Abstract
The purpose of this research is to assess the impact of trust, when balanced with risk and benefit, on consumer intention to adopt mobile payment systems. A research model is created to assess intent based on perceived trust, along with three antecedents – privacy, security, and familiarity – and packaged with an extended valence framework that takes into account the opposing notions of perceived risk and perceived benefit. Following a pilot study of 76 participants, data is collected from a survey of 234 respondents and is analyzed using consistent Partial Least Squares (PLSc). Results indicate that perceived benefit and perceived trust are the most important influences on the intention to use mobile payment systems, and that the perceived risk of using mobile payment systems has little or no impact on intention to use. The risk result is explained by motivational avoidance theory and institutional dependence.
Similar content being viewed by others
References
Ajzen, I., & Fishbein, M. (1980). Understanding attitudes and predicting social behavior. Englewood Cliffs: Prentice Hall (Vol. 278).
Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T.
Alba, J. W., & Hutchinson, J. W. (1987). Dimensions of consumer expertise. Journal of Consumer Research, 13(4), 411. https://doi.org/10.1086/209080.
Albashrawi, M., & Motiwalla, L. (2019). Privacy and personalization in continued usage intention of mobile banking: An integrative perspective. Information Systems Frontiers, 21(5), 1031–1043. https://doi.org/10.1007/s10796-017-9814-7.
Aldás-Manzano, J., Ruiz-Mafé, C., & Sanz-Blas, S. (2009). Exploring individual personality factors as drivers of M-shopping acceptance. Industrial Management & Data Systems, 109(6), 739–757. https://doi.org/10.1108/02635570910968018.
Aloudat, A., Michael, K., Chen, X., & Al-Debei, M. M. (2014). Social acceptance of location-based mobile government services for emergency management. Telematics and Informatics, 31(1), 153–171. https://doi.org/10.1016/j.tele.2013.02.002.
Amoroso, D. L., & Magnier-Watanabe, R. (2012). Building a research model for mobile wallet consumer adoption: The case of mobile Suica in Japan. Journal of Theoretical and Applied Electronic Commerce Research, 7(1), 94–110. https://doi.org/10.4067/S0718-18762012000100008.
Arora, R., & Stoner, C. (1996). The effect of perceived service quality and name familiarity on the service selection decision. Journal of Services Marketing, 10(1), 22–34. https://doi.org/10.1108/08876049610106699.
Aydin, G. (2016). Adoption of mobile payment systems: a study on mobile wallets. Pressacademia, 5(1), 73–73. https://doi.org/10.17261/pressacademia.2016116555.
Bélanger, F., & Carter, L. (2005). Trust and risk in e-government adoption. Association for Information Systems – 11th Americas Conference on Information Systems, AMCIS 2005: A Conference on a Human Scale, 2, 735–744. https://doi.org/10.1016/j.jsis.2007.12.002.
Bélanger, F., Hiller, J. S., & Smith, W. J. (2002). Trustworthiness in Electronic Commerce: The Role of Privacy, Security, and Site Attributes Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, 11(July 2016), 245–270. https://doi.org/10.1016/S0963-8687(02)00018-5.
Bisdikian, C., Gibson, C., Chakraborty, S., Srivastava, M. B., Sensoy, M., & Norman, T. J. (2014). Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments. Pervasive and Mobile Computing, 11, 168–187. https://doi.org/10.1016/j.pmcj.2013.08.003.
Cao, X. (2017). Understanding mobile payment users’ continuance intention: a trust transfer perspective, (71502168). https://doi.org/10.1108/IntR-11-2016-0359.
Chellappa, R. K., & Pavlou, P. A. (2002). Perceived information security, financial liability and consumer trust in electronic commerce transactions. Logistics Information Management, 15, 358–368.
Chin, A. G., Harris, M. A., & Brookshire, R. (2018). A bidirectional perspective of trust and risk in determining factors that influence mobile app installation. International Journal of Information Management, 39. https://doi.org/10.1016/j.ijinfomgt.2017.11.010.
Chin, A. G., Etudo, U., & Harris, M. A. (2016). On mobile device security practices and training efficacy: an empirical study. Informatics in Education, 15(2), 235–252. https://doi.org/10.15388/infedu.2016.12.
Chin, A. G., Little, P., & Jones, B. (2020). An analysis of smartphone security practices among undergraduate business students at a Regional Public University Amita G Chin Philip Little. International Journal of Education and Development Using Information and Communication Technology, 16(1), 44–61.
Chin, E., Felt, A. P., Sekar, V., & Wagner, D. (2012). Measuring user confidence in smartphone security and privacy. Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS ’12, (1), 1. https://doi.org/10.1145/2335356.2335358.
Cipriani, J. (2015). Here’s why Samsung Pay is way better than Apple Pay and Android Pay. Retrieved October 14, 2019, from https://fortune.com/2015/09/30/samsung-pay-review/.
Cocosila, M., & Trabelsi, H. (2016). Electronic commerce research and applications an integrated value-risk investigation of contactless mobile payments adoption. Electronic Commerce Research and Applications, 20, 159–170. https://doi.org/10.1016/j.elerap.2016.10.006.
Coupey, E., Irwin, J. R., & Payne, J. W. (1998). Product category familiarity and preference construction. Journal of Consumer Research, 24(4), 459–468.
Culnan, M. J., & Armstrong, P. K. (1999). Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organization Science, 10(1), 104–115. https://doi.org/10.1287/orsc.10.1.104.
Currás-Pérez, R., Ruiz-Mafé, C., & Sanz-Blas, S. (2013). Social network loyalty: Evaluating the role of attitude, perceived risk and satisfaction. Online Information Review, 37(1), 61–82. https://doi.org/10.1108/14684521311311630.
de Kerviler, G., Demoulin, N. T. M., & Zidda, P. (2016). Adoption of in-store mobile payment: Are perceived risk and convenience the only drivers? Journal of Retailing and Consumer Services, 31, 334–344. https://doi.org/10.1016/j.jretconser.2016.04.011.
Dahlberg, T., Guo, J., & Ondrus, J. (2015). A critical review of mobile payment research. Electronic Commerce Research and Applications, 14(5), 265–284. https://doi.org/10.1016/j.elerap.2015.07.006.
Dahlberg, T., Mallat, N., Ondrus, J., & Zmijewska, A. (2008). Past, present and future of mobile payments research: A literature review. Electronic Commerce Research and Applications, 7(2), 165–181. https://doi.org/10.1016/j.elerap.2007.02.001.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008.
Dijkstra, T. K., & Henseler, J. (2015). Research essay consistent partial least squares path modeling. MIS Quarterly, 39(2), 297–316.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for e-commerce transactions. Information Systems Research, 17(1), 61–80. https://doi.org/10.1287/isre.1060.0080.
Ericsson. (2017). Mobility report. Accessed 24 Sept 2020. [Online]. Available: https://www.Ericsson.Com/Res/Docs/2016/Ericsson-Mobility-Report-2016.Pdf, (November), 7–8. https://doi.org/10.3103/S0005105510050031.
Faden, M. (2020). QR Codes used in payment services. Retrieved May 22, 2020, from https://www.americanexpress.com/us/foreign-exchange/articles/use-of-qr-codes-in-payment-services/.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behavior: An introduction to theory and research. Reading: Addison Wesley.
Flavián, C., Guinalíu, M., & Gurrea, R. (2006). The role played by perceived usability, satisfaction and consumer trust on website loyalty. Information and Management, 43(1), 1–14. https://doi.org/10.1016/j.im.2005.01.002.
Gao, L., & Waechter, K. A. (2017). Examining the role of initial trust in user adoption of mobile payment services: an empirical investigation. Information Systems Frontiers, 19(3), 525–548. https://doi.org/10.1007/s10796-015-9611-0.
Gao, L., Waechter, K. A., & Bai, X. (2015). Understanding consumers’ continuance intention towards mobile purchase: A theoretical framework and empirical study - A case of China. Computers in Human Behavior, 53, 249–262. https://doi.org/10.1016/j.chb.2015.07.014.
Gefen, D. (2000). E-commerce: the role of familiarity and trust. Omega, 28(6), 725–737. https://doi.org/10.1016/S0305-0483(00)00021-9.
Goodwin, N. R. (1996). Economic Meanings of Trust and Responsibility. Ann Arbor: The University of Michigan Press.
Grob, M. (2016). Impediments to mobile shopping continued usage intention: A trust-risk-relationship. Journal of Retailing and Consumer Services, 33, 109–119. https://doi.org/10.1016/j.jretconser.2016.08.013.
Gu, J. & Xu, Y. (Calvin), Xu, H., Zhang, C., & Ling, H. (2016). Privacy concerns for mobile app download: An elaboration likelihood model perspective. Decision Support Systems. https://doi.org/10.1016/j.dss.2016.10.002.
Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review, 31(1), 2–24. https://doi.org/10.1108/EBR-11-2018-0203.
Harman, H. H. (1976). Modern Factor Analysis (3rd ed.). Chicago: University of Chicago Press.
Harris, M. A., & Chin, A. G. (2016). Consumer trust in Google’s top developers’ apps: An exploratory study. Information and Computer Security, 24(5). https://doi.org/10.1108/ICS-11-2015-0044.
Harris, M. A., Chin, A. G., & Beasley, J. (2019). Mobile payment adoption: An empirical review and opportunities for future research. In Southern Association of Information Systems 2019 Proceedings (pp. 1–6). Retrieved from https://aisel.aisnet.org/sais2019/8.
Harris, M. A., Chin, A. G., & Brookshire, R. (2015). Mobile app installation: The role of precautions and desensitization. Journal of International Technology and Information Management, 24(4).
Harris, M. A., Brookshire, R., & Chin, A. G. (2016). Identifying factors influencing consumers’ intent to install mobile applications. International Journal of Information Management, 36(3), 441–450. https://doi.org/10.1016/j.ijinfomgt.2016.02.004.
Harris, M. A., & Patten, K. P. (2014). Mobile device security considerations for small- and medium-sized enterprise business mobility. Information Management & Computer Security, 22(1), 97–114. https://doi.org/10.1108/IMCS-03-2013-0019.
Hassoy, H., Durusoy, R., & Karababa, A. O. (2013). Adolescents’ risk perceptions on mobile phones and their base stations, their trust to authorities and incivility in using mobile phones: a cross-sectional survey on 2240 high school students in Izmir, Turkey. Environmental Health: A Global Access Science Source, 12(1), 10. https://doi.org/10.1186/1476-069X-12-10.
Henseler, J., Ringle, C. M., & Sarstedt, M. (2014). A new criterion for assessing discriminant validity in variance-based structural equation modeling. Journal of the Academy of Marketing Science, 43(1), 115–135. https://doi.org/10.1007/s11747-014-0403-8.
Hillman, S., & Neustaedter, C. (2016). Trust and mobile commerce in North America. Computers in Human Behavior, 70, 10–21. https://doi.org/10.1016/j.chb.2016.12.061.
Infineon. (2017). Mobile payment, everything you need to know. Retrieved May 22, 2020, from https://www.infineon.com/cms/en/discoveries/mobile-payment/.
Inscoe, S. (2017). Global consumer survey: consumer trust and security perceptions. Retrieved May 22, 2020, from https://aitegroup.com/report/global-consumer-survey-consumer-trust-and-security-perceptions.
Ismagilova, E., Hughes, L., Rana, N. P., & Dwivedi, Y. K. (2020). Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework. Information Systems Frontiers. https://doi.org/10.1007/s10796-020-10044-1.
Jacob, J., & Kaplan, L. B. (1972). The components of perceived risk. In M. Venkatesan (Ed.), Proceedings of the Third Annual Conference of the Association for Consumer Research (pp. 382–393). Chicago.
Jing, Y., Ahn, G.-J., Zhao, Z., & Hu, H. (2014). Towards automated risk assessment and mitigation of mobile application. IEEE Transactions on Dependable and Secure Computing, 5971(c), 1–1. https://doi.org/10.1109/TDSC.2014.2366457.
Johnson, E. J., & Russo, J. E. (1984). Product familiarity and learning new information. Journal of Consumer Research, 11(1), 542. https://doi.org/10.1086/208990.
Jones, B. H., & Chin, A. G. (2015). On the efficacy of smartphone security: A critical analysis of modifications in business students’ practices over time. International Journal of Information Management, 35(5), 561–571. https://doi.org/10.1016/j.ijinfomgt.2015.06.003.
Jones, B. H., Chin, A. G., & Aiken, P. (2014). Risky business: Students and smartphones. TechTrends, 58(6), 73–83. https://doi.org/10.1007/s11528-014-0806-x.
Jones, D. (2018). Smartwatch, bracelets help broaden mobile payment options amid competition. Retrieved October 1, 2020, from https://www.mobilepaymentstoday.com/articles/smartwatch-bracelets-help-broaden-mobile-payment-options-amid-competition/.
Jonsson, P., Carson, S., Torres, A., Per Lindberg, K., & Karapantelakis, A. (2019). Ericsson mobility report. Retrieved May 22, 2020, from https://www.ericsson.com/en/press-releases/2019/6/ericsson-mobility-report-5g-uptake-even-faster-than-expected.
Jorgensen, Z., Chen, J., Lafayette, W., Gates, C. S., Lafayette, W., & Proctor, R. W. (2015). Dimensions of risk in mobile applications: A user study. Codaspy 2015, 49–60. https://doi.org/10.1145/2699026.2699108.
Jost, J. T., & Banaji, M. R. (1994). The role of stereotyping in system-justification and the production of false consciousness. British Journal of Social Psychology, 33(1), 1–27. https://doi.org/10.1111/j.2044-8309.1994.tb01008.x.
Kapoor, K. K., Dwivedi, Y. K., & Williams, M. D. (2015). Examining the role of three sets of innovation attributes for determining adoption of the interbank mobile payment service. Information Systems Frontiers, 17(5), 1039–1056. https://doi.org/10.1007/s10796-014-9484-7.
Kay, A. C., Gaucher, D., Napier, J. L., Callan, M. J., & Laurin, K. (2008). God and the government: testing a compensatory control mechanism for the support of external systems. Journal of Personality and Social Psychology, 95(1), 18–35. https://doi.org/10.1037/0022-3514.95.1.18.
Keith, M. J., Babb, J. S., Lowry, P. B., Furner, C. P., & Abdullat, A. (2015). The role of mobile-computing self-efficacy in consumer information disclosure. Information Systems Journal, 25(6), 637–667. https://doi.org/10.1111/isj.12082.
Khalilzadeh, J., Ozturk, A. B., & Bilgihan, A. (2017). Security-related factors in extended UTAUT model for NFC based mobile payment in the restaurant industry. Computers in Human Behavior, 70(2017), 460–474. https://doi.org/10.1016/j.chb.2017.01.001.
Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems, 44(2), 544–564. https://doi.org/10.1016/j.dss.2007.07.001.
Kim, D., Ferrin, D., & Rao, H. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information Systems Research, 20(2), 237–257. https://doi.org/10.1287/isre.1080.0188.
Kim, G., & Koo, H. (2016). The causal relationship between risk and trust in the online marketplace: A bidirectional perspective. Computers in Human Behavior, 55, 1020–1029. https://doi.org/10.1016/j.chb.2015.11.005.
Kim, K. K., & Prabhakar, B. (2004). Initial trust and the adoption of B2C e-commerce: The case of internet banking. Data Base for Advances in Information Systems, 35(2), 50–64. https://doi.org/10.1145/1007965.1007970.
Laufer, R. S., & Wolfe, M. (1977). Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of Social Issues, 33(3), 22–42. https://doi.org/10.1111/j.1540-4560.1977.tb01880.x.
Liébana-Cabanillas, F., Sánchez-Fernández, J., & Muñoz-Leiva, F. (2014). Antecedents of the adoption of the new mobile payment systems: The moderating effect of age. Computers in Human Behavior, 35, 464–478. https://doi.org/10.1016/j.chb.2014.03.022.
Lu, Y., Yang, S., Chau, P. Y. K., & Cao, Y. (2011). Dynamics between the trust transfer process and intention to use mobile payment services: A cross-environment perspective. Information and Management, 48(8), 393–403. https://doi.org/10.1016/j.im.2011.09.006.
Madden, T. J., Ellen, P. S., & Ajzen, I. (1992). A comparison of the theory of planned behavior and the theory of reasoned action. Personality and Social Psychology Bulletin, 18(1), 3–9. https://doi.org/10.1177/0146167292181001.
Mallat, N. (2007). Exploring consumer adoption of mobile payments - A qualitative study. Journal of Strategic Information Systems, 16(4), 413–432. https://doi.org/10.1016/j.jsis.2007.08.001.
Masclet, D., & Pénard, T. (2012). Do reputation feedback systems really improve trust among anonymous traders? An experimental study. Applied Economics, 44(35), 4553–4573. https://doi.org/10.1080/00036846.2011.591740.
Matemba, E. D., Li, G., & Maiseli, B. J. (2018). Consumers’ stickiness to mobile payment applications: An empirical study of wechat wallet. Journal of Database Management, 29(3). https://doi.org/10.4018/JDM.2018070103.
McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). The impact of initial consumer trust on intentions to transact with a web site: A trust building model. Journal of Strategic Information Systems, 11(3–4), 297–323. https://doi.org/10.1016/S0963-8687(02)00020-3.
Menke, L., & de Lussanet, M. (2006). SMS Based mobile payment: popular with the young. Retrieved October 14, 2019, from http://www.forrester.com/Research/Document/Excerpt/0,7211,40678,00.html.
Meola, A. (2019) Rise of M-Commerce: mobile ecommerce shopping stats & trends in 2020 business insider. Retrieved May 22, 2020, from https://www.businessinsider.com/mobile-commerce-shopping-trends-stats?op=1.
Miyazaki, A. D., & Fernandez, A. (2001). Consumer perceptions of privacy and security risks for online shopping. Journal of Consumer Affairs, 35(1), 27–44. https://doi.org/10.1111/j.1745-6606.2001.tb00101.x.
Morosan, C., & DeFranco, A. (2016). It’s about time: Revisiting UTAUT2 to examine consumers’ intentions to use NFC mobile payments in hotels. International Journal of Hospitality Management, 53, 17–29. https://doi.org/10.1016/j.ijhm.2015.11.003.
Nicolaou, A. I., & McKnight, D. H. (2006). Perceived information quality in data exchanges: Effects on risk, trust, and intention to use. Information Systems Research, 17(4), 332–351. https://doi.org/10.1287/isre.1060.0103.
Oliveira, T., Thomas, M., Baptista, G., & Campos, F. (2016). Computers in human behavior mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Computers in Human Behavior, 61(2016), 404–414. https://doi.org/10.1016/j.chb.2016.03.030.
Ozturk, A. B., Bilgihan, A., Salehi-Esfahani, S., & Hua, N. (2017). Understanding the mobile payment technology acceptance based on valence theory: A case of restaurant transactions. International Journal of Contemporary Hospitality Management, 29(8), 2027–2049. https://doi.org/10.1108/IJCHM-04-2016-0192.
Park, C. W., & Lessig, V. P. (1981). Familiarity and Its impact on consumer decision biases and heuristics. Journal of Consumer Research, 8(2), 223. https://doi.org/10.1086/208859.
Park, C. W., Kim, D., gook, Cho, S., & Han, H. J. (2019). Adoption of multimedia technology for learning and gender difference. Computers in Human Behavior, 92(August 2018), 288–296. https://doi.org/10.1016/j.chb.2018.11.029.
Pavlou, P. A. (2003). Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce, 7(3), 69–103.
Pavlou, P. A., & Gefen, D. (2004). Building effective online marketplaces with institution-based trust. Information Systems Research, 15(1). https://doi.org/10.1287/isre.1040.0015.
Pearson, S. (2013). Privacy, security and trust in cloud computing, privacy and security for cloud computing. London: Springer.
Peter, J. P., & Tarpey, L. X. (1975). A comparative analysis of three consumer decision strategies. Journal of Consumer Research, 2(1), 29–37.
Pietro, L., Di, Mugion, R., Mattia, G., Renzi, M. F., & Toni, M. (2015). The integrated model on mobile payment acceptance (IMMPA): an empirical application to public transport. Transportation Research Part C: Emerging Technologies, 56, 463–479. https://doi.org/10.1016/j.trc.2015.05.001.
Pinola, M. (2018). Lifewire: How to pay with your phone or tablet. Retrieved October 14, 2019, from https://www.lifewire.com/mobile-payments-4103869.
Podsakoff, P. M., MacKenzie, S. B., Lee, J. Y., & Podsakoff, N. P. (2003). Common method biases in behavioral research: a critical review of the literature and recommended remedies. Journal of Applied Psychology, 88(5), 879–903. https://doi.org/10.1037/0021-9010.88.5.879.
Qasim, H., & Abu-Shanab, E. (2016). Drivers of mobile payment acceptance: The impact of network externalities. Information Systems Frontiers, 18(5), 1021–1034. https://doi.org/10.1007/s10796-015-9598-6.
Qiu, M., Li, R., & Chen, M. (2013). An influence study on adopting will of tourism mobile e-commerce by the perceived risk and trust. IBusiness, 05(01), 39–42. https://doi.org/10.4236/ib.2013.51B009.
Quelch, J. A., & Klein, L. R. (1996). The internet and international marketing. Sloan Management Review, 37(3).
Rao, A. R., & Monroe, K. B. (1988). The moderating effect of prior knowledge on cue utilization in product evaluations. Journal of Consumer Research, 15(2), 253. https://doi.org/10.1086/209162.
Ringle, C. M., Wende, S., & Becker, J.-M. (2015). SmartPLS 3. Boenningstedt: SmartPLS GmbH.
Schierz, P. G., Schilke, O., & Wirtz, B. W. (2010). Understanding consumer acceptance of mobile payment services: An empirical analysis. Electronic Commerce Research and Applications, 9(3), 209–216. https://doi.org/10.1016/j.elerap.2009.07.005.
Shepherd, S., & Kay, A. C. (2012). On the perpetuation of ignorance: system dependence, system justification, and the motivated avoidance of sociopolitical information. Journal of Personality and Social Psychology, 102(2), 264–280. https://doi.org/10.1037/a0026272.
Shin, D. H. (2009). Towards an understanding of the consumer acceptance of mobile wallet. Computers in Human Behavior, 25(6), 1343–1354. https://doi.org/10.1016/j.chb.2009.06.001.
Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438. https://doi.org/10.1016/j.intcom.2010.05.001.
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146–164. https://doi.org/10.1016/j.comnet.2014.11.008.
Slade, E. L., Dwivedi, Y. K., Piercy, N. C., & Williams, M. D. (2015). Modeling consumers’ adoption intentions of remote mobile payments in the United Kingdom: Extending UTAUT with innovativeness, risk, and trust. Psychology & Marketing, 32(8), 860–873. https://doi.org/10.1002/mar.
Sorensen, E. (2018). Different types of mobile payment explained. Retrieved October 14, 2019, from https://www.mobiletransaction.org/different-types-of-mobile-payments/.
Suh, B., & Han, I. (2003). The impact of customer trust and perception of security control on the acceptance of electronic commerce. International Journal of Electronic Commerce, 7(3), 135–161. https://doi.org/10.1080/10864415.2003.11044270.
Taylor, S., & Todd, P. A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144–176. https://doi.org/10.1287/isre.6.2.144.
Thakur, R., & Srivastava, M. (2014). Adoption readiness, personal innovativeness, perceived risk and usage intention across customer groups for mobile payment services in India. Internet Research, 24(3), 369–392. https://doi.org/10.1108/IntR-12-2012-0244.
Venkatesh, V., Morris, M. G., Davis, G. B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425–478.
Viswanathan, P. (2018). Lifewire: 8 popular mobile payment apps. Retrieved October 14, 2019, from https://www.lifewire.com/most-popular-mobile-payment-apps-2373179.
Warkentin, M., Gefen, D., Pavlou, P. A., & Rose, G. M. (2002). Encouraging citizen adoption of e-government by building trust. Electronic Markets, 12(3), 157–162.
Wu, J. H., & Wang, S. C. (2005). What drives mobile commerce? An empirical evaluation of the revised technology acceptance model. Information and Management, 42(5), 719–729. https://doi.org/10.1016/j.im.2004.07.001.
Yan, Z., Dong, Y., Niemi, V., & Yu, G. (2013). Exploring trust of mobile applications based on user behaviors: An empirical study. Journal of Applied Social Psychology, 43(3), 638–659. https://doi.org/10.1111/j.1559-1816.2013.01044.x.
Yan, Z., Zhang, P., & Deng, R. H. (2012). TruBeRepec: A trust-behavior-based reputation and recommender system for mobile applications. Personal and Ubiquitous Computing, 16(5), 485–506. https://doi.org/10.1007/s00779-011-0420-2.
Yang, C. G., & Lee, H. J. (2016). A study on the antecedents of healthcare information protection intention. Information Systems Frontiers, 18(2), 253–263. https://doi.org/10.1007/s10796-015-9594-x.
Yang, H. (2013). Young American consumers’ online privacy concerns, trust, risk, social media use, and regulatory support. Journal of New Communications Research, 5(1), 1–30.
Yang, S., Cao, Y., Mao, W., Zhang, R., & Luo, L. (2011). Determinants of behavioral intention to mobile payment: Evidence from China. In 7th International Conference on Advanced Information Management and Service (ICIPM) (pp. 151–154). IEEE.
Zhou, T. (2011). The effect of initial trust on user adoption of mobile payment. Information Development, 27(4), 290–300. https://doi.org/10.1177/0266666911424075.
Author information
Authors and Affiliations
Corresponding author
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Chin, A.G., Harris, M.A. & Brookshire, R. An Empirical Investigation of Intent to Adopt Mobile Payment Systems Using a Trust-based Extended Valence Framework. Inf Syst Front 24, 329–347 (2022). https://doi.org/10.1007/s10796-020-10080-x
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10796-020-10080-x