Perceived mobile information security and adoption of mobile payment services in China

被引:7
作者
Gao F. [1 ]
Rau P.-L.P. [1 ]
Zhang Y. [1 ]
机构
[1] Department of Industrial Engineering, Tsinghua University, Beijing
关键词
Information Security; Mobile Payment; Perceived Controllability; Perceived Familiarity; Perceived Impact; Perceived Security; User Adoption;
D O I
10.4018/IJMHCI.2017010104
中图分类号
学科分类号
摘要
The rapid deployment of mobile devices and the development of mobile services and applications require to address the mobile information security from the human side. This study was aimed at identifying factors influencing people's perception of mobile information security, to investigate the impact of these factors and to facilitate related service design. A survey was conducted and analyzed with exploratory factor analysis. Five factors were identified, including perceived familiarity, perceived impact, perceived controllability, perceived awareness and perceived possibility. Thereinto, the impact of controllability, impact and familiarity on the adoption of mobile payment was investigated. Impact significantly affected the intention to use, but not the perceived security of payment systems. Control level significantly affected the intention to use and the perceived security. Familiarity was found to have an effect on neither the intention to use nor the perceived security. Related design implications for mobile payment systems were discussed. © 2017 IGI Global.
引用
收藏
页码:45 / 62
页数:17
相关论文
共 48 条
[1]  
Anckar B., Incau D.D., Value creation in mobile commerce: Findings from a consumer survey, Journal of Information Technology Theory and Application, 4, 1, pp. 43-64, (2002)
[2]  
Andreev P., Pliskin N., Rafaeli S., Drivers and Inhibitors of Mobile-Payment Adoption by Smartphone Users, International Journal of E-Business Research, 8, 3, pp. 50-67, (2012)
[3]  
Barn B.S., Barn R., Tan J.-P., Young People and Smart Phones: An Empirical Study on Information Security, Paper Presented at the47th Hawaii International Conference on System Sciences (HICSS), (2014)
[4]  
Benoit O., Dabbous N., Gauteron L., Girard P., Handschuh H., Naccache D., Whelan C., Et al., Mobile Terminal Security, Network Security, pp. 275-296, (2006)
[5]  
Chiu C.M., Wang E.T., Fang Y.H., Huang H.Y., Understanding customers' repeat purchase intentions in B2C e-commerce: The roles of utilitarian value, hedonic value and perceived risk, Information Systems Journal, 24, 1, pp. 85-114, (2014)
[6]  
Dahlberg T., Mallat N., Oorni A., Trust enhanced technology acceptance modelconsumer acceptance of mobile payment solutions: Tentative evidence, Stockholm Mobility Roundtable, pp. 22-23, (2003)
[7]  
Dai H., Palvi P.C., Mobile commerce adoption in China and the United States: A cross-cultural study, ACM SIGMIS Database, 40, 4, pp. 43-61, (2009)
[8]  
Davis F.D., Bagozzi R.P., Warshaw P.R., User acceptance of computer technology: A comparison of two theoretical models, Management Science, 35, 8, pp. 982-1003, (1989)
[9]  
Trends and Prospects of Mobile Payment Industry in China 2012-2015: Creating Innovative Models, Boosting Mobile Financial Services, (2012)
[10]  
Dourish P., Anderson K., Collective information practice: Emploring privacy and security as social and cultural phenomena, Human-Computer Interaction, 21, 3, pp. 319-342, (2006)