Factors Determining the Perceived Security Dimensions in B2C Electronic Commerce Website Usage: An Indonesian Study
Abstract
Research aims: This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's B2C e-commerce websites.
Design/Methodology/Approach: Using a purposive sampling approach, this study conducted an online survey of respondents who had done online transactions, such as business-to-customer (B2C) transactions.
Research Findings: The study's results showed that perceived security significantly correlated with buyers' intention to use B2C websites.
Theoretical contribution/Originality: This study contributes to developing and validating key dimensions of perceived security and their constructs. Mediation effect test results from TAM, which were perceived ease and perceived use, indicated that only the perceived usefulness variable significantly mediated the relationship between perceived security and intention to use B2C e-commerce websites. Perceived use's mediation was not supported.
Practitioner/Policy implication: This research empirically supports the perceived security construct as a second-order construct involving confidentiality, availability, non-repudiation, and privacy.
Research limitation/Implication: This study used data from Indonesian individuals, which may differ from other countries' characteristics. It may limit the research' finding generalization.Keywords
Full Text:
PDFReferences
Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: a review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423. https://doi.org/10.1037/0033-2909.103.3.411
Andersone and E Gaile-Sarkane. (2009). Impact of technology adoption on customer behavior. Ekonomika IR, Vadyba. 14. ISSN 1822-6515.
Azizi, S., & Javidani, M. (2010). Measuring e-shopping intention: An Iranian perspective. African Journal of Business Management, 4(13), 2668–2675. Retrieved from https://academicjournals.org/journal/AJBM/article-full-text-pdf/FD5EB9523796
Bagozzi, R.P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science 16. 74–94. https://doi.org/10.1007/BF02723327
Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063. https://doi.org/10.1016/j.ijinfomgt.2019.102063
Belanger, F., Hiller, J.S., & Smith, W.J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3–4): 245–270. https://doi.org/10.1016/S0963-8687(02)00018-5
Bella, G., Giustolisi, R., & Riccobene, S. (2011). Enforcing privacy in e-commerce by balancing anonymity and trust. Computers & Security, 30(8), 705–718. https://doi.org/10.1016/j.cose.2011.08.005
Berthon, P., Pitt, L., & Campbell, C. (2008). Ad Lib: When customers create the ad. California Management Review, 50(4), 6-30. Retrieved from https://research.monash.edu/en/publications/ad-lib-when-customers-create-the-ad
Bhatnagar, A., Misra, S., & Rao, H. R. (2000). On risk, convenience, and Internet shopping behavior. Communications of the ACM, 43(11), 98–105. https://doi.org/10.1145/353360.353371
Bodin, L. D., Gordon, L. A., & Loeb, M. P. (2005). Evaluating information security investments using the analytic hierarchy process. Communications of the ACM, 48(2), 78–83. https://doi.org/10.1145/1042091.1042094
Cegielski, C. G. (2008). Toward the development of an interdisciplinary information assurance curriculum: knowledge domains and skill sets required of information assurance professionals. Decision Sciences Journal of Innovative Education, 6(1), 29–49. https://doi.org/10.1111/j.1540-4609.2007.00156.x
Chang, H. H., & Chen, S. W. (2009). Consumer perception of interface quality, security, and loyalty in electronic commerce. Information & Management, 46(7), 411–417. https://doi.org/10.1016/j.im.2009.08.002
Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability, and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358–368. https://doi.org/10.1108/09576050210447046
Cheng, T. C. E., Lam, D. Y. C., & Yeung, A. C. L. (2006). Adoption of internet banking: An empirical study in Hong Kong. Decision Support Systems, 42(3), 1558–1572. https://doi.org/10.1016/j.dss.2006.01.002
Cheung, C. M., & Lee, M. K. (2001). Trust in internet shopping: instrument development and validation through classical and modern approaches. Journal of Global Information Management 9(3). 23–35. https://doi.org/10.4018/jgim.2001070103
Clarke, R. (1998). Message transmission security. Retrieved from Xamax Consultancy Pty Ltd. Available at http://www.rogerclarke.com/II/CryptoSecy.html
Cooper, D. R., & Schindler, P. S. (2006). Business Research Methods. 9 Edition. New York: McGraw-Hill.
Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297–334. https://doi.org/10.1007/bf02310555
Crosby, L. A., Evans, K. R., & Cowles, D. (1990). Relationship quality in services selling: an interpersonal influence perspective. Journal of Marketing, 54(3), 68–81. https://doi.org/10.1177/002224299005400306
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://doi.org/10.2307/249008
Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 982–1003. https://doi.org/10.1287/mnsc.35.8.982
Diamantopoulos, A., & Winklhofer, H. M. (2001). Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research, 38(2), 269–277. https://doi.org/10.1509/jmkr.38.2.269.18845
Diamantopoulos, A., Riefler, P., & Roth, K. P. (2008). Advancing formative measurement models. Journal of Business Research, 61(12), 1203–1218. https://doi.org/10.1016/j.jbusres.2008.01.009
Erlich, Z., & Zviran, M. (2010). Goals and practices in maintaining information systems security. International Journal of Information Security and Privacy, 4(3), 40–50. https://doi.org/10.4018/jisp.2010070103
Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E., & Lim, K. (2014). Trust, satisfaction, and online repurchase intention: the moderating role of perceived effectiveness of e-commerce institutional mechanisms. MIS Quarterly, 38(2), 407-428(A9). https://doi.org/10.25300/misq/2014/38.2.04
Flavián, C., & Guinalíu, M. (2006). Consumer trust perceived security and privacy policy: three basic elements of loyalty to a website. Industrial Management & Data Systems, 106(5), 601–620. https://doi.org/10.1108/02635570610666403
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/10.1177/002224378101800104
Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725–737. https://doi.org/10.1016/s0305-0483(00)00021-9
Gefen, D., Karahanna, E., & Straub, D. (2003). Trust and tam in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90. https://doi.org/10.2307/30036519
Gordon, L. A., Loeb, M. P., & Zhou, L. (2011). The impact of information security breaches: Has there been a downward shift in costs? Journal of Computer Security, 19(1), 33–56. https://doi.org/10.3233/jcs-2009-0398
Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), 395–410. https://doi.org/10.1109/3468.852434
Gurbani, V. K., & McGee, A. R. (2007). An early application of the bell labs security framework to analyze vulnerabilities in the internet telephony domain. Bell Labs Technical Journal, 12(3), 7–19. https://doi.org/10.1002/bltj.20246
Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate Data Analysis. Seventh Edition. New Jersey: Prentice-Hall.
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6th ed.). Upper Saddle River, NJ: Pearson University Press.
Hartono, E., Holsapple, C. W., Kim, K.-Y., Na, K.-S., & Simpson, J. T. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62, 11–21. https://doi.org/10.1016/j.dss.2014.02.006
Hartono. (2008). SPSS. 16.0. Analisa Data Statistika dan Penelitian. Yogyakarta: Pustaka Pelajar.
Hole, K.J. Tjφstheim, T., Moen, V., Netland, L., Espelid, Y., & Klingsheim, A.N. (2007). Next-generation internet banking in Norway. Retrieved from IEEE Security & Privacy. Available at http://www.nowires.org/Papers-PDF/BankIDevaluation.pdf
Hootsuite (2020). Retrieved from We Are Social. Available at https://datareportal.com/reports/digital-2020-indonesia
Jarvis, C. B., MacKenzie, S. B., & Podsakoff, P. M. (2003). A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of Consumer Research, 30(2), 199–218. https://doi.org/10.1086/376806
Keil, M., Lee, H.K., & Deng, T. (2013). Understanding the most critical skills for managing I.T. projects: a Delphi study of I.T. project managers. Information Management 50(7) 398–414. https://doi.org/10.1016/j.im.2013.05.005
Kiang, M. Y., Ye, Q., Hao, Y., Chen, M., & Li, Y. (2011). A service-oriented analysis of online product classification methods. Decision Support Systems, 52(1), 28–39. https://doi.org/10.1016/j.dss.2011.05.001
Kim, C., Tao, W., Shin, N., & Kim, K.-S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications, 9(1), 84–95. https://doi.org/10.1016/j.elerap.2009.04.014
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564. https://doi.org/10.1016/j.dss.2007.07.001
Kurt, G., & Hacioglu, G. (2010). Ethics as a customer perceived value driver in the context of online retailing. African Journal of Business Management, 4(5), 672-677. https://doi.org/10.5897/AJBM.9000265
Laudon, K. C., & Traver, C.C. (2019). E-Commerce 2019: Business. Technology. Society. Fifteenth Edition. Hoboken: Pearson
Lian, J., & Lin, T. (2008). Effects of consumer characteristics on their acceptance of online shopping: Comparisons among different product types. Computers in Human Behavior, 48–65. https://doi.org/10.1016/j.chb.2007.01.002
Lim, N. (2003). Consumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216–228. https://doi.org/10.1016/s1567-4223(03)00025-5
Lu, C.-S., Lai, K., & Cheng, T. C. E. (2007). Application of structural equation modeling to evaluate the intention of shippers to use Internet services in liner shipping. European Journal of Operational Research, 180(2), 845–867. https://doi.org/10.1016/j.ejor.2006.05.001
Matic, M., & Vojvodic, K. (2014). customer-perceived insecurity of online shopping environment. International Review of Management and Marketing, 4(1), 59-65. Retrieved from https://econjournals.com/index.php/irmm/article/view/677
Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709–734. https://doi.org/10.2307/258792
McKnight, D. H., & Chervany, N. L. (2001). What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35–59. https://doi.org/10.1080/10864415.2001.11044235
Mitchell, V.L. (2006). Knowledge integration and information technology project performance. MIS Quarterly 30(4), 919–939. https://doi.org/10.2307/25148759
Motro, A. (1992). A unified model for security and integrity in relational databases. Journal of Computer Security, 1(2), 189–213. https://doi.org/10.3233/jcs-1992-1204
Oni, O.O., & Adeyeye, M.M. (2020). Digital commerce security and customer satisfaction in southwest Nigeria. Fountain University Osogbo Journal of Management 5(2), 69-81. Retrieved from http://www.osogbojournalofmanagement.com/index.php/ojm/article/view/160
Parent, M. (2007). The 6th and biggest lie of all: Lessons from a decade of e-tailing. Ivey Business Journal 71(8) 1-7. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=27982288&site=ehost-live
Peterson, D., Meinert, D., Criswell, J., & Crossland, M. (2007). Consumer trust: privacy policies and third party seals. Journal of Small Business and Enterprise Development, 14(4), 654-669. https://doi.org/10.1108/14626000710832758
Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: problems and prospects. Journal of Management, 12(4), 531–544. https://doi.org/10.1177/014920638601200408
Ransbotham, S., Mitra, S., & Ramsey, J. (2012). Are markets for vulnerabilities effective? MIS Quarterly, 36(1), 43-64. https://doi.org/10.2307/41410405
Roca, J. C., García, J.J., & de la Vega, J.J. (2009). The importance of perceived trust, security, and privacy in online trading systems. Information Management & Computer Security, 17(2), 96–113. https://doi.org/10.1108/09685220910963983
Ryan, J. J. C. H., & Ryan, D. J. (2005). Proportional hazards in information security. Risk Analysis, 25(1), 141–149. https://doi.org/10.1111/j.0272-4332.2005.00573.x
Salisbury, W., Pearson, R., Pearson, A.W., & Miller, D. (2001). Perceived security and worldwide web purchase intention. Industrial Management & Data Systems, 101(4), 165–177. https://doi.org/10.1108/02635570110390071
Schneider, G.P. (2010). Electronic commerce, 9th ed. Cengage Learning.
Shah, M. H., Peikari, H. R., & Yasin, N. M. (2014). The determinants of individuals’ perceived e-security: Evidence from Malaysia. International Journal of Information Management, 34(1), 48–57. https://doi.org/10.1016/j.ijinfomgt.2013.10.001
Sholihin, M. & Ratmono, D. (2013). Analisis SEM-PLS dengan WarpPLS 3.0 untuk hubungan nonlinier dalam penelitian sosial dan bisnis. Yogyakarta: Andi Offset.
Siponen, M. T., & Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 38(1), 60–80. https://doi.org/10.1145/1216218.1216224
Statista. (2019). E-commerce in Indonesia. Retrieved from Statista. Available at https://www.statista.com/study/60342/e-commerce-in-indonesia/
Suh, B., & Han, I. (2002). Effect of trust on customer acceptance of Internet banking. Electronic Commerce Research and Applications, 1(3-4), 247–263. https://doi.org/10.1016/s1567-4223(02)00017-0
Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers & Security, 24(1), 10–15. https://doi.org/10.1016/j.cose.2004.11.001
Turban, E., King, D., Lee, J. K., Liang, T.-P., & Turban, D. C. (2010). Electronic Commerce. A Managerial Perspective Global Edition. New Jersey: Pearson.
Usoro, A., Shoyelu, S., & Kuofie, M. (2010). Task-technology fit and technology acceptance models applicability to e-tourism. Journal of Economic Development, Management, I.T., Finance and Marketing, 2(1), 1–32. Retrieved from https://research-portal.uws.ac.uk/en/publications/task-technology-fit-and-technology-acceptance-models-applicabilit
Vaidyanathan, G., & Mautone, S. (2009). Security in dynamic web content management systems applications. Communications of the ACM, 52(12), 121–125. https://doi.org/10.1145/1610252.1610284
Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186–204. https://doi.org/10.1287/mnsc.46.2.186.11926
Yousafzai, S., Pallister, J., & Foxall, G. (2009). Multi-dimensional role of trust in Internet banking adoption. The Service Industries Journal, 29(5), 591–605. https://doi.org/10.1080/02642060902719958
DOI: https://doi.org/10.18196/jai.v22i1.8171
Refbacks
- There are currently no refbacks.
Office:
Ruang Jurnal Fakultas Ekonomi dan Bisnis UMY
Gedung Ki Bagus Hadikusuma (E4) Lantai 2, Kampus Terpadu Universitas Muhammadiyah Yogyakarta,
Jalan Brawijaya (Lingkar Selatan), Tamantirto, Kasihan, Bantul, Daerah Istimewa Yogyakarta, Indonesia, 55183
Website: journal.umy.ac.id/index.php/ai - E-mail: jai@umy.ac.id
Journal of Accounting and Investment is licensed under Creative Commons Attribution Attribution-NonCommercial-NoDerivatives 4.0 International License
View My Stats