DOI QR코드

DOI QR Code

Mobile Payment Use in Light of Privacy Protection and Provider's Market Control

  • Received : 2021.03.24
  • Accepted : 2021.06.22
  • Published : 2021.09.30

Abstract

This study investigates the factors that facilitate or hinder people to use mobile payment, especially drawing upon the theoretical perspectives on individual's privacy protection motivation and perceived market condition. Survey data (n = 200) were collected through a web-based platform and used to test a theoretical model. The results show that one's privacy protection power is formed by various individual and technological factors (i.e., perceived data exposure, self-efficacy, and response efficacy), and in turn it determines his/her intention to use mobile payment. Moreover, the relationship between privacy protection power and mobile payment use is conditional on the perceived market control by the service provider - with a perception of the high level of provider's market control, one uses mobile payment regardless of his/her privacy protection power, while under the low level of provider's market control, the decision depends on the degree of privacy protection power. The findings would help our understanding of why some people are more susceptible to mobile payment and others are not.

Keywords

References

  1. Anderson, R. (2001). Security engineering: A guide to building dependable distributed system. Wiley Computer Publishing, New York. 
  2. Arvidsson, N. (2014). Consumer attitudes on mobile payment services-results from a proof-of-concept test. International Journal of Bank Marketing, 13(2), 150-170.  https://doi.org/10.1108/IJBM-05-2013-0048
  3. Avital, M., Sawyer, S., Kraemer, K., Sambamurthy, V., Lyytinen, K., and Iacono, C. S. (2007). Data rich and data poor scholarship: Where does IS research stand? International Conference on Information Systems (ICIS) Proceedings. 
  4. Beaudry, A., and Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493-524.  https://doi.org/10.2307/25148693
  5. Boss, S., Galletta, D., Lowry, P. B., Moody, G. D., and Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS Quarterly, 39(4), 837-864.  https://doi.org/10.25300/MISQ/2015/39.4.5
  6. Chandra, S., Srivastava, S. C., and Theng, Y. L. (2010). Evaluating the role of trust in consumer adoption of mobile payment systems: An empirical analysis. Communications of the Association for Information Systems, 27(29), 561-588. 
  7. Chen, L. D. (2008). A model of consumer acceptance of mobile payment. International Journal of Mobile Communications, 6(1), 32-52.  https://doi.org/10.1504/IJMC.2008.015997
  8. Choi, H., and Jung, Y. (2019). Online users' cynical attitudes towards privacy protection: Examining privacy cynicism. Asia Pacific Journal of Information Systems, 30(3), 547-567.  https://doi.org/10.14329/apjis.2020.30.3.547
  9. Choi, H., Jung, Y., and Choi, Y. (2019). Understanding of the fintech phenomenon in the beholder's eyes in South Korea. Asia Pacific Journal of Information Systems, 29(1), 117-143.  https://doi.org/10.14329/apjis.2019.29.1.117
  10. Epstein, L. G. and Kopylov, I. (2005). Cognitive dissonance and choice. Working Paper, University of Rochester. 
  11. Ernst and Young (2019). Global FinTech adoption index 2019. Retrieved from https://assets.ey.com/content/dam/ey-sites/ey-com/en_gl/topics/banking-and-capital-markets/ey-global-fintech-adoption-index.pdf. 
  12. Eze, U. C., Gan, G. G. G., Ademu, J., and Tella, S. A. (2008). Modelling user trust and mobile payment adoption: A conceptual framework. Communications of the IBIMA, 3(29), 224-231. 
  13. Floyd, D. L., Prentice-Dunn, S., and Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407-429.  https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
  14. Fornell, C., and Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement Error. Journal of Marketing Research, 18(1), 39-50.  https://doi.org/10.1177/002224378101800104
  15. Gao, L., and Waechter, K. (2017). Examining the role of initial trust in user adoption of mobile payment services: An empirical investigation. Information Systems Frontiers, 19(3), 525-548.  https://doi.org/10.1007/s10796-015-9611-0
  16. Ghosh, I., & Singh, V. (2017). Using cognitive dissonance theory to understand privacy behavior. Proceedings of the Association for Information Science and Technology, 54(1), 679-681.  https://doi.org/10.1002/pra2.2017.14505401114
  17. Goodman, J. K., Cryder, C. E., and Cheema, A. (2013). Data collection in a flat world: The strengths and weaknesses of mechanical turk samples. Journal of Behavioral Decision Making, 26(3), 213-224.  https://doi.org/10.1002/bdm.1753
  18. Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., and Tatham, R. L. (1998). Multivariate data analysis. Upper Saddle River, NJ: Prentice hall. 
  19. Hasan, R., Liu, Y., Kitchen, P. J., and Rahman, M. (2019). Exploring consumer mobile payment adoption in the bottom of the pyramid context: A qualitative study. Strategic Change, 28(5), 345-353.  https://doi.org/10.1002/jsc.2289
  20. Henseler, J., Ringle, C. M., and Sarstedt, M. (2015). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115-135.  https://doi.org/10.1007/s11747-014-0403-8
  21. Hoffmann, C. P., Lutz, C., and Ranzini, G. (2016). Privacy cynicism: A new approach to the privacy paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 10(4), Article 7. 
  22. Jaradat, M. I. R. M., and Faqih, K. M. (2014). Investigating the moderating effects of gender and self-efficacy in the context of mobile payment adoption: A developing country perspective. International Journal of Business and Management, 9(11), 147-169. 
  23. Johnston, A. C., and Warkentin, M. (2010). Fear appeals and information security behaviors: An empirical study. MIS Quarterly 34(3), 549-566.  https://doi.org/10.2307/25750691
  24. Johnston, V. L., Kiser, A., Washington, R., and Torres, R. (2018). Limitations to the rapid adoption of m-payment services: Understanding the impact of privacy risk on M-payment services. Computers in Human Behavior, 79, 111-122.  https://doi.org/10.1016/j.chb.2017.10.035
  25. Kankanhalli, A., Lee, O. K. D., and Lim, K.H. (2011). Knowledge reuse through electronic repositories: A study in the context of customer service support. Information & Management, 48(2-3), 106-113.  https://doi.org/10.1016/j.im.2011.02.002
  26. Kim, S., Mirusmonov, M., and Lee, I. (2010). An empirical examination of factors influencing the intention to use mobile payment. Computers in Human Behavior, 26(3), 310-322.  https://doi.org/10.1016/j.chb.2009.10.013
  27. Kock, N. (2015). Common method bias in PLS-SEM: A full collinearity assessment approach. International Journal of e-Collaboration, 11(4), 1-10. 
  28. Liang, H., and Xue, Y. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71-90.  https://doi.org/10.2307/20650279
  29. Liebana-Cabanillas, F, Sanchez-Fernandez, J., and Munoz-Leiva, F. (2014). Antecedents of the adoption of the new mobile payment systems: The moderating effect of age. Computers in Human Behavior, 35, 464-478.  https://doi.org/10.1016/j.chb.2014.03.022
  30. Lowry, P. B., D'Arcy, J., Hammer, B., and Moody, G. D. (2016). "Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of cata collection, including mechanical turk and online panels. The Journal of Strategic Information Systems, 25(3), 232-240.  https://doi.org/10.1016/j.jsis.2016.06.002
  31. Moon, Y. (2020). Enablers of the adoption of mobile banking: From economic-psychological-social perspectives. Asia Pacific Journal of Information Systems, 30(1), 72-93.  https://doi.org/10.14329/apjis.2020.30.1.72
  32. Pingitore, G., Rao, V., Dwivedi, K., and Cavallaro, K. (2017). To share or not to share. Deloitte Insights, Retrieved from https://www2.deloitte.com/insights/us/en/industry/retail-distribution/sharing-personal-information-consumer-privacy-concerns.html. 
  33. Prahalad, C. K., and Hart, S. L. (2002). Strategy and business. The Fortune at the Bottom of the Pyramid, 26, 2-14. 
  34. R, N., and Rathi, R. (2019). Mobile payments: Comparis on of two powerhouses of the world. Retrieved from https://gomedici.com/medici_ltp_articles/5558. 
  35. Rogers, R.W. (1975). A protection motivation theory of fear appeals and attitude change. Journal of Psychology, 91(1), 93-114.  https://doi.org/10.1080/00223980.1975.9915803
  36. Senicar, V., Jerman-Blazic, B., and Klobucar, T. (2003). Privacy-enhancing technologies-approaches and development. Computer Standards & Interfaces, 25, 147-158.  https://doi.org/10.1016/S0920-5489(03)00003-5
  37. Slade, E., Willams, M., Dwivedi, Y., and Piercy, N. (2015). Exploring consumer adoption of proximity mobile payments. Journal of Strategic Marketing, 23(3), 209-223.  https://doi.org/10.1080/0965254X.2014.914075
  38. Statista (2017). Preferred payment methods of online shoppers worldwide as of March 2017. Retrieved from-https://www.statista.com/statistics/508988/preferred-payment-methods-of-online-shoppers-worldwide/ 
  39. Steelman, Z. R., Hammer, B. I., and Limayem, M. (2014). Data collection in the digital age: Innovative alternatives to student samples. Journal of Consumer Psychology, 23(2), 212-219. 
  40. Syed, R., Dhillon, G., and Merrick, J. (2019). The identity management value model: A design science approach to assess value gaps on social media. Decision Sciences, 50(3), 498-536.  https://doi.org/10.1111/deci.12335
  41. Tsai, J. Y., Egelman, S., Cranor, L., and Acquisti, A. (2011). The effect of online privacy information on purchasing behavior: An experimental study. Information Systems Research, 22(2), 254-268.  https://doi.org/10.1287/isre.1090.0260
  42. Van Slyke, C., Shim, J. T., Johnson, R., and Jiang, J. J. (2006). Concern for information privacy and online consumer purchasing. Journal of the Association for Information Systems, 7(6), 415-444.  https://doi.org/10.17705/1jais.00092
  43. Yang, S., Lu, Y., Gupta, S., Cao, Y., and Zhang, R. (2012). Mobile payment services adoption across time: An empirical study of the effects of behavioral beliefs, social influences, and personal traits. Computers in Human Behavior, 28(1), 129-142.  https://doi.org/10.1016/j.chb.2011.08.019
  44. Zhou, T. (2013). An empirical examination of continuance intention of mobile payment services. Decision Support Systems, 54(2), 1085-1091. https://doi.org/10.1016/j.dss.2012.10.034