Digital Lending: Strengthening Technology Risk Management ...

80
UNIVERSITY OF NAIROBI COLLEGE OF BIOLOGICAL AND PHYSICAL SCIENCES SCHOOL OF COMPUTING AND INFORMATICS DIGITAL LENDING: STRENGTHENING TECHNOLOGY RISK MANAGEMENT IN MOBILE MONEY LENDING GEOFREY NYAMARI OGOTI REG NO: P54/6142/2017 SUPERVISOR: CHRISTOPHER A. MOTURI A Research Project Submitted in Partial Fulfilment of the Requirement for the Award of the Degree of Master of Science in Information Technology Management, School of Computing and Informatics, University of Nairobi June 2019

Transcript of Digital Lending: Strengthening Technology Risk Management ...

UNIVERSITY OF NAIROBI

COLLEGE OF BIOLOGICAL AND PHYSICAL SCIENCES

SCHOOL OF COMPUTING AND INFORMATICS

DIGITAL LENDING: STRENGTHENING TECHNOLOGY

RISK MANAGEMENT IN MOBILE MONEY LENDING

GEOFREY NYAMARI OGOTI

REG NO: P54/6142/2017

SUPERVISOR: CHRISTOPHER A. MOTURI

A Research Project Submitted in Partial Fulfilment of the Requirement for the Award of the

Degree of Master of Science in Information Technology Management,

School of Computing and Informatics, University of Nairobi

June 2019

11

2.8.1 The Risk Governance Perspective in the Technology Lending

The risk governance perspective focuses on key areas of ICT risk, these are tolerance,

awareness and communication, appetite, accountability and culture. (ISACA, 2009).

In this study, it is recognized that an organization’s technologies are key assets as they set the

rate at which change and adaptability in a firm can happen (Zhu et al. 2006). In light of this,

proper risk governance of all the resources an organization has are key to ensure adaptability

in a competitive environment that does not allow for error. The resources can be linked to

people, process or technology.

In review of literature, a well-managed risk governance structure ensures that all innovation

gaps within a firm are filled to influence greater rate of growth. (Dwivedi, Nripendra, Anand,

Clement, & Williams, 2017)

Figure 1: Proposed Framework. Source: (ISACA, 2009)

13

Figure 2: Conceptual framework

Hypothesis 1 – IT risk governance has a significant influence on the adequacy of technology

risk management.

Hypothesis 2 – IT risk evaluation has an influence on the adequacy of technology risk

management.

Hypothesis 3 – IT risk response mechanisms have an effect on the adequacy of technology risk

management.

Hypothesis 4 – Whether a firm is regulated or not has an effect on its adequacy of technology

risk management

15

Table 1: Sampled Mobile Lenders

Bank Number of Loan

Accounts (in Millions)

% of the

Market

1 KCB Bank Kenya Ltd 1.263 17.70%

2 Co - operative Bank of Kenya Ltd 0.62 8.70%

3 Equity Bank Kenya Ltd 0.67 9.40%

4 Standard Chartered Bank (K) Ltd 0.05 0.70%

5 Diamond Trust Bank 0.015 0.20%

6 Barclays Bank of Kenya Ltd 0.222 3.10%

7 Commercial Bank of Africa 3.92 54.80%

8 Stanbic Bank Kenya Ltd 0.032 0.40%

Total 6.792 94.90%

3.3 Sampling Frame and Technique

Purposive sampling was employed in this research as it enables a researcher to select

information that is relevant and rich in content to the issues under study (Kombo & Tromp,

2006). In this case, purposive sampling is applied to only the institutions that are offering

mobile money lending.

A sample size of 30 and above was deemed acceptable (Oates, 2006). The research required

input from respondents at various levels involved in the technology risk management and

digital lending process e.g. top management, supervisors and junior staff; as well employees in

different areas of specialization e.g. technology, credit, finance, systems audit, financial audit.

From each of these stratums, simple random sampling was used to select respondents from

whom information was obtained.

Table 2: Sampling Frame for Questionnaires

Department Function Sample

Technology Systems Design, Maintenance and Development 10

Audit Systems Audit 10

Credit Lending Management 10

Risk Risk Management 10

Information Security Cyber and information security management 10

17

Figure 3: Interpretation of Cronbach's Alpha

Validity is the accuracy of inferences based on research results (Mugenda, 2008).

To establish the validity of the questionnaire, three experts were provided with the

questionnaire. One expert was an information systems auditor, another was a financial analyst

while the last one was a credit rating professional. Each of the experts scored items each item

on a scale and gave recommendations. The recommendations helped to improve the

questionnaire wording and placement.

The content validity index (CVI) was calculated as:

Content Validity Index = 𝐴𝑔𝑟𝑒𝑒𝑑 𝐼𝑡𝑒𝑚𝑠 𝑏𝑦 𝐸𝑥𝑝𝑒𝑟𝑡𝑠 𝑎𝑠 𝑆𝑢𝑖𝑡𝑎𝑏𝑙𝑒 𝑎𝑛𝑑 𝑉𝑎𝑙𝑖𝑑

𝑇𝑜𝑡𝑎𝑙 𝑁𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝐼𝑡𝑒𝑚𝑠

Table 3: Content Validity Index Measurement

Relevant Not Relevant Total

Information Systems Auditor (Expert 1) 30 3 33

Credit Risk Analyst (Expert 2) 28 5 33

Financial Analyst (Expert 3) 31 2 33

Total 89 10 99

The CVI value obtained of 0.8989 enabled the questionnaire to pass the validity test. A pilot

test was conducted after establishing the reliability and validity.

48

The variables were mapped for regression analysis as illustrated below:

Figure 4: Mapping of Variables for Regression Analysis

The results based on the data and analysis done in R is as below:

Figure 5: Regression Analysis - Test of Hypothesis

51

The detailed R output is shown below:

Figure 6: Correlation Analysis

The results show that the independent variables are strongly and positively correlated to the

dependent variable with statistically significant p-values.

53

Figure 7: Comparison of Risk Governance Performance

Regulated entities outperform their unregulated competitors. In assessing the adequacy of

technology risk management in regulated and unregulated digital lending environments, a

review was done on evaluation and response mechanisms.

The results shown below show that for regulated entities, there is a thorough understanding of

technological threats and the actions in response of the harm they are likely to cause.

For unregulated entities there is opportunity for growth and development in this area. Gaps

were identified that expose weaknesses in evaluation of technology risks and responses in a

timely manner. These gaps could be exploited and expose the firms to loss of revenue and

reputation.

Figure 8: IT Risk Evaluation and Response Comparison

59

REFERENCES

Adem, O., Gichuhi, A. W., & Otieno, R. O. (2012). Parametric Modeling of Probability of

Bank Loan Default in Kenya. Journal of Agriculture,Science and Technology, 14(1),

61 – 74.

Aduda, J., & Gitonga, J. (2011). The Relationship between Credit Risk Management and

Profitability among the Commercial Banks in Kenya. Journal of Modern Accounting

and Auditing, 7(9).

Ahlan, A. (2012). Information Technology Risk Management: The case of the International

Islamic University Malaysia. Journal of Research and Information in Information

Systems, 58-67.

Ali, R., Barrdear, J., Clews, R., & Southgate, J. (2014). Innovations in Payment Technologies

and the Emergence of Digital Currencies. Bank of England Quarterly Bulletin, 54(3),

262-275.

Al-Jabri, I., & Sohail, S. (2012). Mobile Banking Adoption: Application of Diffusion of

Innovation Theory. Journal of Electronic Commerce Research, Vol. 13, No. 4, 371 -

396.

Allen, F., Carletti , E., Cull, R., Qian, J., Senbet, L., & Valenzuela, P. (2013). Improving

access to banking. Evidence from Kenya. Washington, DC.: World Bank. Retrieved

from http://hdl.handle.net/10986/16044

Alliance for Financial Inclusion. (2012). AFI Global. Retrieved from AFI Global Website:

https://www.afi-global.org/news/2012/11/safaricom-cba-launch-groundbreaking-

mobile-banking-service-m-shwari

Almari, A. (2002). The Credit Evaluation Process and the Role of Credit Scoring: A Case

Study of Qatar. Dublin: University College Dublin.

Azjen. (1985). From intentions to actions:A theory of planned behaviour. New York:

Springer-Verlag.

Bamwesigye, J. (2008). Microfinance and Poverty Reduction in Rwanda: A case of Urwego

Opportunity Microfinance Bank. Thesis (Maters Degree). Retrieved February 25,

2019, from https://thesis.eur.nl/pub/7054/Bamwesigye%20PPSD%202007-08.pdf

Beck, T., Demurgic-Kunt, A., & Martinez, P. M. (2007). Banking services for Everyone?

Barriers to Bank Access and Use around the world. Washington, D.C: World Bank.

Bernard, H. R. (2000). Social research methods : qualitative and quantitative approaches.

Thousand Oaks, California: Sage Publiactions.

Björkegren, D., & Darrell, G. (2018). The Potential of Digital Credit to Bank the Poor. AEA

Papers and Proceedings, 108, 68 -71.

Blechman, J. G. (2016). Mobile credit in Kenya and Tanzania: Emerging regulatory. The

African Journal of Information and Communication (AJIC).

60

Bolton, C. (2013). Logistic Regression and its application in credit scoring. Pretoria:

University of Pretoria.

Bryman, A., & Bell, E. (2011). Business Research methods (4th Edition ed.). London: Oxford

University Press.

Brynjolfsson, E., Hitt, L. M., & Bresnahan, T. F. (2002). Information technology, workplace

organization, and the demand for skilled labor: Firm-level evidence. The Quarterly

Journal of Economics, 117(1), 339-376.

Brynjolfsson, E., Malone, T. W., Gurbaxani , V., & Kambil, A. (1994). Does Information

Technology Lead to Smaller Firms? Management Science, 40(12), 1628-1644.

Buku, M., & Meredith, M. (2012). Safaricom and M-Pesa in Kenya: financial inclusion and

financial integrity. 8 Wash. J. L. Tech. & Arts 375.

Burtch, G., Ghose, A., & Wattal, S. (2013). Cultural Differences and Geography as

Determinants of Online Pro-Social Lending. Retrieved from MIS Quarterly,

Forthcoming; Fox School of Business Research Paper No. 14-021. :

http://dx.doi.org/10.2139/ssrn.2271298

Can, E., & Gansmann, A. (2015). A semi-parametric Probability of Default Model. Retrieved

from http://arc.hhs.se/download.aspx?MediumId=2818

Cassar, D. (2018, January 25). Retrieved February 19, 2019, from IAPSS:

https://iapss.org/2016/01/25/demystifying-the-economic-growth-elixir-growth-

without-development/

Central Bank of Kenya. (2011). National Payments System Act. Retrieved from Central Bank

of Kenya Website:

https://www.centralbank.go.ke/images/docs/legislation/NATIONAL%20PAYMENT

%20SYSTEM%20ACT%20(No%2039%20of%202011)%20(2).pdf

Central Bank of Kenya. (2017). Banking Supervision Report. Nairobi, Kenya: Central Bank

of Kenya.

Chatian, P. L., Zerzan, A., Noor, W., Dannaoui, N., & De Koker, L. (2016). Internet, Finance

and Development. Washington, D.C: World Bank.

Chau, P. K., & Kuan, K. Y. (2001). A perception-based model for EDI adoption in small

businesses using a technology–organization–environment framework. Information &

Management, 38(8), 507-521.

Chau, P., & Kar, T. Y. (1997). Factors Affecting the Adoption of Open Systems: An

Exploratory Study. MIS Quarterly. MIS Quarterly, 1 - 21.

Chiang, W. K., Zhang , D., & Zhou, L. (2006). Predicting and explaining patronage

behaviour toward web and traditional stores using neural networks: A comparative

analysis with logistic regression. Decison Support Systems, 41(2), 514-531.

Consultative Group to Assist the Poor (CGAP). (2017). Serving Smallholder Farmers: Recent

Developments in Digital Finance. Washington, DC: Consultative Group to Assist the

Poor (CGAP).

61

Creswell, J. (2014). Research design: Qualitative,Quantitative and Mixed Methods

Approcahes (4th ed.). Washington, D.C: Sage Publications.

Crook, J. (1996). Credit scoring: An overview. European Journal of Operational Research,

95, 24-37.

Crook, J., Overstreet, G., & Desai, V. (1996). A Comparison of Neural Networks and Linear

Scoring Models in the Credit Union Environment. European Journal of Operational

Research., 95(1), 24-37.

Crowther, D., & Lancaster, G. (2008). Research Methods: A Concise Introduction to

Research in Management and Business Consultancy. (2nd ed.). London: Elsevier

Butterworth-Heinneman .

Dasgupta, C., Dispensa, G., & Ghose, S. (1994). Comparing the predictive performance of a

neural network model with some traditional market response models. International

Journal of Forecasting., 10(2), 235-244.

Data Centre Frontier. (2016). Data Center Costs. Retrieved from

https://datacenterfrontier.com/cost-of-data-center-outages/

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of

information technology. MIS Quarterly, 13(3), 319-340.

Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of

Information Technology. MIS Quarterly, 13(3), 319-340.

Delmas, M. A. (2002). The diffusion of environmental management standards in Europe and

in the United States: An institutional perspective. Policy Sciences, 35(1), 91-119.

Demirkan, H., & Harmon, R. (2009). Service Oriented Technology in Healthcare Services: A

Research Framework for Studying the Computerized Physician Order Entry System.

PICMET 2009 Proceedings. Portland, Oregon, USA.

DePietro, R., Wiarda, E., & Fleischer, M. (1990). The Context for Change: Organization,

Technology, and Environmental. In L. G. Tornatzky, & M. Fleischer, The Process of

Technological Innovation (pp. 151-175). Boston: Lexington Books.

DeYoung, F., Glennon, D., & McMillen, D. (2008). Commercial lending distance and

historically underserved area. Journal of Economics and Business, 60(1-2), 149-164.

Dombora, S. (2016). Characteristics of information security implementation methods.Volume

of Management, Enterprise and Benchmarking in the 21st Century III. Óbuda

University, Keleti Faculty of Business and Management.

Donou-Adonsou, F., & Slywester, K. (2016). Financial Development and poverty reduction

in developing countries: New evidence from banks and microfinance institutions.

Review of Development Finance, 6(1), 82-90.

Dwived. (n.d.).

62

Dwivedi, Y. K., Nripendra, R. P., Anand, J., Clement, M., & Williams, M. D. (2017). Re-

examining the Unified Theory of Acceptance and Use of Technology (UTAUT):

Towards a Revised Theoretical Model. Information Systems Frontiers, 1-16.

Eposito, J. L. (n.d.). Interactive, multiple-method questionnaire evaluation research: A case

study. . Paper presented at the International Conference in Questionnaire

Development, Evaluation, and Testing (QDET) Methods. Charleston, SC.

Ertan , C., & Gansmann, A. (2015). A semi-parametric Probability of Default model.

Stockholm: Stockholm School of Economics.

Esposito, J. L. (2004). Interactive, multiple-method questionnaire evaluation research: A case

study. Paper presented at the International Conference in Questionnaire

Development, Evaluation, and Testing (QDET) Methods. Charleston, SC.

Fosu, S. (2014). Credit information, consolidation and credit market performance: Bank-level

evidence from developing countries. International Review of Financial Analysis, 32,

23-56.

Foundation for Development Cooperation. (2017). Foundation for Development Cooperation.

Retrieved from Policy and Regulation: https://www.fdc.org.au/policy-and-regulation

Francis, E., Blumenstock, J., & Robinson, J. (2017). Digital Credit: A Snapshot of the

Current Landscape and Open Research Questions. UC Berkeley.

FSD Africa. (2016). The Growth of M-Shwari in Kenya – A Market Development Story.

Nairobi, Kenya: Financial Sector Deepening.

Galliers, R. (1991). Research issues in Information Systems. Journal of Information and

Technology, 92 - 98.

Gallivan, M. (2001). Organizational adoption and assimilation of complex technological

innovations: development and application of a new framework. Information Systems -

Special issue on adoption, diffusion, and infusion of IT, 51-85.

Gibbs, J., & Kraemer, K. (2004). A cross-Country Investigation of the Determinants of Scope

of ECommerce Use: An Institutional Approach. Electronic Markets, 124 - 137.

Gichuhi, A. O. (n.d.). Parametric Modeling of Probability of Bank Loan Default in Kenya.

Government of Kenya. (2009). The Kenya Proceeds of Crime and Anti-Money Laundering

Act. Retrieved from The Kenya Proceeds of Crime and Anti-Money Laundering Act:

http://www.frc.go.ke/downloads/download/10

Griffith-Jones, S., Karwowski, E., & Dafe, F. (2014). A Financial sector to support

development in low-income countries. London: Overseas Development Institute.

Grossman, J., & Tarazi, M. (2014). COE. Retrieved from Criminal Money Flows on the

Internet: Methods, Trends and MultiStakeholder Counteraction.: http://www.coe.int/t

/dghl/monitoring/moneyval/

GSMA. (2016). State of the Industry Report on Mobile Money Decade Edition: 2006 - 2016.

GSMA.

63

Gurak, H. (2015). Economic Growth and Development: Theories, criticisms and an

alternative growth model. PL Academic Research.

Halty, M. (2002). Microfinance, Grants, and non-financial responses to poverty reduction:

where does microcredit fit? (Consultative Group to Assist the Poor.

Hitt, L. (1999). An Empirically Derived Model for the Adoption of Customer-Based

Interorganizational Systems. Decision Sciences, 603 - 639.

Hoti, E. (2015). The technological, organizational and environmental framework of IS

innovation adaption in small and medium enterprises. Evidence from research over

the last 10 years. International Journal of Business and Management, 1 - 14.

Hox, J., & Boeije H. (2005). Data Collection, Primary vs. Secondary. Encyclopedia of Social

Measurement, 593.

Hussey, R., & Collis, J. (2013). A practical guide for undergraduate and postgraduate

students (4th ed.). London: Palgrave Macmillan.

Iacovou, C., Benbasat, I., & Dexter, A. (1995). Information Technology and Firm

Boundaries: Evidence From Panel Data. Information Systems Research, 134 - 149.

Infomineo. (2017). Infomineo. Retrieved from Mobile Banking and Why It's Growing in

Africa: https://infomineo.com/mobile-banking-and-why-its-growing-in-africa

Information Systems Audit and Control Association. (2017). CISA - ISACA Review Manual.

Information Systems Audit and Control Association.

Institute for Internal Auditors. (2007). Guide to the Assessment of IT Risk. New York:

Institute for Internal Auditors.

International Finance Corporation. (2018). DIGITAL ACCESS: The Future of Financial

Inclusion in Africa. Nairobi, Kenya: International Finance Corporation.

ISACA. (2009). ISACA RIsk IT Framework. Retrieved from

http://www.isaca.org/KNOWLEDGE-

CENTER/RESEARCH/RESEARCHDELIVERABLES/Pages/The-Risk-IT-

Framework.aspx

ISO/IEC, ISO/FDIS 27005. (2008). ISO/IEC, ISO/FDIS 27005. International Organization for

Standardization (ISO).

ISO/IEC, ISO/IEC27006. (2007). Requirements for Bodies Providing Audit and Certification

of Information Security Management Systems. Switzerland: International Organization

for Standardization (ISO).

Jack, W., & Suri, T. (2011). Mobile Money: The Economics of M-PESA. NBER Working

Paper No. 16721, JEL No. O16,O33,O55.

Johnson, S. (2016). Competing visions of financial inclusion in Kenya: the rift revealed by

mobile money transfer. Canadian Journal of Development Studies/Revue canadienne

d'études du développement, 83 - 100.

64

Kalui, D., Muketha, G., Tarus, J., & Moturi, C. (2017). An Investigation into Customers'

Requirements for Electronic Banking: A Case Study of Microfinance Institutions

(MFIs) in Kenya. International Journal of Innovation in the Digital Economy, 39 - 54.

Keiser, N. F. (1975). An introduction to growth theory; Macroeconomics. New York:

Random House.

Klapper, L. (2016). Financial Inclusion has a big role to play in reaching the SDGs.

Retrieved from Consultative Group to Assist the Poor:

http://www.cgap.org/blog/financial-inclusion-has-big-role-play-reaching-sdgs

Kombo, D., & Tromp, D. (2006). Proposal and thesis writing: An Introduction. Nairobi:

Pauline’s Publications Africa.

Korros, R. (2016). University Students Gambling: Examining the Effects of Betting on

Kenyan University Students’ Behavior. International Journal of Liberal Arts and

Social Science, Vol 4 No 8.

Kuhl, J., Azjen, I., & Beckmann, J. (1985). From intentions to actions: A theory of planned

behavior in Action control: From cognition to behavior. New York: Springer-Verlag.

Lacovou, C. (1995). Electronic Data Interchange and Small Organizations: Adoption and

Impact of Technology. MIS Quarterly 19, 19(4), 465-485.

Levi, M. (2010). Combating the financing of terrorism: A history and assessment of the

control of ‘threat finance. The British JOurnal of Criminology, 650 - 669.

Li, Z., & Yang, S. (2016). Overview of risk management system of commercial bank data

center. International Journal of Security and Its Applications.

M, A., Zain, J., Zolkipli, F., & Badshah, G. (2014). Mobile Cloud Computing & Mobile

Battery Augmentation Techniques: A survey. Retrieved from Research Gate:

http://www.researchgate.net/publication/270683821_Mobile_Cloud_Computing__Mo

bile_Battery_Augmentation_Techniques_A_Survey, 2014

Mbiti, I., & Weil, D. (2014). Mobile Banking: The impact of M-pesa in Kenya. National

Bureau of Economic Research. Working Paper No. 17129.

McKee, K., Kaffenberger, M., & Zimmerman, J. (2015). Doing Digital Finance Right: The

Case for Stronger Mitigation of Customer Risks. CGAP, Focus Note 103.

Miled, B., & Rejeb, B. (2015). Microfinance and Poverty Reduction; A review and synthesis

of empirical evidence. Social and Behavioural Sciences, 705 - 712.

Mugenda, A. (2008). Social Science Research: Theory and Principles. Nairobi: Acts Press.

Muthiora, B. (2015). Enabling mobile money policies in Kenya: Fostering a digital financial

revolution. . Retrieved from GSMA: https://www. gsma.

com/mobilefordevelopment/programme/mobile-money/enabling-mobile-money-

policies-in-kenya-fostering-a-digital-financial-revolution.

65

Njagi, L. (2009). Effectiveness of Know Your Customer (KYC) Polices Adopted By

Commercial Banks in Kenya in Reducing Money Laundering and Fraud Incidences.

Nairobi: University of Nairobi.

Ntibashirwa, C. (2013). A Study on the Contribution of Microfinance Institutions in Reducing

Financing Constraints for the promotion of small and medium sized enterprises.

Nairobi: University of Nairobi.

Nyasimi, E. (2016). Effects of mobile money transfer services on economic growth in Kenya.

Nairobi: University of Nairobi.

Oates, B. (2006). Researching information systems and computing. London: Sage.

Ogechi, A., & Olaniyi, E. (2012). Financial Inclusion, Financial Development and Economic

Diversification in Nigeria. Journal of Developing Areas, 2 - 15.

Orodho, J. (2009). Techniques of writing research proposals and reports in education and

social sciences. Nairobi: Kanezja Publishers.

Papworth, T. (2014). The role of finance in inclusive growth. Centre Forum Organization, 1-

3.

Porter, M., & Millar, V. (1985). How Information Gives You COmpetitive Advantage.

Harvard Business Review, 145 - 160.

Reuters. (2018). Kenya's central bank governor calls for regulation of fintech lenders.

Retrieved from Reuters - Fintech: https://www.reuters.com/article/us-kenya-

fintech/kenyas-central-bank-governor-calls-for-regulation-of-fintech-lenders-

idUSKCN1IU0N4

Rogers, E. (2003). Diffusion of Innovations, 5th Edition. Simon and Schuster.

Ruefle, R., Dorofee, A., Mundie, D., Householder, A., Murray, M., & Perl, S. (2014).

Computer Security Incident Response Team Development and Evolution. IEEE

Security & Privacy, Vol. 12, No. 5, 16 - 26.

Safaricom M-PESA. (2019, January). Safaricom PLC. Retrieved from Safaricom MPESA:

https://www.safaricom.co.ke/personal/m-pesa

Saunders, M., Lewis, P., & Thornhill, A. (2012). Research methods for business students. 6th

edition. Harlow, New York: Pearson.

Savings Groups Information Exchange. (2016). Savings Groups Information Exchange.

Retrieved from Savings Groups Information Exchange Database:

http://www.thesavix.org/.

Sen, A. (1999). Development as freedom. New York: A Knopf.

Sinha, A. (2012). Sinha, Anand, Financial Sector Regulation and Implications for Growth

(January 1, 2012). BIS Paper No. 62G. . https://ssrn.com/abstract=2021108.

SVBIC. (2011). SVBIC. Retrieved from What is Economic Development?:

http://www.svbic.com/node/24

66

Taber, K. (2018). Resources Science Education. https://doi.org/10.1007/s11165-016-9602-2,

48.

Tanzania Invest. (2018). Tanzania Mobile Money. Retrieved from Tanzania Invest:

https://www.tanzaniainvest.com/mobile-money

The Economist. (2015). Why does Kenya lead the world in mobile money? . Retrieved from

The Economist: https://www.economist.com/the-economist-explains/2015/03/02/why-

does-kenya-lead-the-world-in-mobile-money

The Global Public Policy Committee. (2016). The Auditor’s Response to the Risks of Material

Misstatement Posed by Estimates of Expected Credit Losses under IFRS 9. GPPC.

The World Bank - Council of Europe. (2012). Protecting Mobile Money against Financial

Crimes. Global Policy Challenges and Solutions.

The World Bank. (2017, December). Financial Inclusion. Retrieved from Financial Inclusion,

An Overview: http://www.worldbank.org/en/topic/financialinclusion/overview

Tornatzky, L., & Fleischer, M. (1990). The Processes of Technological Innovation.

Massachusetts: Lexington Books, Lexington,.

Totolo, E. (2018). The Digital Credit Revolution in Kenya: An Assessment of Market

Demand, 5 Years On. Retrieved from Financial Sector Deepening Trust Kenya

(FSDK): https://www.findevgateway.org/library/digital-credit-revolution-kenya-

assessment-market-demand-5-years

Uday, K., & Aditya, P. (2009). Maintenance performance measurement (MPM): issues and

challenges. Journal of Quality in Maintenance Engineering, Vol. 12 Issue: 3, 239 -

251.

United Nations. (2015). United Nations. Retrieved from Millenium Sustainable Development

Goals: https://www.un.org/sustainabledevelopment/blog/2015/12/sustainable-

development-goals-kick-off-with-start-of-new-year/

Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User Acceptance of

Information Technology: Toward a Unified View. MIS Quarterly, 425–478.

West, D. (2000). Neural Network Credit Scoring Models. Computers & Operations Research.

World Bank. (2017). The Findex Global Database 2017. Washington DC: The World Bank.

Zhang, D. (2018). Risk management analysis of network loan platform. 018 International

Conference on Management, Economics, Education, Arts and Humanities (MEEAH

2018).

Zhu, K., Kraemer, K., & Xu, S. (2006). The Process of Innovation Assimilation by Firms in

Different Countries: A Technology Diffusion Perspective on E-Business.

Management Science, 1557-1576.

Zikmund, W. (2012). Business Research Methods - 9th Edition. Ohio: South Western.