Factors Determining the Perceived Security Dimensions in B2C Electronic Commerce Website Usage: An Indonesian Study

Santos Marianus, Syaiful Ali

Abstract


Research aims: This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's B2C e-commerce websites. Design/Methodology/Approach: Using a purposive sampling approach, this study conducted an online survey of respondents who had done online transactions, such as business-to-customer (B2C) transactions. Research Findings: The study's results showed that perceived security significantly correlated with buyers' intention to use B2C websites. Theoretical contribution/Originality: This study contributes to developing and validating key dimensions of perceived security and their constructs. Mediation effect test results from TAM, which were perceived ease and perceived use, indicated that only the perceived usefulness variable significantly mediated the relationship between perceived security and intention to use B2C e-commerce websites. Perceived use's mediation was not supported. Practitioner/Policy implication: This research empirically supports the perceived security construct as a second-order construct involving confidentiality, availability, non-repudiation, and privacy. Research limitation/Implication: This study used data from Indonesian individuals, which may differ from other countries' characteristics. It may limit the research' finding generalization. 

Research aims: This study aims to analyze the perceived security dimensions and build a research model using perceived ease of use and perceived usefulness as variables mediating the link between perceived security and the intention to use Indonesia's B2C e-commerce websites.

Design/Methodology/Approach: Using a purposive sampling approach, this study conducted an online survey of respondents who had done online transactions, such as business-to-customer (B2C) transactions.

Research Findings: The study's results showed that perceived security significantly correlated with buyers' intention to use B2C websites.

Theoretical contribution/Originality: This study contributes to developing and validating key dimensions of perceived security and their constructs. Mediation effect test results from TAM, which were perceived ease and perceived use, indicated that only the perceived usefulness variable significantly mediated the relationship between perceived security and intention to use B2C e-commerce websites. Perceived use's mediation was not supported.

Practitioner/Policy implication: This research empirically supports the perceived security construct as a second-order construct involving confidentiality, availability, non-repudiation, and privacy.

Research limitation/Implication: This study used data from Indonesian individuals, which may differ from other countries' characteristics. It may limit the research' finding generalization.

Keywords


Perceived Security; TAM; B2C; E-Commerce

Full Text:

PDF

References


Anderson, J. C., & Gerbing, D. W. (1988). Structural equation modeling in practice: a review and recommended two-step approach. Psychological Bulletin, 103(3), 411-423. https://doi.org/10.1037/0033-2909.103.3.411

Andersone and E Gaile-Sarkane. (2009). Impact of technology adoption on customer behavior. Ekonomika IR, Vadyba. 14. ISSN 1822-6515.

Azizi, S., & Javidani, M. (2010). Measuring e-shopping intention: An Iranian perspective. African Journal of Business Management, 4(13), 2668–2675. Retrieved from https://academicjournals.org/journal/AJBM/article-full-text-pdf/FD5EB9523796

Bagozzi, R.P., & Yi, Y. (1988). On the evaluation of structural equation models. Journal of the Academy of Marketing Science 16. 74–94. https://doi.org/10.1007/BF02723327

Balapour, A., Nikkhah, H. R., & Sabherwal, R. (2020). Mobile application security: Role of perceived privacy as the predictor of security perceptions. International Journal of Information Management, 52, 102063. https://doi.org/10.1016/j.ijinfomgt.2019.102063

Belanger, F., Hiller, J.S., & Smith, W.J. (2002). Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. The Journal of Strategic Information Systems, 11(3–4): 245–270. https://doi.org/10.1016/S0963-8687(02)00018-5

Bella, G., Giustolisi, R., & Riccobene, S. (2011). Enforcing privacy in e-commerce by balancing anonymity and trust. Computers & Security, 30(8), 705–718. https://doi.org/10.1016/j.cose.2011.08.005

Berthon, P., Pitt, L., & Campbell, C. (2008). Ad Lib: When customers create the ad. California Management Review, 50(4), 6-30. Retrieved from https://research.monash.edu/en/publications/ad-lib-when-customers-create-the-ad

Bhatnagar, A., Misra, S., & Rao, H. R. (2000). On risk, convenience, and Internet shopping behavior. Communications of the ACM, 43(11), 98–105. https://doi.org/10.1145/353360.353371

Bodin, L. D., Gordon, L. A., & Loeb, M. P. (2005). Evaluating information security investments using the analytic hierarchy process. Communications of the ACM, 48(2), 78–83. https://doi.org/10.1145/1042091.1042094

Cegielski, C. G. (2008). Toward the development of an interdisciplinary information assurance curriculum: knowledge domains and skill sets required of information assurance professionals. Decision Sciences Journal of Innovative Education, 6(1), 29–49. https://doi.org/10.1111/j.1540-4609.2007.00156.x

Chang, H. H., & Chen, S. W. (2009). Consumer perception of interface quality, security, and loyalty in electronic commerce. Information & Management, 46(7), 411–417. https://doi.org/10.1016/j.im.2009.08.002

Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability, and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358–368. https://doi.org/10.1108/09576050210447046

Cheng, T. C. E., Lam, D. Y. C., & Yeung, A. C. L. (2006). Adoption of internet banking: An empirical study in Hong Kong. Decision Support Systems, 42(3), 1558–1572. https://doi.org/10.1016/j.dss.2006.01.002

Cheung, C. M., & Lee, M. K. (2001). Trust in internet shopping: instrument development and validation through classical and modern approaches. Journal of Global Information Management 9(3). 23–35. https://doi.org/10.4018/jgim.2001070103

Clarke, R. (1998). Message transmission security. Retrieved from Xamax Consultancy Pty Ltd. Available at http://www.rogerclarke.com/II/CryptoSecy.html

Cooper, D. R., & Schindler, P. S. (2006). Business Research Methods. 9 Edition. New York: McGraw-Hill.

Cronbach, L. J. (1951). Coefficient alpha and the internal structure of tests. Psychometrika, 16(3), 297–334. https://doi.org/10.1007/bf02310555

Crosby, L. A., Evans, K. R., & Cowles, D. (1990). Relationship quality in services selling: an interpersonal influence perspective. Journal of Marketing, 54(3), 68–81. https://doi.org/10.1177/002224299005400306

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319-340. https://doi.org/10.2307/249008

Davis, F. D., Bagozzi, R. P., & Warshaw, P. R. (1989). User acceptance of computer technology: a comparison of two theoretical models. Management Science, 35(8), 982–1003. https://doi.org/10.1287/mnsc.35.8.982

Diamantopoulos, A., & Winklhofer, H. M. (2001). Index construction with formative indicators: An alternative to scale development. Journal of Marketing Research, 38(2), 269–277. https://doi.org/10.1509/jmkr.38.2.269.18845

Diamantopoulos, A., Riefler, P., & Roth, K. P. (2008). Advancing formative measurement models. Journal of Business Research, 61(12), 1203–1218. https://doi.org/10.1016/j.jbusres.2008.01.009

Erlich, Z., & Zviran, M. (2010). Goals and practices in maintaining information systems security. International Journal of Information Security and Privacy, 4(3), 40–50. https://doi.org/10.4018/jisp.2010070103

Fang, Y., Qureshi, I., Sun, H., McCole, P., Ramsey, E., & Lim, K. (2014). Trust, satisfaction, and online repurchase intention: the moderating role of perceived effectiveness of e-commerce institutional mechanisms. MIS Quarterly, 38(2), 407-428(A9). https://doi.org/10.25300/misq/2014/38.2.04

Flavián, C., & Guinalíu, M. (2006). Consumer trust perceived security and privacy policy: three basic elements of loyalty to a website. Industrial Management & Data Systems, 106(5), 601–620. https://doi.org/10.1108/02635570610666403

Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50. https://doi.org/10.1177/002224378101800104

Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725–737. https://doi.org/10.1016/s0305-0483(00)00021-9

Gefen, D., Karahanna, E., & Straub, D. (2003). Trust and tam in online shopping: An integrated model. MIS Quarterly, 27(1), 51-90. https://doi.org/10.2307/30036519

Gordon, L. A., Loeb, M. P., & Zhou, L. (2011). The impact of information security breaches: Has there been a downward shift in costs? Journal of Computer Security, 19(1), 33–56. https://doi.org/10.3233/jcs-2009-0398

Grazioli, S., & Jarvenpaa, S. L. (2000). Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 30(4), 395–410. https://doi.org/10.1109/3468.852434

Gurbani, V. K., & McGee, A. R. (2007). An early application of the bell labs security framework to analyze vulnerabilities in the internet telephony domain. Bell Labs Technical Journal, 12(3), 7–19. https://doi.org/10.1002/bltj.20246

Hair, J. F., Black, W. C., Babin, B. J., & Anderson, R. E. (2010). Multivariate Data Analysis. Seventh Edition. New Jersey: Prentice-Hall.

Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6th ed.). Upper Saddle River, NJ: Pearson University Press.

Hartono, E., Holsapple, C. W., Kim, K.-Y., Na, K.-S., & Simpson, J. T. (2014). Measuring perceived security in B2C electronic commerce website usage: A respecification and validation. Decision Support Systems, 62, 11–21. https://doi.org/10.1016/j.dss.2014.02.006

Hartono. (2008). SPSS. 16.0. Analisa Data Statistika dan Penelitian. Yogyakarta: Pustaka Pelajar.

Hole, K.J. Tjφstheim, T., Moen, V., Netland, L., Espelid, Y., & Klingsheim, A.N. (2007). Next-generation internet banking in Norway. Retrieved from IEEE Security & Privacy. Available at http://www.nowires.org/Papers-PDF/BankIDevaluation.pdf

Hootsuite (2020). Retrieved from We Are Social. Available at https://datareportal.com/reports/digital-2020-indonesia

Jarvis, C. B., MacKenzie, S. B., & Podsakoff, P. M. (2003). A critical review of construct indicators and measurement model misspecification in marketing and consumer research. Journal of Consumer Research, 30(2), 199–218. https://doi.org/10.1086/376806

Keil, M., Lee, H.K., & Deng, T. (2013). Understanding the most critical skills for managing I.T. projects: a Delphi study of I.T. project managers. Information Management 50(7) 398–414. https://doi.org/10.1016/j.im.2013.05.005

Kiang, M. Y., Ye, Q., Hao, Y., Chen, M., & Li, Y. (2011). A service-oriented analysis of online product classification methods. Decision Support Systems, 52(1), 28–39. https://doi.org/10.1016/j.dss.2011.05.001

Kim, C., Tao, W., Shin, N., & Kim, K.-S. (2010). An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications, 9(1), 84–95. https://doi.org/10.1016/j.elerap.2009.04.014

Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564. https://doi.org/10.1016/j.dss.2007.07.001

Kurt, G., & Hacioglu, G. (2010). Ethics as a customer perceived value driver in the context of online retailing. African Journal of Business Management, 4(5), 672-677. https://doi.org/10.5897/AJBM.9000265

Laudon, K. C., & Traver, C.C. (2019). E-Commerce 2019: Business. Technology. Society. Fifteenth Edition. Hoboken: Pearson

Lian, J., & Lin, T. (2008). Effects of consumer characteristics on their acceptance of online shopping: Comparisons among different product types. Computers in Human Behavior, 48–65. https://doi.org/10.1016/j.chb.2007.01.002

Lim, N. (2003). Consumers’ perceived risk: sources versus consequences. Electronic Commerce Research and Applications, 2(3), 216–228. https://doi.org/10.1016/s1567-4223(03)00025-5

Lu, C.-S., Lai, K., & Cheng, T. C. E. (2007). Application of structural equation modeling to evaluate the intention of shippers to use Internet services in liner shipping. European Journal of Operational Research, 180(2), 845–867. https://doi.org/10.1016/j.ejor.2006.05.001

Matic, M., & Vojvodic, K. (2014). customer-perceived insecurity of online shopping environment. International Review of Management and Marketing, 4(1), 59-65. Retrieved from https://econjournals.com/index.php/irmm/article/view/677

Mayer, R. C., Davis, J. H., & Schoorman, F. D. (1995). An integrative model of organizational trust. The Academy of Management Review, 20(3), 709–734. https://doi.org/10.2307/258792

McKnight, D. H., & Chervany, N. L. (2001). What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. International Journal of Electronic Commerce, 6(2), 35–59. https://doi.org/10.1080/10864415.2001.11044235

Mitchell, V.L. (2006). Knowledge integration and information technology project performance. MIS Quarterly 30(4), 919–939. https://doi.org/10.2307/25148759

Motro, A. (1992). A unified model for security and integrity in relational databases. Journal of Computer Security, 1(2), 189–213. https://doi.org/10.3233/jcs-1992-1204

Oni, O.O., & Adeyeye, M.M. (2020). Digital commerce security and customer satisfaction in southwest Nigeria. Fountain University Osogbo Journal of Management 5(2), 69-81. Retrieved from http://www.osogbojournalofmanagement.com/index.php/ojm/article/view/160

Parent, M. (2007). The 6th and biggest lie of all: Lessons from a decade of e-tailing. Ivey Business Journal 71(8) 1-7. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=buh&AN=27982288&site=ehost-live

Peterson, D., Meinert, D., Criswell, J., & Crossland, M. (2007). Consumer trust: privacy policies and third party seals. Journal of Small Business and Enterprise Development, 14(4), 654-669. https://doi.org/10.1108/14626000710832758

Podsakoff, P. M., & Organ, D. W. (1986). Self-reports in organizational research: problems and prospects. Journal of Management, 12(4), 531–544. https://doi.org/10.1177/014920638601200408

Ransbotham, S., Mitra, S., & Ramsey, J. (2012). Are markets for vulnerabilities effective? MIS Quarterly, 36(1), 43-64. https://doi.org/10.2307/41410405

Roca, J. C., García, J.J., & de la Vega, J.J. (2009). The importance of perceived trust, security, and privacy in online trading systems. Information Management & Computer Security, 17(2), 96–113. https://doi.org/10.1108/09685220910963983

Ryan, J. J. C. H., & Ryan, D. J. (2005). Proportional hazards in information security. Risk Analysis, 25(1), 141–149. https://doi.org/10.1111/j.0272-4332.2005.00573.x

Salisbury, W., Pearson, R., Pearson, A.W., & Miller, D. (2001). Perceived security and worldwide web purchase intention. Industrial Management & Data Systems, 101(4), 165–177. https://doi.org/10.1108/02635570110390071

Schneider, G.P. (2010). Electronic commerce, 9th ed. Cengage Learning.

Shah, M. H., Peikari, H. R., & Yasin, N. M. (2014). The determinants of individuals’ perceived e-security: Evidence from Malaysia. International Journal of Information Management, 34(1), 48–57. https://doi.org/10.1016/j.ijinfomgt.2013.10.001

Sholihin, M. & Ratmono, D. (2013). Analisis SEM-PLS dengan WarpPLS 3.0 untuk hubungan nonlinier dalam penelitian sosial dan bisnis. Yogyakarta: Andi Offset.

Siponen, M. T., & Oinas-Kukkonen, H. (2007). A review of information security issues and respective research contributions. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 38(1), 60–80. https://doi.org/10.1145/1216218.1216224

Statista. (2019). E-commerce in Indonesia. Retrieved from Statista. Available at https://www.statista.com/study/60342/e-commerce-in-indonesia/

Suh, B., & Han, I. (2002). Effect of trust on customer acceptance of Internet banking. Electronic Commerce Research and Applications, 1(3-4), 247–263. https://doi.org/10.1016/s1567-4223(02)00017-0

Tsiakis, T., & Sthephanides, G. (2005). The concept of security and trust in electronic payments. Computers & Security, 24(1), 10–15. https://doi.org/10.1016/j.cose.2004.11.001

Turban, E., King, D., Lee, J. K., Liang, T.-P., & Turban, D. C. (2010). Electronic Commerce. A Managerial Perspective Global Edition. New Jersey: Pearson.

Usoro, A., Shoyelu, S., & Kuofie, M. (2010). Task-technology fit and technology acceptance models applicability to e-tourism. Journal of Economic Development, Management, I.T., Finance and Marketing, 2(1), 1–32. Retrieved from https://research-portal.uws.ac.uk/en/publications/task-technology-fit-and-technology-acceptance-models-applicabilit

Vaidyanathan, G., & Mautone, S. (2009). Security in dynamic web content management systems applications. Communications of the ACM, 52(12), 121–125. https://doi.org/10.1145/1610252.1610284

Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186–204. https://doi.org/10.1287/mnsc.46.2.186.11926

Yousafzai, S., Pallister, J., & Foxall, G. (2009). Multi-dimensional role of trust in Internet banking adoption. The Service Industries Journal, 29(5), 591–605. https://doi.org/10.1080/02642060902719958




DOI: https://doi.org/10.18196/jai.v22i1.8171

Refbacks

  • There are currently no refbacks.




Office:
Ruang Jurnal Fakultas Ekonomi dan Bisnis UMY
Gedung Ki Bagus Hadikusuma (E4) Lantai 2, Kampus Terpadu Universitas Muhammadiyah Yogyakarta,
Jalan Brawijaya (Lingkar Selatan), Tamantirto, Kasihan, Bantul, Daerah Istimewa Yogyakarta, Indonesia, 55183
Website: journal.umy.ac.id/index.php/ai - E-mail: jai@umy.ac.id

Journal of Accounting and Investment is licensed under Creative Commons Attribution Attribution-NonCommercial-NoDerivatives 4.0 International License

View My Stats