Search results

1 – 10 of over 57000
Article
Publication date: 11 February 2019

Mohamed Abdelhamid, Victoria Kisekka and Spyridon Samonas

The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the…

1142

Abstract

Purpose

The purpose of this study is to understand why individuals choose to avoid using e-services due to security concerns and perceived risk when these factors are affected by the perceived degree of government cybersecurity preparedness against cyberattacks.

Design/methodology/approach

The authors adopt the information systems success model to predict the role of government security preparedness efforts in influencing the determinants of e-services avoidance. The conceptual model includes four variables: security concerns, perceived risk of cyberattacks, perceived government cybersecurity preparedness and e-services avoidance. Data from 774 participants were used to analyze our conceptual model.

Findings

First, the findings show that security concerns regarding personal information safety and perceived risk of cyberattacks are barriers to e-services use, with the former having a stronger effect. Second, the findings showed that perceived government cybersecurity preparedness significantly reduces security concerns and perceived risk of cyberattacks. Third, the post hoc group analysis between individuals with a bachelor’s degree or higher versus those without a bachelor’s degree showed that the effect of both security concerns and perceived risk of cyberattacks on e-services avoidance was greater for individuals without a bachelor’s degree. The same relationship between perceived risk of cyberattacks and e-services avoidance was not supported for individuals with a bachelor’s degree or higher.

Originality/value

Extant privacy research fails to adequately examine the role of institutional factors, such as government efforts, and how these mitigate or amplify cybersecurity concerns and risks related to e-services. This research takes the first step toward addressing this limitation by examining the influence of government cybersecurity preparedness efforts on the determinants of e-services avoidance.

Details

Information & Computer Security, vol. 27 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 6 August 2018

Hong-Youl Ha and Huifeng Pan

The purpose of this paper is to develop and test a dynamic model of security-based consumer purchasing intentions and empirically addresses gaps in online purchasing theory by…

1169

Abstract

Purpose

The purpose of this paper is to develop and test a dynamic model of security-based consumer purchasing intentions and empirically addresses gaps in online purchasing theory by examining how loyalty intention may become stronger or weaker over time as a result of prior relationship evaluations.

Design/methodology/approach

Using a longitudinal study (three-time waves) of commercial website consumers, the authors investigate the proposed model by depicting the relationships among perceived security, perceived risk, website trust and loyalty intentions.

Findings

The results show that two relationships, namely the perceived security-perceived risk link and the perceived risk-website trust link, which have been little investigated on a longitudinal basis in previous studies, change over time. Interestingly, while social network service (SNS) information perceptions do not have direct effects on perceived risk or loyalty intention, the relationships in which either perceived security and website trust are involved are more important for positively improving perceived security and building website trust.

Practical implications

The authors suggest that managers may actually benefit from handling SNS information or social communities by delivering well-designed information at strategic stages, targeting key constructs.

Originality/value

The research contributes to the establishment and testing of temporal carryover effects of various online purchasing-related constructs: perceived security, perceived risk, trust and loyalty intention. More specifically, the longitudinal approach provides new insights regarding the role, potential impact and limitations of two types of perception. It thus highlights how understanding loyalty intention requires reevaluating consumer perceptions as consumers’ judgments evolve.

Details

Internet Research, vol. 28 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 20 March 2019

Fariborz Rahimnia, Ghasem Eslami and Saeid Nosrati

The purpose of this paper is to investigate the mediating role of job embeddedness in the relationship between perceived job security and perceived job flexibility and its impact…

1021

Abstract

Purpose

The purpose of this paper is to investigate the mediating role of job embeddedness in the relationship between perceived job security and perceived job flexibility and its impact on creative performance.

Design/methodology/approach

The statistical population of this study consisted of all employees at the Electricity Company of Mashhad, and a sample comprising 300 participants was finalized. In order to analyze the data, different statistical analysis methods were used, including Pearson’s correlation analysis and structural equation modeling.

Findings

The findings indicated that perceived job security has a positive impact on job embeddedness, while it has no significant impact on the employees’ creative performance. On the other hand, perceived job flexibility has a positive effect on both job embeddedness and creative performance. Moreover, the mediating role of job embeddedness was approved.

Originality/value

Since creative performance in this changeable environment becomes essential, identifying mechanisms which can embed employees to their company would bring about several positive consequences. Furthermore, little is known about the antecedents and potential consequences of job embeddedness, especially in developing countries.

Details

Personnel Review, vol. 48 no. 3
Type: Research Article
ISSN: 0048-3486

Keywords

Article
Publication date: 9 September 2021

Hamid Reza Nikkhah and Rajiv Sabherwal

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC…

Abstract

Purpose

In this research, the authors focus on mobile cloud computing (MCC) collaboration apps that are multiplatform and send the users’ data to the cloud. Despite their benefits, MCC collaboration apps raise privacy concerns, as the users’ information is sent to the cloud where users lack direct control. This study aims to investigate why users disclose information to MCC apps despite privacy concerns and examine the effect of security and assurance mechanisms (i.e. privacy policies and ISO/IEC 27018 certification) on users’ perceptions and information disclosure. Based on three surveys conducted in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543), this study finds mixed results regarding the relationships among security, assurance mechanisms, utilitarian benefits and information disclosure.

Design/methodology/approach

This study conducted three scenario-based surveys in the USA in 2016 (n = 515), 2017 (n = 505) and 2018 (n = 543).

Findings

This study finds mixed results of relationships among security, assurance mechanisms, utilitarian benefit and information disclosure.

Originality/value

With proliferation of MCC apps, the investigation of how users make privacy decision to disclose personal information to these apps is sparse. This study, for the first time, investigates whether the signals of assurance mechanism decrease users’ privacy concerns. This study also examines the interplay between security and privacy within information disclosure behavior. Finally, this study was conducted in 3 years to enhance the generalizability and robustness of findings.

Details

Information Technology & People, vol. 35 no. 7
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 December 2002

Ramnath K. Chellappa and Paul A. Pavlou

Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information…

7766

Abstract

Electronic commerce (EC) transactions are subject to multiple information security threats. Proposes that consumer trust in EC transactions is influenced by perceived information security and distinguishes it from the objective assessment of security threats. Proposes mechanisms of encryption, protection, authentication, and verification as antecedents of perceived information security. These mechanisms are derived from technological solutions to security threats that are visible to consumers and hence contribute to actual consumer perceptions. Tests propositions in a study of 179 consumers and shows a significant relationship between consumers’ perceived information security and trust in EC transactions. Explores the role of limited financial liability as a surrogate for perceived security. However, the findings show that there is a minimal effect of financial liability on consumers’ trust in EC. Engenders several new insights regarding the role of perceived security in EC transactions.

Details

Logistics Information Management, vol. 15 no. 5/6
Type: Research Article
ISSN: 0957-6053

Keywords

Article
Publication date: 5 June 2009

Juan Carlos Roca, Juan José García and Juan José de la Vega

The purpose of this paper is to test an augmented technology acceptance model (TAM) in the online financial trading context. This research aims to investigate how e‐investors are…

14043

Abstract

Purpose

The purpose of this paper is to test an augmented technology acceptance model (TAM) in the online financial trading context. This research aims to investigate how e‐investors are influenced by perceived trust, security, and privacy jointly with traditional TAM constructs.

Design/methodology/approach

The research examines e‐investors' behavioral intention to use online dealers' and stockbrokers' services. The model suggests that perceived trust jointly with perceived usefulness and perceived ease of use are important antecedents of intentions; the hypotheses are statistically tested using structural modeling.

Findings

The results from this study suggest that perceived trust, usefulness and ease of use are important issues in online trading systems. The findings suggest that online financial dealers and stockbrokers must improve the security of the online system since e‐investors form perceptions about its perceived security and when these perceptions are confirmed, their trust is enhanced and consequently they are more likely to use these online services particularly if the financial information is useful for their purposes.

Research limitations/implications

The findings of the present study have various implications for research as well as practice. First, perceived trust, perceived usefulness and perceived ease of use are critical to the success of an online trading system. Second, perceived privacy did not influence users' beliefs in trust. Since perceived trust and perceived usefulness are the most important antecedents of behavioral intention, managers can increase e‐investors' usage intention by improving their beliefs in how the online trading system can enhance their performance and effectiveness using a system with enough security mechanisms. The major limitation is that trust is examined as a single‐dimension construct.

Originality/value

This paper is one of the first that has empirically tested the link between trust, security, privacy, usefulness, ease of use and behavioral intention in the online trading context.

Details

Information Management & Computer Security, vol. 17 no. 2
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 14 March 2019

Abdullah M. Baabdullah, Ali A. Alalwan, Nripendra P. Rana, Pushp Patil and Yogesh K. Dwivedi

The purpose of this paper is to identify and examine the most important factors that could predict the Saudi customer’s continued intention towards adoption of mobile banking.

2588

Abstract

Purpose

The purpose of this paper is to identify and examine the most important factors that could predict the Saudi customer’s continued intention towards adoption of mobile banking.

Design/methodology/approach

The proposed conceptual model was based on the technology acceptance model (TAM) and task-technology fit (TTF) model. This is also expanded by considering two additional factors: perceived privacy and perceived security. By using a self-administered questionnaire, the data were collected from a convenience sample of Saudi banking customers from different parts of Saudi Arabia.

Findings

The main results based on structural equation modelling analyses supported the impact of perceived privacy, perceived security, perceived usefulness and TTF on the customers’ continued intention to use mobile banking.

Research limitations/implications

The moderation influence of the demographic factors (i.e. age, gender, income level, educational level) was not tested. The data were also collected using a self-report questionnaire; however, it would be more accurate to utilise more statistics from the bank database about the users of m-banking.

Originality/value

This study represents a worthy attempt to test such novel technology (m-banking) in the KSA where there is a scarcity of literature. A considerable theoretical contribution was also made by integrating the TTF model with the TAM in addition to consider privacy and security in one single model. Moreover, considering both perceived privacy and security in the current model creates an accurate picture about the adoption of m-banking especially as there are a limited number of m-banking studies that have considered privacy and security alongside the TTF model and TAM in the same model.

Details

International Journal of Bank Marketing, vol. 37 no. 2
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 12 August 2014

Jungsun (Sunny) Kim and Bo Bernhard

This paper aims to extend the technology acceptance model (TAM) to explore the factors influencing a hotel customer’s intention to use a fingerprint system instead of a…

2641

Abstract

Purpose

This paper aims to extend the technology acceptance model (TAM) to explore the factors influencing a hotel customer’s intention to use a fingerprint system instead of a traditional keycard system and the moderating factors (i.e. gender and age) on the relationships between the proposed factors and the customer’s intention to use fingerprint technology. When hotels add new technologies, the potential vulnerability of their systems also increases. Underestimating such risks can possibly result in massive losses from identity theft and related fraud for hoteliers. Customers who are aware of these risks may become more open to innovative methods of identification or verification, such as biometrics.

Design/methodology/approach

The online survey instrument was developed based on TAMs. The authors collected complete 526 responses from hotel customers and tested the hypotheses using structural equation modeling.

Findings

This study found seven factors (i.e. perceived usefulness, perceived ease of use, subjective norm, perceived convenience, perceived data security, perceived property security and personal concerns) which significantly influence a hotel customer’s intention to use fingerprint technology. Gender and age played important moderating roles in the relationships between some of these factors and the intention to use.

Practical implications

Recommendations are made as to how hotels can benefit from the implementation of biometrics, particularly fingerprint systems. For example, a hotel’s marketing campaign can be more effective by emphasizing the advantages of fingerprint technology related to “data security and convenience” for younger consumers (i.e. Gen X and Gen Y).

Originality/value

Both educators and practitioners will benefit from the findings of this empirical study, as there are very few published studies on a customer’s fingerprint technology acceptance in the hotel context.

Details

Journal of Hospitality and Tourism Technology, vol. 5 no. 2
Type: Research Article
ISSN: 1757-9880

Keywords

Article
Publication date: 3 May 2013

Xianlei Ma, Nico Heerink, Ekko van Ierland, Marrit van den Berg and Xiaoping Shi

The purpose of this paper is to examine the effect of perceived land tenure security in China on farmers' decisions to invest in relatively long‐term land quality improvement…

1476

Abstract

Purpose

The purpose of this paper is to examine the effect of perceived land tenure security in China on farmers' decisions to invest in relatively long‐term land quality improvement measures, taking into account the potential endogeneity of tenure security.

Design/methodology/approach

Data from a survey held in 2008 and 2010 among 259 households in Minle County, Gansu province, covering the years 2007 and 2009, are used to estimate the factors affecting land levelling investments, irrigation canal investments and perceived land tenure security. The authors use the 2SCML technique and the IVLS method to estimate a selection model and a non‐limited regression model, respectively, and use IVP methods to examine the robustness of the results.

Findings

The authors' results indicate that perceived land tenure security significantly affects self‐governed investments but does not affect individual investments in land quality improvements. In particular, the authors find that households that consider land certificates as important for protecting land rights invest significantly more in irrigation canals construction and maintenance. The authors' results further provide evidence that individual investments in land quality improvement contribute to higher perceived land tenure security.

Originality/value

The paper contributes to the available literature on the relationship between land tenure security and land investments by examining the role of perceived (instead of formal) land tenure security and by making a distinction between individual household investments and self‐governed land investments. The authors' results provide an explanation for the phenomenon that land readjustments still take place in some parts of China, but not in others.

Details

China Agricultural Economic Review, vol. 5 no. 2
Type: Research Article
ISSN: 1756-137X

Keywords

Article
Publication date: 24 September 2018

Shaizatulaqma Kamalul Ariffin, Thenmoli Mohan and Yen-Nee Goh

This paper aims to examine the relationship between six factors of consumers’ perceived risk and consumers’ online purchase intentions. In particular, this study will examine the…

22684

Abstract

Purpose

This paper aims to examine the relationship between six factors of consumers’ perceived risk and consumers’ online purchase intentions. In particular, this study will examine the relationship between financial risk, product risk, security risk, time risk, social risk and psychological risk and online purchase intention.

Design/methodology/approach

Survey method was used for the purpose of data collection, and quantitative analysis was used to test the hypotheses. A total of 350 respondents participated on an online survey, and data were quantitatively analyzed via IBM SPSS Statistics 24.

Findings

The findings from this study suggest consumers’ perceived risks when they intend to purchase online. Five factors of perceived risk have a significant negative influence on consumer online purchase intention, while social risk was found to be insignificant. Among these factors, security risk is the main contributor for consumers to deter from purchasing online.

Practical implications

This study provides useful information to online retailers in electronic commerce (e-commerce) activities. Previous studies show that many online retailers are still facing some risks in online business, and this will affect the transaction and performance of the retailers. It is hoped that the findings can help online retailers to formulate strategies to reduce risks in the online shopping environment, especially security risks for better e-commerce.

Originality/value

The development of online shopping has led to some challenges to consumers, which comprise security of payment, data protection, the validity and enforceability of e-contract, insufficient information disclosure, product quality and enforcement of rights. This issue emerged because many online retailers do not understand the main factors that will contribute to consumers’ perceived risk. Consumers’ perceived risks will influence consumer attitudes toward online shopping and purchase behaviors. Studies on consumers’ perceived risks toward online purchase intentions are still inconclusive. Thus, this paper fills the gap in the research area.

Details

Journal of Research in Interactive Marketing, vol. 12 no. 3
Type: Research Article
ISSN: 2040-7122

Keywords

1 – 10 of over 57000