However, for banks to scale border, they need an agent network which (Berger, 2009), argues that building an agent network is a challenge hindering the growth of mobile phone banking in Malawi. This is because, it is much easier for the banks to negotiate partnership agreements with chain stores because they have centralised administration unlike individuals shop owners. Unfortunately, most of the shops in the rural areas are owned by individuals. This entails negotiating agreements to be made on a store-by-store basis.
Lack of mobile phone banking regulatory framework in developing countries is another challenge hindering the growth of Mobile Banking in developing countries. According to Lyman, et al. (2006) as cited in (Pakistan, 2007) regulatory issues, from a financial regulator’s perspective, concerning mobile banking are related to consumer protection, effect of Mobile Banking on stability of banking and payment systems, legal definition of deposit, e-money regulations and provisions for agency agreements. In Malawi (Berger, 2009) argues that mobile banking is such a new industry that central banks and other government agencies are only now developing regulatory guidelines. Regulators want to ensure that consumers are pro¬tected and that the banks and telecommunications companies do not take on excessive or in...
... middle of paper ...
...ng 3g mobile services. Journal of Information Technology Management XXII, , 1-7.
TEO, T., URSAVAS, Ö. F. & BAHÇEKAPILI, E. (2011) Efficiency of the technology acceptance model to explain pre-service teachers' intention to use technology: A Turkish study. Campus -- Wide Information Systems, 28, 93-101.
TSELIOS, N., DASKALAKIS, S. & PAPADOPOULOU, M. (2011) Assessing the Acceptance of a Blended Learning University Course. Educational Technology & Society, 14, 224-235.
WEF (2006) Amplifying the Impact: Examining the intersection of Mobile Health and Mobile Finance. Geneva Switzerland, 91- 93 route de la Capite CH – 1223 Cologny/.
WESSELS, L. & DRENNAN, J. (2009) An Investigation of Consumer Acceptance of M-Banking in Australia. ANZMAC 2009.
WORTHINGTON, S. & WELCH, P. (2011) VIEWPOINT Banking without the banks. nternational Journal of Bank Marketing, 29, 190-201.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- ... Two such devices are said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other. Computer networks support applications such as access to the World Wide Web, shared use of application and storage servers, printers, and fax machines, and use of email and instant messaging applications. Computer networks differ in the physical media used to transmit their signals, the communications protocols to organize network traffic, the network's size, topology and organizational intent.... [tags: computer networks, telecommunications]
674 words (1.9 pages)
- STRATEGIC CORPORATE DEVELOPMENTS 2010 China Unicom and Ericsson Signed Telecom Management Contract (China) China Unicom’s Anhui division, a major telecom company in the country, signed a telecom management contract with Ericsson for a period of 3-years. The contract would facilitate Ericsson to be the biggest telecom operating partner in the Province of Anhui. Under the terms of the contract, Ericsson would be accountable for transmission network, field maintenance of base station as well as fixed line network.... [tags: Telecommunications]
982 words (2.8 pages)
- At this juncture, it may be somewhat difficult to accept the proposition that a threat to the telecommunications grid, both wired and wireless, in the United States could potentially be subject to a catastrophic cyber attack. After careful research on the subject, it appears the potentiality of an event of such magnitude, which either disrupts one or the other grids for a long period or destroys either, is both theoretically and realistically impossible. It may be that proponents—those who advance such theories—equate such “doomsday” scenarios as if a cyber attack would or could be of the same magnitude as a conventional or nuclear military strike.... [tags: Telecommunications Cyber Attacks]
878 words (2.5 pages)
- INTRO: Splintering urbanism can be better defined and understood by taking each word and their definition individually and then bringing them together and looking at the two words as a whole. Splintering refers to splitting or breaking up into parts, a fragmentation. Urbanism can be defined as the pattern of behaviour, relationship and modes of thought characteristic of urban life. Graham and Marvin define splintering urbanism as the dialectical and diverse sets of processes surrounding the parallel unbundling of infrastructure networks and the fragmentation of urban space is described by the broad umbrella term ‘Splintering Urbanism’ (Graham & Marvin, Splintering Urbanism, 2010).... [tags: Urban Development ]
1513 words (4.3 pages)
- The telecommunications industry and other United States manufacturing sectors have been severely challenged by continuously competitive market place. The future of telecommunication and the manufacturing of goods is truly at risk. With consumers demanding more for less, high infrastructure costs and outsourcing most can barely keep up. Deregulation, digitalization of services have made telecommunications one of the most volatile growth industries in history and one of the more extraordinarily competitive.... [tags: Telecommunications Industry Marketing Report Analy]
1601 words (4.6 pages)
- ... • The company is having brand in the market. • The company is kind of big company, so it can easily spare the extra budget involved in the Upgradation of the network. • The company is well versed with the technology and the end users use the local Intranet for class sessions and videos. Weakness (W) • Lack of Secuirty program could be a isuue. • The data leakage issue could be very high in case of any failure would happen in any part of the upgrade in the network infrastructure. • Slow data transfer and black out during the upgrade while switching from the old infrastructure to the new one.... [tags: SWOT analysis, computers]
631 words (1.8 pages)
- Table of Content Introduction 3 PBX and Centrex 4 Rotary and DTMF 6 WATS and Leased Lines 7 ISO and OSI 9 Conclusions 11 Reference List 12 Introduction Networking and telephony is a part of our everyday environment, whether it be in our homes or in our place of business. We will somehow come into contact with one or the other in some shape or fashion. At Baker, we are no different from any other business. The infrastructure of Baker is not a simple pc and telephone setup. The network incorporates everything from a simple analog line to our data network backbone that is made of T-3 lines, ISND lines, and IPFR provided by the AT&T datacenter.... [tags: Networks Telecommunications]
1744 words (5 pages)
- Infrastructure and Economic Prosperity A famous Canadian geographer was once quoted saying, “ …any region which has a well developed transportation and communication network also enjoys a high degree of economic prosperity…”. This statement has sparked much controversy between geographers, as well as economists. The argument is, is there a direct link between a developed infrastructure and economic prosperity. Without a doubt, there is a direct link between economic prosperity and a well-developed system of transportation and communication.... [tags: essays research papers]
1001 words (2.9 pages)
- In 1990s In 1998, mobile companies such as Motorola have developed high tech models with built-in FM radio and infrared connectivity. Ten years later, many phones have options for video calling, digital camera, wireless networking, responding to emails. After five more years later, Skype company has developed a new platform which allow users to make free phone calls between any two computers. Telecom industry has used long-established R&D models which main purpose was to keep the whole process of innovating new products and services in secret so no competition will be created.... [tags: technology, customers, innovation]
1109 words (3.2 pages)
- Critical Infrastructure Protection Explained The outflow "critical infrastructure" implies belonging of physical and PC based frameworks that are central to the base operations of an economy and its government. They consolidate, however are not compelled to, telecommunications, power, sparing cash and record, transportation, water frameworks and emergency organizations, both government and private. Notwithstanding the way that various nation's critical infrastructures have undeniable been physically and reasonably isolated as frameworks that had little acquaintanceship, in any occasion, until 9/11, improvements in information building with consultations performed to upgrade proficiency in... [tags: Spearphishing, Cybersecurity]
1367 words (3.9 pages)