Next Article in Journal
Experimental Modeling of a New Multi-Degree-of-Freedom Fuzzy Controller Based Maximum Power Point Tracking from a Photovoltaic System
Previous Article in Journal
Mechanical Properties of 3D-Printed Components Using Fused Deposition Modeling: Optimization Using the Desirability Approach and Machine Learning Regressor
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Exploring Transaction Security on Consumers’ Willingness to Use Mobile Payment by Using the Technology Acceptance Model

Department of Business Administration, Asia University, Taichung 413305, Taiwan
*
Author to whom correspondence should be addressed.
Appl. Syst. Innov. 2022, 5(6), 113; https://doi.org/10.3390/asi5060113
Submission received: 14 October 2022 / Revised: 8 November 2022 / Accepted: 10 November 2022 / Published: 11 November 2022

Abstract

:
In recent years, with the increase in Fintech innovation, mobile payment has played an important role. This research is to investigate factors affecting consumers’ willingness to use mobile payment. The study found that perceived ease of use and perceived usefulness have a significant positive impact on consumer’s adoption of mobile payments. In addition, from empirical research on the mediating effect of transaction security on attitudes toward using it and behavioral intention to use, the study found that transaction security has a significant mediating effect, and empirical data shows that transaction security can strengthen consumers’ behavior towards using mobile payment intention, this also explained why the penetration rate of mobile payments in developed countries is lower than in developing countries. In summary, to encourage consumers to willingly use the new mobile payment tool, in addition to making the tool easy to use and useful, it is crucial that transaction security can assure consumers’ willingness to use mobile payment.

1. Introduction

In recent years, the e-commerce boom has caused mobile payment to be widely used, which has in turn further facilitated the rapid development of e-commerce. With increasing numbers of transactions and the introduction of newer equipment, products and solutions, online payments have become more diverse. Payment technologies have developed from paying with physical credit cards in-store to B2B, B2C and C2C models supported by online purchases. Upon breaking the physical locational boundaries, the rise in e-commerce platforms guarantees the quality of products while reducing the asymmetry of information between vendors and consumers. More importantly, according to Al Hogail and Al Shahrani (2018), this phenomenon helps to alleviate consumer concerns towards a lack of trust on payment cash flows, and the interaction of these two factors further caused the proliferation of e-commerce platforms such as Amazon and Shopee [1].
At the same time, online transaction models and payment tools with Chinese characteristics started to emerge in Mainland China, namely Alipay and Yu’e Bao, with direct payments between buyers and sellers. Such a transaction mode encompasses the risk of the seller not delivering the goods and the buyer defaulting. Alipay then pioneered the secured transaction mode, i.e., after the buyer places an order, the funds are first deposited into Taobao.com. After confirming the receipt of all goods, Taobao would then deposit the money into the seller’s account. Secured transaction emerged to solve the trust problem of online transaction payment. Alipay’s secured transaction, nonetheless, was initially inefficient, with a high error rate, and the payment success rate was only 60%. Since 2010, Alipay has launched fast payment, which eliminated the need for credit card holders to sign contracts with banks during the opening process, and truly realized cross-system, cross-terminal and cross-browser payment methods. The payment success rate has risen sharply to 90%. This new payment method brought unprecedented payment experience to online payment users back then. From 2007 to 2009, the annual transaction volume of Alipay increased fivefold from RMB 47.6 billion to 287.1 billion, accounting for 49.8% of the online payment market. The Ant Group subsequently introduced other financial services such as the payment tools that integrated online shopping and lending. In coherence with Christensen et al. (2016) Jobs to be Done theory, this disruptive innovation of decentralization and borderline decentralization, simultaneously satisfies consumers’ needs in functional, social, and emotional aspects [2]. The demand has turned Ant Group into a large and successful FinTech company. In recent years, with ever-improving mobile phone functionalities, combined with better mobile internet access (e.g., from 4G to 5G), it has become easier for consumers to make payments with mobile phones. The result is an increase in mobile payments on in-person payments, in-store purchases, and online payments. Many internet platforms and startups such as FinTech have entered the field of mobile payment (e.g., LINE pay, Google pay, Apple pay, etc.). Financial institutions in Taiwan have also cooperated with these mobile payment providers to promote online credit cards.
For mobile payment technology to be accepted by consumers, consumer trust is a very important factor, and transaction security is key to gaining consumer trust [1,3,4,5]. Until 2016, only 60% of Taiwanese taxpayers filed tax returns online, mainly due to their distrust of the online tax filing system and fear of personal information leakage. According to the “Mobile Payment Consumer Survey” conducted by the Industrial Intelligence Research Institute of Taiwan Information Policy Association, the primary consideration that may affect the use of mobile payment is “security”, which accounts for 53.1%. According to Nikkei Chinese Website (14 April 2022), the cashless ratio in 2020 is close to 30%; while the Taiwan Business Times (3 February 2021) reported that the Institute of Industrial Intelligence (MIC) of the Information Policy Council released the mobile payment consumer survey in late 2020 and reported the changes in consumer usage habits during the epidemic in early 2020. Among the common transaction methods, mobile payment (60.3%) is still lower than that of physical card (76.3%) and cash (75.5%). Transaction security is surely an important factor for consumers when using mobile payments. Eriksson et al. (2021) explored the resistance of mobile payment [6]; relevant studies found that perceived security and privacy risks are the reasons for the resistance to mobile payment [7,8,9,10,11].
Chang and Lo (2020) found that trust and assurance are important factors in mobile payment adoption; therefore, understanding the mobile payment adoption process is necessary for service providers to convince potential users that mobile payment is worthwhile [12]. Rogers’s (2003) Innovation Diffusion Theory posited that innovation was a process of passing things out, and this process requires a formation period, so the process of diffusion communication includes knowledge, persuasion, decision, execution, and confirmation [13]. In the persuasion stage, consumers must be persuaded that the innovation has relative advantages, compatibility, less complexity, trialability, and observability. If such innovation did not have trialability and observability, it would not be able to gain the trust of consumers, thus resulting in its failure, and would eventually become a non-diffusion of innovation, as coined by Moore (1999) [14].
In recent years, during the COVID-19 pandemic since February 2020, cash has been increasingly perceived as the transmission channel of the virus. Liébana-Cabanillas et al. (2020) advocated mobile payment modes such as QR code or NFC that do not require cash transactions, which can indeed avoid infection due to physical contacts [15]. Of the risks of COVID-19, Chiu and Jhang (2022) found that the public was worried that the virus would spread through cash transactions, so whether it is physical or online consumption, mobile payment has surpassed debit cards and credit cards as transactions [16]. In addition, mobile payment can break geographical restrictions and make transactions more convenient, which possibly contributed to the rise in mobile payment in recent years. Nonetheless, users who enjoyed the convenience would also worry about the risk of personal information leakage and transaction security. According to Eriksson et al. (2021), many described security issues as their main concern for mobile payments, including trust and reliability of technologies such as mobile phones, apps and contactless payments, worrying about potential monetary loss from unauthorized transactions, the risk of leakage and misuse of private information [6].
Recent studies on the relationship between mobile payments and consumers mostly focus on exploring the impact of consumer attitudes and behaviors on the development of mobile payments [17,18], and less research on transaction security factors. Therefore, the main motivation of this study is to understand how transaction security affects consumers’ attitudes toward mobile payment, and whether such attitudes also affect their behavioral intentions. The purpose of this study is to use Davis’s (1989) technology acceptance model [19,20] and to use the Structural Equations Modeling to test the proposed relationship exploring transaction security on consumers’ willingness to use mobile payment.

2. Literature Review

2.1. Mobile Payment

Mobile payment is a popular research topic in the field of contemporary FinTech. With the rise of various mobile payment models, which have enriched the shopping experience of consumers. Mobile payment models with multiple channels have increased the feasibility of online transactions. Eriksson et al. (2021), based on the theory of innovation resistance (IRT), explored the reasons for the non-diffusion of mobile payments, and found that functional barriers and psychological barriers contributed to non-proliferation [6]. Functional aspects included three barriers, use, value, and risk, which would arise when consumers expect significant change from adopting innovations. Psychological resistance aspects included traditional and image barriers, which would surface when consumers’ norms and traditions are inconsistent with their perceptions of service or product image [21]. The reasons behind the risk barriers included perceived security risks and reliance on a mobile phone. Many users regarded security as their main concern for mobile payments. The trust and reliability of technologies (e.g., mobile phone, applications and contact-less technologies) signified the possible risk of monetary loss (e.g., fear of unauthorized transactions), and the risk of leakage and misuse of private information were among the main concerns of respondents.
Mallat (2007) found that the relative advantages of mobile payments included independence of time and place, availability, the possibility of remote purchases, and avoidance of queuing, while its disadvantages included premium pricing of payments, complexity of payment procedures, lack of a wide range of merchants acceptance and perceived risk [9]. Another advantage of mobile banking is the free access to locations (Laukkanen and Lauronen, 2005), so the compatibility of mobile payments with consumer purchase transactions, habits, and preferences has a corresponding impact on the process of diffusion [22].
To study behavioral intentions of mobile payment consumers, Daştan and Gürler (2016) adopted Davis’ (1989) technology acceptance theory and conducted research through the structural equation modeling in the form of questionnaires [17,19,20]. They found that perceived trust, perceived mobility and attitudes had a positive impact on the adoption of mobile payment systems, while perceived usefulness and perceived ease of use had no impact on the adoption of payment systems. In addition, perceived reputation is positively correlated to perceived ease and has a significant positive effect on mobile payment system adoption [23,24]. Other studies concluded that no effect was found between perceived usefulness and mobile payment systems adoption, which contradicts and does not support past research [17,25]. Francisco et al. (2020) studied consumers’ intention to use Apple Pay, a mobile payment tool, and found that perceived value was the largest variable affecting the intention to use the proposed payment system, followed by perceptions of utility and risk, with conclusions similar to past research by Davis (1989), Chandra et al. (2010), and Liébana-Cabanillas et al. (2017) [18,19,25]. Mobile payment is also a kind of electronic payment, the research indicated that electronic payment systems are designed to play an important and essential role in achieving and maintaining financial stability. They improve banking management and reduce risks; governments are supporting the development of mobile payment around the world [24,26].

2.2. Technology Acceptance Model

Technology acceptance model (TAM) emerged from Fishbein and Ajzen’s theory of reasoned actions (TRA) [27]. According to TRA, one oftentimes logically and systematically deals with relevant information, and his/her actions are determined by a conscious behavioral intention to enact. Behavioral intentions are jointly determined by individual attitudes and subjective norms according to relative weights, and a person’s attitude toward an action is determined by the main beliefs about the consequences of performing the action and the evaluation of those consequences. A person’s subjective norms depend on normative beliefs and motives for compliance. Subjective norm represents the approval or disapproval of the behavior by important persons who influence the party and affects the party’s cognition. Attitude refers to an individual’s positive and negative emotions towards a specific behavior, and behavioral intentions reflect the individual’s willingness to behave in a certain way [27].
Davis (1989) used the causal relationship of the TRA theory to explain the behavior of individuals accepting information technology and developed the technology acceptance model [19,20]. TAM shows that the perceived usefulness of information technology and the perceived ease of use are the two main determinants of the behavioral intention to use. Davis believed that perceived usefulness was a person’s belief that using it would improve their job performance, while perceived ease of use refers to a person’s use it with minimal efforts. Ease of use cognition also positively affects usefulness cognition, which indirectly affects use intention. Therefore, usefulness cognition is the main factor affecting the intention to use, and easy-to-use cognition is the secondary factor. The relationship between these external variables (perceived usefulness, perceived ease of use, attitude toward using, behavioral intention to use and actual usage) is shown in Figure 1 below.
TAM can explain the user’s acceptance behavior of using information technology from the perspective of users’ internal cognition. It is one of the most commonly used theoretical models to study users’ technology acceptance. The main purpose of the TAM is to provide a basis for providing a general explanation for the determinants of user acceptance of technology products. This theory points out that the performance of human behavior is determined by the individual’s behavioral intention, and the behavioral intention is affected by the individual’s attitude toward behavior and subjective standards [25]. TAM has been applied to the study of the use behavior of e-mail systems and editing software and established a questionnaire about perceived usefulness and perceived ease of use. The results of this study found that perceived usefulness and perceived ease of use had a positive impact on behavioral intention, and perceived usefulness had a stronger impact on use behavior than perceived ease of use. Chawla and Joshi (2019) used TAM to explore consumer attitude and intention to adopt the mobile wallet in India, their study found that factors like perceived ease of use, perceived usefulness, trust, security, facilitating conditions and lifestyle compatibility have a significant impact on the consumer attitude and intention to use mobile wallets [28]. Alswaigh and Aloud (2021) used the technology acceptance model to study the application of mobile wallets in Saudi Arabia, they found that perceived usefulness, perceived ease of use, lifestyle compatibility, and facilitating conditions are direct predictors of user behavior in accepting mobile wallet payments [29]. Therefore, users’ perceived ease of use towards information technology positively affects their behavioral intentions.
In summary, Davis’ TAM has been widely used in the research on the acceptance of new information technology and has been backed by proliferate literatures. With the continuous revision of information technology and increasing the integrity of its theory, as summarized in Figure 1 above, this study employs TAM as the foundation to explore the relationship between proximal action payment (external variables), perceived usefulness and perceived ease of use, which may affect their attitude toward using and behavioral intention to use. Variables are then added to further explain the magnitudes of impacts.

2.3. Transaction Security

Many well-known domestic and foreign scholars have pointed out that security and trust are the biggest considerations for consumers in their research on online transaction issues. Alswaigh and Aloud (2021) found that trust occurs when one party has confidence in an exchange partner’s reliability and integrity [29]. Users need to utilize a new service with comfort, safety, and fewer feelings of risk. Many studies have concluded that trust has a positive effect on user intention to adopt mobile payment [30,31]. Security is the biggest consideration for customers when banking online, therefore privacy protection and information security management are key for users’ confidence towards websites. Only when consumers’ transaction security of payment can be assured will consumers dare to transact through online or mobile payment. BLanford (1996) pointed out that confidentiality and data security on the Internet is imperative [32]. This study refers to “Secure Electronic Transaction” released in 1996 regarding transaction security constructs, which are then modified to fulfill research-specific needs applicable to the mobile payment transaction security context. The five transaction security constructs such as confidentiality, integrity, authentication, transaction non-repudiation, privacy and other security requirements are summarized as follows:
  • Confidentiality: Transactions cannot be traced over public networks, and information about transactions cannot be obtained by unauthorized intermediaries. All information transacted in an e-commerce environment is kept confidential.
  • Integrity: Transactions must not be disrupted or interfered with. It should be confirmed that the content of the electronic transaction has not been changed during the transmission between the client and the server—that is, the information cannot be arbitrarily added, deleted or modified during the transaction processing.
  • Authentication: There needs to be assurance that the identity of a subject or resource is characteristic of the person it declares. Authentication applies to users, programs, systems, and information.
  • Transaction non-repudiation: The sender of the transaction has its own unique electronic signature, making it impossible to deny the fact of sending this document.
  • Privacy: Transactions should remain inviolable, and messages sent and received over the Internet cannot be read, modified or intercepted by any other parties.
In summary, in e-commerce and online banking services, security is regarded as a website’s basic construction requirement, and its confidentiality and data security are very important issues in online services, and it is amongst clients’ greatest concerns [33].

3. Research Method and Design

3.1. Conceptual Framework

This research employs structural equation modeling as a foundation, whose variables include perceived ease of use (PEOU) and perceived usefulness (PU). This study explores the relationship between use attitude toward using (ATT) and behavioral intention to use (BI), and then utilizes transaction security perception as the mediating variable between attitude toward using and behavioral intention to use to clarify whether there is a path difference. To describe the concept of this research in detail, a structural diagram was developed, as shown in Figure 2.
According to the study’s objectives, structure and literature review, the research hypotheses to be tested are established and described as follows:
Hypothesis 1 (H1). 
Perceived ease of use of proximity mobile payment function positively impacts attitude towards using.
Perceived ease of use was defined by Davis (1989) as underlying users’ subjective perception of the level of ease or difficulty towards learning to operate a new information system [19,20]. The lesser effort the user incurs when learning such information technology, the more positive feeling he or she may have about this technology. If users of the proximity mobile payment function think that the operation of the proximity mobile payment is easy to learn, they will have a positive and accepting attitude towards the proximity mobile payment function.
Hypothesis 2 (H2). 
Perceived usefulness of proximity mobile payment function positively impacts attitude towards using.
Perceived usefulness was defined by Davis (1989) as underlying users’ subjective perception that the operation of certain information system could improve his or her work performance [19,20]. In this study, perceived usefulness is to explore how users can improve their work or life performance when they operate proximal action payment, so that they can have a positive and accepting attitude towards the function of proximal action payment.
Hypothesis 3 (H3). 
Mobile payment users’ perceived ease of use of proximity mobile payment positively impact on perceived usefulness.
Davis (1989) posited that users do not need to expend too much effort in learning information technology, and at the same time can improve users’ performance at work [19,20]. The user’s “perceived ease of use” of information technology has a positive effect on the “perceived usefulness” of information technology. In this study, if the user thinks that the mobile phone is easy to use, they will consider the mobile phone to be a useful tool.
Hypothesis 4 (H4). 
Attitude toward using positively impacts behavioral intention to use.
Taylor and Todd (1995) found that individuals’ willingness to use a certain information system technology in the future refers to the possibility that individuals intend to use a certain technology or information system in their subjective consciousness [33]. TAM supports that behavioral intentions are also affected by individuals’ attitudes towards technology use and perceived usefulness. When users perceive that using the function of proximity mobile payment will help improve the efficiency of study or work, the more positive evaluation they will have on the proximity mobile payment, and the more willing they are to use such functions.
Hypothesis 5 (H5). 
Mobile payment users’ Transaction security awareness has a mediating effect on attitude toward using and behavioral intention to use.
Rong (2020) defined security as the freedom from danger, risk, worry, doubt and worry, and transaction security would encompass security consideration under the transaction method and payment-related services that consumers recognize in the shopping channel [34]. Proximity mobile payment is also a shopping channel, so in this study, we refer to the interpretation of the definition of transaction security proposed by Rong. In respect of transaction security, the proximity mobile payment is an electronic transaction. Therefore, this study uses the “secure electronic transaction protocol”, which includes security such as confidentiality, integrity, authentication, transaction non-repudiation, and privacy. The five transaction security aspects of demand, this study assumes that the “transaction security perception” of the users of the proximity mobile payment will have a mediating effect on the user’s “use attitude” and “behavioral intention”.

3.2. Research Subjects

The research objects are users who are currently using or may use proximity mobile payment. Considering the collaboration of Taiwan Mobile Payment Co., Ltd. with local financial institutions, it will be conducted by the public who handle banking related business. Questionnaire In order to understand the relationship between people’s views on proximity mobile payment and transaction security perception, this research uses questionnaires to collect data, of which 423 questionnaires were recovered, of which 400 were valid, and with an effective recovery rate of 94.5%.

4. Analysis of Results

4.1. Confirmatory Factor Analysis

4.1.1. Perceived Ease of Use

After the confirmatory factor analysis of the perceived ease of use, the GFI value was 0.976, the CFI value was 0.988, and the RMSEA value was 0.105, demonstrating that the fit has reached the critical value of ideal fit. In addition, the standardized factor loadings except for PEOU6 less than 0.5, it is shaved in the sample, while the other samples were all above 0.5 (0.916, 0.856, 0.932, 0.786, and 0.855 respectively) indicating that the observed variables of this research model reached the level of measuring potential dimensions. Table 1 shows a well-fitted model of the perceived ease of use dimension through CFA.

4.1.2. Perceived Ease of Use

After the confirmatory factor analysis of the perceived ease of use, the GFI value was 0.957, the CFI value was 0.979, and the RMSEA value was 0.141, demonstrating that the fit has reached the critical value of ideal fit. In addition, the standardized factor loadings except for PU6 less than 0.5, it is shaved in the sample, while the other samples were all above 0.5 (0.843, 0.935, 0.902, 0.909 and 0.766, respectively), indicating that the observed variables of this research model reached the level of measuring potential dimensions. The results above demonstrated a well-fitted model of the perceived ease of use dimension through CFA, with five questions left for follow-up analysis, as shown in Table 2.

4.1.3. Attitude toward Using

After the confirmatory factor analysis of the perceived ease of use, the GFI value was 0.987, the CFI value was 0.997, and the RMSEA value was 0.045, demonstrating that the fit has reached the critical value of ideal fit. In addition, the standardized factor loadings were all above 0.5 (0.890, 0.895, 0.908, 0.741, 0.898 and 0.880, respectively), thus indicating that the observed variables of this research model reached the level of measuring potential dimensions. In sum, attitude toward using would be a good fit model, as validated by CFA. All six questions were deemed appropriate to remain for follow-up research. See Table 3 for details.

4.1.4. Behavioral Intention to Use

After the confirmatory factor analysis of the perceived ease of use, the GFI value was 0.902, the CFI value was 0.958, and the RMSEA value was 0.222, demonstrating that the fit has reached the critical value of ideal fit. In addition, the standardized factor loadings were all above 0.5 (0.857, 0.921, 0.912, 0.923 and 0.932, respectively), thus indicating that the observed variables of this research model reached the level of measuring potential dimensions. In sum, attitude toward using would be a good fit model, as validated by CFA. All five questions were deemed appropriate to remain for follow-up research. See Table 4 for details.

4.1.5. Transaction Security

After the confirmatory factor analysis of the perceived ease of use, the GFI value was 0.911, the CFI value was 0.964, and the RMSEA value was 0.179, demonstrating that the fit has reached the critical value of ideal fit. In addition, the standardized factor loadings were all above 0.5 (0.924, 0.933, 0.953, 0.940, 0.953 and 0.608, respectively), thus indicating that the observed variables of this research model reached the level of measuring potential dimensions. In summary, attitude toward using would be a good fit model, as validated by CFA. All six questions were deemed appropriate to remain for follow-up research. See Table 5 for details.

4.2. Reliability, Validity and Fit Analysis

4.2.1. Reliability

In this study, the Cronbach’s α value is used to measure the reliability between items under the same dimension, which covers the following five dimensions. The Cronbach’s α value of each dimension variable is as follows: The alpha value of ease of use is 0.939, the alpha value of attitude to use is 0.949, the alpha value of behavioral intention is 0.959, and the alpha value of transaction security is 0.977. The empirical results show that the Cronbach’s α value of each dimension variable is greater than 0.7, which means that the internal consistency and stability of the questionnaire in this study are good. Cronbach’s α values of the following variables are shown in Table 6.

4.2.2. Validity

Convergent Validity

As shown in Table 7, the combined reliability of perceived ease of use is 0.9397, and the average extraction of variance is 0.7578; the combined reliability of perceived usefulness is 0.9410, and the average extraction of variance is 0.7623; the combined reliability of attitude to use is 0.9492, the average variance extraction is 0.7579; the combined reliability of behavioral intention is 0.9598, and the average variance extraction is 0.8270; the combined reliability of transaction security is 0.9590, and the average variance extraction is 0.7990; The combined reliability values of all facets were greater than 0.7, and the average variance extraction values were greater than 0.5, indicating that the model had convergent validity. The combined reliability (CR) and average extraction of variance (AVE) values of each aspect are listed in Table 7.

Discriminant Validity

The square of the coefficient of the covariation relationship constructed by the two constructs is compared with the variance extraction amount (AVE) of the two constructs. All the squares are less than the variance extraction amount, indicating discriminant validity; if not, there may be no difference.
As seen in Table 8, the comparison of perceived ease of use for perceived usefulness, usage attitude, behavioral willingness, and transaction security shows that perceived ease of use is different from others; perceived usefulness is related to usage attitude, behavioral willingness, transaction security, the results show that the perceived usefulness is different from others; the use attitude is different from behavioral willingness and transaction security, the results show that the use attitude is different from others. Finally, behavioral willingness is compared to transaction security, the results show that there is a difference between behavioral intention and transaction security, so this study meets the criteria of discriminant validity, and through the AVE comparison, it is determined that the measurement models have discriminant validity.

4.2.3. Test of Goodness-of-Fit

Referring to the fitness index, the analysis results show, in terms of the absolute fitness index, the overall goodness-to-fit test. The fitness indicators shown in Table 9 all meet the standard, indicating that the fit of research model is ideal.

4.3. Overall Model Analysis

Testing of Hypotheses

The estimated coefficients of observed variables for each potential dimension are shown in Table 4, Table 5, Table 6, Table 7, Table 8, Table 9 and Table 10, and the estimated results of the overall model are shown in Figure 3.
Hypothesis 1 (H1). 
Perceived ease of use of proximity mobile payment function positively impacts attitude towards using.
This hypothesis means that, when the users of the proximity mobile payment function think that the operation of the proximity mobile payment is simple and easy to learn, they will have a positive and accepting attitude towards the proximity mobile payment function. Table 10 shows, through structural model coefficient and hypothesis verification, that there is a positive correlation coefficient between perceived ease of use and attitude to use (p-value < 0.05), that is, there is a significant positive direct effect (standardized factor loading is 0.326), so H1 is valid.
Hypothesis 2 (H2). 
Perceived usefulness of proximity mobile payment function positively impacts attitude towards using.
This hypothesis means that users can improve their work or life performance when operating ear-end mobile payment and make them have a positive and accepting attitude towards fear-end mobile payment functionalities. Table 10 shows a positive correlation coefficient between perceived usefulness and attitude toward use (p-value < 0.05), that is, there is a significant positive direct effect (standardized factor loading is 0.541), so H2 is valid.
Hypothesis 3 (H3). 
Mobile payment users’ perceived ease of use of proximity mobile payment positively impact on perceived usefulness.
This hypothesis means that, when users think that the ear-end mobile payment is easy to use, they will consider the proximity mobile payment to be a useful tool. Table 10 shows a positive correlation coefficient between perceived ease of use and perceived usefulness (p-value < 0.05), that is, there is a significant positive direct effect (standardized factor loading is 0.789), so H3 is valid.
Hypothesis 4 (H4). 
Attitude toward using positively impacts behavioral intention to use.
This hypothesis means that, when users perceive that using the function of proximal action payment will help them to learn or work efficiently, they will have a more positive evaluation of the proximity payment, so they are more willing to use the proximity payment function. Table 10 shows a positive correlation coefficient between attitude and behavioral intention (p-value < 0.05), that is, there is a significant positive direct effect (standardized factor loading is 0.732), so H4 is valid.

4.4. Analysis of Mediating Effect

Mediating effects include direct effects, indirect effects and total effects. In this research, Sobel test was used to determine whether the intermediary effect of “transaction security” exists. Sobel test coefficients are as Table 11.
In the case that α equals 0.05, since the Z value of 6.56274 is much larger than the critical value of 1.96, there is a significant mediating variable “transaction security” between “use attitude” and “behavioral intention.” As there is also a significant relationship between “attitude toward using” and “behavioral intention to use” (t-value 17.112 ***), “transaction security” has a partially mediated effect.
The converted data in this study are shown in Table 12. The direct effect of attitude is 0.732, and the total effect is 0.894. It is inferred that transaction security is the mediating effect. Therefore, the empirical data of the total effect and direct effect show that transaction security can be strengthened on consumer behavioral intent to use mobile payments.

4.5. Summary of Results

With the rapid growth in e-commerce as a sector of the business world over the last few years, there has been a growing interest in FinTech research on the issue of mobile payments as a consequence of the rapid growth of e-commerce. The technology acceptance model and structural equation model are used in this study to analyze the factors that influence the acceptance of mobile payments. Based on the summary of results, the confirmatory factor analysis of the observed variables indicates that there is a well-fitted model for the dimension of observed variables based on the confirmatory factor analysis. This study also showed that the Reliability, Validity, and Fit Analyses of the model had a good verification effect. Based on the results of testing the hypotheses in this study, it was found that all hypotheses were valid, which indicates that the perceived ease of use and perceived usefulness of mobile payment devices has the potential to influence behavioral intentions. As a result of the experimental testing of the mediating effects of transaction security, it was found that an increase in consumer willingness to use mobile payments is correlated with an increase in transaction security.

5. Conclusions

The study found the path coefficients of perceived ease of use and perceived usefulness to consumers’ attitude towards use are 0.33 and 0.54, respectively (as shown in Figure 3), and there is a significant positive impact, because if the innovative function is easy to learn and practical, it will indeed make consumers more receptive to the innovative technology, and from the perspective of the path coefficient value, the perceived usefulness has a greater impact on the consumer’s attitude towards use. However, this study’s findings contradict those of Chandra et al. (2010) and Daştan and Gürler (2016) in terms of perceived ease of use and differs from that of Daştan and Gürler (2016) in terms of perceived usefulness [17,25]. Daştan and Gürler’s (2016) results differed mainly because in their study, they believe that not every consumer is familiar with mobile payment technology [17]. Hence, if a person is technically savvy, mobile payment applications can be easily used for some but may be difficult to others; the relationship between perceived ease of use and mobile payment adoption systems may then be negligible in this respect. However, the empirical results of this study are consistent with the findings of Schierz et al. (2010) and Kim et al. (2010) [23,24], and perceived usefulness are consistent with Chandra et al. (2010), Schierz et al. (2010) and Kim et al. (2010) [23,24,25].
Furthermore, this study employed empirical evidence on the mediating effect of transaction security on usage attitudes and usage intentions and found that transaction security can strengthen consumers’ behavioral intention to use mobile payment, thus implying that consumers will be affected by transaction security whether they want to use mobile payment tools or not. In recent years, with the advancement of communication and network technology, mobile payment has become increasingly common. In some regions such as mainland China, mobile payments account for a significant proportion of transactions (e.g., AliPay or WeChat Pay for taxi or shopping in the market). However, in Taiwan or Japan, even though Line pay, Apple pay, or Google pay and mobile Internet access are commonplace, the proportion of cash payment in transactions is still high. The main reason behind the varying degrees of adoption may be due to personal data protection and transaction security considerations. Eriksson et al. (2021) explore the resistance of mobile payment, they found that cognitive transaction security (perceived security) and personal data security, this also explained why the penetration rate of mobile payments in developed countries is lower than in developing countries. Privacy risks are the cause of mobile payment resistance, so the results of this study on transaction security are consistent with those obtained by Eriksson et al. (2021) [6].
In terms of practical contributions, it was found that both perceived ease of use and perceived usefulness have a significant positive impact on consumers’ attitude towards using this technology, with the latter having more impact. This means that mobile payment programs or devices should not only be easy to understand, but also have more complete functions to attract consumers’ love. In terms of research on transaction security (perceived security), mobile payment providers can be recommended because empirical evidence shows that the effect of users’ behavioral intention through transaction security is greater than the effect of using attitude and behavioral intention. Therefore, consumers attach great importance to transaction security. Unless transaction security is guaranteed, this technology is not easy to be spread. Additionally, it may form the phenomenon of non-diffusion of innovation according to Moore (1999) [16]. In Taiwan and Japan, consumers are not using mobile payment significantly because other payment tools, such as credit cards, are very common. If consumers feel that the security of mobile payment transaction can be assured, it is possible to increase their willingness to use mobile payment services. Mobile payment tools, therefore, must have perceived ease of use, perceived usefulness, and more importantly, perceived security of transactions in order to make consumers more likely to use them.
In terms of theoretical contributions, in relation to Davis’s (1989) TAM model, the empirical evidence of this study proves that perceived ease and perceived usefulness have a significant positive impact on consumer attitudes, and consumers’ attitudes have a positive impact on intention, so the conclusions of this study are consistent with the theoretical arguments of the technology acceptance model. However, this study further derives that perceived transaction security has a mediating effect on attitude toward using and behavioral intention to use, which, in the context of Davis’s (1989) TAM, has validated that, whether the end consumer will adopt new technology, transaction security (perceived security) or other variables must be taken into consideration [19,20].
Regarding research limitations, this research leverages responses to questionnaire from Taiwanese subjects on acceptance towards mobile payment. The development of mobile payment in different countries are not equal, so research can study reasons of the development differentiation of mobile payment in different countries. It is recommended to do future research.

Author Contributions

Conceptualization, S.-C.T., C.-H.C. and K.-C.S.; methodology, S.-C.T., C.-H.C. and K.-C.S.; validation, S.-C.T.; formal analysis, C.-H.C.; investigation, K.-C.S.; resources, K.-C.S.; data curation, K.-C.S.; writing—original draft preparation, C.-H.C. and K.-C.S.; writing—review and editing, S.-C.T.; visualization, C.-H.C. and K.-C.S.; supervision, S.-C.T.; project administration, C.-H.C. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

Data available on request due to restrictions eg privacy or ethical. The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Al Hogail, A.; Al Shahrani, M. Building Consumer Trust to Improve Internet of Things (IoT) Technology Adoption. In Proceedings of the International Conference on Applied Human Factors and Ergonomics, Orlando, FL, USA, 21–25 July 2018; pp. 325–334. [Google Scholar]
  2. Christensen, C.M.; Dillon, K.; Hall, T.; Duncan, D.S. Competing Against Luck: The Story of Innovation and Customer Choice, 1st ed.; Harper Business: Manhattan, NY, USA, 2016. [Google Scholar]
  3. Dunning, D.; Anderson, J.E.; Schlösser, T.; Ehlebracht, D.; Fetchenhauer, D. Trust at zero acquaintance: More a matter of respect than expectation of reward. J. Personal. Soc. Psychol. 2014, 107, 122–141. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Chawla, M.; Aparajita, D.; Chakraborty, A. Exploring Factors Influencing Usage of E-Wallets in India. ANVESHAK Int. J. Manag. 2021, 10, 73–92. [Google Scholar] [CrossRef]
  5. Dhingra, M.; Sachdeva, K.; Machan, M. Factors Impacting the Usage of E-Wallets in National Capital Region. Turk. J. Comput. Math. Educ. 2020, 11, 675–686. [Google Scholar]
  6. Eriksson, N.; Gökhan, A.; Stenius, M. A qualitative study of consumer resistance to mobile payments for in-store purchases. Procedia Comput. Sci. 2021, 181, 634–641. [Google Scholar] [CrossRef]
  7. de Kerviler, G.; Demoulin, N.T.M.; Zidda, P. Adoption of in-store mobile payment: Are perceived risk and convenience the only drivers? J. Retail. Consum. Serv. 2016, 31, 334–344. [Google Scholar] [CrossRef]
  8. de Luna, I.R.; Liébana-Cabanillas, F.; Sánchez-Fernández, J.; Muñoz-Leiva, F. Mobile payment is not all the same: The adoption of mobile payment systems depending on the technology applied. Technol. Forecast. Soc. Chang. 2019, 146, 931–944. [Google Scholar] [CrossRef]
  9. Mallat, N. Exploring consumer adoption of mobile payments—A qualitative study. J. Strateg. Inf. Syst. 2007, 16, 413–432. [Google Scholar] [CrossRef]
  10. Oliveira, T.; Thomas, M.; Baptista, G.; Campos, F. Mobile payment: Understanding the determinants of customer adoption and intention to recommend the technology. Comput. Hum. Behav. 2016, 61, 404–414. [Google Scholar] [CrossRef]
  11. Yang, Y.; Liu, Y.; Li, H.; Yu, B. Understanding perceived risks in mobile payment acceptance. Ind. Manag. Data Syst. 2015, 115, 253–269. [Google Scholar] [CrossRef]
  12. Chang, W.-L.; Lo, C.-Y. Exploring Trust Transfer in Mobile Payment Adoption. J. Technol. Manag. 2020, 25, 77–108. [Google Scholar]
  13. Rogers, E.M. Chapter 1 Elements of Diffusion. In Diffusion of Innovations, 5th ed.; The Free Press: New York, NY, USA, 2003; pp. 1–22. [Google Scholar]
  14. Moore, G.A.; McKenna, R. Chapter 1 High-Tech Marketing Illusion. In Crossing the Chasm: Marketing and Selling High-Tech Products to Mainstream Customers; HarperCollins Publishers: New York, NY, USA, 1999; pp. 7–19. [Google Scholar]
  15. Liébana-Cabanillas, F.; Ramos-de-Luna, I.; Montoro-Ríos, F.J. Intention to use new mobile payment systems: A comparative analysis of SMS and NFC payments. Econ. Res. Istraz. 2017, 30, 892–910. [Google Scholar] [CrossRef]
  16. Chiu, S.-C.; Jhang, S.-Y. Do You Use Mobile Payment while the Epidemic Coming? Manag. Inf. Comput. 2022, 11, 81–94. [Google Scholar]
  17. Daştan, I.; Gürler, C. Factors Affecting the Adoption of Mobile Payment Systems: An Empirical Analysis. Emerg. Mark. J. 2016, 6, 17–24. [Google Scholar] [CrossRef]
  18. Liébana-Cabanillas, F.; García-Maroto, I.; Muñoz-Leiva, F.; de Luna, I.R. Mobile Payment Adoption in the Age of Digital Transformation: The Case of Apple Pay. Sustainability 2020, 12, 5443. [Google Scholar] [CrossRef]
  19. Davis, F.D. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Q 1989, 13, 319–340. [Google Scholar] [CrossRef] [Green Version]
  20. Davis, F.D.; Bagozzi, R.P.; Warshaw, P.R. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Manag. Sci. 1989, 35, 982–1003. [Google Scholar] [CrossRef] [Green Version]
  21. Ram, S.; Seth, J.N. Consumer Resistance to Innovations: The Marketing Problem and Its Solutions. J. Consum. Mark. 1989, 6, 5–14. [Google Scholar] [CrossRef]
  22. Laukkanen, T.; Lauronen, J. Consumer value creation in mobile banking services. Int. J. Mob. Commun. 2005, 3, 325–338. [Google Scholar] [CrossRef]
  23. Schierz, P.G.; Schilke, O.; Wirtz, B.W. Understanding consumer acceptance of mobile payment services: An empirical analysis. Electron. Commer. Res. Appl. 2010, 9, 209–216. [Google Scholar] [CrossRef]
  24. Kim, B.G.; Park, S.C.; Lee, K.J. A structural equation modeling of the Internet acceptance in Korea. Electron. Commer. Res. Appl. 2008, 6, 425–432. [Google Scholar] [CrossRef]
  25. Chandra, S.; Srivastava, S.C.; Theng, Y.-L. Evaluating the Role of Trust in Consumer Adoption of Mobile Payment Systems: An Empirical Analysis. Commun. Assoc. Inf. Syst. 2010, 27, 561–588. [Google Scholar] [CrossRef] [Green Version]
  26. AL-Mamoorey, M.A.; Al-Rubaye, M.M.M. The role of electronic payment systems in Iraq in reducing banking risks: An empirical research on private banks. Pol. J. Manag. Stud. 2020, 21, 49–59. [Google Scholar] [CrossRef]
  27. Fishbein, M.; Ajzen, I. Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research; Addison-Wesley: Boston, MA, USA, 1975. [Google Scholar]
  28. Deepak Chawla, D.; Joshi, H. Consumer attitude and intention to adopt mobile wallet in India—An empirical study. Int. J. Bank Mark. 2019, 37, 1590–1618. [Google Scholar] [CrossRef]
  29. Alswaigh, N.Y.; Aloud, M.E. Factors Affecting User Adoption of E-Payment Services Available in Mobile Wallets in Saudi Arabia. IJCSNS Int. J. Comput. Sci. Netw. Secur. 2021, 21, 222–230. [Google Scholar]
  30. Alkhowaiter, W.A. Digital payment and banking adoption research in Gulf countries: A systematic literature review. Int. J. Inf. Manag. 2020, 53, 102102. [Google Scholar] [CrossRef]
  31. Alabdan, R.; Sulphey, M.M. Understanding proximity mobile payment acceptance among Saudi individuals: An exploratory study. IJACSA Int. J. Adv. Comput. Sci. Appl. 2020, 11. [Google Scholar] [CrossRef]
  32. Lanford, D. Ethics and the internet: Appropriate behavior in electronic communication. Ethics Behav. 1996, 6, 91–106. [Google Scholar] [CrossRef]
  33. Taylor, S.; Todd, P. Decomposition and Crossover Effect in the Theory of Planned Behavior: A Study of Consumer Adoption Intentions. Int. J. Res. Mark. 1995, 12, 137–155. [Google Scholar] [CrossRef]
  34. Rong, T.-S. E-Marketing: Practical E-Commerce; Wunan Publishing Co.: Taipei, Taiwan, 2000. [Google Scholar]
Figure 1. The structure of TAM (drawn via this research by referencing Davis’s (1989) Technology Acceptance Model) [19,20].
Figure 1. The structure of TAM (drawn via this research by referencing Davis’s (1989) Technology Acceptance Model) [19,20].
Asi 05 00113 g001
Figure 2. Conceptual framework.
Figure 2. Conceptual framework.
Asi 05 00113 g002
Figure 3. Overall model analysis. Source: summarized by this research.
Figure 3. Overall model analysis. Source: summarized by this research.
Asi 05 00113 g003
Table 1. TAM of perceived ease of use.
Table 1. TAM of perceived ease of use.
ConstructIndicatorStandardized Factor
Loading
Unstandardized
Factor Loading
p ValueGFICFIRMSEA
PEOUPEOU10.9161***0.9760.9880.105
PEOU20.8561.004***
PEOU30.9321.070***
PEOU40.7860.889***
PEOU50.8550.947***
*** p < 0.001. Source: calculated by this research.
Table 2. CFA of perceived ease of use.
Table 2. CFA of perceived ease of use.
ConstructIndicatorStandardized Factor
Loading
Unstandardized
Factor Loading
p ValueGFICFIRMSEA
PUPU10.8431***0.9570.9790.141
PU20.9351.123***
PU30.9021.065***
PU40.9091.059***
PU50.7661.021***
*** p < 0.001. Source: calculated by this research.
Table 3. CFA of attitude towards using.
Table 3. CFA of attitude towards using.
ConstructIndicatorStandardized Factor
Loading
Unstandardized
Factor Loading
p ValueGFICFIRMSEA
ATTATT10.8901***0.9570.9790.141
ATT20.8951.032***
ATT30.9081.028***
ATT40.7410.749***
ATT50.8981.025***
ATT60.8801.085***
*** p < 0.001. Source: calculated by this research.
Table 4. CFA analysis for behavioral intention to use.
Table 4. CFA analysis for behavioral intention to use.
ConstructIndicatorStandardized Factor LoadingUnstandardized
Factor Loading
p ValueGFICFIRMSEA
BIBI10.8571***0.9020.9580.222
BI20.9211.053***
BI30.9121.035***
BI40.9231.054***
BI50.9321.050***
*** p < 0.001. Source: calculated by this research.
Table 5. CFA of perceived usefulness.
Table 5. CFA of perceived usefulness.
ConstructIndicatorStandardized Factor LoadingUnstandardized
Factor Loading
p ValueGFICFIRMSEA
TSTS10.9241***0.9110.9640.179
TS20.9331***
TS30.9531.008***
TS40.9401.008***
TS50.9530.992***
TS60.6080.602***
*** p < 0.001. Source: calculated by this research.
Table 6. CFA of perceived usefulness.
Table 6. CFA of perceived usefulness.
ConstructFactorChronbach’s α
PEOUPEOU1 I think it is easy to learn how to use proximity mobile payment.0.939
PEOU 2 I think it is easy to use proximity mobile payment to complete my tasks.
PEOU 3 To me, proximity mobile payment is easy to understand.
PEOU 4 I think proximity mobile payment is flexible to use.
PEOU 5 It is easy for me to become familiar with using proximity mobile payment.
PUPU1 The use of proximity mobile payment can improve the convenience of my life and work.0.939
PU2 By using proximity mobile payment, I can complete payments faster.
PU3 Proximity mobile payment improves my efficiency when making payments.
PU4 Proximity mobile payment makes payments easier.
PU5 Proximity mobile payment can improve the quality of my life and work.
ATTATT1 I think it is a good idea to use proximity mobile payment.0.949
ATT2 I think proximity mobile payment is a good payment tool.
ATT3 I think proximity mobile payment is an intelligent idea.
ATT4 I think proximity mobile payment is an advanced idea.
ATT5 I think proximity mobile payment is valuable to me.
ATT6 Overall, I’m willing to use proximity mobile payment.
BIBI1 In the future, I will use proximity mobile payment instead of other payment methods.0.959
BI2 In the future, I will use proximity mobile payment often.
BI3 In the future, proximity mobile payment will become part of my daily life.
BI4 In the future, I will recommend others to use proximity mobile payment.
BI5 In the future, I will encourage friends and family to use proximity mobile payment.
TSTS1 I think customer data can securely transfer through proximity mobile payment. 0.977
TS2 I think proximity mobile payment has a good reputation for security.
TS3 I think proximity mobile payment has a good design for payment security protocols.
TS4 I think proximity mobile payment contains state-of-the-art technologies available to protect transactions.
TS5 I think proximity mobile payment provides security protection in the shopping process.
TS6 I think proximity mobile payment contains appropriate encryption and privacy protections are in place to ensure successful transactions.
Source: Calculated by this research.
Table 7. Combined reliability and average extraction of variance values for each dimension.
Table 7. Combined reliability and average extraction of variance values for each dimension.
ConstructCombined ReliabilityAverage Variance Extraction
PEOU0.93970.7578
PU0.94100.7623
ATT0.94920.7579
BI0.95980.8270
TS0.95900.7579
Source: calculated by this research.
Table 8. Discriminant validity between constructs.
Table 8. Discriminant validity between constructs.
ConstructPEOUPUATTBITS
PEOU0.7578
PU0.62090.7623
ATT0.56700.64640.7579
BI0.44750.46100.70460.827
TS0.31360.24700.42120.52560.799
Source: Calculated by this research.
Table 9. Goodness-of-fit test for SEM of this research.
Table 9. Goodness-of-fit test for SEM of this research.
Goodness-of-FitFit ModelIdeal IndicatorFit Level
CMIN/DF2.904<3Good
GFI0.808>0.9Not Good
AGFI0.902>0.9Good
RMSEA0.085<0.07Not Good
PGFI0.680>0.5Good
PNFI0.828>0.5Good
NFI0.914Between 0 and 1 and closer to 1Good
RFI0.905Between 0 and 1 and closer to 1Good
IFI0.935Between 0 and 1 and closer to 1Good
CFI0.935Between 0 and 1 and closer to 1Good
Source: Summarized by this research.
Table 10. Discriminant validity between constructs.
Table 10. Discriminant validity between constructs.
ConstructVariableStandardized Factor LoadingUnstandardized
Factor Loading
SECR
T-Value
p-Value
PEOU 🡒 PU0.7890.7510.04915.354***
PEOU 🡒 ATT0.3260.3680.0665.581***
PU 🡒 ATT0.5410.6420.0738.817***
ATT 🡒 TS0.6500.7320.05114.393***
TS 🡒 BI0.2490.2140.0297.304***
ATT 🡒 BI0.7320.7090.04117.112***
PEOUPEOU10.9081.0340.04025.940***
PEOU20.8581.0490.04623.017***
PEOU30.9211.1020.04126.765***
PEOU40.8050.9490.04620.715***
PEOU50.8671.000
PUPU10.8640.9760.04919.827***
PU20.9201.0520.04921.497***
PU30.9021.0140.04820.982***
PU40.8990.9990.04820.911***
PU50.7871.000
ATTATT10.8860.9070.03426.523
ATT20.8920.9370.03526.998***
ATT30.9040.9320.03327.876***
ATT40.7480.6890.03619.021***
ATT5
ATT6
0.899
0.890
0.933
1.000
0.07427.493***
BIBI10.8571.000
BI20.9221.0540.03926.752***
BI30.9181.0410.03926.379***
BI40.9211.0520.04026.316***
BI50.9271.0450.03926.727***
TSTS10.9181.000
TS20.9311.0040.03033.960***
TS30.9511.0130.02836.435***
TS40.9451.0190.02935.260***
TS5
TS6
0.956
0.917
1.001
0.980
0.027
0.031
36.847
32.010
***
***
*** p < 0.001. Source: Calculated by this research.
Table 11. Sobel coefficients.
Table 11. Sobel coefficients.
ConstructsStandardized Factor LoadingUnstandardized
Factor Loading
SECRConstruct
ATT 🡒 TS0.6500.7320.65014.393***
TS 🡒 BI0.2490.214 7.304***
ATT 🡒 BI0.7320.7090.04117.112***
*** p < 0.001. Source: calculated by this research.
Table 12. Mediating effect of transaction security.
Table 12. Mediating effect of transaction security.
ConstructsDirect EffectIndirect EffectTotal Effect
ATT 🡒 BI0.7320.1620.894
ATT 🡒 TS0.650
TS 🡒 BI0.249
Source: calculated by this research.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tsai, S.-C.; Chen, C.-H.; Shih, K.-C. Exploring Transaction Security on Consumers’ Willingness to Use Mobile Payment by Using the Technology Acceptance Model. Appl. Syst. Innov. 2022, 5, 113. https://doi.org/10.3390/asi5060113

AMA Style

Tsai S-C, Chen C-H, Shih K-C. Exploring Transaction Security on Consumers’ Willingness to Use Mobile Payment by Using the Technology Acceptance Model. Applied System Innovation. 2022; 5(6):113. https://doi.org/10.3390/asi5060113

Chicago/Turabian Style

Tsai, Shuo-Chang, Chih-Hsien Chen, and Keng-Chang Shih. 2022. "Exploring Transaction Security on Consumers’ Willingness to Use Mobile Payment by Using the Technology Acceptance Model" Applied System Innovation 5, no. 6: 113. https://doi.org/10.3390/asi5060113

APA Style

Tsai, S. -C., Chen, C. -H., & Shih, K. -C. (2022). Exploring Transaction Security on Consumers’ Willingness to Use Mobile Payment by Using the Technology Acceptance Model. Applied System Innovation, 5(6), 113. https://doi.org/10.3390/asi5060113

Article Metrics

Back to TopTop