Skip to main content

Perceived Site Security as a Second Order Construct and Its Relationship to e-Commerce Site Usage

  • Conference paper
Advances in Information Systems and Technologies

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 206))

Abstract

Understanding perceived site security has been identified as a critical issue in current B2C e-commerce practices and research. A literature review reveals that the perceived site security construct has been conceptualized as a multi-dimensional construct; yet, all empirical studies have used uni-dimensional measures. Based on the CIA triad framework, we posit that perceived site security is a second order construct consisting of three distinct aspects of perceived site security: (1) perceived site confidentiality, (2) perceived site integrity, and (3) perceived site availability. The results from this study reveal that the new second order structure of perceived site security measure is superior to both the group factor structure and one factor structure. The results of the structural model also support the nomological validity of the newly conceptualized perceived site security measure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alzola, L.M., Robaina, V.P.: Quality in electronic commerce B2C: Perceptions, expectations and importance. Service Industries Journal 26, 671–687 (2006)

    Article  Google Scholar 

  2. Amoako-Gyampah, K., Meredith, J.R.: Examining cumulative capabilities in a developing economy. International Journal of Operations & Production Management 27, 928–950 (2007)

    Article  Google Scholar 

  3. Anderson, J.C., Gerbing, D.W.: Structural equation modeling in practice: A review and recommended two-step approach. Psychological Bulletin 103, 411–423 (1988)

    Article  Google Scholar 

  4. Bentler, P.M., Bonnet, D.G.: Significance tests and goodness of fit in the analysis of covariance structures. Psychological Bulletin 88, 588–606 (1980)

    Article  Google Scholar 

  5. Cheng, T.C.E., Lam, D.Y.C., Yeung, A.C.L.: Adoption of Internet banking: An empirical study in Hong Kong. Decision Support Systems 42, 1558–1572 (2006)

    Article  Google Scholar 

  6. Cheung, C.M.K., Lee, M.K.O.: Understanding consumer trust in Internet shopping: A multidisciplinary approach. Journal of American Society for Information Science and Technology 57, 479–492 (2006)

    Article  Google Scholar 

  7. Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User acceptance of computer technology: A comparison of two theoretical models. Management Science 35, 982–1003 (1989)

    Article  Google Scholar 

  8. Fang, X., Chan, S., Brzezinski, J., Xu, S.: Moderating effects of task type on wireless technology acceptance. Journal of Management Information Systems 22, 123–157 (2005-2006)

    Google Scholar 

  9. Fishbein, M., Ajzen, I.: Belief, attitude, intention, and behavior. Addison-Wesley, Reading (1975)

    Google Scholar 

  10. Fornell, C., Larcker, D.: Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research 18, 39–50 (1981)

    Article  Google Scholar 

  11. Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in online shopping: An integrated model. MIS Quarterly 27, 51–90 (2003)

    Google Scholar 

  12. Hu, L.T., Bentler, P.M.: Fit indices in covariance structure modeling: Sensitivity to underparameterization model misspecification. Psychological Methods 3, 424–453 (1998)

    Article  Google Scholar 

  13. James, L.R., Stanley, A., Mulaik, S.A., Jeanne, J.M.: Causal analysis: Assumptions, models and data. Sage, Beverly Hills (1982)

    Google Scholar 

  14. Kim, S., Stoel, L.: Dimensional hierarchy of retail Website quality. Information & Management 41, 619–633 (2004)

    Article  Google Scholar 

  15. Lian, J.W., Lin, T.M.: Effects of consumer characteristics on their acceptance of online shopping: Comparisons among different product types. Computers in Human Behavior 24, 48–65 (2008)

    Article  Google Scholar 

  16. Liao, Z., Cheung, M.T.: Service quality in Internet e-banking: A user-based core framework, e-Technology, e-Commerce and e-Service. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2005), Hong Kong, pp. 628–631 (2005)

    Google Scholar 

  17. Liao, Z., Wong, W.K.: The determinants of customer interactions with Internet-enabled e-banking services, working paper no. 0701. Department of Economics, National University of Singapore (2007)

    Google Scholar 

  18. Pavlou, P., Liang, H., Xue, Y.: Understanding and mitigating uncertainty in online exchange relationships: A principal-agent perspective. MIS Quarterly 31, 105–136 (2007)

    Google Scholar 

  19. Ramani, G., Kumar, V.: Interaction orientation and firm performance. Journal of Marketing 72, 27–45 (2008)

    Article  Google Scholar 

  20. Rindskopf, D., Rose, T.: Some theory and applications of confirmatory second-order factor analysis. Multivariate Behavioral Research 23, 51–67 (1988)

    Article  Google Scholar 

  21. Salisbury, W.D., Pearson, R.A., Pearson, A.W., Miller, D.W.: Perceived security and World Wide Web purchase intention. Industrial Management & Data Systems 101, 165–176 (2001)

    Article  Google Scholar 

  22. Siponen, M.T., Oinas-Kukkonen, H.: A review of information security issues and respective research contributions. The DATABASE for Advances in Information Systems 38, 60–80 (2007)

    Article  Google Scholar 

  23. Tao, W., Kim, C., Kim, K.S., Shin, N.: An empirical study of customers’ perceptions of security and trust in e-payment systems. Electronic Commerce Research and Applications 9, 84–95 (2010)

    Article  Google Scholar 

  24. Tsiakis, T., Sthephanides, G.: The concept of security and trust in electronic payments. Computers & Security 24, 10–15 (2005)

    Article  Google Scholar 

  25. Vatanasombut, B., Igbaria, M., Stylianou, A.C., Rodgers, W.: Information systems continuance intention of web-based applications customers: The case of online banking. Information & Management 45, 419–428 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Edward Hartono .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hartono, E., Kim, KY., Na, KS., Simpson, J.T., Berkowitz, D. (2013). Perceived Site Security as a Second Order Construct and Its Relationship to e-Commerce Site Usage. In: Rocha, Á., Correia, A., Wilson, T., Stroetmann, K. (eds) Advances in Information Systems and Technologies. Advances in Intelligent Systems and Computing, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36981-0_102

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36981-0_102

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36980-3

  • Online ISBN: 978-3-642-36981-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics