Online Security Cues and E-Payment Continuance Intention

Online Security Cues and E-Payment Continuance Intention

Echo Huang, Fa-Chang Cheng
Copyright: © 2012 |Pages: 17
DOI: 10.4018/jeei.2012010104
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Previous studies consider confidence in the Internet as a means of payment and existence of a legal framework that protect consumers in their activities on the Internet are the critical issues of B2C success. To respond, this study extends the IS Continuance Model with Cue Utilization Theory to examine the impact of offering e-payments to online users, specifically, the relationship between their perceived benefits, legal protection, risk avoidance, and satisfaction with prior experiences. The analytical results presented in this study indicate that perceived cues (benefits, legal protection and risk allocation) differentially affect consumer behavior. Notably, perceived cues and confirmation associated with satisfaction have influences on e-payment continuance intention. That is, if consumers’ perception of online security cues increases, their intentions to continue use of e-payment increase even if the systems or services are perceived low reliability. Finally the practical and theoretical implications of this study are discussed.
Article Preview
Top

Introduction

The success of electronic commerce depends upon effective e-payment systems. Accompanying the exponentially rapidly growth of the Internet and online business, more and more innovative Internet payment methods have been developed to address the needs for greater speed and convenience (Leclerc et al., 1995). An electronic payment is defined as a payment services that utilize information and communications technologies including integrated circuit (IC) card, cryptograph, and telecommunication networks (Raja et al., 2008). Compare with traditional payment such as pay-by-check, pay-by-phone, or wire transfer, e-payment is considered more time- and cost-efficient, convenient, and flexible for customers and business (Sorkin 2001; Yu et al., 2002). New Internet payment methods based on wired and wireless Internet channels, along with related technologies such as smart cards, e-money, virtual currency (e.g., QQ coin, Facebook Credits) and P2P payment (e.g., Paypal), are together termed “e-payments.” Ways to make payments through the Internet or mobile phones have proliferated in the past few years. Various types of services exist, some of which are new methods of accessing existing payment arrangements, while others including both completely new payment arrangement and new methods of accessing existing payment arrangements, but all are ultimately linked to existing payment and banking channels (Allen, 2003).

Security is the main concern of online payment systems (Raja et al., 2008) which is working with Internet technology, they are in exposure of data theft, stealing, and fraud. Especially when the data about the money and financial information are more dangerous. If they lose a small piece of data such as personal identity, they may lose everything. Fraud risk refers to the global networks, credit, debit and charge cards can never avoid the risk of crime entirely (Levi & Burrows, 2008). E-payment fraud and computer crime found globally and reported fraud will increase. The e-payment method involves the disclosure of sensitive personal information online and the service providers may potentially misuses such personal information either purposely or accidentally (He & Mykytyn, 2007).

With the increasing usage of the Internet, the fears of privacy abuse become a top concern of most of the Internet users. The privacy issue becomes a conflicting issue between consumers and merchants. As consumers prefer to keep the details of their transaction private, conversely merchants and issuers in favor to ensure they capture and possess enough an appropriate and sufficient record of their transactions. E-payment may lead to an inadvertent error, intentional misappropriation of funds or fraudulently going out of business (Sorkin, 2001). Security refers to a set of procedures, mechanisms and computer programs to authenticate the source of information and guarantee the integrity and privacy of the information to abstain this circumstance to lead to a hardship of data or network resources. Online stores employ numerous safety cues to persuade customers to make an online purchase. During the online purchase process consumers come along and click through safety indicators such as privacy policies, product warranties, and customer reviewers (Noort et al., 2008). Web designers and B2C retailers extensively use logos, marks, seals, and signs of safety and security indicators. Will these safety cues result in favorable attitudes toward the site and toward the B2C retailers and increase individual confidence to make a payment electronically?

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 2 Issues (2022)
Volume 11: 2 Issues (2021)
Volume 10: 2 Issues (2020)
Volume 9: 2 Issues (2019)
Volume 8: 2 Issues (2018)
Volume 7: 2 Issues (2017)
Volume 6: 2 Issues (2016)
Volume 5: 2 Issues (2015)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing