An Exploratory Approach to the Adoption Process of Bitcoin by Business Executives
Abstract
:1. Introduction
- To explore the adoption of Bitcoin from a business perspective.
- To understand the role of perceived security, privacy, risks, and trust in the adoption process of Bitcoin.
- To set a reasoned discussion on future research focused on the adoption of Bitcoin in the business ecosystem.
- To understand the adoption process of Bitcoin in companies from the perspective of business executive decision-making.
2. Theoretical Background
3. Conceptual Framework and Hypotheses Development
4. Methodology
4.1. Questionnaire Design
4.2. Data Collection
5. Results
5.1. Measurement Test Model
5.2. Structural Test Model
5.3. Mediaton Effect
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
Appendix A
Construct Name | Item Code | Survey Questions | Factor Loading |
---|---|---|---|
Attitude [21,113,114,115] | ATU1 | I like the idea of using Bitcoin | 0.882 |
ATU2 | I think using Bitcoin is highly advisable | 0.911 | |
Behavioral intention to use [21,113] | BIU1 | I use Bitcoin because it benefits the organization where I work | 0.958 |
BIU2 | I will recommend using Bitcoin to by clients, friends, and acquaintances | 0.962 | |
Perceived ease of use [21,31,113] | PEOU1 | My interaction with Bitcoin is clear and understandable | 0.832 |
PEOU2 | Interacting with Bitcoin does not require a lot of mental effort | 0.778 | |
PEOU3 | I find buying or selling Bitcoin easy | 0.816 | |
PEOU4 | I can buy Bitcoins with euros or other currencies and vice versa, just like any currency | 0.720 | |
Perceived usefulness [21,31,113] | PU1 | I think it is very useful that it does not belong to a single country | 0.870 |
PU2 | Using Bitcoin is faster | 0.852 | |
PU3 | The fact that Bitcoin can be used worldwide in the same way is useful | 0.892 | |
PU4 | Paying with Bitcoin is tax-free | * | |
PU5 | Using Bitcoin is cheaper | * | |
Privacy [59,60,61] | P1 | Transactions take place directly from person to person, and I think it is good that there are no intermediaries | 0.844 |
P2 | It is not necessary to reveal your identity when doing business and you preserve your privacy | 0.812 | |
P3 | Decentralization and the fact that no country controls it guarantee that my investment is private | 0.862 | |
P4 | The money belongs entirely to you, meaning it cannot be seized by anyone, nor can accounts be frozen | 0.777 | |
Trust [48] | T1 | I feel safe using Bitcoin | 0.895 |
T2 | The decentralization of Bitcoin makes it a safe currency | 0.911 | |
T3 | Forgery and duplication are impossible thanks to a sophisticated cryptographic system | 0.785 | |
T4 | Transactions are irreversible | 0.812 | |
Risks | R1 | The regulation of Bitcoin is certain | 0.850 |
R2 | It is feasible as the currency of the future | 0.863 | |
Perceived Security | PS1 | Money is safe in transactions with the Bitcoin cryptogram | 0.925 |
PS2 | The digital format capacity is sufficient for high volume transfers | 0.913 |
References
- Gil-Cordero, E.; Cabrera-Sánchez, J.P.; Arrás-Cortés, M.J. Cryptocurrencies as a Financial Tool: Acceptance Factors. Mathematics 2020, 8, 1974. [Google Scholar] [CrossRef]
- Liébana-Cabanillas, F.; Sánchez-Fernández, J.; Munoz-Leiva, F. Antecedents of the adoption of the new mobile payment systems: The moderating effect of age. Comp. Human Behav. 2014, 35, 464–478. [Google Scholar] [CrossRef]
- Yaya, O.S.; Ogbonna, E.A.; Mudida, R. Market Efficiency and Volatility Persistence of Cryptocurrency during Pre-and Post-Crash Periods of Bitcoin: Evidence based on Fractional Integration. Int. J. Finance Econ. 2019. [Google Scholar] [CrossRef]
- Urquhart, A.M. What Causes the Attention of Bitcoin? SSRN Electr. J. 2018. [Google Scholar] [CrossRef] [Green Version]
- Trautman, L.J. Virtual Currencies; Bitcoin & What Now after Liberty Reserve, Silk Road, and Mt. Gox? Richmond J. Law Technol. 2014, 20, 1–108. [Google Scholar]
- Gangwal, S.; Longin, F. Extreme movements in Bitcoin prices: A study based on extreme value theory. Work. Paper Ser. 2018, 8, 1–17. [Google Scholar]
- Corbet, S.; Lucey, B.; Yarovaya, L. Datestamping the Bitcoin and Ethereum bubbles. Finance Res. Lett. 2018, 26, 81–88. [Google Scholar] [CrossRef] [Green Version]
- Burchert, C.; Decker, C.; Wattenhofer, R. Scalable funding of Bitcoin micropayment channel networks. Royal Soc. Open Sci. 2018, 5, 180089. [Google Scholar] [CrossRef] [Green Version]
- Eyal, I.; Sirer, E.G. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 2018, 61, 95–102. [Google Scholar] [CrossRef]
- Simser, J. Bitcoin and modern alchemy: In code we trust. J. Financ. Crime 2015, 22, 156–169. [Google Scholar] [CrossRef]
- Saberi, S.; Kouhizadeh, M.; Sarkis, J.; Shen, L. Blockchain technology and its relationships to sustainable supply chain management. Int. J. Product. Res. 2018, 1–19. [Google Scholar] [CrossRef] [Green Version]
- Saura, J.R.; Palos-Sanchez, P.; Velicia-Martin, F. What Drives Volunteers to Accept a Digital Platform That Supports NGO Projects? Front. Psychol. 2020, 11, 429. [Google Scholar] [CrossRef] [PubMed]
- Albuquerque, J.P.; Diniz, E.H.; Cernev, A.K. Mobile payments: A scoping study of the literature and issues for future research. Inform. Dev. 2014. [Google Scholar] [CrossRef] [Green Version]
- Kamble, S.; Gunasekaran, A.; Arha, H. Understanding the Blockchain technology adoption in supply chains-Indian context. Int. J. Prod. Res. 2018, 1–25. [Google Scholar] [CrossRef]
- Chen, Y. Blockchain tokens and the potential democratization of entrepreneurship and innovation. Bus. Horiz. 2018. [Google Scholar] [CrossRef]
- Satoshi, N. Bitcoin: A Peer-To-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed on 25 January 2021).
- Roca, J.C.; Chiu, C.-M.; Martínez, F.J. Understanding e-learning continuance intention: An extension of the Technology Acceptance Model. Int. J. Human-Comp. Stud. 2006, 64, 683–696. [Google Scholar] [CrossRef] [Green Version]
- Diniz, E.H.; Cernev, A.K.; Nascimento, E. Mobile social money: An exploratory study of the views of managers of community banks. Rev. Administr. 2016, 51, 299–309. [Google Scholar] [CrossRef] [Green Version]
- DailyFX. Bitcoin Price (BTC/USD): BTC Live Chart, News & Analysis. 2021. Available online: https://www.dailyfx.com/bitcoin (accessed on 22 January 2021).
- Folkinshteyn, D.; Lennon, M. Braving Bitcoin: A technology acceptance model (TAM) analysis. J. Inform. Technol. Case Applicat. Res. 2016, 18, 220–249. [Google Scholar] [CrossRef]
- Davis, F.D. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quart. 1989, 13, 319–340. [Google Scholar] [CrossRef] [Green Version]
- Hayes, A. Cryptocurrency Value Formation: An Empirical Analysis Leading to a Cost of Production Model for Valuing Bitcoin. SSRN Electr. J. 2015. [Google Scholar] [CrossRef] [Green Version]
- Presthus, W.; O’Malley, N.O. Motivations and Barriers for End-User Adoption of Bitcoin as Digital Currency. Proc. Comp. Sci. 2017, 121, 89–97. [Google Scholar] [CrossRef]
- Li, X.; Wang, C.A. The technology and economic determinants of cryptocurrency exchange rates: The case of Bitcoin. Decis. Support. Syst. 2017, 95, 49–60. [Google Scholar] [CrossRef]
- Francisco, K.; Swanson, D. The Supply Chain Has No Clothes: Technology Adoption of Blockchain for Supply Chain Transparency. Logistics 2018, 2, 2. [Google Scholar] [CrossRef] [Green Version]
- Jonker, N. What Drives Bitcoin Adoption by Retailers. SSRN Electr. J. 2018. [Google Scholar] [CrossRef]
- Cheah, E.; Mishra, T.; Parhi, M.; Zhang, Z. Long Memory Interdependency and Inefficiency in Bitcoin Markets. Econ. Lett. 2018, 167, 18–25. [Google Scholar] [CrossRef]
- Glaser, F.; Zimmermann, K.; Haferkorn, M.; Weber, M.; Siering, M. Bitcoin asset or currency? Revealing users hidden intentions. In Proceedings of the European Conference on Information Systems, Tel Aviv, Israel, 9–11 June 2014. [Google Scholar]
- Palos-Sanchez, P.R.; Arenas-Marquez, F.J.; Aguayo-Camacho, M. Cloud Computing (SaaS) Adoption as a Strategic Technology: Results of an Empirical Study. Mobile Inform. Syst. 2017, 1–20. [Google Scholar] [CrossRef] [Green Version]
- Sharma, S.K. Integrating cognitive antecedents into TAM to explain mobile banking behavioral intention: A SEM-neural network modeling. Inform. Syst. Front. 2017, 1–13. [Google Scholar] [CrossRef]
- Gumussoy, C.A.; Kaya, A.; Ozlu, E. Determinants of mobile banking use: An extended TAM with perceived risk, mobility access, compatibility, perceived self-efficacy and subjective Norms. In Industrial Engineering in the Industry 4.0 Era; Springer: Cham, Switzerland, 2018; pp. 225–238. [Google Scholar]
- Venkatesh, V.; Davis, F.D. A theoretical extension of the technology acceptance model: Four longitudinal field studies. Manag. Sci. 2000, 46, 186–204. [Google Scholar] [CrossRef] [Green Version]
- Baur, A.W.; Bühler, J.; Bick, M.; Bonorden, C.S. Cryptocurrencies as a Disruption? Empirical Findings on User Adoption and Future Potential of Bitcoin and Co. In Proceedings of the Conference on e-Business, e-Services and e-Society, Delft, The Netherlands, 13–15 October 2015; Springer: Cham, Switzerland, 2015; pp. 63–80. [Google Scholar]
- Abramova, S.; Böhme, R. Perceived Benefit and Risk as Multidimensional Determinants of Bitcoin Use: A Quantitative Exploratory Study. In Proceedings of the International Conference on Information Systems, Dublin, Ireland, 11–14 December 2016; pp. 1–20. [Google Scholar] [CrossRef]
- Davis, F.D. A Technology Acceptance Model for Empirically Testing New End-User Information Systems: Theory and Results; Massachusetts Institute of Technology: Cambridge, MA, USA, 1986. [Google Scholar]
- Venkatesh, V.; Morris, M.G.; Davis, G.B.; Davis, F.D. User acceptance of information technology: Towarda unified view. MIS Quart. 2003, 27, 425–478. [Google Scholar] [CrossRef] [Green Version]
- Venkatesh, V.; Ramesh, V. Web and wireless site usability: Understanding differences and modeling use. MIS Quart. 2006, 30, 181–206. [Google Scholar] [CrossRef]
- Fathema, N.; Shannon, D.; Ross, M. Expanding the Technology Acceptance Model (TAM) to examine faculty use of Learning Management Systems (LMS). J. Online Learn. Teach. 2015, 11, 210–233. [Google Scholar]
- Fathema, N.; Ross, M.; Witte, M. Student acceptance of university web portals: A quantitative study. Int. J. Web Portals 2014, 6, 42–58. [Google Scholar] [CrossRef] [Green Version]
- Marangunić, N.; Granić, A. Technology acceptance model: A literature review from 1986 to 2013. Univ. Access Inform. Soc. 2014, 14, 81–95. [Google Scholar] [CrossRef]
- Turner, M.; Kitchenham, B.; Brereton, P.; Charters, S.; Budgen, D. Does the technology acceptance model predict actual use? A systematic literature review. Inform. Softw. Technol. 2010, 52, 463–479. [Google Scholar] [CrossRef]
- Wu, P.F. User Acceptance of Emergency Alert Technology: A Case Study. In Proceedings of the 6th International ISCRAM Conference, Gothenburg, Sweden, 10–13 May 2009. [Google Scholar]
- Taherdoost, H. A review of technology acceptance and adoption models and theories. Proc. Manuf. 2018, 22, 960–967. [Google Scholar] [CrossRef]
- Palos-Sanchez, P.; Saura, J.R.; Martin-Velicia, F. A study of the effects of Programmatic Advertising on users’ Concerns about Privacy overtime. J. Bus. Res. 2019, 96, 61–72. [Google Scholar] [CrossRef]
- Venkatesh, V.; Morris, M.G. Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quart. 2000, 24, 115–139. [Google Scholar] [CrossRef]
- Venkatesh, V.; Thong, J.Y.; Xu, X. Consumer acceptance and use of information technology: Extending the unified theory of acceptance and use of technology. MIS Quart. 2012, 36, 157–178. [Google Scholar] [CrossRef] [Green Version]
- Davis, F.D.; Bagozzi, R.P.; Warshaw, P.R. User acceptance of computer technology: A comparison of two theoretical models. Manag. Sci. 1989, 35, 982–1003. [Google Scholar] [CrossRef] [Green Version]
- Junadi, S.; Fenrianto, J. A Model of Factors Influencing Consumers Intention to Use E-payment System in Indonesia. Proc. Comp. Sci. 2015, 59, 214–220. [Google Scholar] [CrossRef] [Green Version]
- Pavlou, P.A. Consumer acceptance of electronic commerce: Integrating trust and risk with the technology acceptance model. Int. J. Electron. Comm. 2003, 7, 101–134. [Google Scholar]
- Dauda, S.Y.; Lee, J. Technology adoption: A conjoint analysis of consumers? preference on future online banking services. Inform. Syst. 2015, 53, 1–15. [Google Scholar] [CrossRef]
- Moore, T.; Christin, N. Beware the middleman: Empirical analysis of bitcoin-exchange risk. In Proceedings of the International Conference on Financial Cryptography and Data Security 2013, Okinawa, Japan, 1–5 April 2013. [Google Scholar]
- Urquhart, A. Price clustering in Bitcoin. Econ. Lett. 2017, 159, 145–148. [Google Scholar] [CrossRef]
- Thong, J.Y.; Venkatesh, V.; Xu, X.; Hong, S.-J.; Tam, K.Y. Consumer acceptance of personal information and communication technology services. MIS Quart. 2011, 58, 613–625. [Google Scholar] [CrossRef]
- Vijayasarathy, L.R. Predicting consumer intentions to use on-line shopping: The case for an augmented technology acceptance model. Inform. Manag. 2004, 41, 747–762. [Google Scholar] [CrossRef]
- Lee, L. New Kids on the Blockchain: How Bitcoin’s technology could reinvent the stock market. Hastings Bus. Law J. 2015, 12, 81–132. [Google Scholar] [CrossRef] [Green Version]
- Kaplanov, N. Nerdy money: Bitcoin, the private digital currency, and the case against its regulation. Loy Consum. L Rev. 2012, 25, 111. [Google Scholar] [CrossRef] [Green Version]
- Blundell-Wignall, A. The Bitcoin question: Currency versus trust-less transfer technology. OECD Work. Papers Finance Insur. Private Pens. 2014, 1. [Google Scholar] [CrossRef]
- Bradbury, D. The problem with Bitcoin. Comp. Fraud Secur. 2013, 2013, 5–8. [Google Scholar] [CrossRef]
- Malhotra, N.K.; Kim, S.S.; Agarwal, J. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Inform. Syst. Res. 2004, 15, 336–355. [Google Scholar] [CrossRef] [Green Version]
- Saura, J.R. Using Data Sciences in Digital Marketing: Framework, Methods, and Performance Metrics. J. Innovat. Knowl. 2020, 1. [Google Scholar] [CrossRef]
- Reyes-Menendez, A.; Saura, J.R.; Stephen, B.T. Exploring Key Indicators of Social Identity in the #MeToo Era: Using Discourse Analysis in UGC. Int. J. Inform. Manag. 2020, 54, 102129. [Google Scholar] [CrossRef]
- Coinmap.org. Available online: http://coinmap.org/#/map/40.29838133/-2.97454834/9 (accessed on 23 October 2017).
- Sarstedt, M.; Joseph, F.; Hair, C.M.; Ringle, K.O.T.; Gudergan, S.P. Estimation Issues with PLS and CBSEM: Where the Bias Lies! J. Bus. Res. 2016, 69, 3998–4010. [Google Scholar] [CrossRef] [Green Version]
- Henseler, J.; Hubona, G.; Ray, P.A. PLS path modeling in new technology research: Updated guidelines. Ind. Manag. Data Syst. 2016, 116, 2–20. [Google Scholar] [CrossRef]
- Son, J.Y.; Benbasat, I. Organizational buyers’ adoption and use of B2B electronic marketplaces: Efficiency-and legitimacy-oriented perspectives. J. Manag. Inform. Syst. 2007, 24, 55–99. [Google Scholar] [CrossRef] [Green Version]
- Fornell, C.; Cha, J. Partial Least Squares. Adv. Methods Mark. Res. 1994, 407, 52–78. [Google Scholar]
- Chin, W.W.; Newsted, P.R. Structural equation modeling analysis with small samples using partial least squares. Stat. Strat. Small Sample Res. 1999, 1, 307–341. [Google Scholar]
- Hair, J.F.; Ringle, C.M.; Sarstedt, M. PLS-SEM: Indeed a silver bullet. J. Mark. Theory Pract. 2011, 19, 139–152. [Google Scholar] [CrossRef]
- Ringle, C.M.; Wende, S.B.M. SmartPLS 3; SmartPLS GmbH: Boenningstedt, Germany, 2015. [Google Scholar]
- Reinartz, W.; Haenlein, M.; Henseler, J. An Empirical Comparison of the Efficacy of Covariance-Based and Variance-Based SEM. Int. J. Res. Mark. 2009, 26, 332–344. [Google Scholar] [CrossRef] [Green Version]
- Hair, F.J., Jr.; Sarstedt, M.; Hopkins, L.G.; Kuppelwieser, V. Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research. Eur. Bus. Rev. 2014, 26, 106–121. [Google Scholar] [CrossRef]
- Muller, K.; Cohen, J. Statistical Power Analysis for the Behavioral Sciences. Technometrics 1989, 31, 499. [Google Scholar] [CrossRef]
- Hair, J.F.; Sarstedt, M.; Ringle, C.M.; Mena, J.A. An assessment of the use of partial least squares structural equation modeling in marketing research. J. Acad. Mark. Sci. 2012, 40, 414–433. [Google Scholar] [CrossRef]
- Cohen, J. A power primer. Psychol. Bull. 1992, 112, 155–519. [Google Scholar] [CrossRef]
- Carmines, G.E.; Zeller, R.A. Reliability and Validity Assessment; Sage Publications: Newbury Park, CA, USA, 2008. [Google Scholar]
- Hair, J.F.; Black, W.C.; Babin, B.J.; Anderson, R.E.; Tatham, R.L. Multivariate Data Analysis; Pearson Prentice Hall: Upper Saddle River, NJ, USA, 2006; Volume 6. [Google Scholar]
- Werts, C.E.; Linn, R.L.; Jöreskog, K.G. Intraclass reliability estimates: Testing structural assumptions. Educ. Psychol. Meas. 1974, 34, 25–33. [Google Scholar] [CrossRef]
- Bagozzi, R.P.; Yi, Y. On the evaluation of structural equation models. J. Acad. Mark. Sci. 1988, 16, 74–94. [Google Scholar] [CrossRef]
- Nunnally, J. Psychometric Methods; McGraw-Hill: New York, NY, USA, 1978. [Google Scholar]
- Fornell, C.; Larcker, D.F. Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 1981, 39–50. [Google Scholar] [CrossRef]
- Henseler, J.; Ringle, C.M.; Sinkovics, R.R. The use of partial least squares path modeling in international marketing. In Advances in International Marketing; Sinkovics, R.R., Ghauri, P.N., Eds.; Emerald Group Publishing Limited: Bradford, UK, 2009; pp. 277–319. [Google Scholar] [CrossRef] [Green Version]
- Henseler, J. Why generalized structured component analysis is not universally preferable to structural equation modeling. J. Acad. Mark. Sci. 2012, 40, 402–413. [Google Scholar] [CrossRef] [Green Version]
- Chin, W. How to write up and report PLS analyses. In Handbook of Partial Least Squares: Concepts, Methods and Applications; Springer: Berlin, Germany, 2010. [Google Scholar]
- Barclay, D.; Higgins, C.; Thompson, R. The Partial Least Squares (PLS) A roach to Causal Modelling: Personal Computer Adoption and Use as an Illustration. Technol. Stud. 1995, 2, 285–309. [Google Scholar]
- Hu, L.T.; Bentler, P.M. Fit indices in covariance structure modeling: Sensitivity to underparameterized model misspecification. Psychol. Methods 1998, 3, 424. [Google Scholar] [CrossRef]
- Hu, L.T.; Bentler, P.M. Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Struct. Eq. Model. Multidiscipl. J. 1999, 6, 1–55. [Google Scholar] [CrossRef]
- Henseler, J. Bridging Design and Behavioral Research With Variance-Based Structural Equation Modeling. J. Advertis. 2017, 46, 178–192. [Google Scholar] [CrossRef]
- Chin, W.W. The partial least squares approach to structural equation modeling. Modern Methods Bus. Res. 1998, 295, 295–336. [Google Scholar]
- Stone, M. Cross-validatory choice and assessment of statistical predictions. J. Royal Stat. Soc. 1974. [Google Scholar] [CrossRef]
- Geisser, S. A Predictive Approach to the Random Effects Model. Biometrika 1974, 61, 101–107. [Google Scholar] [CrossRef]
- Cohen, J. Statistical Power Analysis for the Behavioral Sciences, 2nd ed.; Erlbaum Associates: Hillsdale, NJ, USA, 1988. [Google Scholar]
- Hayes, A.F.; Scharkow, M. The Relative Trustworthiness of Inferential Tests of the Indirect Effect in Statistical Mediation Analysis. Psychol. Sci. 2013, 24, 1918–1927. [Google Scholar] [CrossRef] [PubMed]
- Carrión, G.C.; Nitzl, C.; Roldán, J.L. Mediation Analyses in Partial Least Squares Structural Equation Modeling: Guidelines and Empirical Examples. Part. Least Sq. Path Model. 2017, 173–195. [Google Scholar] [CrossRef]
- Hernández-Perlines, F.; Moreno-García, J.; Yañez-Araque, B. The Mediating Role of Competitive Strategy in International Entrepreneurial Orientation. J. Bus. Res. 2016, 69, 5383–5389. [Google Scholar] [CrossRef]
- Lang, A.; Bradley, J.; Lee, S. The Motivation Activation Measure (MAM): How Well Does MAM Predict Individual Differences in Physiological Indicators of Appetitive and Aversive Activation? Comm. Methods Meas. 2007, 1, 113–136. [Google Scholar] [CrossRef]
- Bueno, S.; Salmeron, J.L. TAM-Based Success Modeling in ERP. Interact. Comp. 2008, 20, 515–523. [Google Scholar] [CrossRef]
- Calisir, F.; Gumussoy, C.A.; Bayram, A. Predicting the Behavioral Intention to Use Enterprise Resource Planning Systems. Manag. Res. News 2009, 32, 597–613. [Google Scholar] [CrossRef]
- Kwahk, K.Y.; Lee, J. The Role of Readiness for Change in ERP Implementation: Theoretical Bases and Empirical Validation. Inform. Manag. 2008, 45, 474–481. [Google Scholar] [CrossRef]
- Lee, S.; Park, G.; Yoon, B.; Park, J. Open Innovation in SMEs—An Intermediated Network Model. Res. Policy 2010, 39, 290–300. [Google Scholar] [CrossRef]
- Shivers-Blackwell, S.; Atira, L.; Charles, C. Ready, Set, Go: Examining Student Readiness to Use ERP Technology. J. Manag. Dev. 2006, 25, 795–805. [Google Scholar] [CrossRef]
- Sternad, S.; Bobek, S. Impacts of TAM-Based External Factors on ERP Acceptance. Proc. Technol. 2013, 9, 33–42. [Google Scholar] [CrossRef] [Green Version]
- Sun, D.-L.; Chen, Z.; Ma, N.; Zhang, X.; Fu, X.; Zhang, D. Decision-Making and Prepotent Response Inhibition Functions in Excessive Internet Users. CNS Spectrums 2009, 14, 75–81. [Google Scholar] [CrossRef]
- Uzoka, F.-M.; Alice, E.; Shemi, P.; Seleka, G. Behavioral Influences on E-Commerce Adoption in a Developing Country Context. Electr. J. Inform. Syst. Dev. Countries 2007, 31, 1–15. [Google Scholar] [CrossRef]
- Youngberg, E.; Olsen, D.; Hauser, K. Determinants of Professionally Autonomous End User Acceptance in an Enterprise Resource Planning System Environment. Int. J. Inform. Manag. 2009, 29, 138–144. [Google Scholar] [CrossRef]
- Agrebi, S.; Jallais, J. Explain the Intention to Use Smartphones for Mobile Shopping. J. Retail. Cons. Serv. 2015, 22, 16–23. [Google Scholar] [CrossRef]
- Saura, J.R.; Rodriguez Herráez, B.; Reyes-Menendez, A. Comparing a traditional approach for financial Brand Communication Analysis with a Big Data Analytics technique. IEEE Access 2019, 7. [Google Scholar] [CrossRef]
- Yoon, S.H.L.; Steege, M.B. Development of a Quantitative Model of the Impact of Customers’ Personality and Perceptions on Internet Banking Use. Comp. Human Behav. 2013, 29, 1133–1141. [Google Scholar] [CrossRef]
- Palos-Sánchez, P.; Saura, J.R.; Álvarez-García, J. Innovation and creativity in the mobile applications industry: A case study of mobile health applications (e-Health Apps). In Cultural and Creative Industries; Springer: Cham, Switzerland, 2019; pp. 121–135. [Google Scholar]
- Rocío Sánchez, A.; Hueros, A.M.D. Plataformas Virtuales de Aprendizaje: Análisis Desde Su Adaptación a Estilos de Aprendizaje. Rev. Venez. Gerenc. 2019. [Google Scholar] [CrossRef]
- Ronnie, C.; Vogel, D. Predicting User Acceptance of Collaborative Technologies: An Extension of the Technology Acceptance Model for e-Learning. Comp. Educ. 2013, 63, 160–175. [Google Scholar] [CrossRef]
- Young, L.D.; Mark; Lehto, R. User Acceptance of YouTube for Procedural Learning: An Extension of the Technology Acceptance Model. Comp. Educ. 2013, 61, 193–208. [Google Scholar] [CrossRef]
- Shengcai, L.; Hu, Y.; Zhu, X.; Stan, L.Z. Person Re-Identification by Local Maximal Occurrence Representation and Metric Learning. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, MA, USA, 7–12 June 2015. [Google Scholar] [CrossRef] [Green Version]
- Davis, F.D. User acceptance of information technology: System characteristics, user perceptions and behavioral impacts. Int. J. Man-Mach. Stud. 1993, 38, 475–487. [Google Scholar] [CrossRef] [Green Version]
- Agarwal, R.; Prasad, J. Are individual differences germane to the acceptance of new information technologies? Decis. Sci. 1999, 30, 361–391. [Google Scholar] [CrossRef]
- Heijden, H. Factors influencing the usage of websites: The case of a generic portal in The Netherlands. Inform. Manag. 2003, 40, 541–549. [Google Scholar] [CrossRef] [Green Version]
Authors | Research |
---|---|
Francisco and Swanson [25] | Proposed a technology acceptance model to measure the influence of cryptocurrencies, analyzing the case of Bitcoin and its acceptance in the retail sector. |
Francisco and Swanson [25] | In this research, the authors developed the unified theory of acceptance and use of technology (UTAUT) model to measure the influence of the variables on the technology acceptance of Bitcoin and transparency in the cryptocurrency sector. |
Jonker [26] | In this paper, an adoption model was developed to find the Bitcoin acceptance process in retail and its potential long-term influence on this industry. |
Presthus and O’Malley [23] | In their research, they presented a model for measuring user acceptance of Bitcoin as a digital currency, establishing the reasons and obstacles that led users to stop using Bitcoin as a payment method. |
Folkinshteyn and Lennon [20] | Discussed the technology acceptance of Bitcoin as a cryptocurrency in their research, mentioning the technology on which it is based, blockchain. |
Classification | Variable | Frequency | % |
---|---|---|---|
Gender | Male | 88 | 35% |
Female | 160 | 65% | |
Age | 18–30 years old | 64 | 26% |
31–45 years old | 78 | 31% | |
46–55 years old | 58 | 23% | |
56–65 years old | 41 | 17% | |
>65 years old | 7 | 3% | |
Job | Salaried worker | 15 | 6% |
Middle manager | 148 | 59.7% | |
Senior manager | 61 | 24.6% | |
Self-employed | 22 | 8.9% | |
Retired | 2 | 0.8% | |
Residence | City with more than 100,000 inhabitants | 138 | 56% |
Town with between 20,000 and 100,000 inhabitants | 75 | 30% | |
Town with between 5000 and 20,000 inhabitants | 35 | 14% | |
Education | Primary school | 2 | 0.8% |
Secondary school | 10 | 4% | |
Job training | 8 | 3% | |
University | 228 | 92.2% |
ATU | PS | PEOU | PU | PR | R | T | BIU | |
---|---|---|---|---|---|---|---|---|
Attitude toward using (ATU) | 0.897 | |||||||
Perceived security (PS) | 0.423 | 0.919 | ||||||
Perceived ease of use (PEOU) | 0.573 | 0.311 | 0.788 | |||||
Perceived usefulness (PU) | 0.566 | 0.250 | 0.698 | 0.872 | ||||
Privacy (PR) | 0.655 | 0.292 | 0.626 | 0.767 | 0.824 | |||
Risks (R) | 0.212 | 0.462 | 0.300 | 0.235 | 0.192 | 0.857 | ||
Trust (T) | 0.639 | 0.315 | 0.736 | 0.694 | 0.753 | 0.231 | 0.852 | |
Behavioral intention to use (BIU) | 0.597 | 0.297 | 0.786 | 0.713 | 0.646 | 0.162 | 0.797 | 0.960 |
Construct | Cronbach’s Alpha | rho_A | Composite Reliability | AVE |
---|---|---|---|---|
Attitude toward using (ATU) | 0.757 | 0.761 | 0.891 | 0.804 |
Perceived security (PS) | 0.816 | 0.819 | 0.916 | 0.844 |
Perceived ease of use (PEOU) | 0.796 | 0.805 | 0.867 | 0.621 |
Perceived usefulness (PU) | 0.842 | 0.843 | 0.905 | 0.760 |
Privacy (PR) | 0.842 | 0.844 | 0.894 | 0.679 |
Risks (R) | 0.708 | 0.737 | 0.847 | 0.734 |
Trust (T) | 0.873 | 0.885 | 0.914 | 0.726 |
Behavioral intention to use (BIU) | 0.915 | 0.917 | 0.959 | 0.922 |
Hypothesis | β (Path Coefficient) | t Statistic | p-Value | Support |
---|---|---|---|---|
H1: Trust → Privacy | 0.753 | 20.467 | 0.000 | Yes *** |
H2: Trust → PU | 0.068 | 0.758 | 0.449 | N.S. |
H3: Trust → PEOU | 0.585 | 6.748 | 0.000 | Yes *** |
H4: Risks → Trust | 0.231 | 2.319 | 0.020 | Yes * |
H5: Risks → PU | 0.025 | 0.368 | 0.713 | N.S. |
H6: Risks → PEOU | 0.134 | 2.054 | 0.040 | Yes * |
H7: Privacy → PEOU | 0.160 | 1.620 | 0.105 | N.S. |
H8: Privacy → PU | 0.510 | 6.455 | 0.000 | Yes *** |
H9: PEOU → PU | 0.322 | 3.180 | 0.001 | Yes *** |
H10: PEOU → ATU | 0.489 | 6.332 | 0.000 | Yes *** |
H11: ATU → BIU | 0.265 | 3.204 | 0.001 | Yes *** |
H12: Perceived Security → ATU | 0.271 | 2.961 | 0.003 | Yes *** |
H13: Perceived Security → BIU | 0.048 | 0.711 | 0.477 | N.S. |
H14: PU → BIU | 0.551 | 7.001 | 0.000 | Yes *** |
H15: PU → ATU | 0.318 | 3.174 | 0.002 | Yes *** |
Construct | Q2 | R2 (%) |
---|---|---|
Attitude toward using (ATU) | 0.299 | 39.5 |
Perceived ease of use (PEOU) | 0.320 | 57.0 |
Perceived usefulness (PU) | 0.459 | 66.9 |
Privacy (PR) | 0.351 | 56.7 |
Trust (T) | 0.028 | 5.40 |
Behavioral intention to use (BIU) | 0.466 | 56.5 |
Mediation Effect 1 | Path Coefficient (β) | CI (2.5%) Lower | CI (97.5%) Upper | Mediating Effects (VAF) |
---|---|---|---|---|
a: Risks→ Trust | 0.231 | 0.036 | 0.412 | 50.31% |
b: Trust → Perceived Ease of Use | 0.585 | 0.415 | 0.754 | |
c: Risks → Perceived Ease of Use | 0.134 | 0.003 | 0.255 | * Partial |
a × b: Indirect effects | 0.136 | 0.022 | 0.255 | |
Mediation Effect 2 | ||||
a: Trust → Perceived Ease of Use | 0.585 | 0.425 | 0.759 | 72.28% |
b: Perceived Ease of Use → Perceived Usefulness | 0.321 | 0.125 | 0.515 | |
c: Trust → Perceived Usefulness | 0.072 | −0.103 | 0.243 | Not supported |
a × b: Indirect effects | 0.188 | 0.0729 | 0.322 | Not supported |
Mediation Effect 3 | ||||
a: Perceived Ease of Use → Perceived Usefulness | 0.321 | 0.125 | 0.515 | 27.14% |
b: Perceived Usefulness → Attitude toward usage | 0.318 | 0.107 | 0.496 | |
c: Perceived Ease of Use → Attitude toward usage | 0.274 | 0.072 | 0.497 | *** |
a × b: Indirect effects | 0.102 | 0.013 | 0.255 | Partial |
Mediation Effect 4 | ||||
a: Perceived Usefulness → Attitude toward usage | 0.318 | 0.107 | 0.496 | 13.09% → |
b: Attitude toward usage → Behavioral Intention to use | 0.261 | 0.102 | 0.434 | Not supported |
c: Perceived Usefulness → Behavioral Intention to use | 0.551 | 0.384 | 0.700 | *** |
a × b: Indirect effects | 0.083 | 0.011 | 0.215 | Not supported |
Mediation Effect 5 | ||||
a: Privacy → Perceived Ease of Use | 0.160 | −0.038 | 0.340 | 9.18% → |
b: Perceived Ease of Use → Perceived Usefulness | 0.321 | 0.125 | 0.515 | Not supported |
c: Privacy → Perceived Usefulness | 0.508 | 0.348 | 0.650 | *** |
a * b: Indirect effects | 0.051 | −0.005 | 0.175 | Not supported |
Mediation Effect 6 | ||||
a: Perceived Security → Attitude toward usage | 0.254 | 0.086 | 0.426 | 59.56% |
b: Attitude toward usage → Behavioral Intention to use | 0.261 | 0.102 | 0.434 | |
c: Perceived Security → Behavioral Intention to use | 0.045 | −0.085 | 0.177 | Not supported |
a * b: Indirect effects | 0.066 | 0.009 | 0.185 | Not supported |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Palos-Sanchez, P.; Saura, J.R.; Ayestaran, R. An Exploratory Approach to the Adoption Process of Bitcoin by Business Executives. Mathematics 2021, 9, 355. https://doi.org/10.3390/math9040355
Palos-Sanchez P, Saura JR, Ayestaran R. An Exploratory Approach to the Adoption Process of Bitcoin by Business Executives. Mathematics. 2021; 9(4):355. https://doi.org/10.3390/math9040355
Chicago/Turabian StylePalos-Sanchez, Pedro, Jose Ramon Saura, and Raquel Ayestaran. 2021. "An Exploratory Approach to the Adoption Process of Bitcoin by Business Executives" Mathematics 9, no. 4: 355. https://doi.org/10.3390/math9040355
APA StylePalos-Sanchez, P., Saura, J. R., & Ayestaran, R. (2021). An Exploratory Approach to the Adoption Process of Bitcoin by Business Executives. Mathematics, 9(4), 355. https://doi.org/10.3390/math9040355