The determinants of individuals’ perceived e-security: Evidence from Malaysia

https://doi.org/10.1016/j.ijinfomgt.2013.10.001Get rights and content

Abstract

Despite the critical role of individuals’ perceived security in an online environment, previous research has not attempted to comprehensively study the influences and interrelations between the determinants of online individuals’ perceived security. This research employs five theories to examine the interrelations that might exist between the antecedents of individuals’ perceived security in online environment in Malaysia. It is the first attempt to empirically examine the interrelations of the confidentiality related factors identified in the literature which is a significant original contribution. A questionnaire was the primary research methodology and structural equation modeling was employed to test the hypotheses. The findings suggest that individuals’ perceptions about security are significantly influenced by their perceived technical protection while technical protection was found to be influenced by website design features. Moreover, it was found that individuals’ perceptions toward internally provided assurances are highly influenced by externally provided assurances. However, the results found no significant relations between internally and externally provided assurances about a website's security. The findings imply that e-retailers should launch well-designed websites and communicate the technical protection capabilities of their websites to address individuals’ security concerns. The results also suggest that e-traders should consider the factors influencing individuals’ security perceptions when designing/developing their websites.

Introduction

The development of the internet and particularly e-commerce has created a revolution in peoples’ lifestyle and standard of living. Moreover, e-commerce has also brought about many advantages for SMEs (Abbasi et al., 2010, Koiso-Kanttila, 2005, Ozer, 2002). At present, most businesses have their own website to perform at least a part of its marketing activities (Kamarulzaman, Madun, & Azmi, 2010). However, despite the benefits and advantages of e-commerce solutions, many issues have been cited as the barriers challenging the global diffusion of e-commerce. Jarvenpaa, Tractinsky, and Vitale (2000) believe that while in the early stages of internet application, users’ concerns were more about the performance of technologies and how firms have implemented their technologies and later, security has become a greater concern. The issue of security in the online environment is cited by many others as a critical factor (Berthon et al., 2008, Chang and Chen, 2008, Chang and Chen, 2009, Peikari, 2010c, Peterson et al., 2007).

Security features of a website have been cited as one of the determining factors of website success (Greunen, Herselman, & Niekerk, 2010), individuals’ online trust (Berthon et al., 2008, Chang and Chen, 2009, Chen and Barnes, 2007, Flavian and Guinaliu, 2006, Furnell et al., 2000, Kim et al., 2010, Mahmood, 2006, Miyazaki and Fernandez, 2000, Ribbink et al., 2004, Roca et al., 2009), customers’ online purchase intention (Delafrooz et al., 2011, Peikari, 2010a, Salisbury et al., 2001), perceived value (Kurt & Hacioglu, 2010) online satisfaction (Chang and Chen, 2009, Lee and Lin, 2005, Ribbink et al., 2004) and online loyalty (Flavian and Guinaliu, 2006, Liu and Hung, 2010). Therefore, individuals’ perceptions of the security features of a website play a critical role in their online behavior and purchase decision making process. Considering the critical role of factors such as customer satisfaction and loyalty in the financial performance of organizations (Ahmed et al., 2010), online security is a critical factor for online retailers.

Although the antecedents of online security have been studied by the scholars in the field of computer science and engineering, their approach is from the technical and engineering perspective and not from the social science and Management, which refer to security from the subjective perspective. Studying the antecedents of online security from the subjective perspective is important because the antecedents of security are difference in subjective and objective perspective (Chellappa and Pavlou, 2002, Kim et al., 2010, Linck et al., 2006, Peikari, 2010b, Peikari, 2010c) and the findings of each approach cannot be applied to the approach. Therefore, it is needed to study the antecedents of online security from the managerial and social science perspectives, using the subjective approach.

Despite the importance of the issue, the studies investigating the security perceptions of individuals from the subjective perspective are limited in their understanding of the determinants of perceived online security. More specifically, the interrelations between different antecedents and determinants of security have not been fully investigated and understood by researchers. In other words, previous studies have not fully addressed how to influence individual security perceptions in the online environment and only a few attempts have been made to study the antecedent factors of individuals’ perceived security (Chang and Chen, 2009, Chellappa and Pavlou, 2002, Kim et al., 2010). However, these studies had a limited approach and scope. They have not investigated the interrelations that may exist among these factors and have only studied their direct influence on perceived security. Therefore, there is a need to investigate the factors influencing individuals’ perceived security and their interrelations more deeply.

This research intends to address the interrelations between the determinants of individuals’ perceived security of websites in the B2C context. The findings of this study will contribute in the academic world by improving the current models and understanding of the interrelations that exist between such factors and overall security features, which enriches the existing knowledge and theories regarding the determinant factors of individuals’ perceived security and their interrelations. The findings also help e-retailers and practitioners to gain a better understanding of the security antecedents which in turn enables them to have more efficient and effective e-commerce strategies and design to address and improve their individuals’ security perceptions.

Another issue is that cultural differences of different nations have been found as one of the factors significantly differentiating their perceptions toward online risk and security (Cheskin Research Group, 2000, Cyr, 2008, Cyr et al., 2005, Peikari, 2010a, Talukder and Yeow, 2006). Since the majority of the research available on e-commerce has been conducted in the US: a country with high level of individualism and uncertainty avoidance, the findings of such research therefore cannot be generalized to other countries with different cultures (Alam & Yasin, 2010b). This calls for more research about individuals’ perceptions of online issues in developing countries (Abbasi, 2007, Peikari, 2010a). Furthermore, the adoption of online transactions by citizens and businesses is in its early stages in Malaysia (Alam and Yasin, 2010a, Delafrooz et al., 2011). Since customers in countries where the utilization of online shopping is in its early stages have higher levels of security concerns (Alam and Yasin, 2010a, Hwang et al., 2006), it is therefore needed to conduct context-based research about the factors influencing customers’ perceptions toward online security and its determinants in Malaysia. This brings about differences with many of the past studies in this field, which have collected data from other countries. First, Malaysia represents an Asian country with its unique culture of collectivism and uncertainty avoidance (Hofstede, 1984, Hofstede, 2001) which has made them skeptical in revealing sensitive information in the online environment (Alam and Yasin, 2010a, Peikari, 2010a). This is because the nations – like Malaysians – with high collectivism and uncertainty avoidance characteristics have more caution and less risk propensity in their social and business interactions (Bellman et al., 2004, Cyr et al., 2005). This makes the findings of this research different from those conducted in the Western countries such as the US and UK where the people have a lower level of collectivism and uncertainty avoidance.

Secondly, although the Malaysian government urges Malaysians to do many of their transactions online (Lim, Yap, & Lee, 2011), Malaysians are in the early stage of the adoption of online shopping. This has made their perceptions different with those of the nations with more online experience (Alam & Yasin, 2010a). Thirdly, there is no study available about the factors influencing customers’ perceptions of online security in Malaysia. This justifies the need to conduct this research in the context of Malaysia. The findings may help companies willing to enter the Malaysian markets for e-commerce. The findings can provide useful insights for the policy makers and business managers to effectively and efficiently address Malaysian concerns about online security. Moreover, the findings will improve our knowledge of the global diffusion of e-commerce in the developing countries in general and in Malaysia with its unique features specifically.

Section snippets

Security perceptions in e-commerce

Azizi and Javidani (2010) maintain the belief that security concerns refer to the security of financial information such as credit card information or online account passwords. Chellappa and Pavlou (2002) argue that an online transaction is secure if the information originates from the right party and reaches the right entity without being observed, changed or destroyed during the transition process and storage. Kurt and Hacioglu (2010) argue that customers perceive online security as an

Research method

This research employed a quantitative survey method and collected data cross-sectionally. Quantitative survey method was employed for this research to study the cause and effect in research, as recommended by May (1997). Moreover, quantitative techniques are suitable for the research in which researchers have some idea in advance what they are looking for (González, Masip, Granollers, & Oliva, 2009). Besides, this method of research is used for a functional and implemented information system (

Findings

It was found that the majority of the respondents (61.4%) are females. Moreover, it was found that 60.2% of the respondents had experience of more than one online purchase. The self reported IT skills of the respondents indicate that 94.7% of them evaluate their IT skills as an average or above average level. The figures for online purchase experience of the respondents and their IT skills indicate that they have adequate knowledge to understand and respond to the questions. This meets the

Discussion and conclusion

This paper examines the interrelations that might exist among three antecedent categories of customers’ perceived overall security. The antecedent categories identified in this research are (1) confidentiality technological solutions, (2) confidentiality assurance evidences including (i) externally provided assurance seals (privacy and security seals) and (ii) internally provided assurances (privacy and security statements), and (3) website design features.

The results indicate that customers’

Limitations and suggestions for further research

This study is not free from limitations. The study only focused on some system related determinant factors of security while the role of some other individual, social and business factors such as customers’ financial ability, social norms and recommendations, website and product brand reputation, merchant's attributes and past experience, customers’ personality traits such as cultural issues, trust and risk propensity were not included in the study. Such factors should be considered in future

Hamid Reza Peikari is affiliated to the Graduate School of Business, Universiti Kebangsaan Malaysia (National University of Malaysia). He has been involved in research projects related to information systems including e-commerce, clinical information systems, customer knowledge management, e-market adoption, IT strategy, and ERP risk management. He has published numerous papers, some of which have been indexed and published by Scopus and Springer.

References (84)

  • X. Hu et al.

    The effects of Web assurance seals on consumers’ initial trust in an online vendor: A functional perspective

    Decision Support Systems

    (2010)
  • C. Kim et al.

    An empirical study of customers’ perceptions of security and trust in e-payment systems

    Electronic Commerce Research and Applications

    (2010)
  • D.J. Kim et al.

    A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents

    Decision Support Systems

    (2008)
  • N. Koiso-Kanttila

    Time, attention, authenticity and consumer benefits of the Web

    Business Horizons

    (2005)
  • A.S. Lim

    Inter-consortia battles in mobile payments standardization

    Electronic Commerce Research and Application

    (2008)
  • C. Liu et al.

    Beyond concern: A privacy–trust–behavioral intention model of electronic commerce

    Information and Management

    (2004)
  • X. Luo

    Trust production and privacy concerns on the Internet, a framework based on relationship marketing and social exchange theory

    Industrial Marketing Management

    (2002)
  • M. Ozer

    The role of flexibility in online business

    Business Horizons

    (2002)
  • F. Tung et al.

    An extension of trust and TAM model with IDT in the adoption of the electronic logistics information system in HIS in the medical industry

    International Journal of Medical Informatics

    (2008)
  • S.Y. Yousafzai et al.

    A proposed model of e-trust for electronic banking

    Technovation

    (2003)
  • A. Abbasi

    E-Commerce development in Iran

    Webology

    (2007)
  • M.R. Abbasi et al.

    CSFs of e-commerce admission in small and medium size enterprises (SMEs)

    African Journal of Business Management.

    (2010)
  • I. Ahmed et al.

    A mediation of customer satisfaction relationship between service quality and repurchase intentions for the telecom sector in Pakistan: A case study of university students

    African Journal of Business Management

    (2010)
  • I. Ajzen et al.

    Understanding attitudes and predicting social behavior

    (1980)
  • I. Ajzen

    From intentions to actions: A theory of planned behavior

  • S.S. Alam et al.

    The antecedents of online brand trust: Malaysian evidence

    Journal of Business Economics and Management

    (2010)
  • S.S. Alam et al.

    An investigation into the antecedents of customer satisfaction of online shopping

    Journal of Marketing Development and Competitiveness

    (2010)
  • S. Azizi et al.

    Measuring e-shopping intention: An Iranian perspective

    African Journal of Business Management

    (2010)
  • J. Baker et al.

    The influence of multiple store environment cues on perceived merchandise value and patronage intentions

    Journal of Marketing

    (2002)
  • H.H. Bauer et al.

    eTransQual: A transaction process-based approach for capturing service quality in online shopping

    Journal of Business Research

    (2006)
  • S. Bellman et al.

    International differences in information privacy concerns: A global survey of consumers

    The Information Society

    (2004)
  • P. Berthon et al.

    E-readiness and trust: Macro and micro dualities for e-commerce in a global environment

    International Marketing Review

    (2008)
  • H.H. Chang et al.

    The impact of online store environment cues on purchase intention trust and perceived risk as a mediator

    Online Information Review

    (2008)
  • R.K. Chellappa et al.

    Perceived information security, financial liability and consumer trust in electronic commerce transactions

    Logistics Information Management

    (2002)
  • Y. Chen et al.

    Initial trust and online buyer behaviour

    Industrial Management & Data Systems

    (2007)
  • S.-C. Chen et al.

    Consumer adoption of e-service: Integrating technology readiness with the theory of planned behaviour

    African Journal of Business Management

    (2010)
  • Cheskin Research Group

    Trust in the wired Americas

    (2000)
  • E. Cristobal et al.

    Perceived e-service quality (PeSQ), measurement validation and effects on consumer satisfaction and web site loyalty

    Managing Service Quality

    (2007)
  • D. Cyr

    Modeling website design across cultures: Relationships to trust, satisfaction and e-loyalty

    Journal of Management Information Systems

    (2008)
  • D. Cyr et al.

    Beyond trust: Website design preferences across cultures

    Journal of Global Information Management

    (2005)
  • F.D. Davis

    Perceived usefulness, perceived ease of use, and user acceptance of information technology

    MIS Quarterly

    (1989)
  • N. Delafrooz et al.

    Understanding consumer's internet purchase intention in Malaysia

    African Journal of Business Management

    (2011)
  • Cited by (46)

    • Privacy in the sharing economy: Why don't users disclose their negative experiences?

      2022, International Journal of Information Management
      Citation Excerpt :

      It addresses procedural fairness and accountability for privacy violation and privacy invasion. Therefore, the privacy policy statement can mitigate online privacy concerns (Shah, Peikari, & Yasin, 2014). Thus, we hypothesize the following:

    • Frontline healthcare providers’ behavioural intention to Internet of Things (IoT)-enabled healthcare applications: A gender-based, cross-generational study

      2022, Technological Forecasting and Social Change
      Citation Excerpt :

      H2: Attitude has a more significant effect on BI toward IoT-enabled HAs among female FHPs than males. Modern digital privacy describes user awareness of personal data collection, control, and security (Hann et al., 2007; Shah et al., 2014). It affects the BI surrounding disclosure, and can be measured using PCT (Barth and de Jong, 2017; Jozani et al., 2020; Li et al., 2011; Sun et al., 2015).

    • The impact of consumers’ perceptions regarding the ethics of online retailers and promotional strategy on their repurchase intention

      2021, International Journal of Information Management
      Citation Excerpt :

      First, security can be generally categorized into financial security (e.g., concerns about the protection of financial information from unauthorized access or from incurring monetary losses during online transactions) (Román, 2007) or non-financial security (e.g., concerns about revealing personal information) (Janda, Trocchia, & Gwinner, 2002). Prior research has shown that security has been one of the most critical concerns and barriers to keeping consumers from shopping online (Shah, Peikari, & Yasin, 2014; Soomoro, Shah, & Ahmed, 2016). Second, privacy refers to the uncertainty of exposing personal information or shopping behavior to unauthorized parties (Bart, Shankar, Sultan, & Urban, 2005).

    View all citing articles on Scopus

    Hamid Reza Peikari is affiliated to the Graduate School of Business, Universiti Kebangsaan Malaysia (National University of Malaysia). He has been involved in research projects related to information systems including e-commerce, clinical information systems, customer knowledge management, e-market adoption, IT strategy, and ERP risk management. He has published numerous papers, some of which have been indexed and published by Scopus and Springer.

    Norjaya M. Yasin is affiliated to the Graduate School of Business, Universiti Kebangsaan Malaysia (National University of Malaysia). She has published in a variety of international journals including ISI indexed journals. Her research interests include issues related to marketing strategies, customer behavior and branding. She has also been involved in a variety of consultancy and academic projects in this regard.

    Mahmood Hussain Shah is Regional Director, Institute of International Business (IIB) and a Senior Lecturer at the Lancashire business School, UK. Previously he has held academic posts at Cranfield University and the University of Hertfordshire. He has also acted as a consultant to several UK and International banks on e-banking management related issues. He has published papers in several high quality Journals such as the European Journal of Information Systems and the International Journal of Information Management. His other research interests include e-banking, mobile working, Identity theft prevention methods and technology alignment.

    View full text