Factors influencing customer acceptance towards electronic wallets (E-Wallets) in Malaysia: Perceived security as focus variable
List of Authors
  • Nashirah Abu Bakar , Sofian Rosbi

Keyword
  • E-Wallet, Perceived Security, Digital Payment, Scam, Technology Acceptance Model

Abstract
  • An electronic wallet is a form of online service that facilitates the electronic transfer of funds through the utilization of Internet connectivity. The utilization of electronic wallets has been expanded to encompass a wide range of online activities, including the facilitation of purchasing transactions through e-commerce platforms. From the data collected by the Statistica Research Department, from 2020 until May 2023, the number of e-commerce scams in Malaysia is 19, 252 cases. In addition, Malaysia saw a drastic increase in online scams over the last two years during the COVID-19 pandemic. According to the Royal Malaysia Police (PDRM) Commercial Crimes Investigation Department (CCID), a total of 71,833 scams, amounting to more than RM5.2 billion in losses, were reported from 2020 until May 2022. This situation creates a need to perform research that addresses this problem. Therefore, this study explored the perception of security factors linked to the acceptance of e-wallet usage among Malaysian customers. This study uses a quantitative research method with a questionnaire. The underpinning theory is the Technology Acceptance Model (TAM), which consists of two variables namely perceived usefulness (PU) and Perceived Ease of Use (PEOU). This theory is widening by including one additional variable, Perceived Security (PS). Then collected data were analysed using structural equation modeling. The population is Malaysian consumers who use e-wallet. The number of samples is 150 respondents. The finding shows all three variables are significant in increasing the adoption of e-wallets among Malaysian consumers. The findings of this study help e-wallet providers to develop better facilities to meet the customers’ expectations. At the same time, this study provides insight to the central bank to develop policy on the security aspects of e-wallet services. This study also exposes the public to financial literacy of security for e-wallet usage to prevent deceived by scam activities.

Reference
  • 1. Abied, O., Ibrahim, O., Kamal, S. N. I. M., Alfadli, I. M., Binjumah, W. M., Ithnin, N., & Nasser, M. (2022). Probing Determinants Affecting Intention to Adopt Cloud Technology in E-Government Systems. Sustainability (Switzerland), 14(23), 15590. https://doi.org/10.3390/su142315590

    2. Adewale, S., & Potokri, O. C. (2023). Post-COVID-19 male teachers’ attrition in private schools: Whose fault? Social Sciences and Humanities Open, 8(1), 100679. https://doi.org/10.1016/j.ssaho.2023.100679

    3. Alghushami, A. H., Zakaria, N. H., & Aji, Z. M. (2020). Factors Influencing Cloud Computing Adoption in Higher Education Institutions of Least Developed Countries: Evidence from Republic of Yemen. Applied Sciences, 10(8098), 1–27.

    4. Attaran, M., & Woods, J. (2019). Cloud computing technology: improving small business performance using the Internet. Journal of Small Business & Entrepreneurship, 0(0), 1–25. https://doi.org/10.1080/08276331.2018.1466850

    5. Banimfreg, B. H. (2023). Healthcare Analytics A comprehensive review and conceptual framework for cloud computing adoption in bioinformatics. Healthcare Analytics, 3(March), 100190. https://doi.org/10.1016/j.health.2023.100190

    6. Böger, N. (2022). Perceived Sucess Factors Affecting Hybrid Cloud Adoption. JYVÄSKYLÄN YLIOPISTO INFORMAATIOTEKNOLOGIAN TIEDEKUNTA.

    7. Bollinad, M., & Damera, V. K. (2017). Cloud Computing Research: Challenges and Security Issues. International Journal of Computer Trends and Technology, 7(11), 64–73. https://doi.org/10.14445/22312803/ijctt-v30p128

    8. Creswell, J. W. (2014). Research design: Qualitative, quantitative, and mixed methods approaches (4th ed). Sage Publications, Inc.

    9. Fortinet. (2024). What Is A Hybrid Cloud? Fortinet. https://www.fortinet.com/resources/cyberglossary/what-is-hybrid-cloud

    10. Fraenkel, J. R., & Wallen, N. E. (2009). How to Design and Evaluate Research in Education (7th ed.). McGraw-Hil Higher Education.

    11. Fusch, P., Fusch, G. E., & Ness, L. R. (2018). Denzin’s Paradigm Shift: Revisiting Triangulation in Qualitative Research. Journal of Social Change, 10(1), 19–32. https://doi.org/10.5590/josc.2018.10.1.02

    12. Garrison, G., Wakefield, R. L., & Kim, S. (2015). The effects of IT capabilities and delivery model on cloud computing success and firm performance for cloud supported processes and operations. International Journal of Information Management, 35(4), 377–393. https://doi.org/10.1016/j.ijinfomgt.2015.03.001

    13. Gundu, S. R., Panem, C. A., & Thimmapuram, A. (2020). Hybrid IT and Multi Cloud an Emerging Trend and Improved Performance in Cloud Computing. SN Computer Science, 1(5), 1–6. https://doi.org/10.1007/s42979-020-00277-x

    14. Hamdi, M., Olayah, F., Al-Awady, A. A., Shamsan, A. F., & Ghilan, M. M. (2021). Attitude towards adopting cloud computing in the saudi banking sector. Intelligent Automation and Soft Computing, 29(2), 605–617. https://doi.org/10.32604/iasc.2021.018170

    15. Khan, S. U., Khan, H. U., Ullah, N., & Khan, R. A. (2021). Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach. Security and Communication Networks, 2021, 1–20.

    16. Khayer, A., Jahan, N., Hossain, M. N., & Hossain, M. Y. (2021). The adoption of cloud computing in small and medium enterprises: a developing country perspective. VINE Journal of Information and Knowledge Management Systems, 51(1), 64–91. https://doi.org/10.1108/VJIKMS-05-2019-0064

    17. Koo, C. J., & Kim, J. (2015). Decision Making for the Adoption of Cloud Computing for Sensor Data: From the Viewpoint of Industrial Security. International Journal of Distributed Sensor Networks, 2015, 1–5. https://doi.org/10.1155/2015/581563

    18. Lakhiar, M. T., Abdullah, A. H., & Sohu, S. (2021). Application of digital technologies for prevention of accidents in construction of high-rise building projects: A review. IOP Conference Series: Materials Science and Engineering, 1144(1), 012009. https://doi.org/10.1088/1757-899x/1144/1/012009

    19. Manti, S., & Licari, A. (2018). How to obtain informed consent for research. Breathe, 14(2), 145–152. https://doi.org/10.1183/20734735.001918

    20. Pius, U. T., Onyebuchi, C., Chinasa, O. P., & Adoba, E. F. (2018). A Cloud-Based Data Security System using Advanced Encryption (AES) and Blowfish algorithms. Journal of Scientific and Engineering Research, 5(6), 59–66. www.jsaer.com

    21. Priyadarshinee, P., Raut, R. D., Jha, M. K., & Gardas, B. B. (2017). Understanding and predicting the determinants of cloud computing adoption: A two staged hybrid SEM - Neural networks approach. Computers in Human Behavior, 76, 341–362. https://doi.org/10.1016/j.chb.2017.07.027

    22. RyersonUniversity. (2017). Guidelines on Anonymity and Confidentiality in Research. Ryerson University.

    23. Satya, R., & Dittakavi, S. (2022). Evaluating the Efficiency and Limitations of Configuration Strategies in Hybrid Cloud Environments. International Journal of Intelligent Automation and Computing Research, 29–45. https://research.tensorgate.org/index.php/IJIAC/article/view/65/71

    24. Saygner, C., & Ercan, T. (2018). Decision Making Model for the Adoption of Cloud Computing in Turkish Organizations: A Conjoint Analysis. Management and Business Research Quarterly, 5(August), 69–81. https://doi.org/10.32038/mbrq.2018.01.06

    25. Shuraida, S., & Titah, R. (2023). Technology in Society An examination of cloud computing adoption decisions: Rational choice or cognitive bias? Technology in Society, 74(May), 102284. https://doi.org/10.1016/j.techsoc.2023.102284

    26. Sohaib, O., & Naderpour, M. (2017). Decision Making on Adoption of Cloud Computing in E-Commerce Using Fuzzy TOPSIS. IEEE Xplore, 0–5.

    27. Srinivasan, A., Abdul, Q. M., & Vijayakumar, V. (2015). Hybrid cloud for educational sector. Procedia Computer Science, 50, 37–41. https://doi.org/10.1016/j.procs.2015.04.008

    28. Tawfik, O. I., Durrah, O., Hussainey, K., & Elmaasrawy, H. E. (2022). Factors in fluencing the implementation of cloud accounting: evidence from small and medium enterprises in Oman. Journal of Science and Technology Policy Management, 1–26. https://doi.org/10.1108/JSTPM-08-2021-0114

    29. Thabit, F., Alhomdy, S., & Jagtap, S. (2021). A new data security algorithm for the cloud computing based on genetics techniques and logical-mathematical functions. International Journal of Intelligent Networks, 2(January), 18–33. https://doi.org/10.1016/j.ijin.2021.03.001

    30. VMware. (2024). What is hybrid cloud management? Broadcom. https://www.vmware.com/topics/glossary/content/hybrid-cloud-management.html

    31. Yoo, S., & Kim, B. (2018). A Decision-Making Model for Adopting a Cloud Computing System. Sustainability, 10(2952), 1–15. https://doi.org/10.3390/su10082952

    32. Zhang, G., Liu, L., & Guo, H. (2021). Investigating the Impact of Cloud Computing Vendor on the Adoption of Cloud Computing. Mobile Information Systems, 2021, 1–18. https://doi.org/10.1155/2021/6557937