000 11162nam a2201225Ia 4500
000 08995ntm a2200205 i 4500
001 75115
003 0
005 20250920173549.0
008 181122n 000 0 eng d
010 _z
_z
_o
_a
_b
015 _22
_a
016 _2
_2
_a
_z
020 _e
_e
_a
_b
_z
_c
_q
_x
022 _y
_y
_l
_a2
024 _2
_2
_d
_c
_a
_q
028 _a
_a
_b
029 _a
_a
_b
032 _a
_a
_b
035 _a
_a
_b
_z
_c
_q
037 _n
_n
_c
_a
_b
040 _e
_erda
_a
_d
_b
_c
041 _e
_e
_a
_b
_g
_h
_r
043 _a
_a
_b
045 _b
_b
_a
050 _a
_a
_d
_b2
_c0
051 _c
_c
_a
_b
055 _a
_a
_b
060 _a
_a
_b
070 _a
_a
_b
072 _2
_2
_d
_a
_x
082 _a
_a
_d
_b2
_c
084 _2
_2
_a
086 _2
_2
_a
090 _a
_a
_m
_b
_q
092 _f
_f
_a
_b
096 _a
_a
_b
097 _a
_a
_b
100 _e
_e
_aMary Ann Christine R. Baltazar et.al.
_d
_b4
_u
_c0
_q16
110 _e
_e
_a
_d
_b
_n
_c
_k
111 _a
_a
_d
_b
_n
_c
130 _s
_s
_a
_p
_f
_l
_k
210 _a
_a
_b
222 _a
_a
_b
240 _s
_s
_a
_m
_g
_n
_f
_l
_o
_p
_k
245 0 _a
_aFamiliarity of Bank Account Holder on Security Features: Implications in overcoming fears on security issues in electronic banking / /
_d
_b
_n
_cMary Ann Christine R. Baltazar; Siegfried J. dela Cruz; Dan Dominic E. Inalves; Ivory C.manio; Harra Princess P. Montances; Terence P. Sopelario and Gladys L. Villareal.
_h6
_p
246 _a
_a
_b
_n
_i
_f6
_p
249 _i
_i
_a
250 _6
_6
_a
_b
260 _e
_e
_a
_b
_f
_c
_g
264 _3
_3
_a
_d
_b
_cSeptember 2014.46
300 _e
_e
_c28 cm.
_a110 pp.
_b
310 _a
_a
_b
321 _a
_a
_b
336 _b
_atext
_2rdacontent
337 _3
_30
_b
_aunmediated
_2rdamedia
338 _3
_30
_b
_avolume
_2rdacarrier
340 _2
_20
_g
_n
344 _2
_2
_a0
_b
347 _2
_2
_a0
362 _a
_a
_b
385 _m
_m
_a2
410 _t
_t
_b
_a
_v
440 _p
_p
_a
_x
_v
490 _a
_a
_x
_v
500 _a
_aUndergraduate Thesis (BS in Business Administration major Financial and Treasury Management) - Pamantasan ng Lungsod ng Maynila, 2014.
_d
_b
_c56
504 _a
_a
_x
505 _a
_a
_b
_t
_g
_r
506 _a
_a5
510 _a
_a
_x
520 _b
_b
_c
_aABSTRACT: Statement of the Problem: This study determined the familiarity of bank account holder on security features of electronic banking. It answered the demographic profile of the bank account holder who used electronic banking. It also seeks to know the familiarity of bank clients on security features and the extent of familiarity of bank clients on security features. It also seeks to know the level of confidence of the clients on the security features in availing transactions through electronic banking. Research Design: The researchers used descriptive method of research in order to illustrate the familiarity of bank accountholders on the security features of electronic banking facilities. The method was applicable to the study as it gives better and deeper understanding of the target subject through analysis and interpretation of the data gathered in the study. It will clearly define and determine the factors affecting the security issues of electronic banking. Further, descriptive method is a purposive gathering, analysing tabulating and classifying data about prevailing conditions and processes which is needed in the study. Determination of Sample Size: By using random sampling, the researchers select respondents from the population via random numbers. The researchers used Slovene's formula for the large sample size. Sampling Design and Technique: Referred to Sirug (2011), random sampling was applied where the researchers based on the selection of the sample on population size via random picked of mall shoppers inside SM, Manila. The Subjects: The stakeholders which are the respondents of the study are the bank accountholders of different banks. In order for the researcher to have brief background, the researchers conducted interview with Mr. Andro Leo Beltran, Senior Manager of Asset Management and Trust Services Group and Ms. Leah Felizardo, Assistant Vice President of BPI to give the researchers insights of the study. The Survey questionnaires were given to those bank clients who avails the product and services through electronic banking facilities of banks. Convenience approach was used in the case of the interviewee and the distribution of survey questionnaires. Research Instrument: In getting data for analysis, the instrument or tools used in research as basis for drawing conclusions or making inferences are the following: Interview: Through this method, the researchers were not only equipped with the most reliable and accurate information about BPI but also allowed to fully understand the security regulations and features of electronic banking facilities given. Likewise, a purposive interview method was conducted to have in-depth comprehension of security features e-banking system. The respondents for the interview were one of the bank's employees, in-charge in the electronic banking system since they are familiar in the regulations of the company's e-banking system. For the interview, the researchers constructed several question to receive a desired answer that is necessary in solving a specific problem. This is where data gathering occurs by asking questions for much needed information from the interviewee verbally and directly. Questionnaire: The questionnaire was the principal instrument used in this study, a questionnaire is a printed self-report from designed to elicit information that can be obtained through the written responses of the subjects. The information obtained through a questionnaire is similar to that obtained by an interview, but the questions tend to have less depth. The questionnaire that was used in this study was designed to obtain information on the familiarity of bank account holders on the security features and overcoming fears on security issues in electronic banking. A list of alternative responses was provided for the respondents to choose which best suits their idea. Also, almost all the questions are closed-ended and used Likert type of scale to give the respondents the opportunity to impact their own ideas and answers. Validation of the Research Instrument: Through books, journals, researches, and other reading materials, the researchers used self-made simple questionnaires and draft was shown to the adviser and the research panellists for comment, suggestion and approval. Comments and suggestions from BPI, the defense panel and the adviser were also incorporated for final draft. In addition, the researchers conducted initial testing for the survey questionnaires, to test whether the survey forms are effective or not. Data Gathering Procedure Prior to the conduct of the study, the researchers chose BPI as a basis point of view in terms of knowing the security measures and features on online banking transactions. The researchers went to SM Manila and waited from 10:03 a.m. until 11:00 a.m. to gather population. The researchers got a total of 1,453 people, through Slovene formula the researchers came up with a sample size of 314 respondents and selected SM food court to get the computed sample size and to conduct the survey. The researchers informed the respondents about the purpose of the study and assured them of the confidentiality of their answers. Distribution and retrieval of survey questionnaire was done according to the availability of the researchers and respondents. Data Processing Method: After collecting the data and have been categorized and arranged, the researchers tabulated the data by using frequency distribution for the data regarding the categorical and ordinal level data of the survey questionnaires. The data gathered were analysed. The researchers made an evaluation on the familiarity of the bank accountholders on the security features of different electronic banking facilities which is an implication in overcoming fears on security issues in e-banking. The responses were categorized based on their familiarity on the security features provided in each electronic banking facility, the frequency of transactions via electronic banking and lastly, based on the respondents level of confidence on the security features of electronic banking facilities. Statistical Treatment: The statistical treatment that the researchers used are based on the nature of the statement of the problem, particularly the specific problems as well as the type of data gathered. The researchers used frequency and percentage distribution which identified the total number of observations as well as the percentage of each item by dividing it with the total number of respondents to capture parts which represents the whole. The formula to use for the statistical treatment is: P=f/n x 100 Wherein: P - Percentage, F- Frequency , n= Total number of the respondents The researchers also used Arbitrary scale for the researchers will easily determine and interpret the level of familiarity as well as the confidence of the respondents. 5-Extremely Familiar/confident 4-Highly Familiar/confident 3-Familiar/confident 2-Slightly Familiar/confident 1-Not at all/confident To be able for the researchers to test whether to accept or reject the null hypothesis of the study, the researchers used Chi-square test of independence which random sample and large sample size are assured. It was then used to come up with the hypothesized the demographic profile as to gender. It is where the frequency of one nominal variable is compared with different values of the nominal variable. Another type of hypothesis testing that the researchers used was One Sample T-test, wherein, the researchers were able to know the mean difference between the sample and the known value of the population mean. The last type of hypothesis testing that the researchers used was ANOVA (Analysis of Variance). It is used to compare treatment means of randomized block design of the significant difference in the frequency of the transactions via electronic banking facilities.
_u
521 _a
_a
_b
533 _e
_e
_a
_d
_b
_n
_c
540 _c
_c
_a5
542 _g
_g
_f
546 _a
_a
_b
583 _5
_5
_k
_c
_a
_b
590 _a
_a
_b
600 _b
_b
_v
_t
_c2
_q
_a
_x0
_z
_d
_y
610 _b
_b
_v
_t2
_x
_a
_k0
_p
_z
_d6
_y
611 _a
_a
_d
_n2
_c0
_v
630 _x
_x
_a
_d
_p20
_v
648 _2
_2
_a
650 _x
_x
_a
_d
_b
_z
_y20
_v
651 _x
_x
_a
_y20
_v
_z
655 _0
_0
_a
_y2
_z
700 _i
_i
_t
_c
_b
_s1
_q
_f
_k40
_p
_d
_e
_a
_l
_n6
710 _b
_b
_t
_c
_e
_f
_k40
_p
_d5
_l
_n6
_a
711 _a
_a
_d
_b
_n
_t
_c
730 _s
_s
_a
_d
_n
_p
_f
_l
_k
740 _e
_e
_a
_d
_b
_n
_c6
753 _c
_c
_a
767 _t
_t
_w
770 _t
_t
_w
_x
773 _a
_a
_d
_g
_m
_t
_b
_v
_i
_p
775 _t
_t
_w
_x
776 _s
_s
_a
_d
_b
_z
_i
_t
_x
_h
_c
_w
780 _x
_x
_a
_g
_t
_w
785 _t
_t
_w
_a
_x
787 _x
_x
_d
_g
_i
_t
_w
800 _a
_a
_d
_l
_f
_t0
_q
_v
810 _a
_a
_b
_f
_t
_q
_v
830 _x
_x
_a
_p
_n
_l0
_v
942 _a
_alcc
_cBK
999 _c24797
_d24797