Abstract
Understanding perceived site security has been identified as a critical issue in current B2C e-commerce practices and research. A literature review reveals that the perceived site security construct has been conceptualized as a multi-dimensional construct; yet, all empirical studies have used uni-dimensional measures. Based on the CIA triad framework, we posit that perceived site security is a second order construct consisting of three distinct aspects of perceived site security: (1) perceived site confidentiality, (2) perceived site integrity, and (3) perceived site availability. The results from this study reveal that the new second order structure of perceived site security measure is superior to both the group factor structure and one factor structure. The results of the structural model also support the nomological validity of the newly conceptualized perceived site security measure.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alzola, L.M., Robaina, V.P.: Quality in electronic commerce B2C: Perceptions, expectations and importance. Service Industries Journal 26, 671–687 (2006)
Amoako-Gyampah, K., Meredith, J.R.: Examining cumulative capabilities in a developing economy. International Journal of Operations & Production Management 27, 928–950 (2007)
Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin 103, 411–423 (1988)
Bentler, P.M., Bonnet, D.G.: Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin 88, 588–606 (1980)
Cheng, T.C.E., Lam, D.Y.C., Yeung, A.C.L.: Adoption of Internet banking: An empirical study in Hong Kong. Decision Support Systems 42, 1558–1572 (2006)
Cheung, C.M.K., Lee, M.K.O.: Understanding consumer trust in Internet shopping: A multidisciplinary approach. Journal of American Society for Information Science and Technology 57, 479–492 (2006)
Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: A comparison of two theoretical models. Management Science 35, 982–1003 (1989)
Fang, X., Chan, S., Brzezinski, J., Xu, S.: Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems 22, 123–157 (2005-2006)
Fishbein, M., Ajzen, I.: Belief, attitude, intention, and behavior. Addison-Wesley, Reading (1975)
Fornell, C., Larcker, D.: Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18, 39–50 (1981)
Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: An integrated model. MIS Quarterly 27, 51–90 (2003)
Hu, L.T., Bentler, P.M.: Fit indices in covariance structure modeling: Sensitivity to underparameterization model misspecification. Psychological Methods 3, 424–453 (1998)
James, L.R., Stanley, A., Mulaik, S.A., Jeanne, J.M.: Causal analysis: Assumptions, models and data. Sage, Beverly Hills (1982)
Kim, S., Stoel, L.: Dimensional hierarchy of retail Website quality. Information & Management 41, 619–633 (2004)
Lian, J.W., Lin, T.M.: Effects of consumer characteristics on their acceptance of online shopping: Comparisons among different product types. Computers in Human Behavior 24, 48–65 (2008)
Liao, Z., Cheung, M.T.: Service quality in Internet e-banking: A user-based core framework, e-Technology, e-Commerce and e-Service. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2005), Hong Kong, pp. 628–631 (2005)
Liao, Z., Wong, W.K.: The determinants of customer interactions with Internet-enabled e-banking services, working paper no. 0701. Department of Economics, National University of Singapore (2007)
Pavlou, P., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly 31, 105–136 (2007)
Ramani, G., Kumar, V.: Interaction orientation and firm performance. Journal of Marketing 72, 27–45 (2008)
Rindskopf, D., Rose, T.: Some theory and applications of confirmatory second-order factor analysis. Multivariate Behavioral Research 23, 51–67 (1988)
Salisbury, W.D., Pearson, R.A., Pearson, A.W., Miller, D.W.: Perceived security and World Wide Web purchase intention. Industrial Management & Data Systems 101, 165–176 (2001)
Siponen, M.T., Oinas-Kukkonen, H.: A review of information security issues and respective research contributions. The DATABASE for Advances in Information Systems 38, 60–80 (2007)
Tao, W., Kim, C., Kim, K.S., Shin, N.: An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications 9, 84–95 (2010)
Tsiakis, T., Sthephanides, G.: The concept of security and trust in electronic payments. Computers & Security 24, 10–15 (2005)
Vatanasombut, B., Igbaria, M., Stylianou, A.C., Rodgers, W.: Information systems continuance intention of web-based applications customers: The case of online banking. Information & Management 45, 419–428 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hartono, E., Kim, KY., Na, KS., Simpson, J.T., Berkowitz, D. (2013). Perceived Site Security as a Second Order Construct and Its Relationship to e-Commerce Site Usage. In: Rocha, Á., Correia, A., Wilson, T., Stroetmann, K. (eds) Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36981-0_102
Download citation
DOI: https://doi.org/10.1007/978-3-642-36981-0_102
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36980-3
Online ISBN: 978-3-642-36981-0
eBook Packages: EngineeringEngineering (R0)