616
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

“Price Tag” of Risk of Using E-Payment Service

ORCID Icon, ORCID Icon & ORCID Icon

References

  • Abramovici, M., and L. Bancel-Charensol. 2004. How to take customers into consideration in service innovation projects. The Service Industries Journal 24 (1):56–78. doi:10.1080/02642060412331301132.
  • Al-Khalaf, E., and P. Choe. 2020. Increasing customer trust towards mobile commerce in a multicultural society: A case of Qatar. Journal of Internet Commerce 19 (1):32–61. doi:10.1080/15332861.2019.1695179.
  • Amoroso, D., and R. Magnier-Watanabe. 2012. Building a research model for mobile wallet consumer adoption: The case of Mobile Suica in Japan. Journal of Theoretical and Applied Electronic Commerce Research 7 (1):13–110. doi:10.4067/S0718-18762012000100008.
  • Bauer, R. A. 1960. Consumer behavior as risk-taking. In Dynamic Marketing for a Changing World, ed. R. S. Hancock, 389–398. Chicago, IL: American Marketing Association.
  • Bergendahl, G., and T. Lindblom. 2007. Pricing of payment services: A comparative analysis of paper-based banking and electronic banking. The Service Industries Journal 27 (6):687–707. doi:10.1080/02642060701453148.
  • Bergström, A. 2015. Online privacy concerns: A board approach to understanding the concerns of different groups for different uses. Computers in Human Behavior 53:419–426. doi:10.1016/j.chb.2015.07.025.
  • Bhatnagar, A., S. Misra, and H. R. Rao. 2000. On risk, convenience, and Internet shopping behavior. Communications of the ACM 43 (11):98–105. doi:10.1145/353360.353371.
  • Carow, K. A., and M. E. Staten. 1999. Debit, credit, or cash: Survey evidence on gasoline purchases. Journal of Economics and Business 51 (5):409–421. doi:10.1016/S0148-6195(99)00016-8.
  • Cazier, J. A., A. S. Jensen, and D. S. Dave. 2008. The impact of consumer perceptions of information privacy and security risks on the adoption of residual RFID technologies. Communications of the Association for Information Systems 23:14. doi:10.17705/1CAIS.02314.
  • Chakravorti, S. 2003. Theory of credit card networks: A survey of the literature. Review of Networked Economics 2 (2):50–68.
  • Chang, M. K., W. Cheung, and V. S. Lai. 2005. Literature derived reference models for the adoption of online shopping. Information & Management 42 (2):543–559. doi:10.1016/S0378-7206(04)00051-5.
  • Chang, M.-L., and W.-Y. Wu. 2012. Revisiting perceived risk in the context of online shopping: An alternative perspective of decision-making styles. Psychology & Marketing 29 (5):378–400. doi:10.1002/mar.20528.
  • Chen, J. Q., R. Zhang, and J. Lee. 2013. A cross-culture empirical study of M-commerce privacy concerns. Journal of Internet Commerce 12 (4):348–364. doi:10.1080/15332861.2013.865388.
  • Chiu, D. K. W., H. F. Leung, and K. M. Lam. 2009. On the making of service recommendations: An action theory based on utility, reputation, and risk attitude. Expert Systems with Applications 36 (2):3293–3301. doi:10.1016/j.eswa.2008.01.055.
  • Clarke III, I., and T. B. Flaherty. 2008. RFID and consumer privacy. Journal of Internet Commerce 7 (4):513–527. doi:10.1080/15332860802507370.
  • Featherman, M. S., and J. D. Wells. 2010. The intangibility of e-services: Effects of perceived risk and acceptance. ACM SIGMIS Database 41 (2):110–131. doi:10.1145/1795377.1795384.
  • Gemünden, H. G. 1985. Perceived risk and information search: A systematic meta-analysis of the empirical evidence. International Journal of Research in Marketing 2 (2):79–100. doi:10.1016/0167-8116(85)90026-6.
  • Hann, I.-H., K.-L. Hui, S.-Y. T. Lee, and I. P. L. Png. 2007. Overcoming online information privacy concerns: An Information-Processing theory approach. Journal of Management Information Systems 24 (2):13–42. doi:10.2753/MIS0742-1222240202.
  • Hirschprung, R., E. Toch, F. Bolton, and O. Maimon. 2016. A methodology for estimating the value of privacy in information disclosure systems. Computers in Human Behavior 61:443–453. doi:10.1016/j.chb.2016.03.033.
  • Ho, H. C., and M. A. Awan. 2019. The gender effect on consumer attitudes toward payment methods: The case of online Chinese customers. Journal of Internet Commerce 18 (2):141–169. doi:10.1080/15332861.2019.1584010.
  • Ho, S. S. M., and V. T. F. Ng. 1994. Customers’ risk perceptions of electronic payment systems. International Journal of Bank Marketing 12 (8):26–38. doi:10.1108/02652329410069029.
  • Holt, C. A., and S. K. Laury. 2002. Risk aversion and incentive effects. American Economic Review 92 (5):1644–1655. doi:10.1257/000282802762024700.
  • Hong, I. B., and H. S. Cha. 2013. The mediating role of consumer trust in an online merchant in predicting purchase intention. International Journal of Information Management 33 (6):927–939. doi:10.1016/j.ijinfomgt.2013.08.007.
  • Hong, W., and J. Y. L. Thong. 2013. Internet privacy concerns: An integrated conceptualization and four empirical studies. MIS Quarterly 37 (1):275–298. doi:10.25300/MISQ/2013/37.1.12.
  • Hossain, M. A., and Y. K. Dwivedi. 2014. What improves citizen’s privacy perceptions toward RFID technology? A cross-country investigation using mixed method approach. International Journal of Information Management 34 (6):711–719. doi:10.1016/j.ijinfomgt.2014.07.002.
  • Kahneman, D., and A. Tversky. 1979. Prospect theory: An analysis of decision under risk. Econometrica 47 (2):263–291. doi:10.2307/1914185.
  • Kazan, E., and J. Damsgaard. 2016. Towards a market entry framework for digital payment platforms. Communications of the Association for Information Systems 38, 761–783. doi:10.17705/1CAIS.03837.
  • Kim, C., W. Tao, N. Shin, and K.-S. Kim. 2010. An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications 9 (1):84–95. doi:10.1016/j.elerap.2009.04.014.
  • Kim, D. J., D. L. Ferrin, and H. R. Rao. 2008. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems 44 (2):544–564. doi:10.1016/j.dss.2007.07.001.
  • Lai, J.-Y. 2014. E-SERVCON and E-Commerce success: Applying the DeLone & McLean model. Journal of Organizational and End User Computing 26 (3):1–22. doi:10.4018/joeuc.2014070101.
  • Lee, J.-E R., S. Rao, C. Nass, K. Forssell, and J. M. John. 2012. When do online shoppers appreciate security enhancement efforts? Effects of financial risk and security level on evaluations of customer authentication. International Journal of Human-Computer Studies 70 (5):364–376. doi:10.1016/j.ijhcs.2011.12.002.
  • Liao, C., C.-C. Liu, and K. Chen. 2011. Examining the impact of privacy, trust and risk perceptions beyond monetary transactions: An integrated model. Electronic Commerce Research and Applications 10 (6):702–715. doi:10.1016/j.elerap.2011.07.003.
  • Liu, C., and S. Forsythe. 2010. Sustaining online shopping: Moderating role of online shopping motives. Journal of Internet Commerce 9 (2):83–103. doi:10.1080/15332861.2010.503848.
  • Liu, L.,. H. Zhu, and Z. Huang. 2011. Analysis of the minimal privacy disclosure for web services collaborations with role mechanisms. Expert Systems with Applications 38 (4):4540–4549. doi:10.1016/j.eswa.2010.09.128.
  • Martins, C., T. Oliveira, and A. Popovič. 2014. Understanding the Internet banking adoption: A unified theory of acceptance and use of technology and perceived risk application. International Journal of Information Management 34 (1):1–13. doi:10.1016/j.ijinfomgt.2013.06.002.
  • Matsumura, K., and M. Kiriya. 2015. Condition-based maintenance of the ticket-issuing and ticket gate equipment. The Proceedings of International Symposium on Seed-up and Service Technology for Railway and Maglev Systems: STECH 2015 (Session ID: 3F12). doi:10.1299/jsmestech.2015._3F12-1_.
  • Nicolaou, A. I., and D. H. McKnight. 2006. Perceived information quality in data exchanges: Effects of risk, trust, and intention to use. Information Systems Research 17 (4):332–351. doi:10.1287/isre.1060.0103.
  • Ogawara, S., J. C. H. Chen, and P. P. Chong. 2002. Mobile commerce: The future vehicle of E-payment in Japan? Journal of Internet Commerce 1 (3):29–41. doi:10.1300/J179v01n03_04.
  • PayPal. 2016. PayPal and Mastercard expand partnership to benefit consumers, merchants and financial institutions. https://investor.paypal-corp.com/releasedetail.cfm?ReleaseID=987807 (accessed August 1, 2019).
  • PayPal. 2017. PayPal reports fourth quarter and full year 2016 results. https://investor.paypal-corp.com/releasedetail.cfm?ReleaseID=1009339 (accessed August 1, 2019).
  • Pavlou, P. A., and D. Gefen. 2004. Building effective online marketplaces with institutional-based trust. Information Systems Research 15 (1):37–59. doi:10.1287/isre.1040.0015.
  • Peter, J. P., and M. J. Ryan. 1976. An investigation of perceived risk at the brand level. Journal of Marketing Research 13 (2):184–188. doi:10.1177/002224377601300210.
  • Robinson, S. C. 2017. Self-disclosure and managing privacy: Implications for interpersonal and online communication for consumers and marketers. Journal of Internet Commerce 16 (4):385–404. doi:10.1080/15332861.2017.1402637.
  • Ruiz-Martínez, A. 2015. Towards a Web payment framework: State-of-the-art and challenges. Electronic Commerce Research and Applications 14 (5):345–350. doi:10.1016/j.elerap.2015.08.003.
  • Rysman, M. 2007. An empirical analysis of payment card usage. Journal of Industrial Economics 55 (1):1–36. doi:10.1111/j.1467-6451.2007.00301.x.
  • See-To, E. W. K., and K. K. W. Ho. 2016. A study on the impact of design attributes on E-payment service utility. Information & Management 53 (5):668–681. doi:10.1016/j.im.2016.02.004.
  • Siyal, A. W., D. Ding, and S. Siyal. 2019. M-banking barriers in Pakistan: A customer perspective of adoption and continuity intention. Data Technologies and Applications 53 (1):58–84. doi:10.1108/DTA-04-2018-0022.
  • Stone, R. N., and K. Grønhaug. 1993. Perceived risk: Further considerations for the marketing discipline. European Journal of Marketing 27 (3):39–50. doi:10.1108/03090569310026637.
  • Tan, W.-K., and Y.-J. Tan. 2012. Transformation of smart-card-based single-purpose e-micropayment scheme to multi-purpose scheme: A case study. Expert Systems with Applications 39 (3):2306–2313. doi:10.1016/j.eswa.2011.08.017.
  • Tsai, J. Y., S. Egelman, L. Cranor, and A. Acquisti. 2011. The effect of online privacy information on purchase behavior: An experimental study. Information Systems Research 22 (2):254–268. doi:10.1287/isre.1090.0260.
  • Tsai, W.-H., B.-Y. Huang, J.-Y. Liu, T.-S. Tsaur, and S.-J. Lin. 2010. The application of Web ATMs in e-payment industry: A case study. Expert Systems with Applications 37 (1):587–597. doi:10.1016/j.eswa.2009.05.058.
  • Trivedi, J. 2019. Examining the customer experience of using banking chatbots and its impact on brand love: The moderating role of perceived risk. Journal of Internet Commerce 18 (1):91–111. doi:10.1080/15332861.2019.1567188.
  • Tversky, A., and D. Kahneman. 1981. The framing of decisions and the psychology of choice. Science 211 (4481):453–458. doi:10.1126/science.7455683.
  • Weber, E. U., A.-R. Blais, and N. E. Betz. 2002. A domain-specific risk-attitude scale: Measuring risk perceptions and risk behaviors. Journal of Behavioral Decision Making 15 (4):263–290. doi:10.1002/bdm.414.
  • Yang, Q., C. Pang, L. Liu, D. C. Yen, and J. M. Tarn. 2015. Exploring consumer perceived risk and trust for online payment: An empirical study in China’s younger generation. Computers in Human Behavior 50:9–24. doi:10.1016/j.chb.2015.03.058.
  • Zhang, X., and V. Prybutok. 2003. Factors contributing to purchase intentions on the Internet. Journal of Internet Commerce 2 (1):3–18. doi:10.1300/J179v02n01_02.
  • Zinman, J. 2009. Debit or credit? Journal of Banking and Finance 33 (2):358–366. doi:10.1016/j.jbankfin.2008.08.009.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.