et al. (2016) utilized a
quantitative method of a trust-based decision model with the introduction of extra constructs and
developed hypotheses to understand the factors affecting the decision of mobile device users to
install mobile applications. In the review by Rathore (2016), the quantitative methodology was
used to understand various factors that affect payment customers in the adoption of mobile wallet
technology. Rathore (2016) utilized a structured questionnaire to collect data, whereas in the
studies by Aydin and Burnaz (2016), Huh et al. (2016), and Harris et al. (2017) hypotheses were
Aydin and Burnaz (2016) claimed that the targeted population of their studies were
Turkey. The targeted population was the users of a particular network service provider; however,
the selection of the network service provider was based on convenience without any clear details
of selection criteria, which can lead the reader to have little faith in the selection method.
Furthermore, Aydin and Burnaz (2016) claimed the users’ database was contacted to get
participants; however, no clear details of maintaining and following ethical standards were
mentioned.
Similarly, in the review by Harris et al. (2016), the targeted population was not diverse as
it focused only on the students in a southeastern public university in the United States. Limiting
the population to university students threatens the generalizability of the review, and this
suggests that Harris et al. believed students are the main users of mobile apps, thus the prescribed
study seeks to focus on wider consumer’s and users of mobile payment. The online survey
instrument, according to Harris et al. (2016), was designed specifically for the review; however,
there was no supporting argument for the selection of the online survey. Evans and Mathur
(2005) identified an online survey with weaknesses including a skewed attribute of not
Conversely, in the review by Huh et al. (2017), the use of Amazon MTurk suggested that
participants for in-person interviews and 860 participants for Amazon MTurks (Huh et al., 2017).
However, Huh et al. (2017) did not provide clear details of the characteristics and qualification
of the workers before they were recruited to complete the survey in the Amazon Turk. This
limitation can present little faith in the review; Paolacci, Chandler, and Ipeirotis (2010) did
indeed claim there are concerns about the quality of data collected from participants through
Amazon Turk. Huh et al. (2017) failed to give an account of how the quality of the collected data
Rathore (2016) claimed that 132 respondents completed the questionnaire, but the claim
has a few weaknesses in that the participants’ selection process and the characteristics of the
participants were not mentioned (see Ritchie, Lewis, Nicholls, & Ormston, 2013). Rathore
(2016) claimed the research methodology was quantitative and used analysis of variance
(ANOVA) for statistical analysis. The described statistical technique is explicit, and the tables
and figures are easy to understand. In conclusion, the review’s design is clear, and the research
The studies by Aydin and Burnaz (2016), Harris et al. (2016), Rathore (2016), and Huh et
al. (2017) utilized relatively similar online survey instruments and different statistical techniques
to analyze their respective data. In the studies by Aydin and Burnaz (2016), Harris et al. (2016),
and Rathore (2016), Likert scales were used as the survey instruments to collect data from
participants, with various statistical analyses. Aydin and Burnaz (2016) utilized partial least-
square structure equation modeling (PLS-SEM) to identify non-normality in the data and
subsequently detected kurtosis and skewness. Also, validity and reliability were measured using
composite reliability (CR) and Cronbach’s alpha (CA) (Aydin & Burnaz, 2016). The authors
evaluated the validity with the average variance extracted (AVE) and the result indicated a
discriminant validity of above 0.5, while the internal consistency was even above 0.7.
Similarly, Harris et al. (2016) utilized partial least-square (PLS) to analyze the data, and
CA, composite reliabilities, and the AVE were evaluated. The results ranged from 0.6–0.9.
While the review appears credible, the methods still need to be tested in a more diverse
environment with larger sample size. Conversely, in the review by Rathore (2016), after the
collection of data using the Likert scale, ANOVA was used to identify significant differences
between the age group and the mode of payment and also to evaluate the occupation and mode of
payment. The analysis showed there was no significant difference between age and mode of
payment; however, there was a significant difference between occupation and mode of payment
(Rathore, 2016). The consistency in collected data was not guaranteed, as the author did not
On the other hand, Huh et al. (2017) collected data via an in-person interview of 36
participants and 860 participants through Amazon MTurks. Chi-square was used to calculate the
usage proportion between Apple Pay and Android Pay, and the results indicated 36% of the
participants were Apple Pay users while 21% were Android Pay users (Huh et al., 2017).
Furthermore, the Mann–Whitney U test was used to test the statistical confidence of the reasons
for using, not suing, and stopping using the Apple or Android Pay (Huh et al., 2017). Also,
Pearson’s correlation was used to analyze the correlation between the participants’ understanding
of security and the adoption rate of the mobile tap-and-pay (Huh et al., 2017). The results
showed that security is the most important concern for not using the mobile wallet among the
users while security misconception is the most concern for non-users (Huh et al., (2017).
Generalizability
The generalizability of the review by Hu et al. (2017) is fairly possible as the surveys
were conducted by targeting a general audience through Amazon Turks (Huh et al., 2017). In
addition, a recent review by Paolacci, Chandler, and Ipeirotis (2010) confirmed that Amazon
Turk solves some concerns such as subject anonymity. However, Huh et al. failed to give an
account of some other concerns in MTurk, such as the quality of data that the respondents
provided and how the data were controlled (see Paolacci, Chandler, & Ipeirotis, 2010).
Conversely, in the review by Aydin and Burnaz (2016), generalizability was not guaranteed as
the users of the selected mobile network operator in Turkey completed the surveys. However, the
stratified random sample can be generalized to the selected population of 54,000 subscribers of a
telecom operator.
Harris et al. (2016) demonstrated a good sample size of 128 participants. The review
appears credible, though the methods need to be tested in a more diverse environment with larger
sample size. Moreover, a larger sample would have been better for data analysis to strengthen the
insignificant relationships among the constructs to become significant. Similarly, in the review
by Rathore (2016), the power of the review needs to be increased by obtaining a larger sample
size for internal validity. Also re-testing of the method is encouraged in a variety of settings.
Additionally, Rathore (2016) claimed that surveys were sent out to the 132 recipients; however,
no targeted population was mentioned, and perhaps the surveys were returned based on
volunteering. Not mentioning a targeted population suggests a convenient sampling method was
used, which can introduce bias and thus threatens generalizability of the review (see Marshall,
1996).
A data protocol analysis in the review by Aydin and Burnaz (2016) involved a careful
screening of surveys of low quality among the 1305 questionnaires collected (Aydin & Burnaz,
2016). A path analysis was conducted after the statistics had been examined (Aydin & Burnaz,
2016). The authors evaluated and achieved the convergent validity of the model using AVE. The
authors demonstrated the validity analysis for the construct and discriminated between the
samples from both users and non-users of mobile wallets. The results were clearly presented in
similar tables, showing the hypotheses and path analyses for the two groups (users and non-
users).
Furthermore, a statistical pair test was used to explore the dissimilarities between the two
groups, users, and non-users. The results, clearly reported in the table, revealed that there was a
significant difference (P < 0.005), as supported by Crewell (2014). Aydin and Burnaz (2016)
demonstrated that the chosen design was appropriate to address the mobile wallet adoption
problem. In the same manner as the data protocol analysis by Aydin and Burnaz (2016), Harris
et al. (2016) used partial least-square analysis to review the surveys collected on the ten
constructs in the review. The surveys measured the perceptions of users before installing mobile
applications. The hypothesized relationship and their significance were tested, and variability of
0.504 was found (Harris et al., 2016). Therefore, the authors developed a reduced model that
included only the relationship that was of statistical significance: antecedents of trust and
perceived risk.
Subsequently, the familiarity construct in the statistical data analysis revealed a P-value
of 0.001, while the control group showed a P-value of 0.05 (Harris et al., 2016). These results
show that familiarity with a specific application could influence users to install an application
more often than the control group. The results, shown in a table, clearly indicated that CA ranged
from 0.674 to 0.950, composite liabilities ranged from 0.269 to 0.950, and the AVE ranged from
0.651 to 0.842. Hence, the results showed correlations in the measurement of constructs.
In comparison to Harris et al. (2016), who found high values of variability in the early
analysis, Rathore (2016) utilized ANOVA for data analysis. In the early stages of their analysis,
they found statistically significant results. Rathore (2016) claimed there was no significant
difference between the various age groups and the modes of payment, including debit cards,
credit cards, online payment, and digital wallets. The results of the ANOVA, clearly presented in
a table, revealed a P-value of 0.059. Rathore (2016) also conducted an analysis of online
payment by subjects with various occupations, and the results, clearly presented in a table,
revealed a P-value of 0.05. The data analyses have been consistent with the variables used in the
review, and there was evidence of statistically significant differences between the dependent and
independent variables.
Finally, in the review by Huh et al. (2017), the data were collected using two different
instruments: in-person interviews and Amazon MTurks. Huh et al. (2017) conducted a thematic
analysis (codes) on the collected data from the interviews, which were conducted by two
separate researchers, and there were 78 unique codes. Huh et al. (2016) identified 28 common
codes, from which the results showed 25 out of 36 participants understood the authentication
while seven understood the protection of the card (Hu et al., 2017). To address the
generalizability of the review, Huh et al. (2017) utilized Amazon Turk to repeat the data
Huh et al. (2017) tested the relationship in user perception between the following
changes in variables: less secure and slower, less private and slower, more private and faster,
and less convenient and more convenient, and the results showed the P-values of various
correlations were less than 0.05 (Huh et al. 2017). The significance test of these variables thus
demonstrated
that there was a consistent pattern in the observation rather than chance (Creswell, 2014).
Furthermore, the research hypotheses were testable, the accuracy was reflected in the result, and,
Alternative Viewpoints
Aydin and Burnaz (2016) outlined the logical steps, and the process of data collection
and analysis was presented in tables. Despite a few flaws in the review, Aydin and Burnaz
users. Similarly, Harris et al. (2016) demonstrated the appropriateness of the chosen quantitative
method and design, to understand the factors that influence a consumer before installing a
mobile application. The research model was created, and the significant antecedents were tested
quantitative design used to review the various factors that affect mobile device to adopt a digital
wallet. The review evidently contributed significantly to the payment ecosystem’s body of
knowledge. Huh et al. (2016) conducted a statistical analysis, the results of which were clearly
presented. Questions were worded as full statements; the readability was accurate and easy to
understand. Evidently, the review contributed to the understanding of security concerns and
Despite the large sample size and the random sampling, Aydin and Burnaz (2016)
confirmed one of the basic limitations in their review was that the research was conducted in
only one country. The authors’ statements supported previoius observations in the review
section. The selection of a single network operator was another limitation of the review, and it
was recommended to conduct similar research using various network operators in different
countries. Equally recommended in the review by Harris et al. (2016) is the larger sample size to
investigate the insignificant relationships among the constructs and to ensure diversity in the
review.
desensitization, can introduce weak items in the coeffients for factor models known as loadings.
However, a slight adjustment to the reliability measures is recommended. Harris et al. suggested
that privacy and security antecedents should be divided and investigated separately in future
research. Rathore (2016) recommended in his review that awareness through marketing and
promotion should be encouraged to inform and educate the non-users and consumers of mobile
wallets better about the benefits of simplifying their purchases. However, Rathore recommended
no future work about his review. Similarly, in the review by Huh et al. (2017), it was
recommended that increased awareness of security protection and convenience of payment being
offered by the tap-and-pay systems could improve the adoption rates of the new technology.Thus
Huh et al. (2017) recommended that future research should review how the awareness and
education of non-users about the security protection of tap-and-pay methods will affect their
As stated above, the recommendation requires further examination, and the knowledge
gap identified on the awareness of security mechanisms for mobile wallets deserves further
investigation. In addition, the review noted that initial adoption of mobile payment had received
much attention from researchers, with limited research on the continued use of such technology
(Chen & Li, 2017). The limitation of not investigating the motives for continued use presents
another gap, since users may develop fear and discontinue the use of the application.
The adoption of mobile payment methods is largely based on previous experiences or on
what other users say about the payment method (Harper, 2014). It is possible that some users do
not understand what security and convenience the payment method could offer when compared
to old payment methods. However, the users’ apprehension and perceived risk of data leakage or
theft could be determined through research (Harper, 2014). Furthermore, some researchers have
investigated the security in mobile devices and applications from technological perspectives;
however, the behavioral research that focused on such security perspectives is very limited (Tu,
Yuan, & Archer, 2014). Thus, it is of importance to investigate the perception of mobile wallet
For the current review, the research questions called for the selection of a unified theory
of acceptance and use of technology (UTAUT) model. The UTAUT framework helps
researchers to identify the factors affecting the adoption of a mobile wallet within the context of
trust and risk constructs (Venkatesh et al., 2003). Chapter three, on methodology, elaborates
more on the model and its applicability in the development of questionnaires. Thus, before
Mobile payment is a fast transaction that occurs between users’ mobile devices and the
merchant’s point of sales devices through contactless technology (Gannamaneni, Ondrus, &
Lyytinen, 2015; Sung, Youn, Kong, & Ryou, 2015). According to Sung et al. (2015), mobile
devices enable people to digitalize their lives. Thus it is of importance to identify the mobile
device as a key stakeholder in mobile payment technology (Dahlberg, Guo, & Ondrus, 2015).
Mobile payment has been largely developed based on four types of technology: short
message services (SMS), wireless application protocol (WAP), near-field communication (NFC),
and quick response (QR). The SMS-based payment is a method that allows the user to pass a
transaction bill to the mobile service provider via SMS (Ozcan & Santos, 2015). The SMS-based
transaction does not require user registration and as such constitutes an acceptable technology
with users of different devices, including Apple- and Android-based mobile devices (Shen &
Yazdanifard, 2015). The SMS-based mobile payment is commonly acceptable. However, the
method can still open the customers to vulnerability for identity theft, and complex customer
mobile devices, which allows the devices to communicate with merchants’ NFC-enabled reader
within a wireless short range (Chen & Li, 2017). It is important to mention that NFC payment
relies mostly on the mobile network operators. However, NFC credit cards seamlessly work
without internet connectivity, which is similar to the Apple pay or Android payment method
(Huang, 2017).
In the case of QR-based payment, the technology allows the merchant to auto-fill
necessary billing information, including merchant ID, phone number, and payable amount, that
the customers will otherwise have to fill in manually in order to complete a transaction (De, Dey,
Mankar, & Mukherjea, 2015; Chen & Li, 2017). Mobile device users must install QR code
recognition software. Several payment applications, such as WeChat and Alipay, are embedded
in the QR code programs (Huang, 2017). The user can use the mobile device camera to scan the
QR code displayed by the merchants, and the users manually type the amount to be paid to
mobile browser or specialized apps (Chen & Li, 2017). The former requires the customer to
submit payment details through the mobile browser on the device, while the latter allows the user
to complete the transaction via the mobile payment application installed on their devices. In the
specialized WAP-type app, the users are required to download and install the mobile payment
Teague, 2017).
To make a payment using the WAP technology, users are required to link their bank
account with the app, and if the card issuer has approved the card, the user will be able to make a
payment through a transaction using the app on the device (Akinyokun & Teague, 2017). The
mainly adopted mobile payment applications, including Android pay, Samsung pay, and Apple
pay, are NFC-enabled and are also known as mobile wallets (Ondrus, 2015). The mobile wallets
emulate the contactless payment card functionalities, where the NFC chip is embedded within
Mobile Wallet
The mobile payment application shows a transaction environment with a user interface
that requires little intervention from the users. In other words, it provides the users with great
convenience and freedom from temporal constraints. However, risks associated with different
players in the technology are numerous, such as information hijacking in the mobile network,
and virus and Trojan horse infections in the devices remain concerns to the users (Chandra et al.,
2010). According to Stiakakis, Georgiadis, & Andronoudi, (2016), proper anti-virus software
may be reliable to prevent and/or remove viruses and Trojan horses in the mobile device;
however, the design challenges of the small-sized devices can impede the effectiveness of anti-
(OEMs) have invested considerably on the alternative measure to mitigate the emerging security
issues in the device architecture and solutions (Rhee, Won, Jang, Chae, & Park, 2013; Stiakakis
et al., 2016; Zhou, 2014). The device manufacturers, such as Apple (Heggestuen, 2015) and
Samsung (Choi & Lee, 2016), incorporated some capabilities and features including security and
applications that deliver the digital wallet and mobile payment promises. To understand the
security in the mobile payment system, it is important to analyze the security architecture of
mobile devices and to consider the advancement from simple communication functions to more
According to Sung et al. (2015), the user authentication mechanism in the mobile device
seeks to address the security risk, including the case a device is stolen. If the device falls into the
wrong hands, criminals can gain access to the data stored on the device and subsequently carry
out software attacks, physical attacks, or even both (Trewin, Swart, Koved, & Singh, 2016). The
success of most mobile payment methods includes the security functionalities that address the
consumers’ security concerns; therefore, securing the device is the first step in facilitating
payment through the three main security areas: operating systems, secure elements, and a trusted
Operating System
Every mobile device requires operating systems to run its services and application
programs, making the OS the soul of mobile devices (Li, Wang, Wu, Jiang, & Liu, 2012). The
operating systems combine the features of personal computer and other features, including NFC
(Okediran, Arulogun, Ganiyu, & Oyeleye, 2014). The current platforms of mobile operating
systems are Apple’s iOS, Google Android Microsoft Windows, BlackBerry OS, Symbian OS,
and FireFox OS (La Polla, Martinelli, & Sgandurra, 2013; Krishna, & Devarakonda, 2015;
Okediran, Arulogun, Ganiyu, & Oyeleye, 2014). However, they all possess architecture
commonalities, which include user experiences, security design, power management, and design
The security mechanism in the OS and the application environment is considered very
low due to the direct accessibility to memory, which serves as an attack vector to steal sensitive
information on the device (Zhang, Bai, Hao, & Zhang, 2017). Every OS has its architecture;
however, most of them have Linux as the base kernel working at an abstraction layer to separate
the hardware from the rest of the software stack (Krishna & Devarakonda, 2015). In addition to
the Linux kernel base OS, application programming interfaces (APIs) are mostly written in the C
programming language, and applications are written in Java, but also run in the Dalvik virtual
machine (DVM), which brings some security features to the device (Okediran, Arulogun,
Secure element
The introduction of NFC, by Nokia in 2004, which seeks to allow centralized storage of
payment applications, loyalty, and other access rights, caused a security concern (Reveilhac &
Pasquet, 2009). The secure element (SE) architecture was introduced, upon which NFC
ecosystems could be implemented (Ondrus, 2015; Reveilhac & Pasquet, 2009). The SE is made
secure users’ sensitive information and applications (Reveilhac & Pasquet, 2009).
The SE contains the basic operating systems, the CPU, the memory, and functions like
the chip on the smart card that is embedded in the device (Akinyokun & Teague, 2017).
Conversely, the Universal Integrated Circuit Card (UICC) is a removable card inserted in mobile
devices to store multiple data and executable applications securely (Madlmayr, Langer, Kantner,
& Scharinger, 2008; Reveilhac & Pasquet, 2009). For security reasons, mobile device
manufacturers can embed the SE and only grant permission to third parties to host their
Another secure area is the main processor of a mobile device, which allows for
the secure operations of applications without affecting other external applications from running
(Seibel, LaFlamme, Koschara, Schumak, & Debate, 2017). Furthermore, TEE ensures the
security of stored sensitive data and also processes and protects the data in an isolated and trusted
environment (Rolfe, 2015). Also, it allows the execution of authorized trusted applications to be
run in isolation without security compromises with other trusted applications. The TEE runs on
higher resources, such as the processor, and the memory capacity compares to the SE (Rolfe,
2015). Security resources and services including storage and trusted user interface (TUI) are
However, consumers could encounter some hindrances when installing mobile wallet
applications in the SE. Some device manufacturers may not support SEs built on microSDs that
are issued by banks (Unsworth, 2012). Also, a mobile device manufacturer can have the SE
embedded in their device, which contains a UICC provided by the mobile network operator
(Unsworth, 2012). Conversely, device manufacturers, such as Apple and Samsung, are the
service providers for their respective mobile wallet applications, which are preinstalled on the
SE, embedded in the device. Some other mobile wallet application, such as Google Pay, which is
not a mobile phone manufacturer, developed a host card emulation (HCE), which allows the
NFC transaction to be re-directed to the mobile application instead of the SE (Pannifer, Clark, &
Birch, 2014). According to Alliance (2014), HCE enables card issuers to deliver a secure NFC
Tokenization
Tokenization secures the transfer of data to and from the HCE, TEE, normal operating
systems, and through the entire transaction process (Penttilä, Siira, & Tihinen, 2016).
Tokenization is a secure technology that substitutes the payment cards’ sensitive authentication
data, including expiry date, the CVV, and PAN, with arbitrary alternative numbers (Akinyokun
& Teague, 2017; Alliance, 2015; Choi & Lee, 2016; Ortiz-Yepes, 2014). Payment industry
participants can create their token services based on the EMVCo standard to reinforce security at
every point of the payment transaction (Alliance, 2015). The EMV offers a framework for the
payment tokenization to ensure the Token Service Providers (TSPs) follow the security and
uniform interoperability compliance format in token generation (Akinyokun & Teague, 2017).
How it works
Firstly, users must link their bankcards to the mobile application “wallet” during
enrollment (Huang, 2017). To make a transaction, the user will need to verify his/her identities
using the Touch ID in the case of Apple Pay, while FIDO biometric is used in Samsung Pay for
security technology (Huang, 2017). Kreyer, Pousttchi and Turowski's review 2007 (as cited in
Shen and Yazdanifard 2015) found that risk of authorization; authentication and confidentiality
are among the main concerns for consumers. In the quest for more alternative solutions to
address the users’ concerns, the mobile transaction requires strong authentication techniques to
When a user authorizes the payment, the wallet sends the card payment information to
the merchant in the form of a one-use encrypted transaction ID, also known as a token (Stokes,
2014). The merchant’s payment device will decrypt the token in order to get the private key of
the payment card and later forward the private key to the payment provider for validation. The
merchant system sends the transaction alerts to the acquirer, after which the same information is
sent to the card issuer and finally to the issuing bank (Akinyokun & Teague, 2017). According to
Stokes (2014), the security in the transaction depends on how well the token is protected and
stored. The order confirmation is sent to the user’s device to complete and validate the
transaction (Huang, 2017). The below figure 2 represents the transaction steps.
g
e
t
s
m
o
b
i
l
e
d
e
v
i
c
e
i
n
c
l
o
s m c
e e a
w
r r
i
c d
c t
h
o h
a
n n r
t t e
t
a ' a
h
c s d
e
t e
r
Figure 2 Steps for mobile transaction Source: Teju Oyewole. Reprinted with permission
Kakish & Shah (2016) claimed NFC enables mobile wallets, including Apple Pay and
Samsung Pay, to be not easily susceptible to attacks because of the embedded security
mechanism and proximity to the card readers. However, the chain of activity in the mobile
payment transaction process is still prone to threats associated with those activities (Jesen,
Gouda, & Qiu, 2016). Refer to table 1 for common security issues in mobile payment; the attack
surface and their relevant countermeasures. The identified security issues in the figure 3 below
can materialize and inhibit the security of the payment process. Thus it is important to mention
Table 1
merchant device during the transaction (Jesen, Gouda, & Qiu, 2016;
2016).
User’s Criminal can access the The assumption that users will
stolen or &
of device
loss.
Summary
The mobile wallet is a new payment technology that is heading towards a promising
future in the payment ecosystem; however, it encounters challenges for some reasons, including
security and privacy issues (Bezovski, 2016). This literature review analyzed the general studies
of mobile wallets from the consumers’ perspectives and also the rational for the acceptance and
adoption of the mobile wallet. The in-depth reviews of the relevant literature reveal the gap in
previous studies to examine the security mechanism from the consumers’ perception.
The germane literature was selected from various databases as to why the mobile wallet
Chilamkurti, & Park, 2014; Rose, 2012). Adoption factors were examined, and different factors
are typical for different countries (Shin & Lee, 2014), which evidently shows that security,
privacy, and ease of use are the common factors (Yan & Yang, 2014; Zhong, Dhir, Nieminen,
Hämäläinen, & Laine, 2013). Huh et al. (2017) investigated the consumers’ understanding of the
authentication mechanism in mobile wallets; however, mobile wallet security goes beyond
authentication. In order to address the research question related to the users’ understanding of the
security mechanism in the mobile wallet, the process of adoption will be examined through the
embedded both in the mobile devices and in mobile applications. Moreover, the potential threats
and countermeasures, which make many users consider the payment method as unsecure, were
reviewed. The next chapter will analyze the research methodology and the appropriateness of the
adopted method, the research population, reliability, validity of the research design and
generalizability. Chapter 3 will present the research methodology for this study.
CHAPTER 3: RESEARCH METHODS
cybersecurity experiences of mobile digital wallet consumers. The method seeks to gain the
consumers’ experience of using mobile digital wallets through the consumers themselves as a
source of data (Merriem & Tisdell, 2015). In order to collect the consumers’ data and generate
meaning, the phenomenological approach will help to build an essence from participants’
experience with the goal of constructing a rich description of a common phenomenon in mobile
digital wallet security capability (Creswell, 2013; Merriem & Tisdell, 2015).
A thorough review of the literature on the adoption of mobile digital wallets revealed a
gap in the areas of location and cybersecurity experience; therefore, this review will contribute to
the existing literature of users’ perception and preferences about mobile digital wallets (Shin,
Lee, & Odom, 2014). In addition, the review can provide information that could be useful to
consumers, mobile service providers, mobile payment vendors, and device manufacturers. This
chapter will discuss the research methods and design approriateness in more detail as to why the
phenomenological study is adopted. Futhermore, the population of the study, the sampling
method, and the collection of data will be discussed in more detail. The internal and external
ideas to adopt a qualitative, quantitative, or mixed methodology and guide their actions towards
the conduct of research (Creswell, 2014). The commonly used worldviews are post-positivism,
issues, such as injustice and racism (Creswell, 2014). The transformative worldview is applicable
ethnographic, and case review (Creswell, 2013; Salkind, 2012). Pragmatic worldviews hold the
beliefs in both qualitative and quantitative approaches (Creswell, 2012). The researchers with
pragmatic worldviews inquire data from participants by utilizing convergent, exploratory, and
world within which individuals live (Creswell, 2013). Constructivism is mostly an approach to
qualitative methodology to address the complexity of study from various views of consumers
and understand their cybersecurity experiences regarding the mobile wallet (Salkind, 2012;
Schein, 2014). There are various qualitative designs, including historical qualitative research for
understanding the meaning of events experienced by people (Merriem & Tisdell, 2015, pp. 23–
40). The historical qualitative is applicable to the development of an understanding how daily
activity is shared with other people chronologically, while ethnography strives to understand the
cultures and challenges in a specific environment by putting the researchers in the same
The case review, however, is used to gain an understanding of a boundary, for example a
person or an event. In case studies, the researchers describe the individuals and the settings under
review (Merriem & Tisdell, 2015). The grounded theory seeks to build a theory from processes
and actions to identify how things are changing over a period of time (Corbin & Strauss, 2015;
Merriem & Tisdell, 2015). The major commonality of all these designs is their focus on
generating meanings and understandings from data collections (Merriem & Tisdell, 2015).
seeks to understand knowledge of people and their lived experiences, events and phenomena
(Merriem & Tisdell, 2015; Creswell, 2012). The qualitative phenomenological is an appropriate
design to address consumers’ cybersecurity experience of mobile digital wallets due to the
possibility of developing a theory (Merriam & Tisdell, 2015). A number of studies explored the
phenomenology design to understand the meaning people give to their lived experiences (Glaser,
1978, 1992, 1998, 2001, 2011). The phenomenological approach helps researchers to obtain
deeper information and better perception through the interviews with and observations of the
experienced by people with the goal to compare the experience from different people and to
analyze the security essence of common phenomena (Creswell, 2012; Winterhalder, 2017).
with the goal to compare the experience from different people and to analyze the security
essence of common phenomena involved in mobile digital wallets (Creswell, 2012). Creswell
(2013) characterized a survey design with the goal of generalizing the attitude and behaviors
from the sample to the entire population. Furthermore, the rapid collection of data and
understanding the common denomination of a large population from a selected sample are
advantageous.
The prescribed study requires similar survey design characteristics in that the users’
data collection. Considering the data collection method of using synchronous online Skype
technology, a pilot review will be conducted to improve research questions and establish the
content validity (Creswell, 2013). Generalizing the behavior may not be possible without
expressing the setting of the sample selected from the Toronto mobile users’ population; see the
population and sample sections below for further discussion on the sample size. Creswell (2013)
suggested a six-step towards conducting a credible research, thus Appendix A presents a similar
Research Questions
experiences with mobile digital wallets. The literature review in Chapter 2 has indicated a gap in
the study of mobile digital wallets. Hence, the research question is developed to bridge the
literature gap on participants’ cybersecurity experience with mobile digital wallets in Toronto,
Canada. The focus of the current study is to contribute to the bodies of knowledge in the
payment ecosystems, including consumers, mobile service providers, mobile payment vendors,
The main research question is stated as, what is the consumers’ motivation behind the
adoption of a mobile digital wallet? The main research question will guide the study towards
understanding the consumer’s security issues behind mobile digital wallet adoption (Adeyeye,
2015). The main research question will also provide a conceptual basis upon which the
subquestions (Adeyeye, 2015; Cathro, 2015) will be developed. The following closely related
questions will guide the study towards the answer to the main research question (Merriem &
Tisdell, 2015):
1. What are the thoughts of consumer when they know about mobile wallet?
The study will provide and analyze the valuable data to understand the essence of the
researcher to know the characteristics of the population before selecting a sample from the
population (Creswell, 2013). For this study, the specific population is the mobile payment user,
and the selected sample seeks to represent the true proportion within the selected population.
Also, the homogenous sampling method is selected for this study with the common phenomenon
Population
Many groups of people use a mobile digital wallet as an alternative payment method;
however, the target population for this qualitative phenomenological review will be the users of
the mobile digital wallet in Toronto, Canada. According to Srigley (2012), general merchant
stores provide wide arrays of goods and services to the Canadian residents across social
stratifications and geographical locations, including Toronto. For the customers’ convenience,
merchant stores make available different payment methods for products and services (Harper,
2014). The merchant stores, however, participate in various payment methods, not only for the
customers’ convenience but also for the growth of the business (Xinyan, Wei, & Tingjie, 2009).
For the purpose of this phenomenological study, the researcher will focus on the customers with
payment experience using a mobile digital wallet in Toronto, Canada as defined in the standards
considered a world city due to its diverse ethnicity and the destination of choice for over 40% of
Sampling
analysis sample (Creswell, 2013; Merriem & Tisdell, 2015). The two basic sampling methods are
probability and purposeful samplings (Merriem & Tisdell, 2015). However, for the purpose of
this phenomenological study, in which the researcher sought to employ homogenous sampling
methods, a subset of purposeful sampling will be used to select the participants (Patton, 2001).
The homogenous sampling will help in the selection of individuals with similar background and
Amazon Mechanical Turk (Mturk) will be used to recruit the participants for the online
worker in order to take on human intelligence tasks (HITs) for the usual pay of several dollars
(Shank, 2016). For the homogeneity of the sampling, the researcher will recruit the participants
based on the set common criteria and qualification parameters (Manga, 2016). The country of
location of participants is a default option in Mturk; however, the city is included in the
demographic questions.
The participants’ approval rate of HITs will also be considered, and their experience with
the mobile digital wallet will be included in the demographic questions (Manga, 2016;
Silberman, 2015). The demographic questions to be included in the Mturk HITs are age, gender,
education level, type of devices in use, type of application use on the devices, province of
residence, and city of residence (Shank, 2016) (see Appendix D). The quality is a concern for the
purpose of this prescribed study, thus; only the participants who passed the quality control tests
Instrumentation
The researchers make observations and gather measures using instrumentation during the
course of research study (Creswell, 2013). However, the measured data and the source of those
data in this study will be the participants’ experiences. The description of participants’
experiences, such as enrollment and the process of mobile wallet transaction cannot be measured
objectively. In this study, the researcher will use the Skype technology to conduct open-ended,
semi-structure online synchronous interviews with the participants to be selected through the
custom template demographics question, published as HIT on the MTurk (Mason & Suri, 2011;
Creswell, 2013). The instrument will consist of demographic questions including sex, age,
educational level, the province and city of residence, preferred payment methods, and types of
technology relevant to the mobile devices. These demographic questions will be used as a
The second-phase research questions will contain open-ended broad interview questions
with their corresponding subquestions corresponding sub-questions (see Appendix E). Each
response will be recorded using EVAER® adds-on software on Skype and will be securely
stored using disk encryption and password on computer storage for future transcription. After
the online interview, the researcher will review the responses to ensure all the sensitive
information is deleted or excluded during both the Mturk questions and the online interviews.
The Mturk documentation will not need any validation from the participants, as their personally
identifiable information will not be included in the Mturk; however, the interview participants
Data Collection
The data collection procedure is a key component of survey design (Creswell, 2013). The
collection types include telephone, face-to-face interviews, mail, internet, and group
administration (Creswell, 2013). The interview questions are open-ended and semi-structured,
specifically designed to explore the consumers’ lived cybersecurity experiences of mobile digital
wallets (see Appendix E). Data collection through interviews is appropriate for the
(Creswell, 2012). For the current study, the data will be collected through an online synchronous
Skype is a variance of voice over internet protocol (VOIP) which allows users to
communicate synchronously using voice and sound across the internet (De Felice, 2013;
Sullivan, 2012; Lee, 2016). Several studies have used Skype as a tool for data collection due to
different reasons, including cost, distance, and convenience (Iacono, Symonds, & Brown, 2016;
Janghorban, Roudsari, & Taghipour, 2014; Sullivan, 2012). Cater (2011) confirmed face-to-face
interviews presented some constraints, such as time, costs, geographical dispersion, and
mobility; however, Skype technology has reduced the constraints associated with a face-to-face
interview (De Felice, 2013). Using Skype as a data collection tool for the current qualitative
study requires additional add-ons, such as EVAER® software for video recording (Cater, 2011;
Iacono, Symonds, & Brown, 2016). It is important to mention that Skype will offer advantages
for data collection in this study, by providing easy accessibility to research participants compared
participants will be confirmed to be Toronto residents, reaching out to them will be made easy
(Sullivan, 2012; Smith, 2015). Another opportunity to be offered by the synchronous online
Skype interviews is the absence of an obligation to get a specific location for the interview
(Smith, 2015). It also eliminates the need to travel to the interview location, which can be linked
to financial resources. Among the features that made Skype an appropriate tool for data
collection is the ability to chat just like an instant messenger; the feature will thus be used to send
the consent form, interview questions, and other required texts to the participants (De Felice,
2013).
Given the opportunities the Skype technology offers, there are potential ethical issues that
could impact the study, and it is necessary to address them, as required by IRB, before the field
work of data collection (Janghorban, Roudsari, & Taghipour, 2014). The researcher will submit
an IRB application to the Capitol Technology University’s IRB; the application will be reviewed,
and the study will be approved accordingly. The researcher will select the participants based on
the potential of the participants to satisfy the qualifying question known as catch trials, which
included the demographic qualifying questions in the internal HITs (see Appendix D). Amazon
will automatically collect and analyze the Turkers’ data, including the IP addresses, the name,
email address, and physical address. These collected data would, however, be considered
MTurk’s Terms of Service (ToS), and the functionality would not allow requestors (researcher)
to have direct access to the (participants’) Turkers’ personally identifiable information (PII) (Xia,
Wang, Huang, & Shah, 2017). The participants who makes the qualifying tests on Amazon
would be selected for the Skype interview and the researcher would ensure that a standard ethical
procedure is followed by sending the informed consent to address the concern about the nature of
the study, the potential risk and benefits, compensation, statement of consent, and confidentiality
(see Appendix F). In an effort to fulfill the confidentiality principle, the researcher would keep
all interview discussions on Skype with strict confidence and the researcher would also inform
the participants on the possible monitoring of the discussion and thus to avoid illegal discussions
during the interview session (Iacono, Symonds, & Brown, 2016). Researcher would create Skype
accounts with dummy email accounts for the participants without any link to the participants’
attributes, and such accounts would be deleted after the study (Sullivan, 2012).
The researcher will transcribe the collected data on Skype during the interviews and store
them on a computer with strong password protection; the stored data would be accessible to the
participants only upon request (Iacono, Symonds, & Brown, 2016). Further consideration
including the verification of participants’ identities, and this would be addressed by requesting
the participants to show an ID in front of the webcam so that the participants could be seen and
heard talking (Smith & Sparkes, 2013). The participants will be given an option to opt out of the
study anytime they wished; however, participants who chose to continue will require signing and
returning the consent statement form through the Skype chat or text (De Felice, 2013). Also, the
Skype online interview will contain an optional text field for the participants to write their
comments that could be of help in the study. Lastly, the researcher’s contact would be included
in the consent form, for the participants to reach out to the researcher if they so desired.
Validity
Confidence in the conduct of the research will be taken into consideration through
validity and the factors that seek to reduce the confidence level will be mitigated. The factors
including the researcher bias, data analytical errors, and methodological errors have the tendency
to affect the credibility and confidence level of the research (Merriem & Tisdell, 2015). The
nature of a phenomenological study is prone to researchers’ bias, if the study lacks preconception
and bias protection (Merriem & Tisdell, 2015). However, bracketing of the researchers’
preconception using the epoch technique in the data analysis will mitigate the risk to validity.
Some individuals would review the design and methodology adopted for this study, and grant
The reliability and validity will be ensured in this study through the careful analysis of
the interview responses and proper handling of the transcripts. Furthermore, the researcher will
engage the participants to review the transcript to ensure validity. Continued auditing and
observation will be explored during data gathering and record keeping sessions furthermore;
triangulation will be ensured in all the processes of validity and reliability (Bowser, 2015;
Ladendorff, 2014).
The internal validity or credibility will be ensured by using rigor to interpret the
reality of observation and interviews of the participants (Merriem & Tisdell, 2015). External
validity or transferability of this study will be achieved by using a rich, thick description of the
setting of study and interview participants (Merriem & Tisdell, 2015). The rich, thick description
will help in transferring the result of the study to another setting for the purpose of
Data Analysis
Qualitative research depends on text with a unique design to present the data obtained
from the data analysis (Adeyeye, 2015; Cathro, 2015; Karsten, 2013; Corbin & Strauss,
2015; Creswell, 2012; Shaw, 2014). The semi-structured and open-ended interviews help
maintain
consistency in the issues to be addressed during the interviews (Corbin & Strauss, 2015;
Merriem & Tisdell, 2015). Phenomenology seeks to describe the lived experiences of the
participants, which formed the basis to identify the essence of the security phenomenon
experienced (Creswell, 2012). The phenomenological study consists of three processes: the
epoch, the phenomenological reduction and the search for essences (Merriem & Tisdell, 2015;
The first approach to the analysis in this study would be the epoch to identify and set
aside the researcher’s views. The identification of the researcher’s experiences and views would
help in bringing up the awareness of the researcher’s bias during the analysis of different views
and experiences (Merriem & Tisdell, 2015). The epoch approach would prevent the researcher
from participating in the HITs as a Turker and a participant in the study due to the researcher’s
knowledge on the information security. The researcher would document his prior knowledge of
information security and would ensure it did not influence the analysis of the Turkers’ or
reconstruction of analysis gathered from the participants; it would thus redirect the researcher
back to the participants’ lived experiences of mobile digital wallets in order to limit bias
(Merriem & Tisdell, 2015; Van Manen, 2014). The researcher would use this approach to
identify the chunk of meanings and themes (Van Manen, 2014). The responses of the participants
to the research questions will be collated, deconstructed, and coded based on their similarities
and divergent perspectives. Coding is considered an important part of data analysis; however, it
(Van Manen, 2014). The researcher will use the reduction and analysis process to identify the
themes in individuals’ experiences relevant to the experiences in the reconstruction process. The
wallets including the background reasons that could account for their experiences (Creswell,
Finally, the collected data during the reduction process would be reviewed to provide an
understanding of the participants’ experiences and to answer the research questions. The process
of understanding the meaning is termed the search for essence. The search of essence seeks to
review themes developed during the reduction process and results in a meaningful understanding
without researchers’ bias (Giorgi, 2009). The themes to be developed would also be associated
with the raw data to identify any variations. This relationship is the essence to be found, and the
researcher would focus on the gap in the review, which would help to understand the common
themes in the consumers’ experiences of the mobile wallet. The analysis of raw data using this
phenomenology approach would lead the researcher to conclude a research output (Van Manen,
2014).
Summary
data to understand their lived experiences (Merriem & Tisdell, 2015; Creswell, 2012). The
methodology would address the research question, what is the consumers’ motivation behind
the adoption of a mobile digital wallet. In the current study, the data would be collected from a
common criteria and qualifications including demography questions would be used to filter the
right candidates. The data collection process would be conducted using Skype, and the factors
that could undermine validity and generalizability of the research would be observed in the form
of bracketing the researcher’s bias. Furthermore, rigors would be used to interpret the
participants’ responses, and generalizability would be achieved by using rich, thick description to
Data analysis for the current study will follow the three phenomenological processes, as
recognized by Merriem and Tisdell (2015) and Van Manen (2014). The approach will help in
getting the themes and generating conclusive meanings from the raw data. The Results chapter,
Chapter 4, presents the qualitative data including the recruitment and demographic data. Chapter
4 also displays the thematic data developed from the raw data and the search essence to identify
Overview
The investigation of consumers’ experiences with the mobile wallet was conducted
through synchronous interviews with the use of online technologies, including Amazon
Mechanical Turk (MTurk), Skype®, and EVAER®. The literature research in chapter 2 has
identified the gaps in the research of the mobile wallet and the need to investigate the security
perception of the consumers. The researcher considered the phenomenological research method
essence of consumers’ experiences was achieved through the analysis of the data collected from
Pilot Study
After obtaining the approval from the Academic Review Board (ARB) to proceed with
the research field work, the researcher conducted a pilot study to establish the validity and clarity
of the interview questions and to ensure that the interview questions can produce relevant
answers the themes. The pilot study process followed the same structure outlined for the study,
Five pilot participants, who were not part of the participant group, were selected using
Amazon Mechanical Turk (MTurk) and interviewed through Skype® and EVAER®. Pilot
participants were mobile wallet users, and the construct validity was established by describing
the concepts of the study before the interview began. Participants were informed of the purpose
of the pilot study, and they willingly signed the consent form designed for the study before the
commencement of the interview. The researcher spent some time with each participant to build
confidence in order to establish a free and relaxed interaction before the interview.
To achieve quality in the pilot process, the researcher utilized the interview questions of
the study to ensure statements are explicit and easy to understand by the pilot participants. The
researcher also ensured the answers provided by the participants were read to the participants in
detail to check for any possible errors and to validate the interpretation of their responses. The
researcher ensured the participant’s points of view as regards their use of the mobile wallet and
security experience were documented. Responses to the interview questions by each participant
were tabulated. Alphanumeric codes were used instead of pseudonyms, i.e., PilotP#.
The outcomes were categorized as clear and unclear based on whether the pilot
participants had understood the interview questions well, as judged by the researcher using their
corresponding answers. The researcher concluded there were no ambiguities in the interview
questions that required further clarification or modification. However, PilotP#2 requested for
more clarifications on questions 3 and 9, which could be attributed to the researcher’s unclear
ascent, but no modification was made to the question statements. Technology settings, such as
audio and video, were reset to avoid loss of voice and ensure picture clarity during the
subsequent recordings; see Table 2 for a representation of responses and the corresponding
outcomes.
Table 2
Interviews
The interview is the main method of data collection in the phenomenological study
(Merriem & Tisdell, 2015). The research methodology as stated in the overview of design
appropriateness section in chapter 3 was used for data collection and analysis. Thus, before the
interviews with the study participants, the research methodology design for this study required
the researcher to isolate his knowledge of and experiences with the mobile wallet by declaring
his opinion, values, assumptions, and prejudice to avoid bias. The process of isolating such bias
components is known as epoche or bracketing (Creswell, 2012; Merriem & Tisdell, 2015;
Salkind, 2012). In this study, the researcher ensured his experience was bracketed before
Researcher
years have been dedicated to information security practices. The researcher genuinely believes
that the alternative payment method can provide security for the users. Hence, the researcher is
very interested in the investigation of the realization of the adoption of the mobile digital wallet
as a method of payment by the users in Toronto, Canada. The educational background of the
researcher includes a Bachelor of Science (B.Sc.) degree in physics and a Master of Science
(M.Sc.) degree in Information Technology (IT) and Strategic Innovation with management
studies, obtained in Nigeria and the United Kingdom, respectively. The researcher is currently a
The researcher has no prior knowledge of qualitative and quantitative research methods;
he also has no experience in data collection through interviews and data analysis beyond the
skills acquired on the job. The knowledge acquired for this research is gained by doing, reading
the recommended academic resources, and following online training for software analysis,
including NVivo12®. While the researcher observed the epoche process, the phenomenological
reduction was followed to redirect the researcher to the participants’ experiences. In performing
the phenomenological reduction, the researcher combined the meanings into themes and
Participants
The crowdsourcing software Amazon Mechanical Turks (MTurks) was used to recruit the
participants in two stages: Firstly, the demographic surveys with other qualifying criteria were
developed, also known as Human Intelligent Tasks (HITs). Hypertext Markup Language
(HTML) was used to develop the demographic questionnaire in MTurk. In the first project, the
4. What is the highest level of school you have completed or the highest degree you
have received?
5. Which statement best describes your current employment status?
6. Which of the following industries most closely matches the one in which you are
employed?
8. In a typical day, which type of apps do you use on your digital devices (computer,
9. Which payment method do you use most often when making purchases?
10. If you are qualified, would you be interested to participate in a 35–40 minutes follow-up
online Skype interview in exchange for a $15 “bonus” to your Mechanical Turk account?
After the above qualifying survey, the second HIT was created and advertised on
Amazon Mechanical Turk for the interview phase. The qualified participants were contacted
through their MTurk IDs, which are automatically linked to the participant’s survey responses.
The IDs, also known as requestor on Amazon Mechanical Turk, are anonymous to the
researcher. During the creation of the second project, the researcher included instructions for the
participants to call the researcher to agree on a time and create the anonymous Skype account.
synchronous interview. The participants included five pilot participants and 12 study
participants. The interviews were held on a one-by-one basis, and the dummy Skype account was
shared with the participants, with a different password after each interview.
Before the commencement of the online interviews, the researcher gave an introduction
and explained the purpose of the research. The researcher read the informed consent to the
participant and time was given to them for possible question(s) regarding the research. The
researcher confirmed their understanding of the research, and the participants were asked to sign
The study participants were assigned an alphanumeric code, i.e., P#1, P#2…P#12. The
unique identity is a form of a pseudonym to protect participants’ privacy and ensure anonymity.
Participants were also given the opportunity to review their responses after the interview for any
potential misstatement (Creswell, 2015). The ages of the participants ranged from 18 to 54 years;
The other demographics information of the participants included educational level; two
(16.7%) attended some college but held no degree, two (16.7%) held an associate degree, two
(16.7%) were high school graduates, four (33.3 %) held a Bachelor’s degree, and one (8.3%)
held a Master’s degree. Regarding occupation, seven participants (58.3%) were working in IT,
SharePoint manager, digital architect director, and desktop analyst. Three (25%) were students,
Participants’ mobile device types were Samsung, iPhone, and Google Nexus. Seven of
the participants (58.3%) were iPhone users while four participants (33.3%) were users of
Samsung.
One (8.3%) used Google Nexus. All the seven iPhone users were by default running iOS
while Nexus and Samsung were running Android operating systems. Further demographic
analysis revealed 66.7% of the participants had installed Apple Pay, 8.3% of participants had
installed Google Pay, 8.3% had Amex wallet, while the remaining two participants had a bank
wallet (TD 8.3% and RBC 8.3%). Participants’ demographics information is displayed in Table
4.
Table 3.
background is important for the readers to understand whom the researcher interviewed and who
completed the survey. Furthermore, it will help the readers to understand how participants’
Participant P#1 is a male with some college degree; he works as a desktop analyst in the
information technology department. He likes moving forward with technologies and has been a
regular iPhone user with multiple mobile applications including Apple Pay. He has been using
the mobile wallet since 2016, when the iPhone 6 was launched.
Participant P#2 is female and a holder of an associate degree. She is a current student in a
university in Toronto where she’s pursuing her degree in business. She is a strong advocate of
Apple products, and she uses iPhone 6 pre-installed with Apple Pay since it was launched in
2016.
However, he uses the card issuer’s specific wallet Amex Pay. He mostly uses his Amex Pay for
Participant P#4 is a male with high school certificate and a current student in a university
in Toronto, where he studies data science. He is a user of Samsung 8, and he uses his bank-
specific mobile wallet application, RBC, since February 2018. He mostly uses the RBC wallet
Participant P#5 is a female student and a high school graduate, currently in university
studying finance. She also works as a part-time customer representative in a retail store, and she
has had several encounters with customers using a mobile wallet for transactions. She is a user of
Apple Pay on her iPhone 6s since the introduction of iPhone 6 in early 2016.
Participant P#6 is a male who holds a Bachelor’s degree and works as an IT analyst in a
retail store. For his work, he attends conferences on a regular basis, where he learned about the
Apple payment solution. He later adopted Apple Pay on his iPhone 6 after it was launched in
Toronto, Canada.
Participant P#7 is a male with some college certificates but no degree. He works as a
has been following the technology closely since Google first introduced the Google Pay in their
Nexus devices, however, not yet available in Canada. Since then, he has been a user of his bank-
specific wallet, TD, with a believe that the Google Pay and TD wallet operates on same
technology. P#7 is now considering switching to Google wallet now that it has been introduced
in Toronto, Canada.
Participant P#8 is a female, who holds a Bachelor’s degree in business and works as a
billing associate in an insurance company. She is a familiar with the mobile wallet as she used
Google Pay on her Android phone before she switched to Apple Pay, when she changed her
device to iPhone 8.
Participant P#9 is a male and holds an associate degree in IT. He works as a SharePoint
manager. He has been using Google Pay on his Samsung 6 for over a year. However, he got to
currently works as a business administrator. She was influenced by friends in activating and
Participant P#11 is a male and has some college certificates but no degree. He is a
progressive technical knowledge and became aware of Apple Pay in a Starbucks store as a
payment method a couple of years ago. He did some research and adopted the use on his iPhone
early 2016.
Participant P#12 is male with a Bachelor’s degree from a Toronto university. He works
innovation and adoption in his industry, and he has been using Samsung 6 with Google Pay for a
couple of years.
Participants’ Responses
The responses to the interview questions varied among the research participants. The first
question seeks to understand the participant’s thoughts and feelings upon hearing about the new
mobile wallet technology; the question was expanded to cover where and when each participant
first heared or knew about the technology. Most iPhone using participants confirmed they
Participant #1 (P#1) described his feelings as follows: I was excited to know of the new
technology that will replace my physical credit from taking it out of pocket. He claimed the
awareness of Apple Pay came to his knowledge when he was in a mall in the Toronto area. He
stated I was in the Mall in the Apple Store to take a glimpse of the new iPhone 6 that was about
two years ago. Of special importance is the motivation behind the adoption of the mobile
wallet by P#1. He stated I guess I have been shown how it works and…. the change of moving
Few of the participants claimed curiosity led them to learn more about the new
technology and what it could bring to their daily lives. P#4, who uses the RBC wallet, was
among the participants who adopted the payment method out of curiosity. According to him
When I first hear about it, I was more curios about it than anything, so I also researched more
about it online…., he also confirmed he read and learned more about it and adopted it for his first
purchase in school.
On the contrary, P#2, who uses Apple Pay as well as the TD bank wallet, was skeptical
about the new technology and full of doubt about the compatibility and security of the devices.
I was skeptical, and I may not be able to use it in all the stores and I just though it might not be
that secured because if your phone got stolen, they could steal your card information and can
cause a lot of problems. P#2 was influenced to adopt Apple Pay when the iPhone 6 was
released and she saw her friends and family using it with ease. She also added in her narrative
that she was very bad at carrying cash and she always lost her payment cards, because she
does not always carry a wallet, as she is a university student who often carries a lot of items.
She stated
….I’m not just organized and the only thing that I always keep with me is my cell phone and
having everything reliable on my phone is a big asset…and juts having one this to be worried
Both P#2 and P#3 were concerned about the security, and both demonstrated a
willingness to adopt the new technology. According to P#3, it was more of a concern, concern
in the sense that how well is it secure? How can I be sure that when I lose my phone, for
example, somebody picking it up will not go on a shopping prey against my card stored in the
device? P#3 further expressed a concern beyond the physical loss of the device; for example,
when contactless payment methods were first adopted, t, it was reported that nefarious
P#3, who uses the American Express wallet AmexPay, claimed he was reluctant to
adopt the technology, and it took him a long time to decide to use the mobile wallet. He
stated, initially it was very difficult for me to get into mobile payment and as technology is
improving and
security is also improving, so over time, I decided that it is time for me to get into it. P#3
explained further that the assurance given by the card issuers regarding the refund of
Furthermore, the convenience in use and security functionalities that are built in the
new phones such as near field communication (NFC) were another motivation for P#3 to
adopt the payment method. With the mobile phones nowadays, the functionalities to turn-off
the NFC to make available for mobile payment, that’s one of the things I took into
consideration before I decided to use mobile payment. Working as a cashier in a retail store in
Toronto, P#5, who uses Apple Pay on her iPhone 6s, learned about the new technology. She
She was curious to learn about the mobile wallet when customers kept asking if their
point of sale (POS) was mobile wallet-enabled. She noticed the efficiency in the transaction
process whereby the customers just tapped and go. According to her own account, the first
time I heard, I thought it was a lazy kind of doing a thing for the generations as I started to kind
of
getting more information about it and I later nursed the idea of having it on my phone……. P#5
further reiterated that the efficiency could also be to her advantage; especially when she is in
a rush, she can just tap and complete the transaction instead of inserting the card and
P#6 shared his experiences learning about and adopting Apple Pay during an Apple
conference when the Apple Pay was launched. Additionally, there a lot of social awareness
about the new payment solution, which came to Canada months after being launched in the
United States. He stated, not having to carry my card around, you can forget it here and there,
and someone else can pick it up. Also I am motivated by the idea of always locking my phone. It
is
apparent in the statement by P#6 that ease of use and security were the main motivations for the
adoption of the mobile wallet. During the interview, P#6 confirmed he is a techy savvy who
P#7 uses an Android-based phone with a TD mobile wallet that was developed
specifically for the TD bank customers in Canada. He got to know about the TD app from some
tech blogs and thus stated I have sort of been enthusiastic in technology, the first thing that
captures my attention was when google lunched Nexus phone and installed NFC technology
back then and lunched a pay service in the united state. He described he has been interested in
the NFC technology since 2011 and 2012; he was patiently waiting for the Android to bring
their payment system to Canada, but unfortunately the TD app was launched before the arrival
of Android Pay, which motivated him to install the TD wallet. P#7 was also motivated by the
NFC technology and adopted the TD app to fill the gap while waiting for Android to introduce
the technology.
Participant P#8 claimed she was excited upon the arrival of the mobile technology
because I like the fact that I can just use my phone to automatically pay for things. She had
previous knowledge of Google Pay, and that gave her confidence to adopt the technology from
Apple Pay when she switched to the iPhone. P#8 was motivated by the convenience of making
payments through her mobile phone, in addition to the security offered by the Apple device.
She stated The convenience of it, and I know that Apple is very protective about customers
information, so between entering my fingerprint or password that was very comforting. I can
Participant P#9 was skeptical of his data security when using the new technology.
However, he later adopted Google Pay with his Samsung 6 based on the conveniences it brings.
He explained, I was concerned about whether it would be safe and secure with my online
presence after which his confidence in the security was raised. He stated I'd used it and I find
it very convenient. Am I confident that it’s 100 percent secure? I wouldn’t say I’m that
confident, but I do believe there are enough mechanisms in place to make sure it’s okay.
Participant P#10, like other participants, felt Apple Pay brought convenience to him. He
said, I like that it’s convenient. It’s easily accessible. However, he had mixed feelings because
the technology may not be widely accepted in all industries. He expressed that I was a little
skeptical that it would be wildly accepted and if it would work and if it was safe to use. But
Participant P#11, an elderly, expressed that he was skeptical of the security reliability in
the new technology. He further expressed his concerns about being old-fashioned and catching
up with the youth in learning about the new technology. He stated in his narrative that one thing
that I thought that I was skeptical on how well it would work, and of course, on the security
side, P#11 made a unique statement regarding common purchases of household items using a
credit card: in the case the customer is not satisfied, an item can be returned; however,
He stated because I'm sort of old school, I also concerned that people are utilizing their
credit to pay for regular household goods which becomes a problem because there's no
substance to the goods that you're buying. So, if you're buying gas or you're buying a coffee and
a sandwich if you can't pay for it. If you make a purchase of a large purchase, you can always
return it. Here, you have no chance of returning it, so you’re always on the hook. When P#11
was asked about his motivation for the adoption, he stated convenience was the main
motivation,
similar to most participants. He stated I think it was just convenient. Not having to always have
the card with me. I carry my phone with me all the time anyways. So, why not have my cards in
a wallet on the phone rather than having to find my wallet and get it all the time.
Participant P#12 was excited about the convenience of having all his cards consolidated
in one device. He expressed I guess I was excited because it saved me from carrying cards
around everywhere. I had my phone on my all the time so just having everything in one place is
great, and since it’s integrated into the phone I can have easier access to it and easier to track
what is going on instead of having to carry a whole bunch of different websites. P#12 thus
confirmed that convenience was the main motivation for his adoption of the mobile wallet.
Enrollment experience
During the interview process, participants’ descriptions of the enrollment have given the
(Android, iOS). The overwhelming majority of the participants claimed the enrollment took a
few minutes to complete and was straightforward, without any challenge. According to P#1, it
is pretty much straight forward and didn’t take more than five minutes. It asks you to put in
your credit card and your finger prints, it then activates it … very straightforward he narrated
the process that credit cards can be added either manually or automatically by taking a
Similarly, P#2 confirmed the enrollment in Apple Pay is pretty simple and
straightforward, stating I just added my card in the Apple pay app, and it asked for my
authentication which is my finger tip. She compared the enrollment time with the time it takes
to make a purchase online when it is required to enter the 16-digit card number. The
enrollment
time and process have been consistent and repeatedly the same among the participants using
Apple Pay.
The enrollment process as described by P#3 is more similar to that of another wallet;
this can be attributed to his technical knowledge. P#3 first adopted Amex Pay in April 2017 and
he stated his experience as follows: with Amex Pay, the application has been built in such a
way
that your account can be managed online, so they’ve already gotten information about my
accounts and it was just a click, click, click and all you get is just a text to validate that you are
setting up your card for a mobile payment ... However, the narratives from most participants
In the case of P#4, the enrollment was fast and easy I believe you need to download the
RBC wallet app from the app store and it asks you to sing in with your RBC client card, and you
put in your password, so it downloads your information from the RBC Bank. It is important to
note that most bank wallet applications have direct links to the users’ bank details, which of
course makes it straightforward to enroll. P#4 further confirmed that he did not experience
any challenges during the enrollment period, but it was rather easy to enroll.
While P#5 shared her experiences during the enrollment process, she described some
challenges due to the process of confirmation from her bank. Nevertheless, the enrollment
process is still considered smooth. She said, there was no trouble that I had, it was just that I
went to a long way to receive a confirmation from my bank that my details can be linked with
Apple Pay. However, there was no problem with Apple Pay. Her narrative of the process was
much more detailed than that of the previous participants, giving the researcher more insight
into the full enrollment process. She said, when I opened the app, there was a symbol or icon
for
adding any type of car, so I just simply click on that… it has an option to add a credit card, debit
She continued, and it’s going to give you a kind of information they will need such as
card information, your location, and what kind of device, then you have to give consent to it.
An after that, it’s going to ask you if you will like to scan your card or manually enter
it,…huuummm, at that time I didn’t have my card with me, so I manually entered it. Then it
asked for details such as my name, first and last name, my address and the card number, the
security number at the back of the card and the expiry date. When asked how long it took to
complete the enrollment, P#5 claimed it took about 2 minutes; however, there could be some
delay, which depends on the card issuer, to confirm the enrollment. It could take longer than
According to the narrative by P#6, the process took about 5 minutes to enroll using his
iPhone 8. The process was quite similar to that described by P#5: … to add my credit card
information, then to verify that I am the card owner, it went to my mobile banking app but if I
don’t have the app, I need to download and call the bank to get a verification number. Because
I already have the app on my phone, I just verify from my app, and I put in my password, and I
set it up with my finger print, and that was it. P#6 later confirmed that he had not experienced
any challenge during the enrollment. P#7 has a contrary view; the first time he used the TD app
was not a good experience: The first phone that I used it didn’t work, or it was inconsistent.
P#8 also did not give an account of any challenges during the enrollment process.
She stated the delay was within normal limits for validation. Not really frustrated but I know
there had to be security questions and they just wanted to valid that it was my phone and it
participants, the
enrollment process took around five minutes, depending on the customer’s bank. Her enrollment
process was similar to that of previous participants: …type in the card number, and then, the
expiration date along with the security code or you can scan it with a picture, and it will
automatically enter the information for you. Then they would send you a verification text to the
phone number I have one file, and after I validate that, then they would confirm me to Apple Pay.
Participant P#9 claimed the enrollment was pretty straightforward and allows for easy
payment by turning on the NFC. He stated Well you have to download the application and
once you put the application in it asks for you to log in. It’s Google pay, so you have the option
of connecting to your Gmail account. I think because I've made purchases before then it was
easy to sync up my card and then you're informed that you have to turn on your NFC option on
Participant P#10 expressed there was no challenge except the security steps to validate
the card information. He stated There are security questions going along with it and actually
entering the card. So, you had just to type in all the digits correctly. The security number, after
you enter all the information sometimes the bank would want to verify that you're the actual
authorized user on the phone, of the card. So, they'll send you a text message, or they'll call the
phone number they have on file for you to verify. P#10 claimed the verification stage by the
card issuer might, however, take some time to complete either via phone call or text. He stated
you type in all the information on the front and the back of the card. You'll get, sometimes
they’ll ask you for a text message verification or a phone call to verify that you are the
Participant P#11 narrated his experience during the enrollment; he confirmed it took him
5 to 10 minutes, similar to other Apple users. He described the steps as follows: I opened the
Apple pay application. It asked me to scan my card using the camera. Once the card was
scanned, it gave me the image back of my card and then had me confirm that it was my card.
And then I believe it went to the issuer and asked if it was a valid card. And when that came
Participant P#12, on the contrary, explained he could not activate the mobile wallet on a
different phone until it was activated using an old Google account. He confirmed the enrollment
entering the card details was straightforward, as explained by previous participants. He stated
it’s connected to my Google accounts and once I sign in then you just need to take a picture of
your credit card, and it figures out the number, and you confirm it is the CVD number, it makes a
call to your back, and you sort of do a confirmation that you want to add it. P#12 made an
interesting statement of pseudo-numbers stored in the wallet that are used during a
transaction in replacement of credit card numbers. He stated that …it creates like a fake credit
card number in your wallet which is used in the transaction and that’s pretty much the end.
Most participants based their opinion on the ease of use and security of the mobile wallet
compared to the physical wallet. The individual’s affinity with the mobile device defined their
perceptions of convenience and security. As most participants have not experienced any
challenge in the use of the mobile wallet, they indicated their interests in continuing the use of
the technology.
According to P#1…. you don’t have to type in the four digits, it all done through your
fingertip and pretty much easy. However, the payment card in a physical wallet is the old-
fashioned way you would have to insert, check in etc. Considering the security, P#1 claimed
security depends on different scenarios, but in his own view, the mobile wallet is more secure
in
the sense that if you leave your phone they need a password to get in. But if you have a credit
card, they can just use it on tap. So even with the phone, you can always delete all your data.
Participant P#2 also mentioned the convenience in the use of the mobile wallet, except
a possible hindrance: I mean unless your thumb is like greasy and it doesn't catch it properly
then; then you would have to wipe it a bit and try it again with your thumb. That's the only like,
downside that I can think of. In her narrative, she claimed the hindrance is not limited to the
mobile wallet but exists when using a physical card as well. And the speed, that might slow it
down, and it even occurs with the plastic cards. Like sometimes if you hold it the wrong way it
wouldn't tap properly or if you take it away too fast. So, it's just the way you use it. Regarding
security, the majority of the participants perceived the mobile wallet to be safer. However, P#2
defined security attributes as From the skeleton, they're both just your card and linked to your
bank, and it shouldn't matter like, about the security. Like if something goes wrong with your
card and if something goes wrong with your app that uses your card, it's going to be the same
Participant P#3 has a different view of the mobile wallet based on his personal
experience. He pointed out that his apprehension was not only based on payment security but also
on the physical security of a device and a physical card. I think you'll have to look at it from a
different perspective, right? Different perspective in the sense that with your mobile wallet,
there's a number of things that you’ll have to take into consideration in terms of safety He
explained that he did not perceive a significant difference in the physical security. One is how
easy is it for somebody to pick your phone and use it without your knowledge? That has
happened to me in the case where I was traveling on the train and somebody pickpocket and
it straightaway.
So, in the same way, somebody can pickpocket me and take my physical card, and as I
said, if my physical card is got the proximity chip within it that allowed me to touch and go,
it’s the same thing. Anybody can use it and buy anything with it. But of course, both have got
limits in terms of proximity payments, both have got limits as to how much you can buy in a
single transaction.
P#3 claimed one of his apprehensions is payment security, which has been addressed by
the NFC technology; he elaborated on his perception as he stated, But the other side of security
when it comes to a mobile device is that, personally, for it to work, you need to have your Near
Field Communication, what do you call it? A Near Field Communication device is working on it.
So, what I personally would do, as somebody who is aware of security issues around, what I
normally would do is to turn it off. And when I want to use it, I'll turn my NFC on back again. I
use it, and immediately I finish using it, I turn it off. So, for me, that's the same way as using a
Another frequent comment by the participants was that ease of use hinges on the
tapping features, which also expose the card to unauthorized transactions; but the mobile
wallet provides some level of security to protect against unauthorized access. P#4 in his
account stated, because on the regular card, if you enable tap on it, anyone can just use it to
tap. You can give it to anybody to tap. Whereas, using the mobile app, it requires you to put in
your phone password or your fingerprint before you can make a payment.
An interesting point emerged during the interviews, i.e., not all participants have the
tap features activated on their cards. P#5 stated, I will just speak in general because I don’t
have the tap code on my actual credit. As P#5 recounted his experience, he attributed his
acceptance of the mobile wallet to the security features, and he did not only adopt the payment
He thus stated, ..because I keep the phone with me pretty much all the time. I usually,
even when I go to work or school, it's always in a secure place that's locked. Whereas the card,
if I was to lose it, you don't need verification. Someone could just go and tap at a store if they
have the ability to do that whereas the phone. Oh sorry, whereas the phone, it asks for security
before it uses the card. It asks for a fingerprint or a passcode to kind of ensure that you're a
Similarly, like previous participants, P#6 revealed that a physical wallet could be
compromised, but the fingerprint and passcode will protect the mobile wallet from such
compromise. P#6 expressed that If someone got my phone, they wouldn’t be able to use my
card without my fingerprints, but if someone got my wallet, they can just walk anywhere and
P#7 in his own words also articulated the similarity of tap features in both wallet and
physical card, for ease of completing transactions while the authentication in the phone
makes a difference when compared to the physical card. Similarities in that ‘Tap’ works and
that it uses similar technology for the ‘Tap Payment System’ and the difference is really that
you have to sign into the phone first to use it. The fingerprint unarguably is the success of the
passcode and stated I would think my card is less safe because once that is lost then they can
go in and swipe it. It will be a little harder to get into my phone to access my credit cards since
everything requires a thumbprint or passcode so that Apple Pay would be more secure. A
significant number of participants so far considered the physical card to be less safe when
compared to the mobile digital wallet despite the differences and similarities in the
P#9 represents a few participants who did not experience a clear difference between
the two payment technologies. Shortly after engaging in the discussion more deeply, the
participant claimed NFC could make the mobile wallet safer. Nothing’s safer than cash in the
sense that, I guess the reality is that if you have a credit card with a tap option turned on then
it's essentially the same thing, or at least that's my view of it. So, I don't really see a big
difference between using your phone... In fact, there's probably a couple of extra layers of
security on getting into your phone and having the ability to turn off your NFC feature, so that
However, following further discussion, P#9 expressed a positive feeling about the
security mechanisms that may exist in the technology, but he confirmed he has little or no
knowledge of it. He stated Well, my perception is that there may be. Yeah. I mean, I get what
you’re asking me. [laughs] I guess that there are mechanisms in the phone that make it safer
than the physical wallet. I'm not familiar enough with all the different ways that your phone can
be attacked that make your phone more or less secure. But, all things being equal, I guess
there's added security features to a mobile device than there is to physical cards in your wallet.
Diverse perceptions of the physical and the mobile wallet were expressed in the
individual responses, in which a significant number of the participants, felt that using a
fingerprint or passcode makes their mobile wallet safer. The researcher thus inquired on a deeper
level about the participants’ knowledge of the security mechanisms that led them to believe the
mobile wallet is safer, regardless of the claim by Rose (2012) that a significant number of mobile
apps on smartphones are storing sensitive account information of the user in plaintext.
Participant P#10 gave insight in the reasons why the physical wallet and card can take a
longer time to complete a transaction compared to the mobile wallet, which requires only
tapping; he expressed that my card, it has a chip. So, if I go into a store that needs to use my
actual physical credit card, I'd have to insert the chip, and sometimes that takes longer versus
if I just use my phone, I can just wirelessly just pay for it way through Apple pay.
The security experience of P#11 was similar to that of previous participants. He stated,
from a security standpoint is that the clerk on the other side would never see my card if I used
my wallet from my phone. So, there's no way that they can actually validate that I'm carrying
the proper card. P#11 made another significant statement, i.e., that tap technology is similar in
time required to complete a transaction compared to traditional card payments. He stated, and
originally before tap in the chip card, you always had to insert your card and still do. Even if you
go to the traditional American places like Home Depot and Lowe's, you still need to insert your
He further expressed the convenience of Apple Pay and the ability to display the
previous transaction details: there's definitely ease of convenience to use the Apple pay over the
actual card itself, but now because of tap, they’re very close. I can either tap the card or do
Apple pay.
One other benefit with Apple pays though is that it will show me my last transaction even
Similarly, P#12 confirmed the overview of the transaction history is a valuable feature in
Apple Pay. He claimed the transaction history gives a sense of security, as he said push
notifications I can see the history at a glance, so it gives you a better feeling of security. Another
similar statement with previous participants is that you can use both taps with most credit
cards now and that’s pretty much what the digital wallet does.
Responses from the previous interview questions led to inquiries by the researcher
about the participants’ perceptions of the security mechanisms. Participant P#1 felt safe about
the mobile wallet and stated from what I remember, and the chip was encrypted. Yeah
because I remember Apple had an issue with the government about encrypted data on their
cellphone. So
that they couldn’t get in to. So that what’s made it safe for me. If they (government) can’t do
Something that caught the attention of the researcher was the encryption statement made
by P#1; his knowledge was influenced by his role as an IT analyst in the retail industry.
Similarly, P#2 expressed his trust in security of encryption combined with the password in the
mobile device. According to P#2; I think it's as safe as the encryption scheme that the phone is
using. I mean if they, if it comes down to it, if you can break, if you break, if you can break
someone's password then, then nothing is safe. Like, it's as good as the encryption scheme used
on the device.
She further claimed encrypted information on the mobile device can be considered
safer against attacks from adversaries. Like, from hackers and stuff as well. Like, it's safer that
way
than that information on your device and having it encrypted than having like a physical card
with most of the information on it open to, for everyone to see. I think that’s why it’s better.
mobile wallet. Participant P#3 even narrated his knowledge of security mechanisms with a
detailed analysis of the unique token generation for each individual device. So, by virtue of my
progression, I know that once you activate it, there’s a way of linking your physical card to your
mobile device and that creates a bond between them. So, you cannot use another phone on the
same card except you link them together. Which in IT word, there must be a token that’s been
generated, which is linked to your phone, which makes that phone unique to you. I mean the
same way that you have the 16 digits on your credit card. So, the same way that works is how
the information on the phone works with the card. P#3 did not have much experience with the
protection of sensitive information beyond the token generation when switching from one
device to another.
Participant P#4 narrated his knowledge of security mechanisms from the activation
period of the RBC wallet, which allows only three consecutive payments and remains in
payment mode for 50 seconds. This is a special feature that was not reported by any of the
previous participants. P#4 claimed the feature is one of the upgrades he noticed; he stated I
believe it allows you to pay without Wi-Fi now for about three times. After that, you won't be
able to pay anymore, and it lets you pay like, it turns on the payment for about 50 seconds
before it stops.
When asked about the maximum number of payments allowed with wi-fi, P#4
confirmed You could make unlimited payments with Wi-Fi, if you have access to Wi-Fi, you can
make unlimited payments. But I notice now, that if you login to the Wallet app, it can make
three
payments without Wi-Fi. Just like previous participants, the device authentication is the first
security mechanism before gaining access to the payment app. According to the P#4, You need
to put in your password. You can make the settings to allow you to use fingerprints.
Participant P#4 described having the perception of two separate layers of security when
using the RBC wallet: phone access and the wallet access. He emphatically stated let's say
somebody pick up my phone; they’ll need to use my password to get into my phone. And then
when they open the mobile app before making a payment, you need to put in a password.
Considering the statement from P#4, it is assumed that security layers are not the same across
the various mobile wallets. According to P#1 and P#2, Apple Pay has one layer of security by
authenticating to the device, after which the wallet is accessible. Similarly, the Amex wallet,
according to P#3, can be easily accessed after device authentication; It’s just a toggle switch on
and off on NFC. But of course, to be able to do that, you’ll have to log into your phone first.
Participant P#5 went a step further to express her confidence in the security
mechanisms in Apple Pay beyond the regular password authentication after certain minutes.
P#5 expressed satisfaction in another feature, i.e., remote data wipe, when a device loss is
reported. He stated: what I really like about the Apple Pay is not that, because some of the app
stores is a little bit different. If you use your password, you don't have to put it on your phone
for 15 minutes. With the Apple Pay feature, it requires you to either put in the passcode or the
He further stated that if you lose your phone as well, I believe Apple Pay removes all of
your information off your cards from your phone right away. And I like that it does ask for the
fingerprint or passcode every single time. And I believe there's like three or four tries with the
passcode and if you don't get the fingerprint or the passcode, it removes the card information
as
well or locks it for security. Similarly, the common perception that is expressed by multiple
participants regarding the security mechanisms is also repeated by P#6. He stated, Just that
it needs password and fingerprint, but that’s the only security feature I know on here I don’t
P#7 identified encryption of data and the use of a PIN during transactions. However, the
functions of the NFC technology in the security mechanism are unclear. P#7 stated that my
understanding its secure NFC. I don’t know if it’s like a protocol similar to HTTPS or something
like that or an SSL, so the information is encrypted going from the source to the pin-pad. It
doesn’t have to carry a pin like a chip-pin you put into a pin-pad and then have to enter your pin
and then that pin-pad needs to encrypt what that number is. That part is unnecessary because
it’s really just sending the payment information; essentially, it’s just sending your unencrypted
Participant P#8 is a rare advocate of Apple products, and he holds a firm trust in the
technology. Expressing his knowledge of the security mechanisms, he stated I just know Apple
works very hard to keep our information safe. P#8 strongly believes that his information is
secure with his Apple phone, thus his level of trust in his phone is higher than that in a physical
wallet. He expressed his trust as he stated I have to trust someone, unfortunately. I’d rather
P#8’s response is a bit influenced by the researcher, who asked probing questions. It
was apparent that P#8’s passion for Apple Pay is largely attributed to the fact that P#8 is
overwhelmingly exposed to Apple technology updates and releases. She demonstrated some
knowledge about encryption and the replacement of sensitive data during a transaction. She
stated I know for electronic information unless I’m on a shared wireless server, in general, it’s
pretty
safe, but I know they sell a lot of their information on an encrypted server. I know the
information that comes off of my phone isn’t the exact information that they received like the
store receives so they probably won’t have my exact numbers, because it’s all encrypted; this is
NFC was mentioned several times as one of the key security features, although with
different expressions of how it works. Participant P#9 confirmed he does not know how the NFC
technology secures user information on the device; he, however, reiterated that he always
turns off the NFC when not in use to secure his data. He stated I don’t know if I know how one
works over the other. What I do know is that to be safer, your best thing to do is to keep your
NFC turned off when you’re not using it so that your information, or whatever isn't being sent
Further inquiry by the researcher about P#9’s knowledge of NFC led him to make some
comments of great importance as to why NFC should always be turned off when not in use. He
stated I mean that's the main feature of the thing is that your phone is still obviously
connecting to data and Wi-Fi and things like that. So that's another reason why the best thing
that you can do is turn it off when you're not using it. And then obviously, whatever security
you have on your phone, whether it's fingerprint ID, passwords, pins, whatever, that is also a
layer of security.
Participant P#10 expressed her understanding of the mobile wallet as being safer
compared to the physical card due to the password security. She said, … having the card on my
phone where you need to have passwords to access the card. Participant P#11 gave a different
perception of security using Apple Pay. He claimed the mobile wallet is not more secure in any
way compared to a physical card based on the transaction limit using tap.
He stated overall, I would probably think that it might be less secure, but I'm not sure.
I've never tested to see what the limits are on Apple pay. So, whereas if you try to tap over $100
purchase, it'll force you to do a pin check, as opposed to Apple pay. I've never tried doing a
purchase of more than just under, probably, 20 or $30. So, I don’t know if there’s an actual limit
as to how much you can put on Apple pay. I would consider it if there were no limit. After a
further probe into what he considers security, he agreed with views of other participants, i.e.,
since card information saved on the phone is hidden, such a feature makes it secure. Because
you can't see the CVV on the back on Apple pay, it's probably more secure. If someone had
gotten a hold of your phone and was able to somehow get the information there because I
Similarly, as regards the transaction limit, P#12 was of the participants who perceived
the mobile wallet to be less secure because the transaction limit has not been tested. He stated
I would say assuming there are transactions that I can actually use so usually under a $100 I’d
say I would feel more secure but using the digital wallet it doesn’t give out the real card
number. So, if for some reason it was compromised it’s more easy for me just to get rid of it
without having to call credit card companies and stuff, and it also does a better job of letting
you know the transactions as they happen so if something pops up on my phone that I don’t
recognize then I can immediately stop it. If it’s a physical card then usually you have to log into
your bank site and see what is going on there which I probably only do once a month.
P#12 due to his experience in the IT industry expatiated further on the security
mechanisms. He stated, I guess I don’t fully understand how it works but it is encrypted using a
hardware chip that has to be present. It doesn’t actually use your real card number it creates
sort of a tokenized card number that’s used just for those transactions. There are transaction
limits in
place so you usually can’t go over $100 in most places. It’s really only using NFC so there’s not
too much distance that it can travel and the communication between the two is encrypted when
it’s passing the details. He claimed the security technology accorded him a sense of security
This section discusses participants’ reported experiences with mobile wallet transactions.
Based on their previous experiences with transactions, they expressed the feelings of expected
accomplishments. Equally, they narrated their unexpected challenges during transactions that
Participant P#1 stated he is very comfortable with the security and never has any fear
because as soon as you put it on my finger print that’s it. P#1 reiterated his confidence and his
expectation was met regarding the convenience. The spending behavior was also evaluated
based on the satisfaction expressed by P#1; he further explained that his previous experiences
with mobile wallet transactions had not changed his spending behavior. He expressed that It’s
same it doesn’t make me spend more. I mean you still have a budget
Similarly, P#2 expressed his satisfaction with transactions using the mobile wallet due to
the perceived security. Conversely, his spending behavior has been influenced by the new
payment technology due to the ease of use and convenience. He stated Yeah, I spend definitely
more. [laughs]. Because it's easier. It's easier just to tap and like not think about like…
Satisfaction about mobile wallet transactions by P#3 is consistent with that of previous
participants. In his own narrative he stated, I think it's much more straightforward. He further
reiterated his confidence in the security aspect of mobile payments, as he said the gates that
I need to pass through to be able to use my mobile device, one of which is to, first of all, open
my
phone. And the second thing is to enable my NFC. And once that is done, it’s just a question of
just tap it on the card payment system, and that’s it, and it generates the receipt for you. So,
Participant P#4 explained the ease of use of mobile wallets influenced his spending
behavior. He stated I used to work I noticed that I spent more money using my RBC wallet
because I tried leaving the wallet at home to avoid spending. But when I have my wallet app I
can make payments anytime and anywhere I want so I noticed that I spent more. He further
explained his increase in spending was due to easy access, as he stated, it’s because I have
easier access to payment with my phone. The researcher probed to understand why P#4
stopped using the mobile wallet; he claimed I’m not working, and I’m not in it a lot, so. It
P#5 explained that, in her experience, Apple Pay transactions have a significant
influence on her spending behavior. She said, I'm usually already at the counter, but sometimes
I start to have doubts like, Do I really need this? And like, Is this really an impulsive buy, or is this
something that I really need P#5 continued by citing the ease of use as the main driver of her
spending behavior, coupled with the fact that she naturally likes shopping. I'm really into
makeup and well, I love shopping for clothes too. So, if I don't have my card with me and I do
see something I really like, and I have my phone with me, I can just tap. I would say that the
efficiency, I mean paying. Sorry. Let me just think. I know what I want to say, but I don’t think
Conversely, P#6, who also uses Apple Pay on an iPhone 6, claimed his spending
behaviour has remained the same as before; he stated I end up spending the same as before, it
experience is pleasant. He stated It doesn’t really look like much of anything it’s the same as a
credit card transaction. With the transaction you hit a widget open the banking app, and you
just tap it, and then you can see in the rest of the Mobile Payment System the details of the
transaction in your online banking statement, it just goes straight to there. P#7 is one of the
participants who are exposed to technology and understands the value of the history overview
the mobile wallet can provide; he could not see much difference in the payment method.
Participant P#8 stated that she only has a hard time when the payment terminal is not
available for transactions. As an example, she told about an experience she had had at one of
the cafeterias in her work place. However, it has been a pleasant experience. She stated, in
general, it’s pretty good. My job actually has Apple Pay in our cafeteria so it’s a pretty new
feature that they have and now and then the machine goes down, and I don’t have my wallet. I
guess that’s the only inconvenience is if the machine doesn’t work and I don’t have my backup,
my actual credit card then that’s the only issue I would have. She reiterated her continued use
of the Apple without hesitation as follows: so, far I’ve had no real complaints, and I will
Participant P#9 stated he feels assured by the security features, and he expressed how
he can securely authenticate his transactions: I basically, will access my phone by fingerprint or
pin and then turn on NFC. And then make the payment and then turn it off. He claimed the
Participant P#10 expressed satisfaction with the transactions so far except that not all
stores accept the method. He stated, For the most part, most stores don't take it yet, but it's
slowly getting there. That's the only disadvantage. But in general, I’ve had positive experiences
when I do actually use it. More participants expressed their satisfaction with the mobile wallet,
Participant P#11 stated he was able to just double-click on the icon and complete a
transaction in a short time: I think I can get to Apple pay by only doing one authentication and
that's just the double- click. And then use my ID or passcode after that. So, I can bring up the
Apple pay with touch ID, and then just go in with my thumbprint just by double-clicking. P#11
maintained his believe that the mobile wallet, especially Apple, still has some inherent risk:
until someone proves that they can hack the phone when I'm on it. I think there is always a risk
of compromising the phone. And because Apple was never known for their security.
Participant P#11, however, suggested the risk can be limited or mitigated if users can
get a different card for different purposes: I would think that there's always a risk. I think in my
lifetime so far; I've been hacked or hacked my credit cards at least twice. So, I think for the
normal credit card user, it's a part of doing business. I mean, all we do is we get more accounts
so that, I have an account that I just use for online. And I have an account that I use for Apple
pay so that if it gets compromised, I’m not stuck in the water for the rest of my account.
Participant P#12 expressed his convenience just like previous participants when using
Apple Pay for transactions. However, he reported about his disappointment when he wanted to
use his card for a large purchase where no chip and pin were available. He stated I think it’s
pretty much just like using any sort of tap transaction you just pull out your phone and sign into
it and you open up the wallet App and you just need to touch the machine when it prompts you
for it, and that’s pretty much the end. You immediately get back that the transaction has gone
through and you get a receipt right on the phone and it sort of lets you know what has
happened.
He further stated that It’s pretty quick and easy and you don’t have to pull your cards
out, and you don’t have to give the cashier anything either, so you get to hold onto everything.
You have to actually sign in to use it not just throw a card over a reader so it’s very fast I think.
The only time it’s frustrating if the transaction is too high. I guess down in the States they don’t
really have pin machines that come to you, so you can’t really do it.
Spending Behavior
reduction in spending upon mobile wallet adoption. Overall, it was clear from the responses
that the majority of participants remain indifferent about the spending pattern. Participant
P#1 stated the adoption has neither increased nor reduced his spending: It’s same it doesn’t
make me spend more. I mean you still have a budget. However, on the contrary, P#2 stated
Yeah, I spend definitely more because it's easier. It's easier just to tap and like not think about
like.
When P#3 was asked if the adoption has affected his spending, he stated No, no, it hasn’t.
It hasn’t affected my spending attitude. I mean, remember I said, because there's limit on it so,
there's a limit to how much can I spend at any point in time. And at the same time, if you go to
the shop the same way you will use your credit card, a physical credit card is the same way you
will use your mobile device anyway. But of course, as a person, you just have to be mindful. I
mean, if it's a debit card and I know that I'm using my money, I'm the sort of person I don't
want to use my credit card too much. So, I'm just mindful of the fact that this is a credit card.
So, I'm mindful of how I use it or what I use it for, that sort of thing.
Participant P#4 confirmed his spending went up after he adopted the mobile wallet,
but he applied some cautionary measures and stated actually when I used to work I noticed
that I spent more money using my RBC wallet because I tried leaving the wallet at home to
avoid
spending. But when I have my wallet app I can make payments anytime and anywhere I want so I
In a similar fashion, P#5 claimed there was an increase in her spending due to the
convenience and because she regularly carries her device with her. She stated I'm really into
makeup and well, I love shopping for clothes too. So, if I don't have my card with me and I do
see something I really like, and I have my phone with me, I can just tap. I would say that the
efficiency, I mean paying. Sorry. Let me just think. I know what I want to say, but I don’t think
I’m explaining it right. Participant P#6 stated there were no changes in his spending behavior:
No not really I end up spending the same as before; it hasn’t changed. Similarly, P#7 stated his
Participant P#8 stated the mobile wallet increased her spending a little bit because I
know it’s more available and I’m like oh I don’t have the wallet I can’t buy something, but I have
my phone. Participant P#9 expressed that convenience is a major factor influencing his
spending behavior. However, the spending has not changed it doesn't. Not the spending, just
the overall convenience of using it. So, I think that my spending habits are largely the same.
Participant P#10 attributed the change in spending to the easy accessibility of the
device; she stated I'm just more likely to use my card more, and it's easily accessible versus
forgetting my wallet or not bringing it. Then I won't be forced to spending money because I
don't have my wallet. Participant P#11 similarly stated the convenience of the mobile wallet
has influenced his spending Yes. From the point of view that before, if I didn't have the cash on
me, I wouldn't have bought the item. But now because I have the convenience of having the
in his spending behavior. I mean I think it’s easier than having to pull out and tap a credit card,
so I wouldn’t think there’s been any difference. All participants were individual interviewed,
and while they provided some similar responses to some key interview questions, many
participants gave different accounts of their perceptions. The next section will present the data
In this phenomenological study, interview questions were developed in line with the
research questions by utilizing the unified theory of acceptance and use of technology (UTAUT)
model. The data collected from the interview were collated, deconstructed, and coded during the
data analysis stage to create an overview of the themes in the data categories and their
corresponding nodes in NVivo12®. The interviews were transcribed, and data were transferred
While coding is considered a critical aspect of data analysis (Corbi & Strauss, 2008),
performing the coding manually can be complex and time consuming. However, NVivo12® is a
user-friendly data analytic program that helps to take the burden of data analysis off the
researcher’ shoulders. The software was also used to present the study findings in visualized
format and export the findings accordingly. The following steps were taken during the data
analysis stage:
Step 1: Cleaning data by transcribing the interview data and also cleaning up some
Step 2: Uploading the data into NVivo12® by creating a mobile wallet project in
NVivo12®. A resource folder was also created within which the transcribed data were imported.
Step 3: Reorganizing the interview responses using the auto code function in NVivo12®.
The auto coding helped in grouping separate responses from the participants under the same
interview questions; see Appendix G for the auto coding screenshot. The Files column shows the
participant who responded to the interview questions while the References column shows the
number of times each participant mentioned the contents responding a particular question.
Step 4: Exploring data by running the “Query” command to generate a list of frequently
used words. The query helped the researcher to understand the transcribed data. Table 4 provides
Table 5
creating the nodes by labeling the research questions with the created anchor codes.
Step 6: Coding relevant information in the data by inserting the relevant information into
the nodes created. In this step the important information and statements were highlighted and
inserted into the nodes. The researcher identified the important information from the interview
In essence, the pertinent interview questions were used to develop the coding. The
IntQue #1: Please describe your thought and feeling when you first heard about a new payment
IntQue #4: What can you consider to be the main motivation for using mobile payments?
IntQue #5: What are the greatest challenges you experienced during enrollment in the mobile
wallet?
IntQue #7: Describe any similarities and differences you see between the traditional physical
IntQue #8: Do you consider mobile payments to be safer when compared to other payment
methods? If so why?
IntQue #9: If you consider mobile payment safer, how can you describe the security mechanism?
The next stage in the analysis process was the development of code and themes which
were later used to assign meaning to the processed data and to determine the perceptions of the
phenomenon.
Categories and Theme Development
The researcher created nodes from the interview responses by the participants. The nodes
were created based on the research questions and the corresponding responses. The researcher
examined the relevant statements from participants’ responses to each research subquestion, i.e.,
RQ1a through RQ1f, and the textual data were analyzed to identify relevant connections and
ideas that are common between the participants. The researcher formulated the themes, also
known as nodes, in NVivo12®, and the following six anchor codes were assigned as labels to the
research questions:
The nodes are also known as containers in NVivo12®. After creating the nodes, the
coding was performed by highlighting and inserting relevant information from the participants’
responses into the created nodes or containers. The process of selecting or using phrases to
capture the meaning in the data and inserting such data in the developed themes or nodes is
The researcher ensured the nodes were created in a manner that reflected the adopted
conceptual framework, the UTAUT. Additionally, node creation helped the researcher to
categorize participants’ perceptions about the mobile wallet. Cases and characteristics were
organized in a case node to connect all the participants’ demographic information to their
respective interview responses. NVivo® software refers to each participant and each response as
Another unit of analysis, called node classification, was created, within which the
participants’ data. The demographic attributes in this study are gender, age range, educational
level, occupation, mobile device, device OS, and payment wallet. Appendix I provides the case
The next sections outline the evidence from the participants’ statements as regards the
different themes.
A majority of the participants (58%) expressed their skepticism about the technology,
while 42% were excited about the new technology. Despite the skepticism of 42% of the
participants, they expressed it was the technology advancement that stimulated them to move in
the same direction. Participants’ statements demonstrating their feelings and thoughts about the
Table 6
technology (P#7)
secure (P#9)
Overall, the responses demonstrate participants were excited and courageous to try the
All participants expressed their motivations using different words, such as convenience,
efficiency, security, and assurance. However, five of the 12 participants (41.7%) claimed they
adopted the technology due to its convenience, while two other participants (16.7%) explained
security was their main motivation. Other contributing factor is curiosity about the new
technology. Participants’ statements demonstrating their motivations for adoption of the mobile
Table 6. Participants statement and Theme for Motivations for Adoption (RQ1b)
phone (P#2)
● I like the idea that it’s on my phone and it’s always locked (P#6)
on you(P#9)
After running the word frequency query in NVivo12®, several words that appear relevant
to the theme of challenges in mobile wallet enrollment showed an appreciable number of counts.
Among these words, we find: confirm, problem, straightforward, getting, and needed. These
words were explored to understand their usages in participants’ statements. It was clear that
problem and straightforward were the two words that addressed the challenges according to
Two of 12 (16.7%) participants expressed there was no problem during the enrollment,
and three (25%) participants claimed the enrollment was straightforward. A few participants
claimed it was easy and smooth. One participant mentioned the challenge that the technology is
not widely accepted in all stores. Participants’ statements demonstrating challenges they
Table 8
Table 7. Participants statement and Theme for Mobile Wallet Enrollment (RQ1c)
● The process took less than five minutes and fast (P#6).
challenges (P#10).
● It was pretty straight forward but the biggest problem was some
Almost all participants (11/12, 91.7%) stated they preferred making transactions via the
mobile wallet than using a physical card. Mostly, security was also expressed by eight (66.7%)
participants as a factor stimulating the use of a mobile wallet. However, two (16.7%) participants
expressed their concerns about the transaction limit. Participants’ statements are presented in
Table 9.
Table 9
Table 8.Participants statement and Theme for Physical and Mobile Wallet Comparison (RQ1d)
This one just goes on top and then within seconds or circle comes
● In terms of use, it's just going to places and if they don't offer
Apple Pay then it's not convenient compared to when every other Physical and
Mobile
place uses a card to like to authenticate (P#2) Wallet
Comparison
Participants’ Response Theme
(P#3).
more, you can use your physical card. But when you're using the
(P#4).
● Sometimes I might just quickly run into the store and kind of
● It’s just a Tap functionality it works the same way but other
● Tap’ works and that it uses similar technology for the ‘Tap
● Every time I use my card I know get notified that I’ve used it so
say
● It's pretty easy to just make sure that NFC is turned on and
then that’s– it’s convenient that way. It's more likely that I'm
phone behind
(P#9).
Participants’ Response Theme
● I'd have to insert the chip and sometimes that takes longer
versus if I just use my phone I can just wirelessly just pay for it
over the actual card itself, but now because of tap they’re very
● The only difference there is that on the digital wallet side you
have way better tracking when it’s been used. With push
better feeling of
security (P#12).
Participants were asked to describe their perceptions of the security mechanisms in the
mobile wallet; 10 (83.3%) of the participant’s responses were mostly positive, four (33.3%) were
mostly negative (however with some overlapping positive perceptions), and three (25%) had
According to Venkatesh and Bala (2008), positive and negative perceptions are the
node contains a high degree of the participants’ perceptions of the use of the mobile wallet
according to the UTAUT. The negative perception node contains participants with less favorable
perceptions of the mobile wallet according to the UTAUT. However, some participants
revealed their knowledge of the security components embedded in the mobile wallet. The
participants’ perceived security is increasing despite the fact many participants claimed they did
not fully understand how it works. The positive perception of the security mechanisms is
Table 10
Table 9. Participants statement and Theme for Consumers’ Security Perceptions (RQ1e)
cellphone (P#1).
whatever, that is
confidence in the efficiency. However, they hold the perception that the mobile wallet is in no
Table 11
Table 10. Participants statement and Theme for Consumers’ Security Perceptions (RQ1e)
● Nothing’s safer than cash in the sense that, I guess the reality Consume
is that if you have a credit card with a tap option turned on rs’
then it's essentially the same thing, or at least that's my view of Security
mechanisms in the mobile wallet stated that the security is not significantly different compared
to that of old payment methods. They claimed the glitches and issues are just a trade-off because
Table 12
Table 11. Participants statement and Theme for Consumers’ Security Perceptions (RQ1e)
● I think they're both the same thing, I think [laughs 00:24:55] Consume
● It's about the same. Although again, I don't know all the Security
workings behind the scene, but yeah, I feel like it's about the Perceptio
same (P#9) ns
This question focuses on the participants’ perceptions of mobile wallet transactions and is
directly tied to the main research question “What are the lived experiences of consumers after the
adoption of the mobile digital wallet?”, with reference to the conceptual framework of the
UTAUT model.
Based on the satisfaction they experienced, 10 (83.3%) of the participants described their
perceptions of the mobile transactions as positive; two (16.7%) participants described their
perspectives. The perceptions of the mobile wallet are expressed in individual comments in
Table 13.
Table 13
Table 12. Participants statement and Theme for Consumers’ Perceptions of Mobile Wallet
Transactions (RQ1f)
circle comes up. If you put your finger in and it all done
(P#1)
● It's easier just to tap and like not think about like (P#2)
● I turn on the NFC and I open the payments, so I can tap, Perception
really like, and I have my phone with me, I can just tap. I Wallet
would say that the efficiency (P#5). Transactio
● I use Apple Pay instead of reaching for my wallet. If I’m ns
paying for anything and there’s tap available, I use my
● It’s pretty quick and easy and you don’t have to pull your
Subtheme: Negative. The two participants with a negative perception had had different
experiences. P#11 did not express confidence in the security of his Apple device, while P#12
voiced that high transaction volumes are always a concern. Table 14 states the comments from
each participant.
Table 14
Table 13. Participants statement and Theme for Consumers’ Perceptions of Mobile Wallet
Transactions (RQ1f)
machines
Subtheme: Mixed. Two of the 12 participants (16.7%) had mixed feeling about the
transactions. One participant claimed the transaction is quick and straightforward. However, his
concern is similar to that of participants with a negative perception of higher transaction
volumes. The second participant expressed that his experience is much like that with traditional
credit card transactions, without significant differences. The mixed perceptions of the mobile
Table 15
Table 14. Participants statement and Theme for Consumers’ Perceptions of Mobile Wallet
Transactions (RQ1f)
open the banking app and you just tap it and then you can see
Chapter 4 contains an analysis of the data and a presentation of the findings of the
qualitative phenomenology study, in which the perceptions of 17 mobile wallet users in Toronto,
Canada were investigated. The study utilized the conceptual framework of UTAUT to describe
the perceptions of the 17 participants, Amazon mechanical Turk (MTurk) to recruit the
participants, and Skype and EVAER for the online synchronous interviews. The participants’
interview data were recorded and transcribed, while NVivo12® software was used to analyze the
data.
Six themes were formulated during the analysis, i.e., (a) consumers’ mindset, (b)
motivations for adoption, (c) challenges in mobile wallet enrollment, (d) a comparison between
physical and mobile wallets, (e) consumers’ security perception, and (f) consumers’ perception
of mobile wallet transactions. Finally, the main research question and research subquestions were
evaluated according to the formulated themes. Chapter 5 contains an interpretation of the data
collected from the participants and presents findings of the phenomenological study on
consumers’ perception of the mobile digital wallet. Chapter 5 also presents future
Lastly, the researcher documented a memo with the reasons why the nodes are important
and their relevance to the study. This chapter has focused on the acceptance of the mobile wallet
through the lived experience of the participants. The result are expanded to identify the security
problems faced by the participants and the reasons for their adoption of the mobile wallet.
CHAPTER 5: CONCLUSIONS AND RECOMMENDATIONS
The purpose of the phenomenological study was to examine the perceptions of the
users of mobile wallets. The problem statements require an understanding of the mobile wallet
users’ perceptions regarding the security capability that can accelerate the adoption of the
technology.
The purpose was to understand the cybersecurity perception of the end users of mobile
digital wallets. Despite convenience in the use of mobile wallets and potential improvements it
accorded during a transaction process, few challenges were identified after the adoption.
This chapter presents the conclusion from the study, a discussion regarding the
limitations of the study, and recommendations for future research, thereby summarizing the
dissertation. The research was a phenomenological study that utilized open-ended interviews to
collect data from participants through Skype online technology. There were 17 participants in the
research, i.e., five pilot study participants and 12 study participants. The collected interview data
were transcribed, uploaded into the NVivo12® software, and later coded and analyzed.
For the analysis, the data were organized in NVivo12® in accordance with the interview
questions and aligned with the research subquestions. The central research question was “What
are the lived experiences of consumers after the adoption of a mobile digital wallet?” The
research subquestions were developed, and labels were assigned to reflect the conceptual
framework UTAUT. The following subquestions were developed to guide the main research
question:
RQ1a: What are the thoughts of consumers when they learn about mobile wallets?
RQ1c: Which actions need to be taken to use the mobile wallet as a payment method?
RQ1d: How do mobile wallets compare to the traditional physical wallet?
RQ1f: How do consumers describe their experiences with payments and transactions?
This chapter presents a discussion of the major findings from the interviews held with
five pilot participants and 12 study participants. The key findings are listed below:
a. The majority of the participants described their perceptions in mobile wallet transactions
b. Most users of the mobile wallet in this study are between the age of 25-34
d. All pilot and study participants indicated they used mobile wallets for transactions on a
regular basis.
e. Few participants mentioned concerns about the transaction limit when using a mobile
wallet.
f. The majority of the participants were excited to adopt the new technology.
g. All participants indicated convenience and ease of use were the main factors for adoption.
Details regarding each finding and the corresponding evidence from the participants’
Discussion
The study aimed to understand the consumers’ perception of mobile wallet security,
which is an important factor to improve user experience (Svilar & Zupančič, 2016). Convenience
and ease of use are factors that can influence consumers to migrate to the payment method
(Stringer, 2014). The ability to provide both convenience and security when using mobile wallets
is becoming increasingly difficult. However, there must be a balance between them (Svilar &
Zupančič, 2016). Despite the existence of certain concerns, the overwhelming majority of the
When asked to describe thoughts and feelings about the mobile wallet, the participants
expressed feelings of excitement and curiosity. Participants described the usefulness of the
mobile wallet and, at the same time, the skepticism because it is not widely accepted. Some
participants, however, perceived skepticism of security, while others were skeptical of its
interoperability. Despite the differences in perception between different consumers, the common
perception amongst all participants was the feeling of excitement. The findings suggest that
This finding is consistent with the UTAUT construct of behavioral intentions, which
overwhelming majority of the participants expressed confidence in the mobile wallet for faster
and more convenience. The response from P#10 regarding the thoughts about the mobile wallet
suggested the technology will meet his expectations. This finding seems to build on performance
Venkatesh et al. (2003). As described in the literature review in chapter 2, UTAUT, the
conceptual framework utilized in this study, seems to be in harmony with the description of the
The key points found, regarding the consumers’ thoughts and feelings about the mobile
wallet, were excitement and convenience, as expressed by the overwhelming majority of the
participants. The findings suggest that participants believed the ability to have their debit and
credit cards on the phone removed the burden of carrying their cards with them all the time. The
possibility to carry only the phone is a factor that contributes to the excitement about the mobile
wallet. The participants’ thoughts and feelings are supported by the UTAUT conceptual
framework by Venkatesh, Thong, and Xu (2016), claiming the ability to perform a specific job
The findings also suggest that convenience and ease of use are major factors for adopting
the mobile wallet. The finding is broadly in line with research by Aydin and Burnaz (2016), who
suggested that ease of use and usefulness are more important than security concerns from the
consumers’ perspectives. However, all participants showed a preference for the security of their
information when they heard of the new technology. This suggests that the finding is partially in
line with previous research by Yan and Yang (2014), who found ease of use and usefulness were
Similarly, as described in the literature review in chapter 2, users’ perceptions are based
on the sensation of security, cost, convenience, and ease of use (Patel, 2016; Shin & Lee, 2014).
Trütsch (2016) also suggested that lack of security and perceived needs are the main factors by
which consumers may choose not to use a technology. Although the participants expressed their
concerns about the security, interestingly, none of the participants indicated a refusal to adopt the
mobile wallet. This finding converges with the research by Aydin and Burnaz (2016), in which
they showed that ease of use and usefulness are more important than security.
A statement by P#8 showed the ease of use was the main factor influencing the decision
to adopt the new technology, extending the previous study by Aydin and Burnaz (2016). Despite
the difference in research designs, Aydin and Burnaz (2016) explored nonexperimental
descriptive designs using hypotheses to address their research question about mobile wallet
results of the two studies confirm some level of correlation. Based on the literature review and
the findings from this dissertation, it is necessary to identify prevailing factors, and their levels of
enrollment is characterized by many factors, such as the type of mobile wallet and the
participant’s bank. Participants communicated potential challenges during the enrollment, such
as the waiting time on the phone for the bank to authenticate or confirm the identity of the card
These findings paralleled those of Harris et al. (2016), who concluded, based on their
research model, that familiarity is more powerful than security to measure consumers’ trust of a
mobile wallet application. The frustration expressed by the participants about the interoperability
expectance has a direct influence on the acceptance of technology (Adeyeye, 2015; Venkatesh,
Thong, & Xu, 2016; Venkatesh et al., 2003). The findings seem to build further on the study by
Huh et al. (2016), which has been reviewed in chapter 2. The study claimed that usability is a
reason for using tap-and-pay technology. Considering the similarity of using MTurk, however,
Huh et al. (2016) employed a survey questionnaire for data collection, while this study utilized
Rathore (2016) stated the challenges of finding a lost physical item are among the factors
that can affect a user’s decision to adopt a digital wallet. Of the participants in this study, 100%
prefer making their transactions using their mobile wallet instead of a physical card, due to its
ease of use without any need to insert a card, pin number, or chip. However, 16% of participants
expressed the transaction limit is a potential hindrance. When asked about the security if there
were no transaction limit, the participants explained the availability of their funds is a top
priority.
the US, where pin and chip are not widely in use. This finding suggests that higher speed and
convenience of the transactions are strong motivating factors for using the mobile wallet,
consistent with findings by Huh et al. (2017) about the relationships between less secure and
slower, less private and slower, more private and faster, and less convenient and more
convenient.
Huh et al. (2017) described how awareness about security and convenience could affect
users’ decisions to adopt new technology. Based on the literature review, the findings regarding
this theme suggested that the mobile wallet has some hindrances, as it is expected (and thus
required) to have the ability to deliver services equivalent to those available with the physical
card. Stringer (2014) suggested the players in mobile payment ecosystems should have
integrated solutions to provide the full service for paying through the phone at the physical retail
outlet.
Theme 5: Consumer’s Security Perceptions (RQ1e)
in the mobile wallet were examined based on positive, negative, and mixed responses. Of the
negative, while 7.7 % described their perceptions as mixed, although with some overlaps in the
perceptions. One of the main concepts that were applied in this study is the technology
acceptance model by Venkatesh and Bala (2008). The concept proved its relevance in the
description of the participants’ acceptance of technology based on positive, negative, and mixed
responses.
All the participants with positive perceptions expressed confidence in the security
mechanisms through the use of technologies and concepts such as a password, encryption,
tokenization, a finger print, a lock screen, a thumbprint, NFC technology, a password, HTTPS,
SSL, and pin numbers. This finding is consistent with previous research conducted by
Akinyokun and Teague (2017), who noted that users’ security awareness may facilitate the
generation of strong authentication methods, such as biometrics, for their mobile application.
Despite their lack of technical knowledge, as claimed by the participants, they asserted mobile
As analyzed in the literature review, factors contributing to the success of most mobile
payment methods include the security mechanisms that address the consumers’ security concerns
in the operating systems, secure elements, and a trusted execution environment (Stiakakis,
efficiency. However, they hold a negative or mixed perception about the security in mobile
wallets. This finding indicates that the efficiency of the mobile wallet is of higher priority than
security. This finding is in line with previous research by Yan and Yang (2014), who found that
ease of use and usefulness are significant influences on the user’s trust. Similarly, the finding
builds on the study by Huh et al. (2017), who suggested usability is the top reason for using tap-
and-pay among the users. In addition, the data collection method in this study, MTurk, was also
used in the reseach by Huh et al. (2017), who investigated why people use or do not use mobile
tap-and-pay.
characteristics, i.e., speed and easiness, straightforwardness, efficiency, the possibility of tap-
and-pay, and regular access to the phone, more than any other aspect. The findings indicate
attained when mobile wallet transaction performance expectations are met. This finding is
consistent with those by Venkatesh et al. (2003), who described performance and efficiency
improvement as factors associated with the use of mobile transactions. This study builds on the
research that was conducted in China by Zhou (2014), who identified the factors affecting the
P#6 offered a unique response regarding the use of Apple Pay wherever there is a tap.
This suggests the continued use of mobile payments is based on the trust he developed in Apple
Pay. As described in the literature review, Zhou (2014) claimed that trust influences users’
positive perceptions for future use of mobile payment. As trust directly influences perception, it
may be a reason to help decrease users’ perceived risk and increase the positive perception of the
mobile wallet.
Participant P#12 explained the ability to track transactions at a glance is a trust factor
upon which his positive perception is based. This finding is consistent with Zhou (2014), who
wrote that quality information can serve as a trust signal. Users may lose trust if wrong
information regarding their transaction balance is presented in the mobile wallet. This indicates
that trust characteristics may further build users’ trust and improve users’ experience.
Of the participants, 16.6% expressed both negative and positive perceptions. Participants
explained their perceptions of the mobile wallet transactions were negative due to the lack of
security and the transaction limit. In addition, P#11 responded that Apple has never been known
for their high security and there is always a risk. The participant showed some lack of trust in
Apple and, as Zhou (2014) claimed, trust is an important factor for a positive perception. This
should offer an engaging experience to users, in order to promote continued usage of mobile
payment.
This study explores the experiences with the digital mobile wallet among users in
Toronto, Canada. The findings in this qualitative phenomenological study describe and aid to
understand the lived experiences of consumers after the adoption of the mobile digital wallet.
Zhou (2014) reported that the focus of the available research has been mainly on users’ initial
adoption and the usage of mobile payment, whereas postadoption usage has not been fully
investigated.
Additionally, literature reveals that researchers have examined the security in mobile
devices and applications from technological standpoints; thus, behavioral research is seeking to
complement such security perspectives (Tu, Yuan, & Archer, 2014). To completely envelope the
entire findings, particularly in the light of variations among the participant's background. Unified
Theory of acceptance and use of technology (UTAUT) was used to examine the findings based
on the key construct of performance expectancy, effort expectancy, social influence, and
facilitating conditions. These four constructs influenced the mobile wallet user’s behavior
towards an adoption. The moderators-- gender, age, experience, and voluntariness of use were
also taken into consideration which allows the more compact pattern to emerge during data
analysis.
In addition, UTAUT as a model with a wide range of factors, including age and social
impact helped in giving more insight into the analysis of the participant’s data. Amongst the
determining factors in this study is the participant's age, making a reasonable difference among
the users. Most users of the mobile wallet in this study are between the age of 25-34. More
established grown-ups are not regular among the participants, maybe for not having an
A significant area to be considered within the payment ecosystem, based on the findings
in this study, is the investigation of users’ experiences in the adoption and the use of digital
mobile wallets. This may stimulate the providers to offer evidence for consumers regarding the
The findings may also contribute to the identification of the productivity of the use of the
mobile wallet and present measures to increase efficiency in the payment transactions (Oliveira,
Thomas, Baptista, & Campos, 2016). The findings may provide useful information to the device
manufacturers (Xin, Techatassanasoontorn, & Tan, 2015) to improve the mobile device security
manufacturers, and mobile wallet application vendors, based on the findings in this study,
include:
(a) Mobile wallet payment draws significantly from consumers’ familiarity with mobile
devices and application interfaces, given that mobile payment vendors offer an easy-to-
use and a well-designed mobile payment solution. However, mobile wallet vendors
offers upon completion of a transaction using the mobile wallet. Consumers need much
experience with the tap-by-device, irrespective of the devices consumers are using; they
should have a choice to set the transaction limit by themselves. Also, a security
the set limit. This recommendation addresses the findings in RQ1 through RQ1d
concerning the factors: convinience, ease of use, familairity and transaction limit.
(b) Mobile wallet vendors should develop education and awareness programs for the
potential and exisiting consumers regarding the security mechanisms in the digital mobile
wallet. The security awareness will foster a better security culture among new customers
using the mobile wallet and allow for a subsequent selection of stronger authentications.
Regarding the findings in RQe and RQ1f, it is essential that consumers be informed about
This research was designed to investigate users’ experiences among the population of
were used; purposeful sampling through the MTurk crowdsourcing application was utilized to
recruit participants. A small number of participants (N = 17) was used in this study, and this is
considered a limitation as it might not represent the entire population of mobile wallet users.
Furthermore, most users on MTurk are tech-savvy, limiting the generalizability of the results.
The study aimed to understand the individual experiences of mobile digital wallet users;
thus, the findings are possibly biased, as everyone’s mobile wallet transactions and experiences
are different. Another limitation was the participants’ limited available time for the interview.
Most participants agreed to participate voluntarily. However, they had limited time to devote to
the interview, as they were not interested in participating outside their working hours. This
The digital mobile wallet has been adopted progressively. However, previous researchers
have not fully identified many factors that could significantly improve adoption and continued
usage of the mobile wallet. The objective of this study was to build on previous research to close
the gap in our knowledge about users’ experiences during the postadoption period of the mobile
digital wallet by studying the lived experience of mobile wallet users’ perceptions.
The participants were selected through MTurk crowdsourcing, which suggests that
participants with knowledge about information technology participated in the study; this may
thus limit the generalizability of the results to the general population. Using a larger sample to
expand the study beyond the tech-savvy may provide in-depth characteristics of potential
participants. Furthermore, replicating the study using MTurk to conduct a quantitative study in a
different setting with a larger sample of participants may provide additional support for the
findings.
In the event of expanding this study, consideration should be given to the baby boomers
and Generation X age ranges. Such demographic attributes may provide more coverage to study
the experiences of mobile wallet users among adults. The findings from these age ranges may
help to identify possible challenges faced by the older adults and the possibility of developing
Summary
mobile wallet users in Toronto, Canada. The research was also meant to add to the previous
research and contribute further to the mobile wallet ecosystem, which includes the consumers
and the mobile wallet vendors. The research questions were developed based on the problem
statement, and the results of the findings directly answered the research questions.
The study addressed the experiences of consumers with the usability and security
mechanisms in the mobile wallet. The findings of the study led to the suggested
recommendations, which may aid in the development of a compelling experience for the mobile
wallet users. Among the suggested recommendations are the development of client-oriented
services by the mobile wallet vendors and education and awarenesss programs for users about
the security mechanisms and their potential strenghts in the protection of information. Future
research should consider the selection of participants in different settings and with different
demographic characteristics. The study also outlines some limitations, including the small
sample size and the limited interview time. Future research may expand to include older adults to
understand the challenges that they may face in catching up with new technologies.
REFERENCES
Adeyeye, A. (2015). Health care professionals’ perception of the use of electronic medical records
Akinyokun, N., & Teague, V. (2017). Security and Privacy Implications of NFC-enabled Contactless
Alliance, S. C. (2014). Host card emulation (hce) 101. A Smart Card Alliance Mobile and NFC Council
cluster=11192597588082592983&hl=en&as_sdt=0,5
Alliance, S. C. (2015). Technologies for Payment Fraud Prevention: EMV, Encryption, and
https://scholar.google.ca/scholar?cluster=15768748530512520614&hl=en&as_sdt=0,5
Almuairfi, S., Veeraraghavan, P., Chilamkurti, N., & Park, D. S. (2014). Anonymous proximity mobile
doi:10.1007/s12083-012-0183-1
Amaro, D. (2014). A designed research study examining the impact of using a motivational model
for mastering the crash cart (Doctoral dissertation). Available from ProQuest Dissertations &
1787144468?accountid=44888
Augsburg, C., & Hedman, J. (2014, August 05 - 06). Value Added Services and Adoption of Mobile
doi:10.17261/pressacademia.2016116555
Baptista, G., & Oliveira, T. (2015). Understanding mobile banking: The unified theory of acceptance
and use of technology combined with cultural moderators. Computers in Human Behavior, 50,
Barnes, A. (2014). Predicting consumer intention to adopt electronic payment systems using the
theory of reasoned action (Doctoral dissertation). Available from ProQuest Dissertations &
https://search.proquest.com/docview/1611235723?accountid=44888
Bezovski, Z. (2016). The Future of the Mobile Payment as Electronic Payment System.
https://scholar.google.ca/scholar?hl=en&as_sdt=0%2C5&q=ISACA%E2%80%99s+2015
+Mobile+Payment+Security+Study&btnG=
Blumenstock, J., Callen, M., Ghani, T., & Koepke, L. (2015, May 15-18). Promises and pitfalls of mobile
And Communication Technologies And Development - ICTD '15 (p.15). New York, NY: ACM.
http://dx.doi.org/10.1145/2737856.2738031
Cater, J. K. (2011). Skype a cost-effective method for qualitative research. Rehabilitation Counselors &
=0&q=Skype:+A+cost+effective+method+for+qualitative+research&hl=en&as_sdt=0,5
Cathro, H. L. (2015). Navigate chaos: Charge Nurses and Patient safety a grounded theory study
Chen, X., & Li, S. (2017). Understanding continuance intention of mobile payment services: an
10.1080/08874417.2016.1180649
Choi, D., & Lee, Y. (2016, August). Eavesdropping One-Time Tokens Over Magnetic Secure
Transmission in Samsung Pay. Workshop on offensive technology WOOT ‘16. Retrieved from
https://www.usenix.org/system/files/conference/woot16/woot16-paper-choi.pdf
Clark, M. (2017, Nov 20). Antelop solution’s HCE-NFC issuer wallet. Retrieved from
https://www.nfcworld.com/antelop/
Corbin, J., & Strauss, A. (2015). Basics of qualitative research: Techniques and procedures for
Creswell, J. W. (1998). Educational research: Planning, conducting, and evaluating quantitative and
Creswell, J. W. (2013). Research design: Qualitative, quantitative, and mixed methods approach.
Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approach.
Creswell, J. W., & Poth, C. N. (2017). Qualitative inquiry and research design: Choosing among five
Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Electronic
De, P., Dey, K., Mankar, V., & Mukherjea, S. (2015, Decemebr 17-19). An Assessment of QR Code as a
User Interface Enabler for Mobile Payment Apps on Smartphones. In Proceedings Of The 7Th
International Conference On HCI, Indiahci 2015 - Indiahci'15 (pp.81-840ages). New York, NY:
ACM. http://dx.doi.org/10.1145/2835966.2835977
from Nahua and Mayan educators (Doctoral dissertation). Retrieved from ProQuest
de Kerviler, G., Demoulin, N. T., & Zidda, P. (2016). Adoption of in-store mobile payment: Are
perceived risk and convenience the only drivers? Journal of Retailing and Consumer Services,
77071528542&hl=en&as_sdt=0,5
Dion, F.S. (2014). The examination of factors influencing social media usage by African American
small business owners using the UTAUT model (Doctoral dissertation). Retrieved from
Fan, K., Li, H., Jiang, W., Xiao, C., & Yang, Y. (2017, May 12-14). U2F based secure mutual
authentication protocol for mobile payment. In Proceedings of the ACM Turing 50th
French, C., & Reuters (2012). Widespread use of digital "wallets" to take time. Wall Street &
https://search.proquest.com/docview
/1080598027?accountid=44888
Gannamaneni, A., Ondrus, J., & Lyytinen, K. (2015, January 5-8). A post-failure analysis of mobile
payment platforms. In 48th Hawaii International Conference on System Sciences (HICSS) (pp.
George, M., Lennard, L., & Scribbins, K. (2013). Mobile Payments: Problem or Solution? Retrieved
from https://scholar.google.ca/scholar?Cluster=1845820785004497966&hl=en&as_sdt=0,5
Given, L.M. (2016). 100 questions and answers about qualitative research. Thousand Oaks, California:
Hamdi, H. (2011). Can e-payment systems revolutionize finance of the less developed countries? The
case of mobile payment technology. Journal of economics and financial issues, 1(2), 46–53.
/30BB1ABCC31C4246PQ/1?accountid=44888
Hampshire, C. (2016). Exploring UK consumer perceptions of mobile payments using smart phones and
dissertation). Available from ProQuest Dissertations & Theses Global. (Order No. 10627576).
Harper, A. (2014). Case study of the impact on business and society by mobile contactless card
technology (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses Database.
Heggestuen, J. (2015, October 14). Apple pay is ringing in a new era of payment security. Retrieved
from http://www.businessinsider.com/apple-pay-is-ringing-in-a-new-era-of-payment-security-
2015-5
Hillman, S., Neustaedter, C., Oduor, E., & Pang, C. (2014, September 23-26). User challenges and
successes with mobile payment services in North America. In Proceedings of the 16th
international conference on Human-computer interaction with mobile devices & services (pp.
Huh, J. H., Verma, S., Rayala, S. S. V., Bobba, R. B., Beznosov, K., & Kim, H. (2017). I don’t use
Apple Pay because it’s less secure. Perception of security and usability in mobile Tap-and-Pay.
=en&as_sdt=0,5
Huang, J. (2017). How Mobile Payment Is Changing The World. Students theses, papers and projects
computerscience_studentpubs/5
Iacono, V. L., Symonds, P., & Brown, D. H. (2016). Skype as a tool for qualitative research
Isaac, J. T., & Zeadally, S. (2014). Design, implementation, and performance analysis of a secure
http://doi.org/10.1007/s00607-013-0306-4
Jahangir, N., & Begun, N. (2008). The role of perceived usefulness, perceived ease of use, security, and
privacy, and customer attitude to engender customer adaptation in the context of electronic
http://search.proquest.com/openview/3efc3dfa496b2d90753befdc6f828907/1?pq-
origsite=gscholar&cbl=816394
Janghorban, R., Roudsari, R. L., & Taghipour, A. (2014). Skype interviewing: The new generation of
Jawahar, D., & Harindran, K. N. (2013). Role of affect in the acceptance of human resource information
/docview/1435377363?accountid=44888.
Jensen, O., Gouda, M., & Qiu, L. (2016, January 04-07). A secure credit card protocol over NFC.
Kakish, K., & Shah, R. D. (2016). Analysis of the Risks of NFC Mobile Payment Systems.
In Proceedings of the Conference on Information Systems Applied Research ISSN, Vol. 2167 (p.
=8393532911470227721 &hl=en&as_sdt=0,5
Kamau, C. W. (2015). Grounded theory study of emerging leadership model as applied to global
Kang, J. Y. M., Mun, J. M., & Johnson, K. K. (2015). In-store mobile usage: Downloading and usage
intention toward mobile location-based retail apps. Computers in Human Behavior, 46, 210–217.
doi: 10.1016/j.chb.2015.01.012
Kellermann, T. (2002). Mobile risk management: e-finance in the wireless environment. Journals
cluster=4996184706715842141&hl=en&as_sdt=0,5
Kothari, C. R. (2004). Research methodology: Methods and techniques. (2nd ed.). Daryaganj, New Delhi:
systems: Challenges and issues. International journal of research studies in computer science
i3/18.pdf
La Polla, M., Martinelli, F., & Sgandurra, D. (2013). A survey on security for mobile devices.
https://scholar.google.ca/scholar?cluster=3288773937632702444&hl =en&as_sdt=0,5
Lee, J. S. (2016). Citizens' political information behaviors during elections on twitter in South Korea:
https://search.proquest.com/docview/1806821483?accountid=44888
Levy, Y., & Ellis, T. J. (2006). A systems approach to conduct an effective literature review in support
https://scholar.google.ca/scholar?cluster=4239379946942475643&hl
Li, X. F., Wang, Y., Wu, J., Jiang, K., & Liu, B. W. (2012). Mobile OS architecture trends.
https://scholar.google.ca/scholar?cluster=10621602601971939252&hl=en&as_sdt=0,5
Lorenzo-Blanco, E. I., Schwartz, S. J., Unger, J. B., Zamboanga, B. L., Des Rosiers, S. E., Baezconde-
Garbanati, L., & Pattarroyo, M. (2016). Alcohol use among recent immigrant Latino/a youth:
acculturation, gender, and the Theory of Reasoned Action. Ethnicity & health, 21(6), 609–627.
doi:10.1080/13557858.2016.1179723
Madlmayr, G., Langer, J., Kantner, C., & Scharinger, J. (2008, March 4-7). NFC devices: Security and
privacy. In Third International Conference on Availability, Reliability and Security, 2008. ARES
Marshall, M. N. (1996). Sampling for qualitative research. Family practice, 13(6), 522–526. Retrieved
Massimi, M., & Neustaedter, C. (2014). Moving from talking heads to newlyweds: exploring video chat
use during major life events. In Proceedings of the 2014 conference on Designing interactive
May, J.L. (2013). The study of electronic medical record adoption in a medicare certified home health
agency using a grounded theory approach (Doctoral dissertation). Retrieved from ProQuest
Merriam, S. B., & Tisdell, E. J. (2015). Qualitative research: A guide to design and implementation. San
Millen, D., Pinhanez, C., Kaye, J., Bianchi, S., & Vines, J. (2015, March 14-18). Collaboration and
http://dx.doi.org/10.1145/2685553.2685562
Moroni, A., Talamo, M., & Dimitri, A. (2015, August 24-27). Adoption factors of NFC Mobile
Proximity Payments in Italy. In Proceedings of the 17th International Conference on Human-
Computer Interaction with Mobile Devices and Services (pp. 393–399). New York, NY: ACM.
mPayments. (2016). Smart device, smart pay. Communications Today. Retrieved from
https://search.proquest.com/docview/1782992245?accountid=44888
Murdoch, S. J., & Anderson, R. (2014). Security protocols and evidence: Where many payment systems
fail. In International Conference on Financial Cryptography and Data Security (pp. 21–32).
Okediran O. O., Arulogun O. T., Ganiyu R. A., Oyeleye C. A. (2014). Mobile operating systems and application
cluster=15243630957762779251&hl=en&as_sdt=0,5
Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Mobile payment: Understanding the
Ondrus, J. (2015, August 03-05). Clashing over the NFC Secure Element for Platform Leadership in the
Oyewole, O. S., El-Maude, J. G., Abba, M., & Onuh, M. E. (2013). Electronic payment system and
https://scholar.google.ca/ scholar?cluster5
Ozcan, P., & Santos, F. M. (2015). The market that never was: Turf wars and failed alliances in mobile
Pannifer, S., Clark, D., & Birch, D. (2014). HCE and SIM Secure Element. Retrieved from
https://scholar.google.ca/scholar?cluster=3303474980201722362&hl =en&as_sdt=0,5
Paolacci, G., Chandler, J., & Ipeirotis, P. G. (2010). Running experiments on amazon mechanical turk.
=en&as_sdt=0,5
Patel, R. K. (2016). Examining predictors of satisfaction with mobile payment systems among small
business users (Doctoral dissertation). Available from ProQuest Dissertations & Theses Global.
accountid=44888
Penttilä, M., Siira, E., & Tihinen, M. (2016). Mobile Payment Ecosystems in Transition. International
Journal of Scientific and Technical Research in Engineering, 1(6), 1–15. Retrieved from
https://scholar.google.ca/scholar?cluster=2036961057964487333&hl=en&as_sdt=0,5
Pourghomi, P., & Ghinea, G. (2013, October 28-31). Ecosystem scenarios for cloud-based NFC
Digital Ecosystems - MEDES '13 (pp. 113-118).New York, NY: ACM. doi:
10.1145/2536146.2536179
Raja, J., & Seetharaman, A. (1970). E-payments: Problems and Prospects. The Journal of Internet
Rammal, K. A. (2014). U.S. Patent No. 8,682,792. Washington, DC: U.S. Patent and Trademark Office.
en&as_sdt=0,5
https://search.proquest.com/docview/1789980625? accountid=44888
Reveilhac, M., & Pasquet, M. (2009, February). Promising secure element alternatives for NFC
technology. In First International Workshop on Near Field Communication, 2009. NFC'09. (pp.
=14090032374540451020&hl=en&as_sdt=0,5
Rhee, K., Won, D., Jang, S. W., Chae, S., & Park, S. (2013). Threat modeling of a mobile device
management system for secure smart work. Electronic Commerce Research, 13(3), 243–256.
Doi: 10.1007/s10660-013-9121-4
Rolfe, A. (2015, July 13). An introduction to the trusted execution environment for mobile services
the- trusted-execution-environment-for-mobile-services-security/
Rose, C. (2012). Close contact: An examination of the future of near field communications.
Safeena, R., Date, H., Hundewale, N., & Kammani, A. (2013). Combination of TAM and TPB in
Internet banking adoption. International Journal of Computer Theory and Engineering, 5(1),
=en&as_sdt=0,5
Saldana, J. (2015). The coding manual for qualitative researchers. Thousand Oaks, California: Sage
Publications, Inc.
Salkind, N. J. (2012). One hundred questions (and answers) about research methods. Thousand
Schein, S. (2014). The ecological worldviews and post-conventional action logics of Global
Schreft, S. L. (2007). Risks of identity theft: Can the market protect the payment system?.
https://scholar.google.ca/scholar?cluster=3766935648176245258&hl=en&as_sdt=0,5
Seibel, J., LaFlamme, K., Koschara, F., Schumak, R., & Debate, J. (2017). U.S. Patent Application No.
12663071366267267775&hl=en&as_sdt=0,5
Shen, O. W., & Yazdanifard, R. (2015). Has Mobile Payment Finally Live Up to Its
Sherman, M. (2014, June 02-03). An introduction to mobile payments: market drivers, applications,
Engineering and Systems (pp. 71–74). New York, NY: ACM. doi:10.1145/2593902.2593921
Shin, S., & Lee, W. J. (2014). The effects of technology readiness and technology acceptance on NFC
mobile payment services in Korea. Journal of Applied Business Research, 30(6), 1615–1625.
accountid=44888
Shufelt, T. (2013, February 18). Death of the wallet. Canadian Business, 86, 66. Retrieved from
https://search.proquest.com/docview/1285499830?accountid=44888
Simić, D. (2005). Reducing fraud in electronic payment systems. In Proceedings for 7th Balkan
https://scholar.google.ca/scholar?cluster=6876851909751681722&hl=en&as_sdt=0,5
Simon, M. K., & Goes, J. (2013). Assumptions, limitations, delimitations, and scope of the study.
Dissertation and scholarly research: Recipes for success (2011 Ed.). Seattle, WA : Dissertation
1006521982339287231&hl=en&as_sdt=0,5&sciodt=0,5
Smith, B., & Sparkes, A. C. (2013). Qualitative research methods in sport, exercise and health: From
Sommestad, T., Karlzén, H., & Hallberg, J. (2015). The sufficiency of the theory of planned behavior
1786146151?accountid=44888
Stiakakis, E., Georgiadis, C. K., & Andronoudi, A. (2016). Users’ perceptions about mobile security
10.1007/s10257-015-0302-7
Stringer, R. (2014). Mobile wallet ecosystem, an overview and market analysis. Retrieved from
http://www.cortexmcp.com/downloads/whitepapers/Cortex-MCP-MobileWallet-Ecosystem-Q2-
2014.pdf
Stokes, N. (2014, September 24). The good, the bad & the ugly of mobile payment. Techlicious.
smartphone/
Sullivan, J. R. (2012). Skype: An appropriate method of data collection for qualitative interviews?. The
referer=https://scholar.google.ca/&httpsredi r=1&article=1074&context=hilltopreview
Sung, S., Youn, C., Kong, E., & Ryou, J. (2015). User authentication using mobile phones for mobile
USA: IEEE.
Svilar, A., & Zupančič, J. (2016). User experience with security elements in internet and mobile
Swilley, E. (2010). Technology rejection: The case of the wallet phone. The Journal of Consumer
Taiwo, A. A., & Downe, A. G., (2013). The Theory of User Acceptance and Use of
http://www.jatit.org/volumes
/Vol49No1/7Vol49No1.pdf
Thomson, S. B. (2011). Sample size and grounded theory. Journal of Administration and
Toma, C. (2012). M-payments issues and concepts. Informatica economica, 16(3), 117–124. Retrieved
accountid=44888
Trewin, S., Swart, C., Koved, L., & Singh, K. (2016, May). Perceptions of Risk in Mobile Transaction.
In Security and Privacy Workshops (SPW), 2016 IEEE (pp. 214–223). HI, USA: IEEE.
Trichur, R. (2014, Jul 02). CIBC aims to stay ahead of technology curve; new "two-button" visa card is
https://search.proquest.com/docview/1542132920?accountid=44888
Trütsch, T. (2016). The impact of mobile payment on payment choice. Financial Markets and Portfolio
Tu, Z., Yuan, Y., & Archer, N. (2014). Understanding user behaviour in coping with security threats of
mobile device loss and theft. International Journal of Mobile Communications, 12(6), 603–623.
Doi: 10.1007/s10257-015-0302-7
Unsworth, A. (2012, July 06). Specification to prevent unauthorized access to the secure element.
access-to-the-secure-element/?v=3e8d115eb4b3
Unsworth, A. (2014, June 11). Contrasting HCE and SIM secure element approaches to NFC payments.
approaches-nfc-payments/?v=3e8d115eb4b3
Van Manen, M. (2014). Phenomenology of practice. Walnut Creek, CA: Left Coast Press.
Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on
docview/198119893?accountid=44888.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of Information
Technology: Toward a Unified View. Management Information Systems Quarterly, 27(3), 425–
Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified theory of acceptance and use of technology: A
synthesis and the road ahead. Journal of the Association for Information Systems, 17(5), 328–
Webster, J., & Watson, R. T. (2002). Analyzing the past to prepare for the future: Writing a literature
cluster=12005153504485981086&hl=en&as_sdt=0,5
Weichelt, B. P. (2016). Health in your hand: Assessment of clinician’s readiness to adopt mhealth into
rural patient care (Doctoral dissertation). Retrieved from ProQuest Dissertations and Theses
Xia, H., Wang, Y., Huang, Y., & Shah, A. (2017). "Our privacy needs to be protected at all costs": Crowd
Human-Computer Interaction, CSCW, Article 113 (pp.1-22). New York, NY: ACM.
doi:10.1145/3134748
Xin, H., Techatassanasoontorn, A. A., & Tan, F. B. (2015). Antecedents of consumer trust in mobile
payment adoption. The Journal of Computer Information Systems, 55(4), 1–10. Retrieved from
https://search.proquest.com/docview/1708804519?accountid=44888
Yamada, Y., Nakajima, T., & Sakamoto, M. (2016). Blockchain-LI. In Proceedings Of The 14Th
International Conference On Advances In Mobile Computing And Multi Media - Momm '16. (pp.
Yan, H., Yang, Z. (2014). An Empirical Examination of User Adoption Mobile Payment. In
Yang, Y., Liu,Y., Li, H., & Yu, B. (2015). Understanding perceived risks in mobile payment acceptance.
Zhang, X., Bai, Y., Hao, P., & Zhang, Y. (2017, June 19-23). Poster: Securing Device Inputs for
International Conference on Mobile Systems, Applications, and Services (p. 169).New York,
NY: ACM.
Zhong, J., Dhir, A., Nieminen, M., Hämäläinen, M., & Laine, J. (2013, October 01-04). Exploring
On Making Sense Of Converging Media - Academicmindtrek '13 (p.318).New York, NY: ACM.
http://dx.doi.org/10.1145/2523429.2523483
Zhou, T. (2014). Understanding the determinants of mobile payment continuance usage. Industrial
Zhou, T. (2015). An empirical examination of users' switch from online payment to mobile
doi:10.4018/ijthi.2015010104
Zojaji, Z., Atani, R. E., & Monadjemi, A. H., (2016). A Survey of Credit Card Fraud Detection
Yan, H., & Yang, Z. (2014, October 31- November 02). An Empirical Examination of User Adoption
Qualitative Phenomenology
Digital mobile wallet Study Contribute to the knowledge of
analysis security in mobile payment
Literature
Review Identify research gaps in digital mobile
Review of journal articles and research
works payment security and suggest better
approach
Pilot
Establish validity and Study Modify interview questions as
reliability of measurement
instrument required
Data
Recruite participants using Collection
Collect interview answers from
Amazon Mechanical Turks participants utilising Skype
Mobile 6 29 3 6
Payment
Digital Wallet 1 7 1 5
User’s 3 12 1 13
Perception
Security 5 18 2 5
Capability
Near Field 3 8 2 4
Communicati
on
(NFC)
Mobile 1 13 1 8
Payment
Adoption
Total 19 87 10 41
Male
Gender
Female
Up to 24
25-34
35-44
Age
45-54
55-64
65 >
Country of
Residence
State / Province
Below High
School
High School
College Diploma
Educational Level
University
Degree
Master’s Degree
Doctorate Degree
Student
Self-Employee
Unemployed
Other
Basic Knowledge
Intermediate Knowledge
Advance Knowledge
Apple
Samsung
Type of Mobile Device
Blackberry
Text
What form of
Social Media
technology do you use
Skype
most often to
Face Time
communicate with
E-mail
important people in
your life?
Frequently use
Experience No
APPENDIX E: RESEARCH AND INTERVIEW QUESTIONS
RQ1a: What are the thoughts Question 1: Please describe your thought and
of consumer when they know feeling when you first heard about a new payment
– Mobile payment?
or device?
mobile
payment transactions?
RQ1c: Which actions need Question 5: What are the greatest challenges you
mobile wallet as a payment wallet? Question 6: When was the first time you
method? enrolled in
traditional physical
differently?
your device?
Consent Form
Following your participation in the Amazon Mechanical Turk HITs and for passing the
qualification questions, you are thus invited to participate in a research study about the mobile
digital wallet. The study is designed to understand the consumers’ experience of the security
mechanism in the mobile wallet. This form contains the “informed consent” process, which
provides a general understanding of this study before you decide to participate. Anas Olateju
Key Considerations:
If you give your consent to participate in the study, the below key will be put into
considerations:
● The researcher will verify your identity by holding your ID up against the camera at least
● You will be interviewed about your personal experience of using a mobile wallet, and
during the interview, you may freely wish to answer all or any part of the questions.
● Your participation in this study is completely voluntary, and you can choose to
● You will give a verbal consent considering the nature of the online video interview while
of the study and will be deleted with the collected data, after the completion of the study.
● You will have the opportunity to be interviewed at your chosen and convenient
environment, as the researcher does not have the control of physical environment for this
interview.
Your participation in this study is voluntary, and your decision will be respected
accordingly, irrespective of your decision outcome. However, if you decide to participate, you
still have an option to opt out of the study anytime you so wish. You also have the liberty to
answer either in part or not to answer any question you consider personal. If you decide to join
the study now, you may change your mind later to exit the study. In addition, you may also exit
from your participation at any time you feel stressed in this study and you may as well choose to
The study does not pose any inherent risk to the participant considering the optional
nature of the interview, and the participants can discontinue. The study only offers the benefits to
understand the consumer’s experience about the security mechanism in the mobile wallet. The
understanding can assist the vendors and manufacturers to improve the mobile devices security
Compensation:
Given the nature of crowdsourcing Amazon Mechanical Turks, your participation will
earn you a financial compensation as agreed on the AMT, before the interview engagement.
Confidentiality:
Your personally identifiable information will not be collected during this study and any
information or data collected will remain confidential. The collected data will be transcribed and
stored in a computer with a password. However, the stored data may be accessible to you upon
request. The researcher will not include any attributes that could be linked to you in the report. It
is important to note that all interview discussions will be kept in strict confidence, however;
Skype has the right and controls to record your conversation. Hence, the researcher encourages
To further protect your confidentiality, the researcher has created a Skype account with a
dummy email that cannot directly link to your attributes and will be deleted upon completion of
this study. Furthermore, the physical control of the interview environment is out of the researcher
controls, and you may be unaware of a private item that can fall within the range of camera,
which can inadvertently be disclosed. Therefore, you are advised to select an appropriate
Should you have any question during and after this interview, you may contact the
For private discussion about your rights, please call Dr. William H. Butler On (240) 965-
Statement of Consent:
I have read the above information, and all my questions and concerns about the studies
have been addressed. I choose to participate in the study voluntarily and therefore sign the
Date of Consent:
different, differently
workings, works
passwords
APPENDIX I: CASES CLASSIFICATION
SUMMARY
Values Attribute Name: Age Range Cases
Assigned
18-24 3
25-34 6
35-44 1
45-54 2