Empirical Study on Customer Perception of E-Commerce: Mediating Effect of Electronic Payment Security

Muhammad Noor Ardiansah(1), Anis Chariri(2), Indira Januarti(3),


(1) Semarang State Polytechnic
(2) Diponegoro Unversity
(3) Universitas Diponegoro

Abstract

This research aims to give empirical evidence in the mediating role of e-payment security on e-commerce's customer purchase intention. This study involved millennia's generation in Semarang, which used structural equation modelling to analyze the model. The analysis stages consist of evaluating measurement, structural, the goodness of fit model, and hypothesis testing. The finding showed that there is a mediating effect of perceived usefulness in the relationship perceived ease of use to purchase intention, and also the relationship perceived ease to use on e-payment security perception. These results indicated that consumer's purchase intention strongly influenced of ease of use and usefulness understanding, without directly associated with the payment security aspects.

Keywords

e-commerce; e-payment security; perceived usefulness; perceived ease to use; purchase intention; TAM

Full Text:

PDF

References

Al-ma’aitah, M., and Shatat, A., (2011). Empirical Study in the Security of electronic Payment Systems, International Journal of Computer science Issues, Vol. 8 (4), pp. 393-401

Arifani, V. M., & Haryanto, H. (2018, November). Purchase intention: implementation theory of planned behavior (Study on reusable shopping bags in Solo City, Indonesia). In IOP Conference Series: Earth and Environmental Science (Vol. 200, No. 1, p. 012019). IOP Publishing.

Asokan, N., Schunter, M., & Waidner, M. (1996). Optimistic Protocols for Fair Exchange (pp. 6-17). IBM Thomas J. Watson Research Division.

Bedi, S. S., Kaur, S., & Lal, A. K. (2017). Understanding web experience and perceived web enjoyment as antecedents of online purchase intention. Global Business Review, 18(2), 465-477.

Buch, R., Ganda, D., Kalola, P., & Borad, N. (2017). World of Cyber Security and Cybercrime.

Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, 15(5/6), 358-368.

Davis, F. D. (1989). Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008

Fishbein, M., & Ajzen, I. (1975). Belief Attitude, Intention and Behavior.pdf (1st ed.). USA: Addison Wesley Publising Company.

Guttmann, R. (2003). The Internet Revolution. In Cybercash (pp. 56-82). Palgrave Macmillan, London.

Hossain, M. S., & Zhou, X. (2018). Impact of m-payments on purchase intention and customer satisfaction : perceived flow as mediator. International Journal of Science and Business, 2(3), 503–517. https://doi.org/10.5281/zenodo.1408692

Hu, X., Wu, G., Wu, Y., & Zhang, H. (2010). The Effects of Web Assurance Seals on Consumers' Initial Trust in an Online Vendor: A Functional Perspective. Decision Support Systems, 48(2), 407-418.

Ika, L. A., Diallo, A., & Thuillier, D. (2012). Critical success factors for World Bank projects: An empirical investigation. International journal of project management, 30(1), 105-116.

Jahangir, N., & Begum, N. (2008). The role of perceived usefulness, perceived ease of use, security and privacy, and customer attitude to engender customer adaptation in the context of electronic banking. African Journal of Business Management, 2(2), 032–040.

Jarvenpaa, S.L. and Todd, P.A. (1997). Consumer reactions to electronic shopping on the World Wide Web'', International Journal of Electronic Commerce, Vol. 1 No. 2, pp. 59-88.

Kalakota, R., & Whinston, A. B. (1997). Electronic commerce: a manager's guide. Addison-Wesley Professional.

Kim, C., Tao, W., Shin, N., & Kim, K. S. (2010). An empirical Study of Customers’ Perceptions of Security and Trust in e-Payment Systems. Electronic Commerce Research and Applications, 9(1), 84-95.

Kim, M., Kim, S., & Kim, J. (2019). Can mobile and biometric payments replace cards in the Korean offline payments market? Consumer Preference Analysis for payment systems using a discrete choice model. Telematics and Informatics, 38, 46-58.

Lai, P. (2017). The Literature Review of Technology Adoption Models and Theories for the Novelty Technology. Journal of Information Systems and Technology Management, 14(1), 21–38. https://doi.org/10.4301/S1807-17752017000100002

Latan, H., & Ghozali, I. (2012). Partial Least Square: Konsep, Teknik, dan Aplikasi SmartPLS 2.0 M3. Semarang: Badan Penerbit Universitas Diponogero.

Lau, M. M., Lam, A. Y., Cheung, R., & Leung, T. F. (2019, January). Understanding determinants of customer behavioral intention in using mobile payment at convenience stores. In Proceedings of the 10th International Conference on E-Education, E-Business, E-Management and E-Learning (pp. 357-362). ACM

Laudon, K. and Traver, C. (2002). E-Commerce: Business, Technology, Society. Addison Wesley, Boston, MA.

Laudon, K. C., & Laudon, J. P. (2002). Essential of managementinformation systems(5th ed). New Jersey: Prentice Hall.

Liang, T. P., & Turban, E. (2011). Introduction to the special issue social commerce: a research framework for social commerce. International Journal of electronic commerce, 16(2), 5-14.

McCloskey, D. (2018). Managing Security in Retail Offline and Online. GRIN Verlag.

Mitnick K, Simon W. (2002). The art of Deception: Controlling the Human Element of Security. Wiley Publishing

O’Mahony, D., Peirce, M. and Tewari, H. (2002) Electronic Payment Systems for E-Commerce. 2nd edn. Artech House.

Ratnasingham, P. (1998). The Importance of trust in Electronic Commerce. Internet Research, 8(4), 313-321.

Reid, R., & Van Niekerk, J. (2014, August). From Information Security to Cyber Security cultures. In 2014 Information Security for South Africa (pp. 1-7). IEEE.

Riduwan, K. (2012). Metode & Teknik Menyusun Proposal Penelitian. Bandung: Mandar Maju.

Robey, D. (1979). User attitudes and management information system use. Academy of Management Journal, 22(3), 527-538.

Salisbury, W. D., Pearson, R. A., Pearson, A. W., & Miller, D. W. (2001). Perceived security and World Wide Web purchase intention. Industrial Management & Data Systems, 101(4), 165-177.

Schultz, R. L., & Slevin, D. P. (1975). Implementing operations research/management science. American Elsevier Pub. Co..

Tapscott, D. (1996). The Digital Economy: Promise and Peril in the Age of Networked Intelligence (Vol. 1). New York: McGraw-Hill.

Venkatesh, V., & Davis, F. D. (1996). A model of the antecedents of perceived ease of use: Development and test. Decision sciences, 27(3), 451-481.

Von Solms, R., & Van Niekerk, J. (2013). From Information Security to Cyber Security. Computers & Security, 38, 97-102.

Zhang, Y., Deng, X., Wei, D., & Deng, Y. (2012). Assessment of E-Commerce security using AHP and evidential reasoning. Expert Systems with Applications, 39(3), 3611-3623.

Refbacks

  • There are currently no refbacks.




Creative Commons License
Jurnal Dinamika Akuntansi is licensed under a Creative Commons Attribution 4.0 International License